The paper demonstrates the equivalence between the optimality criteria (OC) method, initially proposed by Bendsoe & Kikuchi for topology optimization problem, and the projected gradient method. The equivalence is shown using Hestenes definition of Lagrange multipliers. Based on this development, an alternative formulation of the Karush-Kuhn-Tucker (KKT) condition is suggested. Such reformulation has some advantages, which will be also discussed in the paper. For verification purposes the modified algorithm is applied to the design of tension-only structures.
This paper is focused on tracking control for a rigid body payload, that is connected to an arbitrary number of quadrotor unmanned aerial vehicles via rigid links. A geometric adaptive controller is constructed such that the payload asymptotically follows a given desired trajectory for its position and attitude in the presence of uncertainties. The coupled dynamics between the rigid body payload, links, and quadrotors are explicitly incorporated into control system design and stability analysis. These are developed directly on the nonlinear configuration manifold in a coordinate-free fashion to avoid singularities and complexities that are associated with local parameterizations. The desirable features of the proposed control system are illustrated by a numerical example.
Nonnegative matrix factorization (NMF), which is the approximation of a data matrix as the product of two nonnegative matrices, is a key issue in machine learning and data analysis. One approach to NMF is to formulate the problem as a nonconvex optimization problem of minimizing the distance between a data matrix and the product of two nonnegative matrices with nonnegativity constraints and then solve the problem using an iterative algorithm. The algorithms commonly used are the multiplicative update algorithm and the alternating least-squares algorithm. Although both algorithms converge quickly, they may not converge to a stationary point to the problem that is equal to the solution to a nonmonotone variational inequality for the gradient of the distance function. This paper presents an iterative algorithm for solving the problem that is based on the Krasnosel ski\\u\\i-Mann fixed point algorithm. Convergence analysis showed that, under certain assumptions, any accumulation point of the sequence generated by the proposed algorithm belongs to the solution set of the variational inequality. Application of the {\\tt  mult } and {\\tt als } algorithms in MATLAB and the proposed algorithm to various NMF problems showed that the proposed algorithm had fast convergence and was effective.
Integrating renewable energy into the power grid requires intelligent risk-aware dispatch accounting for the stochastic availability of renewables. Toward achieving this goal, a robust DC optimal flow problem is developed in the present paper for power systems with a high penetration of wind energy. The optimal dispatch is obtained as the solution to a convex program with a suitable regularizer, which is able to mitigate the potentially high risk of inadequate wind power. The regularizer is constructed based on the energy transaction cost using conditional value-at-risk (CVaR). Bypassing the prohibitive high-dimensional integral, the distribution-free sample average approximation method is efficiently utilized for solving the resulting optimization problem. Case studies are reported to corroborate the efficacy of the novel model and approach tested on the IEEE 30-bus benchmark system with real operation data from seven wind farms.
We consider the feedback stabilization of a variable profile for an ensemble of non interacting half spins described by the Bloch equations. We propose an explicit feedback law that stabilizes asymptotically the system around a given arbitrary target profile. The convergence proof is done when the target profile is entirely in the south hemisphere or in the north hemisphere of the Bloch sphere. The convergence holds for initial conditions in a H^1 neighborhood of this target profile. This convergence is shown for the weak H^1 topology. The proof relies on an adaptation of the LaSalle invariance principle to infinite dimensional systems. Numerical simulations illustrate the efficiency of these feedback laws, even for initial conditions far from the target profile.
We prove a Tauberian theorem for nonexpansive operators, and apply it to the model of zero-sum stochastic game. Under mild assumptions, we prove that the value of the lambda-discounted game v_{lambda} converges uniformly when lambda goes to 0 if and only if the value of the n-stage game v_n converges uniformly when n goes to infinity. This generalizes the Tauberian theorem of Lehrer and Sorin (1992) to the two-player zero-sum case. We also provide the first example of a stochastic game with public signals on the state and perfect observation of actions, with finite state space, signal sets and action sets, in which for some initial state k_1 known by both players, (v_{lambda}(k_1)) and (v_n(k_1)) converge to distinct limits.
This paper is concerned with the study of a class of nonsmooth cost functions subject to a quasi-linear PDE in Lipschitz domains in dimension two. We derive the Eulerian semi-derivative of the cost function by employing the averaged adjoint approach and maximal elliptic regularity. Furthermore we characterise stationary points and show how to compute steepest descent direc- tions theoretically and practically. Finally, we present some numerical results for a simple toy problem and compare them with the smooth case. We also compare the convergence rates and obtain higher rates in the nonsmooth case.
Convex regression (CR) is an approach for fitting a convex function to a finite number of observations. It arises in various applications from diverse fields such as statistics, operations research, economics, and electrical engineering. The least squares (LS) estimator, which can be computed via solving a quadratic program (QP), is an intuitive method for convex regression with already established strong theoretical guarantees. On the other hand, since the number of constraints in the QP formulation increases quadratically in the number of observed data points, the QP quickly becomes impractical to solve using traditional interior point methods. To address this issue, we propose a first-order method based on dual smoothing that carefully manages the memory usage through parallelization in order to efficiently compute the LS estimator in practice for large-scale CR instances.
In this paper we address the problem of locating a new facility on a $d$-dimensional space when the distance measure ($\\ell_p$- or polyhedral-norms) is different at each one of the sides of a given hyperplane $\\mathcal{H}$. We relate this problem with the physical phenomenon of refraction, and extends it to any finite dimension space and different distances at each one of the sides of any hyperplane. An application to this problem is the location of a facility within or outside an urban area where different distance measures must be used. We provide a new second order cone programming formulation, based on the $\\ell_p$-norm representation given in \\cite{BPE2014} that allows to solve, exactly, the problem in any finite dimension space with semidefinite programming tools. We also extend the problem to the case where the hyperplane is considered as a rapid transit media (a different third norm is also considered over $\\mathcal{H}$) that allows the demand to travel faster through $\\mathcal{H}$ to reach the new facility. Extensive computational experiments run in Gurobi are reported in order to show the effectiveness of the approach.
Stochastic non-smooth convex optimization constitutes a class of problems in machine learning and operations research. This paper considers minimization of a non-smooth function based on stochastic subgradients. When the function has a locally polyhedral structure, a staggered time average algorithm is proven to have O(1/T) convergence rate. A more general convergence result is proven when the locally polyhedral assumption is removed. In that case, the convergence bound depends on the curvature of the function near the minimum. Finally, the locally polyhedral assumption is shown to improve convergence beyond O(1/T) for a special case of deterministic problems.
In this study, calculations necessary to solve the large scale linear programming problems in two operating systems, Linux and Windows 7 (Win), are compared using two different methods. Relying on the interior-point methods, linear-programming interior point solvers (LIPSOL) software was used for the first method and relying on an augmented Lagrangian method-based algorithm, the second method used the generalized derivative. The performed calculations for various problems show the produced random in the Linux operating system (OS) and Win OS indicate the efficiency of the performed calculations in the Linux OS in terms of the accuracy and using of the optimum memory.
This paper considers the problem of Volt-VAR Optimization (VVO) in active smart grids. Active smart grids are equipped with distributed generators, distributed storage systems, and tie-line switches that allow for topological reconfiguration. In this paper, the joint operation of the remotely controllable switches, storage units, under load tap changers, and shunt capacitors is formulated for a day-ahead operation scheme. The proposed VVO problem aims at minimizing the expected active power loss in the system and is formulated as a mixed-integer quadratic program. The stochasticity of the wind power generation is addressed through a first-order Markov chain model. Numerical results on a 33-node, 12.66 kV active smart grid using real data from smart meters and wind turbines are presented and compared for various test cases.
We are interested in the existence of Pareto solutions to the vector optimization problem $\\text{Min}_{,\\mathbb{R}^m_+} \\{f(x) ,|, x\\in \\mathbb{R}^n\\}$, where $f\\colon\\mathbb{R}^n\\to \\mathbb{R}^m$ be a differentiable semi-algebraic map. By using the so-called {\\em tangency variety} of $f$ we first construct a semi-algebraic set of dimension at most $m - 1$ containing the set of Pareto values of the problem. Then we establish connections between Palais--Smale conditions, $M$-tameness, and properness for the map $f$. Based on these results, we provide some sufficient conditions for the existence of Pareto solutions of the problem. We also introduce a generic class of polynomial vector optimization problems, which have at least one Pareto solution.
We formulate an optimal scheduling problem for battery swapping that assigns to each electric vehicle (EV) a best station to swap its depleted battery based on its current location and state of charge. The schedule aims to minimize total travel distance and generation cost over both station assignments and power flow variables, subject to EV range constraints, grid operational constraints and AC power flow equations. To deal with the nonconvexity of power flow equations and the binary nature of station assignments, we propose a solution based on second-order cone programming (SOCP) relaxation of optimal power flow (OPF) and generalized Benders decomposition. When the SOCP relaxation is exact, this approach computes a globally optimal solution. We evaluate the performance of the proposed algorithm through simulations. The algorithm requires global information and is suitable for cases where the distribution network, stations, and EVs are managed centrally by the same operator. In Part II of the paper, we develop distributed solutions for cases where they are operated by different organizations that do not share private information.
Given a convex bounded domain $\\Omega $ in ${{\\mathbb{R}}}^{d}$ and an integer $N\\geq 2$, we associate to any jointly $N$-monotone $(N-1)$-tuplet $(u_1, u_2,..., u_{N-1})$ of vector fields from $% \\Omega$ into $\\mathbb{R}^{d}$, a Hamiltonian $H$ on ${\\mathbb{R}}^{d} \\times {\\mathbb{R}}^{d} ... \\times {\\mathbb{R}}^{d}$, that is concave in the first variable, jointly convex in the last $(N-1)$ variables such that for almost all $% x\\in \\Omega$, \\hbox{$(u_1(x), u_2(x),..., u_{N-1}(x))= \\nabla_{2,...,N} H(x,x,...,x)$. Moreover, $H$ is $N$-sub-antisymmetric, meaning that $\\sum% \\limits_{i=0}^{N-1}H(\\sigma ^{i}(\\mathbf{x}))\\leq 0$ for all $\\mathbf{x}% =(x_{1},...,x_{N})\\in \\Omega ^{N}$, $\\sigma $ being the cyclic permutation on ${\\mathbb{R}}^{d}$ defined by $\\sigma (x_{1},x_2,...,x_{N})=(x_{2},x_{3},...,x_{N},x_{1})$. Furthermore, $H$ is $N$% -antisymmetric in a sense to be defined below. This can be seen as an extension of a theorem of E. Krauss, which associates to any monotone operator, a concave-convex antisymmetric saddle function. We also give various variational characterizations of vector fields that are almost everywhere $N$-monotone, showing that they are dual to the class of measure preserving $N$-involutions on $\\Omega$.
Let $X$ a probability measure space and $\\psi_1....\\psi_N$ measurable, real valued functions on $X$. Consider all possible partitions of $X$ into $N$ disjoint subdomains $X_i$ on which $\\int_{X_i}\\psi_i$ are prescribed. We address the question of characterizing the set $(m_1,,,m_N) \\in R^N$ for which there exists a partition $X_1, ...X_N$ of $X$ satisfying $\\int_{X_i}\\psi_i= m_i$ and discuss some optimization problems on this set of partitions. The relation of this problem to semi-discrete version of optimal mass transportation is discussed as well.
We show that the optimal complexity of Nesterov s smooth first-order optimization algorithm is preserved when the gradient is only computed up to a small, uniformly bounded error. In applications of this method to semidefinite programs, this means in some instances computing only a few leading eigenvalues of the current iterate instead of a full matrix exponential, which significantly reduces the method s computational cost. This also allows sparse problems to be solved efficiently using sparse maximum eigenvalue packages.
This paper describes a calibration algorithm to simultaneously calibrate a magnetometer and an accelerometer without any information besides the sensors readings. Using a linear sensor model and maximum likelihood cost, the algorithm is able to estimate both sensors  biases, gains, and covariances, besides sensor orientations and Earth s fields. Results show errors of less than 0.1 standard deviations in simulation, and high-quality estimates with real sensors even when the algorithm s assumptions are violated.
Model predictive control (MPC) anticipates future events to take appropriate control actions. Nonlinear MPC (NMPC) describes systems with nonlinear models and/or constraints. A Continuation/GMRES Method for NMPC, suggested by T. Ohtsuka in 2004, uses the GMRES iterative algorithm to solve a forward difference approximation $Ax=b$ of the Continuation NMPC (CNMPC) equations on every time step. The coefficient matrix $A$ of the linear system is often ill-conditioned, resulting in poor GMRES convergence, slowing down the on-line computation of the control by CNMPC, and reducing control quality. We adopt CNMPC for challenging minimum-time problems, and improve performance by introducing efficient preconditioning, utilizing parallel computing, and substituting MINRES for GMRES.
The $k$-batch greedy strategy is an approximation algorithm to maximize a set function subject to a matroid constraint. Starting with the empty set, the $k$-batch greedy strategy iteratively adds to the current solution set a batch of $k$ elements that results in the largest gain in the objective function while satisfying the matroid constraints. In this paper, we bound the performance of the $k$-batch greedy strategy with respect to the optimal strategy in terms of a parameter $\\alpha_k$ called the total curvature. We show that when the objective function is a polymatroid set function, the $k$-batch greedy strategy satisfies the harmonic bound $1/(1+\\alpha_k)$ for a general matroid constraint and the exponential bound $(1-(1-\\frac{\\alpha_k}{l+1}\\frac{m}{k})(1-\\frac{\\alpha_k}{l+1})^l)/{\\alpha}_k$ for a uniform matroid constraint, where $K=kl+m$ is the rank of the uniform matroid, $l$ and $m$ are integers, and $0< m\\leq k$. We also study the behavior of the bounds as a function of the batch size $k$. Specifically, we prove that the harmonic bound for a general matroid is nondecreasing in $k$ and the exponential bound for a uniform matroid is nondecreasing in $k$ under the condition that $k$ divides $K$. Finally, we illustrate our results by considering a task scheduling problem and an adaptive sensing problem.
In this letter, we apply optimal control theory to design minimum-energy $\\pi/2$ and $\\pi$ pulses for the Bloch system in the presence of relaxation with constrained control amplitude. We consider a commonly encountered case in which the transverse relaxation rate is much larger than the longitudinal one so that the latter can be neglected. Using the Pontryagin s Maximum Principle, we derive optimal feedback laws which are characterized by the number of switches, depending on the control bound and the coordinates of the desired final state.
Minimization of the nuclear norm is often used as a surrogate, convex relaxation, for finding the minimum rank completion (recovery) of a partial matrix. The minimum nuclear norm problem can be solved as a trace minimization semidefinite programming problem, (SDP). The SDP and its dual are regular in the sense that they both satisfy strict feasibility. Interior point algorithms are the current methods of choice for these problems. This means that it is difficult to solve large scale problems and difficult to get high accuracy solutions. In this paper we take advantage of the structure at optimality for the minimum nuclear norm problem. We show that even though strict feasibility holds, the facial reduction framework can be successfully applied to obtain a proper face that contains the optimal set, and thus can dramatically reduce the size of the final nuclear norm problem while guaranteeing a low-rank solution. We include numerical tests for both exact and noisy cases. In all cases we assume that knowledge of a target rank is available.
Jeroslow and Lowe gave an exact geometric characterization of subsets of $\\mathbb{R}^n$ that are projections of mixed-integer linear sets, a.k.a MILP-representable sets. We give an alternate algebraic characterization by showing that a set is MILP-representable {\\em if and only if} the set can be described as the intersection of finitely many {\\em affine Chv\\ atal inequalities}. These inequalities are a modification of a concept introduced by Blair and Jeroslow. This gives a sequential variable elimination scheme that, when applied to the MILP representation of a set, explicitly gives the affine Chv\\ atal inequalities characterizing the set. This is related to the elimination scheme of Wiliams and Williams-Hooker, who describe projections of integer sets using \\emph{disjunctions} of Chv\\ atal systems. Our scheme extends their work in two ways. First, we show that disjunctions are unnecessary, by showing how to find the affine Chv\\ atal inequalities that cannot be discovered by the Williams-Hooker scheme. Second, disjunctions of Chv\\ atal systems can give sets that are \\emph{not} projections of mixed-integer linear sets; so the Williams-Hooker approach does not give an exact characterization of MILP representability.
Many iterative methods for solving optimization or feasibility problems have been invented, and often convergence of the iterates to some solution is proven. Under favourable conditions, one might have additional bounds on the distance of the iterate to the solution leading thus to worst case estimates, i.e., how fast the algorithm must converge. Exact convergence estimates are typically hard to come by. In this paper, we consider the complementary problem of finding best case estimates, i.e., how slow the algorithm has to converge, and we also study exact asymptotic rates of convergence. Our investigation focuses on convex feasibility in the Euclidean plane, where one set is the real axis while the other is the epigraph of a convex function. This case study allows us to obtain various convergence rate results. We focus on the popular method of alternating projections and the Douglas-Rachford algorithm. These methods are connected to the proximal point algorithm which is also discussed. Our findings suggest that the Douglas-Rachford algorithm outperforms the method of alternating projections in the absence of constraint qualifications. Various examples illustrate the theory.
The present paper is devoted to estimating the speed of convergence towards consensus for a general class of discrete-time multi-agent systems. In the systems considered here, both the topology of the interconnection graph and the weight of the arcs are allowed to vary as a function of time. Under the hypothesis that some spanning tree structure is preserved along time, and that some nonzero minimal weight of the information transfer along this tree is guaranteed, an estimate of the contraction rate is given. The latter is expressed explicitly as the spectral radius of some matrix depending upon the tree depth and the lower bounds on the weights.
In this paper, we consider a partial observed two-person zero-sum stochastic differential game problem where the system is governed by a stochastic differential equation of mean-field type. Under standard assumptions on the coefficients, the maximum principles for optimal open-loop control in a strong sense as well as a weak one are established by the associated optimal control theory in Tang and Meng (2016). To illustrate the general results, a class of linear quadratic stochastic differential game problem is discussed and the existence and dual characterization for the partially observed open-loop saddle are obtained.
An efficient and accurate computational approach is proposed for optimal attitude control of a rigid body. The problem is formulated directly as a discrete time optimization problem using a Lie group variational integrator. Discrete necessary conditions for optimality are derived, and an efficient computational approach is proposed to solve the resulting two point boundary value problem. The use of geometrically exact computations on SO(3) guarantees that this optimal control approach has excellent convergence properties even for highly nonlinear large angle attitude maneuvers. Numerical results are presented for attitude maneuvers of a 3D pendulum and a spacecraft in a circular orbit.
We analyze the dynamics of the Learning-Without-Recall model with Gaussian priors in a dynamic social network. Agents seeking to learn the state of the world, the \"truth\", exchange signals about their current beliefs across a changing network and update them accordingly. The agents are assumed memoryless and rational, meaning that they Bayes-update their beliefs based on current states and signals, with no other information from the past. The other assumption is that each agent hears a noisy signal from the truth at a frequency bounded away from zero. Under these conditions, we show that the system reaches truthful consensus almost surely with a convergence rate that is polynomial in expectation. Somewhat paradoxically, high outdegree can slow down the learning process. The lower-bound assumption on the truth-hearing frequency is necessary: even infinitely frequent access to the truth offers no guarantee of truthful consensus in the limit.
We prove polynomial-time solvability of a large class of clustering problems where a weighted set of items has to be partitioned into clusters with respect to some balancing constraints. The data points are weighted with respect to different features and the clusters adhere to given lower and upper bounds on the total weight of their points with respect to each of these features. Further the weight-contribution of a vector to a cluster can depend on the cluster it is assigned to. Our interest in these types of clustering problems is motivated by an application in land consolidation where the ability to perform this kind of balancing is crucial. Our framework maximizes an objective function that is convex in the summed-up utility of the items in each cluster. Despite hardness of convex maximization and many related problems, for fixed dimension and number of clusters, we are able to show that our clustering model is solvable in time polynomial in the number of items if the weight-balancing restrictions are defined using vectors from a fixed, finite domain. We conclude our discussion with a new, efficient model and algorithm for land consolidation.
In this paper we show how to construct inner and outer convex approximations of a polytope from an approximate cone factorization of its slack matrix. This provides a robust generalization of the famous result of Yannakakis that polyhedral lifts of a polytope are controlled by (exact) nonnegative factorizations of its slack matrix. Our approximations behave well under polarity and have efficient representations using second order cones. We establish a direct relationship between the quality of the factorization and the quality of the approximations, and our results extend to generalized slack matrices that arise from a polytope contained in a polyhedron.
We study the recently introduced notion of output-input stability, which is a robust variant of the minimum-phase property for general smooth nonlinear control systems. The subject of this paper is developing the theory of output-input stability in the multi-input, multi-output setting. We show that output-input stability can be viewed as a combination of two system properties, one related to detectability and the other to left-invertibility. For systems affine in controls, we provide a necessary and sufficient condition for output-input stability, which relies on Hirschorn s nonlinear structure algorithm.
Original equipment manufacturers (OEMs) manufacture, inventory and transport new vehicles to franchised dealers. These franchised dealers inventory and sell new vehicles to end users. OEMs rely on logistics companies with a special type of truck called an auto-carrier to transport the vehicles to the dealers. The process of vehicle distribution has a common challenge. This challenge involves determining routes, and the way to load the vehicles onto each auto-carrier.In this paper, we present a heuristic to determine the route for each auto-carrier based on the dealers  locations, and subsequently, a branch-and-price algorithm to obtain optimal solutions to the loading problem based on the generated route. The loading problem considers the actual dimensions of the vehicles, and the restrictions imposed by vehicle manufacturers and governmental agencies on the loading process. We perform extensive computational experiments for the loading problem using real-world instances, and our results are benchmarked with a holistic model to corroborate the ?effectiveness of the proposed method. For the largest instance comprising of 600 vehicles, the proposed method computes an optimal solution for the loading problem within a stipulated runtime.
We address the problem of distributed uncon- strained convex optimization under separability assumptions, i.e., the framework where each agent of a network is endowed with a local private multidimensional convex cost, is subject to communication constraints, and wants to collaborate to compute the minimizer of the sum of the local costs. We propose a design methodology that combines average consensus algorithms and separation of time-scales ideas. This strategy is proved, under suitable hypotheses, to be globally convergent to the true minimizer. Intuitively, the procedure lets the agents distributedly compute and sequentially update an approximated Newton- Raphson direction by means of suitable average consensus ratios. We show with numerical simulations that the speed of convergence of this strategy is comparable with alternative optimization strategies such as the Alternating Direction Method of Multipliers. Finally, we propose some alternative strategies which trade-off communication and computational requirements with convergence speed.
We discuss a special form of gradient descent that in the literature has become known as the so-called linearised Bregman iteration. The idea is to replace the classical (squared) two norm metric in the gradient descent setting with a generalised Bregman distance, based on a more general proper, convex and lower semi-continuous functional. Gradient descent as well as the entropic mirror descent by Beck and Teboulle are special cases, as is a specific form of non-linear Landweber iteration introduced by Bachmayr and Burger. We are going to analyse the linearised Bregman iteration in a setting where the functional we want to minimise is neither necessarily Lipschitz-continuous (in the classical sense) nor necessarily convex, and establish a global convergence result under the additional assumption that the functional we wish to minimise satisfies the so-called Kurdyka-{\\L}ojasiewicz property.
Parameters of a virtual synchronous machine in a small microgrid are optimised. The dynamical behaviour of the system is simulated after a perturbation, where the system needs to return to its steady state. The cost functional evaluates the system behaviour for different parameters. This functional is minimised by Parallel Tempering. Two perturbation scenarios are investigated and the resulting optimal parameters agree with analytical predictions. Dependent on the focus of the optimisation different optima are obtained for each perturbation scenario. During the transient the system leaves the allowed voltage and frequency bands only for a short time if the perturbation is within a certain range.
Existing implementations of gradient-based optimisation methods typically assume that the problem is posed in Euclidean space. When solving optimality problems on function spaces, the functional derivative is then inaccurately represented with respect to $\\ell^2$ instead of the inner product induced by the function space. This error manifests as a mesh dependence in the number of iterations required to solve the optimisation problem. In this paper, an analytic estimate is derived for this iteration count in the case of a simple and generic discretised optimisation problem. The system analysed is the steepest descent method applied to a finite element problem. The estimate is based on Kantorovich s inequality and on an upper bound for the condition number of Galerkin mass matrices. Computer simulations validate the iteration number estimate. Similar numerical results are found for a more complex optimisation problem constrained by a partial differential equation. Representing the functional derivative with respect to the inner product induced by the continuous control space leads to mesh independent convergence.
This paper deals with the dynamics and controls of a quadrotor unmanned aerial vehicle that is connected to a fixed point on the ground via a tether. Tethered quadrotors have been envisaged for long-term aerial surveillance with high-speed communications. This paper presents an intrinsic form of the dynamic model of a tethered quadrotor including the coupling between deformations of the tether and the motion of the quadrotor, and it constructs geometric control systems to asymptotically stabilize the coupled dynamics of the quadrotor and the tether. The proposed global formulation of dynamics and control also avoids complexities and singularities associated with local coordinates. These are illustrated by numerical examples.
New architectures and algorithms are needed to reflect the mixture of local and global information that is available as multi-agent systems connect over the cloud. We present a novel architecture for multi-agent coordination where the cloud is assumed to be able to gather information from all agents, perform centralized computations, and disseminate the results in an intermittent manner. This architecture is used to solve a multi-agent optimization problem in which each agent has a local objective function unknown to the other agents and in which the agents are collectively subject to global inequality constraints. Leveraging the cloud, a dual problem is formulated and solved by finding a saddle point of the associated Lagrangian.
A physical nonlinear dynamical model of a laser diode is considered. We propose a feed-forward control scheme based on differential flatness for the design of input-current modulations to compensate diode distortions. The goal is to transform without distortion a radio-frequency current modulation into a light modulation leaving the laser-diode and entering an optic fiber. We prove that standard physical dynamical models based on dynamical electron and photons balance are flat systems when the current is considered as control input, the flat output being the photon number (proportional to the light power). We prove that input-current is an affine map of the flat output, its logarithm and their time-derivatives up to order two. When the flat output is an almost harmonic signal with slowly varying amplitude and phase, these derivatives admit precise analytic approximations. It is then possible to design simple analogue electronic circuits to code approximations of the nonlinear computations required by our flatness-based approach. Simulations with the parameters of a commercial diode illustrate the practical interest of this pre-compensation scheme and its robustness versus modelling and analogue implementation errors.
A linear map between real symmetric matrix spaces is positive if all positive semidefinite matrices are mapped to positive semidefinite ones. A real symmetric matrix is separable if it can be written as a summation of Kronecker products of positive semidefinite matrices. This paper studies how to check if a linear map is positive or not and how to check if a matrix is separable or not. We propose numerical algorithms, based on Lasserre type semidefinite relaxations, for solving such questions. To check the positivity of a linear map, we construct a hierarchy of semidefinite relaxations for minimizing the associated bi-quadratic forms over the unit spheres. We show that the positivity can be detected by solving a finite number of such semidefinite relaxations. To check the separability of a matrix, we construct a hierarchy of semidefinite relaxations. If it is not separable, we can get a mathematical certificate for that; if it is, we can get a decomposition for the separability.
Given a compact basic semi-algebraic set $K\\subset R^n\\times R^m$, a simple set $B$ (box or ellipsoid), and some semi-algebraic function $f$, we consider sets defined with quantifiers, of the form $R_f:=\\{x\\in B: \\mbox{$f(x,y)\\leq 0$ for all $y$ such that $(x,y)\\in K$}\\}$ and $D_f:=\\{x\\in B: \\mbox{$f(x,y)\\geq 0$ for some $y$ such that $(x,y)\\in K$}\\}$. The former set $R_f$ is particularly useful to qualify \"robust\" decisions $x$ versus noise parameter $y$ (e.g. in robust optimization on some set $\\mathbf{\\Omega}\\subset B$) whereas the latter set $D_f$ is useful (e.g. in optimization) when one does not want to work with its lifted representation $\\{(x,y)\\in K: f(x,y)\\geq 0\\}$. Assuming that $K_x:=\\{y:(x,y)\\in K\\}\\neq\\emptyset$ for every $x\\in B$, we provide a systematic procedure to obtain a sequence of explicit inner (resp. outer) approximations that converge to $R_f$ (resp. $D_f$) in a strong sense. Another (and remarkable) feature is that each approximation is the sublevel set of a single polynomial whose vector of coefficients is an optimal solution of a semidefinite program. Several extensions are also proposed, and in particular, approximations for sets of the form $R_F:=\\{x\\in B:\\mbox{$(x,y)\\in F$ for all $y$ such that $(x,y)\\in K$}\\}$, where $F$ is some other basic-semi algebraic set, and also sets defined with two quantifiers.
Business optimization is becoming increasingly important because all business activities aim to maximize the profit and performance of products and services, under limited resources and appropriate constraints. Recent developments in support vector machine and metaheuristics show many advantages of these techniques. In particular, particle swarm optimization is now widely used in solving tough optimization problems. In this paper, we use a combination of a recently developed Accelerated PSO and a nonlinear support vector machine to form a framework for solving business optimization problems. We first apply the proposed APSO-SVM to production optimization, and then use it for income prediction and project scheduling. We also carry out some parametric studies and discuss the advantages of the proposed metaheuristic SVM.
We consider a sequence of transferable utility (TU) games where, at each time, the characteristic function is a random vector with realizations restricted to some set of values. The game differs from other ones in the literature on dynamic, stochastic or interval valued TU games as it combines dynamics of the game with an allocation protocol for the players that dynamically interact with each other. The protocol is an iterative and decentralized algorithm that offers a paradigmatic mathematical description of negotiation and bargaining processes. The first part of the paper contributes to the definition of a robust (coalitional) TU game and the development of a distributed bargaining protocol. We prove the convergence with probability 1 of the bargaining process to a random allocation that lies in the core of the robust game under some mild conditions on the underlying communication graphs. The second part of the paper addresses the more general case where the robust game may have empty core. In this case, with the dynamic game we associate a dynamic average game by averaging over time the sequence of characteristic functions. Then, we consider an accordingly modified bargaining protocol. Assuming that the sequence of characteristic functions is ergodic and the core of the average game has a nonempty relative interior, we show that the modified bargaining protocol converges with probability 1 to a random allocation that lies in the core of the average game.
We consider $\\min\\{f(x):g(x) \\le 0, ~x\\in X\\},$ where $X$ is a compact convex subset of $\\RR^m$, and $f$ and $g$ are continuous convex functions defined on an open neighbourhood of $X$. We work in the setting of derivative-free optimization, assuming that $f$ and $g$ are available through a black-box that provides only function values for a lower-$\\mathcal{C}^2$ representation of the functions. We present a derivative-free optimization variant of the $\\eps$-comirror algorithm \\cite{BBTGBT2010}. Algorithmic convergence hinges on the ability to accurately approximate subgradients of lower-$\\mathcal{C}^2$ functions, which we prove is possible through linear interpolation. We provide convergence analysis that quantifies the difference between the function values of the iterates and the optimal function value. We find that the DFO algorithm we develop has the same convergence result as the original gradient-based algorithm. We present some numerical testing that demonstrate the practical feasibility of the algorithm, and conclude with some directions for further research.
Consider a homogeneous multifold convex conic system $$ Ax = 0, \\; x\\in K_1\\times...\\times K_r $$ and its alternative system $$ A\\transp y \\in K_1^*\\times...\\times K_r^*, $$ where $K_1,..., K_r$ are regular closed convex cones. We show that there is canonical partition of the index set ${1,...,r}$ determined by certain complementarity sets associated to the most interior solutions to the two systems. Our results are inspired by and extend the Goldman-Tucker Theorem for linear programming.
This paper is concerned with a mean-field linear quadratic (LQ, for short) optimal control problem with deterministic coefficients. It is shown that convexity of the cost functional is necessary for the finiteness of the mean-field LQ problem, whereas uniform convexity of the cost functional is sufficient for the open-loop solvability of the problem. By considering a family of uniformly convex cost functionals, a characterization of the finiteness of the problem is derived and a minimizing sequence, whose convergence is equivalent to the open-loop solvability of the problem, is constructed. Then, it is proved that the uniform convexity of the cost functional is equivalent to the solvability of two coupled differential Riccati equations and the unique open-loop optimal control admits a state feedback representation in the case that the cost functional is uniformly convex. Finally, some examples are presented to illustrate the theory developed.
The work studies a number of approaches to solving motion planning problem for a mobile robot with a trailer. Different control models of car-like robots are considered from the differential-geometric point of view. The same models can be also used for controlling a mobile robot with a trailer. However, in cases where the position of the trailer is of importance, i.e., when it is moving backward, a more complex approach should be applied. At the end of the article, such an approach, based on recent works in sub-Riemannian geometry, is described. It is applied to the problem of reparking a trailer and implemented in the algorithm for parking a mobile robot with a trailer.
The use of Model Predictive Control in industry is steadily increasing as more complicated problems can be addressed. Due to that online optimization is usually performed, the main bottleneck with Model Predictive Control is the relatively high computational complexity. Hence, a lot of research has been performed to find efficient algorithms that solve the optimization problem. As parallelism is becoming more commonly used in hardware, the demand for efficient parallel solvers for Model Predictive Control has increased. In this paper, a tailored parallel algorithm that can adopt different levels of parallelism for solving the Newton step is presented. With sufficiently many processing units, it is capable of reducing the computational growth to logarithmic growth in the prediction horizon. Since the Newton step computation is where most computational effort is spent in both interior-point and active-set solvers, this new algorithm can significantly reduce the computational complexity of highly relevant solvers for Model Predictive Control.
In this paper, we present Lyapunov-based robust and adaptive controllers for the finite time stabilization of a perturbed chain of integrators with bounded uncertainties. The proposed controllers can be designed for integrator chains of any arbitrary length. The uncertainty bounds are known in the robust control problem whereas they are unknown in the adaptive control problem. Both controllers are developed from a class of finite time stabilization controllers for pure integrator chains. Lyapunov-based design permits to calculate upper bound on convergence time.
This paper for the first time addresses the concepts of regional gradient observability for the Riemann-Liouville time fractional order diffusion system in an interested subregion of the whole domain without the knowledge of the initial vector and its gradient. The Riemann-Liouville time fractional order diffusion system which replaces the first order time derivative of normal diffusion system by a Riemann-Liouville time fractional order derivative of order $\\alpha\\in (0,1]$ is used to well characterize those anomalous sub-diffusion processes. The characterizations of the strategic sensors when the system under consideration is regional gradient observability are explored. We then describe an approach leading to the reconstruction of the initial gradient in the considered subregion with zero residual gradient vector. At last, to illustrate the effectiveness of our results, we present several application examples where the sensors are zone, pointwise or filament ones.
Sparse cutting-planes are often the ones used in mixed-integer programing (MIP) solvers, since they help in solving the linear programs encountered during branch-&-bound more efficiently. However, how well can we approximate the integer hull by just using sparse cutting-planes? In order to understand this question better, given a polyope $P$ (e.g. the integer hull of a MIP), let $P^k$ be its best approximation using cuts with at most $k$ non-zero coefficients. We consider $d(P, P^k) = \\max_{x \\in P^k} \\left(min_{y \\in P} \\| x - y\\|\\right)$ as a measure of the quality of sparse cuts. In our first result, we present general upper bounds on $d(P, P^k)$ which depend on the number of vertices in the polytope and exhibits three phases as $k$ increases. Our bounds imply that if $P$ has polynomially many vertices, using half sparsity already approximates it very well. Second, we present a lower bound on $d(P, P^k)$ for random polytopes that show that the upper bounds are quite tight. Third, we show that for a class of hard packing IPs, sparse cutting-planes do not approximate the integer hull well, that is $d(P, P^k)$ is large for such instances unless $k$ is very close to $n$. Finally, we show that using sparse cutting-planes in extended formulations is at least as good as using them in the original polyhedron, and give an example where the former is actually much better.
This paper studies controllability properties of recurrent neural networks. The new contributions are: (1) an extension of the result in the previous paper \"Complete controllability of continuous-time recurrent neural networks\" (Sontag and Sussmann) to a slightly different model, where inputs appear in an affine form, (2) a formulation and proof of a necessary and sufficient condition, in terms of local-local controllability, and (3) a complete analysis of the 2-dimensional case for which the hypotheses made in previous work do not apply
We address the problem of recovering a sparse $n$-vector within a given subspace. This problem is a subtask of some approaches to dictionary learning and sparse principal component analysis. Hence, if we can prove scaling laws for recovery of sparse vectors, it will be easier to derive and prove recovery results in these applications. In this paper, we present a scaling law for recovering the sparse vector from a subspace that is spanned by the sparse vector and $k$ random vectors. We prove that the sparse vector will be the output to one of $n$ linear programs with high probability if its support size $s$ satisfies $s \\lesssim n/\\sqrt{k \\log n}$. The scaling law still holds when the desired vector is approximately sparse. To get a single estimate for the sparse vector from the $n$ linear programs, we must select which output is the sparsest. This selection process can be based on any proxy for sparsity, and the specific proxy has the potential to improve or worsen the scaling law. If sparsity is interpreted in an $\\ell_1/\\ell_\\infty$ sense, then the scaling law can not be better than $s \\lesssim n/\\sqrt{k}$. Computer simulations show that selecting the sparsest output in the $\\ell_1/\\ell_2$ or thresholded-$\\ell_0$ senses can lead to a larger parameter range for successful recovery than that given by the $\\ell_1/\\ell_\\infty$ sense.
We introduce a new class of optimization problems called integer Minkowski programs. The formulation of such problems involves finitely many integer variables and nonlinear constraints involving functionals defined on families of discrete or polyhedral sets. We show that, under certain assumptions, it is possible to reformulate them as integer linear programs, by making use of integral generating sets. We then apply this technique to the network design problem for fractional and integral flows subject to survivability constraints.
Variational problems under uniform quasiconvex constraints on the gradient are studied. In particular, existence of solutions to such problems is proved as well as existence of lagrange multipliers associated to the uniform constraint. They are shown to satisfy an Euler-Lagrange equation and a complementarity property. Our technique consists in approximating the original problem by a one-parameter family of smooth unconstrained optimization problems. Numerical experiments confirm the ability of our method to accurately compute solutions and Lagrange multipliers.
Stable estimation of rigid body pose and velocities from noisy measurements, without any knowledge of the dynamics model, is treated using the Lagrange-d Alembert principle from variational mechanics. With body-fixed optical and inertial sensor measurements, a Lagrangian is obtained as the difference between a kinetic energy-like term that is quadratic in velocity estimation error and the sum of two artificial potential functions; one obtained from a generalization of Wahba s function for attitude estimation and another which is quadratic in the position estimate error. An additional dissipation term that is linear in the velocity estimation error is introduced, and the Lagrange-d Alembert principle is applied to the Lagrangian with this dissipation. A Lyapunov analysis shows that the state estimation scheme so obtained provides stable asymptotic convergence of state estimates to actual states in the absence of measurement noise, with an almost global domain of attraction. This estimation scheme is discretized for computer implementation using discrete variational mechanics, as a first order Lie group variational integrator. The continuous and discrete pose estimation schemes require optical measurements of at least three inertially fixed landmarks or beacons in order to estimate instantaneous pose. The discrete estimation scheme can also estimate velocities from such optical measurements. Moreover, all states can be estimated during time periods when measurements of only two inertial vectors, the angular velocity vector, and one feature point position vector are available in body frame. In the presence of bounded measurement noise in the vector measurements, numerical simulations show that the estimated states converge to a bounded neighborhood of the actual states.
Swarm intelligence has becoming a powerful technique in solving design and scheduling tasks. Metaheuristic algorithms are an integrated part of this paradigm, and particle swarm optimization is often viewed as an important landmark. The outstanding performance and efficiency of swarm-based algorithms inspired many new developments, though mathematical understanding of metaheuristics remains partly a mystery. In contrast to the classic deterministic algorithms, metaheuristics such as PSO always use some form of randomness, and such randomization now employs various techniques. This paper intends to review and analyze some of the convergence and efficiency associated with metaheuristics such as firefly algorithm, random walks, and L\\ evy flights. We will discuss how these techniques are used and their implications for further research.
We propose an inertial forward-backward splitting algorithm to compute the zero of a sum of two monotone operators allowing for stochastic errors in the computation of the operators. More precisely, we establish almost sure convergence in real Hilbert spaces of the sequence of iterates to an optimal solution. Then, based on this analysis, we introduce two new classes of stochastic inertial primal-dual splitting methods for solving structured systems of composite monotone inclusions and prove their convergence. Our results extend to the stochastic and inertial setting various types of structured monotone inclusion problems and corresponding algorithmic solutions. Application to minimization problems is discussed.
This paper considers the problem of optimally deploying omnidirectional sensors, with potentially limited sensing radius, in a network-like environment. This model provides a compact and effective description of complex environments as well as a proper representation of road or river networks. We present a two-step procedure based on a discrete-time gradient ascent algorithm to find a local optimum for this problem. The first step performs a coarse optimization where sensors are allowed to move in the plane, to vary their sensing radius and to make use of a reduced model of the environment called collapsed network. It is made up of a finite discrete set of points, barycenters, produced by collapsing network edges. Sensors can be also clustered to reduce the complexity of this phase. The sensors  positions found in the first step are then projected on the network and used in the second finer optimization, where sensors are constrained to move only on the network. The second step can be performed on-line, in a distributed fashion, by sensors moving in the real environment, and can make use of the full network as well as of the collapsed one. The adoption of a less constrained initial optimization has the merit of reducing the negative impact of the presence of a large number of local optima. The effectiveness of the presented procedure is illustrated by a simulated deployment problem in an airport environment.
This paper improves the algorithms based on supporting halfspaces and quadratic programming for convex set intersection problems in our earlier paper in several directions. First, we give conditions so that much smaller quadratic programs (QPs) and approximate projections arising from partially solving the QPs are sufficient for multiple-term superlinear convergence for nonsmooth problems. Second, we identify additional regularity, which we call the second order supporting hyperplane property (SOSH), that gives multiple-term quadratic convergence. Third, we show that these fast convergence results carry over for the convex inequality problem. Fourth, we show that infeasibility can be detected in finitely many operations. Lastly, we explain how we can use the dual active set QP algorithm of Goldfarb and Idnani to get useful iterates by solving the QPs partially, overcoming the problem of solving large QPs in our algorithms.
We consider the traffic light control problem for a single intersection modeled as a stochastic hybrid system. We study a quasi-dynamic policy based on partial state information defined by detecting whether vehicle backlogs are above or below certain controllable thresholds. Using Infinitesimal Perturbation Analysis (IPA), we derive online gradient estimators of a cost metric with respect to these threshold parameters and use these estimators to iteratively adjust the threshold values through a standard gradient-based algorithm so as to improve overall system performance under various traffic conditions. Results obtained by applying this methodology to a simulated urban setting are also included.
A MIMO Multi-hop Control Network (MCN) consists of a MIMO LTI system where the communication between sensors, actuators and computational units is supported by a (wireless) multi-hop communication network, and data flow is performed using scheduling and routing of sensing and actuation data. We provide necessary and sufficient conditions on the plant dynamics and on the communication protocol configuration such that the Fault Detection and Isolation (FDI) problem of failures and malicious attacks to communication nodes can be solved.
In this paper we study rebalancing strategies for a mobility-on-demand urban transportation system blending customer-driven vehicles with a taxi service. In our system, a customer arrives at one of many designated stations and is transported to any other designated station, either by driving themselves, or by being driven by an employed driver. The system allows for one-way trips, so that customers do not have to return to their origin. When some origins and destinations are more popular than others, vehicles will become unbalanced, accumulating at some stations and becoming depleted at others. This problem is addressed by employing rebalancing drivers to drive vehicles from the popular destinations to the unpopular destinations. However, with this approach the rebalancing drivers themselves become unbalanced, and we need to \"rebalance the rebalancers\" by letting them travel back to the popular destinations with a customer. Accordingly, in this paper we study how to optimally route the rebalancing vehicles and drivers so that stability (in terms of boundedness of the number of waiting customers) is ensured while minimizing the number of rebalancing vehicles traveling in the network and the number of rebalancing drivers needed; surprisingly, these two objectives are aligned, and one can find the optimal rebalancing strategy by solving two decoupled linear programs. Leveraging our analysis, we determine the minimum number of drivers and minimum number of vehicles needed to ensure stability in the system. Interestingly, our simulations suggest that, in Euclidean network topologies, one would need between 1/3 and 1/4 as many drivers as vehicles.
In this paper we investigate a differential game in which countably many dynamical objects pursue a single one. All the players perform simple motions. The duration of the game is fixed. The controls of a group of pursuers are subject to geometric constraints and the controls of the other pursuers and the evader are subject to integral constraints. The payoff of the game is the distance between the evader and the closest pursuer when the game is terminated. We construct optimal strategies for players and find the value of the game.
We present a method for guidance of a Dubins-like vehicle with saturated control towards a target in a steady simply connected maze-like environment. The vehicle always has access to to the target relative bearing angle (even if the target is behind the obstacle or is far from the vehicle) and the distance to the nearest point of the maze if it is within the given sensor range. The proposed control law is composed by biologically inspired reflex-level rules. Mathematically rigorous analysis of this law is provided; its convergence and performance are confirmed by computer simulations and experiments with real robots.
Aghannan and Rouchon proposed a new design method of asymptotic observers for a class of nonlinear mechanical systems: Lagrangian systems with configuration (position) measurements. The observer is based on the Riemannian structure of the configuration manifold endowed with the kinetic energy metric and is intrinsic. They proved local convergence. When the system is conservative, we propose a globally convergent intrinsic reduced-observer based on the Jacobi metric. For non-conservative systems the observer can be used as a complement to the one of Aghannan and Rouchon. More generally the reduced-observer provides velocity estimation for geodesic flow with position measurements. Thus it can be (formally) used as a fluid flow soft sensor in the case of a perfect incompressible fluid. When the curvature is negative in all planes the geodesic flow is sensitive to initial conditions. Surprisingly this instability yields faster convergence.
We study risk-sensitive control of continuous time Markov chains taking values in discrete state space. We study both finite and infinite horizon problems. In the finite horizon problem we characterise the value function via HJB equation and obtain an optimal Markov control. We do the same for infinite horizon discounted cost case. In the infinite horizon average cost case we establish the existence of an optimal stationary control under certain Lyapunov condition. We also develop a policy iteration algorithm for finding an optimal control.
In this paper, we analyze the iteration-complexity of Generalized Forward--Backward (GFB) splitting algorithm, as proposed in \\cite{gfb2011}, for minimizing a large class of composite objectives $f + \\sum_{i=1}^n h_i$ on a Hilbert space, where $f$ has a Lipschitz-continuous gradient and the $h_i$ s are simple (\\ie their proximity operators are easy to compute). We derive iteration-complexity bounds (pointwise and ergodic) for the inexact version of GFB to obtain an approximate solution based on an easily verifiable termination criterion. Along the way, we prove complexity bounds for relaxed and inexact fixed point iterations built from composition of nonexpansive averaged operators. These results apply more generally to GFB when used to find a zero of a sum of $n > 0$ maximal monotone operators and a co-coercive operator on a Hilbert space. The theoretical findings are exemplified with experiments on video processing.
When Perturbation Analysis (PA) yields unbiased sensitivity estimators for expected-value performance functions in discrete event dynamic systems, it can be used for performance optimization of those functions. However, when PA is known to be unbiased, the complexity of its estimators often does not scale with the system s size. The purpose of this paper is to suggest an alternative approach to optimization which balances precision with computing efforts by trading off complicated, unbiased PA estimators for simple, biased approximate estimators. Furthermore, we provide guidelines for developing such estimators, that are largely based on the Stochastic Flow Modeling framework. We suggest that if the relative error (or bias) is not too large, then optimization algorithms such as stochastic approximation converge to a (local) minimum just like in the case where no approximation is used. We apply this approach to an example of balancing loss with buffer-cost in a finite-buffer queue, and prove a crucial upper bound on the relative error. This paper presents the initial study of the proposed approach, and we believe that if the idea gains traction then it may lead to a significant expansion of the scope of PA in optimization of discrete event systems.
We develop a fast algorithm to construct the robustness degradation function, which describes quantitatively the relationship between the proportion of systems guaranteeing the robustness requirement and the radius of the uncertainty set. This function can be applied to predict whether a controller design based on an inexact mathematical model will perform satisfactorily when implemented on the true system.
The paper proposes a new algorithm for solving global univariate optimization problems. The algorithm does not require convexity of the target function. For a broad variety of target functions after performing (if necessary) several evolutionary leaps the algorithm naturally becomes the standard descent (or ascent) procedure near the global extremum. Moreover, it leads us to an efficient numerical method for calculating the global extrema of univariate real analytic functions.
System reliability is the probability of the maximum flow in a stochastic-flow network from the source node to the sink node being more than a demand level d. There are several approaches to compute system reliability using upper boundary points, called d-MinCuts (d-MCs). Search for all the d-MCs in a stochastic-flow network is an NP-hard problem. Here, a work proposed by Yeh [Yeh WC. A new approach to the d-MC problem. Reliab Eng and Syst Saf 2002; 77(2): 201-206.] for determining all the d-MCs is investigated. Two results (Lemma 3 and Theorem 5) are shown to be incorrect and their correct versions are established. Also, the complexity result (Theorem 6) is shown to be incorrect and the correct count is provided.
We consider a problem in eigenvalue optimization, in particular finding a local minimizer of the spectral abscissa - the value of a parameter that results in the smallest value of the largest real part of the spectrum of a matrix system. This is an important problem for the stabilization of control systems. Many systems require the spectra to lie in the left half plane in order for them to be stable. The optimization problem, however, is difficult to solve because the underlying objective function is nonconvex, nonsmooth, and non-Lipschitz. In addition, local minima tend to correspond to points of non-differentiability and locally non-Lipschitz behavior. We present a sequential linear and quadratic programming algorithm that solves a series of linear or quadratic subproblems formed by linearizing the surfaces corresponding to the largest eigenvalues. We present numerical results comparing the algorithms to the state of the art.
Many practical applications of control require that constraints on the inputs and states of the system be respected, while optimizing some performance criterion. In the presence of model uncertainties or disturbances, for many control applications it suffices to keep the state constraints at least for a prescribed share of the time, as e.g. in building climate control or load mitigation for wind turbines. For such systems, a new control method of Scenario-Based Model Predictive Control (SCMPC) is presented in this paper. It optimizes the control inputs over a finite horizon, subject to robust constraint satisfaction under a finite number of random scenarios of the uncertainty and/or disturbances. While previous approaches have shown to be conservative (i.e. to stay far below the specified rate of constraint violations), the new method is the first to account for the special structure of the MPC problem in order to significantly reduce the number of scenarios. In combination with a new framework for interpreting the probabilistic constraints as average-in-time, rather than pointwise-in-time, the conservatism is eliminated. The presented method retains the essential advantages of SCMPC, namely the reduced computational complexity and the handling of arbitrary probability distributions. It also allows for adopting sample-and-remove strategies, in order to trade performance against computational complexity.
This paper proposes two proximal Newton-CG methods for convex nonsmooth optimization problems in composite form. The algorithms are based on a a reformulation of the original nonsmooth problem as the unconstrained minimization of a continuously differentiable function, namely the forward-backward envelope (FBE). The first algorithm is based on a standard line search strategy, whereas the second one combines the global efficiency estimates of the corresponding first-order methods, while achieving fast asymptotic convergence rates. Furthermore, they are computationally attractive since each Newton iteration requires the approximate solution of a linear system of usually small dimension.
In this paper, we consider linear quadratic team problems with an arbitrary number of quadratic constraints in both stochastic and deterministic settings. The team consists of players with different measurements about the state of nature. The objective of the team is to minimize a quadratic cost subject to additional finite number of quadratic constraints. We will first consider the Gaussian case, where the state of nature is assumed to have a Gaussian distribution, and show that the linear decisions are optimal and can be found by solving a semidefinite program We then consider the problem of minimizing a quadratic objective for the worst case scenario, subject to an arbitrary number of deterministic quadratic constraints. We show that linear decisions can be found by solving a semidefinite program.
We study the polyhedral structure of the static probabilistic lot-sizing problem and propose valid inequalities that integrate information from the chance constraint and the binary setup variables. We prove that the proposed inequalities subsume existing inequalities for this problem, and they are facet-defining under certain conditions. In addition, we show that they give the convex hull description of a related stochastic lot-sizing problem. We propose a new formulation that exploits the simple recourse structure, which significantly reduces the number of variables and constraints of the deterministic equivalent program. This reformulation can be applied to general chance-constrained programs with simple recourse. The computational results show that the proposed inequalities and the new formulation are effective for the the static probabilistic lot-sizing problems.
In this paper, we propose distributed solvers for systems of linear equations given by symmetric diagonally dominant M-matrices based on the parallel solver of Spielman and Peng. We propose two versions of the solvers, where in the first, full communication in the network is required, while in the second communication is restricted to the R-Hop neighborhood between nodes for some $R \\geq 1$. We rigorously analyze the convergence and convergence rates of our solvers, showing that our methods are capable of outperforming state-of-the-art techniques. Having developed such solvers, we then contribute by proposing an accurate distributed Newton method for network flow optimization. Exploiting the sparsity pattern of the dual Hessian, we propose a Newton method for network flow optimization that is both faster and more accurate than state-of-the-art techniques. Our method utilizes the distributed SDDM solvers for determining the Newton direction up to any arbitrary precision $\\epsilon >0$. We analyze the properties of our algorithm and show superlinear convergence within a neighborhood of the optimal. Finally, in a set of experiments conducted on randomly generated and barbell networks, we demonstrate that our approach is capable of significantly outperforming state-of-the-art techniques.
This paper studies the problem of robust downlink beamforming design in a multiuser Multi-Input Single-Output (MISO) Cognitive Radio Network (CR-Net) in which multiple Primary Users (PUs) coexist with multiple Secondary Users (SUs). Unlike conventional designs in CR-Nets, in this paper it is assumed that the Channel State Information (CSI) for all relevant channels is imperfectly known, and the imperfectness of the CSI is modeled using an Euclidean ball-shaped uncertainty set. Our design objective is to minimize the transmit power of the SU-Transmitter (SU-Tx) while simultaneously targeting a lower bound on the received Signal-to-Interference-plus-Noise-Ratio (SINR) for the SU s, and imposing an upper limit on the Interference-Power (IP) at the PUs. The design parameters at the SU-Tx are the beamforming weights, i.e. the precoder matrix. The proposed methodology is based on a worst case design scenario through which the performance metrics of the design are immune to variations in the channels. We propose three approaches based on convex programming for which efficient numerical solutions exist. Finally, simulation results are provided to validate the robustness of the proposed methods.
This work describes a family of attitude estimators that are based on a generalization of Mahony s nonlinear complementary filter. This generalization reveals the close mathematical relationship between the nonlinear complementary filter and the more traditional multiplicative extended Kalman filter. In fact, the bias-free and constant gain multiplicative continuous-time extended Kalman filters may be interpreted as special cases of the generalized attitude estimator. The correspondence provides a rational means of choosing the gains for the nonlinear complementary filter and a proof of the near global asymptotic stability of special cases of the multiplicative extended Kalman filter.
In this article we investigate the possibilities of accelerating the double smoothing technique when solving unconstrained nondifferentiable convex optimization problems. This approach relies on the regularization in two steps of the Fenchel dual problem associated to the problem to be solved into an optimization problem having a differentiable strongly convex objective function with Lipschitz continuous gradient. The doubly regularized dual problem is then solved via a fast gradient method. The aim of this paper is to show how do the properties of the functions in the objective of the primal problem influence the implementation of the double smoothing approach and its rate of convergence. The theoretical results are applied to linear inverse problems by making use of different regularization functionals.
We describe trlib, a library that implements a variant of Gould s Generalized Lanczos method (Gould et al. in SIAM J. Opt. 9(2), 504-525, 1999) for solving the trust region problem. Our implementation has several distinct features that set it apart from preexisting ones. We implement both conjugate gradient (CG) and Lanczos iterations for assembly of Krylov subspaces. A vector- and matrix-free reverse communication interface allows the use of most general data structures, such as those arising after discretization of function space problems. The hard case of the trust region problem frequently arises in sequential methods for nonlinear optimization. In this implementation, we made an effort to fully address the hard case in an exact way by considering all invariant Krylov subspaces. We investigate the numerical performance of trlib on the full subset of unconstrained problems of the CUTEst benchmark set. In addition to this, interfacing the PDE discretization toolkit FEniCS with trlib using the vector-free reverse communication interface is demonstrated for a family of PDE-constrained control trust region problems adapted from the OPTPDE collection.
Extended-real-valued functions are often used in optimization theory, but in different ways for infimum problems and for supremum problems. We present an approach to extended-real-valued functions that works for all types of problems and into which results of convex analysis can be embedded. Our approach preserves continuity and the Chebyshev norm when extending a functional to the entire space. The basic idea also works for other spaces. Moreover, we illustrate that extended-real-valued functions have to be handled in another way than real-valued functions and characterize semicontinuity, convexity, linearity and related properties of such functions.
Optimal control and differential game theory present powerful tools for analyzing many practical systems. In particular, Hamilton-Jacobi (HJ) reachability can provide guarantees for performance and safety properties of nonlinear control systems with bounded disturbances. In this context, one aims to compute the backward reachable set (BRS) or backward reachable tube (BRT), defined as the set of states from which the system can be driven into a target set at a particular time or within a time interval, respectively. HJ reachability has been successfully applied to many low-dimensional goal-oriented and safety-critical systems. However, the current approach has an exponentially scaling computational complexity, making the application of HJ reachability to high-dimensional systems intractable. In this paper, we propose a general system decomposition technique that allows BRSs and BRTs to be computed efficiently and \"exactly\", meaning without any approximation errors other than those from numerical discretization. With our decomposition technique, computations of BRSs and BRTs for many low-dimensional systems become orders of magnitude faster. In addition, to the best of our knowledge, BRSs and BRTs for many high-dimensional systems are now exactly computable for the first time. In situations where the exact solution cannot be computed, our proposed method can obtain slightly conservative results. We demonstrate our theory by numerically computing BRSs and BRTs for several systems, including the 6D Acrobatic Quadrotor and the 10D Near-Hover Quadrotor.
In this paper, we investigate an interesting and important stopping problem mixed with stochastic controls and a \\textit{nonsmooth} utility over a finite time horizon. The paper aims to develop new methodologies, which are significantly different from those of mixed dynamic optimal control and stopping problems in the existing literature, to figure out a manager s decision. We formulate our model to a free boundary problem of a fully \\textit{nonlinear} equation. By means of a dual transformation, however, we can convert the above problem to a new free boundary problem of a \\textit{linear} equation. Finally, using the corresponding inverse dual transformation, we apply the theoretical results established for the new free boundary problem to obtain the properties of the optimal strategy and the optimal stopping time to achieve a certain level for the original problem over a finite time investment horizon.
We propose an extended full-waveform inversion formulation that includes general convex constraints on the model. Though the full problem is highly nonconvex, the overarching optimization scheme arrives at geologically plausible results by solving a sequence of relaxed and warm-started constrained convex subproblems. The combination of box, total-variation, and successively relaxed asymmetric total-variation constraints allows us to steer free from parasitic local minima while keeping the estimated physical parameters laterally continuous and in a physically realistic range. For accurate starting models, numerical experiments carried out on the challenging 2004 BP velocity benchmark demonstrate that bound and total-variation constraints improve the inversion result significantly by removing inversion artifacts, related to source encoding, and by clearly improved delineation of top, bottom, and flanks of a high-velocity high-contrast salt inclusion. The experiments also show that for poor starting models these two constraints by themselves are insufficient to detect the bottom of high-velocity inclusions such as salt. Inclusion of the one-sided asymmetric total-variation constraint overcomes this issue by discouraging velocity lows to buildup during the early stages of the inversion. To the author s knowledge the presented algorithm is the first to successfully remove the imprint of local minima caused by poor starting models and band-width limited finite aperture data.
Asynchronous parallel optimization received substantial successes and extensive attention recently. One of core theoretical questions is how much speedup (or benefit) the asynchronous parallelization can bring to us. This paper provides a comprehensive and generic analysis to study the speedup property for a broad range of asynchronous parallel stochastic algorithms from the zeroth order to the first order methods. Our result recovers or improves existing analysis on special cases, provides more insights for understanding the asynchronous parallel behaviors, and suggests a novel asynchronous parallel zeroth order method for the first time. Our experiments provide novel applications of the proposed asynchronous parallel zeroth order method on hyper parameter tuning and model blending problems.
In a recent paper, Parikh and Boyd describe a method for solving a convex optimization problem, where each iteration involves evaluating a proximal operator and projection onto a subspace. In this paper we address the critical practical issues of how to select the proximal parameter in each iteration, and how to scale the original problem variables, so as the achieve reliable practical performance. The resulting method has been implemented as an open-source software package called POGS (Proximal Graph Solver), that targets multi-core and GPU-based systems, and has been tested on a wide variety of practical problems. Numerical results show that POGS can solve very large problems (with, say, more than a billion coefficients in the data), to modest accuracy in a few tens of seconds. As just one example, a radiation treatment planning problem with around 100 million coefficients in the data can be solved in a few seconds, as compared to around one hour with an interior-point method.
This paper presents an algorithm to solve the infinite horizon constrained linear quadratic regulator (CLQR) problem using operator splitting methods. First, the CLQR problem is reformulated as a (finite-time) model predictive control (MPC) problem without terminal constraints. Second, the MPC problem is decomposed into smaller subproblems of fixed dimension independent of the horizon length. Third, using the fast alternating minimization algorithm to solve the subproblems, the horizon length is estimated online, by adding or removing subproblems based on a periodic check on the state of the last subproblem to determine whether it belongs to a given control invariant set. We show that the estimated horizon length is bounded and that the control sequence computed using the proposed algorithm is an optimal solution of the CLQR problem. Compared to state-of-the-art algorithms proposed to solve the CLQR problem, our design solves at each iteration only unconstrained least-squares problems and simple gradient calculations. Furthermore, our technique allows the horizon length to decrease online (a useful feature if the initial guess on the horizon is too conservative). Numerical results on a planar system show the potential of our algorithm.
We present an algorithm for the approximation of a finite horizon optimal control problem for advection-diffusion equations. The method is based on the coupling between an adaptive POD representation of the solution and a Dynamic Programming approximation scheme for the corresponding evolutive Hamilton-Jacobi equation. We discuss several features regarding the adaptivity of the method, the role of error estimate indicators to choose a time subdivision of the problem and the computation of the basis functions. Some test problems are presented to illustrate the method.
We consider a model of fishery management, where $n$ agents exploit a single population with strictly concave continuously differentiable growth function of Verhulst type. If the agent actions are coordinated and directed towards the maximization of the discounted cooperative revenue, then the biomass stabilizes at the level, defined by the well known \"golden rule\". We show that for independent myopic harvesting agents such optimal (or $\\varepsilon$-optimal) cooperative behavior can be stimulated by the proportional tax, depending on the resource stock, and equal to the marginal value function of the cooperative problem. To implement this taxation scheme we prove that the mentioned value function is strictly concave and continuously differentiable, although the instantaneous individual revenues may be neither concave nor differentiable.
A hoop robot is the planar version of a spherical robot, and consists of a circular body rolling without slip along a one-dimensional surface, and coupled to one or more of a variety of possible actuating mechanisms. This paper presents a compensator allowing several types of hoop robot configurations to track a desired trajectory in the presence of disturbances. The inner loop of the compensator implements a geometric control term used to give the closed-loop error dynamics the form of an underactuated mechanical system. We refer to this as feedback regularization. Feedback regularization is in some sense analogous to feedback linearization. However, while feedback linearization is inherently tied to a specific choice of coordinates, feedback regularization is purely geometric, and hence concerns invariant structural properties of the system. A geometric PID outer loop guarantees almost-semi-global, locally exponential convergence, where the integral action of the PID is proven to provide robustness to bounded constant disturbances and parameter uncertainties, including constant inclination of the rolling surface. The compensator is completely geometric, so its properties are invariant under all choices of coordinates.
We consider a graph theoretic approach to the performance and robustness of a platoon of vehicles, where each vehicle communicates with its $k$-nearest neighbors. In particular, we quantify the platoon s stability margin, robustness to disturbances (in terms of system $\\mathcal{H}_{\\infty}$ norm), and maximum delay tolerance via graph-theoretic notions such as nodal degrees and (grounded) Laplacian matrix eigenvalues. Our results show that there is a trade-off between robustness to time delay and robustness to disturbances. Both first-order dynamics (reference velocity tracking) and second-order dynamics (controlling inter-vehicular distance) are analyzed in this direction. Theoretical contributions are confirmed via simulation results.
This article approaches deterministic filtering via an application of the min-plus linearity of the corresponding dynamic programming operator. This filter design method yields a set-valued state estimator for discrete-time nonlinear systems (nonlinear dynamics and output functions). The energy bounds in the process and the measurement disturbances are modeled using a sum quadratic constraint. The filtering problem is recast into an optimal control problem in the form of a Hamilton-Jacobi-Bellman (HJB) equation, the solution to which is obtained by employing the min-plus linearity property of the dynamic programming operator. This approach enables the solution to the HJB equation and the design of the filter without recourse to linearization of the system dynamics/ output equation.
This paper develops a fast distributed algorithm, termed \\emph{DEXTRA}, to solve the optimization problem when~$n$ agents reach agreement and collaboratively minimize the sum of their local objective functions over the network, where the communication between the agents is described by a~\\emph{directed} graph. Existing algorithms solve the problem restricted to directed graphs with convergence rates of $O(\\ln k/\\sqrt{k})$ for general convex objective functions and $O(\\ln k/k)$ when the objective functions are strongly-convex, where~$k$ is the number of iterations. We show that, with the appropriate step-size, DEXTRA converges at a linear rate $O(\\tau^{k})$ for $0<\\tau<1$, given that the objective functions are restricted strongly-convex. The implementation of DEXTRA requires each agent to know its local out-degree. Simulation examples further illustrate our findings.
This work presents the design of a reliable decentralized state feedback control for a class of uncertain interconnected polytopic continous systems. A model of failures in actuators is adopted which considers outages or partial degradation in independent actuators. The control is developed using the concept of guaranteed cost control and a new LMI characterization using polytopic Lyapunov functions.
A fruitful idea, when providing subdifferential formulae and dual representations for convex risk measures, is to make use of the conjugate duality theory in convex optimization. In this paper we underline the outstanding role played by the qualification conditions in the context of different problem formulations in this area. We show that not only the meanwhile classical generalized interiority point ones come here to bear, but also a recently introduced one formulated by means of the quasi-relative interior.
It has been shown numerically that the performance of the Levenberg-Marquardt algorithm can be improved by including a second order correction known as the geodesic acceleration. In this paper we give the method a more sound theoretical foundation by deriving the geodesic acceleration correction without using differential geometry and showing that the traditional convergence proofs can be adapted to incorporate geodesic acceleration. Unlike other methods which include second derivative information, the geodesic acceleration does not attempt to improve the Gauss-Newton approximate Hessian, but rather is an extension of the small-residual approximation to cubic order. In deriving geodesic acceleration, we note that the small-residual approximation is complemented by a small-curvature approximation. This latter approximation provides a much broader justification for the Gauss-Newton approximate Hessian and Levenberg-Marquardt algorithm. In particular, it is justifiable even if the best fit residuals are large, is dependent only on the model and not on the data being fit, and is applicable for the entire course of the algorithm and not just the region near the minimum.
We present a powerful and easy-to-implement iterative algorithm for solving large-scale optimization problems that involve $L_1$/total-variation (TV) regularization. The method is based on combining the Alternating Directions Method of Multipliers (ADMM) with a Conjugate Directions technique in a way that allows reusing conjugate search directions constructed by the algorithm across multiple iterations of the ADMM. The new method achieves fast convergence by trading off multiple applications of the modeling operator for the increased memory requirement of storing previous conjugate directions. We illustrate the new method with a series of imaging and inversion applications.
This paper is devoted to the study of generalized differentiation properties of the infimal convolution. This class of functions covers a large spectrum of nonsmooth functions well known in the literature. The subdifferential formulas obtained unify several known results and allow us to characterize the differentiability of the infimal convolution which plays an important role in variational analysis and optimization.
Rough sets were proposed to deal with the vagueness and incompleteness of knowledge in information systems. There are may optimization issues in this field such as attribute reduction. Matroids generalized from matrices are widely used in optimization. Therefore, it is necessary to connect matroids with rough sets. In this paper, we take field into consideration and introduce matrix to study rough sets through vector matroids. First, a matrix representation of an equivalence relation is proposed, and then a matroidal structure of rough sets over a field is presented by the matrix. Second, the properties of the matroidal structure including circuits, bases and so on are studied through two special matrix solution spaces, especially null space. Third, over a binary field, we construct an equivalence relation from matrix null space, and establish an algebra isomorphism from the collection of equivalence relations to the collection of sets, which any member is a family of the minimal non-empty sets that are supports of members of null space of a binary dependence matrix. In a word, matrix provides a new viewpoint to study rough sets.
In this paper, we present MLEANN (Meta-Learning Evolutionary Artificial Neural Network), an automatic computational framework for the adaptive optimization of artificial neural networks wherein the neural network architecture, activation function, connection weights; learning algorithm and its parameters are adapted according to the problem. We explored the performance of MLEANN and conventionally designed artificial neural networks for function approximation problems. To evaluate the comparative performance, we used three different well-known chaotic time series. We also present the state of the art popular neural network learning algorithms and some experimentation results related to convergence speed and generalization performance. We explored the performance of backpropagation algorithm; conjugate gradient algorithm, quasi-Newton algorithm and Levenberg-Marquardt algorithm for the three chaotic time series. Performances of the different learning algorithms were evaluated when the activation functions and architecture were changed. We further present the theoretical background, algorithm, design strategy and further demonstrate how effective and inevitable is the proposed MLEANN framework to design a neural network, which is smaller, faster and with a better generalization performance.
We describe a system for specifying the effects of actions. Unlike those commonly used in AI planning, our system uses an action description language that allows one to specify the effects of actions using domain rules, which are state constraints that can entail new action effects from old ones. Declaratively, an action domain in our language corresponds to a nonmonotonic causal theory in the situation calculus. Procedurally, such an action domain is compiled into a set of logical theories, one for each action in the domain, from which fully instantiated successor state-like axioms and STRIPS-like systems are then generated. We expect the system to be a useful tool for knowledge engineers writing action specifications for classical AI planning systems, GOLOG systems, and other systems where formal specifications of actions are needed.
The matrices and their sub-blocks are introduced into the study of determining various extensions in the sense of Dung s theory of argumentation frameworks. It is showed that each argumentation framework has its matrix representations, and the core semantics defined by Dung can be characterized by specific sub-blocks of the matrix. Furthermore, the elementary permutations of a matrix are employed by which an efficient matrix approach for finding out all extensions under a given semantics is obtained. Different from several established approaches, such as the graph labelling algorithm, Constraint Satisfaction Problem algorithm, the matrix approach not only put the mathematic idea into the investigation for finding out various extensions, but also completely achieve the goal to compute all the extensions needed.
In this paper, we describe a representation for spatial information, called the stochastic map, and associated procedures for building it, reading information from it, and revising it incrementally as new information is obtained. The map contains the estimates of relationships among objects in the map, and their uncertainties, given all the available information. The procedures provide a general solution to the problem of estimating uncertain relative spatial relationships. The estimates are probabilistic in nature, an advance over the previous, very conservative, worst-case approaches to the problem. Finally, the procedures are developed in the context of state-estimation and filtering theory, which provides a solid basis for numerous extensions.
In a recent paper, we have shown that Plan Recognition over STRIPS can be formulated and solved using Classical Planning heuristics and algorithms. In this work, we show that this formulation subsumes the standard formulation of Plan Recognition over libraries through a compilation of libraries into STRIPS theories. The libraries correspond to AND/OR graphs that may be cyclic and where children of AND nodes may be partially ordered. These libraries include Context-Free Grammars as a special case, where the Plan Recognition problem becomes a parsing with missing tokens problem. Plan Recognition over the standard libraries become Planning problems that can be easily solved by any modern planner, while recognition over more complex libraries, including Context-Free Grammars (CFGs), illustrate limitations of current Planning heuristics and suggest improvements that may be relevant in other Planning problems too.
Although many investigators affirm a desire to build reasoning systems that behave consistently with the axiomatic basis defined by probability theory and utility theory, limited resources for engineering and computation can make a complete normative analysis impossible. We attempt to move discussion beyond the debate over the scope of problems that can be handled effectively to cases where it is clear that there are insufficient computational resources to perform an analysis deemed as complete. Under these conditions, we stress the importance of considering the expected costs and benefits of applying alternative approximation procedures and heuristics for computation and knowledge acquisition. We discuss how knowledge about the structure of user utility can be used to control value tradeoffs for tailoring inference to alternative contexts. We address the notion of real-time rationality, focusing on the application of knowledge about the expected timewise-refinement abilities of reasoning strategies to balance the benefits of additional computation with the costs of acting with a partial result. We discuss the benefits of applying decision theory to control the solution of difficult problems given limitations and uncertainty in reasoning resources.
We present probabilistic logic programming under inheritance with overriding. This approach is based on new notions of entailment for reasoning with conditional constraints, which are obtained from the classical notion of logical entailment by adding the principle of inheritance with overriding. This is done by using recent approaches to probabilistic default reasoning with conditional constraints. We analyze the semantic properties of the new entailment relations. We also present algorithms for probabilistic logic programming under inheritance with overriding, and program transformations for an increased efficiency.
We take a utility-based approach to categorization. We construct generalizations about events and actions by considering losses associated with failing to distinguish among detailed distinctions in a decision model. The utility-based methods transform detailed states of the world into more abstract categories comprised of disjunctions of the states. We show how we can cluster distinctions into groups of distinctions at progressively higher levels of abstraction, and describe rules for decision making with the abstractions. The techniques introduce a utility-based perspective on the nature of concepts, and provide a means of simplifying decision models used in automated reasoning systems. We demonstrate the techniques by describing the capabilities and output of TUBA, a program for utility-based abstraction.
Defeasible argumentation frameworks have evolved to become a sound setting to formalize commonsense, qualitative reasoning from incomplete and potentially inconsistent knowledge. Defeasible Logic Programming (DeLP) is a defeasible argumentation formalism based on an extension of logic programming. Although DeLP has been successfully integrated in a number of different real-world applications, DeLP cannot deal with explicit uncertainty, nor with vague knowledge, as defeasibility is directly encoded in the object language. This paper introduces P-DeLP, a new logic programming language that extends original DeLP capabilities for qualitative reasoning by incorporating the treatment of possibilistic uncertainty and fuzzy knowledge. Such features will be formalized on the basis of PGL, a possibilistic logic based on Godel fuzzy logic.
The stable marriage problem has a wide variety of practical applications, ranging from matching resident doctors to hospitals, to matching students to schools, or more generally to any two-sided market. We consider a useful variation of the stable marriage problem, where the men and women express their preferences using a preference list with ties over a subset of the members of the other sex. Matchings are permitted only with people who appear in these preference lists. In this setting, we study the problem of finding a stable matching that marries as many people as possible. Stability is an envy-free notion: no man and woman who are not married to each other would both prefer each other to their partners or to being single. This problem is NP-hard. We tackle this problem using local search, exploiting properties of the problem to reduce the size of the neighborhood and to make local moves efficiently. Experimental results show that this approach is able to solve large problems, quickly returning stable matchings of large and often optimal size.
Lifted inference algorithms exploit symmetries in probabilistic models to speed up inference. They show impressive performance when calculating unconditional probabilities in relational models, but often resort to non-lifted inference when computing conditional probabilities. The reason is that conditioning on evidence breaks many of the model s symmetries, which can preempt standard lifting techniques. Recent theoretical results show, for example, that conditioning on evidence which corresponds to binary relations is #P-hard, suggesting that no lifting is to be expected in the worst case. In this paper, we balance this negative result by identifying the Boolean rank of the evidence as a key parameter for characterizing the complexity of conditioning in lifted inference. In particular, we show that conditioning on binary evidence with bounded Boolean rank is efficient. This opens up the possibility of approximating evidence by a low-rank Boolean matrix factorization, which we investigate both theoretically and empirically.
Regularization is a well studied problem in the context of neural networks. It is usually used to improve the generalization performance when the number of input samples is relatively small or heavily contaminated with noise. The regularization of a parametric model can be achieved in different manners some of which are early stopping (Morgan and Bourlard, 1990), weight decay, output smoothing that are used to avoid overfitting during the training of the considered model. From a Bayesian point of view, many regularization techniques correspond to imposing certain prior distributions on model parameters (Krogh and Hertz, 1991). Using Bishop s approximation (Bishop, 1995) of the objective function when a restricted type of noise is added to the input of a parametric function, we derive the higher order terms of the Taylor expansion and analyze the coefficients of the regularization terms induced by the noisy input. In particular we study the effect of penalizing the Hessian of the mapping function with respect to the input in terms of generalization performance. We also show how we can control independently this coefficient by explicitly penalizing the Jacobian of the mapping function on corrupted inputs.
This paper describes how the \"SP theory of intelligence\", outlined in an Appendix, may throw light on aspects of commonsense reasoning (CSR) and commonsense knowledge (CSK) (together shortened to CSRK), as discussed in another paper by Ernest Davis and Gary Marcus (DM). The SP system has the generality needed for CSRK: Turing equivalence; the generality of information compression as the foundation for the SP system both in the representation of knowledge and in concepts of prediction and probability; the versatility of the SP system in the representation of knowledge and in aspects of intelligence including forms of reasoning; and the potential of the system for the seamless integration of diverse forms of knowledge and diverse aspects of intelligence. Several examples discussed by DM, and how they may be processed in the SP system, are discussed. Also discussed are current successes in CSR (taxonomic reasoning, temporal reasoning, action and change, and qualitative reasoning), how the SP system may promote seamless integration across these areas, and how insights gained from the SP programme of research may yield some potentially useful new ways of approaching these topics. The paper considers how the SP system may help overcome several challenges in the automation of CSR described by DM, and how it meets several of the objectives for research in CSRK that they have described.
Currently, there is renewed interest in the problem, raised by Shafer in 1985, of updating probabilities when observations are incomplete. This is a fundamental problem in general, and of particular interest for Bayesian networks. Recently, Grunwald and Halpern have shown that commonly used updating strategies fail in this case, except under very special assumptions. In this paper we propose a new method for updating probabilities with incomplete observations. Our approach is deliberately conservative: we make no assumptions about the so-called incompleteness mechanism that associates complete with incomplete observations. We model our ignorance about this mechanism by a vacuous lower prevision, a tool from the theory of imprecise probabilities, and we use only coherence arguments to turn prior into posterior probabilities. In general, this new approach to updating produces lower and upper posterior probabilities and expectations, as well as partially determinate decisions. This is a logical consequence of the existing ignorance about the incompleteness mechanism. We apply the new approach to the problem of classification of new evidence in probabilistic expert systems, where it leads to a new, so-called conservative updating rule. In the special case of Bayesian networks constructed using expert knowledge, we provide an exact algorithm for classification based on our updating rule, which has linear-time complexity for a class of networks wider than polytrees. This result is then extended to the more general framework of credal networks, where computations are often much harder than with Bayesian nets. Using an example, we show that our rule appears to provide a solid basis for reliable updating with incomplete observations, when no strong assumptions about the incompleteness mechanism are justified.
We investigate the computational complexity of testing dominance and consistency in CP-nets. Previously, the complexity of dominance has been determined for restricted classes in which the dependency graph of the CP-net is acyclic. However, there are preferences of interest that define cyclic dependency graphs; these are modeled with general CP-nets. In our main results, we show here that both dominance and consistency for general CP-nets are PSPACE-complete. We then consider the concept of strong dominance, dominance equivalence and dominance incomparability, and several notions of optimality, and identify the complexity of the corresponding decision problems. The reductions used in the proofs are from STRIPS planning, and thus reinforce the earlier established connections between both areas.
In this paper, we propose a new type of matroids, namely covering matroids, and investigate the connections with the second type of covering-based rough sets and some existing special matroids. Firstly, as an extension of partitions, coverings are more natural combinatorial objects and can sometimes be more efficient to deal with problems in the real world. Through extending partitions to coverings, we propose a new type of matroids called covering matroids and prove them to be an extension of partition matroids. Secondly, since some researchers have successfully applied partition matroids to classical rough sets, we study the relationships between covering matroids and covering-based rough sets which are an extension of classical rough sets. Thirdly, in matroid theory, there are many special matroids, such as transversal matroids, partition matroids, 2-circuit matroid and partition-circuit matroids. The relationships among several special matroids and covering matroids are studied.
Nearly all spatial reasoning problems involve uncertainty of one sort or another. Uncertainty arises due to the inaccuracies of sensors used in measuring distances and angles. We refer to this as directional uncertainty. Uncertainty also arises in combining spatial information when one location is mistakenly identified with another. We refer to this as recognition uncertainty. Most problems in constructing spatial representations (maps) for the purpose of navigation involve both directional and recognition uncertainty. In this paper, we show that a particular class of spatial reasoning problems involving the construction of representations of large-scale space can be solved efficiently even in the presence of directional and recognition uncertainty. We pay particular attention to the problems that arise due to recognition uncertainty.
In the classic Vehicle Routing Problem (VRP) a fleet of of vehicles has to visit a set of customers while minimising the operations  costs. We study a rich variant of the VRP featuring split deliveries, an heterogeneous fleet, and vehicle-commodity incompatibility constraints. Our goal is twofold: define the cheapest routing and the most adequate fleet. To do so, we split the problem into two interdependent components: a fleet design component and a routing component. First, we define two Mixed Integer Programming (MIP) formulations for each component. Then we discuss several improvements in the form of valid cuts and symmetry breaking constraints. The main contribution of this paper is a comparison of the four resulting models for this Rich VRP. We highlight their strengths and weaknesses with extensive experiments. Finally, we explore a lightweight integration with Constraint Programming (CP). We use a fast CP model which gives good solutions and use the solution to warm-start our models.
In a knowledge discovery process, interpretation and evaluation of the mined results are indispensable in practice. In the case of data clustering, however, it is often difficult to see in what aspect each cluster has been formed. This paper proposes a method for automatic and objective characterization or \"verbalization\" of the clusters obtained by mixture models, in which we collect conjunctions of propositions (attribute-value pairs) that help us interpret or evaluate the clusters. The proposed method provides us with a new, in-depth and consistent tool for cluster interpretation/evaluation, and works for various types of datasets including continuous attributes and missing values. Experimental results with a couple of standard datasets exhibit the utility of the proposed method, and the importance of the feedbacks from the interpretation/evaluation step.
We present an algorithm for building rule lists that is two orders of magnitude faster than previous work. Rule list algorithms are competitors for decision tree algorithms. They are associative classifiers, in that they are built from pre-mined association rules. They have a logical structure that is a sequence of IF-THEN rules, identical to a decision list or one-sided decision tree. Instead of using greedy splitting and pruning like decision tree algorithms, we fully optimize over rule lists, striking a practical balance between accuracy, interpretability, and computational speed. The algorithm presented here uses a mixture of theoretical bounds (tight enough to have practical implications as a screening or bounding procedure), computational reuse, and highly tuned language libraries to achieve computational efficiency. Currently, for many practical problems, this method achieves better accuracy and sparsity than decision trees; further, in many cases, the computational time is practical and often less than that of decision trees.
Recent research on the Symbolic Probabilistic Inference (SPI) algorithm[2] has focused attention on the importance of resolving general queries in Bayesian networks. SPI applies the concept of dependency-directed backward search to probabilistic inference, and is incremental with respect to both queries and observations. In response to this research we have extended the evidence potential algorithm [3] with the same features. We call the extension symbolic evidence potential inference (SEPI). SEPI like SPI can handle generic queries and is incremental with respect to queries and observations. While in SPI, operations are done on a search tree constructed from the nodes of the original network, in SEPI, a clique-tree structure obtained from the evidence potential algorithm [3] is the basic framework for recursive query processing. In this paper, we describe the systematic query and caching procedure of SEPI. SEPI begins with finding a clique tree from a Bayesian network-the standard procedure of the evidence potential algorithm. With the clique tree, various probability distributions are computed and stored in each clique. This is the ?pre-processing? step of SEPI. Once this step is done, the query can then be computed. To process a query, a recursive process similar to the SPI algorithm is used. The queries are directed to the root clique and decomposed into queries for the clique s subtrees until a particular query can be answered at the clique at which it is directed. The algorithm and the computation are simple. The SEPI algorithm will be presented in this paper along with several examples.
We provide a survey on relational models. Relational models describe complete networked {domains by taking into account global dependencies in the data}. Relational models can lead to more accurate predictions if compared to non-relational machine learning approaches. Relational models typically are based on probabilistic graphical models, e.g., Bayesian networks, Markov networks, or latent variable models. Relational models have applications in social networks analysis, the modeling of knowledge graphs, bioinformatics, recommendation systems, natural language processing, medical decision support, and linked data.
Commute Time Distance (CTD) is a random walk based metric on graphs. CTD has found widespread applications in many domains including personalized search, collaborative filtering and making search engines robust against manipulation. Our interest is inspired by the use of CTD as a metric for anomaly detection. It has been shown that CTD can be used to simultaneously identify both global and local anomalies. Here we propose an accurate and efficient approximation for computing the CTD in an incremental fashion in order to facilitate real-time applications. An online anomaly detection algorithm is designed where the CTD of each new arriving data point to any point in the current graph can be estimated in constant time ensuring a real-time response. Moreover, the proposed approach can also be applied in many other applications that utilize commute time distance.
There is increasing interest within the research community in the design and use of recursive probability models. Although there still remains concern about computational complexity costs and the fact that computing exact solutions can be intractable for many nonrecursive models and impossible in the general case for recursive problems, several research groups are actively developing computational techniques for recursive stochastic languages. We have developed an extension to the traditional lambda-calculus as a framework for families of Turing complete stochastic languages. We have also developed a class of exact inference algorithms based on the traditional reductions of the lambda-calculus. We further propose that using the deBruijn notation (a lambda-calculus notation with nameless dummies) supports effective caching in such systems (caching being an essential component of efficient computation). Finally, our extension to the lambda-calculus offers a foundation and general theory for the construction of recursive stochastic modeling languages as well as promise for effective caching and efficient approximation algorithms for inference.
This article describes an application of three well-known statistical methods in the field of game-tree search: using a large number of classified Othello positions, feature weights for evaluation functions with a game-phase-independent meaning are estimated by means of logistic regression, Fisher s linear discriminant, and the quadratic discriminant function for normally distributed features. Thereafter, the playing strengths are compared by means of tournaments between the resulting versions of a world-class Othello program. In this application, logistic regression - which is used here for the first time in the context of game playing - leads to better results than the other approaches.
We propose a general framework for inconsistency-tolerant query answering within existential rule setting. This framework unifies the main semantics proposed by the state of art and introduces new ones based on cardinality and majority principles. It relies on two key notions: modifiers and inference strategies. An inconsistency-tolerant semantics is seen as a composite modifier plus an inference strategy. We compare the obtained semantics from a productivity point of view.
The Next Generation Air Transportation System will introduce new, advanced sensor technologies into the cockpit. With the introduction of such systems, the responsibilities of the pilot are expected to dramatically increase. In the ALARMS (ALerting And Reasoning Management System) project for NASA, we focus on a key challenge of this environment, the quick and efficient handling of aircraft sensor alerts. It is infeasible to alert the pilot on the state of all subsystems at all times. Furthermore, there is uncertainty as to the true hazard state despite the evidence of the alerts, and there is uncertainty as to the effect and duration of actions taken to address these alerts. This paper reports on the first steps in the construction of an application designed to handle Next Generation alerts. In ALARMS, we have identified 60 different aircraft subsystems and 20 different underlying hazards. In this paper, we show how a Bayesian network can be used to derive the state of the underlying hazards, based on the sensor input. Then, we propose a framework whereby an automated system can plan to address these hazards in cooperation with the pilot, using a Time-Dependent Markov Process (TMDP). Different hazards and pilot states will call for different alerting automation plans. We demonstrate this emerging application of Bayesian networks and TMDPs to cockpit automation, for a use case where a small number of hazards are present, and analyze the resulting alerting automation policies.
Bayes-optimal behavior, while well-defined, is often difficult to achieve. Recent advances in the use of Monte-Carlo tree search (MCTS) have shown that it is possible to act near-optimally in Markov Decision Processes (MDPs) with very large or infinite state spaces. Bayes-optimal behavior in an unknown MDP is equivalent to optimal behavior in the known belief-space MDP, although the size of this belief-space MDP grows exponentially with the amount of history retained, and is potentially infinite. We show how an agent can use one particular MCTS algorithm, Forward Search Sparse Sampling (FSSS), in an efficient way to act nearly Bayes-optimally for all but a polynomial number of steps, assuming that FSSS can be used to act efficiently in any possible underlying MDP.
It is hypothesized that creativity arises from the self-mending capacity of an internal model of the world, or worldview. The uniquely honed worldview of a creative individual results in a distinctive style that is recognizable within and across domains. It is further hypothesized that creativity is domaingeneral in the sense that there exist multiple avenues by which the distinctiveness of one s worldview can be expressed. These hypotheses were tested using art students and creative writing students. Art students guessed significantly above chance both which painting was done by which of five famous artists, and which artwork was done by which of their peers. Similarly, creative writing students guessed significantly above chance both which passage was written by which of five famous writers, and which passage was written by which of their peers. These findings support the hypothesis that creative style is recognizable. Moreover, creative writing students guessed significantly above chance which of their peers produced particular works of art, supporting the hypothesis that creative style is recognizable not just within but across domains.
The compatibility of quantitative and qualitative representations of beliefs was studied extensively in probability theory. It is only recently that this important topic is considered in the context of belief functions. In this paper, the compatibility of various quantitative belief measures and qualitative belief structures is investigated. Four classes of belief measures considered are: the probability function, the monotonic belief function, Shafer s belief function, and Smets  generalized belief function. The analysis of their individual compatibility with different belief structures not only provides a sound b<msis for these quantitative measures, but also alleviates some of the difficulties in the acquisition and interpretation of numeric belief numbers. It is shown that the structure of qualitative probability is compatible with monotonic belief functions. Moreover, a belief structure slightly weaker than that of qualitative belief is compatible with Smets  generalized belief functions.
On the one hand, classical terminological knowledge representation excludes the possibility of handling uncertain concept descriptions involving, e.g., \"usually true\" concept properties, generalized quantifiers, or exceptions. On the other hand, purely numerical approaches for handling uncertainty in general are unable to consider terminological knowledge. This paper presents the language ACP which is a probabilistic extension of terminological logics and aims at closing the gap between the two areas of research. We present the formal semantics underlying the language ALUP and introduce the probabilistic formalism that is based on classes of probabilities and is realized by means of probabilistic constraints. Besides inferring implicitly existent probabilistic relationships, the constraints guarantee terminological and probabilistic consistency. Altogether, the new language ALUP applies to domains where both term descriptions and uncertainty have to be handled.
The notion of class is ubiquitous in computer science and is central in many formalisms for the representation of structured knowledge used both in knowledge representation and in databases. In this paper we study the basic issues underlying such representation formalisms and single out both their common characteristics and their distinguishing features. Such investigation leads us to propose a unifying framework in which we are able to capture the fundamental aspects of several representation languages used in different contexts. The proposed formalism is expressed in the style of description logics, which have been introduced in knowledge representation as a means to provide a semantically well-founded basis for the structural aspects of knowledge representation systems. The description logic considered in this paper is a subset of first order logic with nice computational characteristics. It is quite expressive and features a novel combination of constructs that has not been studied before. The distinguishing constructs are number restrictions, which generalize existence and functional dependencies, inverse roles, which allow one to refer to the inverse of a relationship, and possibly cyclic assertions, which are necessary for capturing real world domains. We are able to show that it is precisely such combination of constructs that makes our logic powerful enough to model the essential set of features for defining class structures that are common to frame systems, object-oriented database languages, and semantic data models. As a consequence of the established correspondences, several significant extensions of each of the above formalisms become available. The high expressiveness of the logic we propose and the need for capturing the reasoning in different contexts forces us to distinguish between unrestricted and finite model reasoning. A notable feature of our proposal is that reasoning in both cases is decidable. We argue that, by virtue of the high expressive power and of the associated reasoning capabilities on both unrestricted and finite models, our logic provides a common core for class-based representation formalisms.
This document consists the basis of my Master s thesis work at the University of Reading, UK from 2006-2008. It focuses primarily on two main concepts: context awareness and choice in artificial systems set within a boundary of available epistemology which serves to describe it. It was hypothesised that such definitions yield a strong adaptation mechanism for an artificial entity to manifest as a consequence of the program s runtime. The problem is presented by discussing different points of view and proposing experiments to demonstrate the complexities of such problems in artificial life in terms of machine consciousness while indicating what a suitable answer might be.
We revisit the issue of connections between two leading formalisms in nonmonotonic reasoning: autoepistemic logic and default logic. For each logic we develop a comprehensive semantic framework based on the notion of a belief pair. The set of all belief pairs together with the so called knowledge ordering forms a complete lattice. For each logic, we introduce several semantics by means of fixpoints of operators on the lattice of belief pairs. Our results elucidate an underlying isomorphism of the respective semantic constructions. In particular, we show that the interpretation of defaults as modal formulas proposed by Konolige allows us to represent all semantics for default logic in terms of the corresponding semantics for autoepistemic logic. Thus, our results conclusively establish that default logic can indeed be viewed as a fragment of autoepistemic logic. However, as we also demonstrate, the semantics of Moore and Reiter are given by different operators and occupy different locations in their corresponding families of semantics. This result explains the source of the longstanding difficulty to formally relate these two semantics. In the paper, we also discuss approximating skeptical reasoning with autoepistemic and default logics and establish constructive principles behind such approximations.
In this paper we describe a decision process framework allowing an agent to decide what information it should reveal to its neighbours within a communication graph in order to maximise its utility. We assume that these neighbours can pass information onto others within the graph. The inferences made by agents receiving the messages can have a positive or negative impact on the information providing agent, and our decision process seeks to identify how a message should be modified in order to be most beneficial to the information producer. Our decision process is based on the provider s subjective beliefs about others in the system, and therefore makes extensive use of the notion of trust. Our core contributions are therefore the construction of a model of information propagation; the description of the agent s decision procedure; and an analysis of some of its properties.
This paper describes about information extraction system, which is an extension of the system developed by team Hitachi for \"Disease/Disorder Template filling\" task organized by ShARe/CLEF eHealth Evolution Lab 2014. In this extension module we focus on extraction of numerical attributes and values from discharge summary records and associating correct relation between attributes and values. We solve the problem in two steps. First step is extraction of numerical attributes and values, which is developed as a Named Entity Recognition (NER) model using Stanford NLP libraries. Second step is correctly associating the attributes to values, which is developed as a relation extraction module in Apache cTAKES framework. We integrated Stanford NER model as cTAKES pipeline component and used in relation extraction module. Conditional Random Field (CRF) algorithm is used for NER and Support Vector Machines (SVM) for relation extraction. For attribute value relation extraction, we observe 95% accuracy using NER alone and combined accuracy of 87% with NER and SVM.
This paper introduces the necessary and sufficient conditions that surrogate functions must satisfy to properly define frontiers of non-dominated solutions in multi-objective optimization problems. These new conditions work directly on the objective space, thus being agnostic about how the solutions are evaluated. Therefore, real objectives or user-designed objectives  surrogates are allowed, opening the possibility of linking independent objective surrogates. To illustrate the practical consequences of adopting the proposed conditions, we use Gaussian processes as surrogates endowed with monotonicity soft constraints and with an adjustable degree of flexibility, and compare them to regular Gaussian processes and to a frontier surrogate method in the literature that is the closest to the method proposed in this paper. Results show that the necessary and sufficient conditions proposed here are finely managed by the constrained Gaussian process, guiding to high-quality surrogates capable of suitably synthesizing an approximation to the Pareto frontier in challenging instances of multi-objective optimization, while an existing approach that does not take the theory proposed in consideration defines surrogates which greatly violate the conditions to describe a valid frontier.
The inherent intractability of probabilistic inference has hindered the application of belief networks to large domains. Noisy OR-gates [30] and probabilistic similarity networks [18, 17] escape the complexity of inference by restricting model expressiveness. Recent work in the application of belief-network models to time-series analysis and forecasting [9, 10] has given rise to the additive belief network model (ABNM). We (1) discuss the nature and implications of the approximations made by an additive decomposition of a belief network, (2) show greater efficiency in the induction of additive models when available data are scarce, (3) generalize probabilistic inference algorithms to exploit the additive decomposition of ABNMs, (4) show greater efficiency of inference, and (5) compare results on inference with a simple additive belief network.
We present a new abductive, probabilistic theory of plan recognition. This model differs from previous plan recognition theories in being centered around a model of plan execution: most previous methods have been based on plans as formal objects or on rules describing the recognition process. We show that our new model accounts for phenomena omitted from most previous plan recognition theories: notably the cumulative effect of a sequence of observations of partially-ordered, interleaved plans and the effect of context on plan adoption. The model also supports inferences about the evolution of plan execution in situations where another agent intervenes in plan execution. This facility provides support for using plan recognition to build systems that will intelligently assist a user.
We present multi-agent A* (MAA*), the first complete and optimal heuristic search algorithm for solving decentralized partially-observable Markov decision problems (DEC-POMDPs) with finite horizon. The algorithm is suitable for computing optimal plans for a cooperative group of agents that operate in a stochastic environment such as multirobot coordination, network traffic control, `or distributed resource allocation. Solving such problems efiectively is a major challenge in the area of planning under uncertainty. Our solution is based on a synthesis of classical heuristic search and decentralized control theory. Experimental results show that MAA* has significant advantages. We introduce an anytime variant of MAA* and conclude with a discussion of promising extensions such as an approach to solving infinite horizon problems.
Dung s abstract framework for argumentation enables a study of the interactions between arguments based solely on an ``attack   binary relation on the set of arguments. Various ways to solve conflicts between contradictory pieces of information have been proposed in the context of argumentation, nonmonotonic reasoning or logic programming, and can be captured by appropriate semantics within Dung s framework. A common feature of these semantics is that one can always maximize in some sense the set of acceptable arguments. We propose in this paper to extend Dung s framework in order to allow for the representation of what we call ``restricted   arguments: these arguments should only be used if absolutely necessary, that is, in order to support other arguments that would otherwise be defeated. We modify Dung s preferred semantics accordingly: a set of arguments becomes acceptable only if it contains a minimum of restricted arguments, for a maximum of unrestricted arguments.
In the present paper, the existence and multiplicity problems of extensions are addressed. The focus is on extension of the stable type. The main result of the paper is an elegant characterization of the existence and multiplicity of extensions in terms of the notion of dialectical justification, a close cousin of the notion of admissibility. The characterization is given in the context of the particular logic for dialectical argumentation DEFLOG. The results are of direct relevance for several well-established models of defeasible reasoning (like default logic, logic programming and argumentation frameworks), since elsewhere dialectical argumentation has been shown to have close formal connections with these models.
General problems in analyzing information in a probabilistic database are considered. The practical difficulties (and occasional advantages) of storing uncertain data, of using it conventional forward- or backward-chaining inference engines, and of working with a probabilistic version of resolution are discussed. The background for this paper is the incorporation of uncertain reasoning facilities in MRS, a general-purpose expert system building tool.
Planning under uncertainty is a central problem in the study of automated sequential decision making, and has been addressed by researchers in many different fields, including AI planning, decision analysis, operations research, control theory and economics. While the assumptions and perspectives adopted in these areas often differ in substantial ways, many planning problems of interest to researchers in these fields can be modeled as Markov decision processes (MDPs) and analyzed using the techniques of decision theory. This paper presents an overview and synthesis of MDP-related methods, showing how they provide a unifying framework for modeling many classes of planning problems studied in AI. It also describes structural properties of MDPs that, when exhibited by particular classes of problems, can be exploited in the construction of optimal or approximately optimal policies or plans. Planning problems commonly possess structure in the reward and value functions used to describe performance criteria, in the functions used to describe state transitions and observations, and in the relationships among features used to describe states, actions, rewards, and observations. Specialized representations, and algorithms employing these representations, can achieve computational leverage by exploiting these various forms of structure. Certain AI techniques -- in particular those based on the use of structured, intensional representations -- can be viewed in this way. This paper surveys several types of representations for both classical and decision-theoretic planning problems, and planning algorithms that exploit these representations in a number of different ways to ease the computational burden of constructing policies or plans. It focuses primarily on abstraction, aggregation and decomposition techniques based on AI-style representations.
For many years, at least since McCarthy and Hayes (1969), writers have lamented, and attempted to compensate for, the alleged fact that we often do not have adequate statistical knowledge for governing the uncertainty of belief, for making uncertain inferences, and the like. It is hardly ever spelled out what \"adequate statistical knowledge\" would be, if we had it, and how adequate statistical knowledge could be used to control and regulate epistemic uncertainty.
The fundamental problem underlying all multi-criteria decision analysis (MCDA) problems is that of dominance between any two alternatives: \"Given two alternatives A and B, each described by a set criteria, is A preferred to B with respect to a set of decision maker (DM) preferences over the criteria?\". Depending on the application in which MCDA is performed, the alternatives may represent strategies and policies for business, potential locations for setting up new facilities, designs of buildings, etc. The general objective of MCDA is to enable the DM to order all alternatives in order of the stated preferences, and choose the ones that are best, i.e., optimal with respect to the preferences over the criteria. This article presents and summarizes a recently developed MCDA framework that orders the set of alternatives when the relative importance preferences are incomplete, imprecise, or qualitative in nature.
Deviations from rational decision-making due to limited computational resources have been studied in the field of bounded rationality, originally proposed by Herbert Simon. There have been a number of different approaches to model bounded rationality ranging from optimality principles to heuristics. Here we take an information-theoretic approach to bounded rationality, where information-processing costs are measured by the relative entropy between a posterior decision strategy and a given fixed prior strategy. In the case of multiple environments, it can be shown that there is an optimal prior rendering the bounded rationality problem equivalent to the rate distortion problem for lossy compression in information theory. Accordingly, the optimal prior and posterior strategies can be computed by the well-known Blahut-Arimoto algorithm which requires the computation of partition sums over all possible outcomes and cannot be applied straightforwardly to continuous problems. Here we derive a sampling-based alternative update rule for the adaptation of prior behaviors of decision-makers and we show convergence to the optimal prior predicted by rate distortion theory. Importantly, the update rule avoids typical infeasible operations such as the computation of partition sums. We show in simulations a proof of concept for discrete action and environment domains. This approach is not only interesting as a generic computational method, but might also provide a more realistic model of human decision-making processes occurring on a fast and a slow time scale.
In this paper we suggest an architecture for a software agent which operates a physical device and is capable of making observations and of testing and repairing the device s components. We present simplified definitions of the notions of symptom, candidate diagnosis, and diagnosis which are based on the theory of action language ${\\cal AL}$. The definitions allow one to give a simple account of the agent s behavior in which many of the agent s tasks are reduced to computing stable models of logic programs.
This paper focuses on managing the cost of deliberation before action. In many problems, the overall quality of the solution reflects costs incurred and resources consumed in deliberation as well as the cost and benefit of execution, when both the resource consumption in deliberation phase, and the costs in deliberation and execution are uncertain and may be described by probability distribution functions. A feasible (in terms of resource consumption) strategy that minimizes the expected total cost is termed computationally-optimal. For a situation with several independent, uninterruptible methods to solve the problem, we develop a pseudopolynomial-time algorithm to construct generate-and-test computationally optimal strategy. We show this strategy-construction problem to be NP-complete, and apply Bellman s Optimality Principle to solve it efficiently.
A famous biologically inspired hierarchical model firstly proposed by Riesenhuber and Poggio has been successfully applied to multiple visual recognition tasks. The model is able to achieve a set of position- and scale-tolerant recognition, which is a central problem in pattern recognition. In this paper, based on some other biological experimental results, we introduce the Memory and Association Mechanisms into the above biologically inspired model. The main motivations of the work are (a) to mimic the active memory and association mechanism and add the  top down  adjustment to the above biologically inspired hierarchical model and (b) to build up an algorithm which can save the space and keep a good recognition performance. The new model is also applied to object recognition processes. The primary experimental results show that our method is efficient with much less memory requirement.
Knowledge base exchange is an important problem in the area of data exchange and knowledge representation, where one is interested in exchanging information between a source and a target knowledge base connected through a mapping. In this paper, we study this fundamental problem for knowledge bases and mappings expressed in OWL 2 QL, the profile of OWL 2 based on the description logic DL-Lite_R. More specifically, we consider the problem of computing universal solutions, identified as one of the most desirable translations to be materialized, and the problem of computing UCQ-representations, which optimally capture in a target TBox the information that can be extracted from a source TBox and a mapping by means of unions of conjunctive queries. For the former we provide a novel automata-theoretic technique, and complexity results that range from NP to EXPTIME, while for the latter we show NLOGSPACE-completeness.
Although most scheduling problems are NP-hard, domain specific techniques perform well in practice but are quite expensive to construct. In adaptive problem-solving solving, domain specific knowledge is acquired automatically for a general problem solver with a flexible control architecture. In this approach, a learning system explores a space of possible heuristic methods for one well-suited to the eccentricities of the given domain and problem distribution. In this article, we discuss an application of the approach to scheduling satellite communications. Using problem distributions based on actual mission requirements, our approach identifies strategies that not only decrease the amount of CPU time required to produce schedules, but also increase the percentage of problems that are solvable within computational resource limitations.
The concept of \"task\" is at the core of artificial intelligence (AI): Tasks are used for training and evaluating AI systems, which are built in order to perform and automatize tasks we deem useful. In other fields of engineering theoretical foundations allow thorough evaluation of designs by methodical manipulation of well understood parameters with a known role and importance; this allows an aeronautics engineer, for instance, to systematically assess the effects of wind speed on an airplane s performance and stability. No framework exists in AI that allows this kind of methodical manipulation: Performance results on the few tasks in current use (cf. board games, question-answering) cannot be easily compared, however similar or different. The issue is even more acute with respect to artificial *general* intelligence systems, which must handle unanticipated tasks whose specifics cannot be known beforehand. A *task theory* would enable addressing tasks at the *class* level, bypassing their specifics, providing the appropriate formalization and classification of tasks, environments, and their parameters, resulting in more rigorous ways of measuring, comparing, and evaluating intelligent behavior. Even modest improvements in this direction would surpass the current ad-hoc nature of machine learning and AI evaluation. Here we discuss the main elements of the argument for a task theory and present an outline of what it might look like for physical tasks.
Graphical Markov models determined by acyclic digraphs (ADGs), also called directed acyclic graphs (DAGs), are widely studied in statistics, computer science (as Bayesian networks), operations research (as influence diagrams), and many related fields. Because different ADGs may determine the same Markov equivalence class, it long has been of interest to determine the efficiency gained in model specification and search by working directly with Markov equivalence classes of ADGs rather than with ADGs themselves. A computer program was written to enumerate the equivalence classes of ADG models as specified by Pearl & Verma s equivalence criterion. The program counted equivalence classes for models up to and including 10 vertices. The ratio of number of classes to ADGs appears to approach an asymptote of about 0.267. Classes were analyzed according to number of edges and class size. By edges, the distribution of number of classes approaches a Gaussian shape. By class size, classes of size 1 are most common, with the proportions for larger sizes initially decreasing but then following a more irregular pattern. The maximum number of classes generated by any undirected graph was found to increase approximately factorially. The program also includes a new variation of orderly algorithm for generating undirected graphs.
It is important to find optimal solutions for structural errors in rule-based expert systems .Solutions to discovering such errors by using model checking techniques have already been proposed, but these solutions have problems such as state space explosion. In this paper, to overcome these problems, we model the rule-based systems as finite state transition systems and express confliction and unreachability as Computation Tree Logic (CTL) logic formula and then use the technique of model checking to detect confliction and unreachability in rule-based systems with the model checker UPPAAL.
Open answer set programming (OASP) is an extension of answer set programming where one may ground a program with an arbitrary superset of the program s constants. We define a fixed point logic (FPL) extension of Clark s completion such that open answer sets correspond to models of FPL formulas and identify a syntactic subclass of programs, called (loosely) guarded programs. Whereas reasoning with general programs in OASP is undecidable, the FPL translation of (loosely) guarded programs falls in the decidable (loosely) guarded fixed point logic (mu(L)GF). Moreover, we reduce normal closed ASP to loosely guarded OASP, enabling for the first time, a characterization of an answer set semantics by muLGF formulas. We further extend the open answer set semantics for programs with generalized literals. Such generalized programs (gPs) have interesting properties, e.g., the ability to express infinity axioms. We restrict the syntax of gPs such that both rules and generalized literals are guarded. Via a translation to guarded fixed point logic, we deduce 2-exptime-completeness of satisfiability checking in such guarded gPs (GgPs). Bound GgPs are restricted GgPs with exptime-complete satisfiability checking, but still sufficiently expressive to optimally simulate computation tree logic (CTL). We translate Datalog lite programs to GgPs, establishing equivalence of GgPs under an open answer set semantics, alternation-free muGF, and Datalog lite.
BoolVar/PB is an open source java library dedicated to the translation of pseudo-Boolean constraints into CNF formulae. Input constraints can be categorized with tags. Several encoding schemes are implemented in a way that each input constraint can be translated using one or several encoders, according to the related tags. The library can be easily extended by adding new encoders and / or new output formats.
NP-SPEC is a language for specifying problems in NP in a declarative way. Despite the fact that the semantics of the language was given by referring to Datalog with circumscription, which is very close to ASP, so far the only existing implementations are by means of ECLiPSe Prolog and via Boolean satisfiability solvers. In this paper, we present translations from NP-SPEC into various forms of ASP and analyze them. We also argue that it might be useful to incorporate certain language constructs of NP-SPEC into mainstream ASP.
While influence diagrams have many advantages as a representation framework for Bayesian decision problems, they have a serious drawback in handling asymmetric decision problems. To be represented in an influence diagram, an asymmetric decision problem must be symmetrized. A considerable amount of unnecessary computation may be involved when a symmetrized influence diagram is evaluated by conventional algorithms. In this paper we present an approach for avoiding such unnecessary computation in influence diagram evaluation.
We exploit qualitative probabilistic relationships among variables for computing bounds of conditional probability distributions of interest in Bayesian networks. Using the signs of qualitative relationships, we can implement abstraction operations that are guaranteed to bound the distributions of interest in the desired direction. By evaluating incrementally improved approximate networks, our algorithm obtains monotonically tightening bounds that converge to exact distributions. For supermodular utility functions, the tightening bounds monotonically reduce the set of admissible decision alternatives as well.
The identification of performance-optimizing parameter settings is an important part of the development and application of algorithms. We describe an automatic framework for this algorithm configuration problem. More formally, we provide methods for optimizing a target algorithm s performance on a given class of problem instances by varying a set of ordinal and/or categorical parameters. We review a family of local-search-based algorithm configuration procedures and present novel techniques for accelerating them by adaptively limiting the time spent for evaluating individual configurations. We describe the results of a comprehensive experimental evaluation of our methods, based on the configuration of prominent complete and incomplete algorithms for SAT. We also present what is, to our knowledge, the first published work on automatically configuring the CPLEX mixed integer programming solver. All the algorithms we considered had default parameter settings that were manually identified with considerable effort. Nevertheless, using our automated algorithm configuration procedures, we achieved substantial and consistent performance improvements.
This essay looks at decision-making with interval-valued probability measures. Existing decision methods have either supplemented expected utility methods with additional criteria of optimality, or have attempted to supplement the interval-valued measures. We advocate a new approach, which makes the following questions moot: 1. which additional criteria to use, and 2. how wide intervals should be. In order to implement the approach, we need more epistemological information. Such information can be generated by a rule of acceptance with a parameter that allows various attitudes toward error, or can simply be declared. In sketch, the argument is: 1. probability intervals are useful and natural in All. systems; 2. wide intervals avoid error, but are useless in some risk sensitive decision-making; 3. one may obtain narrower intervals if one is less cautious; 4. if bodies of knowledge can be ordered by their caution, one should perform the decision analysis with the acceptable body of knowledge that is the most cautious, of those that are useful. The resulting behavior differs from that of a behavioral probabilist (a Bayesian) because in the proposal, 5. intervals based on successive bodies of knowledge are not always nested; 6. if the agent uses a probability for a particular decision, she need not commit to that probability for credence or future decision; and 7. there may be no acceptable body of knowledge that is useful; hence, sometimes no decision is mandated.
Higher-level cognition includes logical reasoning and the ability of question answering with common sense. The RatioLog project addresses the problem of rational reasoning in deep question answering by methods from automated deduction and cognitive computing. In a first phase, we combine techniques from information retrieval and machine learning to find appropriate answer candidates from the huge amount of text in the German version of the free encyclopedia \"Wikipedia\". In a second phase, an automated theorem prover tries to verify the answer candidates on the basis of their logical representations. In a third phase - because the knowledge may be incomplete and inconsistent -, we consider extensions of logical reasoning to improve the results. In this context, we work toward the application of techniques from human reasoning: We employ defeasible reasoning to compare the answers w.r.t. specificity, deontic logic, normative reasoning, and model construction. Moreover, we use integrated case-based reasoning and machine learning techniques on the basis of the semantic structure of the questions and answer candidates to learn giving the right answers.
Analysis of sequential event data has been recognized as one of the essential tools in data modeling and analysis field. In this paper, after the examination of its technical requirements and issues to model complex but practical situation, we propose a new sequential data model, dubbed Duration and Interval Hidden Markov Model (DI-HMM), that efficiently represents \"state duration\" and \"state interval\" of data events. This has significant implications to play an important role in representing practical time-series sequential data. This eventually provides an efficient and flexible sequential data retrieval. Numerical experiments on synthetic and real data demonstrate the efficiency and accuracy of the proposed DI-HMM.
Most methods of exact probability propagation in Bayesian networks do not carry out the inference directly over the network, but over a secondary structure known as a junction tree or a join tree (JT). The process of obtaining a JT is usually termed {sl compilation}. As compilation is usually viewed as a whole process; each time the network is modified, a new compilation process has to be carried out. The possibility of reusing an already existing JT, in order to obtain the new one regarding only the modifications in the network has received only little attention in the literature. In this paper we present a method for incremental compilation of a Bayesian network, following the classical scheme in which triangulation plays the key role. In order to perform incremental compilation we propose to recompile only those parts of the JT which can have been affected by the networks modifications. To do so, we exploit the technique OF maximal prime subgraph decomposition in determining the minimal subgraph(s) that have to be recompiled, and thereby the minimal subtree(s) of the JT that should be replaced by new subtree(s).We focus on structural modifications : addition and deletion of links and variables.
We study the problem of learning the best Bayesian network structure with respect to a decomposable score such as BDe, BIC or AIC. This problem is known to be NP-hard, which means that solving it becomes quickly infeasible as the number of variables increases. Nevertheless, in this paper we show that it is possible to learn the best Bayesian network structure with over 30 variables, which covers many practically interesting cases. Our algorithm is less complicated and more efficient than the techniques presented earlier. It can be easily parallelized, and offers a possibility for efficient exploration of the best networks consistent with different variable orderings. In the experimental part of the paper we compare the performance of the algorithm to the previous state-of-the-art algorithm. Free source-code and an online-demo can be found at this http URL
In this paper, we present a method for recognising an agent s behaviour in dynamic, noisy, uncertain domains, and across multiple levels of abstraction. We term this problem on-line plan recognition under uncertainty and view it generally as probabilistic inference on the stochastic process representing the execution of the agent s plan. Our contributions in this paper are twofold. In terms of probabilistic inference, we introduce the Abstract Hidden Markov Model (AHMM), a novel type of stochastic processes, provide its dynamic Bayesian network (DBN) structure and analyse the properties of this network. We then describe an application of the Rao-Blackwellised Particle Filter to the AHMM which allows us to construct an efficient, hybrid inference method for this model. In terms of plan recognition, we propose a novel plan recognition framework based on the AHMM as the plan execution model. The Rao-Blackwellised hybrid inference for AHMM can take advantage of the independence properties inherent in a model of plan execution, leading to an algorithm for online probabilistic plan recognition that scales well with the number of levels in the plan hierarchy. This illustrates that while stochastic models for plan execution can be complex, they exhibit special structures which, if exploited, can lead to efficient plan recognition algorithms. We demonstrate the usefulness of the AHMM framework via a behaviour recognition system in a complex spatial environment using distributed video surveillance data.
In this paper, we present a decision support system based on belief functions and the pignistic transformation. The system is an integration of an evidential system for belief function propagation and a valuation-based system for Bayesian decision analysis. The two subsystems are connected through the pignistic transformation. The system takes as inputs the user s \"gut feelings\" about a situation and suggests what, if any, are to be tested and in what order, and it does so with a user friendly interface.
This paper reports the outcome of the third in the series of biennial international planning competitions, held in association with the International Conference on AI Planning and Scheduling (AIPS) in 2002. In addition to describing the domains, the planners and the objectives of the competition, the paper includes analysis of the results. The results are analysed from several perspectives, in order to address the questions of comparative performance between planners, comparative difficulty of domains, the degree of agreement between planners about the relative difficulty of individual problem instances and the question of how well planners scale relative to one another over increasingly difficult problems. The paper addresses these questions through statistical analysis of the raw results of the competition, in order to determine which results can be considered to be adequately supported by the data. The paper concludes with a discussion of some challenges for the future of the competition series.
We develop a two-defender (Alice and Bob) invasion game using the method of projective simulation. The agent, say Alice, encounters attack  symbols coming from the right attacker where she can learn to prevent. However, some of these signs are invisible for her. Instead, she perceives some other signs that are related to Bob s task. We elaborate an example in which an agent perceives an equal portion of percepts from both attackers. Alice can choose to concentrate on her job, though she loses some attacks. Alternatively, she can have some collaboration with Bob to get and give help. It is concluded that the maximum blocking efficiency in concentration is just the minimum blocking efficiency in collaboration. Furthermore, Alice has a choice to select two different forgetting factors for her task or helping. Therefore, she can choose between herself and the other. As the main result, we conclude that if Alice selects to be selfish, she probably earns more blocking in her task and also, higher efficiency in collective blocking, regardless of Bob s selection. In addition, it turns out that when the selection of both partners is selfishness, it is the highest justice on sharing individual efficiency and it is a maximum in collective blocking efficiency too. Finally, we propose some other questions that can be tracked regarding the present study.
This paper reports experiments with the causal independence inference algorithm proposed by Zhang and Poole (1994b) on the CPSC network created by Pradhan et al. (1994). It is found that the algorithm is able to answer 420 of the 422 possible zero-observation queries, 94 of 100 randomly generated five-observation queries, 87 of 100 randomly generated ten-observation queries, and 69 of 100 randomly generated twenty-observation queries.
In practical situations, interval-valued fuzzy sets are frequently encountered. In this paper, firstly, we present shadowed sets for interpreting and understanding interval fuzzy sets. We also provide an analytic solution to computing the pair of thresholds by searching for a balance of uncertainty in the framework of shadowed sets. Secondly, we construct errors-based three-way approximations of interval-valued fuzzy sets. We also provide an alternative decision-theoretic formulation for calculating the pair of thresholds by transforming interval-valued loss functions into single-valued loss functions, in which the required thresholds are computed by minimizing decision costs. Thirdly, we compute errors-based three-way approximations of interval-valued fuzzy sets by using interval-valued loss functions. Finally, we employ several examples to illustrate that how to take an action for an object with interval-valued membership grade by using interval-valued loss functions.
The holistic approach to sustainable urban planning implies using different models in an integrated way that is capable of simulating the urban system. As the interconnection of such models is not a trivial task, one of the key elements that may be applied is the description of the urban geometric properties in an \"interoperable\" way. Focusing on air quality as one of the most pronounced urban problems, the geometric aspects of a city may be described by objects such as those defined in CityGML, so that an appropriate air quality model can be applied for estimating the quality of the urban air on the basis of atmospheric flow and chemistry equations. In this paper we first present theoretical background and motivations for the interconnection of 3D city models and other models related to sustainable development and urban planning. Then we present a practical experiment based on the interconnection of CityGML with an air quality model. Our approach is based on the creation of an ontology of air quality models and on the extension of an ontology of urban planning process (OUPP) that acts as an ontology mediator.
This paper introduces the SEQ BIN meta-constraint with a polytime algorithm achieving general- ized arc-consistency according to some properties. SEQ BIN can be used for encoding counting con- straints such as CHANGE, SMOOTH or INCREAS- ING NVALUE. For some of these constraints and some of their variants GAC can be enforced with a time and space complexity linear in the sum of domain sizes, which improves or equals the best known results of the literature.
Human can be distinguished by different limb movements and unique ground reaction force. Cumulative foot pressure image is a 2-D cumulative ground reaction force during one gait cycle. Although it contains pressure spatial distribution information and pressure temporal distribution information, it suffers from several problems including different shoes and noise, when putting it into practice as a new biometric for pedestrian identification. In this paper, we propose a hierarchical translation-invariant representation for cumulative foot pressure images, inspired by the success of Convolutional deep belief network for digital classification. Key contribution in our approach is discriminative hierarchical sparse coding scheme which helps to learn useful discriminative high-level visual features. Based on the feature representation of cumulative foot pressure images, we develop a pedestrian recognition system which is invariant to three different shoes and slight local shape change. Experiments are conducted on a proposed open dataset that contains more than 2800 cumulative foot pressure images from 118 subjects. Evaluations suggest the effectiveness of the proposed method and the potential of cumulative foot pressure images as a biometric.
The paper presents a new sampling methodology for Bayesian networks that samples only a subset of variables and applies exact inference to the rest. Cutset sampling is a network structure-exploiting application of the Rao-Blackwellisation principle to sampling in Bayesian networks. It improves convergence by exploiting memory-based inference algorithms. It can also be viewed as an anytime approximation of the exact cutset-conditioning algorithm developed by Pearl. Cutset sampling can be implemented efficiently when the sampled variables constitute a loop-cutset of the Bayesian network and, more generally, when the induced width of the networks graph conditioned on the observed sampled variables is bounded by a constant w. We demonstrate empirically the benefit of this scheme on a range of benchmarks.
Typical approaches to plan recognition start from a representation of an agent s possible plans, and reason evidentially from observations of the agent s actions to assess the plausibility of the various candidates. A more expansive view of the task (consistent with some prior work) accounts for the context in which the plan was generated, the mental state and planning process of the agent, and consequences of the agent s actions in the world. We present a general Bayesian framework encompassing this view, and focus on how context can be exploited in plan recognition. We demonstrate the approach on a problem in traffic monitoring, where the objective is to induce the plan of the driver from observation of vehicle movements. Starting from a model of how the driver generates plans, we show how the highway context can appropriately influence the recognizer s interpretation of observed driver behavior.
We present an online method for estimating the cost of solving SAT problems. Modern SAT solvers present several challenges to estimate search cost including non-chronological backtracking, learning and restarts. Our method uses a linear model trained on data gathered at the start of search. We show the effectiveness of this method using random and structured problems. We demonstrate that predictions made in early restarts can be used to improve later predictions. We also show that we can use such cost estimations to select a solver from a portfolio.
We present new algorithms for inference in credal networks --- directed acyclic graphs associated with sets of probabilities. Credal networks are here interpreted as encoding strong independence relations among variables. We first present a theory of credal networks based on separately specified sets of probabilities. We also show that inference with polytrees is NP-hard in this setting. We then introduce new techniques that reduce the computational effort demanded by inference, particularly in polytrees, by exploring separability of credal sets.
The article presents a study on the biobjective inventory routing problem. Contrary to most previous research, the problem is treated as a true multi-objective optimization problem, with the goal of identifying Pareto-optimal solutions. Due to the hardness of the problem at hand, a reference point based optimization approach is presented and implemented into an optimization and decision support system, which allows for the computation of a true subset of the optimal outcomes. Experimental investigation involving local search metaheuristics are conducted on benchmark data, and numerical results are reported and analyzed.
We study a subclass of POMDPs, called Deterministic POMDPs, that is characterized by deterministic actions and observations. These models do not provide the same generality of POMDPs yet they capture a number of interesting and challenging problems, and permit more efficient algorithms. Indeed, some of the recent work in planning is built around such assumptions mainly by the quest of amenable models more expressive than the classical deterministic models. We provide results about the fundamental properties of Deterministic POMDPs, their relation with AND/OR search problems and algorithms, and their computational complexity.
Constraint programming is a family of techniques for solving combinatorial problems, where the problem is modelled as a set of decision variables (typically with finite domains) and a set of constraints that express relations among the decision variables. One key concept in constraint programming is propagation: reasoning on a constraint or set of constraints to derive new facts, typically to remove values from the domains of decision variables. Specialised propagation algorithms (propagators) exist for many classes of constraints. The concept of support is pervasive in the design of propagators. Traditionally, when a domain value ceases to have support, it may be removed because it takes part in no solutions. Arc-consistency algorithms such as AC2001 make use of support in the form of a single domain value. GAC algorithms such as GAC-Schema use a tuple of values to support each literal. We generalize these notions of support in two ways. First, we allow a set of tuples to act as support. Second, the supported object is generalized from a set of literals (GAC-Schema) to an entire constraint or any part of it. We design a methodology for developing correct propagators using generalized support. A constraint is expressed as a family of support properties, which may be proven correct against the formal semantics of the constraint. Using Curry-Howard isomorphism to interpret constructive proofs as programs, we show how to derive correct propagators from the constructive proofs of the support properties. The framework is carefully designed to allow efficient algorithms to be produced. Derived algorithms may make use of dynamic literal triggers or watched literals for efficiency. Finally, two case studies of deriving efficient algorithms are given.
Precision achieved by stochastic sampling algorithms for Bayesian networks typically deteriorates in face of extremely unlikely evidence. To address this problem, we propose the Evidence Pre-propagation Importance Sampling algorithm (EPIS-BN), an importance sampling algorithm that computes an approximate importance function by the heuristic methods: loopy belief Propagation and e-cutoff. We tested the performance of e-cutoff on three large real Bayesian networks: ANDES, CPCS, and PATHFINDER. We observed that on each of these networks the EPIS-BN algorithm gives us a considerable improvement over the current state of the art algorithm, the AIS-BN algorithm. In addition, it avoids the costly learning stage of the AIS-BN algorithm.
In this paper we compare three different architectures for the evaluation of influence diagrams: HUGIN, Shafer-Shenoy, and Lazy Evaluation architecture. The computational complexity of the architectures are compared on the LImited Memory Influence Diagram (LIMID): a diagram where only the requiste information for the computation of the optimal policies are depicted. Because the requsite information is explicitly represented in the LIMID the evaluation can take advantage of it, and significant savings in computational can be obtained. In this paper we show how the obtained savings is considerably increased when the computations performed on the LIMID is according to the Lazy Evaluation scheme.
In their nature configuration problems are combinatorial (optimization) problems. In order to find a configuration a solver has to instantiate a number of components of a some type and each of these components can be used in a relation defined for a type. Therefore, many solutions of a configuration problem have symmetric ones which can be obtained by replacing some component of a solution by another one of the same type. These symmetric solutions decrease performance of optimization algorithms because of two reasons: a) they satisfy all requirements and cannot be pruned out from the search space; and b) existence of symmetric optimal solutions does not allow to prove the optimum in a feasible time.
The goal of this project is to predict the opponent s configuration in a RoboCup SSL environment. For simplicity, a Markov model assumption is made such that the predicted formation of the opponent team only depends on its current formation. The field is divided into a grid and a robot state per player is created with information about its position and its velocity. To gather a more general sense of what the opposing team is doing, the state also incorporates the team s average position (centroid). All possible state transitions are stored in a hash table that requires minimum storage space. The table is populated with transition probabilities that are learned by reading vision packages and counting the state transitions regardless of the specific robot player. Therefore, the computation during the game is reduced to interpreting a given vision package to assign each player to a state, and looking for the most likely state it will transition to. The confidence of the predicted team s formation is the product of each individual player s probability. The project is noteworthy in that it minimizes the time and space complexity requirements for opponent s moves prediction.
Recent work on loglinear models in probabilistic constraint logic programming is applied to first-order probabilistic reasoning. Probabilities are defined directly on the proofs of atomic formulae, and by marginalisation on the atomic formulae themselves. We use Stochastic Logic Programs (SLPs) composed of labelled and unlabelled definite clauses to define the proof probabilities. We have a conservative extension of first-order reasoning, so that, for example, there is a one-one mapping between logical and random variables. We show how, in this framework, Inductive Logic Programming (ILP) can be used to induce the features of a loglinear model from data. We also compare the presented framework with other approaches to first-order probabilistic reasoning.
When agents devise plans for execution in the real world, they face two important forms of uncertainty: they can never have complete knowledge about the state of the world, and they do not have complete control, as the effects of their actions are uncertain. While most classical planning methods avoid explicit uncertainty reasoning, we believe that uncertainty should be explicitly represented and reasoned about. We develop a probabilistic representation for states and actions, based on belief networks. We define conditional belief nets (CBNs) to capture the probabilistic dependency of the effects of an action upon the state of the world. We also use a CBN to represent the intrinsic relationships among entities in the environment, which persist from state to state. We present a simple projection algorithm to construct the belief network of the state succeeding an action, using the environment CBN model to infer indirect effects. We discuss how the qualitative aspects of belief networks and CBNs make them appropriate for the various stages of the problem solving process, from model construction to the design of planning algorithms.
In Artificial Intelligence with Coalition Structure Generation (CSG) one refers to those cooperative complex problems that require to find an optimal partition, maximising a social welfare, of a set of entities involved in a system into exhaustive and disjoint coalitions. The solution of the CSG problem finds applications in many fields such as Machine Learning (covering machines, clustering), Data Mining (decision tree, discretization), Graph Theory, Natural Language Processing (aggregation), Semantic Web (service composition), and Bioinformatics. The problem of finding the optimal coalition structure is NP-complete. In this paper we present a greedy adaptive search procedure (GRASP) with path-relinking to efficiently search the space of coalition structures. Experiments and comparisons to other algorithms prove the validity of the proposed method in solving this hard combinatorial problem.
One important factor determining the computational complexity of evaluating a probabilistic network is the cardinality of the state spaces of the nodes. By varying the granularity of the state spaces, one can trade off accuracy in the result for computational efficiency. We present an anytime procedure for approximate evaluation of probabilistic networks based on this idea. On application to some simple networks, the procedure exhibits a smooth improvement in approximation quality as computation time increases. This suggests that state-space abstraction is one more useful control parameter for designing real-time probabilistic reasoners.
This paper discloses the potential of OWL (Web Ontology Language) ontologies for generation of rules. The main purpose of this paper is to identify new types of rules, which may be generated from OWL ontologies. Rules, generated from OWL ontologies, are necessary for the functioning of the Semantic Web Expert System. It is expected that the Semantic Web Expert System (SWES) will be able to process ontologies from the Web with the purpose to supplement or even to develop its knowledge base.
This paper investigates a purely qualitative version of Savage s theory for decision making under uncertainty. Until now, most representation theorems for preference over acts rely on a numerical representation of utility and uncertainty where utility and uncertainty are commensurate. Disrupting the tradition, we relax this assumption and introduce a purely ordinal axiom requiring that the Decision Maker (DM) preference between two acts only depends on the relative position of their consequences for each state. Within this qualitative framework, we determine the only possible form of the decision rule and investigate some instances compatible with the transitivity of the strict preference. Finally we propose a mild relaxation of our ordinality axiom, leaving room for a new family of qualitative decision rules compatible with transitivity.
The four intensive problems to the software rose by the software industry .i.e., User System Communication / Human Machine Interface, Meta Data extraction, Information processing & management and Data representation are discussed in this research paper. To contribute in the field we have proposed and described an intelligent semantic oriented agent based search engine including the concepts of intelligent graphical user interface, natural language based information processing, data management and data reconstruction for the final user end information representation.
There is available an ever-increasing variety of procedures for managing uncertainty. These methods are discussed in the literature of artificial intelligence, as well as in the literature of philosophy of science. Heretofore these methods have been evaluated by intuition, discussion, and the general philosophical method of argument and counterexample. Almost any method of uncertainty management will have the property that in the long run it will deliver numbers approaching the relative frequency of the kinds of events at issue. To find a measure that will provide a meaningful evaluation of these treatments of uncertainty, we must look, not at the long run, but at the short or intermediate run. Our project attempts to develop such a measure in terms of short or intermediate length performance. We represent the effects of practical choices by the outcomes of bets offered to agents characterized by two uncertainty management approaches: the subjective Bayesian approach and the Classical confidence interval approach. Experimental evaluation suggests that the confidence interval approach can outperform the subjective approach in the relatively short run.
Multi-context systems provide a powerful framework for modelling information-aggregation systems featuring heterogeneous reasoning components. Their execution can, however, incur non-negligible cost. Here, we focus on cost-complexity of such systems. To that end, we introduce cost-aware multi-context systems, an extension of non-monotonic multi-context systems framework taking into account costs incurred by execution of semantic operators of the individual contexts. We formulate the notion of cost-complexity for consistency and reasoning problems in MCSs. Subsequently, we provide a series of results related to gradually more and more constrained classes of MCSs and finally introduce an incremental cost-reducing algorithm solving the reasoning problem for definite MCSs.
This volume contains the papers presented at the sixth workshop on Answer Set Programming and Other Computing Paradigms (ASPOCP 2013) held on August 25th, 2013 in Istanbul, co-located with the 29th International Conference on Logic Programming (ICLP 2013). It thus continues a series of previous events co-located with ICLP, aiming at facilitating the discussion about crossing the boundaries of current ASP techniques in theory, solving, and applications, in combination with or inspired by other computing paradigms.
This paper explores the role of Directed Acyclic Graphs (DAGs) as a representation of conditional independence relationships. We show that DAGs offer polynomially sound and complete inference mechanisms for inferring conditional independence relationships from a given causal set of such relationships. As a consequence, d-separation, a graphical criterion for identifying independencies in a DAG, is shown to uncover more valid independencies then any other criterion. In addition, we employ the Armstrong property of conditional independence to show that the dependence relationships displayed by a DAG are inherently consistent, i.e. for every DAG D there exists some probability distribution P that embodies all the conditional independencies displayed in D and none other.
In this paper, a new structure of cooperative learning automata so-called extended learning automata (eDLA) is introduced. Based on the proposed structure, a new iterative randomized heuristic algorithm for finding optimal sub-graph in a stochastic edge-weighted graph through sampling is proposed. It has been shown that the proposed algorithm based on new networked-structure can be to solve the optimization problems on stochastic graph through less number of sampling in compare to standard sampling. Stochastic graphs are graphs in which the edges have an unknown distribution probability weights. Proposed algorithm uses an eDLA to find a policy that leads to an induced sub-graph that satisfies some restrictions such as minimum or maximum weight (length). At each stage of the proposed algorithm, eDLA determines which edges to be sampled. This eDLA-based proposed sampling method may result in decreasing unnecessary samples and hence decreasing the time that algorithm requires for finding the optimal sub-graph. It has been shown that proposed method converge to optimal solution, furthermore the probability of this convergence can be made arbitrarily close to 1 by using a sufficiently small learning rate. A new variance-aware threshold value was proposed that can be improving significantly convergence rate of the proposed eDLA-based algorithm. It has been shown that the proposed algorithm is competitive in terms of the quality of the solution
Binary Decision Diagram (BDD) based set bounds propagation is a powerful approach to solving set-constraint satisfaction problems. However, prior BDD based techniques in- cur the significant overhead of constructing and manipulating graphs during search. We present a set-constraint solver which combines BDD-based set-bounds propagators with the learning abilities of a modern SAT solver. Together with a number of improvements beyond the basic algorithm, this solver is highly competitive with existing propagation based set constraint solvers.
It has been found that noise plays a key role to improve signal transmission in a one-way chain of bistable systems [Zhang et al., Phys. Rev. E 58, 2952 (1998)]. We here show that the signal transmission can be sharply improved without the aid of noise, if the one-way chain with a single source node is changed with two source nodes becoming a Y-shaped one-way chain. We further reveal that the enhanced signal transmission in the Y-shaped one-way chain is regulated by coupling strength, and that it is robust to noise perturbation and input signal irregularity. We finally analyze the mechanism of the enhanced signal transmission by the Y-shaped structure.
The empirical study of network dynamics has been limited by the lack of longitudinal data. Here we introduce a quantitative indicator of link persistence to explore the correlations between the structure of a mobile phone network and the persistence of its links. We show that persistent links tend to be reciprocal and are more common for people with low degree and high clustering. We study the redundancy of the associations between persistence, degree, clustering and reciprocity and show that reciprocity is the strongest predictor of tie persistence. The method presented can be easily adapted to characterize the dynamics of other networks and can be used to identify the links that are most likely to survive in the future.
The ideal Renaissance city is designed as a star-shaped fortress, where the streets and squares are organized to speed the movement of people and soldiers. Symmetry and accessibility represent the key features for the organization of the urban space. The resulting city is hierarchized and does not always guarantee an optimal degree of connectivity. Taking the baton from the work done by space syntax in the definition of properties of spatial graph representation, we introduce a method to compute urban graphs from the Euclidean representation, the corresponding line graph and the contraction of nodes with the same urban function. We analyze the urban graphs of five historic cities: Vitry le Fran\\c{c}ois, Avola, Neuf Brisach, Grammichele and Palmanova and compare the analysis restults with the corresponding results from space syntax. Analysis of the spectral gap and the relative asymmetry distribution show a similar structure for these cities. The irregular or reticular housing structure seems to ensure connectivity and accessibility more than the regular grids. However connectivity is ensured by the most peripheral streets, which in the space syntax representation play a marginal role.
Migration phenomena and all the related issues, like integration of different social groups, are intrinsically complex problems since they strongly depend on several competitive mechanisms as economic factors, cultural differences and many others. By identifying a few essential assumptions, and using the statistical mechanics of complex systems, we propose a novel quantitative approach that provides a minimal theory for those phenomena. We show that the competitive interactions in decision making among a population of $N$ host citizens and $P$ immigrants, a bi-partite spin-glass, give rise to a \"social consciousness\" inside the host community in the sense of the associative memory of neural networks. The theory leads to a natural quantitative definition of migrant s \"integration\" inside the community. From the technical point of view this minimal picture assumes, as control parameters, only general notions like strength of the random interactions, the ratio among the two party sizes and the cultural influence. Few steps forward, toward more refined models, which include some structure on the random interaction topology (as dilution to avoid the plain mean field approach) and correlations of experiences felt among the two parties (biasing the distribution of the coupling) are discussed at the end, where we show the robustness of our approach.
This study is aimed at investigating the thermochemical fuel characteristics and kinetic decomposition of melon seed husks (MSH) under inert (pyrolysis) conditions. The calorific value, elemental composition, proximate analyses and thermal kinetics of MSH was examined. The kinetic parameters; activation energy E and frequency factor A for MSH decomposition under pyrolysis conditions were determined using the Kissinger and isoconversional Flynn-Wall-Ozawa (FWO) methods. The values of E for MSH ranged from 146.81 to 296 kJ/mol at degrees of conversion {\\alpha} = 0.15 to 0.60 for FWO. The decomposition of MSH process was fastest at {\\alpha} = 0.15 and slowest at {\\alpha} = 0.60 with average E and A values of 192.96 kJ/mol and 2.86 x 1026 min-1, respectively at correlation values of 0.9847. The kinetic values of MSH using the Kissinger method are E = 161.26 kJ/mol and frequency factor, A = 2.08 x 1010 min-1 with the correlation value, R2 = 0.9958. The results indicate that MSH possesses important characteristics of a potential solid biofuel (SBF) for future thermochemical applications in clean energy and power generation.
With our knowledge of the universe, we have sent men to the moon. We know microscopic details of objects around us and within us. And yet we know relatively little about how our society works and how it reacts to changes brought upon it. Humankind is now facing serious crises for which we must develop new ways to tackle the global challenges of humanity in the 21st century. With connectivity between people rapidly increasing, we are now able to exploit information and communication technologies to achieve major breakthroughs that go beyond the step-wise improvements in other areas. The need of a socio-economic knowledge collider was first pointed out in the OECD Global Science Forum on Applications of Complexity Science for Public Policy in Erice from October 5 to 7, 2008. Since then, many scientists have called for a large-scale ICT-based research initiative on techno-socialeconomic- environmental issues, sometimes phrased as a Manhattan-, Apollo-, or CERN-like project to study the way our living planet works in a social dimension. Due to the connotations, we use the term knowledge accelerator, here.
The network characteristics based on the phonological similarities in the lexicons of several languages were examined. These languages differed widely in their history and linguistic structure, but commonalities in the network characteristics were observed. These networks were also found to be different from other networks studied in the literature. The properties of these networks suggest explanations for various aspects of linguistic processing and hint at deeper organization within human language.
We propose a new mechanism leading to scale-free networks which is based on the presence of an intrinsic character of a vertex called fitness. In our model, a vertex $i$ is assigned a fitness $x_i$, drawn from a given probability distribution function $f(x)$. During network evolution, with rate $p$ we add a vertex $j$ of fitness $x_j$ and connect to an existing vertex $i$ of fitness $x_i$ selected preferentially to a linking probability function $g(x_i,x_j)$ which depends on the fitnesses of the two vertices involved and, with rate $1-p$ we create an edge between two already existed vertices with fitnesses $x_i$ and $x_j$, with a probability also preferential to the connection function $g(x_i,x_j)$. For the proper choice of $g$, the resulting networks have generalized power laws, irrespective of the fitness distribution of vertices.
In order to identify the extent to which results from topological graph models are useful for modeling vulnerability in electricity infrastructure, we measure the susceptibility of power networks to random failures and directed attacks using three measures of vulnerability: characteristic path lengths, connectivity loss and blackout sizes. The first two are purely topological metrics. The blackout size calculation results from a model of cascading failure in power networks. Testing the response of 40 areas within the Eastern US power grid and a standard IEEE test case to a variety of attack/failure vectors indicates that directed attacks result in larger failures using all three vulnerability measures, but the attack vectors that appear to cause the most damage depend on the measure chosen. While our topological and power grid model results show some trends that are similar, there is only a mild correlation between the vulnerability measures for individual simulations. We conclude that evaluating vulnerability in power networks using purely topological metrics can be misleading.
We investigate a toy model of inductive interacting agents aiming to forecast a continuous, exogenous random variable E. Private information on E is spread heterogeneously across agents. Herding turns out to be the preferred forecasting mechanism when heterogeneity is maximal. However in such conditions aggregating information efficiently is hard even in the presence of learning, as the herding ratio rises significantly above the efficient-market expectation of 1 and remarkably close to the empirically observed values. We also study how different parameters (interaction range, learning rate, cost of information and score memory) may affect this scenario and improve efficiency in the hard phase.
We contribute to the understanding of social relationships within cultural contexts by proposing a connection between a social theory, relational models theory (RMT: Fiske 1991, 1992) and a social and political one, cultural or plural rationality theory (PRT: Douglas, 1982, Thompson et al., 1990). Drawing examples from the literature of both theories, we argue that each relational model of RMT may be implemented in ways compatible with each cultural bias of PRT. A cultural bias restrains the range of congruent implementations of relational models, but does not preclude any relational model altogether. This stands in contrast to earlier reconciliation attempts between PRT and RMT. Based on hypothetical one-to-one mappings, these attempts expect each cultural setting to be significantly associated with some, but not all, relational models. The framework we develop helps explain the findings of these previous attempts and provides insights into empirical research by clarifying which associations to expect between relationships and cultural contexts. We discuss the theoretical basis of our framework, including the idea that RMT and PRT apply to different levels of analysis: RMT s relational models are tied to relationships between two actors and PRT s cultural biases to structures of social networks.
The costs associated to the length of links impose unavoidable constraints to the growth of natural and artificial transport networks. When future network developments can not be predicted, building and maintenance costs require competing minimization mechanisms, and can not be optimized simultaneously. Hereby, we study the interplay of building and maintenance costs and its impact on the growth of transportation networks through a non-equilibrium model of network growth. We show cost balance is a sufficient ingredient for the emergence of tradeoffs between the network s total length and transport effciency, of optimal strategies of construction, and of power-law temporal correlations in the growth history of the network. Analysis of empirical ant transport networks in the framework of this model suggests different ant species may adopt similar optimization strategies.
Systems evolving according to the standard concept of biological or technological evolution are often described by catalytic evolution equations. We study the structure of these equations and find a deep relationship to classical thermodynamics. In particular we can demonstrate the existence of several distinct phases of evolutionary dynamics: a phase of fast growing diversity, one of stationary, finite diversity, and one of rapidly decaying diversity. While the first two phases have been subject to previous work, here we focus on the destructive aspects - in particular the phase diagram - of evolutionary dynamics. We further propose a dynamical model of diversity which captures spontaneous creation and destruction processes fully respecting the phase diagrams of evolutionary systems. The emergent timeseries show a Zipf law in the diversity dynamics, which is e.g. observable in actual economical data, e.g. in firm bankruptcy data. We believe the present model is a way to cast the famous qualitative picture of Schumpeterian economic evolution, into a quantifiable and testable framework.
In this work we present a dynamical model that succesfully describes the organization of mutualistic ecological systems. The main characteristic of these systems is the nested structure of the bipartite adjacency matrix describing their interactions. We introduce a nestedness coefficient, as an alternative to the Atmar and Patterson temperature, commonly used to measure the nestedness degree of the network. This coefficient has the advantage of being based on the robustness of the ecological system and it is not only describing the ordering of the bipartite matrix but it is also able to tell the difference, if any, between the degree of organization of each guild.
In this work we propose the use of a hirarchical extension of the polygonality index as a means to characterize and model geographical networks: each node is associated with the spatial position of the nodes, while the edges of the network are defined by progressive connectivity adjacencies. Through the analysis of such networks, while relating its topological and geometrical properties, it is possible to obtain important indications about the development dynamics of the networks under analysis. The potential of the methodology is illustrated with respect to synthetic geographical networks.
Using generating function methods for diagonalizing the transition matrix in 2-Urn models, we provide a complete classification into solvable and unsolvable subclasses, with further division of the solvable models into the Martingale and non-Martingale subcategories, and prove that the stationary distribution is a Gaussian function in the latter. We also give a natural condition related to the symmetry of the random walk in which the non-Martingale Urn models lead to an increase in entropy from Gaussian states. The condition also shows that universal symmetry in the macro-state is equivalent to increasing entropy. Certain models of social opinion dynamics, treated as Urn models, do not increase in entropy, unlike isolated mechanical systems.
The average age at which U.S. researchers get their first grant from NIH has increased from 34.3 in 1970, to 41.7 in 2004. These data raise the crucial question of the effects of aging on the scientific creativity and productivity of researchers. Those who worry about the aging of scientists usually believe that the younger they are the more creative and productive they will be. Using a large population of 13,680 university professors in Quebec, we show that, while scientific productivity rises sharply between 28 and 40, it increases at a slower pace between 41 and 50 and stabilizes afterward until retirement for the most active researchers. The average scientific impact per paper decreases linearly until 50-55 years old, but the average number of papers in highly cited journals and among highly cited papers rises continuously until retirement. Our results clearly show for the first time the natural history of the scientific productivity of scientists over their entire career and bring to light the fact that researchers over 55 still contribute significantly to the scientific community by producing high impact papers.
This contribution replies to H. M. Zhang s paper \"What Faster-than-traffic Characteristic Speeds Mean for Vehicular Traffic Flow\", which comments on the manuscript \"On the Controversy around Daganzo s Requiem for and Aw-Rascle s Resurrection of Second-Order Traffic Flow Models\" published in this issue of Eurpean Physical Journal B. The author clarifies several points and agrees that suitable experiments can be a way of deciding the controversy on the existence of propagation speeds faster than the speed of vehicles. Moreover, he proposes to aim at an integrated theory, which is both, theoretically consistent and practically relevant.
Resources are often limited, therefore it is essential how convincingly competitors present their claims for them. Beside a player s natural capacity, here overconfidence and bluffing may also play a decisive role and influence how to share a restricted reward. While bluff provides clear, but risky advantage, overconfidence, as a form of self-deception, could be harmful to its user. Still, it is a long-standing puzzle why these potentially damaging biases are maintained and evolving to a high level in the human society. Within the framework of evolutionary game theory, we present a simple version of resource competition game in which the coevolution of overconfidence and bluffing is fundamental, which is capable to explain their prevalence in structured populations. Interestingly, bluffing seems apt to evolve to higher level than corresponding overconfidence and in general the former is less resistant to punishment than the latter. Moreover, topological feature of the social network plays an intricate role in the spreading of overconfidence and bluffing. While the heterogeneity of interactions facilitates bluffing, it also increases efficiency of adequate punishment against overconfident behavior. Furthermore, increasing the degree of homogeneous networks can trigger similar effect. We also observed that having high real capability may accommodate both bluffing ability and overconfidence simultaneously.
Vehicular traffic is a classical example of a multi-agent system in which autonomous drivers operate in a shared environment. The article provides an overview of the state-of-the-art in microscopic traffic modeling and the implications for simulation techniques. We focus on the short-time dynamics of car-following models which describe continuous feedback control tasks (acceleration and braking) and models for discrete-choice tasks as a response to the surrounding traffic. The driving style of an agent is characterized by model parameters such as reaction time, desired speed, desired time gap, anticipation etc. In addition, internal state variables corresponding to the agent s \"mind\" are used to incorporate the driving experiences. We introduce a time-dependency of some parameters to describe the frustration of drivers being in a traffic jam for a while. Furthermore, the driver s behavior is externally influenced by the neighboring vehicles and also by environmental input such as limited motorization and braking power, visibility conditions and road traffic regulations. A general approach for dealing with discrete decision problems in the context of vehicular traffic is introduced and applied to mandatory and discretionary lane changes. Furthermore, we consider the decision process whether to brake or not when approaching a traffic light turning from green to amber. Another aspect of vehicular traffic is related to the heterogeneity of drivers. We discuss a hybrid system of coupled vehicle and information flow which can be used for developing and testing applications of upcoming inter-vehicle communication techniques.
In this work we study a 3-state opinion formation model considering two distinct mechanisms, namely independence and conviction. Independence is introduced in the model as a noise, by means of a probability of occurrence $q$. On the other hand, conviction acts as a disorder in the system, and it is introduced by two discrete probability distributions. We analyze the effects of such two mechanisms on the phase transitions of the model, and we found that the critical exponents are universal over the order-disorder frontier, presenting the same universality class of the mean-field Ising model. In addition, for one of the probability distributions the transition may be eliminated for a wide range of the parameters.
We propose the left-side electrification of multilane motorways in suburban areas as a practical way of implementing on-road charging in order to reduce the weight and price of electrically-powered automobiles. These could then be supplied energy en-route, significantly reducing the weight and cost of vehicle-mounted batteries. Our theoretical study is based on the circumstances of Madrid (Spain), a six million inhabitant region, but should be easily adaptable to other metropolitan areas.
The models of the Internet reported in the literature are mainly aimed at reproducing the scale-free structure, the high clustering coefficient and the small world effects found in the real Internet, while other important properties (e.g. related to centrality and hierarchical measurements) are not considered. For a better characterization and modeling of such network, a larger number of topological properties must be considered. In this work, we present a sound multivariate statistical approach, including feature spaces and multivariate statistical analysis (especially canonical projections), in order to characterize several Internet models while considering a larger set of relevant measurements. We apply such a methodology to determine, among nine complex networks models, which are those most compatible with the real Internet data (on the autonomous systems level) considering a set of 21 network measurements. We conclude that none of the considered models can reproduce the Internet topology with high accuracy.
The majority of dynamical studies in power systems focus on the high voltage transmission grids where models consider large generators interacting with crude aggregations of individual small loads. However, new phenomena have been observed indicating that the spatial distribution of collective, nonlinear contribution of these small loads in the low-voltage distribution grid is crucial to outcome of these dynamical transients. To elucidate the phenomenon, we study the dynamics of voltage and power flows in a spatially-extended distribution feeder (circuit) connecting many asynchronous induction motors and discover that this relatively simple 1+1 (space+time) dimensional system exhibits a plethora of nontrivial spatio-temporal effects, some of which may be dangerous for power system stability. Long-range motor-motor interactions mediated by circuit voltage and electrical power flows result in coexistence and segregation of spatially-extended phases defined by individual motor states--a \"normal\" state where the motors  mechanical (rotation) frequency is slightly smaller than the nominal frequency of the basic AC flows and a \"stalled\" state where the mechanical frequency is small. Transitions between the two states can be initiated by a perturbation of the voltage or base frequency at the head of the distribution feeder. Such behavior is typical of first-order phase transitions in physics, and this 1+1 dimensional model shows many other properties of a first-order phase transition with the spatial distribution of the motors  mechanical frequency playing the role of the order parameter. In particular we observe (a) propagation of the phase-transition front with the constant speed very long feeders; and (b) hysteresis in transitions between the normal and stalled (or partially stalled) phases.
We model a social network by a random graph whose nodes represent agents and links between two of them stand for a reciprocal interaction; each agent is also associated to a binary variable which represents a dichotomic opinion or attribute. We consider both the case of pair-wise (p=2) and multiple (p>2) interactions among agents and we study the behavior of the resulting system by means of the energy-entropy scheme, typical of statistical mechanics methods. We show, analytically and numerically, that the connectivity of the social network plays a non-trivial role: while for pair-wise interactions (p=2) the connectivity weights linearly, when interactions involve contemporary a number of agents larger than two (p>2), its weight gets more and more important. As a result, when p is large, a full consensus within the system, can be reached at relatively small critical couplings with respect to the p=2 case usually analyzed, or, otherwise stated, relatively small coupling strengths among agents are sufficient to orient most of the system.
Wirelessly connected vehicles that exchange information about traffic conditions can reduce delays caused by congestion. At a 2-to-1 lane reduction, the improvement in flow past a bottleneck due to traffic with a random mixture of 40% connected vehicles is found to be 52%. Control is based on connected-vehicle-reported velocities near the bottleneck. In response to indications of congestion the connected vehicles, which are also adaptive cruise control vehicles, reduce their speed in slowdown regions. Early lane changes of manually driven vehicles from the terminated lane to the continuous lane are induced by the slowing connected vehicles. Self-organized congestion at the bottleneck is thus delayed or eliminated, depending upon the incoming flow magnitude. For the large majority of vehicles, travel times past the bottleneck are substantially reduced. Control is responsible for delaying the onset of congestion as the incoming flow increases. Adaptive cruise control increases the flow out of the congested state at the bottleneck. The nature of the congested state, when it occurs, appears to be similar under a variety of conditions. Typically 80-100 vehicles are approximately equally distributed between the lanes in the 500-m region prior to the end of the terminated lane. Without the adaptive cruise control capability, connected vehicles can delay the onset of congestion but do not increase the asymptotic flow past the bottleneck. Calculations are done using the Kerner-Klenov stochastic discrete-time model for manual vehicles. The dynamics of the connected vehicles is given by a conventional adaptive cruise control algorithm plus commanded deceleration. Because time in the model for manual vehicles is discrete (one-second intervals), it is assumed that the acceleration of any vehicle immediately in front of a connected vehicle is constant during the time interval.
Using a geographical scale-free network to describe relations between people in a city, we explain both superlinear and sublinear allometric scaling of urban indicators that quantify activities or performances of the city. The urban indicator $Y(N)$ of a city with the population size $N$ is analytically calculated by summing up all individual activities produced by person-to-person relationships. Our results show that the urban indicator scales superlinearly with the population, namely, $Y(N)\\propto N^{\\beta}$ with $\\beta>1$ if $Y(N)$ represents a creative productivity and the indicator scales sublinearly ($\\beta<1$) if $Y(N)$ is related to the degree of infrastructure development. These coincide with allometric scaling observed in real-world urban indicators. We also show how the scaling exponent $\\beta$ depends on the strength of the geographical constraint in the network formation.
Complex networks emerge under different conditions through simple rules of growth and evolution. Such rules are typically local when dealing with biological systems and most social webs. An important deviation from such scenario is provided by communities of agents engaged in technology development, such as open source (OS) communities. Here we analyze their network structure, showing that it defines a complex weighted network with scaling laws at different levels, as measured by looking at e-mail exchanges. We also present a simple model of network growth involving non-local rules based on betweenness centrality. The model outcomes fit very well the observed scaling laws, suggesting that the overall goals of the community and the underlying hierarchical organization play a key role is shaping its dynamics.
Traffic flow of athletes in classic-style cross-country ski marathons, with the Swedish Vasaloppet as prominent example, represents a non-vehicular system of driven particles with many properties of vehicular traffic flow such as unidirectional movement, the existence of lanes, and, moreover, severe traffic jams. We propose a microscopic acceleration and track-changing model taking into account different fitness levels, gradients, and interactions between the athletes in all traffic situations. The model is calibrated on microscopic data of the $\\textit{Vasaloppet 2012}$ Using the multi-model open-source simulator MovSim.org, we simulate all 15 000 participants of the Vasaloppet during the first ten kilometers.
Driven many-particle systems with nonlinear interactions are known to often display multi-stability, i.e. depending on the respective initial condition, there may be different outcomes. Here, we study this phenomenon for traffic models, some of which show stable and linearly unstable density regimes, but areas of metastability in between. In these areas, perturbations larger than a certain critical amplitude will cause a lasting breakdown of traffic, while smaller ones will fade away. While there are common methods to study linear instability, non-linear instability had to be studied numerically in the past. Here, we present an analytical study for the optimal velocity model with a stepwise specification of the optimal velocity function and a simple kind of perturbation. Despite various approximations, the analytical results are shown to reproduce numerical results very well.
In many real-world complex systems, the time-evolution of the network s structure and the dynamic state of its nodes are closely entangled. Here, we study opinion formation and imitation on an adaptive complex network which is dependent on the individual dynamic state of each node and vice versa to model the co-evolution of renewable resources with the dynamics of harvesting agents on a social network. The adaptive voter model is coupled to a set of identical logistic growth models and we show that in such systems, the rate of interactions between nodes as well as the adaptive rewiring probability play a crucial role for the sustainability of the system s equilibrium state. We derive a macroscopic description of the system which provides a general framework to model and quantify the influence of single node dynamics on the macroscopic state of the network and is applicable to many fields of study, such as epidemic spreading or social modeling.
We study the dynamics of the \"Kolkata Paise Restaurant problem\". The problem is the following: In each period, N agents have to choose between N restaurants. Agents have a common ranking of the restaurants. Restaurants can only serve one customer. When more than one customer arrives at the same restaurant, one customer is chosen at random and is served; the others do not get the service. We first introduce the one-shot versions of the Kolkata Paise Restaurant problem which we call one-shot KPR games. We then study the dynamics of the Kolkata Paise Restaurant problem (which is a repeated game version of any given one shot KPR game) for large N. For statistical analysis, we explore the long time steady state behavior. In many such models with myopic agents we get under-utilization of resources, that is, we get a lower aggregate payoff compared to the social optimum. We study a number of myopic strategies, focusing on the average occupation fraction of restaurants.
We investigate the emergence of localized coherent behavior in a system consisting of two populations of social agents possessing a condition for non-interacting states, mutually coupled through global interaction fields. As an example of such dynamics, we employ Axelrod s model for social influence. The global interaction fields correspond to the statistical mode of the states of the agents in each population. We find localized coherent states for some values of parameters, consisting of one population in a homogeneous state and the other in a disordered state. This situation can be considered as a social analogue to a chimera state arising in two interacting populations of oscillators. In addition, other asymptotic collective behaviors appear depending on parameter values: a common homogeneous state, where both populations reach the same state; different homogeneous states, where both population reach homogeneous states different from each other; and a disordered state, where both populations reach inhomogeneous states.
An individual s identity in a human society is specified by his or her name. Differently from family names, usually inherited from fathers, a given name for a child is often chosen at the parents  disposal. However, their decision cannot be made in a vacuum but affected by social conventions and trends. Furthermore, such social pressure changes in time, as new names gain popularity while some other names are gradually forgotten. In this paper, we investigate how popularity of given names has evolved over the last century by using datasets collected in Korea, the province of Quebec in Canada, and the United States. In each of these countries, the average popularity of given names exhibits typical patterns of rise and fall with a time scale of about one generation. We also observe that notable changes of diversity in given names signal major social changes.
Agent-based models are becoming indispensable tools in building design, safety assessments as well as management of emergency egress. However, reliable calibrations of these models should be mandatory before they are used in practice. To improve the database for model calibration we present results from two experiments at a T-junction and a corner. In such structures the dynamics of pedestrian streams is complex and up to now not studied systematically. To understand it deeply, series of well-controlled laboratory experiments are conducted. The Voronoi method, which is used to analyze the experiments, allows high resolution and small fluctuation in time and space. From the results, it is found that the fundamental diagrams of pedestrian flow in T-junction are not the same before and after merging. At the same density, the velocities of pedestrians before merging are smaller than that after merging. To analyze whether turning or merging of the stream is responsible for this discrepancy, we compare the fundamental diagrams of pedestrian flow in T-junction with the flow at a single corner. The fundamental diagrams of the streams in front and behind the corner agree well and are also in accordance with that from T-junction flow after merging. Besides, space-resolved measurements for the density, velocity profiles are obtained using Voronoi method. These maps offer important information about dangerous spots and thus enable to improve egress management and facility design.
The \"faster-is-slower\" (FIS) effect was first predicted by computer simulations of the egress of pedestrians through a narrow exit [Helbing D, Farkas I J, Vicsek T, Nature 407:487-490 (2000)]. FIS refers to the finding that, under certain conditions, an excess of the individuals  vigor in the attempt to exit causes a decrease in the flow rate. In general, this effect is identified by the appearance of a minimum when plotting the total evacuation time of a crowd as a function of the pedestrian desired velocity. Here, we experimentally show that the FIS effect indeed occurs in three different systems of discrete particles flowing through a constriction: (a) humans evacuating a room, (b) a herd of sheep entering a barn and (c) grains flowing out a 2D hopper over a vibrated incline. This finding suggests that FIS is a universal phenomenon for active matter passing through a narrowing.
The motion of pedestrian crowds (e.g. for simulation of an evacuation situation) can be modeled as a multi-body system of self driven particles with repulsive interaction. We use a few simple situations to determine the simplest allowed functional form of the force function. More complexity may be necessary to model more complex situations. There are many unknown parameters to such models, which have to be adjusted correctly. The parameters can be related to quantities that can be measured independently, like step length and frequency. The microscopic behavior is, however, only poorly reproduced in many situations, a person approaching a standing or slow obstacle will e.g. show oscillations in position, and the trajectories of two persons meeting in a corridor in opposite direction will be far from realistic and somewhat erratic. This is inpart due to the assumption of instantaneous reaction on the momentary situation. Obviously, persons react with a small time lag, while on the other hand they will anticipate changing situations for at least a short time. Thus basing the repulsive interaction on a (linear) extrapolation over a short time (e.g. 1 s) eliminates the oscillations at slowing down and smoothes the patterns of giving way to others to a more realistic behavior. A second problem is the additive combination of binary interactions. It is shown that combining only a few relevant interactions gives better model performance.
This paper presents a statistical analysis of the structure of Peer-to-Peer (P2P) social networks that captures social associations of distributed peers in resource sharing. Peer social networks appear to be mainly composed of pure resource providers that guarantee high resource availability and reliability of P2P systems. The major peers that both provide and request resources are only a small fraction. The connectivity between peers, including undirected, directed (out and in) and weighted connections, is scale-free and the social networks of all peers and major peers are small world networks. The analysis also confirms that peer social networks show in general disassortative correlations, except that active providers are connected between each other and by active requesters. The study presented in this paper gives a better understanding of peer relationships in resource sharing, which may help a better design of future P2P networks and open the path to the study of transport processes on top of real P2P topologies.
The paradigm of layered networks is used to describe many real-world systems -- from biological networks, to social organizations and transportation systems. Recently there has been much progress in understanding the general properties of multilayer networks, our understanding of how to control such systems remains limited. One aspect that makes this endeavor challenging is that each layer can operate at a different timescale, thus we cannot directly apply standard ideas from structural control theory of individual networks. Here we address the problem of controlling multilayer and multi-timescale networks focusing on two-layer multiplex networks with one-to-one interlayer coupling. We investigate the case when the control signal is applied to the nodes of one layer. We develop a theory based on disjoint path covers to determine the minimum number of inputs ($N_\\T i$) necessary for full control. We show that if both layers operate on the same timescale then the network structure of both layers equally affect controllability. In the presence of timescale separation, controllability is enhanced if the controller interacts with the faster layer: $N_\\T i$ decreases as the timescale difference increases up to a critical timescale difference, above which $N_\\T i$ remains constant and is completely determined by the faster layer. In contrast, control becomes increasingly difficult if the controller interacts with the layer operating on the slower timescale and increasing timescale separation leads to increased $N_\\T i$, again up to a critical value, above which $N_\\T i$ still depends on the structure of both layers. By identifying the underlying mechanisms that connect timescale difference and controllability for a simplified model, we provide insight into disentangling how our ability to control real interacting complex systems is affected by a variety of sources of complexity.
Although a lot of attentions have been paid to human mobility, the relationship between travel pattern with city structure is still unclear. Here we probe into this relationship by analyzing the metro passenger trip data.There are two unprecedented findings. One, from the average view a linear law exists between the individual s travel distance with his original distance to city center. The mechanism underlying is a travel pattern we called \"ring aggregation\", i.e., the daily movement of city passengers is just aggregating to a ring with roughly equal distance to city center.Interestingly, for the round trips the daily travel pattern can be regarded as a switching between the home ring at outer area with the office ring at the inner area. Second, this linear law and ring aggregation pattern seems to be an exclusive characteristic of the metro system. It can not be found in short distance transportation modes, such as bicycle and taxi, neither as multiple transportation modes. This means the ring aggregation pattern is a token of the relationship between travel pattern with city structure in the large scale space.
Dynamics of evolutionary games strongly depend on underlying networks. We study the coevolutionary prisoner s dilemma in which players change their local networks as well as strategies (i.e., cooperate or defect). This topic has been increasingly explored by many researchers. On the basis of active linking dynamics [J. M. Pacheco et al., J. Theor. Biol. 243, 437 (2006), J. M. Pacheco et al., Phys. Rev. Lett. 97, 258103 (2006)], we show that cooperation is enhanced fairly robustly. In particular, cooperation evolves when the payoff of the player is normalized by the number of neighbors; this is not the case in the evolutionary prisoner s dilemma on static networks.
Mathematical models are validated against empirical data, while examining potential indicators for an online video that went viral. We revisit some concepts of infectious disease modeling (e.g. reproductive number) and we comment on the role of model parameters that interplay in the spread of innovations. The dataset employed here provides strong evidence that the number of online views is governed by exponential growth patterns, explaining a common feature of viral videos.
We consider a metapopulation version of the Schelling model of segregation over several complex networks and lattice. We show that the segregation process is topology independent and hence it is intrinsic to the individual tolerance. The role of the topology is to fix the places where the segregation patterns emerge. In addition we address the question of the time evolution of the segregation clusters, resulting from different dynamical regimes of a coarsening process, as a function of the tolerance parameter. We show that the underlying topology may alter the early stage of the coarsening process, once large values of the tolerance are used, while for lower ones a different mechanism is at work and it results to be topology independent.
Despite the widespread availability of information concerning Public Transport from different sources, it is extremely hard to have a complete picture, in particular at a national scale. Here, we integrate timetable data obtained from the United Kingdom open-data program together with timetables of domestic flights, and obtain a comprehensive snapshot of the temporal characteristics of the whole UK public transport system for a week in October 2010. In order to focus on the multi-modal aspects of the system, we use a coarse graining procedure and define explicitly the coupling between different transport modes such as connections at airports, ferry docks, rail, metro, coach and bus stations. The resulting weighted, directed, temporal and multilayer network is provided in simple, commonly used formats, ensuring easy accessibility and the possibility of a straightforward use of old or specifically developed methods on this new and extensive dataset.
In this paper, we investigate the dynamical properties of a psychological uplift in lovers. We first evaluate extensively the dynamical equations which were recently given by Rinaldi et. al., Physica A 392, pp.3231-3239 (2013). Then, the dependences of the equations on several parameters are numerically examined. From the view point of lasting partnership for lovers, especially, for married couples, one should optimize the parameters appearing in the dynamical equations to maintain the love for their respective partners. To achieve this optimization, we propose a new idea where the parameters are stochastic variables and the parameters in the next time step are given as expectations over a Boltzmann-Gibbs distribution at a finite temperature. This idea is very general and might be applicable to other models dealing with human relationships.
We explore the effects of over-specificity in learning algorithms by investigating the behavior of a student, suited to learn optimally from a teacher $\\mathbf{B}$, learning from a teacher $\\mathbf{B} \\neq\\mathbf{B}$. We only considered the supervised, on-line learning scenario with teachers selected from a particular family. We found that, in the general case, the application of the optimal algorithm to the wrong teacher produces a residual generalization error, even if the right teacher is harder. By imposing mild conditions to the learning algorithm form we obtained an approximation for the residual generalization error. Simulations carried in finite networks validate the estimate found.
The evolutionary Prisoner s Dilemma Game (PDG) and the Snowdrift Game (SG) with preferential learning mechanism are studied in the Barab\\ asi-Albert network. Simulation results demonstrate that the preferential learning of individuals remarkably promotes the cooperative behavior for both two games over a wide range of payoffs. To understand the effect of preferential learning on the evolution of the systems, we investigate the time series of the cooperator density for different preferential strength and payoffs. It is found that in some specific cases two games both show the $1/f$-scaling behaviors, which indicate the existence of long range correlation. We also figure out that when the large degree nodes have high probability to be selected, the PDG displays a punctuated equilibrium-type behavior. On the contrary, the SG exhibits a sudden increase feature. These temporary instable behaviors are ascribed to the strategy shift of the large degree nodes.
We investigate the evolutionary dynamics in directed and/or weighted networks. We study the fixation probability of a mutant in finite populations in stochastic voter-type dynamics for several update rules. The fixation probability is defined as the probability of a newly introduced mutant in a wild-type population taking over the entire population. In contrast to the case of undirected and unweighted networks, the fixation probability of a mutant in directed networks is characterized not only by the degree of the node that the mutant initially invades but by the global structure of networks. Consequently, the gross connectivity of networks such as small-world property or modularity has a major impact on the fixation probability.
We present a family of scale-free network model consisting of cliques, which is established by a simple recursive algorithm. We investigate the networks both analytically and numerically. The obtained analytical solutions show that the networks follow a power-law degree distribution, with degree exponent continuously tuned between 2 and 3. The exact expression of clustering coefficient is also provided for the networks. Furthermore, the investigation of the average path length reveals that the networks possess small-world feature. Interestingly, we find that a special case of our model can be mapped into the Yule process.
The Triple Helix of university-industry-government relations is elaborated into a systemic model that accounts for interactions among three dimensions. By distinguishing between the respective micro-operations, this model enables us to recombine the \"Mode 2\" thesis of a new production of scientific knowledge and the study of systems of innovation with the neo-classical perspective on the dynamics of the market. The mutual information in three dimensions provides us with an indicator for the self-organization of the resulting network systems. The probabilistic entropy in this mutual information can be negative in knowledge-based configurations. The knowledge base of an economy can be considered as a second-order interaction effect among interactions at interfaces between institutions and functions in different spheres. Proximity enhances the chances for couplings and, therefore, the formation of technological trajectories. The next-order regime of the knowledge base, however, can be expected to remain pending as selection pressure.
This is a lecture on the ethics and role of science in promoting rational and objective thinking in society. It was delivered by Prof. Shyamal Sengupta of Kolkata, India. Prof. Sengupta, who passed away recently, has inspired generations of Indian physicists by his rational viewpoints on science and by teaching his students the importance of a scientific outlook. We, some of his former students dedicate this small corner of the archive to his fond memory.
Many socioeconomic studies have been carried out to explain the phenomenon of gentrification. Although results of these works shed light on the process around this phenomenon, a perspective which focuses on the relationship between city form and gentrification is still missing. With this paper we try to address this gap by studying and comparing, through classic methods of mathematical statistics, morphological features of five London gentrified neighbourhoods. Outcomes confirm that areas which have undergone gentrification display similar and recognizable morphological patterns in terms of urban type and geographical location of main and local roads as well as businesses. These initial results confirm findings from previous research in urban sociology, and highlight the role of urban form in contributing to shape dynamics of non-spatial nature in cities.
Networks may, or may not, be wired to have a core that is both itself densely connected and central in terms of graph distance. In this study we propose a coefficient to measure if the network has such a clear-cut core-periphery dichotomy. We measure this coefficient for a number of real-world and model networks and find that different classes of networks have their characteristic values. For example do geographical networks have a strong core-periphery structure, while the core-periphery structure of social networks (despite their positive degree-degree correlations) is rather weak. We proceed to study radial statistics of the core, i.e. properties of the n-neighborhoods of the core vertices for increasing n. We find that almost all networks have unexpectedly many edges within n-neighborhoods at a certain distance from the core suggesting an effective radius for non-trivial network processes.
We propose a phase model to study cascade failure in power grids composed of generators and loads. If the power demand is below a critical value, the model system of power grids maintains the standard frequency by feedback control. On the other hand, if the power demand exceeds the critical value, an electric failure occurs via step out (loss of synchronization) or voltage collapse. The two failures are incorporated as two removal rules of generator nodes and load nodes. We perform direct numerical simulation of the phase model on a scale-free network and compare the results with a mean-field approximation.
We study the effect of adaptivity on a social model of opinion dynamics and consensus formation. We analyze how the adaptivity of the network of contacts between agents to the underlying social dynamics affects the size and topological properties of groups and the convergence time to the stable final state. We find that, while on static networks these properties are determined by percolation phenomena, on adaptive networks the rewiring process leads to different behaviors: Adaptive rewiring fosters group formation by enhancing communication between agents of similar opinion, though it also makes possible the division of clusters. We show how the convergence time is determined by the characteristic time of link rearrangement. We finally investigate how the adaptivity yields nontrivial correlations between the internal topology and the size of the groups of agreeing agents.
Many complex networks are only a part of larger systems, where a number of coexisting topologies interact and depend on each other. We introduce a layered model to facilitate the description and analysis of such systems. As an example of its application we study the load distribution in three real-life transportation systems, where the lower layer is the physical infrastructure and the upper layer represents the traffic flows. This layered view allows us to capture the fundamental differences between the real load and commonly used load estimators, which explains why these estimators fail to approximate the real load.
Complex networks with high numbers of nodes or links are often difficult to analyse. However, not all elements contribute equally to their structural patterns. A small number of elements (the hubs) seem to play a particularly relevant role in organizing the overall structure around them. But other parts of the architecture (such as hub-hub connecting elements) are also important. In this letter we present a new type of substructure, to be named the $K$-scaffold subgraph, able to capture all the essential network components. Their key features, including the so called critical scaffold graph, are analytically derived.
We introduce a statistical physics model for opinion dynamics on random networks where agents adopt the opinion held by the majority of their direct neighbors only if the fraction of these neighbors exceeds a certain threshold, p_u. We find a transition from total final consensus to a mixed phase where opinions coexist amongst the agents. The relevant parameters are the relative sizes in the initial opinion distribution within the population and the connectivity of the underlying network. As the order parameter we define the asymptotic state of opinions. In the phase diagram we find regions of total consensus and a mixed phase. As the  laggard parameter  p_u increases the regions of consensus shrink. In addition we introduce rewiring of the underlying network during the opinion formation process and discuss the resulting consequences in the phase diagram.
The social dynamics of residential solar panel use within a theoretical population are studied using a compartmental model. In this study we consider three solar power options commonly available to consumers: the community block, leasing, and buying. In particular we are interested in studying how social influence affects the dynamics within these compartments. As a result of this research a threshold value is determined, beyond which solar panels persist in the population. In addition, as is standard in this type of study, we perform equilibrium analysis, as well as uncertainty and sensitivity analyses on the threshold value. We also perform uncertainty analysis on the population levels of each compartment. The analysis shows that social influence plays an important role in the adoption of residential solar panels.
This contribution summarizes and explains various principles from physics which are used for the simulation of traffic flows in large street networks, the modeling of destination, transport mode, and route choice, or the simulation of urban growth and regional development. The methods stem from many-particle physics, from kinetic gas theory, or fluiddynamics. They involve energy and entropy considerations, transfer the law of gravity, apply cellular automata and require methods from evolutionary game theory. In this way, one can determine interaction forces among driver-vehicle units, reproduce breakdowns of traffic including features of synchronized congested flow, or understand changing usage patterns of alternative roads. One can also describe daily activity patterns based on decision models, simulate migration streams, and model urban growth as a particular kind of aggregation process.
We study the costs of coal-fired electricity in the United States between 1882 and 2006 by decomposing it in terms of the price of coal, transportation costs, energy density, thermal efficiency, plant construction cost, interest rate, capacity factor, and operations and maintenance cost. The dominant determinants of costs have been the price of coal and plant construction cost. The price of coal appears to fluctuate more or less randomly while the construction cost follows long-term trends, decreasing from 1902 - 1970, increasing from 1970 - 1990, and leveling off since then. Our analysis emphasizes the importance of using long time series and comparing electricity generation technologies using decomposed total costs, rather than costs of single components like capital. By taking this approach we find that the history of coal-fired electricity costs suggests there is a fluctuating floor to its future costs, which is determined by coal prices. Even if construction costs resumed a decreasing trend, the cost of coal-based electricity would drop for a while but eventually be determined by the price of coal, which fluctuates while showing no long-term trend.
The role of mentorship on protege performance is a matter of importance to academic, business, and governmental organizations. While the benefits of mentorship for proteges, mentors and their organizations are apparent, the extent to which proteges mimic their mentors  career choices and acquire their mentorship skills is unclear. Here, we investigate one aspect of mentor emulation by studying mentorship fecundity---the number of proteges a mentor trains---with data from the Mathematics Genealogy Project, which tracks the mentorship record of thousands of mathematicians over several centuries. We demonstrate that fecundity among academic mathematicians is correlated with other measures of academic success. We also find that the average fecundity of mentors remains stable over 60 years of recorded mentorship. We further uncover three significant correlations in mentorship fecundity. First, mentors with small mentorship fecundity train proteges that go on to have a 37% larger than expected mentorship fecundity. Second, in the first third of their career, mentors with large fecundity train proteges that go on to have a 29% larger than expected fecundity. Finally, in the last third of their career, mentors with large fecundity train proteges that go on to have a 31% smaller than expected fecundity.
We analyze a set of three databases at different levels of aggregation (i) a database of approximately $10^6$ publications of 247 countries in the period between 1980--2001. (ii) A database of 508 academic institutions from European Union (EU) and 408 institutes from USA in the 11 year period between during 1991--2001. (iii) A database comprising of 2330 Flemish authors in the period 1980--2000. At all levels of aggregation we find that the mean annual growth rates of publications is independent of the number of publications of the various units involved. We also find that the standard deviation of the distribution of annual growth rates decays with the number of publications as a power law with exponent $\\approx 0.3$. These findings are consistent with those of recent studies of systems such as the size of R&D funding budgets of countries, the research publication volumes of US universities, and the size of business firms.
In this paper, a directed network model for world-wide web is presented. The out-degree of the added nodes are supposed to be scale-free and its mean value is $m$. This model exhibits small-world effect, which means the corresponding networks are of very short average distance and highly large clustering coefficient. More interesting, the in-degree distribution obeys the power-law form with the exponent $\\gamma=2+1/m$, depending on the average out-degree. This finding is supported by the empirical data, which has not been emphasized by the previous studies on directed networks.
In this paper, we present a modelling experiment developed to study systems of cities and processes of urbanisation in large territories over long time spans. Building on geographical theories of urban evolution, we rely on agent-based models to 1/ formalise complementary and alternative hypotheses of urbanisation and 2/ explore their ability to simulate observed patterns in a virtual laboratory. The paper is therefore divided into two sections : an overview of the mechanisms implemented to represent competing hypotheses used to simulate urban evolution; and an evaluation of the resulting model structures in their ability to simulate - efficiently and parsimoniously - a system of cities (the Former Soviet Union) over several periods of time (before and after the crash of the USSR). We do so using a modular framework of model-building and evolutionary algorithms for the calibration of several model structures. This project aims at tackling equifinality in systems dynamics by confronting different mechanisms with similar evaluation criteria. It enables the identification of the best-performing models with respect to the chosen criteria by scanning automatically the parameter along with the space of model structures (as combinations of modelled dynamics).
Energy technologies emitting differing proportions of methane and carbon dioxide vary in their relative climate impacts over time, due to the different atmospheric lifetimes of the two gases. Standard technology comparisons using the global warming potential (GWP) emissions equivalency metric do not reveal these dynamic impacts, and may not provide the information needed to assess technologies and emissions mitigation opportunities in the context of broader climate policy goals. Here we formulate a portfolio optimization model that incorporates changes in technology impacts as a radiative forcing (RF) stabilization target is approached. An optimal portfolio, maximizing allowed energy consumption while meeting the RF target, is obtained by year-wise minimization of the marginal RF impact in an intended stabilization year. The optimal portfolio calls for using certain higher methane-emitting technologies prior to an optimal switching year, followed by methane-light technologies as the stabilization year approaches. The model is applied to transportation technology pairs and shows that, by accounting for the differing decay behavior of gases, optimal switching portfolios allow energy consumption gains of up to 50% compared to relying on the higher methane-emitting technology alone. The results allow for estimates of target timelines for mitigating methane emissions from energy technologies.
Airplane boarding process is an example where disorder properties of the system are relevant to the emergence of universality classes. Based on a simple model, we present a systematic analysis of finite-size effects in boarding time, and propose a comprehensive view of the role of sequential disorder in the scaling behavior of boarding time against the plane size. Using numerical simulations and mathematical arguments, we find how the scaling behavior depends on the number of seat columns and the range of sequential disorder. Our results show that new scaling exponents can arise as disorder is localized to varying extents.
Braess \\cite{1} has been studied about a traffic flow on a diamond type network and found that introducing new edges to the networks always does not achieve the efficiency. Some researchers studied the Braess  paradox in similar type networks by introducing various types of cost functions. But whether such paradox occurs or not is not scarcely studied in complex networks except for Dorogovtsev-Mendes network\\cite{2}. In this article, we study the paradox on Ladder type networks, as the first step to the research about Braess  paradox on Watts and Strogatz type small world network\\cite{Watt1}\\cite{Watt2}. %We theoretically and numerically studied Braess  paradox on Ladder networks. For the purpose, we construct $4 \\times 3$ models as extensions of the original Braess  models. We analyze theoretically and numerically studied the models on Ladder networks. Last we give a phase diagram for (a) model, where the cost functions of bypasses are constant =0 or flow, base on two parameters $r$ and $p$ by numerical simulations. Simulation experiments also show some conditions that paradox can not occur. These facts give some sugestions for designing effective transportation networks.
After the social learning models were proposed, finding the solutions of the games becomes a well-defined mathematical question. However, almost all papers on the games and their applications are based on solutions built upon either an add-hoc argument or a twisted Bayesian analysis of the games. Here, we present logical gaps in those solutions and an exact solution of our own. We also introduced a minor extension to the original game such that not only logical difference but also difference in action outcomes among those solutions become visible.
Topology and weights are closely related in weighted complex networks and this is reflected in their modular structure. We present a simple network model where the weights are generated dynamically and they shape the developing topology. By tuning a model parameter governing the importance of weights, the resulting networks undergo a gradual structural transition from a module free topology to one with communities. The model also reproduces many features of large social networks, including the \"weak links\" property.
The law of allometric scaling based on Zipf distributions can be employed to research hierarchies of cities in a geographical region. However, the allometric patterns are easily influenced by random disturbance from the noises in observational data. In theory, both the allometric growth law and Zipf s law are equivalent to hierarchical scaling laws associated with fractal structure. In this paper, the scaling laws of hierarchies with cascade structure are used to study Chinese cities, and the method of R/S analysis is applied to analyzing the change of the allometric scaling exponents. The results show that the hierarchical scaling relations of Chinese cities became clearer and clearer from 1991 to 2014 year, the global allometric scaling exponent values fluctuated around 0.85, and the local scaling exponent approached to 0.85. The Hurst exponent of the allometric parameter change is greater than 1/2, indicating persistence and a long-term memory of urban evolution. The main conclusions can be reached as follows: the allometric scaling law of cities represents an evolutionary order rather than an invariable rule, which emerges from self-organized process of urbanization, and the ideas from allometry and fractals can be combined to optimize spatial and hierarchical structure of urban systems.
Heavy traffic congestion daily occurs at merging sections on highway. For releasing this congestion, possibility of alternative configuration of vehicles on multiple-lane road is discussed in this paper. This is the configuration where no vehicles move aside on the other lane. It has a merit in making smooth merging at an intersection or a junction due to so-called the \"zipper effect\". We show, by developing a cellular automaton model for multiple lanes, that this configuration is achieved by simple local interactions between vehicles neighboring each other. The degree of the alternative configuration in terms of the spatial increase of parallel driving length is studied by using both numerical simulations and mean field theory. We successfully construct a theoretical method for calculating this degree of the alternative configuration by using cluster approximation. It is shown that the theoretical results coincide with those of the simulations very well.
We introduce an optimum principle for a vehicular traffic network with road bottlenecks. This network breakdown minimization (BM) principle states that the network optimum is reached, when link flow rates are assigned in the network in such a way that the probability for spontaneous occurrence of traffic breakdown at one of the network bottlenecks during a given observation time reaches the minimum possible value. Based on numerical simulations with a stochastic three-phase traffic flow model, we show that in comparison to the well-known Wardrop s principles the application of the BM principle permits considerably greater network inflow rates at which no traffic breakdown occurs and, therefore, free flow remains in the whole network.
We present results of numerical simulations of the effect of driver behavior on spatiotemporal congested traffic patterns that result from traffic breakdown at an on-ramp bottleneck. The simulations are made with the Kerner-Klenov stochastic traffic flow model in the framework of three-phase traffic theory. Different diagrams of congested patterns at the bottleneck associated with different driver behavioral characteristics are found and compared each other. An adaptive cruise control (ACC) in the framework of three-phase traffic theory introduced by the author (called a \"driver alike ACC\" (DA-ACC)) is discussed. The effect of DA-ACC-vehicles on traffic flow, in which without the DA-ACC-vehicles traffic congestion occurs at the bottleneck, is numerically studied. We show that DA-ACC-vehicles improve traffic flow considerably without any reduction in driving comfort. It is found that there is a critical percentage of DA-ACC-vehicles in traffic flow: If the percentage of the DA-ACC-vehicle exceeds the critical one no traffic breakdown occurs at the bottleneck. A criticism of a recent \"criticism of three-phase traffic theory\" is presented
In addition to the well known common properties such as small world and community structures, recent empirical investigations suggest a universal scaling law for the spatial structure of social networks. It is found that the probability density distribution of an individual to have a friend at distance $r$ scales as $P(r)\\propto r^{-1}$. The basic principle that yields this spatial scaling property is not yet understood. Here we propose a fundamental origin for this law based on the concept of entropy. We show that this spatial scaling law can result from maximization of information entropy, which means individuals seek to maximize the diversity of their friendships. Such spatial distribution can benefit individuals significantly in optimally collecting information in a social network.
In the commented paper, the authors declare an analogy with the quantum mechanical pure states established through the application of the high-dimensional combinatorial Laplacian considering that the simplicial complex is in the pure state when it is formed by collection of the pure states. In their work, besides giving a completely erroneous analogy for the pure quantum mechanical state, which contradicts to very basic postulates of quantum mechanic, the authors clearly fail to provide and explain mathematical formalism behind their claims. Their intention is to rigorously prove that the existence of opinion space in all considered cases consists of the pure quantum states using incorrect normalization constant which does not produce trace equal to one. In this comment we prove out that their claims are erroneous. In order to show incorrectness of Maletic & Rajkovic model and conclusions we calculated and examined connections between different combinatorial structures of q- dimensional simplicial complexes and their Laplacian spectra and analyzed resulting symmetric and positive semidefinite matrices in the context of the density matrix of a quantum mechanical system. Importance of presented research is to further develop accurate quantitative topological-based characterization method for convertibility and distillation of density matrix.
Based on an agent based model of opinion changes, described in detail in a recent paper (\\arXiv:1507.00126), we attempt to predict, three months in advance, the range of possible results of the Polish parliamentary elections, scheduled for October 25, 2015. The model reproduces semi-quantitatively the poll results for the three parties which dominated the recent presidential elections and allows estimation of some variations of the electoral propaganda campaigns by the parties.
An alternative model to measure simultaneously scientific and financial performances of scientific activities is proposed. This mathematical model focuses only on the final scientific outcomes in each fiscal year to gurantee the objectivity. The model is suited for the purpose of immediate and quantitative evaluation needed by policy makers to make decision in the subsequent fiscal year. The model can be applied to any branches of science, while it is also adjustable to varying macro-economic indicators. This enables the policy makers to evaluate equally scientific activities in various fields of science. It is argued that implementing the model could realize a fair, transparent and objective reward and punishment system in any scientific activities in order to improve both individual and institutional performances. The model also enables an automatic evaluation embedded in any scientific databases either in the local system or over the net.
Attacks by drones (i.e., unmanned combat air vehicles) continue to generate heated political and ethical debates. Here we examine the quantitative nature of drone attacks, focusing on how their intensity and frequency compare with that of other forms of human conflict. Instead of the power-law distribution found recently for insurgent and terrorist attacks, the severity of attacks is more akin to lognormal and exponential distributions, suggesting that the dynamics underlying drone attacks lie beyond these other forms of human conflict. We find that the pattern in the timing of attacks is consistent with one side having almost complete control, an important if expected result. We show that these novel features can be reproduced and understood using a generative mathematical model in which resource allocation to the dominant side is regulated through a feedback loop.
The effects of networking on the extent of cooperation emerging in a competitive setting are studied. The evolutionary snowdrift game, which represents a realistic alternative to the well-known Prisoner s Dilemma, is studied in the Watts-Strogatz network that spans the regular, small-world, and random networks through random re-wiring. Over a wide range of payoffs, a re-wired network is found to suppress cooperation when compared with a well-mixed or fully connected system. Two extinction payoffs, that characterize the emergence of a homogeneous steady state, are identified. It is found that, unlike in the Prisoner s Dilemma, the standard deviation of the degree distribution is the dominant network property that governs the extinction payoffs.
The Debrecen workshop was one of a number held in preparation for the UNESCO-ICSU World Conference on Science, which will be held in Budapest, June 1999. A report representing the views of the workshop, prepared for that conference and containing a number of recommended actions, is included with this summary. The workshop affirmed the ongoing importance of physics for its own sake and as part of our culture, as a key element in our increasingly unified science and as an essential contributor to the solution of environmental and energy problems. The problems faced by physics as an activity and as an educational subject were discussed and actions for both society as a whole and the physics community itself were put forward.
The ever-increasing knowledge of the structure of various real-world networks has uncovered their complex multi-mechanism-governed evolution processes. Therefore, a better understanding of the structure and evolution of these networked complex systems requires us to describe such processes in a more detailed and realistic manner. In this paper, we introduce a new type of network growth rule which comprises addition and deletion of nodes, and propose an evolving network model to investigate the effect of node deleting on network structure. It is found that, with the introduction of node deleting, network structure is significantly transformed. In particular, degree distribution of the network undergoes a transition from scale-free to exponential forms as the intensity of node deleting increases. At the same time, nontrivial disassortative degree correlation develops spontaneously as a natural result of network evolution in the model. We also demonstrate that node deleting introduced in the model does not destroy the connectedness of a growing network so long as the increasing rate of edges is not excessively small. In addition, it is found that node deleting will weaken but not eliminate the small-world effect of a growing network, and generally it will decrease the clustering coefficient in a network.
Detecting community structure in real-world networks is a challenging problem. Recently, it has been shown that the resolution of methods based on optimizing a modularity measure or a corresponding energy is limited; communities with sizes below some threshold remain unresolved. One possibility to go around this problem is to vary the threshold by using a tuning parameter, and investigate the community structure at variable resolutions. Here, we analyze the resolution limit and multiresolution behavior for two different methods: a q-state Potts method proposed by Reichard and Bornholdt, and a recent multiresolution method by Arenas, Fernandez, and Gomez. These methods are studied analytically, and applied to three test networks using simulated annealing.
We propose an extension of the evolutionary Prisoner s Dilemma cellular automata, introduced by Nowak and May \\cite{nm92}, in which the pressure of the environment is taken into account. This is implemented by requiring that individuals need to collect a minimum score $U_{min}$, representing indispensable resources (nutrients, energy, money, etc.) to prosper in this environment. So the agents, instead of evolving just by adopting the behaviour of the most successful neighbour (who got $U^{msn}$), also take into account if $U^{msn}$ is above or below the threshold $U_{min}$. If $U^{msn}<U_{min}$ an individual has a probability of adopting the opposite behaviour from the one used by its most successful neighbour. This modification allows the evolution of cooperation for payoffs for which defection was the rule (as it happens, for example, when the sucker s payoff is much worse than the punishment for mutual defection). We also analyse a more sophisticated version of this model in which the selective rule is supplemented with a \"win-stay, lose-shift\" criterion. The cluster structure is analyzed and, for this more complex version we found power-law scaling for a restricted region in the parameter space.
In order to analyze the dynamics of two languages in competition, one approach is to fit historical data on their numbers of speakers with a mathematical model in which the parameters are interpreted as the similarity between those languages and their relative status. Within this approach, we show here, on the basis of a detailed analysis and extensive calculations, the outcomes that can emerge for given values of these parameters. Contrary to previous results, it is possible that in the long term both languages coexist and survive. This happens only when there is a stable bilingual group, and this is possible only if the competing languages are sufficiently similar, in which case its occurrence is favoured by both similarity and status symmetry.
We analyse the recent rapid growth of  binge  drinking in the UK. This means the consumption of large amounts of alcohol, especially by young people, leading to serious anti-social and criminal behaviour in urban centres. We show how a simple agent-based model, based on binary choice with externalities, combined with a small amount of survey data can explain the phenomenon. We show that the increase in binge drinking is a fashion-related phenomenon, with imitative behaviour spreading across socila networks The results show that a small world network, rather than a random or scale free, offers the best description of the key aspects of the data
A 24-hour exchange market was created on the Web to trade political futures contracts using fictitious money. In this online market, a political futures contract is a futures contract which matures on the election day with a liquidation price determined by the percentage of votes a candidate receives on the election day. Continuous double auctions were implemented as the system for order storage and price discovery. We drew market participants in the form of tournaments in which top traders won cash awards. Such a market was run, with about 400 registered traders, during the U.S. presidential election in November 2004 and Taiwan parliamentary election in December 2004. The experiments recorded transaction price, highest bid, lowest ask, and trading volume of each contract as a function of time. Despite the relatively small scale of the exchange, in terms of the number of participants and duration of the tournament, we report evidence for asymptotic power-law behaviors of the distributions of price returns, trading volumes, inter-transaction time intervals, and accumulated wealth that were found universal in real financial markets.
The representation of complex systems as networks is inappropriate for the study of certain problems. We show several examples of social, biological, ecological and technological systems where the use of complex networks gives very limited information about the structure of the system. We propose to use hypergraphs to represent these systems by introducing the concept of the complex hyper-network. We define several structural measures for complex hyper-networks. These measures characterize hyper-network structures on the basis of node participation in different hyper-edges (groups) and sub-hypergraphs. We also define two clustering coefficients, one characterizing the transitivity in the hyper-network through the proportion of hyper-triangles to paths of length two and the other characterizing the formation of triples of mutually adjacent groups in the hyper-network. All of these characteristics are studied in two different hyper-networks; a scientific collaboration hyper-network and an ecological competence hyper-network.
Synchronization processes in populations of locally interacting elements are in the focus of intense research in physical, biological, chemical, technological and social systems. The many efforts devoted to understand synchronization phenomena in natural systems take now advantage of the recent theory of complex networks. In this review, we report the advances in the comprehension of synchronization phenomena when oscillating elements are constrained to interact in a complex network topology. We also overview the new emergent features coming out from the interplay between the structure and the function of the underlying pattern of connections. Extensive numerical work as well as analytical approaches to the problem are presented. Finally, we review several applications of synchronization in complex networks to different disciplines: biological systems and neuroscience, engineering and computer science, and economy and social sciences.
Perfect synchronicity in $N$-player games is a useful theoretical dream, but communication delays are inevitable and may result in asynchronous interactions. Some systems such as financial markets are asynchronous by design, and yet most theoretical models assume perfectly synchronized actions. We propose a general method to transform standard models of adaptive agents into asynchronous systems while preserving their global structure under some conditions. Using the Minority Game as an example, we find that the phase and fluctuations structure of the standard game subsists even in maximally asynchronous deterministic case, but that it disappears if too much stochasticity is added to the temporal structure of interaction. Allowing for heterogeneous communication speeds and activity patterns gives rise to a new information ecology that we study in details.
Any national cuisine is a sum total of its variety of regional cuisines, which are the cultural and historical identifiers of their respective regions. India is home to a number of regional cuisines that showcase its culinary diversity. Here, we study recipes from eight different regional cuisines of India spanning various geographies and climates. We investigate the phenomenon of food pairing which examines compatibility of two ingredients in a recipe in terms of their shared flavor compounds. Food pairing was enumerated at the level of cuisine, recipes as well as ingredient pairs by quantifying flavor sharing between pairs of ingredients. Our results indicate that each regional cuisine follows negative food pairing pattern; more the extent of flavor sharing between two ingredients, lesser their co-occurrence in that cuisine. We find that frequency of ingredient usage is central in rendering the characteristic food pairing in each of these cuisines. Spice and dairy emerged as the most significant ingredient classes responsible for the biased pattern of food pairing. Interestingly while individual spices contribute to negative food pairing, dairy products on the other hand tend to deviate food pairing towards positive side. Our data analytical study highlighting statistical properties of the regional cuisines, brings out their culinary fingerprints that could be used to design algorithms for generating novel recipes and recipe recommender systems. It forms a basis for exploring possible causal connection between diet and health as well as prospection of therapeutic molecules from food ingredients. Our study also provides insights as to how big data can change the way we look at food.
This report presents the final results of a study,  Evaluation of Networks of Collaboration in IST Research within the European Research Area  (ERAnets), conducted for the European Commission. The ERAnets project developed and applied tools and methods to evaluate the networks of collaboration in information society technologies (IST) within the European Research Area (ERA), focusing on calls 1 and 2 of the Sixth Framework Programme (FP6).
We study opinion dynamics in a population of interacting adaptive agents voting on a set of complex multidimensional issues. We consider agents which can classify issues into for or against. The agents arrive at the opinions about each issue in question using an adaptive algorithm. Adaptation comes from learning and the information for the learning process comes from interacting with other neighboring agents and trying to change the internal state in order to concur with their opinions. The change in the internal state is driven by the information contained in the issue and in the opinion of the other agent. We present results in a simple yet rich context where each agent uses a Boolean Perceptron to state its opinion. If there is no internal clock, so the update occurs with asynchronously exchanged information among pairs of agents, then the typical case, if the number of issues is kept small, is the evolution into a society thorn by the emergence of factions with extreme opposite beliefs. This occurs even when seeking consensus with agents with opposite opinions. The curious result is that it is learning from those that hold the same opinions that drives the emergence of factions. This results follows from the fact that factions are prevented by not learning at all from those agents that hold the same opinion. If the number of issues is large, the dynamics becomes trapped and the society does not evolve into factions and a distribution of moderate opinions is observed. We also study the less realistic, but technically simpler synchronous case showing that global consensus is a fixed point. However, the approach to this consensus is glassy in the limit of large societies if agents adapt even in the case of agreement.
The distribution of votes of one of the corporate parties in Mexico during elections of 2000, 2003 and 2006 is analyzed. After proper normalization and unfolding the agreement of the votes distributions with those of daisy models of several ranks is good. These models are generated by retaining each $r+1$ level in a sequence which follows a Poisson distribution.Beyond the fact that rank 2 daisy model resembles the distribution of the quasi-optimal distances for the Traveling Salesman Problem no clear explanation exists for this behavior, but the agreement is not fortuitous and the possibility of a universal phenomena for corporate vote is discussed.
Agglomeration economies are a persistent subject of debate among economists and urban planners. Their definition turns on whether or not larger cities and regions are more efficient and more productive than smaller ones. We complement existing discussion on agglomeration economies and the urban wage premium here by providing a sensitivity analysis of estimated coefficients to different delineations of urban agglomeration as well as to different definitions of the economic measure that summarises the urban premium. This quantity can consist of total wages measured at the place of work, or of income registered at the place of residence. The chosen option influences the scaling behaviour of city size as well as the spatial distribution of the phenomenon at the city level. Spatial discrepancies between the distribution of jobs and the distribution of households at different economic levels makes city definitions crucial to the estimation of economic relations which vary with city size. We argue this point by regressing measures of income and wage over about five thousands different definitions of cities in France, based on our algorithmic aggregation of administrative spatial units at regular cutoffs which reflect density, population thresholds and commuting flows. We also go beyond aggregated observations of wages and income by searching for evidence of larger inequalities and economic segregation in the largest cities. This paper therefore considers the spatial and economic complexity of cities with respect to discussion about how we measure agglomeration economies. It provides a basis for reflection on alternative ways to model the processes which lead to observed variations, and this can provide insights for more comprehensive regional planning.
We review recent progress made in analyzing the spread of viruses and bugs in the internet. We describe how the use of a model that takes into account the complex inhomogeneity of the internet and its self organizing characteristics can lead to a better understanding of the persistence of some viruses compared to others. We discuss how a better understanding can lead to a more targetted antiviral and anti-bug solution.
Community detection is an important research topic in complex networks. We present the employment of a genetic algorithm to detect communities in complex networks which is based on optimizing network modularity. It does not need any prior knowledge about the number of communities. Its performance is tested on two real life networks with known community structures and a set of synthetic networks. As the performance measure an information theoretical metric variation of information is used. The results are promising and in some cases better than previously reported studies.
Many mechanisms for the emergence and maintenance of altruistic behavior in social dilemma situations have been proposed. Indirect reciprocity is one such mechanism, where other-regarding actions of a player are eventually rewarded by other players with whom the original player has not interacted. The upstream reciprocity (also called generalized indirect reciprocity) is a type of indirect reciprocity and represents the concept that those helped by somebody will help other unspecified players. In spite of the evidence for the enhancement of helping behavior by upstream reciprocity in rats and humans, theoretical support for this mechanism is not strong. In the present study, we numerically investigate upstream reciprocity in heterogeneous contact networks, in which the players generally have different number of neighbors. We show that heterogeneous networks considerably enhance cooperation in a game of upstream reciprocity. In heterogeneous networks, the most generous strategy, by which a player helps a neighbor on being helped and in addition initiates helping behavior, first occupies hubs in a network and then disseminates to other players. The scenario to achieve enhanced altruism resembles that seen in the case of the Prisoner s Dilemma game in heterogeneous networks.
The first Congress on North-South collaboration in Physics research was held in Oujda Morocco, between April 9th and 13th, 2007. The congress was based on talks giving an overview of relevant subjects both from experiments and theory in all fields of physics. They focused on projects which could bring fruitful collaborations between Europe and under developed countries. The congress was meant to bring experience and skills to these countries in research and teaching at the doctoral level.
In this paper, we study two large data sets containing the information of two different human behaviors: blog-posting and wiki-revising. In both cases, the interevent time distributions decay as power-laws at both individual and population level. As different from previous studies, we put emphasis on time scales and obtain heterogeneous decay exponents in intra- and inter-day range for the same dataset. Moreover, we observe opposite trend of exponents in relation to individual $Activity$. Further investigations show that the presence of intra-day activities mask the correlation between consecutive inter-day activities and lead to an underestimate of $Memory$, which explain the contradicting results in recent empirical studies. Removal of data in intra-day range reveals the high values of $Memory$ and lead us to convergent results between wiki-revising and blog-posting.
We introduce two time: deterministic Newton time-stream t and stochastic time-epoch $\\tau$. The relation of uncertainty for time-epoch of physical events $\\Delta\\tau\\Delta D \\geq c_1,\\eqno(*)$ where $c_1=const$, is proved. The function $D(t)= - c_1\\frac{d}{dt}\\ln f_\\tau (t),$ characterizes {\\it velocity of disorganization} of the event-phenomena; $f_\\tau (t)$ is density of probability of time-epoch $\\tau$. The relation (*) is verified not by means of experiment that is traditional for physics, but with the help of the reference to datas of historical science.
1: New approach to theory of light refraction 1.1. Refraction in gas; 1.2. Light refraction in liquids and solids 2: Mesoscopic theory of Brillouin light scattering 2.1. Traditional approach; 2.2. Fine structure of scattering; 2.3. Mesoscopic approach; 2.4. Quantitative verification of hierarchic theory of Brillouin scattering 3: Mesoscopic theory of Mossbauer effect 3.1. General background; 3.2. Probability of elastic effects; 3.3. Doppler broadening in spectra nuclear gamma-resonance (NGR) 3.4. Acceleration and forces, related to thermal dynamics of molecules and ions. Vibro-gravitational interaction
A new model of gravastar is obtained in $D$-dimensional Einstein gravity. This class of solutions includes the gravastar as an alternative to D-dimensional versions of the Schwarzschild-Tangherlini black hole. The configuration of this new gravastar consists of three different regions with different equations of state: [I] Interior: 0 \\leq r < r_1, \\rho = -p; [II] Shell: r_1 \\leq r < r_2, \\rho = p; [III] Exterior: r_2 < r, \\rho = p =0. The outer region of this gravastar corresponds to a higher dimensional Schwarzschild-Tangherlini black hole.
The Hybrid Composite Beam (HCB) system is an innovative structural technology that has been recently used in bridge construction within the U.S. transportation network. In this system, the superstructure consists of a conventional reinforced concrete deck supported by Hybrid Composite Beams. Each beam is comprised of a glassfiber reinforced polymer (FRP) box shell containing a tied parabolic concrete arch. Inclined stirrups provide shear integrity and enforce composite action between the HCBs and the concrete deck. This paper focuses on evaluating the in-service performance of a newly constructed HCB bridge superstructure located on Route 205 in Colonial Beach, Virginia. A live load test was conducted using tandem axle dump trucks under both quasi-static and dynamic conditions. Results obtained from the experimental investigation were used to determine three key behavior characteristics. Dynamic amplification and lateral load distribution were found to be reasonable in comparison to the assumed design values. The testing program also included internal and external measurement systems to help characterize the load sharing behavior of the HCB on an element level. The main load carrying elements are the deck in compression and the steel ties in tension, and the FRP shell did not act compositely with the internal components.
The off-site continuums are proposed for the cosmological models of the galaxies and the Universe. It is shown that many visual properties of galaxies and the Universe may be described on frames of the off-site continuums methodology. In cosmological scale, the appearance of off-site objects is quite similar to the influence of the  dark matter  and the  dark energy . Analogies to known relic radiation also look through. It is discussed few possible models of galaxies and the Universe. Such point of view may appear useful for the investigation of conceptual problems of modern cosmology.
It is shown that Einstein s field equations for \\emph{all} perfect-fluid $k=0$ FLRW cosmologies have the same form as the topological normal form of a fold bifurcation. In particular, we assume that the cosmological constant is a bifurcation parameter, and as such, fold bifurcation behaviour is shown to occur in a neighbourhood of Minkowski spacetime in the phase space. We show that as this cosmological constant parameter is varied, an expanding and contracting de Sitter universe \\emph{emerge} via this bifurcation.
Filtering of digital signals is accomplished on an Excel spreadsheet using fast Fourier transform (FFT) convolution in which the kernel is either a Gaussian or a cosine modulated Gaussian. Pedagogical examples of low-pass and band-pass filtering are provided, and the practical value of the spreadsheet is illustrated with some cases involving an earthquake record generated by a folded pendulum seismometer.
This paper continues the author s work \\cite{PartI}, where a new framework of the matter-induced physical geometry was built and an intrinsic nonlinearity of the Dirac equation discovered. Here, the nonlinear Dirac equation is solved and the localized configurations are found analytically. Of the two possible types of the potentially stationary localized configurations of the Dirac field, only one is stable with respect to the action of an external field and it corresponds to a positive charge. A connection with the global charge asymmetry of matter in the Universe and with the recently observed excess of the cosmic positrons is discussed.
The problem of the motion of a charged particle in an electric dipole field is used to illustrate that the Hamilton-Jacobi method does not necessarily give all solutions to the equations of motion of a mechanical system. The mathematical reason for this phenomenon is discussed. In the particular case under consideration, it is shown how to circumvent the difficulty and find the missing solutions by means of a very special limiting procedure.
In unified field theory the cosmological model of the universe has supersymmetric fields. Supersymmetric particles as dark and normal matter in galaxy clusters have a phase separation. Dark matter in halos have a statistical physics equation of state. Neutralino particle gas with gravitation can have a collapse of dark matter lumps. A condensate phase due to boson creation by annhillation and exchange can occur at high densities. The collapse of the boson condensate, including neutralinos, into the Schwarzschild radius creates dark matter black holes. Microscopic dark matter black holes can evaporate with Hawking effect giving gamma ray bursts and create a spectrum of normal particles. The phase separation of normal and dark matter in galaxy clusters and inside galaxies is given by statistical physics.
The principle of least action provides a holistic worldview in which nature in its entirety and every detail is pictured in terms of actions. Each and every action is ultimately composed of one or multiples of the most elementary action which corresponds to the Planck s constant. Elements of space are closed actions, known as fermions, whereas elements of time are open actions, known as bosons. The actions span energy landscape, the Universe which evolves irreversibly according to the 2nd law of thermodynamics by diminishing density differences in least time. During the step-by-step evolution densely-curled actions unfold by opening up and expelling one or multiple elementary actions to their surrounding sparser space. The manifold s varieties process from one symmetry group to another until the equivalence to their dual, i.e., the surrounding density has been attained. The scale-free physical portrayal of nature does not recognize any fundamental difference between fundamental particles and fundamental forces. Instead a plethora of particles and a diaspora of forces are perceived merely as diverse manifestations of a natural selection for various mechanisms and ways to decrease free energy in the least time.
The new dynamical theory of space is further confirmed by showing that the black hole masses M_BH in 19 spherical star systems, from globular clusters to galaxies with masses M, satisfy the prediction that M_BH=(alpha/2)M, where alpha is the fine structure constant. As well the necessary and unique generalisations of the Schrodinger and Dirac equations permit the first derivation of gravity from a deeper theory, showing that gravity is a quantum effect of quantum matter interacting with the dynamical space. As well the necessary generalisation of Maxwell s equations displays the observed light bending effects. Finally it is shown from the generalised Dirac equation where the spacetime mathematical formalism, and the accompanying geodesic prescription for matter trajectories, comes from. The new theory of space is non-local and we see many parallels between this and quantum theory, in addition to the fine structure constant manifesting in both, so supporting the argument that space is a quantum foam system, as implied by the deeper information-theoretic theory known as Process Physics. The spatial dynamics also provides an explanation for the `dark matter  effect and as well the non-locality of the dynamics provides a mechanism for generating the uniformity of the universe, so explaining the cosmological horizon problem.
The conventional economic approaches explore very little about the dynamics of the economic systems. Since such systems consist of a large number of agents interacting nonlinearly they exhibit the properties of a complex system. Therefore the tools of statistical physics and nonlinear dynamics has been proved to be very useful the underlying dynamics of the system. In this paper we introduce the concept of the multidisciplinary field of econophysics, a neologism that denotes the activities of Physicists who are working on economic problems to test a variety of new conceptual approaches deriving from the physical science and review the recent developments in the discipline and possible future trends.
Caratheodory s axiomatic formulation of the second law is considered as one of the standard forms of formulation of the law. However, it was mired in advanced mathematics. The formulation was strongly criticized by Max Planck, for it was based on the analysis of adiabatic processes and adiabatic accessibility. A thermodynamic process is said to be possible only if it satisfies both first law and the second law. A process is said to violate the second law only when it satisfies the first law, and violate the second law. We show here that violation of Caratheodory principle of the second law violates the first law itself. In other words, adiabatic inaccessibility arises only as a consequence of violation of the first law. This we demonstrate by assuming, in contradiction to Caratheodory s principle, that the states considered adiabatically inaccessible as adiabatically accessible, and prove that the assumption leads to no paradox - thereby showing that the adiabatic inaccessibility arises as a result of violation of the first law.
From the hypothesis of a quadratic dependence of the binding energy of the quarks on the length scale and from the idea of a universal running coupling constant, we get the closure mass of the Universe and the pion mass. Besides this, we propose a free energy for the pions which stationarity condition leads to a closed form for the pion mass as a function of the Planck mass and of the Hubble constant.
In the paper being commented on it is proposed a new method for the detection of the electron EDM using the solid GdIG. There, it is argued that a sample electric polarization appears when the sample is magnetized; the common belief is that the electron EDM must be collinear with its magnetic moment. All this is objected and it is suggested that the polarization of the sample can be explained by the direct, Lorentz covariant, interaction between B^{a} and an EDM d^{a}.
At the core of the Ouroboros Model lies a self-referential recursive process with alternating phases of data acquisition and evaluation. Memory entries are organized in schemata. Activation at a time of part of a schema biases the whole structure and, in particular, missing features, thus triggering expectations. An iterative recursive monitor process termed  consumption analysis  is then checking how well such expectations fit with successive activations. A measure for the goodness of fit, \"emotion\", provides feedback as (self-) monitoring signal. Contradictions between anticipations based on previous experience and actual current data are highlighted as well as minor gaps and deficits. The basic algorithm can be applied to goal directed movements as well as to abstract rational reasoning when weighing evidence for and against some remote theories. A sketch is provided how the Ouroboros Model can shed light on rather different characteristics of human behavior including learning and meta-learning. Partial implementations proved effective in dedicated safety systems.
The inherently homogeneous stationary-state and time-dependent Schroedinger equations are often recast into inhomogeneous form in order to resolve their solution nonuniqueness. The inhomogeneous term can impose an initial condition or, for scattering, the preferred permitted asymptotic behavior. For bound states it provides sufficient focus to exclude all but one of the homogeneous version s solutions. Because of their unique solutions, such inhomogeneous versions of Schroedinger equations have long been the indispensable basis for a solution scheme of successive perturbational corrections which are anchored by their inhomogeneous term. Here it is noted that every such perturbational solution scheme for an inhomogeneous linear vector equation spins off a nonperturbational continued-fraction scheme. Unlike its representation-independent antecedent, the spin-off scheme only works in representations where all components of the equation s inhomogeneous term are nonzero. But that requirement seems to confer theoretical physics robustness heretofore unknown: for quantum fields the order of the perturbation places a bound on unperturbed particle number, the spin-off scheme contrariwise has only basis elements of unbounded unperturbed particle number. It furthermore is difficult to visualize such a continued-fraction spin-off scheme generating infinities, since its successive iterations always go into denominators.
An interdisciplinary physical theory of emergent consciousness has previously been proposed, stemming from quantum computation-like behavior between 10^9 or more entangled molecular qubit states (microtubulin). This model relies on the Penrose-Diosi gravity-driven wavefunction collapse framework, and thus is subject to any secondary classical and quantum gravity effects. Specifically, if large extra spatial dimensions exist in the Universe, then the resulting corrections to Newtonian gravity cause this model to suffer serious difficulties. It is shown that if the extra dimensions are larger than 100 fm in size, then this model of consciousness is unphysical. If the dimensions are on the order of 10 fm in size, then a significantly smaller number of microtubulin than originally predicted are required to satisfy experimental constraints. Some speculation on evolution of consciousness is also offered, based on the possibility that the size of these extra dimensions may have been changing over the history of the Universe.
We revisit high energy Fermions and their behaviour, in the light of latest ideas from Quantum Gravity approaches and also from an alternative view. Some new consequences are discussed. All this would be important in view of the fact that the LHC has already attained $7 TeV$ and hopefully will attain its full energy $14 TeV$ by sometime in 2013. We also examine some extra relativistic effects like the recently discovered super luminal neutrino and the nature of gravitation in this context.
Dark energy is a fundamental constituent of our universe, its status in the cosmological field equation should be equivalent to that of gravity. Here we construct a dark energy and matter gravity coupling (DEMC) model of cosmology in a way that dark energy and gravity are introduced into the cosmological field equation in parallel with each other from the beginning. The DEMC universe possesses a composite symmetry from global Galileo invariance and local Lorentz invariance. The observed evolution of the universe expansion rate at redshift z>1 is in tension with the standard LCDM model, but can be well predicted by the DEMC model from measurements of only nearby epochs. The so far most precise measured expansion rate at high z is quite a bit slower than the expectations from LCDM, but remarkably consistent with that from DEMC. It is hoped that the DEMC scenario can also help to solve other existing challenges to cosmology: large scale anomalies in CMB maps and large structures up to about 10^3 Mpc of a quasar group. The DEMC universe is a well defined mechanical system. From measurements we can quantitatively evaluate its total rest energy, present absolute radius and expanding speed.
New varying speed of light (VSL) theories as alternatives to the inflationary model of the universe are discussed and evidence for a varying speed of light reviewed. Work linked with VSL but primarily concerned with deriving Planck s black body energy distribution for a gas-like aether using Maxwell statistics is considered also. Doubly Special Relativity, a modification of special relativity to account for observer dependent quantum effects at the Planck scale, is introduced and it is found that a varying speed of light above a threshold frequency is a necessity for this theory.
The postulate that all massless elementary fields have conformal Weyl local scaling symmetry has remarkable consequences for both cosmology and elementary particle physics. Conformal symmetry couples scalar and gravitational fields. Implications for the scalar field of a conformal Higgs model are considered here. The energy-momentum tensor of a conformal Higgs scalar field determines a cosmological constant. It has recently been shown that this accounts for the observed magnitude of dark energy. The gravitational field equation forces the energy density to be finite, which precludes spontaneous destabilization of the vacuum state. Scalar field fluctuations would define a Higgs tachyon rather than a massive particle, consistent with the ongoing failure to observe such a particle.
Attempts to merge Einsteinian gravity with Newtonian run into inconsistencies because in Newton s gravity time is absolute and the speed of gravity is infinite. Such an assumption was in a focus of attention of scientists in 19th century interested in finding out if the speed of gravity is infinite. By analogy with electrodynamics, some retarded potentials replacing Newtonian were utilized. By using one of such potentials Gerber correctly calculated the perihelion shift for Mercury in 1902. Subsequent attempts at calculation of bending of light using Gerber-style calculations were not successful. Recently Gin\\ e (Chaos, Solitons and Fractals 42, 1893 (2009)) reobtained both the perihelion shift and the bending of light using retarded potential. His equations however are not those obtained by Einstein and his results coincide with those by Einstein only at the level of leading order terms of infinite series expansions. The obtained differential equations of motion are of delay-type. When applied to two-body dynamics, such equations lead to orbital quantization. In this work the Einsteinian approach is used to reproduce this quantization. Numerous arguments justifying the superiority of Einsteinian approach, including uses of the Bertrand spacetimes for description of motion of stars around galactic centers are provided. The developed formalism is tested by calculating the number of allowed stable orbits for planets and those for regular satellites of heavy planets resulting in reasonable agreement with observational data. The paper also discusses possible quantum mechanical nature of rings of heavy planets as well as of rotation curves of stars in spiral galaxies.
A calculus based on pointer-mark coincidences is proposed to define, in a mathematically rigorous way, measurements of space and time intervals. The connection between such measurements in different inertial frames according to the Galilean or Lorentz transformations is then studied using new, simple, and practical clock synchronisation procedures. It is found that measured length intervals are Lorentz invariant, whereas moving clocks show a universal time dilatation effect. The `relativistic length contraction  and `relativity of simultaneity  effects of conventional special relativity theory are shown to be the consequence of calculational error. Two derivations of the Lorentz transformation from simple postulates, without reference to electrodynamics or any other dynamical theory, are reviewed in an appendix.
The contemporary scientific and technological progress has been given fully by the results of classical mechanics from the 19th century when the so called European values were accepted practically by the whole educated world. The given results and conclusions were gained on the basis of causal ontological approach proposed in principle by Socrates and developed further by Aristotle. This approach has been, however, fully extruded by phenomenological approach in the 20th century, which has disallowed practically any other actually scientific progress; three very different theories having been applied to physical reality now: classical mechanics in standard macroscopic region, Copenhagen quantum mechanics in microscopic region, and special theory of reality in both the regions in the case of systems consisting of objects having higher velocity values. Any explanation or description of transitions between different regions and between different theories have not been provided until now. The corresponding evolution in the modern period will be described and some mistaking assumptions and statements existing in today s scientific system will be presented. It will be then demonstrated that one common theory for all regions of reality may exist that will be based fully on Hamilton equations (only the law of force of Newton is to be generalized). Only time change of particle impulse (not directly acceleration) is to be determined by a corresponding force. All necessary characteristics of physical reality may be derived in such a case.
Discussion of the constancy, or otherwise, of the various so-called universal constants which abound in physics has continued for many years. However, relatively recent observations, which appear to indicate a variation in the value of the fine structure constant, have reignited the subject. These observations relate to quasars and that in itself raises questions. Also, since many of the arguments utilise the Bekenstein-Hawking expression for the entropy of a black hole, further controversy is introduced into the discussion immediately. In what follows these two points will be examined and some less well-known theoretical considerations introduced which, hopefully, will instigate wider examination of this topic.
The paper discusses some scalar invariants in the gravitational field and electromagnetic field by means of the characteristics of the quaternions. When we emphasize some definitions of quaternion physical quantities, the speed of light, mass density, energy density, power density, charge density, and spin magnetic moment density etc. will remain the same respectively in the gravitational and electromagnetic fields under the coordinate transformation. The results explain why there are some relationships among different invariants in the gravitational and electromagnetic fields.
It is pointed out that the traditional explanation for the observation of a non-zero energy h nu for light in free space does not apply for the analogous situation in dispersive media. Because the speed of light u is no longer equal to c in this case, the key quantity, gamma = (1-u2/c2)-0.5, is finite as a result. Since the rest energy of photons is believed to always be equal to zero, multiplying it with gamma in analogy to the usual procedure employed in the special theory of relativity (STR) does not produce a nonzero result for photons in dispersive media. The experimental evidence of the Fizeau light-drag and Cerenkov radiation phenomena indicate that the Lorentz transformation in free space is nonetheless valid for light in dispersive media. Instead, the energy and momentum of photons in transparent media can be obtained from observations of the frequency, wavelength and index of refraction of the light. A modification of the Lorentz transformation in which the observed speed of light does appear explicitly is required, however, in order to accurately predict the results of measurements made when the observer is at a different gravitational potential than the object.
One of the most distinguished features of our algebraic geometrical, pencil concept of space-time is the fact that spatial dimensions and time stand, as far as their intrinsic structure is concerned, on completely different footings: the former being represented by pencils of lines, the latter by a pencil of conics. As a consequence, we argue that even at the classical (macroscopic) level there exists a much more intricate and profound coupling between space and time than that dictated by (general) relativity theory. It is surmised that this coupling can be furnished by so-called Cremona (or birational) transformations between two projective spaces of three dimensions, being fully embodied in the structure of configurations of their fundamental elements. We review properties of some of the simplest Cremona transformations and show that the corresponding \"fundamental\" space-times exhibit an intimate connection between the extrinsic geometry of time dimension and the dimensionality of space. Moreover, these Cremonian space-times seem to provide us with a promising conceptual basis for the possible reconciliation between two extreme concepts of (space-)time, viz. physical and psychological. Some speculative remarks in this respect are made.
The speed of gravity is an important universal constant. But, it has not been directly known with experiment or observation. The explanations for it are contradicted with each other. Here, it is presented that the interaction and propagation of the gravitational field could be tested and understood by comparing the measured speed of gravitational force with the measured speed of Coulomb force. A design to measure the speeds of gravitational and Coulomb force is presented. From satellite motions, it is observed that the speed of gravitational force is larger than the speed of light in a vacuum. From this observation and the recent experiments, the structure of electric and gravitational fields is studied. A line to indirectly test the wavelengths of gravitational waves is presented.
The work is devoted to the critical analysis of theoretical prediction and astronomical observation of GR effects, first of all, the Mercury s perihelion advance. In the first part, the methodological issues of observations are discussed including a practice of observations, a method of recognizing the relativistic properties of the effect and recovering it from bulk of raw data, a parametric observational model, and finally, methods of assessment of the effect value and statistical level of confidence. In the second part, the Mercury s perihelion advance and other theoretical problems are discussed in relationship with the GR physical foundations. Controversies in literature devoted to the GR tests are analyzed. The unified GR approach to particles and photons is discussed with the emphasis on the GR classical tests. Finally, the alternative theory of relativistic effect treatment is presented.
Herein the Casimir effect is used to present a simple macroscopic view on creating exotic matter. The energy arising between two nearly perfectly conducting parallel plates is shown to become increasingly negative as the plate separation is reduced. It is proposed that the Casimir energy appears increasingly negative simply because the vacuum electromagnetic zero-point field performs positive work in pushing the plates together, transforming field energy into kinetic energy of the plates. Next, the inertial properties of exotic matter are considered. The parallel plates of the Casimir system are replaced with an enclosed cavity of identical dimensions that is subjected to an external force. It is found that zero-point radiation exerts an inertial force on the cavity in opposition to the external force. This ultimately leads to the conclusion that the inertial properties of exotic matter are identical to the inertial properties of ordinary matter.
As it is well known, a consistent theory of faster-than-light particles (tachyons) can be built within the Lorentz-covariant approach only, invoking a concept of the preferred reference frame. This is a mandatory condition imposed by the requirement of the causality conservation. In this note some features of a Lorentz-violating (but Lorentz-covariant) Lagrangian of a scalar tachyon field are considered. It is shown that the equation of motion and the Feynman propagator resulting from it are Lorentz-invariant, while the Lorentz symmetry of the suggested tachyon field model can be defined as spontaneously broken.
Based on the Coulomb gauge, the accurate Klein-Gordon equation in static scalar and vector potentials was derived from Klein-Gordon equation in electromagnetic environment. The correct equation developed in this comment demonstrates that so-called the Klein-Gordon equation with scalar and vector potentials is incorrect; therefore, some papers published to solve Klein-Gordon equation with equal scalar and vector potential are also wrong.
Isaac Newton is usually associated with the idea of absolute space and time, and with ballistic light-corpuscle arguments. However, Newton was also a proponent of wave/particle duality, and published a \"new\" variable-density aether model in which light and matter trajectories were either bent by gravitational fields, or deflected by an aether density gradient. Newton s (flawed) aether model can be considered as an early attempt at a curved-space model of gravity.
Physical meaning and a duality of concepts of wave function, action functional, entropy, the Pointing vector, the Einstein tensor and so on can be disclosed by investigating the state of material systems such as thermodynamic and gas dynamic systems, systems of charged particles, cosmologic systems and others. These concepts play a same role in mathematical physics. They are quantities that specify a state of material systems and also characteristics of physical fields. The duality of these concepts reveals in the fact that they can at once be both functionals and state functions or potentials. As functionals they are defined on nonintegrable manifold (for example, on tangent one), and as a state function they are defined on integrable manifold (for example, on cotangent one). The transition from functionals to state functions dicribes the mechanism of physical structure origination. The properties of these concepts can be studied by the example of entropy and action. The role of these concepts in mathematical physics and field theory will be demonstrated. Such results have been obtained by using skew-symmetric forms. In addition to exterior forms, the skew-symmetric forms, which are obtained from differential equations and, in distinction to exterior forms, are evolutionary ones and are defined on nonintegrable manifolds, were used.
The standard Lorentz transformations establish a relationship between the space-time coordinates of the same event when detected from two inertial reference frames I and I  in the standard arrangement. This event is characterized by the space-time coordinates E(x,tE) and E (x ,t E), tE and t E representing the readings of the standard synchronized clocks C(x) and C (x ) located in the two frames where the event takes place. We obtain the nonstandard Lorentz transformations establishing a \"physically\" correct relationship between the readings of the standard synchronized clocks and the readings of other clocks (ta,t a) of the same inertial reference frames. This relationship of the type tE=f(x,ta), expresses the standard Lorentz transformations as a function of ta and t a respectively. We present several cases of nonstandard Lorentz transformation (the case of radar detection, the case when one reference frame is filled with an ideal transparent dielectric and the case of relativity of the apparent, actual and synchronized positions of the same moving particle).
We discuss materials which owe their stability to external fields. These include: 1) external electric or magnetic fields, and 2) quantum vacuum fluctuations in these fields induced by suitable boundary conditions (the Casimir effect). Instances of the first case include the floating water bridge and ferrofluids in magnetic fields. An example of the second case is taken from biology where the Casimir effect provides an explanation of the formation of stacked aggregations or \"rouleaux\" by negatively charged red blood cells. We show how the interplay between electrical and Casimir forces can be used to drive self-assembly of nano-structured materials, and could be generalized both as a probe of Casimir forces and as a means of manufacturing nanoscale structures. Interestingly, all the cases discussed involve the generation of the somewhat exotic negative pressures. We note that very little is known about the phase diagrams of most materials in the presence of external fields other than those represented by the macroscopic scalar quantities of pressure and temperature. Many new and unusual states of matter may yet be undiscovered.
Local inertial frame invariance is taken as the fundamental principle of physical geometry, where a local inertial frame is represented by a verbein. Invariance of the vierbein with respect to local Lorentz transformations then expresses local inertial frame invariance. The dynamics of physical geometry develops as a gauge theory of the verbein that is closely analogous to the Yang-Mills field provided the verbein connection and curvature correspond to the geometric potential and field respectively. The resulting theory is shown to be equivalent to Einstein s tensor form of relativistic gravitation.
Experimental plots of the fraction of detected electrons removed from the zero-loss peak, versus the fraction of incident electrons scattered outside of the objective aperture, can serve as a robust fingerprint of object-contrast in an energy filtered transmission electron microscope (EFTEM). Examples of this, along with the first in a series of models for interpreting the resulting patterns, were presented at the August 2010 meeting of the Microscope Society of America meeting in Portland, Oregon, and published in {\\em Microscopy and MicroAnalysis} {\\bf 16}, Supplement 2, pages 1534-1535 by Cambridge University Press.
It is shown in this paper that the geometrically structureless spacetime manifold is converted instantaneously to a curved one, the Riemannian or may be a Finslerian spacetime with an associated Riemannian spacetime, on the appearance of quantum Weyl spinors dependent only on time in that background flat manifold and having the sympleic property in the abstract space of spinors. The scenario depicts simultaneous emergence of the gravity in accord with general relativity and quantum mechanics.The emergent gravity leads to the generalized uncertainty principle, which in turn, ushers in discrete space time. The emerged space time is specified here as to be Finslerian and the field equation in that space time has been obtained from the classical one due to the arising quantized space and time. From this field equation we find the quantum field equation for highly massive (of the Planck order) spinors in the associated Riemannian space of the Finsler space, which is in fact, the background FRW space time of the universe.These highly massive spinors provide the mass distribution complying Einstein equivalence principle. All these occurred in the indivisible minimum time considered as zero time or spontaneity.
We investigate plane symmetric space-time filled with perfect fluid in the $C$-field cosmology of Hoyle and Narlikar. A new class of exact solutions have been obtained by considering the creation field $C$ as a function of time only. To get the deterministic solution, it has been assumed that the rate of creation of matter-energy density is proportional to the strength of the existing $C$-field energy density. Several physical aspects and geometrical properties of the models are discussed in detail, especially it is shown that some of our solutions of $C$-field cosmology are free from singularity in contrast to the Big Bang cosmology. A comparative study has been carried out between two models, one singular and the other nonsingular, by contrasting the behaviour of the physical parameters and noted that the model in a unique way represents both the features of the accelerating as well as decelerating Universe depending on the parameters and thus seems provides glimpses of the oscillating or cyclic model of the Universe without invoking any other agent or theory in allowing cyclicity.
Results of experimental investigations of a new assumed interaction in nature with the aid of high-current magnets, torsion and piezoresonance balances, high-precision gravimeter, fluctuations in intensity of betta-decay of radioactive elements, plasma devices and manifestations in astrophysics are presented. A possible explanation of the results obtained based on a hypothesis of global anisotropy of physical space caused by the existence of a cosmological vectorial potential A_g, is given. It is shown that the vector A_g has the following coordinates in the second equatorial coordinate system: right ascension alpha = 293 +- 10, declination delta = 36 +- 10.
It is shown that a chiral SU(2) model can break Lorentz symmetry spontaneously at the Lagrangian level when gauge bosons become massive. This model seems to propose the principles and conceptual foundations leading to a unified picture of fermions, and may reduce the standard theory to a far simpler form. The model suggests describing leptons and quarks as quasi-excitations, while electromagnetic and strong interactions as secondary interactions mediated by Nambu-Goldstone bosons originating from spontaneous violations of global SU(2) and rotational symmetries. Both the possibility of observing Lorentz-violating phenomena and their magnitudes are discussed. The model also provides an alternative scenario for baryon and lepton asymmetries of the Universe.
This manuscript is devoted to investigate Bianchi Type $I$ universe in the context of $f(R,T)$ gravity. For this purpose, we explore the exact solutions of locally rotationally symmetric Bianchi type $I$ spacetime. The modified field equations are solved by assuming expansion scalar $\\theta$ proportional to shear scalar $\\sigma$ which gives $A=B^n$, where $A,,B$ are the metric coefficients and $n$ is an arbitrary constant. In particular, three solutions have been found and physical quantities are calculated in each case.
A physical metric is defined as one which gives a measurable speed of light throughout the whole space time continuum. It will be shown that a metric which satisfies the condition that speed of light on the spherical direction is that in a vacuum gives a correct result. All the metric functions thus obtained are positive definite and exhibits a repulsive force at short distances. The horizon in the sense of vanishing of the speed of light still exists in the radial direction. It is located at 2.60 times of the Schwarzschild radius. This radius corresponds to the size of a black hole, as well as the photon sphere radius. The metric can be used to calculate general relativistic predictions in higher order for any process.
This paper develops a cosmological hypothesis based on the following propositions: 1. Zero-point radiation derives from quantic fluctuations in space, and the wavelength of its photons with the greatest energy is inversely proportional to the curvature of space. 2. The Universe began as the breaking in of photons of extremely high energy contained in the 3-dimensional surface: $w^2+x^2+y^2+z^2=R^2_i$, whose radius has continued to expand at the speed of ligth since its origin at $t=0$. 3. The wavelength of the photons is quantized and the quantum of wavelength is invariable. These propositions imply that the value of the total energy of the zero-point radiation in the Universe remains constant and the condition $w^2 + x^2 + y^2 + z^2 = (R_i + ct)^2 = R_u^2$ determines that every point in our space is subject to a tension whose intensity $i$ is proportional to the curvature $1/R_u$. Any increase of $R_u$ implies a decrease in $i$ and consequently an energy flow which translates into an expansive force. Therefore, the Universe will expand indefinitely: no Big Crunch is possible. If the initial radius of the Universe $R_i$ has been smaller than the Schwarzschild radius, $R_s$, which corresponds to the total mass of the Universe, $M_u$, the generation of matter would have lasted for thousands of millions of years. Generation of matter over short periods would have required values for $R_i$ of thousands of millions of light years.
Based on an extended time-space symmetry, a cylindrical model of gravitational geometrical dynamics with two time-like extra-dimensions leads to a microscopic geodesic description of the curved space-time. Due to interaction of a Higgs-like cosmological potential with individual space-time fluctuations, the original time-space symmetry is spontaneously broken, inducing a strong time-like curvature and a weak space-like deviation curve. As a result, the basic Klein-Gordon-Fock equation of a free massive elementary particle was derived, which implies a duality between the quantum mechanics equation and a microscopic geodesic description in the frame of general relativity. Consequently, Heisenberg inequalities are determined explicitly by the space-time curvatures. Moreover, extending curvatures to higher time-like dimensional hyper-spherical surfaces than one of the basic common cylindrical configuration, we found reasonable mass ratios of all charged leptons and succeeded to fix the number of their generations to be three. Following to concepts of the standard cosmological model, a possible experimental verification of mass ratio variation is proposed.
The results of long-term (two-year) experimental observations of frequencies of two quartz resonators, one of which is placed in special magnetic system that creates vector potential field, another (calibration one) is placed outside this system, have been presented. Changes with different periodicity: 24 h, high-definite 7 days complex-form period, 27 days and year periods were detected during the observation of differences of these quartz resonators frequencies. The tangents which have been drawn to a terrestrial parallel at the moment of near-daily observation of measured quantity minima form the basic, most powerful subset of directions of tangents having a sharp corner with dipole component of vector potential of the Sun  magnetic field in a range from $50^\\circ$ up to $80^\\circ$ at annual rotation of laboratory around the Sun together with the Earth. Also there are three subsets of directions similarly drawn tangents fixed in physical space that coincide with similar subsets of tangents directions drawn in the same way to points of radioactive elements $\\beta$-decay count rate minimum under the long $\\beta$-decay research during daily and annual rotation of laboratory together with the Earth. It is necessary to point out that the form of the curves of quartzes frequencies difference changes in scales of the 7-day s period with reliability coincides next year, and observable minima of frequencies in co-phase points of space coincide to within several tens minutes. It is shown that the amplitude of the signal was $5\\div10$ times lesser in the period from 20-th, July, till 20-th, January, than from 20-th, January, till 20-th, July.
Matter waves were discovered in the early 20th century from their wavelength, predicted by DeBroglie, Planck s constant divided by the particle s momentum, that is, lmw = h/mv. But, the failure to obtain a reasonable theory for the matter wave frequency resulted somewhat in loss of further interest. It was expected that the frequency of the matter wave should correspond to the particle kinetic energy, that is, fmw = 1/2mv^2/h but the resulting velocity of the matter of the particle, v = fmw x lmw, is that the matter wave moves at one half the speed of the particle, obviously absurd as the particle and its wave must move together. If relativistic mass is used (as it should in any case) the problem remains, the same mass appearing in numerator and denominator and canceling. It is no help to hypothesize that the total energy, not just the kinetic energy, yields the matter wave. That attributes a matter wave to a particle at rest. It also gives the resulting velocity as c^2/v, the wave racing ahead of its particle. A reinterpretation of Einstein s derivation of relativistic kinetic energy (which produced his famous E = mc^2) leads to a valid matter wave frequency and a new understanding of particle kinetics and of the atom s stable orbits.
The concept of walking wave is introduced from classical relativistic positions. One- and three-dimensional walking waves considered with their wave equations and dispersion equations. It is shown that wave characteristics (de Broglie s and Compton s wavelengths) and corpuscular characteristics (energy-momentum vector and the rest mass) of particle may be expressed through parameters of walking wave. By that the new view on a number concepts of physic related with wave-particle duality is suggested.
It is demonstrated that any statistics can be represented by an attractor of the solution to a corresponding systen of ODE coupled with its Liouville equation. Such a non-Newtonian representation allows one to reduce foundations of statistics to better established foundations of ODE. In addition to that, evolution to the attractor reveals possible micro-mechanisms driving random events to the final distribution of the corresponding statistical law. Special attention is concentrated upon the power law and its dynamical interpretation: it is demonstrated that the underlying dynamics supports a \" violent reputation\" of the power law statistics.
Observation of the decay of muons produced in the Earth s atmosphere by cosmic ray interactions provides a graphic illustration of the counter-intuitive space-time predictions of special relativity theory. Muons at rest in the atmosphere, decaying simultaneously, are subject to a universal time-dilatation effect when viewed from a moving frame and so are also observed to decay simultaneously in all such frames. The analysis of this example reveals the underlying physics of the differential aging effect in Langevin s travelling-twin thought experiment.
An explanation of polarization entanglement is presented using Maxwells classical electromagnetic theory.Two key features are required to understand these classical origins.The first is that all waves diffract and weakly diffracting waves,with a principal direction of propagation in the laboratory frame, travel along that direction at speeds ever so slightly less than c.This allows nontrivial Lorentz transformations that can act on selected forward F waves or selected waves R traveling in the opposite direction to show that both can arise from a single zero momentum frame where all the waves are transverse to the original principal direction.Such F and R waves then both belong to a single relativistic entity where correlations between the two are unremarkable.The second feature requires the avoidance of using the Coulomb gauge.Waves, tending to plane waves in the limit of zero diffraction,can then be shown to be composed of two coupled sets of E and B fields that demonstrate the classical entanglement of F and R waves.Being derived from Maxwells equations,the theory is compatible with special relativity.This is used to account for entanglement between waves traveling at arbitrary angles from a source.In spite of a classical explanation,selection of appropriate F and R waves means entanglement is likely to remain a quantum phenomenon.
We study the dynamics of homogeneous isotropic three-dimensional worlds filled with radiation (3R-worlds). It is shown that the dynamics of these worlds with the additional fourth large-scale spatial dimension leads to an important effect. At 3R-worlds the forces of repulsion appear. The source of these forces is the thermal energy of the radiation that fills these worlds. In the four-dimensional space, these forces are centrifugal. They operate in an external for 3R-world spatial dimension and stretch it. In the three-dimensional comoving coordinate system the centrifugal forces shows themselves as forces of repulsion. Standard Einstein s equations do not describe these forces. Written generalized Einstein s equation describing the dynamics of a homogeneous isotropic universe, taking into consideration the centrifugal forces of repulsion. We propose a cosmological model of the universe, based on these equations. This model apply to explain the observation data.
A reanalisis of the effect of a moving frame of reference is done, showing that the null result of the Michelson-Morley s experimente of 1887 on the possibility of detecting the variation of the velocity of light with respect to a moving observer, na observer at the Earth, was already implied in these equations; thereforewith no need of new ad hoc hypotheses to explain it in the classical framework. In fact, it will be shown that behind those equations is hidden the fascinating phenomenon of the absolute motion.
The paper presents a theoretical analysis on the interaction between the Earth s magnetic field of a compass needle and the magnetic field of a straight infinite current-carrying wire. Implementation of a planar horizontal coil of wires has been shown as a sinus galvanometer. The magnetic field over the planar coil of wires has been examined by experiment. The coil could be used as a model for straight infinite current wire in demonstration set-ups or could be given as an assignment in Physics laboratory workshops.
Results of calculations of distribution and motion of dark matter are presented. Considering neutrino as one of the components of dark matter and taking into account peculiar features of the interactions of slow neutrinos with matter, allow to make the conclusion that they may have tangible manifestations not only in the depths of the Universe but also on the Earth. Experimental results confirming predicted effects are described, including periodic variations of the beta radioactivity as well as count rate bursts for a beta radioactive source placed at the focal point of a parabolic mirror. Based on the data of astronomical observations, estimates of the mass of the particles influencing on beta radioactivity (about 20 eV) and their flux density (about 10^13 particles/cm^2 s) have been made. The discrepancy between our mass estimate and the 2 eV limit for the neutrino mass, established in the tritium experiments, is discussed.
Based on negative entropy in entanglement, it is shown that a single-system Copenhagen measurement protocol is equivalent to the two-system von Neumann scheme with the memory filling up the system with negative information similar to the Dirac sea of negative energy. After equating the two quantum measurement protocols, we then apply this equivalence to the black hole radiation. That is, the black hole evaporation corresponds to the quantum measurement process and the two evaporation approaches, the observable-based single-system and the two-system entanglement-based protocols, can be made equivalent using quantum memory. In particular, the measurement choice, \\theta, with the memory state inside the horizon in the entanglement-based scheme is shown to correspond to the observable of the measurement choice, \\theta, outside the horizon in the single-system protocol, that is, O_{\\theta}^{out} = Q_{\\theta}^{in}. This indicates that the black hole as quantum memory is filling up with negative information outside the horizon, and its entropy corresponds to the logarithm of a number of equally probable measurement choices. This shows that the black hole radiation is no different than ordinary quantum theory.
The OPERA experiment reported recently a puzzling result. The time of flight of a neutrino beam between the CERN and the Gran Sasso Laboratory has been measured to be slightly shorter than expected. More precisely, an early arrival time of the neutrino with respect to the one computed assuming the speed of light in vacuum of 60.7 ns was measured, with a quite high confidence level. Alternatively, one can conclude that the neutrinos travelled 18.2 m more than light would do in vacuum. In this short paper, we suggest a possible systematic effect that does not appear in the analysis and which can easily been probed to be confirmed.
We show that the problem of unifying electromagnetism with gravity has an elegant solution in classical physics through the phenomenon of induction. By studying the way that induction leads to the formation of electromagnetic fields, we identify the classical field equations which the unified field must satisfy and a corresponding set of constitutive equations for the medium sustaining the field. The unification problem is then reduced to the problem of finding the exact form of these constitutive equations for different media by experiments.
Primes in the two complete associative normed division algebras C and H have affinities with structures seen in the standard model of particle physics. On the integers in the two algebras, there are two equivalence relations: a strong one, related to a U(1) and SU(3) symmetry allowing to permute and switch signs of the coordinates of the integers, as well as a weak relation with origins from units U(1),SU(2) in the algebra. Weak equivalence classes within the strong equivalence classes of odd primes in C case relate to leptons, the inert ones being neutrino like, and the split ones resembling electron-positron pairs. In the H case, for odd primes, the equivalence classes come in groups of two or three, leading to a caricature of hadrons featuring either mesons built by a quark pair or then baryons obtained by quark triplets. We can now list for every rational prime p all these particles and attach fractional charges to its constituents.
The electromagnetic interaction is characterised by discrete states for bound systems in contrast to continuous states for unbound systems. The difference merely arises because the characteristic equations do not exhibit the same behaviour for negative and positive energy parameter values, thus the apparent distinction between bound and unbound states can be considered purely descriptive and completely superficial - there is no indication that bounded and unbounded systems are subject to differing physical laws. However, the remarkable suggestion has been made that there exists a behavioural distinction between bound and unbound states of systems under gravitational influence. This notion is critically evaluated here. At the very basic level, a severe problem is found in defining a local concept of boundedness consistent with the current understanding of the gravitational interaction. Nevertheless it is difficult to exclude the possibility that bound and unbound systems are dynamically distinct, a distinction that may be relevant to existing cosmological and astronomical anomalies.
Due to the breaking of gauge symmetry in rotating superfluid Helium, the inertial mass of a vortex diverges with the vortex size. The vortex inertial mass is thus much higher than the classical inertial mass of the vortex core. An equal increase of the vortex gravitational mass is questioned. The possibility that the vortices in a rotating superfluid could break the weak equivalence principle in relation with a variable speed of light in the superfluid vacuum is debated. Experiments to test this possibility are investigated on the bases that superfluid Helium vortices would not fall, under the single influence of a uniform gravitational field, at the same rate as the rest of the superfluid Helium mass.
The usual transformations of the three-dimensional (3D) fields E and B that are found in [1] ([1] A. Einstein, Ann. Physik \\17, 891 (1905)) are always considered to be the relativistically correct Lorentz transformations (LT) of E and B. However, as proved in, e.g., [2] ([2] T. Ivezi\\ c, Found. Phys. Lett. 18, 301 (2005)), these transformations drastically differ from the LT of the relativistically correct 4D electric and magnetic fields. In this paper a simple proof of that difference will be presented and the consequences for EDM experiments and for some quantum phase shifts experiments are briefly examined. In all such experiments the usual 3D quantities, e.g., E, B, ... are measured and their relativistically incorrect transformations are used, but not the relativistically correct 4D geometric quantities, e.g., E^a, B^a, ... and their LT.
In line with the Coulomb-oscillator model of superconductivity, loop currents of excited 3s electrons from O^2- ions, passing in the CuO2 plane through nuclei of nearest-neighbor oxygen quartets, create the antiferromagnetic phase of undoped copper oxides. Holes, introduced by alkaline-earth doping of La2CuO4, destroy the loop currents, thereby weakening antiferromagnetism until it disappears at doping x = 0.02. Further doping of La_2-xAe_xCuO4 gives rise to incommensurate free-hole density waves whose wavelength is determined by the spacing of a doping superlattice. Modulating the ordering of the ions  magnetic moments, the charge-density wave, of incommensurability 2 delta, causes a magnetic density wave of incommensurability delta. The formula derived for delta(x) is in excellent agreement with data from X-ray diffraction and neutron scattering.
A novel interpretation of MOND is presented. For galactic data, in addition to Newtonian acceleration, there is an attractive acceleration peaking at Milgrom s parameter a_0. The peak lies within experimental error where a_0 = cH_0/2\\pi and H_0 is the present-time value of the Hubble constant. This peaking may be understood in terms of quantum mechanical mixing between Newtonian gravitation and the condensation mechanism. There are five pointers towards galaxies being Fermi-Dirac condensates.
We describe the phenomenon of generation of an external field of forces from piezoelectric materials subjected to the application of electric fields or mechanical stress. The piezoelectric materials are shown as being capable of producing induction forces in external objects and we conclude that the nature of the forces generated are not originated from the traditional interactions. Further we specifically assert that the generation of forces by the piezoelectric materials is ruled by the hypothesis of preexisting condition of generalized quantum entanglement between the molecular structure of the material bulk and the surrounding environment. In addition the widely spread coupling of the molecules with the environment can be manifested from the so-called direct effect or the converse effect in piezoelectric materials and this coupling is not intermediated by acoustic waves or electromagnetic fields. We show that the novel effect has a theoretical explanation consistent with the generalized quantum entanglements and the direction of the induced forces depends on either the direction of the mechanical force or the electric field applied in these materials.
Church s hypothesis and Godel s theorem may provide constraints on mental processes.As a relief quantum entanglement may lead to a definite proposal as regards the nature of reality and how much of it we are able to know and how do we know it.We deal with these questions and have devised a Gedanken Experiment showing the redundancy of principle of reality. We thereby propose a model describing the processes of making conclusions from a given set of premises though without the reference of neurobiological processes at present. We argue thereafter that the physical laws of nature may not be universal as it seems, being dependent on some physical processes namely computation and the states of neural cognitive states which may be governed yet by some other rule.
What is time? Why does it \"flow\" and why are we sure that it flows from past towards future? Why is there such a gigantic distinction between the Past of our world, which we believe to be fixed, and the Future, which we consider undetermined? And this is in spite of the fact that almost all physical laws are time-symmetric! Why does previously undetermined \"Future\" acquire its steadiness as it passes the moment called \"the Present\"? Perhaps, these questions are partially answered in the considerations below.
This paper examines the strain response of typical HMA overlays above jointed PCC slabs prone to bottom-up reflective cracking. The occurrence of reflective cracking under the combined effect of traffic and environmental loading significantly reduces the design life of the HMA overlays and can lead to its premature failure. In this context, viscoelastic material properties combined with cyclic vehicle loadings and pavement temperature distribution were implemented in a series of FE models in order to study the evolution of horizontal tensile and shear strains at the bottom of the HMA overlay. The effect of several design parameters, such as subbase and subgrade moduli, vehicle speed, overlay thickness, and temperature condition, on the horizontal and shear strain response was investigated. Results obtained show that the rate of horizontal and shear strain increase at the bottom of the HMA overlay drop with higher vehicle speed, higher subgrade modulus, and higher subbase modulus. Moreover, the rate of horizontal strain accumulation increases with higher overlay thickness. Although initial strain values were higher at positive pavement temperature distributions, the corresponding rate of strain increase were higher at negative pavement temperatures. Finally, an extrapolation of the strain history curve for various pavement design parameters was used to estimate the number of cycles for bottom-up crack initiation.
A review of the most recent results of the New Relativity Theory is presented. These include a straightforward derivation of the Black Hole Entropy-Area relation and its $logarithmic$ corrections; the derivation of the string uncertainty relations and generalizations ; ; the relation between the four dimensional gravitational conformal anomaly and the fine structure constant; the role of Noncommutative Geometry, Negative Probabilities and Cantorian-Fractal spacetime in the Young s two-slit experiment. We then generalize the recent construction of the Quenched-Minisuperspace bosonic $p$-brane propagator in $D$ dimensions ($AACS$ [18]) to the full multidimensional case involving all $p$-branes : the construction of the Multidimensional-Particle propagator in Clifford spaces ($C$-spaces) associated with a nested family of $p$-loop histories living in a target $D$-dim background spacetime . We show how the effective $C$-space geometry is related to $extrinsic$ curvature of ordinary spacetime. The motion of rigid particles/branes is studied to explain the natural $emergence$ of classical spin. The relation among $C$-space geometry and ${\\cal W}$, Finsler Geometry and (Braided) Quantum Groups is discussed. Some final remarks about the Riemannian long distance limit of $C$-space geometry are made.
Atmospheric weather systems are coherent structures consisting of discrete cloud cells forming patterns of rows/streets, mesoscale clusters and spiral bands which maintain their identity for the duration of their appreciable life times in the turbulent shear flow of the planetary Atmospheric Boundary Layer. The existence of coherent structures (seemingly systematic motion) in turbulent flows has been well established during the last 20 years of research in turbulence. Numerical weather prediction models based on the inherently non-linear Navier-Stokes equations do not give realistic forecasts because of the following inherent limitations: (1) the non-linear governing equations for atmospheric flows do not have exact analytic solutions and being sensitive to initial conditions give chaotic solutions characteristic of deterministic chaos (2) the governing equations do not incorporate the dynamical interactions and co-existence of the complete spectrum of turbulent fluctuations which form an integral part of the large coherent weather systems (3) limitations of available computer capacity necessitates severe truncation of the governing equations, thereby generating errors of approximations (4) the computer precision related roundoff errors magnify the earlier mentioned uncertainties exponentially with time and the model predictions become unrealistic. The accurate modelling of weather phenomena therefore requires alternative concepts and computational techniques. In this paper a universal theory of deterministic chaos applicable to the formation of coherent weather structures in the ABL is presented.
The effect of Lorentz invariance violation in cosmology has attracted a considerable amount of attention. By using a dynamical vector field assumed to point in the bulk direction, with Lorentz invariance holding on the brane, we extend the notation of Lorentz violation in four dimensions to a five-dimensional brane-world. We obtain the general solution of the field equations in an exact parametric form for Bianchi type I space-time, with perfect fluid as a matter source. We show that the brane universe evolves from an isotropic/anisotropic state to an isotropic de Sitter inflationary phase at late time. The early time behavior of anisotropic brane universe is largely dependent on the Lorentz violating parameters $\\beta_i, i = 1, 2, 3$ and the equation of state of the matter, while its late time behavior is independent of these parameters.
A solution to Einstein s field equations via the Friedman equations is shown to produce a cosmological model that is in exact agreement with the measurements made by the dark energy astronomers. All the essential physical parameters are obtained as epoch dependent functions all in closed form. The equations of state are obtained for total density, non-dark energy density and dark energy density. An interpretation of the structure involving a dark energy mass distribution that is twice the usual value is shown to clarify greatly the physical significance of the mathematics. It is asserted that the astronomer s measurements together with the mathematical model proves that the universe is permeated uniformly with a positive mass density that caries a negative gravitational constant, -G, characteristic. This mass component is identified with the dark energy content of the universe that has been postulated to explain the observed acceleration. Another result implied by the model is that there is twice the amount of dark energy that is usually considered to be present. This last point is analysed in more detail in appendix 1 using Einstein s field equations. Five additional appendices, 2, 3, 4, 5 and 6 in which isothermal gravitational dark matter equilibrium and the galactic rotations curve flatness problem are examined in detail. Appendix 5 is concerned with mass clumping and expressing gravitational isothermal equilibrium constraints using a cosmological Schr\\\"odinger equation to demonstrate the existence of a new quantum force involved with galactic stability. Appendix 6 is concerned with gravitational quantization. Each appendix has its own abstract.
According to Larmor s formula, accelerated electric charges radiate electromagnetic waves. Hence charges should radiate, if they are in free fall in gravitational fields, and they should not radiate if they are supported at rest in gravitational fields. But according to Einstein s equivalence principle, charges in free fall should not radiate, while charges supported at rest in gravitational fields should radiate. In this article we point out indirect experimental evidence, indicating that the equivalence principle is correct, while the traditional interpretation of Larmor s formula must be amended.
Aiming at providing an objective motion picture for the microscopic object described by the wave function, new analysis about motion is presented by use of the point set theory in mathematics, through which we show that a new kind of motion named quantum discontinuous motion is the general motion mode of the particle, while classical continuous motion is just one kind of extremely peculiar motion, and the wave function in quantum mechanics proves to be the very mathematical complex describing the particle undergoing the quantum discontinuous motion. Furthermore, Schroedinger equation of the wave function is shown to be the simplest nonrelativistic evolution equation for the particle undergoing the new motion, and the consistent axiom system of quantum mechanics is also deduced out. At last, we demonstrate that present quantum measurement theories just confirm the existence of the new motion of the microscopic particle described by the wave function, and the weird displays of the wave function in microscopic world are also physically explained in terms of the new motion.
In this paper, a number of traditional models related to the percolation theory has been considered by means of new computational methodology that does not use Cantor s ideas and describes infinite and infinitesimal numbers in accordance with the principle `The part is less than the whole . It gives a possibility to work with finite, infinite, and infinitesimal quantities numerically by using a new kind of a computer - the Infinity Computer - introduced recently in by Ya.D. Sergeyev in a number of patents. The new approach does not contradict Cantor. In contrast, it can be viewed as an evolution of his deep ideas regarding the existence of different infinite numbers in a more applied way. Site percolation and gradient percolation have been studied by applying the new computational tools. It has been established that in an infinite system the phase transition point is not really a point as with respect of traditional approach. In light of new arithmetic it appears as a critical interval, rather than a critical point. Depending on \"microscope\" we use this interval could be regarded as finite, infinite and infinitesimal short interval. Using new approach we observed that in vicinity of percolation threshold we have many different infinite clusters instead of one infinite cluster that appears in traditional consideration.
We show that the \"Information Paradox\" follows from inappropriate considerations on the geodesics of a Schwarzschildian manifold created by a gravitating point-mass. In particular, we demonstrate that the geometric differential equation which gives the radial coordinate as a function of the angular coordinate of the geodesics does not represent fully all the consequences following from the metric tensor. We remark that: i) it does not yield the conditions characterizing the circular orbits; (this fact has been ignored in the previous literature); ii) it \"neglects\" the space region in which the radial coordinate is minor or equal to twice the mass of the gravitating point (in suitable units of measure).
Historically Gordon decomposition of Dirac current played an important role in the interpretation of Dirac equation. We revisit it to understand the correspondence between Maxwell-Dirac and Maxwell-Lorentz theories. Arguments are presented to show that classical charge current corresponds to Gordon current. Consistency with Maxwell-Dirac theory leads to a new result: antisymmetric spin tensor in spin magnetization current of Dirac electron must be hidden as internal part of classical Maxwell tensor. It becomes natural to extend our previous interpretation in which electromagnetic field tensor represents angular momentum of photon or spacetime fluid (aether!) in the presence of sources such that the duality between field and source disappears. Both Gordon current and spin current are proposed to have  spinning origin . Formal expression of Gordon current makes it possible to apply the idea of optical vortex in this case, and quantized vortex and quantized orbital angular momentum could be related with the conjecture of mechanical interpretation of electric charge. Separate mass and charge centers for spinning point charge are well known in the literature; we discuss them in the context of two-vortex model of electron and Gordon decomposition.
Quantum electrodynamics corrects miscalculations of classical electrodynamics, but by introducing the pseudo-particle \"photon\" it is the source of errors whose practical consequences are serious. Thus W. E. Lamb disadvises the use of the word \"photon\" in an article whose this text takes the title. The purpose of this paper is neither a compilation, nor a critique of Lamb s paper: It adds arguments and applications to show that the use of this concept is dangerous while the semi-classical theory is always right provided that common errors are corrected: in particular, the classical field of electromagnetic energy is often, wrongly, considered as linear, so that Bohr s electron falls on the nucleus and photon counting is false. Using absolute energies and radiances avoids doing these errors. Quantum electrodynamics quantizes \"normal modes\" chosen arbitrarily among the infinity of sets of orthogonal modes of the electromagnetic field. Changing the choice of normal modes splits the photons which are pseudo-particles, not physical objects. Considering the photons as small particles interacting without pilot waves with single atoms, astrophysicists use Monte-Carlo computations for the propagation of light in homogeneous media while it works only in opalescent media as clouds. Thus, for instance, two theories abort while, they are validated using coherence and Einstein theories, giving a good interpretation of the rings of supernova remnant 1987A, and the spectrum found inside. The high frequency shifts of this spectrum can only result from a parametric interaction of light with excited atomic hydrogen which is found in many regions of the universe.
We present some well-known energy-momentum complexes and evaluate the gravitational energy associated with static spherically symmetric spacetimes. In fact, the energy distribution of the aforementioned gravitational background that is contained in a two-sphere of radius $r$ shows that a test particle situated at a finite distance $r$ experiences the gravitational field of the effective gravitational mass. In addition, we apply Verlinde s entropic gravity to find the emergent gravitational energy on static spherically symmetric screens. In this setup, we find that the energy distribution in the prescription of M{\\o}ller is similar to the energy derived from the emergent gravity, while other prescriptions give the different results. This result may confirm the argument of Lessner who argues that M{\\o}ller s definition of energy is a powerful concept of energy in General Relativity.
As an alternative to the Standard cosmology model we have developed a new modified Freundlich s (quantum relativity) redshift (MFRS) mechanisms, which provide a precise solutions of the Dark Energy and Dark Matter problems. We apply the joint solution of three MFRS equations for concordances quantize bounce Planck hierarchy steps. Simultaneous scaling solutions of MFRS equations in logarithmic scale appropriate to three cosmological epoch s, yields a currently testable predictions regarding the Dark Matter {\\Omega}_{DM} = 0.25, and Dark Energy {\\Omega}_{DE} = 0.75. These predictions coincides with the recent observational data from WMAP and other a key supernovae SNe Ia findings. Thus, the presence of Dark Matter and Dark Energy had already been not only detected observationally, but also confirmed theoretically with the very compelling accuracy. From the WMAP7 and our predicted ages we find a value of the Hubble constant H_0 = 65.6 km * s^{-1} Mpc^{-1} which is excellent agreement with the Planck 2013 results XVI. Compared with the \"holographic scenario\" results, we find an important coincidence between our new and \"holographic\" parameters. We discuss the connection hierarchy between the multiverse masses and examine the status of the cosmic acceleration. The product of the age of the Universe into the cosmic acceleration in each cosmological epochs --including present day are constant and precisely corresponds to an possible observable-geophysical parameter g_U = 9.50005264_{265} (exact) * (m/s^2). For the derived by WMAP7 age of the Universe t_{W7} = 13.75(13) * 10^9 yr, we find the relevant acceleration a_{W7} = 6.91(65) * 10^{-10} m/s^2. The predicted value of t_0 = 9.0264_9(51) * 10^2 Gyr is consistent with the background acceleration. a_0 = 1.05246_4(61) * 10^{-11} m/s^2.
We take charged anisotropic fluid cylinder when there is no external pressure acting on the fluid. This is a cylindrical version of the Krori and Barua s method to explore the field equations with anisotropic fluid. We discuss models with positive matter density and pressure that satisfy all the energy and stability conditions. It is found that charge does not vanish at the center of the cylinder. The equilibrium condition as well as physical conditions are discussed. Further, we highlight the connection between our solutions and the charged strange quark stars as well as with dark matter including charged massive particles. The graphical analysis of the matter variables versus charge is given which indicates a physically reasonable matter distribution.
We consider a simple model of the physical vacuum as a self-gravitating relativistic fluid. Proceeding in a step-by-step manner, we are able to show that the equations of classical electrodynamics follow if the electromagnetic four-potential is associated with the four-momentum of a space-filling fluid of neutral spinors which we identify with neutrinos and antineutrinos. Charged particles, which we identify with electrons and positrons, act as sinks for the fluid and have the structure of the maximal fast Kerr solution. Electromagnetic waves are described by oscillations in the fluid and interactions between charges occur via the exchange of photons, which have the structure of entwined neutrino-antineutrino pairs that form twisted closed loops in spacetime connecting the charges. The model predicts that antimatter has negative mass, and that neutrinos are matter-antimatter dipoles. Together these suffice to explain the presence of modified Newtonian dynamics as a gravitational polarisation effect.
The formation of naked singularities in $2+1-$ dimensional power - law spacetimes in linear Einstein-Maxwell and Einstein-scalar theories sourced by azimuthally symmetric electric field and a self-interacting real scalar field respectively, are considered in view of quantum mechanics. Quantum test fields obeying the Klein-Gordon and Dirac equations are used to probe the classical timelike naked singularities developed at $r=0$. We show that when the classically singular spacetimes probed with scalar waves, the considered spacetimes remains singular. However, the spinorial wave probe of the singularity in the metric of a self-interacting real scalar field remains quantum regular. The notable outcome in this study is that the quantum regularity/singularity can not be associated with the energy conditions.
It is shown that if we can define a physical quantity with proper character in a given inertial reference frame (kinematic, dynamic, electromagnetic in its nature) which transforms when detected from a reference frame relative to which it moves with velocity $u_x$ as $F=\\f{F^o}{\\sqrt{1-\\f{u_x^2}{c^2}}}$ then we can derive for it transformation equations following one and the same procedure, which involves the addition law of relativistic velocities which can be derived without using the Lorentz transformations. The transformation equation derived that way, generates the physical quantities $u_xF$ and $u_x F $, for which physicists invent names reflecting theirs physical meaning.
A two-dimensional Minkowski spacetime diagram is neatly represented on a Euclidean ordinary plane. However the Euclidean lengths of the lines on the diagram do not correspond to the true values of physical quantities in spacetime, except for those referring to the stationary reference frame. In order to extend its abilities to other inertial reference frames, we derive a factor which, multiplied by the magnitude of the actually displayed values (on the diagram), leads to the corresponding true measured values by any other inertial observers. Doing so, the student can infer from the Euclidean diagram plot the expressions that account for Lorentz length contraction, time dilation and also Lorentz Transformations just by using regular trigonometry.
The infinite gravitational collapse of any supermassive stars should pass through an energy scale of the grand unified theory (GUT). After nucleon-decays, the supermassive star will convert nearly all its mass into energy, and produce the radiation of GUT. It may probably explain some ultrahigh energy puzzles in astrophysics, for example, quasars and gamma-ray bursts (GRB), etc. This is similar with a process of the Big Bang Universe with a time-reversal evolution in much smaller space scale and mass scale. In this process the star seems be a true white hole.
We review the recently proposed unreduced, complex-dynamical solution to the many-body problem with arbitrary interaction and its application to the unified solution of fundamental problems, including dynamic foundations of causally complete quantum mechanics, relativity, particle properties and cosmology. We first analyse the universal properties of this many-body problem solution without any perturbative reduction and show that the emerging new quality of fundamental dynamic multivaluedness (or redundance) of the resulting system configuration leads to the natural and universal concept of dynamic complexity, chaoticity and fractality of any real system behaviour. We then consider unified features of this complex dynamics. Applications of that universal description to systems at various complexity levels have been performed and in this paper we review those at the lowest, fundamental complexity levels leading to causal understanding of the unified origin of quantum mechanics, relativity (special and general), elementary particles, their intrinsic properties and interactions. One reveals, in particular, the complex-dynamic origin of inertial and gravitational (relativistic) mass without introduction of any additional particle species, fields or dimensions. Other practically important consequences and problem solutions in fundamental physics and cosmology are summarised, confirming the efficiency of that unified picture.
The paper studied the scalar and gauge fields on the background metric of Kasner in the multidimensional spacetime. Influence of metric effects leads to renormalization of main parameters of the fields in the Lagrangian, and new mass and charge terms are introduced to corresponding observed in reality values. Effective masses and charge of the fields depend upon the additional terms with cosmological constant. Was calculated the expressions for the effective mass and charge of the fields in anisotropic spacetime.
For more than a half century cosmologists have been guided by the assumption that matter is distributed homogeneously on sufficiently large scales. On the other hand, observations have consistently yielded evidence for inhomogeneity in the distribution of matter right up to the limits of most surveys. The apparent paradox can be understood in terms of the role that paradigms play in the evolution of science.
The fundamental impasses and ruptures in various domains of the canonical, unitary science, or the  end of science , become the more and more evident. The natural unity of being is recovered within a universal nonperturbative method leading to the dynamic redundance paradigm. It is shown that the unreduced behaviour of any nontrivial (isolated) system includes many equally real, but incompatible dynamic regimes, each of them being roughly equivalent to an ordinary  complete  solution of the unitary science. Therefore the regimes should  spontaneously  and randomly replace one another, which provides a universal, purely dynamic origin of randomness. The discovered dynamic redundance leads to the universal, reality-based concept of dynamic complexity and its permanently developing hierarchical structure, alias the world. Its lowest levels give the causally complete mechanics of dynamically quantized elementary fields, extending the double solution found by Louis de Broglie. One obtains a physically complete solution for the  mysteries  of quantum mechanics, unifyng it with the extended, causal versions of relativity (emergent space and time), quantum and classical gravity (dynamical mass), field theory (electric charge and spin), particle physics, and cosmology. The same key features of the unreduced dynamic complexity determine behaviour of any system at higher levels of complexity described by a case of the single, universal equation in its two related versions, the extended Lagrange-Hamilton (trajectorial) and Schroedinger (distributional) equations. The end of the unitary science opens the renaissance of the ultimately complete and universal understanding initiated by Rene Descartes (but then mechanistically falsified), which is confirmed by many sound, practically important results.
The relativity to the measuring device in quantum theory, i.e. the covariance of local dynamical variables relative transformations to moving quantum reference frame in Hilbert space, may be achieved only by the rejection of super-selection rule. In order to avoid the subjective nuance, I emphasis that the notion of \"measurement\" here, is nothing but the covariant differentiation procedure in the functional quantum phase space $CP(N-1)$, having pure objective sense of evolution. Transition to the local moving quantum reference frame leads to some particle-like solutions of quasi-linear field PDE in the dynamical space-time. Thereby, the functionally covariant quantum dynamics gives the perspective to unify the Einstein relativity and quantum principles which are obviously contradictable under the standard approaches.
Recent experiments by OPERA with high energy neutrinos, as well as astrophysics observation data, may possibly prove violations of underlying principles of special relativity theory. This paper attempts to present an elementary modification of relativistic mechanics that is consistent both with the principles of mechanics and with Dirac s approach to derivation of relativistic quantum equations. Our proposed hyper-relativistic model is based on modified dispersion relations between energy and momentum of a particle. Predictions of the new theory significantly differ from the standard model, as the former implies large Lorentz gamma-factors (ratio of particle energy to its mass). First of all, we study model relationships that describe hypothetical motion of superluminal neutrinos. Next, we analyze characteristics of Cherenkov radiation of photons and non-zero mass particles in vacuum. Afterwards, we derive generalized Lorentz transformations for a hyper-relativistic case, resulting in a radical change in the law of composition of velocities and particle kinematics. Finally, we study a hyper-relativistic version of Dirac equation and some of its properties. In present paper we attempted to use plain language to make it accessible not only to scientists but to undergraduate students as well.
Wrong Monte-Carlo computations are used to study the propagation of light in low pressure gas of nebulae. We recall that the incoherent interactions required for Monte Carlo calculations and hindering coherent interactions are due to collisions that disappear at low pressure. Incoherent interactions blur the images while coherent do not. We introduce coherent optical effects or substitute them for Monte Carlo calculations in published papers, improving the results and avoiding the introduction of \"new physics\". The spectral radiance of novae has the magnitude of the radiance of lasers, and large column densities are available in the nebulae. Several types of coherent interactions (superradiance, multiphoton effects, etc..), well studied using lasers, work in nebulae as in laboratories. The relatively thin shell of plasma containing atoms around a Str\\^omgren sphere is superradiant, so that the limb of the sphere is seen as a circle which may be dotted into an even number of \"pearls\". The superradiant beams induce a multiphotonic scattering of the light rays emitted by the star, improving the brightness of the limb and darkening the star. Impulsive Stimulated Raman Scatterings (ISRS) in excited atomic hydrogen shift the frequencies of electromagnetic waves: UV-X lines of the Sun are red- or blue-shifted, the microwaves exchanged with the Pioneer 10 and 11 probes are blueshifted (no anomalous acceleration needed), the far stars are redshifted. Without any \"new physics\", coherent spectroscopy works as a magic stick to explain many observations.
The axiomatic definition of mass in classical mechanics, outlined by Mach in the second half of 19th century and improved by several authors, is simplified and extended to the theory of special relativity. According to the extended definition presented here, the mass of a relativistic particle is independent of its velocity and coincides with the rest mass, i.e., with the mass defined in classical mechanics. Then, force is defined as the product of mass and acceleration, both in the classical and in the relativistic framework.
In this paper, we will analyse a theory of modified gravity, in which the field content of general relativity will be increased to include a vector field. We will use the Horndeski formalism to non-minimally couple this vector field to the metric. As we will be using the Horndeski formalism, this theory will not contain Ostrogradsky ghost degree of freedom. We will analyse compact stars using this Vector-Tensor-Horndeski theory.
It is known that the nonstrictly thermal character of the Hawking radiation spectrum harmonizes Hawking radiation with black hole (BH) quasi-normal modes (QNM). This paramount issue has been recently analyzed in the framework of both Schwarzschild BHs (SBH) and Kerr BHs (KBH). In this assignment, we generalize the analysis to the framework of nonextremal Reissner-Nordstr\\\"{o}m BHs (RNBH). Such a generalization is important because in both SBHs and KBHs an absorbed (or emitted) particle has only mass. Instead, in RNBHs the particle has charge as well as mass. In doing so, we expose that for the RNBH, QNMs can be naturally interpreted in terms of quantum levels for both particle emission and absorption. Conjointly, we generalize some concepts concerning the RNBH s \"effective states\".
We are concerned with the dynamics of $N$ point vortices $z_1,\\dots,z_N\\in\\Omega\\subset\\mathbb{R}^2$ in a planar domain. This is described by a Hamiltonian system \\[ \\Gamma_k\\dot{z}_k(t)=J\\nabla_{z_k} H\\big(z(t)\\big),\\quad k=1,\\dots,N, \\] where $\\Gamma_1,\\dots,\\Gamma_N\\in\\mathbb{R}\\setminus\\{0\\}$ are the vorticities, $J\\in\\mathbb{R}^{2\\times2}$ is the standard symplectic $2\\times2$ matrix, and the Hamiltonian $H$ is of $N$-vortex type: \\[ H(z_1,\\dots,z_N) = -\\frac1{2\\pi}\\sum_{j\\ne k}^N \\Gamma_j\\Gamma_k\\log|z_j-z_k| - \\sum_{j,k=1}^N\\Gamma_j\\Gamma_kg(z_j,z_k). \\] Here $g:\\Omega\\times\\Omega\\to\\mathbb{R}$ is an arbitrary symmetric function of class $C^2$, e.g.\\ the regular part of a hydrodynamic Green function. Given a nondegenerate critical point $a_0\\in\\Omega$ of $h(z)=g(z,z)$ and a nondegenerate relative equilibrium $Z(t)\\in\\mathbb{R}^{2N}$ of the Hamiltonian system in the plane with $g=0$, we prove the existence of a smooth path of periodic solutions $z^{(r)}(t)=\\big(z^{(r)}_1(t),\\dots,z^{(r)}_N(t)\\big)\\in\\Omega^N$, $0<r<r_0$, with $z^{(r)}_k(t)\\to a_0$ as $r\\to0$. In the limit $r\\to0$, and after a suitable rescaling, the solutions look like $Z(t)$.
We consider an isomorphism invariant for measure-preserving systems - types of generalized entropy convergence rates. We show the connections of this invariant with the types of Shannon entropy convergence rates. In the case when they differ we show several facts for aperiodic, completely ergodic and rank one systems. We use this concept to distinguish some measure-preserving systems with zero entropy.
We provide an abstract framework for the study of certain spectral properties of parabolic systems; specifically, we determine under which general conditions to expect the presence of absolutely continuous spectral measures. We use these general conditions to derive results for spectral properties of time-changes of unipotent flows on homogeneous spaces of semisimple groups regarding absolutely continuous spectrum as well as maximal spectral type; the time-changes of the horocycle flow are special cases of this general category of flows. In addition we use the general conditions to derive spectral results for twisted horocycle flows and to rederive certain spectral results for skew products over translations and Furstenberg transformations.
We weaken the assumption of summable variations in a paper by Verbitskiy \\cite{verb} to a weaker condition, Berbee s condition, in order for a 1-block factor (a single site renormalisation) of the full shift space on finitely many symbols to have a $g$-measure with a continuous $g$-function. But we also prove by means of a counterexample, that this condition is (within constants) optimal. The counterexample is based on the second of our main results, where we prove that there is an inverse critical temperature in a one-sided long-range Ising model which is at most 8 times the critical inverse temperature for the (two-sided) Ising model with long-range interactions.
In the present paper, multiresolution analysis arising from Coalescence Hidden-variable Fractal Interpolation Functions (CHFIFs) is accomplished. The availability of a larger set of free variables and constrained variables with CHFIF in multiresolution analysis based on CHFIFs provides more control in reconstruction of functions in L2(\\mathbb{R})than that provided by multiresolution analysis based only on Affine Fractal Interpolation Functions (AFIFs). In our approach, the vector space of CHFIFs is introduced, its dimension is determined and Riesz bases of vector subspaces Vk, k \\in \\mathbb{Z}, consisting of certain CHFIFs in L2(\\mathbb{R}) \\cap C0(\\mathbb{R}) are constructed. As a special case, for the vector space of CHFIFs of dimension 4, orthogonal bases for the vector subspaces Vk, k \\in \\mathbb{Z}, are explicitly constructed and, using these bases, compactly supported continuous orthonormal wavelets are generated.
Section 1 refines the theory of harmonic and potential maps. Section 2 defines a generalized Lorentz world-force law and shows that any PDEs system of order one generates such a law in suitable geometrical structure. In other words, the solutions of any PDEs system of order one are harmonic or potential maps, if we use semi-Riemann-Lagrange structures. Section 3 formulates open problems regarding the geometry of semi-Riemann manifolds $(J^1(T,M), S_1)$, $(J^2(T,M), S_2)$, and shows that the Lorentz-Udriste world-force law is equivalent to covariant Hamilton PDEs on $(J^1(T,M), S_1)$.
L. A. Bunimovich and B. Z. Webb developed a theory for transforming a finite weighted graph while preserving its spectrum, referred as isospectral reduction theory. In this work we extend this theory to a class of operators on Banach spaces that include Markov type operators. We apply this theory to infinite countable weighted graphs admitting a finite structural set, a key concept in Bunimovich and Webb s theory.
The Lorentz gas of $\\mathbb{Z}^2$-periodic scatterers (or the so called Sinai billiards) can be used to model motion of electrons on an ionized medal. We investigate the linear response for the system under various external forces (during both the flight and the collision). We give some characterizations under which the forced system is time-reversible, and derive an estimate of the electrical current generated by the forced system. Moreover, applying Pesin entropy formula and Young dimension formula, we get several characterizations of the non-equilibrium steady state of the forced system.
It follows from Oseledec Multiplicative Ergodic Theorem that the Lyapunov-irregular set of points for which the Oseledec averages of a given continuous cocycle diverge has zero measure with respect to any invariant probability measure. In strong contrast, for any dynamical system $f:X\\rightarrow X$ with exponential specification property and a H$\\ddot{\\text{o}}$lder continuous matrix cocycle $A:X\\rightarrow G (m,\\mathbb{R})$, we show here that if there exist ergodic measures with different Lyapunov spectrum, then the Lyapunov-irregular set of $A$ is residual (i.e., containing a dense $G_\\delta$ set).
We study the recurrence and ergodicity for the billiard on noncompact polygonal surfaces with a free, cocompact action of $\\Z$ or $\\Z^2$. In the $\\Z$-periodic case, we establish criteria for recurrence. In the more difficult $\\Z^2$-periodic case, we establish some general results. For a particular family of $\\Z^2$-periodic polygonal surfaces, known in the physics literature as the wind-tree model, assuming certain restrictions of geometric nature, we obtain the ergodic decomposition of directional billiard dynamics for a dense, countable set of directions. This is a consequence of our results on the ergodicity of $\\ZZ$-valued cocycles over irrational rotations.
We define two classes of topological infinite degree covering maps modeled on two families of transcendental holomorphic maps. The first, which we call exponential maps of type $(p,q)$, are branched covers and is modeled on transcendental entire maps of the form $P e^{Q}$, where $P$ and $Q$ are polynomials of degrees $p$ and $q$. The second is the class of universal covering maps from the plane to the sphere with two removed points modeled on transcendental meromorphic maps with two asymptotic values. The problem we address is to give a combinatorial characterization of the holomorphic maps contained in these classes whose post-singular sets are finite. The main results in this paper are that a post-singularly finite topological exponential map of type $(0,1)$ or a certain post-singularly finite topological exponential map of type $(p,1)$ or a post-singularly finite universal covering map from the plane to the sphere with two points removed is combinatorially equivalent to a holomorphic same type map if and only if this map has bounded geometry.
In this paper, we study the upper semicontinuity of pullback attractors for a strongly damped wave equation. In particular, under some proper assumptions, we prove that, the pullback attractor $\\{A_\\varepsilon(t)\\}_{t\\in\\mathbb R}$} of Eq.(1.1) with $\\varepsilon\\in[0,1]$ satisfies that for any $[a,b]\\subset\\mathbb R$ and $\\varepsilon_0\\in[0,1]$, $\\lim_{\\varepsilon\\to\\varepsilon_0} \\sup_{t\\in[a,b]} \\mathrm{dist}_{H_0^1\\times L^2} (A_\\varepsilon(t), A_{\\varepsilon_0}(t))=0$, and $\\cup_{t\\in[a,b]} \\cup_{\\varepsilon\\in[0,1]} A_\\varepsilon(t)$ is precompact in $H_0^1 (\\Omega) \\times L^2(\\Omega)$.
We study the dynamics of the renormalization operator acting on the space of pairs (v,t), where v is a diffeomorphism and t belongs to [0,1], interpreted as unimodal maps x-->v(q_t(x)), where q_t(x)=-2t|x|^a+2t-1. We prove the so called complex bounds for sufficiently renormalizable pairs with bounded combinatorics. This allows us to show that if the critical exponent a is close to an even number then the renormalization operator has a unique fixed point. Furthermore this fixed point is hyperbolic and its codimension one stable manifold contains all infinitely renormalizable pairs.
We prove a generalization of the fixed point theorem of Cartwright and Littlewood. Namely, suppose $h : \\mathbb{R}^2 \\to\\mathbb{R}^2$ is an orientation preserving planar homeomorphism, and let $C$ be a continuum such that $h^{-1}(C)\\cup C$ is acyclic. If there is a $c\\in C$ such that $\\{h^{-i}(c):i\\in\\mathbb{N}\\}\\subseteq C$, or $\\{h^i(c):i\\in\\mathbb{N}\\}\\subseteq C$, then $C$ also contains a fixed point of $h$. Our approach is based on Morton Brown s short proof of the result of Cartwright and Littlewood. In addition, making use of a linked periodic orbits theorem of Bonino we also prove a counterpart of the aforementioned result for orientation reversing homeomorphisms, that guarantees a $2$-periodic orbit in $C$ if it contains a $k$-periodic orbit ($k>1$).
Local correlation entropy, introduced by Takens in 1983, represents the exponential decay rate of the relative frequency of recurrences in the trajectory of a point, as the embedding dimension grows to infinity. In this paper we study relationship between the supremum of local correlation entropies and the topological entropy. For dynamical systems on graphs we prove that the two quantities coincide. Moreover, there is an uncountable set of points with local correlation entropy arbitrarily close to the topological entropy. On the other hand, we construct a strictly ergodic subshift with positive topological entropy having all local correlation entropies equal to zero. As a necessary tool, we derive an expected relationship between the local correlation entropies of a system and those of its iterates.
In this paper we address the existence and ergodicity of non-hyperbolic attracting sets for a certain class of smooth endomorphisms on the solid torus. Such systems allow a formulation as a skew product system defined by planar diffeomorphisms have contraction on average which forced by any expanding circle map. These attractors are invariant graphs of upper semicontinuous maps which support exactly one $SRB$ measure. In our approach, these skew product systems arising from iterated function systems generated by a finitely many weak contractive diffeomorphisms. Under some conditions including negative fiber Lyapunov exponents, we prove the existence of unique non-hyperbolic attracting invariant graphs for these systems which attract positive orbits of almost all initial points. Also, we prove that these systems are Bernoulli and therefore they are mixing. Moreover, these properties remain true under small perturbations in the space of endomorphisms on the solid torus.
Torus canards are solutions of slow/fast systems that alternate between attracting and repelling manifolds of limit cycles of the fast subsystem. A relatively new dynamic phenomenon, torus canards have been found in neural applications to mediate the transition from spiking to bursting via amplitude-modulated spiking. In $\\mathbb{R}^3$, torus canards are degenerate: they require one-parameter families of 2-fast/1-slow systems in order to be observed and even then, they only occur on exponentially thin parameter intervals. The addition of a second slow variable unfolds the torus canard phenomenon, making them generic and robust. That is, torus canards in slow/fast systems with (at least) two slow variables occur on open parameter sets. So far, generic torus canards have only been studied numerically, and their behaviour has been inferred based on averaging and canard theory. This approach, however, has not been rigorously justified since the averaging method breaks down near a fold of periodics, which is exactly where torus canards originate. In this work, we combine techniques from Floquet theory, averaging theory, and geometric singular perturbation theory to show that the average of a torus canard is a folded singularity canard. In so doing, we devise an analytic scheme for the identification and topological classification of torus canards in $\\mathbb{R}^4$. We demonstrate the predictive power of our results in a model for intracellular calcium dynamics, where we explain the mechanisms underlying a novel class of elliptic bursting rhythms, called amplitude-modulated bursting, by constructing the torus canard analogues of mixed-mode oscillations. We also make explicit the connection between our results here with prior studies of torus canards and torus canard explosion in $\\mathbb{R}^3$, and discuss how our methods can be extended to slow/fast systems of arbitrary (finite) dimension.
Rigid bodies collision maps in dimension two, under a natural set of physical requirements, can be classified into two types: the standard specular reflection map and a second which we call, after Broomhead and Gutkin, no-slip. This leads to the study of no-slip billiards--planar billiard systems in which the moving particle is a disc (with rotationally symmetric mass distribution) whose translational and rotational velocities can both change at each collision with the boundary of the billiard domain. In this paper we greatly extend previous results on boundedness of orbits (Broomhead and Gutkin) and linear stability of periodic orbits for a Sinai-type billiard (Wojtkowski) for no-slip billiards. We show among other facts that: (i) for billiard domains in the plane having piecewise smooth boundary and at least one corner of inner angle less than $\\pi$, no-slip billiard dynamics will always contain elliptic period-$2$ orbits; (ii) polygonal no-slip billiards always admit small invariant open sets and thus cannot be ergodic with respect to the canonical invariant billiard measure; (iii) the no-slip version of a Sinai billiard must contain linearly stable periodic orbits of period $2$ and, more generally, we provide a curvature threshold at which a commonly occurring period-$2$ orbit shifts from being hyperbolic to being elliptic; (iv) finally, we make a number of observations concerning periodic orbits in a class of polygonal billiards.
This paper applies the recently developed theory of discrete nonholonomic mechanics to the study of discrete nonholonomic left-invariant dynamics on Lie groups. The theory is illustrated with the discrete versions of two classical nonholonomic systems, the Suslov top and the Chaplygin sleigh. The preservation of the reduced energy by the discrete flow is observed and the discrete momentum conservation is discussed.
We consider two-parametric families of non-autonomous ordinary differential equations on the two-torus with the coordinates $(x,t)$ of the type $\\dot x=v(x)+A+Bf(t)$. We study its rotation number as a function of the parameters $(A,B)$. The {\\it phase-lock areas} are those level sets of the rotation number function $\\rho=\\rho(A,B)$ that have non-empty interiors. V.M.Buchstaber, O.V.Karpov, S.I.Tertychnyi have studied the case, when $v(x)=\\sin x$ in their joint paper. They have observed the quantization effect: for every smooth periodic function $f(t)$ the family of equations may have phase-lock areas only for integer rotation numbers. Another proof of this quantization statement was later obtained in a joint paper by Yu.S.Ilyashenko, D.A.Filimonov, D.A.Ryzhov. This implies the similar quantization effect for every $v(x)=a\\sin(mx)+b\\cos(mx)+c$ and rotation numbers that are multiples of $\\frac 1m$. We show that for every other analytic vector field $v(x)$ (i.e., having at least two Fourier harmonics with non-zero non-opposite degrees and nonzero coefficients) there exists an analytic periodic function $f(t)$ such that the corresponding family of equations has phase-lock areas for all the rational values of the rotation number.
The aim of this paper is to explore the possibilities of Conley index techniques in the study of heteroclinic connections between finite and infinite invariant sets. For this, we remind the reader of the Poincar\\ e compactification: this transformation allows to project a $n$-dimensional vector space $X$ on the $n$-dimensional unit hemisphere of $X\\times \\mathbb{R}$ and infinity on its $(n-1)$-dimensional equator called the sphere at infinity. Under normalizability condition, vector fields on $X$ transform into vector fields on the Poincar\\ e hemisphere whose associated flows let the equator invariant. The dynamics on the equator reflects the dynamics at infinity, but is now finite and may be studied by Conley index techniques. Furthermore, we observe that some non-isolated behavior may occur around the equator, and introduce the concept of invariant sets at infinity of isolated invariant dynamical complement. Through the construction of an extended phase space together which an extended flow, we are able to adapt the Conley index techniques and prove the existence of connections to such non-isolated invariant sets.
Let $f: M \\to M$ be a partially hyperbolic diffeomorphism with conformality on unstable manifolds. Consider a set of points with nondense forward orbit: $E(f, y) := \\{ z\\in M: y\\notin \\overline{\\{f^k(z), k \\in \\mathbb{N}\\}}\\}$ for some $y \\in M$. Define $E_{x}(f, y) := E(f, y) \\cap W^u(x)$ for any $x\\in M$. Following a method of Broderick-Fishman-Kleinbock, we show that $E_x(f,y)$ is a winning set of Schmidt games played on $W^u(x)$ which implies that $E_x(f,y)$ has full Hausdorff dimension equal to $\\dim W^u(x)$. Furthermore we show that for any nonempty open set $V \\subset M$, $E(f, y) \\cap V$ has full Hausdorff dimension equal to $\\dim M$, by constructing measures supported on $E(f, y)\\cap V$ with lower pointwise dimension converging to $\\dim M$ and with conditional measures supported on $E_x(f,y)\\cap V$. The results can be extended to the set of points with forward orbit staying away from a countable subset of $M$.
We consider a class of $\\mathcal C^{4}$ partially hyperbolic systems on $\\mathbb T^2$ described by maps $F_\\varepsilon(x,\\theta)=(f(x,\\theta),\\theta+\\varepsilon\\omega(x,\\theta))$ where $f(\\cdot,\\theta)$ are expanding maps of the circle. For sufficiently small $\\varepsilon$ and $\\omega$ generic in an open set, we precisely classify the SRB measures for $F_\\varepsilon$ and their statistical properties, including exponential decay of correlation for H\\\"older observables with explicit and nearly optimal bounds on the decay rate.
Let $\\mathbf{Y}$ be the solution space of an $n$-layer cellular neural network, and let $\\mathbf{Y}^{(i)}$ and $\\mathbf{Y}^{(j)}$ be the hidden spaces, where $1 \\leq i, j \\leq n$. ($\\mathbf{Y}^{(n)}$ is called the output space.) The classification and the existence of factor maps between two hidden spaces, that reaches the same topological entropies, are investigated in [Ban et al., J.~Differential Equations \\textbf{252}, 4563-4597, 2012]. This paper elucidates the existence of factor maps between those hidden spaces carrying distinct topological entropies. For either case, the Hausdorff dimension $\\dim \\mathbf{Y}^{(i)}$ and $\\dim \\mathbf{Y}^{(j)}$ can be calculated. Furthermore, the dimension of $\\mathbf{Y}^{(i)}$ and $\\mathbf{Y}^{(j)}$ are related upon the factor map between them.
The paper analyzes a specific class of random walks on quotients of $X:=\\text{SL}(k,{\\Bbb R})/ \\Gamma$ for a lattice $\\Gamma$. Consider a one parameter diagonal subgroup, $\\{g_t\\}$, with an associated abelian expanding horosphere, $U\\cong {\\Bbb R}^k$, and let $\\phi:[0,1]\\rightarrow U$ be a sufficiently smooth curve satisfying the condition that that the derivative of $\\phi$ spends $0$ time in any one subspace of ${\\Bbb R}^k$. Let $ \\mu_U$ be the measure defined as $\\phi_*\\lambda_{[0,1]},$ where $\\lambda_{[0,1]}$ is the Lebesgue measure on $[0,1]$. Let $\\mu_A$ be a measure on the full diagonal subgroup of $\\text{SL}(k,{\\Bbb R})$, such that almost surely the random walk on the diagonal subgroup $A$ with respect to this measure grows exponentially in the direction of the cone expanding $U$. Then the random walk starting at any point $z\\in X$, and alternating steps given by $\\mu_U$ and $\\mu_A$ equidistributes respect to $\\text{SL}(k,{\\Bbb R})$-invariant measure on $X$. Furthermore, the measure defined by $\\mu_A*\\mu_U*\\dots*\\mu_A* \\mu_U*\\delta_z$ converges exponentially fast to the $\\text{SL}(k,{\\Bbb R})$-invariant measure on $X$.
We consider dynamical systems generated by skew products of affine contractions on the real line over angle-multiplying maps on the circle $S^1$: $ T:S^{1}\\times \\R\\to S^1\\times \\R, T(x,y)=(\\ell x, \\lambda y+f(x)) $ where $\\ell\\geq 2$, $0<\\lambda<1$ and $f$ is a $C^r$ function on $S^1$. We show that, if $\\lambda^{1+2s}\\ell>1$ for some $0\\leq s< r-2$, the density of the SBR measure for $T$ is contained in the Sobolev space $W^s(S^1\\times \\R)$ for almost all ($C^r$ generic, at least) $f$.
We study various types of shadowing properties and their implication for C1 generic vector fields. We show that, generically, any of the following three hypotheses implies that an isolated set is topologically transitive and hyperbolic: (i) the set is chain transitive and satisfies the (classical) shadowing property, (ii) the set satisfies the limit shadowing property, or (iii) the set satisfies the (asymptotic) shadowing property with the additional hypothesis that stable and unstable manifolds of any pair of critical orbits intersect each other. In our proof we essentially rely on the property of chain transitivity and, in particular, show that it is implied by the limit shadowing property. We also apply our results to divergence-free vector fields.
In this paper, we consider a Diophantine quasi-periodic time-dependent analytic perturbation of a convex integrable Hamiltonian system, and we prove a result of stability of the action variables for an exponentially long interval of time. This extends known results for periodic time-dependent perturbations, and partly solves a long standing conjecture of Chirikov and Lochak. We also obtain improved stability estimates close to resonances or far away from resonances, and a more general result without any Diophantine condition.
We investigate substitution subshifts and tiling dynamical systems arising from the substitutions (1) \\theta : 0 \\rightarrow 001,1 \\rightarrow 11001 and (2) \\eta : 0 \\rightarrow 001,1 \\rightarrow 11100. We show that the substitution subshifts arising from \\theta and \\eta have minimal self-joinings and are mildly mixing. We also give a criterion for 1-dimensional tiling systems arising from \\theta or \\eta to have minimal self-joinings. We apply this to obtain examples of mildly mixing 1-dimensional tiling systems.
A simple first-principles mathematical model is developed to predict the performance of a micro photosynthetic power cell (?PSC), an electrochemical device which generates electricity by harnessing electrons from photosynthesis in the presence of light. A lumped parameter approach is used to develop a model in which the electrochemical kinetic rate constants and diffusion effects are lumped into a single characteristic rate constant $K$. A non-parametric estimation of $K$ for the $\\mu$PSC is performed by minimizing the sum square errors (SSE) between the experimental and model predicted current and voltages. The developed model is validated by comparing the model predicted $v-i$ characteristics with experimental data not used in the parameter estimation. Sensitivity analysis of the design parameters and the operational parameters reveal interesting insights for performance enhancement. Analysis of the model also suggests that there are two different operating regimes that are observed in this $\\mu$PSC. This modeling approach can be used in other designs of $\\mu$PSCs for performance enhancement studies.
Let $T$ be an orientation-preserving Lipschitz expanding map of the circle $\\T$. A pre-image selector is a map $\\tau:\\T\\to\\T$ with finitely many discontinuities, each of which is a jump discontinuity, and such that $\\tau(x)\\in T^{-1}(x)$ for all $x\\in\\T$. The closure of the image of a pre-image selector is called a flower, and a flower with $p$ connected components is called a $p$-flower. We say that a real-valued Lipschitz function can be Lipschitz flattened on a flower whenever it is Lipschitz cohomologous to a constant on that flower. The space of Lipschitz functions which can be flattened on a given $p$-flower is shown to be of codimension $p$ in the space of all Lipschitz functions, and the linear constraints determining this subspace are derived explicitly. If a Lipschitz function $f$ has a maximizing measure $S$ which is Sturmian (i.e. is carried by a 1-flower), it is shown that $f$ can be Lipschitz flattened on some 1-flower carrying $S$.
Versions of the Oseledets multiplicative ergodic theorem for cocycles acting on infinite-dimensional Banach spaces have been investigated since the pioneering work of Ruelle in 1982 and are a topic of continuing research interest. For a cocycle to induce a continuous splitting in which the growth in one subbundle exponentially dominates the growth in another requires additional assumptions; a necessary and sufficient condition for the existence of such a dominated splitting was recently given by J. Bochi and N. Gourmelon for invertible finite-dimensional cocycles in discrete time. We extend this result to cocycles of injective bounded linear maps acting on Banach spaces (in both discrete and continuous time) using an essentially geometric approach based on a notion of approximate singular value decomposition in Banach spaces. Our method is constructive, and in the finite-dimensional case yields explicit growth estimates on the dominated splitting which may be of independent interest.
This work develops compressive sampling strategies for computing the dynamic mode decomposition (DMD) from heavily subsampled or output-projected data. The resulting DMD eigenvalues are equal to DMD eigenvalues from the full-state data. It is then possible to reconstruct full-state DMD eigenvectors using $\\ell_1$-minimization or greedy algorithms. If full-state snapshots are available, it may be computationally beneficial to compress the data, compute a compressed DMD, and then reconstruct full-state modes by applying the projected DMD transforms to full-state snapshots. These results rely on a number of theoretical advances. First, we establish connections between the full-state and projected DMD. Next, we demonstrate the invariance of the DMD algorithm to left and right unitary transformations. When data and modes are sparse in some transform basis, we show a similar invariance of DMD to measurement matrices that satisfy the so-called restricted isometry principle from compressive sampling. We demonstrate the success of this architecture on two model systems. In the first example, we construct a spatial signal from a sparse vector of Fourier coefficients with a linear dynamical system driving the coefficients. In the second example, we consider the double gyre flow field, which is a model for chaotic mixing in the ocean.
In this paper we deal with the existence of periodic orbits of geodesible vector fields on closed 3-manifolds. A vector field is geodesible if there exists a Riemannian metric on the ambient manifold making its orbits geodesics. In particular, Reeb vector fields and vector fields that admit a global section are geodesible. We will classify the closed 3-manifolds that admit aperiodic volume preserving real analytic geodesible vector fields, and prove the existence of periodic orbits for real analytic geodesible vector fields (not volume preserving), when the 3-manifold is not a torus bundle over the circle. We will also prove the existence of periodic orbits of C2 geodesible vector fields in some closed 3-manifolds.
We give both sufficient conditions and necessary conditions for the stochastic stability of non-uniformly expanding maps either with or without critical sets. We also show that the number of probability measures describing the statistical asymptotic behaviour of random orbits is bounded by the number of SRB measures if the noise level is small enough. As an application of these results we prove the stochastic stability of certain classes of non-uniformly expanding maps introduced in \\cite{V} and \\cite{ABV}.
We study the dynamics of piecewise affine surface homeomorphisms from the point of view of their entropy. Under the assumption of positive topological entropy, we establish the existence of finitely many ergodic and invariant probability measures maximizing entropy and prove a multiplicative lower bound for the number of periodic points. This is intended as a step towards the understanding of surface diffeomorphisms. We proceed by building a jump transformation, using not first returns but carefully selected \"good\" returns to dispense with Markov partitions. We control these good returns through some entropy and ergodic arguments.
We show that a homeomorphism of a semi-locally connected compact metric space is equicontinuous if and only if the distance between the iterates of a given point and a given subcontinuum (not containing that point) is bounded away from zero. This is false for general compact metric spaces. Moreover, homeomorphisms for which the conclusion of this result holds satisfy that the set of automorphic points contains those points where the space is not semi-locally connected.
In the present work PLL-based circuits with sinusoidal phase detector characteristic and active proportionally-integrating (PI) filter are considered. The notion of lock-in range -- an important characteristic of PLL-based circuits, which corresponds to the synchronization without cycle slipping, is studied. For the lock-in range a rigorous mathematical definition is discussed. Numerical and analytical estimates for the lock-in range are obtained.
A quadratic stochastic operator (in short QSO) is usually used to present the time evolution of differing species in biology. Some quadratic stochastic operators have been studied by Lotka and Volterra. In the present paper, we first give a simple characterization of Volterra QSO in terms of absolutely continuity of discrete measures. Moreover, we provide its generalization in continuous setting. Further, we introduce a notion of orthogonal preserving QSO, and describe such kind of operators defined on two dimensional simplex. It turns out that orthogonal preserving QSOs are permutations of Volterra QSO. The associativity of genetic algebras generated by orthogonal preserving QSO is studied too.
In this paper we consider sufficient conditions for the existence of uniform compact global attractor for non-autonomous dynamical systems in special classes of infinite-dimensional phase spaces. The obtained generalizations allow us to avoid the restrictive compactness assumptions on the space of shifts of non-autonomous terms in particular evolution problems. The results are applied to several evolution inclusions.
We consider the family $f_{a,b}(x,y)=(y,(y+a)/(x+b))$ of birational maps of the plane and the parameter values $(a,b)$ for which $f_{a,b}$ gives an automorphism of a rational surface. In particular, we find values for which $f_{a,b}$ is an automorphism of positive entropy but no invariant curve. The Main Theorem: If $f_{a,b}$ is an automorphism with an invariant curve and positive entropy, then either (1) $(a,b)$ is real, and the restriction of $f$ to the real points has maximal entropy, or (2) $f_{a,b}$ has a rotation (Siegel) domain.
When an integrable two-degrees-of-freedom Hamiltonian system possessing a circle of parabolic fixed points is perturbed, a parabolic resonance occurs. It is proved that its occurrence is generic for one parameter families (co-dimension one phenomenon) of near-integrable, t.d.o. systems. Numerical experiments indicate that the motion near a parabolic resonance exhibits new type of chaotic behavior which includes instabilities in some directions and long trapping times in others. Moreover, in a degenerate case, near a {\\it flat parabolic resonance}, large scale instabilities appear. A model arising from an atmospherical study is shown to exhibit flat parabolic resonance. This supplies a simple mechanism for the transport of particles with {\\it small} (i.e. atmospherically relevant) initial velocities from the vicinity of the equator to high latitudes. A modification of the model which allows the development of atmospherical jets unfolds the degeneracy, yet traces of the flat instabilities are clearly observed.
An optimal control strategy is developed to construct nanostructures of desired geometry along line segments by means of directed self-assembly of charged particles. Such a control strategy determines the electric potentials of a set of electrodes located at fixed points in the line segment. The particles move under the electric forces generated by these electrodes and by the interactions between the particles themselves to form a desired pattern eventually. Due to technology limitations, the particle positions cannot be measured during the course of control, so that the control is open-loop in nature. Such an open-loop control optimally changes the electrode potentials in time in order to create a desired pattern with the highest probability, despite the inherent uncertainty in the initial positions and the dynamical behaviors of the particles. Two models are proposed to describe the uncertain dynamics of the particles: a continuous model relying on a set of nonlinear stochastic differential equations, and a discrete Ising model consisting of a large dimensional continuous-time Markov chain. While the first model is more mathematically tractable, the second one more precisely describes particles at the nanometer scale. The control design procedure begins with the continuous model and identifies the structure of its stable equilibria, which is used later to propose a piecewise constant structure for the control and to demonstrate that the optimal value of each piece is independently obtained from a certain static optimization problem. It is shown next that the design procedure can be applied to the discrete model with only minor modifications. A numerical example of control design is presented.
We introduce multifractal zeta-functions providing precise information of a very general class of multifractal spectra, including, for example, the multifractal spectra of self-conformal measures and the multifractal spectra of ergodic Birkhoff averages of continuous functions. More precisely, we prove that these and more general multifractal spectra equal the abscissae of convergence of the associated zetafunctions.
This paper presents review points of mathematical modeling and system identification issues of heat flow process inside a closed box. For system parameter identification, the least squares method is employed and NI Temperature Box is used as a test rig for different reference temperature values. Curve Fitting toolbox and M-file codes written in MATLAB are used based on the Levenberg-Marquardt algorithm in solving least squares equations of the system.
We consider the dynamical properties of $C^{\\infty}$-variations of the flow on an aperiodic Kuperberg plug ${\\mathbb K}$. Our main result is that there exists a smooth 1-parameter family of plugs ${\\mathbb K}_{\\epsilon}$ for $\\epsilon \\in (-a,a)$ and $a<1$, such that: (1) The plug ${\\mathbb K}_0 = {\\mathbb K}$ is a generic Kuperberg plug; (2) For $\\epsilon <0$, the flow in the plug ${\\mathbb K}_{\\epsilon}$ has two periodic orbits that bound an invariant cylinder, all other orbits of the flow are wandering, and the flow has topological entropy zero; (3) For $\\epsilon > 0$, the flow in the plug ${\\mathbb K}_{\\epsilon}$ has positive topological entropy, and an abundance of periodic orbits.
In this paper we consider continued fraction (CF) expansions on intervals different from $[0,1]$. For every $x$ in such interval we find a CF expansion with a finite number of possible digits. Using the natural extension, the density of the invariant measure is obtained in a number of examples. In case this method does not work, a Gauss-Kuzmin-L\\ evy based approximation method is used. Finally, a subfamily of the $N$-expansions is studied. In particular, the entropy as a function of a parameter $\\alpha$ is estimated for $N=2$ and $N=36$. Interesting behavior can be observed from numerical results.
The Hooghly-Matla estuarine complex is the unique estuarine system of the world. Nutrient from the litterfall enrich the adjacent estuary through tidal influence which in turn regulate the phytoplankton, zooplankton and fish population dynamics. Environmental factors regulate the biotic components of the system, among which salinity plays a leading role in the regulation of phytoplankton, zooplankton and fish dynamics of the estuary. In this article, a $PZF$ model is considered with Holling type-II response function. The present model considers salinity based equations on plankton dynamics of the estuary. The interior equilibrium is considered as the most important equilibrium state of this model. The model equations are solved both analytically and numerically using the real data base of Hooghly-Matla estuarine system. The essential mathematical features of the present model have been analyzed thorough local and global stability and the bifurcations arising in some selected situations. A combination of set of values of the salinity of the estuary are identified that helped to determine the sustenance of fish population in the system. The ranges of salinity under which the system undergoes Hopf bifurcation are determined. Numerical illustrations are performed in order to validate the applicability of the model under consideration.
In this paper, we study asymptotic behavior arising in inverse limit spaces of dendrites. In particular, the inverse limit is constructed with a single unimodal bonding map, for which points have unique itineraries and the critical point is periodic. Using symbolic dynamics, sufficient conditions for two rays in the inverse limit space to have asymptotic parameterizations are given. Being a topological invariant, the classification of asymptotic parameterizations would be a useful tool when determining if two spaces are homeomorphic.
We characterize the sequences of fixed point indices $\\{i(f^n, p)\\}_{n\\ge 1}$ of fixed points that are isolated as an invariant set and continuous maps in the plane. In particular, we prove that the sequence is periodic and $i(f^n, p) \\le 1$ for every $n \\ge 1$. This characterization allows us to compute effectively the Lefschetz zeta functions for a wide class of continuous maps in the 2-sphere, to obtain new results of existence of infinite periodic orbits inspired on previous articles of J. Franks and to give a partial answer to a problem of Shub about the growth of the number of periodic orbits of degree--$d$ maps in the 2-sphere.
We construct classes of two-dimensional aperiodic Lorentz systems that have infinite horizon and are  chaotic , in the sense that they are (Poincar\\ e) recurrent, uniformly hyperbolic, ergodic, and the first-return map to any scatterer is $K$-mixing. In the case of the Lorentz tubes (i.e., Lorentz gases in a strip), we define general measured families of systems (\\emph{ensembles}) for which the above properties occur with probability 1. In the case of the Lorentz gases in the plane, we define families, endowed with a natural metric, within which the set of all chaotic dynamical systems is uncountable and dense.
We have discussed non-linear stability in photogravitational non-planar restricted three body problem with oblate smaller primary. By photogravitational we mean that both primaries are radiating. We normalised the Hamiltonian using Lie transform as in Coppola and Rand (1989). We transformed the system into Birkhoff s normal form. Lie transforms reduce the system to an equivalent simpler system which is immediately solvable. Applying Arnold s theorem, we have found non-linear stability criteria. We conclude that $L_6$ is stable. We plotted graphs for $(\\omega_1, D_2).$ They are rectangular hyperbola.
Invertible compositions of one-dimensional maps are studied which are assumed to include maps with non-positive Schwarzian derivative and others whose sum of distortions is bounded. If the assumptions of the Koebe principle hold, we show that the joint distortion of the composition is bounded. On the other hand, if all maps with possibly non-negative Schwarzian derivative are almost linear-fractional and their nonlinearities tend to cancel leaving only a small total, then they can all be replaced with affine maps with the same domains and images and the resulting composition is a very good approximation of the original one. These technical tools are then applied to prove a theorem about critical circle maps.
Let $M$ be a smooth compact manifold and $\\Lambda$ be a compact invariant set. In this paper we prove that for every robustly transitive set $\\Lambda$, $f|_\\Lambda$ satisfies a $C^1-$generic-stable shadowable property (resp., $C^1-$generic-stable transitive specification property or $C^1-$generic-stable barycenter property) if and only if $\\Lambda$ is a hyperbolic basic set. In particular, $f|_\\Lambda$ satisfies a $C^1-$stable shadowable property (resp., $C^1-$stable transitive specification property or $C^1-$stable barycenter property) if and only if $\\Lambda$ is a hyperbolic basic set. Similar results are valid for volume-preserving case.
Hegselmann and Krause introduced a discrete-time model of opinion dynamics with agents having limit confidence. It is well known that the dynamics reaches a stable state in a polynomial number of time steps. However, the gap between the known lower and upper bounds for the worst case is still immense. In this paper exact values for the maximum time, needed to reach consensus or to discover that consensus is impossible, are determined for small number of agents using an integer linear programming approach.
Let $\\Lambda$ be an isolated non-trival transitive set of a $C^1$ generic diffeomorphism $f\\in\\Diff(M)$. We show that the space of invariant measures supported on $\\Lambda$ coincides with the space of accumulation measures of time averages on one orbit. Moreover, the set of points having this property is residual in $\\Lambda$ (which implies the set of irregular$^+$ points is also residual in $\\Lambda$). As an application, we show that the non-uniform hyperbolicity of irregular$^+$ points in $\\Lambda$ with totally 0 measure (resp., the non-uniform hyperbolicity of a generic subset in $\\Lambda$) determines the uniform hyperbolicity of $\\Lambda$.
In this manuscript, we establish asymptotic local exponential stability of the trivial solution of differential equations driven by H\\\"older--continuous paths with H\\\"older exponent greater than $1/2$. This applies in particular to stochastic differential equations driven by fractional Brownian motion with Hurst parameter greater than $1/2$. We motivate the study of local stability by giving a particular example of a scalar equation, where global stability of the trivial solution can be obtained.
We study the integrable system of first order differential equations $\\omega_i(v) =\\alpha_i,\\prod_{j\\neq i}\\omega_j(v)$, $(1\\!\\leq i, j\\leq\\! N)$ as an initial value problem, with real coefficients $\\alpha_i$ and initial conditions $\\omega_i(0)$. The analysis is based on its quadratic first integrals. For each dimension $N$, the system defines a family of functions, generically hyperelliptic functions. When $N=3$, this system generalizes the classic Euler system for the reduced flow of the free rigid body problem, thus we call it $N$-extended Euler system ($N$-EES). In this Part I the cases $N=4$ and $N=5$ are studied, generalizing Jacobi elliptic functions which are defined as a 3-EES. Taking into account the nested structure of the $N$-EES, we propose reparametrizations of the type ${\\rm d}v^*=g(\\omega_i),{\\rm d}v$ that separate geometry from dynamic. Some of those parametrizations turn out to be generalization of the {\\sl Jacobi amplitude}. In Part II we consider geometric properties of the $N$-system and the numeric computation of the functions involved. It will be published elsewhere.
We prove that mixing on rank-one transformations is equivalent to the spacer sequence being slice-ergodic. Slice-ergodicity, introduced in this paper, generalizes the notion of ergodic sequence to the uniform convergence of ergodic averages (as in the mean ergodic theorem) over subsequences of partial sums. We show that polynomial staircase transformations satisfy this condition and therefore are mixing.
We discuss the existence of the global attractor for a family of processes $U_\\sigma(t,\\tau)$ acting on a metric space $X$ and depending on a symbol $\\sigma$ belonging to some other metric space $\\Sigma$. Such an attractor is uniform with respect to $\\sigma\\in\\Sigma$, as well as with respect to the choice of the initial time $\\tau\\in\\R$. The existence of the attractor is established for totally dissipative processes without any continuity assumption. When the process satisfies some additional (but rather mild) continuity-like hypotheses, a characterization of the attractor is given.
According to the Furstenberg-Zimmer structure theorem, every measure-preserving system has a maximal distal factor, and is weak mixing relative to that factor. Furstenberg and Katznelson used this structural analysis of measure-preserving systems to provide a perspicuous proof of Szemer\\ edi s theorem. Beleznay and Foreman showed that, in general, the transfinite construction of the maximal distal factor of a separable measure-preserving system can extend arbitrarily far into the countable ordinals. Here we show that the Furstenberg-Katznelson proof does not require the full strength of the maximal distal factor, in the sense that the proof only depends on a combinatorial weakening of its properties. We show that this combinatorially weaker property obtains fairly low in the transfinite construction, namely, by the $\\omega^{\\omega^\\omega}$th level.
In symmetric Hamiltonian systems, relative equilibria usually arise in continuous families. The geometry of these families in the setting of free actions of the symmetry group is well-understood. Here we consider the question for non-free actions. Some results are already known in this direction, and we use the so called bundle equations to provide a systematic treatment of this question which both consolidates the known results, extending the scope of the results to deal with non-compact symmetry groups, as well as producing new results. Specifically we address questions about the stability, persistence and bifurcations of these relative equilibria.
We prove that a generic linear cocycle over a minimal base dynamics of finite dimension has the property that the Oseledets splitting with respect to any invariant probability coincides almost everywhere with the finest dominated splitting. Therefore the restriction of the generic cocycle to a subbundle of the finest dominated splitting is uniformly subexponentially quasiconformal. This extends a previous result for SL(2,R)-cocycles due to Avila and the author.
Let $\\Gamma$ be a lattice of a semisimple Lie group $L$. Suppose that one parameter Ad-diagonalizable subgroup $\\{g_t\\}$ of $L$ acts ergodically on $L/\\Gamma$ with respect to the probability Haar measure $\\mu$. For certain proper subgroup $U$ of the unstable horospherical subgroup of $\\{g_t\\}$ we show that given $x\\in L/\\Gamma$ for almost every $u\\in U$ the trajectory $\\{g_tux: 0\\le t\\le T\\}$ is uniformly distributed with respect to $\\mu$ as $T\\to \\infty$.
J.-P. Thouvenot and the author showed via different approaches that the centralizer of a mixing rank-one infinite measure preserving transformation was trivial. In this note the author presents his joining proof. We also consider constructions with algebraic spacers as well as a class of Sidon constructions to produce new examples of mixing rank one transformations. In connection with Gordin s question on the existence of homoclinic ergodic actions for a zero entropy system we also discuss Poisson suspensions of some modifications of Sidon rank one constructions.
This paper is concerned with stability analysis of nonlinear time-varying systems by using Lyapunov function based approach. The classical Lyapunov stability theorems are generalized in the sense that the time-derivative of the Lyapunov functions are allowed to be indefinite. The stability analysis is accomplished with the help of the scalar stable functions introduced in our previous study. Both asymptotic stability and input-to-state stability are considered. Particularly, for asymptotic stability, several concepts such as uniform and non-uniform asymptotic stability, and uniform and non-uniform exponential stability are studied. The effectiveness of the proposed theorems is illustrated by several numerical examples.
This paper deals with the attractors of generic dynamical systems. We introduce the notion of epsilon-invisible set, which is an open set in which almost all orbits spend on average a fraction of time no greater than epsilon. For extraordinarily small values of epsilon (say, smaller than 2^{-100}), these are areas of the phase space which an observer virtually never sees when following a generic orbit. We construct an open set in the space of all dynamical systems which have an epsilon-invisible set that includes parts of attractors of size comparable to the entire attractor of the system, for extraordinarily small values of epsilon. The open set consists of C^1 perturbations of a particular skew product over the Smale-Williams solenoid. Thus for all such perturbations, a sizable portion of the attractor is almost never visited by generic orbits and practically never seen by the observer.
In this paper, we study heterodimensional cycles of two-parameter families of 3-dimensional diffeomorphisms some element of which contains nondegenerate heterodimensional tangencies of the stable and unstable manifolds of two saddle points with different indexes, and prove that such diffeomorphisms can be well approximated by another element which has a quadratic homoclinic tangency associated to one of these saddle points. Moreover, it is shown that the tangency unfolds generically with respect to the family. This result together with some theorem in Viana, we detect strange attractors appeared arbitrarily close to the original element with the heterodimensional cycle.
We consider the problem of the observability of positively expansive maps by the time series associated to continuous real functions. For this purpose we prove a general result on the generic observability of a locally injective map of a compact metric space of finite topological dimension, extending earlier work by Gutman [6]. We apply this result to partially solve the problem of finding the minimal number of functions needed to observe a positively expansive map. We prove that two functions are necessary and sufficient for positively expansive maps on tori.
In this paper, we first draw a connection between the existence of a stationary density function (which corresponds to an equilibrium state in the sense of statistical mechanics) and a set of feedback operators in a multi-channel system that strategically interacts in a game-theoretic framework. In particular, we show that there exists a set of (game-theoretic) equilibrium feedback operators such that the composition of the multi-channel system with this set of equilibrium feedback operators, when described by density functions, will evolve towards an equilibrium state in such a way that the entropy of the whole system is maximized. As a result of this, we are led to study, by a means of a stationary density function (i.e., a common fixed-point) for a family of Frobenius-Perron operators, how the dynamics of the system together with the equilibrium feedback operators determine the evolution of the density functions, and how this information translates into the maximum entropy behavior of the system. Later, we use such results to examine the resilient behavior of this set of equilibrium feedback operators, when there is a small random perturbation in the system.
We present a method of cones for rigorous estimations of eigenvectors, eigenspaces and eigenvalues of a matrix. The key notion is the cone-domination and is inspired by ideas from hyperbolic dynamical systems. We present theorems which allow to rigorously locate the spectrum of the matrix and the eigenspaces, also multidimensional ones in case of eigenvalues of multiplicity greater than one or clusters of close eigenvalues. In case of isolated eigenvalue we show that the our method give the same or better estimates than ones known in literature.
We disprove the conjecture that distributional chaos of type 3 (briefly, DC3) is iteration invariant and show that a slightly strengthened definition, denoted by DC2$\\frac{1}{2}$, is preserved under iteration, i.e. $f^n$ is DC2$\\frac{1}{2}$ if and only if $f$ is too. Unlike DC3, DC2$\\frac{1}{2}$ is also conjugacy invariant and implies Li-Yorke chaos. The definition of DC2$\\frac{1}{2}$ is the following: a pair $(x,y)$ is DC2$\\frac{1}{2}$ iff $\\Phi_{(x,y)}(0)<\\Phi^*_{(x,y)}(0)$, where $\\Phi_{(x,y)}(\\delta)$ (resp. $\\Phi^*_{(x,y)}(\\delta)$) is lower (resp. upper) density of times $k$ when $d(f^k(x),f^k(y))<\\delta$ and both densities are defined at 0 as limits of their values for $\\delta\\to 0^+$. Hence DC$2\\frac{1}{2}$ shares similar properties with DC1 and DC2 but unlike them, strict DC$2\\frac{1}{2}$ systems must have zero topological entropy.
According to a conjecture of Lindenstrauss and Tsukamoto, a topological dynamical system $(X,T)$ is embeddable in the $d$-cubical shift $(([0,1]^{d})^{\\mathbb{Z}},\\ shift)$ if both its mean dimension and periodic dimension are strictly bounded by $\\frac{d}{2}$. We verify the conjecture for the class of systems admitting finite dimensional non-wandering sets (under the additional assumption of closed periodic points set). The main tool in the proof is the new concept of local markers. Continuing the investigation of (global) markers initiated in previous work it is shown that the marker property is equivalent to a topological version of the Rokhlin Lemma. Moreover new classes of systems are found to have the marker property, in particular, extensions of aperiodic systems with a countable number of minimal subsystems. Extending work of Lindenstrauss we show that for systems with the marker property vanishing mean dimension is equivalent to the small boundary property. Finally we answer a question by Downarowicz in the affirmative: the small boundary property is equivalent to admitting a zero-dimensional isomorphic extension.
Three dimensional H\\ non-like map $$ F(x,y,z) = (f(x) - \\epsilon (x,y,z),\\ x,\\ \\delta (x,y,z)) $$ is defined on the cubic box $ B $. An invariant space under renormalization would appear only in higher dimension. Consider renormalizable maps each of which satisfies the condition $$ \\partial_y \\delta \\circ F(x,y,z) + \\partial_z \\delta \\circ F(x,y,z) \\cdot \\partial_x \\delta (x,y,z) \\equiv 0 $$ for $ (x,y,z) \\in B $. Denote the set of maps satisfying the above condition be $ \\mathcal N $. Then the set $ \\mathcal N \\cap \\mathcal I(\\bar \\epsilon) $ is invariant under the renormalization operator where $ \\mathcal I(\\bar \\epsilon) $ is the set of infinitely renormalizable maps. H\\ enon like diffeomorphism in $ \\mathcal N \\cap \\mathcal I(\\bar \\epsilon) $ has universal numbers, $ b_2 \\asymp | \\partial_z \\delta | $ and $ b_1 = b_F /b_2 $ where $ b_F $ is the average Jacobian of $ F $. The Cantor attractor of $ F \\in \\mathcal N \\cap \\mathcal I(\\bar \\epsilon) $, $ \\mathcal O_F $ has {\\em unbounded geometry} almost everywhere in the parameter space of $ b_1 $. If two maps in $ \\mathcal N $ has different universal numbers $ b_1 $ and $ \\widetilde b_1 $, then the homeomorphism between two Cantor attractor is at most H\\\"older continuous, which is called {\\em non rigidity}.
We study the evolution, under convex Hamiltonian flows on cotangent bundles of compact manifolds, of certain distinguished subsets of the phase space. These subsets are generalizations of Lagrangian graphs, we call them pseudographs. They emerge in a natural way from Fathi s weak KAM theory. By this method, we find various orbits which connect prescribed regions of the phase space. Our study is inspired by works of John Mather. As an application, we obtain the existence of diffusion in a large class of a priori unstable systems and provide a solution to the large gap problem. We hope that our method will have applications to more examples.
In this paper, for the spatial Newtonian $2n$-body problem with equal masses, by proving the minimizers of the action functional under certain symmetric, topological and monotone constraints are collision-free, we found a family of spatial double choreographies, which have the common feature that half of the masses are circling around the $z$-axis clockwise along a spatial loop, while the motions of the other half masses are given by a rotation of the first half around the $x$-axis by $\\pi$. Both loops are simple, without any self-intersection, and symmetric with respect to the $xz$-plane and $yz$-plane. The set of intersection points between the two loops is non-empty and contained in the $xy$-plane. The number of such double choreographies grows exponentially as $n$ goes to infinity.
This paper is concerned with a SIS (susceptible, infected and susceptible populations) propagation disease model with a nonlinear incidence rate and eventual impulsive (non- necessarily being simultaneous) culling of both populations. The disease transmission does not necessarily take into account the total population as a normalizing effect. In this sense, the considered model is a mixed pseudo-mass. The positivity, stability of both the impulse- free and impulsive under pulse culling variants of the model are investigated in this paper.
Given a regular network (in which all cells have the same type and receive the same number of inputs and all arrows have the same type), we define the special Jordan subspaces to that network and we use these subspaces to study the synchrony phenomenon in the theory of coupled cell networks. To be more precise, we prove that the synchrony subspaces of a regular network are precisely the polydiagonals that are direct sums of special Jordan subspaces. We also show that special Jordan subspaces play a special role in the lattice structure of all synchrony subspace because every join-irreducible element of the lattice is the smallest synchrony subspace containing some special Jordan subspace.
We consider classes of partially hyperbolic diffeomorphism $f:M\\to M$ with splitting $TM=E^s\\oplus E^c\\oplus E^u$ and $\\dim E^c=2$. These classes include for instance (perturbations of) the product of Anosov and conservative surface diffeomorphisms, skew products of surface diffeomorphisms over Anosov, partially hyperbolic symplectomorphisms on manifolds of dimension four with bidimensional center foliation whose center leaves are all compact. We prove that accessibility holds in these classes for $C^1$ open and $C^r$ dense subsets and moreover they are stably ergodic.
The global attractor conjecture says that toric dynamical systems (i.e., a class of polynomial dynamical systems on the positive orthant) have a globally attracting point within each positive linear invariant subspace -- or, equivalently, complex balanced mass-action systems have a globally attracting point within each positive stoichiometric compatibility class. A proof of this conjecture implies that a large class of nonlinear dynamical systems on the positive orthant have very simple and stable dynamics. The conjecture originates from the 1972 breakthrough work by Fritz Horn and Roy Jackson, and was formulated in its current form by Horn in 1974. We introduce toric differential inclusions, and we show that each positive solution of a toric differential inclusion is contained in an invariant region that prevents it from approaching the origin. We use this result to prove the global attractor conjecture. In particular, it follows that all detailed balanced mass action systems and all deficiency zero weakly reversible networks have the global attractor property.
We study the dimension spectrum for Lyapunov exponents for rational maps acting on the Riemann sphere and characterize it by means of the Legendre-Fenchel transform of the hidden variational pressure. This pressure is defined by means of the variational principle with respect to non-atomic invariant probability measures and is associated to certain $\\sigma$-finite conformal measures. This allows to extend previous results to exceptional rational maps.
We show that expanding toral endomorphisms, together with their respective Lebesgue measure are isomorphic to 1-sided Bernoulli shifts. This result is then extended to smooth perturbations of expanding toral endomorphisms, together with their respective measures of maximal entropy. Also we study group extensions of expanding toral endomorphisms and show that under certain, not too restrictive conditions on the extension cocycle, these skew products are 1-sided Bernoulli as well.
Let \\Gamma be a lattice in G=SL(n,R) and X=G/S a homogeneous space of G, where S is a closed subgroup of G which contains a real algebraic subgroup H such that G/H is compact. We establish uniform distribution of orbits of \\Gamma in X analogous to the classical equidistribution on torus. To obtain this result, we first prove an ergodic theorem along balls in the connected component of Borel subgroup of G.
Recently, Peter Doyle and Curt McMullen devised an iterative solution to the fifth degree polynomial. At the method s core is a rational mapping of the Riemann sphere with the icosahedral symmetry of a general quintic. Moreover, this map posseses \"reliable\" dynamics: for almost any initial point, the its trajectory converges to one of the periodic cycles that comprise an icosahedral orbit. This symmetry-breaking provides for a reliable or \"generally-convergent\" quintic-solving algorithm: with almost any fifth-degree equation, associate a rational mapping that has reliable dynamics and whose attractor consists of points from which one computes a root. An algorithm that solves the sixth-degree equation requires a dynamical system with the symmetry of the alternating group on six things. This group does not act on the Riemmann sphere, but does act on the complex projective plane--this is the Valentiner group. The present work exploits the resulting 2-dimensional geometry in finding a Valentiner-symmetric rational mapping whose elegant dynamics experimentally appear to be reliable in the above sense---transferred to the 2-dimensional setting. This map provides the central feature of a conjecturally-reliable sextic-solving algorithm analogous to that employed in the quintic case.
A homeomorphism on a compact metric space is said hyper-expansive if every pair of different compact sets are separated by the homeomorphism in the Hausdorff metric. We characterize such dynamics as those with a finite number of orbits and whose non-wandering set is the union of the repelling and the attracting periodic orbits. We also give a characterization of compact metric spaces admiting hyper-expansive homeomorphisms.
A pentagon in the plane with fixed side-lengths has a two-dimensional shape space. Considering the pentagon as a mechanical system with point masses at the corners we answer the question of how much the pentagon can rotate with zero angular momentum. We show that the shape space of the equilateral pentagon has genus 4 and find a fundamental region by discrete symmetry reduction with respect to symmetry group D_5. The amount of rotation \\Delta \\theta for a loop in shape space at zero angular momentum is interpreted as a geometric phase and is obtained as an integral of a function B over the region of shape space enclosed by the loop. With a simple variational argument we determine locally optimal loops as the zero contours of the function B. The resulting shape change is represented as a Fourier series, and the global maximum of \\Delta \\theta \\approx 45\\degree is found for a loop around the regular pentagram. We also show that restricting allowed shapes to convex pentagons the optimal loop is the boundary of the convex region and gives \\Delta \\theta \\approx 19\\degree.
Quadratic laminations of the unit disk were introduced by Thurston as a vehicle for understanding the (connected) Julia sets of quadratic polynomials and the parameter space of quadratic polynomials. The \"Central Strip Lemma\" plays a key role in Thurston s classification of gaps in quadratic laminations, and in describing the corresponding parameter space. We generalize the notion of {\\em Central Strip} to laminations of all degrees $d\\ge2$ and prove a Central Strip Lemma for degree $d\\ge2$. We conclude with applications of the Central Strip Lemma to {\\em identity return polygons} that show it may play a role similar to Thurston s lemma for higher degree laminations.
The no invariant line fields conjecture is one of the main outstanding problems in traditional complex dynamics. In this paper we consider non-autonomous iteration where one works with compositions of sequences of polynomials with suitable bounds on the degrees and coefficients. We show that the natural generalization of the no invariant line fields conjecture to this setting is not true. In particular, we construct a sequence of quadratic polynomials whose iterated Julia sets all have positive area and which has an invariant sequence of measurable line fields whose supports are these iterated Julia sets.
We consider typical area preserving flows on higher genus surfaces and prove that the flow restricted to mixing minimal components is mixing of all orders, thus answering affimatively to Rohlin s multiple mixing question in this context. The main tool is a variation of the Ratner property (a property originally proved by Ratner for the horocycle flow), i.e. the switchable Ratner property introduced by Fayad and Kanigowski for special flows over rotations. This property, which is of independent interest, provides a quantitative description of the parabolic behaviour of these flows and has implications to joinings classification. The main result is formulated in the language of special flows over interval exchange transformations with asymmetric logarithmic singularities. We also prove a strengthening of one of Fayad and Kanigowski s main results, by showing that Arnold s flows are mixing of all orders for almost every location of the singularities.
This paper studies the equivalence between differentiable and non-differentiable dynamics in Rn. Filippov s theory of discontinuous differential equations allows us to find flow solutions of dynamical systems whose vector fields undergo switches at thresholds in phase space. The canonical convex combination at the discontinuity is only the linear part of a nonlinear combination that more fully explores Filippov s most general problem: the differential inclusion. Here we show how recent work relating discontinuous systems to singular limits of continuous (or regularized) systems extends to nonlinear combinations. We show that if sliding occurs in a discontinuous systems, there exists a differentiable slow-fast system with equivalent slow invariant dynamics. We also show the corresponding result for the pinching method, a converse to regularization which approximates a smooth system by a discontinuous one.
Rudolph showed that the orbits of any measurable, measure preserving $\\mathbb R^d$ action can be measurably tiled by $2^d$ rectangles and asked if this number of tiles is optimal for $d>1$. In this paper, using a tiling of $\\mathbb R^d$ by notched cubes, we show that $d+1$ tiles suffice. Furthermore, using a detailed analysis of the set of invariant measures on tilings of $\\mathbb R^2$ by two rectangles, we show that while for $\\mathbb R^2$ actions with completely positive entropy this bound is optimal there exist mixing $\\mathbb R^2$ actions whose orbits can be tiled by 2 tiles.
We consider a smooth Anosov diffeomorphism with a smooth dynamical foliation. We show upper bounds on the essential spectral radius of its transfer operator acting on anisotropic Sobolev spaces. (Such bounds are related to the essential decorrelation rate for the SRB measure.) We compare our results to the estimates of Kitaev on the domain of holomorphy of dynamical Fredholm determinants for differentiable dynamics.
In this paper we start a global study of the parameter space (dissipation, perturbation, frequency) of the dissipative spin-orbit problem in Celestial Mechanics with the aim of delimiting regions where the dynamics, or at least some of its important features, is determined. This is done via a study of the corresponding family of time $2\\pi$-maps. In the same spirit as Chenciner in his 1895 article on bifurcations of elliptic fixed points, we are at first interested in delimiting regions where the normal hyperbolicity is sufficiently important to guarantee the persistence of an invariant attractive (resp. repulsive) circle under perturbation. As a tool, we use an analogue for diffeomorphisms in this family of R\\\"ussmann s translated curve theorem in analytic category.
Schreier graphs, which possess both a graph structure and a Schreier structure (an edge-labeling by the generators of a group), are objects of fundamental importance in group theory and geometry. We study the Schreier structures with which unlabeled graphs may be endowed, with emphasis on structures which are invariant in some sense (e.g. conjugation-invariant, or sofic). We give proofs of a number of \"folklore\" results, such as that every regular graph of even degree admits a Schreier structure, and show that, under mild assumptions, the space of invariant Schreier structures over a given invariant graph structure is very large, in that it contains uncountably many ergodic measures. Our work is directly connected to the theory of invariant random subgroups, a field which has recently attracted a great deal of attention.
In this article, we investigate the mathematical part of De Sitter s theory on the Galilean satellites, and further extend this theory by showing the existence of some quasi-periodic librating orbits by applications of KAM theorems. After showing the existence of De Sitter s family of linearly stable periodic orbits in the Jupiter-Io-Europa-Ganymede model by averaging and reduction techniques in the Hamiltonian framework, we further discuss the possible extension of this theory to include a fourth satellite Callisto, and establish the existence of a set of positive measure of quasi-periodic librating orbits in both models for almost all choices of masses.
In this paper we consider input-to-state stability (ISS) of impulsive control systems with and without time-delays. We prove that if the time-delay system possesses an exponential Lyapunov-Razumikhin function or an exponential Lyapunov-Krasovskii functional, then the system is uniformly ISS provided that the average dwell-time condition is satisfied. Then, we consider large-scale networks of impulsive systems with and without time-delays and we prove that the whole network is uniformly ISS under a small-gain and a dwell-time condition. Moreover, these theorems provide us with tools to construct a Lyapunov function (for time-delay systems - a Lyapunov-Krasovskii functional or a Lyapunov-Razumikhin function) and the corresponding gains of the whole system, using the Lyapunov functions of the subsystems and the internal gains, which are linear and satisfy the small-gain condition. We illustrate the application of the main results on examples.
A method is provided for approximating random slow manifolds of a class of slow-fast stochastic dynamical systems. Thus approximate, low dimensional, reduced slow systems are obtained analytically in the case of sufficiently large time scale separation. To illustrate this dimension reduction procedure, the impact of random environmental fluctuations on the settling motion of inertial particles in a cellular flow field is examined. It is found that noise delays settling for some particles but enhances settling for others. A deterministic stable manifold is an agent to facilitate this phenomenon. Overall, noise appears to delay the settling in an averaged sense.
This paper will study topological, geometrical and measure-theoretical properties of the real Fibonacci map. Our goal was to figure out if this type of recurrence really gives any pathological examples and to compare it with the infinitely renormalizable patterns of recurrence studied by Sullivan. It turns out that the situation can be understood completely and is of quite regular nature. In particular, any Fibonacci map (with negative Schwarzian and non-degenerate critical point) has an absolutely continuous invariant measure (so, we deal with a ``regular   type of chaotic dynamics). It turns out also that geometrical properties of the closure of the critical orbit are quite different from those of the Feigenbaum map: its Hausdorff dimension is equal to zero and its geometry is not rigid but depends on one parameter.
We prove that for $C^1$ generic diffeomorphisms, if a homoclinic class $H(P)$ contains two hyperbolic periodic orbits of indices $i$ and $i+k$ respectively and $H(P)$ has no domination of index $j$ for any $j\\in\\{i+1,\\cdots,i+k-1\\}$, then there exists a non-hyperbolic ergodic measure whose $(i+l)^{th}$ Lyapunov exponent vanishes for any $l\\in\\{1,\\cdots, k\\}$, and whose support is the whole homoclinic class. We also prove that for $C^1$ generic diffeomorphisms, if a homoclinic class $H(P)$ has a dominated splitting of the form $E\\oplus F\\oplus G$, such that the center bundle $F$ has no finer dominated splitting, and $H(p)$ contains a hyperbolic periodic orbit $Q_1$ of index $\\dim(E)$ and a hyperbolic periodic orbit $Q_2$ whose absolute Jacobian along the bundle $F$ is strictly less than $1$, then there exists a non-hyperbolic ergodic measure whose Lyapunov exponents along the center bundle $F$ all vanish and whose support is the whole homoclinic class.
We demonstrate a new approach to the computation of ratios of elliptic integrals. It turns out that almost closed polygons interscribed between two conics retain some of the properties of such closed polygons. We apply these retained properties to compute ratios of an incomplete elliptic integral over the complete one. This computation is based on an iterative procedure to determine the sequence of vertices of a polygon interscribed between two conics. Surprisingly, some iteration numbers are the denominators of the convergent fractions for thye ratio of some elliptic integrals. The algorithm ensures high precision, is numerically stable and as fast as the arithmetic-geometric mean method, though not faster. Nonetheless, there are reasons to consider the proposed algorithm as it is quite differentfrom other integration methods and may be applicable to other problems.
We show that the discrete complex, and numerous hypercomplex, Fourier transforms defined and used so far by a number of researchers can be unified into a single framework based on a matrix exponential version of Euler s formula $e^{j\\theta}=\\cos\\theta+j\\sin\\theta$, and a matrix root of -1 isomorphic to the imaginary root $j$. The transforms thus defined can be computed using standard matrix multiplications and additions with no hypercomplex code, the complex or hypercomplex algebra being represented by the form of the matrix root of -1, so that the matrix multiplications are equivalent to multiplications in the appropriate algebra. We present examples from the complex, quaternion and biquaternion algebras, and from Clifford algebras Cl1,1 and Cl2,0. The significance of this result is both in the theoretical unification, and also in the scope it affords for insight into the structure of the various transforms, since the formulation is such a simple generalization of the classic complex case. It also shows that hypercomplex discrete Fourier transforms may be computed using standard matrix arithmetic packages without the need for a hypercomplex library, which is of importance in providing a reference implementation for verifying implementations based on hypercomplex code.
Let F be characteristic zero field, G a residually finite group and W a G-prime and PI F-algebra. By constructing G-graded central polynomials for W, we prove the G-graded version of Posner s theorem. More precisely, if S denotes all non-zero degree e central elements of W, the algebra S^{-1}W is G-graded simple and finite dimensional over its center. Furthermore, we show how to use this theorem in order to recapture the result of Aljadeff and Haile stating that two G-simple algebras of finite dimension are isomorphix iff their ideals of graded identities coincide.
We study the question of the surjectivity of the Galois correspondence from subHopf algebras to subfields given by the Fundamental Theorem of Galois Theory for abelian Hopf Galois structures on a Galois extension of fields with Galois group G , a finite abelian p-group. Applying the connection between regular subgroups of the holomorph of a finite abelian p-group (G, +) and associative, commutative nilpotent algebra structures A on (G, +) of Caranti, et. al., we show that if A gives rise to a H-Hopf Galois structure on L/K, then the K-subHopf algebras of H correspond to the ideals of A. Among the applications, we show that if G and G  are both elementary abelian p-groups, then the only Hopf Galois structure on L/K of type G for which the Galois correspondence is surjective is the classical Galois structure on L/K.
Let $K\\langle X\\rangle =K\\langle X_1,...,X_n\\rangle$ be the free algebra of $n$ generators over a field $K$, and let $R\\langle X\\rangle =R\\langle X_1,...,X_n\\rangle$ be the free algebra of $n$ generators over an arbitrary commutative ring $R$. In this semi-expository paper, it is clarified that any monic Gr\\\"obner basis in $K\\langle X\\rangle$ may give rise to a monic Gr\\\"obner basis of the same type in $R\\langle X\\rangle$, and vice versa. This fact turns out that many important $R$-algebras have defining relations which form a monic Gr\\\"obner basis, and consequently, such $R$-algebras may be studied via a nice PBW structure theory as that developed for quotient algebras of $K\\langle X\\rangle$ in ([LWZ], [Li2, 3]).
In calculus, an indefinite integral of a function $f$ is a differentiable function $F$ whose derivative is equal to $f$. In present paper, we generalize this notion of the indefinite integral from the ring of real functions to any ring. The main goal of the paper is to focus on the properties of such generalized integrals that are inherited from the well-known basic properties of indefinite integrals of real functions.
The paper studies the structure of restricted Leibniz algebras. More specifically speaking, we first give the equivalent definition of restricted Leibniz algebras, which is by far more tractable than that of a restricted Leibniz algebras in [6]. Second, we obtain some properties of $p$-mappings and restrictable Leibniz algebras, and discuss restricted Leibniz algebras with semisimple elements. Finally, Cartan decomposition and the uniqueness of decomposition for restricted Leibniz algebras are determined.
The Faith-Menal conjecture says that every strongly right $Johns$ ring is $QF$. The conjecture is also equivalent to say every right noetherian left $FP$-injective ring is $QF$. In this short article, we show that the conjecture is true under the condition(a proper generalization of left $CS$ condition)that every nonzero complement left ideal is not small(a left ideal $I$ is called small if for every left ideal $K$, $K$+$I$=$R$ implies $K$=$R$). It is also proved that (1) $R$ is $QF$ if and only if $R$ is a left and right mininjective ring with $ACC$ on right annihilators in which $S_{r}\\subseteq ^{ess}R_{R}$; (2) $R$ is $QF$ if and only if $R$ is a right simple injective ring with $ACC$ on right annihilators in which $S_{r}\\subseteq ^{ess}R_{R}$. Several known results on $QF$ rings are obtained as corollaries.
The core inverse for a complex matrix was introduced by Baksalary and Trenkler. Raki\\ c, Din\\v{c}i\\ c and Djordjevi\\ c generalized the core inverse of a complex matrix to the case of an element in a ring. They also proved that the core inverse of an element in a ring can be characterized by five equations and every core invertible element is group invertible. It is natural to ask when a group invertible element is core invertible, in this paper, we will answer this question. We will use three equations to characterize the core inverse of an element. That is, let $a, b\\in R$, then $a\\in R^{\\tiny\\textcircled{\\tiny\\#}}$ with $a^{\\tiny\\textcircled{\\tiny\\#}}=b$ if and only if $(ab)^{\\ast}=ab$, $ba^{2}=a$ and $ab^{2}=b$. Finally, we investigate the additive property of two core invertible elements. Moreover, the formulae of the sum of two core invertible elements are presented.
Let $i: A\\to R$ be a ring morphism, and $\\chi: R\\to A$ a right $R$-linear map with $\\chi(\\chi(r)s)=\\chi(rs)$ and $\\chi(1_R)=1_A$. If $R$ is a Frobenius $A$-ring, then we can define a trace map $\\tr: A\\to A^R$. If there exists an element of trace 1 in $A$, then $A$ is right FBN if and only if $A^R$ is right FBN and $A$ is right noetherian. The result can be generalized to the case where $R$ is an $I$-Frobenius $A$-ring, and the condition on the trace can be replaced by a weaker condition. We recover results of Garc\\ {\\i}a and del R\\ {\\i}o and by D\\v{a}sc\\v{a}lescu, Kelarev and Torrecillas on actions of group and Hopf algebras on FBN rings as special cases. We also obtain applications to extensions of Frobenius algebras, and to Frobenius corings with a grouplike element.
Given an arbitrary (commutative) field K, let V be a linear subspace of M_n(K) consisting of matrices of rank lesser than or equal to some r<n. A theorem of Atkinson and Lloyd states that, if dim V>nr-r+1 and #K>r, then either all the matrices of V vanish on some common (n-r)-dimensional subspace of K^n, or it is true of the matrices of its transpose V^t. Following some arguments of our recent proof of the Flanders theorem for an arbitrary field, we show that this result holds for any field. We also show that the results of Atkinson and Lloyd on the case dim V=n,r-r+1 are independent on the given field save for the special case n=3, r=2 and #K=2, where the same techniques help us classify all the exceptional cases up to equivalence. Similar theorems of Beasley for rectangular matrices are also successfully extended to an arbitrary field.
Let f be an analytic function defined on a complex domain Omega and A be a (n,n) complex matrix. We assume that there exists a unique alpha satisfying f(alpha)=0. When f (alpha)=0 and A is non derogatory, we solve completely the equation XA-AX=f(X). This generalizes Burde s results. When f (alpha) is not zero, we give a method to solve completely the equation XA-AX=f(X): we reduce the problem to solve a sequence of Sylvester equations. Solutions of the equation f(XA-AX)=X are also given in particular cases.
An LDB division algebra is a triple $(A,\\star,\\bullet)$ in which $\\star$ and $\\bullet$ are regular bilinear laws on the finite-dimensional non-zero vector space $A$ such that $x \\star (x \\bullet y)$ is a scalar multiple of $y$ for all vectors $x$ and $y$ of $A$. This algebraic structure has been recently discovered in the study of the critical case in Meshulam and \\v Semrl s estimate of the minimal rank in non-reflexive operator spaces. In this article, we obtain a constructive description of all LDB division algebras over an arbitrary field together with a reduction of the isotopy problem to the similarity problem for specific types of quadratic forms over the given field. In particular, it is shown that the dimension of an LDB division algebra is always a power of $2$, and that it belongs to $\\{1,2,4,8\\}$ if the characteristic of the underlying field is not $2$.
Let $A$ be a semiprime 2 and 3-torsion free non-commutative associative algebra. We show that the Lie algebra $\\der(A)$ of (associative) derivations of $A$ is strongly non-degenerate, which is a strong form of semiprimeness for Lie algebras, under some additional restrictions on the center of $A$. This result follows from a description of the quadratic annihilator of a general Lie algebra inside appropriate Lie overalgebras. Similar results are obtained for an associative algebra $A$ with involution and the Lie algebra $\\sder(A)$ of involution preserving derivations of $A$.
For each non-commutative ring R, the commuting graph of R is a graph with vertex set $R\\setminus Z(R)$ and two vertices $x$ and $y$ are adjacent if and only if $x\\neq y$ and $xy=yx$. In this paper, we consider the domination and signed domination numbers on commuting graph $\\Gamma(R)$ for non-commutative ring $R$ with $Z(R)=\\{0\\}$. For a finite ring $R$, it is shown that $\\gamma(\\Gamma(R)) + \\gamma(\\overline{\\Gamma}(R))=|R|$ if and only if $R$ is non-commutative ring on 4 elements. Also we determine the domination number of $\\Gamma(\\prod_{i=1}^{t}R_i)$ and commuting graph of non-commutative ring $R$ of order $p^3$, where $p$ is prime. Moreover we present an upper bound for signed domination number of $\\Gamma(\\prod_{i=1}^{t}R_i)$.
Let R be a commutative ring with unity and a let A be a not necessarily commutative R-algebra which is free as an R-module. If I is an ideal in A, one can ask when A/I is also free as an R-module. We show that if A has an admissible system and I has a unital Grobner basis then A/I is free as an R-module. We prove a version of Buchberger s theorem over R and, as a corollary, we obtain a Grobner basis proof of the Poincare-Birkhoff-Witt Theorem over a commutative ground ring.
We study cyclic codes with arbitrary length over Fp+vFp where theta(v)=av, a in Fp and v^2=0. We characterize all existing codes in case of O(theta)|n by using certain projections from (Fp+vFp)[x;theta] to Fp[x]. We provide an explicit expression for the ensemble of all possible codes. We also prove useful properties of these codes in the case where O(theta)|n does not hold. We provide results and examples to illustrate how the codes are constructed and how their encoding and decoding are realized.
Given a complete modular meet-continuous lattice $A$, an inflator on $A$ is a monotone function $d\\colon A\\rightarrow A$such that $a\\leq d(a)$ for all $a\\in A$. If $I(A)$ is the set of all inflators on $A$, then $I(A)$ is a complete lattice. Motivated by preradical theory we introduce two operators, the totalizer and the equalizer. We obtain some properties of these operators and see how they are related to the structure of the lattice $A$ and with the concept of dimension.
Let $V$ be a finite dimensional vector space over a field $K$ and $f$ a $K$-endomorphism of $V$. In this paper we study three types of $f$-invariant subspaces, namely hyperinvariant subspaces, which are invariant under all endomorphisms of $V$ that commute with $f$, characteristic subspaces, which remain fixed under all automorphisms of $V$ that commute with $f$, and marked subspaces, which have a Jordan basis (with respect to $f_{|X}$) that can be extended to a Jordan basis of $V$. We show that a subspace is hyperinvariant if and only if it is characteristic and marked. If $K$ has more than two elements then each characteristic subspace is hyperinvariant.
We prove that the category of systems of sesquilinear forms over a given hermitian category is equivalent to the category of unimodular 1-hermitian forms over another hermitian category. The sesquilinear forms are not required to be unimodular or defined on a reflexive object (i.e. the standard map from the object to its double dual is not assumed to be bijective), and the forms in the system can be defined with respect to different hermitian structures on the given category. This extends a result obtained by E. Bayer-Fluckiger and D. Moldovan. We use the equivalence to define a Witt ring of sesquilinear forms over a hermitian category, and also to generalize various results (e.g.: Witt s Cancelation Theorem, Springer s Theorem, the weak Hasse principle, finiteness of genus) to systems of sesquilinear forms over hermitian categories.
We present an algebraic theory of orthogonal polynomials in several variables that includes classical orthogonal polynomials as a special case. Our bottom line is a straightforward connection between apolarity of binary forms and the inner product provided by a linear functional defined on a polynomial ring. Explicit determinantal formulae and multivariable extension of the Heine integral formula are stated. Moreover, a general family of covariants that includes transvectants is introduced. Such covariants turn out to be the average value of classical basis of symmetric polynomials over a set of roots of suitable orthogonal polynomials.
Let A be an m-dimensional vector with positive real entries. Let A_{i,j} be the vector obtained from A on deleting the entries A_i and A_j. We investigate some invariant and near invariants related to the solutions E (m-2 dimensional vectors with entries either +1 or -1) of the linear inequality |A_i-A_j| < <E,A_{i,J}> < A_i+A_j, where <,> denotes the usual inner product. One of our methods relates, by the use of Rademacher functions, integrals involving trigonometric quantities to these quantities.
A Lie algebra L is known to be nilpotent if it admits a grading by (Zp, +) with support X not containing 0. It is also known that the class of L can be bounded by some explicit function of |X|. We generalise this and other classical results to gradings of Lie algebras by arbitrary groups with arithmetically-free support. We then apply these results to automorphisms of groups satisfying an identity.
In this paper, the notion of strongly G_C-projective and injective modules is introduced, where C is a semidualizing module. Using these modules we can obtain a new characterization of G_C-projective and injective modules, similar to the one of projective modules by the free modules. We then define and study the global dimensions of rings relative to a semidualizing module C, and prove that the global G_C-projective dimension of a ring R is equal to the global G_C-injective dimension of R.
Let $\\mathfrak{g}$ be a reductive Lie algebra over an algebraically closed, characteristic zero field or over $\\mathbb{R}$. Let $\\mathfrak{q}$ be a parabolic subalgebra of $\\mathfrak{g}$. We characterize the derivations of $\\mathfrak{q}$ by decomposing the derivation algebra as the direct sum of two ideals: one of which being the image of the adjoint representation and the other consisting of all linear transformations on $\\mathfrak{q}$ that map into the center of $\\mathfrak{q}$ and map the derived algebra of $\\mathfrak{q}$ to $0$.
Let $V$ denote a vector space with finite positive dimension. We consider an ordered pair of linear transformations $A: V\\to V$ and $A^*: V\\to V$ that satisfy (i) and (ii) below: (i) There exists a basis for $V$ with respect to which the matrix representing $A$ is irreducible tridiagonal and the matrix representing $A^*$ is diagonal. (ii) There exists a basis for $V$ with respect to which the matrix representing $A^*$ is irreducible tridiagonal and the matrix representing $A$ is diagonal. We call such a pair a Leonard pair on $V$. In this paper, we characterize the Leonard pairs using the notion of a tail. This notion is borrowed from algebraic graph theory.
We extend some recent results on the differentiability of torsion theories. In particular, we generalize the concept of $(\\alpha, \\beta)$-derivation to $(\\alpha, \\beta)$-higher derivation and demonstrate that a filter of a hereditary torsion theory that is invariant for $\\alpha$ and $\\beta$ is $(\\alpha, \\beta)$-higher derivation invariant. As a consequence, any higher derivation can be extended from a module to its module of quotients. Then, we show that any higher derivation extended to a module of quotients extends also to a module of quotients with respect to a larger torsion theory in such a way that these extensions agree. We also demonstrate these results hold for symmetric filters as well. We finish the paper with answers to two questions posed in [L. Va\\s, Extending higher derivations to rings and modules of quotients, International Journal of Algebra, 2 (15) (2008), 711--731]. In particular, we present an example of a non-hereditary torsion theory that is not differential.
We determine the commutant of homogeneous subrings in strongly groupoid graded rings in terms of an action on the ring induced by the grading. Thereby we generalize a classical result of Miyashita from the group graded case to the groupoid graded situation. In the end of the article we exemplify this result. To this end, we show, by an explicit construction, that given a finite groupoid $G$, equipped with a nonidentity morphism $t : d(t) \\to c(t)$, there is a strongly $G$-graded ring $R$ with the properties that each $R_s$, for $s \\in G$, is nonzero and $R_t$ is a nonfree left $R_{c(t)}$-module.
We prove that if a positively-graded ring $R$ is Gorenstein and the associated torsion functor has finite cohomological dimension, then the corresponding noncommutative projective scheme ${\\rm Tails}(R)$ is a Gorenstein category in the sense of \\cite{EEG}. Moreover, under this condition, a (right) recollement relating Gorenstein-injective sheaves in ${\\rm Tails}(R)$ and (graded) Gorenstein-injective $R$-modules is given.
We classify all Mathieu subspaces of ${\\rm Mat}_n(K)$ of codimension less than $n$, under the assumption that ${\\rm char,} K = 0$ or ${\\rm char,} K \\ge n$. More precisely, we show that any proper Mathieu subspace of ${\\rm Mat}_n(K)$ of codimension less than $n$ is a subspace of $\\{M \\in {\\rm Mat}_n(K) \\mid {\\rm tr,} M = 0\\}$ if ${\\rm char,} K = 0$ or ${\\rm char,} K \\ge n$. On the other hand, we show that every subspace of $\\{M \\in {\\rm Mat}_n(K) \\mid {\\rm tr,} M = 0\\}$ of codimension less than $n$ in ${\\rm Mat}_n(K)$ is a Mathieu subspace of ${\\rm Mat}_n(K)$ if ${\\rm char,} K = 0$ or ${\\rm char,} K \\ge n+1$.
Free idempotent generated semigroups IG$(E)$, where $E$ is a biordered set, have provided a focus of recent research, the majority of the efforts concentrating on the behaviour of the maximal subgroups. Inspired by an example of Brittenham, Margolis and Meakin, several proofs have been offered that any group occurs as a maximal subgroup of some IG$(E)$, the most recent being that of Dolinka and Ru\\v{s}kuc, who show that $E$ can be taken to be a band. From a result of Easdown, Sapir and Volkov, periodic elements of any IG$(E)$ lie in subgroups. However, little else is known of the `global  properties of IG$(E)$, other than that it need not be regular, even where $E$ is a semilattice. Since its introduction by Fountain in the late 1970s, the study of abundant and related semigroups has given rise to a deep and fruitful research area. The classes of abundant and adequate semigroups extend those of regular and inverse semigroups, respectively, and themselves are contained in the classes of weakly abundant and weakly adequate semigroups. Recent significant developments include the description by Kambites, using birooted labelled trees, of the free semigroups in the quasi-variety of adequate semigroups. Our main result shows that for any band $B$, the semigroup IG$(B)$ is a weakly abundant semigroup and moreover satisfies a natural condition called the congruence condition. We show that if $B$ is a band for which $uv=vu=v$ for all $u,v\\in B$ with $BvB\\subset BuB$ (a condition certainly satisfied for semilattices), then IG$(B)$ is abundant with solvable word problem. Further, IG$(B)$ is also abundant for a normal band $B$ for which IG$(B)$ satisfies a given technical condition, and we give examples of such $B$. On the other hand, we give an example of a normal band $B$ such that IG$(B)$ is not abundant.
The concept of an $I$-matrix in the full $2\\times 2$ matrix ring $M_2(R/I)$, where $R$ is an arbitrary UFD and $I$ is a nonzero ideal in $R$, is introduced. We obtain a concrete description of the centralizer of an $I$-matrix $\\hat B$ in $M_2(R/I)$ as the sum of two subrings $\\mathcal S_1$ and $\\mathcal S_2$ of $M_2(R/I)$, where $\\mathcal S_1$ is the image (under the natural epimorphism from $M_2(R)$ to $M_2(R/I)$) of the centralizer in $M_2(R)$ of a pre-image of $\\hat B$, and where the entries in $\\mathcal S_2$ are intersections of certain annihilators of elements arising from the entries of $\\hat B$. It turns out that if $R$ is a PID, then every matrix in $M_2(R/I)$ is an $I$-matrix. However, this is not the case if $R$ is a UFD in general. Moreover, for every factor ring $R/I$ with zero divisors and every $n\\ge 3$ there is a matrix for which the mentioned concrete description is not valid.
Denote by $M_n(K)$ the algebra of $n$ by $n$ matrices with entries in the field $K$. A theorem of Albert and Muckenhoupt states that every trace zero matrix of $M_n(K)$ can be expressed as $AB-BA$ for some pair $(A,B)$ of matrices of $M_n(K)$. Assuming that $n>2$ and that $K$ has more than 3 elements, we prove that the matrices $A$ and $B$ can be required to belong to an arbitrary given hyperplane of $M_n(K)$.
The Temperley-Lieb and Brauer algebras and their cyclotomic analogues, as well as the partition algebra, are all examples of twisted semigroup algebras. We prove a general theorem about the cellularity of twisted semigroup algebras of regular semigroups. This theorem, which generalises a recent result of East about semigroup algebras of inverse semigroups, allows us to easily reproduce the cellularity of these algebras.
Let $F$ be a Henselian field of $q$-cohomological dimension $3$, where $q$ is a prime and let $\\Gamma_F$ be the totally ordered abelian value group of $F$. Let $D$ be a central division algebra over $F$ of $q$-primary index such that the characteristic of the residue field $\\overline{F}$, $char(\\overline{F})$ is coprime to $q$. We show that when $cd_q(\\overline{F})<\\infty$ and $1\\leq\\dim_{\\mathbb{F}_q}(\\Gamma_F/q\\Gamma_F)\\leq 3$, the reduced Whitehead group of $D$ is trivial. We also show that if $cd_q(\\overline{F})<\\infty$ and $\\dim_{\\mathbb{F}_q}(\\Gamma_F/q\\Gamma_F)=0$ then, the reduced Whitehead group of $D$ is trivial when $D$ is semiramified or totally ramified.
We derive necessary and sufficient conditions for an Ore extension of a Hopf algebra to have a Hopf algebra structure of a certain type. This construction generalizes the notion of Hopf-Ore extension. We describe this type of Hopf algebra structures over Ore extensions of group algebras and of the enveloping algebras of Lie algebras. As an application, we construct the half quantum group $U_q^{\\>0}(\\mathfrak{sl}(3))$ which is a quotient of a generalized Hopf-Ore extension.
We set up an algebraic theory of multivariable integration, based on a hierarchy of Rota-Baxter operators and an action of the matrix monoid as linear substitutions. Given a suitable coefficient domain with a bialgebra structure, this allows us to build an operator ring that acts naturally on the given Rota-Baxter hierarchy. We conjecture that the operator relations are a noncommutative Groebner basis for the ideal they generate.
Since the introduction of Askey-Wilson algebras by Zhedanov in 1991, the classification of the finite-dimensional irreducible modules of Askey-Wilson algebras remains open. A universal analog $\\triangle_q$ of the Askey-Wilson algebras was recently studied. In this paper, we consider a family of infinite-dimensional $\\triangle_q$-modules. By the universal property of these $\\triangle_q$-modules, we classify the finite-dimensional irreducible $\\triangle_q$-modules when $q$ is not a root of unity.
We present the subalgebra structure of sl(3,O), a particular real form of e6 chosen for its relevance to particle physics and its close relation to generalized Lorentz groups. We use an explicit representation of the Lie group SL(3,O) to construct the multiplication table of the corresponding Lie algebra sl(3,O). Both the multiplication table and the group are then utilized to find various nested chains of subalgebras of sl(3,O), in which the corresponding Cartan subalgebras are also nested where possible. Because our construction involves the Lie group, we simultaneously obtain an explicit representation of the corresponding nested chains of subgroups of SL(3,O).
We define a generalization $\\mathfrak{G}$ of the Grassmann algebra $G$ which is well-behaved over arbitrary commutative rings $C$, even when $2$ is not invertible. In particular, this enables us to define a notion of superalgebras that does not become degenerate in such a setting. Using this construction we are able to provide a basis of the non-graded multilinear identities of the free superalgebra with supertrace, valid over any ring. We also show that all identities of $\\mathfrak{G}$ follow from the Grassmann identity, and explicitly give its co-modules, which turn out to be generalizations of the sign representation. In particular, we show that the co-module is a free $C$-module of rank $2^{n-1}$.
Let R be an affine PI-algebra over an algebraically closed field k and let G be an affine algebraic k-group that acts rationally by algebra automorphisms on R. For R prime and G a torus, we show that R has only finitely many G-prime ideals if and only if the action of G on the center of R is multiplicity free. This extends a standard result on affine algebraic G-varieties. Under suitable hypotheses on R and G, we also prove a PI-version of a well-known result on spherical varieties and a version of Schelter s catenarity theorem for G-primes.
We make a start on one of George McNulty s Dozen Easy Problems: \"Which finite automatic algebras are dualizable?\" We give some necessary and some sufficient conditions for dualizability. For example, we prove that a finite automatic algebra is dualizable if its letters act as an abelian group of permutations on its states. To illustrate the potential difficulty of the general problem, we exhibit an infinite ascending chain $\\mathbf A_1 \\le \\mathbf A_2 \\le \\mathbf A_3 \\le ...b$ of finite automatic algebras that are alternately dualizable and non-dualizable.
Let $U$ and $V$ be finite-dimensional vector spaces over an arbitrary field $\\mathbb{K}$, and $\\mathcal{S}$ be a linear subspace of the space $\\mathcal{L}(U,V)$ of all linear maps from $U$ to $V$. A map $F : \\mathcal{S} \\rightarrow V$ is called range-compatible when it satisfies $F(s) \\in \\mathrm{im}(s)$ for all $s \\in \\mathcal{S}$. Among the range-compatible maps are the so-called local ones, that is the maps of the form $s \\mapsto s(x)$ for a fixed vector $x$ of $U$. In recent works, we have classified the range-compatible group homomorphisms on $\\mathcal{S}$ when the codimension of $\\mathcal{S}$ in $\\mathcal{L}(U,V)$ is small. In the present article, we study the special case when $\\mathcal{S}$ is a linear subspace of the space $S_n(\\mathbb{K})$ of all $n$ by $n$ symmetric matrices: we prove that if the codimension of $\\mathcal{S}$ in $S_n(\\mathbb{K})$ is less than or equal to $n-2$, then every range-compatible homomorphism on $\\mathcal{S}$ is local provided that $\\mathbb{K}$ does not have characteristic $2$. With the same assumption on the codimension of $\\mathcal{S}$, we also classify the range-compatible homomorphisms on $\\mathcal{S}$ when $\\mathbb{K}$ has characteristic $2$. Finally, we prove that if $\\mathcal{S}$ is a linear subspace of the space $A_n(\\mathbb{K})$ of all $n$ by $n$ alternating matrices with entries in $\\mathbb{K}$, and the codimension of $\\mathcal{S}$ is less than or equal to $n-3$, then every range-compatible homomorphism on $\\mathcal{S}$ is local.
Let $R$ be any ring. We prove that all direct products of flat right $R$-modules have finite flat dimension if and only if each finitely generated left ideal of $R$ has finite projective dimension relative to the class of all $\\mathcal F$-Mittag-Leffler left $R$-modules, where $\\mathcal F$ is the class of all flat right $R$-modules. In order to prove this theorem, we obtain a general result concerning global relative dimension. Namely, if $\\mathcal X$ is any class of left $R$-modules closed under filtrations that contains all projective modules, then $R$ has finite left global projective dimension relative to $\\mathcal X$ if and only if each left ideal of $R$ has finite projective dimension relative to $\\mathcal X$. This result contains, as particular cases, the well known results concerning the classical left global, weak and Gorenstein global dimensions.
In this paper we work with unital twisted partial actions. We investigate ring theoretic properties of partial crossed products as artinianity, noetherianity, perfect property, semilocalproperty, semiprimary property and we also study the Krull dimension. Moreover, we consider triangular matrix representation of partial skew group rings, weak and global dimensions of partial crossed products Also we study when the partial crossed products are Frobenius and symmetric algebras.
In the paper we introduce a notion of a key relation, which is similar to the notion of a critical relation introduced by Keith A.Kearnes and \\ Agnes Szendrei. All clones on finite sets can be defined by only key relations. In addition there is a nice description of all key relations on 2 elements. These are exactly the relations that can be defined as a disjunction of linear equations. In the paper we show that, in general key relations do not have such a nice description. Nevertheless, we obtain a nice characterization of all key relations preserved by a weak near-unanimity function. This characterization is presented in the paper.
Two new algorithms for computing a direct solution to a system of linear equations are presented. A variation on the orthonormalization step in the usual QR method allows one to bypass subsequent elimination or matrix inversion steps. The algorithms are formulated with respect to row and column spaces, and produce a generalized inverse in each case. They may also be formulated in an online manner, so that the solution may be computed as the data for the equations become available.
We construct a diagram D, indexed by a finite partially ordered set, of finite Boolean semilattices and (v,0,1)-embeddings, with top semilattice $2^4$, such that for any variety V of algebras, if D has a lifting, with respect to the congruence lattice functor, by algebras and homomorphisms in V, then there exists an algebra $U$ in V such that the congruence lattice of $U$ contains, as a 0,1-sublattice, the five-element modular nondistributive lattice $M_3$. In particular, V has an algebra whose congruence lattice is neither join- nor meet-semidistributive. Using earlier work of K.A. Kearnes and A.Szendrei, we also deduce that V has no nontrivial congruence lattice identity. In particular, there is no functor F from finite Boolean semilattices and (v,0,1)-embeddings to lattices and lattice embeddings such that the composition Con F is equivalent to the identity (where Con denotes the congruence lattice functor), thus solving negatively a problem raised by P. Pudlak in 1985 about the existence of a functorial solution of the Congruence Lattice Problem.
We consider a complete filtered Rota-Baxter algebra of weight $\\lambda$ over a commutative ring. Finding the unique solution of a non-homogeneous linear algebraic equation in this algebra, we generalize Spitzer s identity in both commutative and non-commutative cases. As an application, considering the Rota-Baxter algebra of power series in one variable with q-integral as the Rota-Baxter operator, we show certain Eulerian identities.
The striking results on noncrossed products were their existence (Amitsur) and the determination of Q(t) and Q((t)) as their smallest possible centres (Brussel). This paper gives the first fully explicit noncrossed product example over Q((t)). As a consequence, the use of deep number theoretic theorems (local-global principles such as the Hasse norm theorem and density theorems) in order to prove existence is eliminated. Instead, the example can be verified by direct calculations. The noncrossed product proof is short and elementary.
A ring $R$ is strongly clean provided that every element in $R$ is the sum of an idempotent and a unit that commutate. Let $T_n(R,\\sigma)$ be the skew triangular matrix ring over a local ring $R$ where $\\sigma$ is an endomorphism of $R$. We show that $T_2(R,\\sigma)$ is strongly clean if and only if for any $a\\in 1+J(R), b\\in J(R)$, $l_a-r_{\\sigma(b)}: R\\to R$ is surjective. Further, $T_3(R,\\sigma)$ is strongly clean if $l_{a}-r_{\\sigma(b)}, l_{a}-r_{\\sigma^2(b)}$ and $l_{b}-r_{\\sigma(a)}$ are surjective for any $a\\in U(R),b\\in J(R)$. The necessary condition for $T_3(R,\\sigma)$ to be strongly clean is also obtained.
Lie-Yamaguti algebras (or generalized Lie triple systems) are binary-ternary algebras intimately related to reductive homogeneous spaces. The Lie-Yamaguti algebras which are irreducible as modules over their inner derivation algebras are the algebraic counterpart of the isotropy irreducible homogeneous spaces. These systems splits into three disjoint types: adjoint type, non-simple type and generic type. The systems of the first two types were classified in a previous paper through a generalized Tits Construction of Lie algebras. In this paper, the Lie-Yamaguti algebras of generic type are classified by relating them to several other nonassociative algebraic systems: Lie and Jordan algebras and triple systems, Jordan pairs or Freudenthal triple systems.
This work completes the study of the solvable Leibniz algebras, more precisely, it completes the classification of the $3$-filiform Leibniz algebras of maximum length \\cite{3-filiform}. Moreover, due to the good structure of the algebras of maximum length, we also tackle some of their cohomological properties. Our main tools are the previous result of Cabezas and Pastor \\cite{Pastor}, the construction of appropriate homogeneous basis in the considered connected gradation and the computational support provided by the two programs implemented in the software \\textit{Mathematica}.
By the use of Perron-Frobenius theory, simple proofs are given of the Fundamental Theorem of Demography and of a theorem of Cushing and Yicang on the net reproductive rate occurring in matrix models of population dynamics. The latter result is further refined with some additional nonnegative matrix theory. When the fertility matrix is scaled by the net reproductive rate, the growth rate of the model is 1. More generally, we show how to achieve a given growth rate for the model by scaling the fertility matrix. Demographic interpretations of the results are given.
We recognise Harada s generalized categories of diagrams as a particular case of modules over a monad defined on a finite direct product of additive categories. We work in the dual (albeit formally equivalent) situation, that is, with comodules over comonads. With this conceptual tool at hand, we obtain several of the Harada results with simpler proofs, some of them under more general hypothesis, besides with a characterization of the normal triangular matrix comonads that are hereditary, that is, of homological dimension less or equal than $1$. Our methods rest on a matrix representation of additive functors and natural transformations, which allows us to adapt typical algebraic manipulations from Linear Algebra to the additive categorical setting.
In \\cite[Problem 72]{Fuchs60} Fuchs asked the following question: which abelian groups can be the group of units of a ring? In the years, some partial answers have been given to this question in particular cases. The aim of the present paper is to address Fuchs  question when $A^*$ is a {\\it finite abelian group}. The result is a pretty good description of the finite abelian groups which can occur as group of units of a ring, equipped with examples showing that there are obstacles to a \"short\" complete classification. We also examine the interesting case of reduced rings: in this case we completely classify the possible finite abelian groups of units. Our proofs are self-contained and include all the previous results for finite abelian groups of units.
Exactly 170 years ago, the construction of the real quaternion algebra by William Hamilton was announced in the Proceedings of the Royal Irish Academy. It became the first example of non-commutative division rings and a major turning point of algebra. To this day, the multiplicative group structure of quaternion algebras have not completely been understood. This article is a long survey of the recent developments on the multiplicative group structure of division rings.
An associative ring with 1 is said to be semilocal provided it is semisimple artinian modulo its Jacobson radical, that is, modulo its Jacobson radical it is isomorphic to a finite product of matrices over division rings. Modules with a semilocal endomorphism ring inherit some properties of semisimple modules. For example, they can be decomposed into a finite direct sum of indecomposable submodules, such decomposition is not unique but there are only a finite number of different ones, they cancel from direct sums and they satisfy the n-th root uniqueness property. A ring homomorphism is said to be local if it carries non-units to non-units. Semilocal rings can be characterized as those rings having a local homomorphism to a semisimple artinian ring. In this paper show that local homomorphisms appear frequently in module theory. As a consequence it will follow that many interesting classes of modules, as for example finitely presented modules over semilocal rings, have a semilocal endomorphism ring.
We prove that if $A$ is a regular graded skew Clifford algebra and is a twist of a regular graded Clifford algebra $B$ by an automorphism, then the subalgebra of $A$ generated by a certain normalizing sequence of homogeneous degree-two elements is a twist of a polynomial ring by an automorphism, and is a skew polynomial ring. We also present an example that demonstrates that this can fail when $A$ is not a twist of $B$.
Given a central division algebra $D$ of degree $d$ over a field $F$, we associate to any standard polynomial $\\phi(z)=z^n+c_{n-1} z^{n-1}+\\dots+c_0$ over $D$ a \"companion polynomial\" $\\Phi(z)$ of degree $n d$ with coefficients in $F$ whose roots are exactly the conjugacy classes of the roots of $\\phi(z)$. We explain how in case $D$ is a quaternion algebra, all the roots of $\\phi(z)$ can be recovered from the roots of $\\Phi(z)$. On the way, we also generalize certain theorems that were known for $\\mathbb{H}$ to any division algebra, such as the connection between the right eigenvalues of a matrix and the roots of its characteristic polynomial, and the connection between the roots of a standard polynomial and left eigenvalues of the companion matrix.
Let F be a Henselian valued field with char(F) = p and D a semi-ramified, \"not strongly degenerate\" p-algebra. We show that all Galois subfields of D are inertial. Using this as a tool we study generic abelian crossed product p-algebras, proving among other things that the noncyclic generic abelian crossed product p-algebras defined by non-degenerate matrices are indecomposable p-algebras. To construct examples of these indecomposable p-algebras with exponent p and large index we study the relationship between degeneracy in matrices defining abelian crossed products and torsion in CH^2 of Severi-Brauer varieties.
Under certain conditions, a filtration on an augmented algebra A admits a related filtration on the Yoneda algebra E(A) := Ext_A(K, K). We show that there exists a bigraded algebra monomorphism from gr E(A) to E_Gr(gr A), where E_Gr(gr A) is the graded Yoneda algebra of gr A. This monomorphism can be applied in the case where A is connected graded to determine that A has the K_2 property recently introduced by Cassidy and Shelton.
Let R be a ring with the set of nilpotents Nil(R). We prove that the following are equivalent: (i) Nil(R) is additively closed, (ii) Nil(R) is multiplicatively closed and R satisfies Koethe s conjecture, (iii) Nil(R) is closed under the operation x\\circ y=x+y-xy, (iv) Nil(R) is a subring of R. Some applications and examples of rings with this property are given, with an emphasis on certain classes of exchange and clean rings.
In this paper, we describe the structure of the localization of Ext^{i}_{R}(R/P,M), where P is a prime ideal and M is a module, at certain Ore sets X. We first study the situation for FBN rings, and then consider matters for a large class of Auslander-Gorenstein rings. We need to impose suitable homological regularity conditions to get results in the more general situation. The results obtained are then used to study the shape of minimal injective resolutions of modules over noetherian rings.
Let H be a Hopf algebra and A an H-simple right H-comodule algebra. It is shown that under certain hypotheses every (H,A)-Hopf module is either projective or free as an A-module and A is either a quasi-Frobenius or a semisimple ring. As an application it is proved that every weakly finite (in particular, every finite dimensional) Hopf algebra is free both as a left and a right module over its finite dimensional right coideal subalgebras, and the latter are Frobenius algebras. Similar results are obtained for H-simple H-module algebras.
If $R$ is a regular and semiartinian ring, it is proved that the following conditions are equivalent: (1) $R$ is unit-regular, (2) every factor ring of $R$ is directly finite, (3) the abelian group $K_0(R)$ is free and admits a basis which is in a canonical one to one correspondence with a set of representatives of simple right $R$-modules. For the class of semiartinian and unit-regular rings the canonical partial order of $K_0(R)$ is investigated and the directed abelian groups which are realizable as $K_0(R)$ of these rings are classified.
To any poset or quasi-poset is attached a lattice polytope, whose Ehrhart polynomial we study from a Hopf-algebraic point of view. We use for this two interacting bialgebras on quasi-posets. The Ehrhart polynomial defines a Hopf algebra morphism taking its values in Q[X], we deduce from the interacting bialgebras an algebraic proof of the duality principle, a generalization and a new proof of a result on B-series due to Whright and Zhao, using a monoid of characters on quasi-posets, and a generalization of Faulhaber s formula. We also give non-commutative versions of these results: polynomials are replaced by packed words. We obtain in particular a non-commutative duality principle.
In this paper solvable Leibniz algebras with naturally graded non-Lie $p$-filiform $(n-p\\geq4)$ nilradical and with one-dimensional complemented space of nilradical are described. Moreover, solvable Leibniz algebras with abelian nilradical and extremal (minimal, maximal) dimensions of complemented space nilradical are studied. The rigidity of solvable Leibniz algebras with abelian nilradical and maximal dimension of its complemented space is proved.
Associative Yang-Baxter equation arises in different areas of algebra, e.g., when studying double quadratic Poisson brackets, non-abelian quadratic Poisson brackets, or associative algebras with cyclic 2-cocycle (anti-Frobenius algebras). Precisely, faithful representations of anti-Frobenius algebras (up to isomorphism) are in one-to-one correspondence with skew-symmetric solutions of associative Yang-Baxter equation (up to equivalence). Following the work of Odesskii, Rubtsov and Sokolov and using computer algebra system Sage, we found some constant skew-symmetric solutions of associative Yang-Baxter equation and construct corresponded non-abelian quadratic Poisson brackets.
In this paper we study the relationship between degeneracy and decomposability in abelian crossed products. In particular we construct an indecomposable abelian crossed product division algebra of exponent $p$ and index $p^2$ for $p$ an odd prime. The algebra we construct is generic in the sense of Amitsur and Saltman and has the property that its underlying abelian crossed product is a decomposable division algebra defined by a non-degenerate matrix. This algebra gives an example of an indecomposable generic abelian crossed product which is shown to be indecomposable without using torsion in the Chow group of the corresponding Severi-Brauer variety as was needed in [Karpenko, Codimension 2 cycles on Severi-Brauer varieites (1998)] and [McKinnie, Indecomposable $p$-algebras and Galois subfields in generic abelian crossed products (2008)]. It also gives an example of a Brauer class which is in Tignol s Dec group with respect to one abelian maximal subfield, but not in the Dec group with respect to another.
We describe a method for classifying the Novikov algebras with a given associated Lie algebra. Subsequently we give the classification of the Novikov algebras of dimension 3 over R and C, as well as the classification of the 4-dimensional Novikov algebras over C whose associated Lie algebra is nilpotent. In particular this includes a list of all 4-dimensional commutative associative algebras over C.
Let X be a finite set with at least two elements, and let k be any commutative field. We prove that the inversion height of the embedding k<X> ---> D, where D denotes the universal (skew) field of fractions of the free algebra k<X>, is infinite. Therefore, if H denotes the free group on X, the inversion height of the embedding of the group algebra k[H] into the Malcev-Neumann series ring is also infinite. This answer in the affirmative a question posed by Neumann in 1949 [27, p. 215]. We also give an infinite family of examples of non-isomorphic fields of fractions of k<X> with infinite inversion height. We show that the universal field of fractions of a crossed product of a commutative field by the universal enveloping algebra of a free Lie algebra is a field of fractions constructed by Cohn (and later by Lichtman). This extends a result by A. Lichtman.
We analyze the homothety types of associative bilinear forms that can occur on a Hopf algebra or on a local Frobenius \\(k\\)-algebra \\(R\\) with residue field \\(k\\). If \\(R\\) is symmetric, then there exists a unique form on \\(R\\) up to homothety iff \\(R\\) is commutative. If \\(R\\) is Frobenius, then we introduce a norm based on the Nakayama automorphism of \\(R\\). We show that if two forms on \\(R\\) are homothetic, then the norm of the unit separating them is central, and we conjecture the converse. We show that if the dimension of \\(R\\) is even, then the determinant of a form on \\(R\\), taken in \\(\\dot k/\\dot k^2\\), is an invariant for \\(R\\). \\textit{Key words}: bilinear form, Frobenius algebra, homothety, Hopf algebra, isometry, local algebra, Nakayama automorphism, Ore extension, symmetric algebra
Let $\\sigma$ be an endomorphism and $\\delta$ an $\\sigma$-derivation of a ring $R$. In this paper, we show that if $R$ is $(\\sigma,\\delta)$-skew Armendariz and $a\\sigma(b)=0$ implies $ab=0$ for $a,b\\in R$. Then $R$ is symmetric (respectively, reversible) if and only if $R$ is $\\sigma$-symmetric (respectively, $\\sigma$-reversible) if and only if $R[x;\\sigma,\\delta]$ is symmetric (respectively, reversible). Moreover, we study on the relationship between the Baerness, quasi-Baerness and p.q.-Baerness of a ring $R$ and these of the Ore extension $R[x;\\sigma,\\delta]$. As a consequence we obtain a partial generalization of \\cite{hong/2000}.
We obtain an asymptotic upper bound for the smallest number of generators for a finite direct sum of matrix algebras with entries in a finite field. This produces an upper bound for a similar quantity for integer matrix rings. We also obtain an exact formula for the smallest number of generators for a finite direct sum of 2-by-2 matrix algebras with entries in a finite field and as a consequence obtain a formula for a similar quantity for a finite direct sum of 2-by-2 integer matrix rings. We remark that a generating set the ring $\\bigoplus_{i=1}^k M_{n_i}(\\mathbb{Z})^{n_i}$ may be used as a generating set of any matrix algebra $\\bigoplus_{i=1}^k M_{n_i}(R)^{n_i}$ where $R$ is an associative ring with a two-sided 1.
The class of finitely presented algebras over a field K with a set of generators a_1,...,a_n and defined by homogeneous relations of the form a_1a_2...a_n = a_{sigma(1)}a_{sigma(2)}...a_{sigma(n)}, where sigma runs through an abelian subgroup H of Sym_{n}, the symmetric group, is considered. It is proved that the Jacobson radical of such algebras is zero. Also, it is characterized when the monoid S_n(H), with the \"same\" presentation as the algebra, is cancellative in terms of the stabilizer of 1 and the stabilizer of n in H. This work is a continuation of earlier work of Cedo, Jespers and Okninski.
A commutative ring $R$ is projective free provided that every finitely generated $R$-module is free. An element in a ring is strongly clean provided that it is the sum of an idempotent and a unit that commutates. Let $R$ be a projective-free ring, and let $h\\in R[t]$ be a monic polynomial of degree $n$. We prove, in this article, that every $\\varphi\\in M_n(R)$ with characteristic polynomial $h$ is strongly clean, if and only if the companion matrix $C_h$ of $h$ is strongly clean, if and only if there exists a factorization $h=h_0h_1$ such that $h_0\\in {\\Bbb S}_0, h_1\\in {\\Bbb S}_1$ and $(h_0,h_1)=1$. Matrices over power series over projective rings are also discussed. These extend the known results [1, Theorem 12] and [5, Theorem 25].
Let $R$ be a unital ring with involution. We first show that the EP elements in $R$ can be characterized by three equations. Namely, let $a\\in R$, then $a$ is EP if and only if there exists $x\\in R$ such that $(xa)^{\\ast}=xa$, $xa^{2}=a$ and $ax^{2}=x.$ It is well known that all EP elements in $R$ are core invertible and Moore-Penrose invertible. We give more equivalent conditions for a core (Moore-Penrose) invertible element to be an EP element. Finally, the EP elements are characterized in terms of $n$-EP property, which is a generalization of bi-EP property.
An element in a ring $R$ is called uniquely weakly nil-clean if every element in $R$ can be uniquely written as a sum or a difference of a nilpotent and an idempotent in the sense of very idempotents. The structure of the ring in which every zero-divisor is uniquely weakly nil-clean is completely determined. We prove that every zero-divisor in a ring $R$ is uniquely weakly nil-clean if and only if $R$ is a D-ring, or $R$ is abelian, periodic, and $R/J(R)$ is isomorphic to a field $F$, ${\\Bbb Z}_{3}\\oplus {\\Bbb Z}_{3}$, ${\\Bbb Z}_{3}\\oplus B$ where $B$ is Boolean, or a Boolean ring. As a specific case, rings in which every zero-divisor $a$ or $-a$ is a nilpotent or an idempotent are also considered. Furthermore, we prove that every zero-divisor in a ring $R$ is uniquely nil-clean if and only if $R$ is a D-ring, or $R$ is abelian, periodic; and $R/J(R)$ is Boolean.\\vskip3mm \\no {\\bf Key words}: Zero-divisor; Uniquely weakly nil-clean ring; Uniquely nil-clean ring.
We study the class of ADS rings and modules introduced by Fuchs. We give some connections between this notion and classical notions such as injectivity and quasi-continuity. A simple ring R such that R is ADS as a right R-module must be either right self-injective or indecomposable as a right R-module. Under certain conditions we can construct a unique ADS hull up to isomorphism. We introduce the concept of completely ADS modules and characterize completely ADS semiperfect right modules as direct sum of semisimple and local modules.
For bounded lattices, we introduce certain Galois connections, called (cyclically) essential, retractable and UC Galois connections, which behave well with respect to concepts of module-theoretic nature involving essentiality. We show that essential retractable Galois connections preserve uniform dimension, whereas essential retractable UC Galois connections induce a bijective correspondence between sets of closed elements. Our results are applied to suitable Galois connections between submodule lattices. Cyclically essential Galois connections unify semi-projective and semi-injective modules, while retractable Galois connections unify retractable and coretractable modules.
Let $K$ be a field, let $\\sigma$ be an automorphism of $K$, and let $\\delta$ be a derivation of $K$. We show that if $D$ is one of $K(x;\\sigma)$ or $K(x;\\delta)$, then $D$ either contains a free algebra over its center on two generators, or every finitely generated subalgebra of $D$ satisfies a polynomial identity. As a corollary, we are able to show that the quotient division ring of any iterated Ore extension of an affine domain satisfying a polynomial identity either again satisfies a polynomial identity or it contains a free algebra over its center on two variables.
We study the Drazin inverses of the sum and product of two elements in a ring. For Drazin invertible elements $a$ and $b$ such that $a^2b=aba$ and $b^2a=bab$, it is shown that $ab$ is Drazin invertible and that $a+b$ is Drazin invertible if and only if $1+a^Db$ is Drazin invertible. Moreover, the formulae of $(ab)^D$ and $(a+b)^D$ are presented. Thus, a generalization of the main result of Zhuang, Chen et al. (Linear Multilinear Algebra 60 (2012) 903-910) is given.
This work addresses some relevant characteristics of associative algebras in low dimensions. Especially, given 1 and 2 dimensional associative algebras, we explicitly solve associative Yang-Baxter equations and use skew-symmetric solutions to perform double constructions of Frobenius algebras. Besides, we determine related compatible dendriform algebras and solutions of their $ D- $equations. Finally, using symmetric solutions of the latter equations, we proceed to double constructions of corresponding Connes cocycles.
By a generalized inverse of a given matrix, we mean a matrix that exists for a larger class of matrices than the nonsingular matrices, that has some of the properties of the usual inverse, and that agrees with inverse when given matrix happens to be nonsingular. In theory, there are many different generalized inverses that exist. We shall consider the Moore Penrose, weighted Moore-Penrose, Drazin and weighted Drazin inverses. New determinantal representations of these generalized inverse based on their limit representations are introduced in this paper. Application of this new method allows us to obtain analogues classical adjoint matrix. Using the obtained analogues of the adjoint matrix, we get Cramer s rules for the least squares solution with the minimum norm and for the Drazin inverse solution of singular linear systems. Cramer s rules for the minimum norm least squares solutions and the Drazin inverse solutions of the matrix equations ${\\rm {\\bf A}}{\\rm {\\bf X}} = {\\rm {\\bf D}}$, ${\\rm {\\bf X}}{\\rm {\\bf B}} = {\\rm {\\bf D}}$ and ${\\rm {\\bf A}}{\\rm {\\bf X}}{\\rm {\\bf B}} ={\\rm {\\bf D}} $ are also obtained, where ${\\rm {\\bf A}}$, ${\\rm {\\bf B}}$ can be singular matrices of appropriate size. Finally, we derive determinantal representations of solutions of the differential matrix equations, ${\\bf X} + {\\bf A}{\\bf X}={\\bf B}$ and ${\\bf X} +{\\bf X}{\\bf A}={\\bf B}$, where the matrix ${\\bf A}$ is singular.
Let $D$ be a division ring with the center $F$ and $D^*$ be the multiplicative group of $D$. In this paper we study locally nilpotent maximal subgroups of $D^*$. We give some conditions that influence the existence of locally nilpotent maximal subgroups in division ring with infinite center. Also, it is shown that if $M$ is a locally nilpotent maximal subgroup that is algebraic over $F$, then either it is the multiplicative group of some maximal subfield of $D$ or it is center by locally finite. If, in addition we assume that $F$ is finite and $M$ is nilpotent, then the second case cannot occur, i.e. $M$ is the multiplicative group of some maximal subfield of $D$.
By the Telescope Conjecture for Module Categories, we mean the following claim: \"Let R be any ring and (A, B) be a hereditary cotorsion pair in Mod-R with A and B closed under direct limits. Then (A, B) is of finite type.\" We prove a modification of this conjecture with the word  finite  replaced by  countable . We show that a hereditary cotorsion pair (A, B) of modules over an arbitrary ring R is generated by a set of strongly countably presented modules provided that B is closed under unions of well-ordered chains. We also characterize the modules in B and the countably presented modules in A in terms of morphisms between finitely presented modules, and show that (A, B) is cogenerated by a single pure-injective module provided that A is closed under direct limits. Then we move our attention to strong analogies between cotorsion pairs in module categories and localizing pairs in compactly generated triangulated categories.
The concept of an $I$-matrix in the full $2\\times 2$ matrix ring $M_2(R/I)$, where $R$ is an arbitrary UFD and $I$ is a nonzero ideal in $R$, was introduced in \\cite{mar}. Moreover a concrete description of the centralizer of an $I$-matrix $\\hat B$ in $M_2(R/I)$ as the sum of two subrings $\\mathcal S_1$ and $\\mathcal S_2$ of $M_2(R/I)$ was also given, where $\\mathcal S_1$ is the image (under the natural epimorphism from $M_2(R)$ to $M_2(R/I)$) of the centralizer in $M_2(R)$ of a pre-image of $\\hat B$, and where the entries in $\\mathcal S_2$ are intersections of certain annihilators of elements arising from the entries of $\\hat B$. In the present paper, we obtain results for the case when $I$ is a principal ideal $<k>$, $k\\in R$ a nonzero nonunit. Mainly we solve two problems. Firstly we find necessary and sufficient conditions for when $\\mathcal S_1\\subseteq\\mathcal S_2$, for when $\\mathcal S_2\\subseteq \\mathcal S_1$ and for when $\\mathcal S_1=\\mathcal S_2$. Secondly we provide a formula for the number of elements in the centralizer of $\\hat B$ for the case when $R/<k>$ is finite.
One of the aims of this paper is to provide a short survey on the Z2-graded, the symmetric and the left (right) generalizations of the classical determinant theory for square matrices with entries in an arbitrary (possibly non-commutative) ring. This will put us in a position to give a motivation for our main results. We use the preadjoint matrix to exhibit a general trace expression for the symmetric determinant. The symmetric version of the classical Newton trace formula is also presented in the 3x3 case.
Straightening algorithm is always a main task in bracket algebra. And this is a very complicate procedure. Until now, some beautiful algorithms have been provided. White s implementation algorithms seem the most e?cient one. This paper is devoted to give another new algorithm as a byproduct of invariant division put forward in [9], which seems more suitable to straight high degree tableaux. The examples presented in section 5 show that this new algorithm is more e?cient then White s algorithm when the degree of tableaux is >3.
We establish new results concerning endomorphisms of a finite chain if the cardinality of the image of such endomorphism is no more than some fixed number k. The semiring of all such endomorphisms can be seen as a k - simplex whose vertices are the constant endomorphisms. We explore the properties of these k - simplices and find some results for arbitrary k. For k = 1 and 2 we give a full description of simplices called strings and triangles, respectively.
In this paper, we study the moduli space of $1|2$-dimensional complex associative algebras, which is also the moduli space of codifferentials on the tensor coalgebra of a $2|1$-dimensional complex space. We construct the moduli space by considering extensions of lower dimensional algebras. We also construct miniversal deformations of these algebras. This gives a complete description of how the moduli space is glued together via jump deformations.
Let $K$ be an algebraically closed field of characteristic zero and $A$ an integral $K$-domain. The Lie algebra $Der_{K}(A)$ of all $K$-derivations of $A$ contains the set $LND(A)$ of all locally nilpotent derivations. The structure of $LND(A)$ is of great interest, and the question about properties of Lie algebras contained in $LND(A)$ is still open. An answer to it in the finite dimensional case is given. It is proved that any finite dimensional (over $K$) subalgebra of $Der_{K}(A)$ consisting of locally nilpotent derivations is nilpotent. In the case $A=K[x, y],$ it is also proved that any subalgebra of $Der_{K}(A)$ consisting of locally nilpotent derivations is conjugated by an automorphism of $K[x, y]$ with a subalgebra of the triangular Lie algebra.
We extend the the definition of Kumjian-Pask algebras to include algebras associated to finitely aligned higher-rank graphs. We show that these Kumjian-Pask algebras are universally defined and have a graded uniqueness theorem. We also prove the Cuntz-Kreiger uniqueness theorem; to do this, we use a groupoid approach. As a consequence of the graded uniqueness theorem, we show that every Kumjian-Pask algebra is isomorphic to the Steinberg algebra associated to its boundary path groupoid. We then use Steinberg algebra results to prove the Cuntz-Kreiger uniqueness theorem and also to characterize simplicity and basic simplicity.
If $\\hat{R} is the pure-injective hull of a valuation ring $R$, it is proved that $\\hat{R}\\otimes\\_RM$ is the pure-injective of $M$, for each finitely generated module $M$. Moreover, $\\hat{R}\\otimes\\_RM\\simeq\\oplus\\_{1\\leq k\\leq n}\\hat{R}/A\\_k\\hat{R}$, where $A\\_1,...,A\\_n$ is the annihilator sequence of $M$. The pure-injective hulls of uniserial or polyserial modules are also investigated. Any two pure-composition series of a countably generated polyserial module are isomorphic.
We consider a polynomial version of the Cayley numbers. Namely, we define the ring of Cayley polynomials in terms of generators and relations in the category of alternative algebras. The ring turns out to be an octonion algebra over an ordinary polynomial ring. Also, a localization (a ring of quotients) of the ring of Cayley polynomials gives another description of an octonion torus. Finally, we find a subalgebra of a prime nondegenerate alternative algebra so that the subalgebra is an octonion algebra over the center.
We introduce and provide a classification theorem for the class of Heisenberg-Fock Leibniz algebras. This category of algebras is formed by those Leibniz algebras $L$ whose corresponding Lie algebras are Heisenberg algebras $H_n$ and whose ${H_n}$-modules $I$, where $I$ denotes the ideal generated by the squares of elements of $L$, are isomorphic to Fock modules. We also consider the three-dimensional Heisenberg algebra $H_3$ and study three classes of Leibniz algebras with $H_3$ as corresponding Lie algebra, by taking certain generalizations of the Fock module. Moreover, we describe the class of Leibniz algebras with $H_n$ as corresponding Lie algebra and such that the action $I \\times H_n \\to I$ gives rise to a minimal faithful representation of $H_n$. The classification of this family of Leibniz algebras for the case of $n=3$ is given.
We present a set of generators for the symplectic group which is different from the well-known set of transvections, from which the chain equivalence for quadratic forms in characteristic 2 is an immediate result. Based on the chain equivalences for quadratic forms, both in characteristic 2 and not 2, we provide chain equivalences for tensor products of quaternion algebras over fields with no nontrivial 3-fold Pfister forms. The chain equivalence for biquaternion algebras in characteristic 2 is also obtained in this process, without any assumption on the base-field.
Given a real, symmetric matrix S, we define the slice through S as being the connected component containing S of two orbits under conjugation: the first by the orthogonal group, and the second by the upper triangular group. We describe some classical constructions in eigenvalue computations and integrable systems which keep slices invariant -- their properties are clarified by the concept. We also parametrize the closure of a slice in terms of a convex polytope.
In this paper the description of solvable Lie algebras with triangular nilradicals is extended to Leibniz algebras. It is proven that the matrices of the left and right operators on elements of Leibniz algebra have upper triangular forms. We establish that solvable Leibniz algebra of a maximal possible dimension with a given triangular nilradical is a Lie algebra. Furthermore, solvable Leibniz algebras with triangular nilradicals of low dimensions are classified.
We study the class of all algebras that are isotopic to a Hurwitz algebra. Isomorphism classes of such algebras are shown to correspond to orbits of a certain group action. A complete, geometrically intuitive description of the category of isotopes of Hamilton s quaternions is given. As an application, we demonstrate how some results concerning the classification of finite-dimensional composition algebras can be deduced from our general results.
We show that if A is a linear order then Th(A) is either $\\aleph_0$-categorical or Borel complete (in the sense of Friedman and Stanley). We generalize this; if A has countably many unary predicates attached, then Th(A) is $\\aleph_0$-categorical, has finitely many countable models (at least three), is Borel equivalent to equality on the reals, is Borel equivalent to \"countable sets of reals,\" or is Borel complete. Furthermore, each of these cases corresponds in a natural way to a count of models of all sizes, up to back-and-forth equivalence. All these cases are possible and we compute precise model-theoretic conditions indicated which case occurs. This complements work on o-minimal theories where analogous results were shown. A large portion of the machinery under the proof is based on work by Matatyahu Rubin in \"Theories of Linear Order,\" where it was shown that such a theory satisfies Vaught s Conjecture and cannot have precisely $\\aleph_0$ countable models.
The unit interval in a partially ordered abelian group with order unit forms an interval effect algebra (IEA) which can be regarded as an algebraic model for the semantics of a formal deductive logic. There is a categorical equivalence between the category of IEA s and the category of unigroups enabling one to translate logical features of the IEA s to algebraic properties of the corresponding unigroup. In this article, we study the IEA-unigroup connection, focusing on the cases in which the IEA is a Boolean algebra, a quantum logic, an MV-algebra, or a Heyting MV-algebra.
A semantics for quantified modal logic is presented that is based on Kleene s notion of realizability. This semantics generalizes Flagg s 1985 construction of a model of a modal version of Church s Thesis and first-order arithmetic. While the bulk of the paper is devoted to developing the details of the semantics, to illustrate the scope of this approach, we show that the construction produces (i) a model of a modal version of Church s Thesis and a variant of a modal set theory due to Goodman and Scedrov, (ii) a model of a modal version of Troelstra s generalized continuity principle together with a fragment of second-order arithmetic, and (iii) a model based on Scott s graph model (for the untyped lambda calculus) which witnesses the failure of the stability of non-identity.
We provide mutual elementary recursive order isomorphisms between classical ordinal notations, based on Skolem hulling, and notations from pure elementary patterns of resemblance of order 2, showing that the latter characterize the proof-theoretic ordinal of the fragment Pi-1-1-CA0 of second order number theory, or equivalently the set theory KPl0. As a corollary, we prove that Carlson s result on the well-quasi orderedness of respecting forests of order 2 implies transfinite induction up to the ordinal of KPl0. We expect that our approach will facilitate analysis of more powerful systems of patterns.
The derivation on the differential-valued field $\\mathbb{T}_{\\log}$ of logarithmic transseries induces on its value group $\\Gamma_{\\log}$ a certain map $\\psi$. The structure $\\Gamma = (\\Gamma_{\\log},\\psi)$ is a divisible asymptotic couple. In~\\cite{gehret} we began a study of the first-order theory of $(\\Gamma_{\\log},\\psi)$ where, among other things, we proved that the theory $T_{\\log} = \\operatorname{Th}(\\Gamma_{\\log},\\psi)$ has a universal axiomatization, is model complete and admits elimination of quantifiers (QE) in a natural first-order language. In that paper we posed the question whether $T_{\\log}$ has NIP (i.e., the Non-Independence Property). In this paper, we answer that question in the affirmative: $T_{\\log}$ does have NIP. Our method of proof relies on a complete survey of the $1$-types of $T_{\\log}$, which, in the presence of QE, is equivalent to a characterization of all simple extensions $\\Gamma\\langle\\alpha\\rangle$ of $\\Gamma$. We also show that $T_{\\log}$ does not have the Steinitz exchange property and we weigh in on the relationship between models of $T_{\\log}$ and the so-called \\emph{precontraction groups} of~\\cite{kuhlmann1}.
An element $a$ of a lattice cups to an element $b > a$ if there is a $c < b$ such that $a \\cup c = b$. An element of a lattice has the cupping property if it cups to every element above it. We prove that there are non-zero honest elementary degrees that do not have the cupping property, which answers a question of Kristiansen, Schlage-Puchta, and Weiermann. In fact, we show that if $\\mathbf b$ is a sufficiently large honest elementary degree, then there is a non-zero honest elementary degree $\\mathbf a <_{\\mathrm E} \\mathbf b$ that does not cup to $\\mathbf b$. For comparison, we modify a result of Cai to show that in several versions of the related degrees of relative provability the preceding property holds for all non-zero $\\mathbf b$, not just sufficiently large $\\mathbf b$.
In this paper we will see deductive systems for classical propositional and predicate logic in the calculus of structures. Like sequent systems, they have a cut rule which is admissible. In addition, they enjoy a top-down symmetry and some normal forms for derivations that are not available in the sequent calculus. Identity axiom, cut, weakening and also contraction can be reduced to atomic form. This leads to rules that are local: they do not require the inspection of expressions of unbounded size.
An open set U of the real numbers R is produced such that the expansion (R,+,x,U) of the real field by U defines a Borel isomorph of (R,+,x,N) but does not define N. It follows that (R,+,x,U) defines sets in every level of the projective hierarchy but does not define all projective sets. This result is elaborated in various ways that involve geometric measure theory and working over o-minimal expansions of (R,+,x). In particular, there is a Cantor subset K of R such that for every exponentially bounded o-minimal expansion M of (R,+,x), every subset of R definable in (M,K) either has interior or is Hausdorff null.
A set $G \\subseteq \\omega$ is $n$-generic for a positive integer $n$ if and only if every $\\Sigma^0_n$ formula of $G$ is decided by a finite initial segment of $G$ in the sense of Cohen forcing. It is shown here that every $n$-generic set $G$ is properly $\\Sigma^0_n$ in some $G$-recursive $X$. As a corollary, we also prove that for every $n > 1$ and every $n$-generic set $G$ there exists a $G$-recursive $X$ which is generalized ${\\rm low}_n$ but not generalized ${\\rm low}_{n-1}$. Thus we confirm two conjectures of Jockusch.
We prove that the statement \"for every infinite cardinal nu, every graph with list chromatic nu has coloring number at most beth_omega (nu)\" proved by Kojman [6] using the RGCH theorem [11] implies the RGCG theorem via a short forcing argument. Similarly, a better upper bound than beth_omega (nu) in this statement implies stronger forms of the RGCH theorem hold, whose consistency and the consistency of their negations are wide open. Thus, the optimality of Kojman s upper bound is a purely cardinal arithmetic problem, and, as discussed below, is hard to decide.
This article is based on the talk of the same name which I gave at the \"Aspects of Descriptive Set Theory\" RIMS Symposium in Kyoto in October 2011; it is essentially just a survey of my article \"Indestructibility of Vopenka s Principle\". In particular, I present (with a sketch of the proof) a forcing indestructibility theorem for the large cardinal axiom Vopenka s Principle. It is notable in that there is no preparatory forcing required to make the axiom indestructible, unlike other indestructibility results.
We investigate the problem of when $\\leq\\lambda$--support iterations of $<\\lambda$--complete notions of forcing preserve $\\lambda^+$. We isolate a property -- {\\em properness over diamonds} -- that implies $\\lambda^+$ is preserved and show that this property is preserved by $\\lambda$--support iterations. We close with an application of our technology by presenting a consistency result on uniformizing colorings of ladder systems on $\\{\\delta<\\lambda^+:\\cf(\\delta)=\\lambda\\}$ that complements a theorem of Shelah.
We prove the following two results. Theorem A: Let alpha be a limit ordinal. Suppose that 2^{|alpha|}<aleph_alpha and 2^{|alpha|^+}<aleph_{|alpha|^+}, whereas aleph_alpha^{|alpha|}>aleph_{|alpha|^+}. Then for all n< omega and for all bounded X subset aleph_{|alpha|^+}, M_n^#(X) exists. Theorem B: Let kappa be a singular cardinal of uncountable cofinality. If {alpha<kappa| 2^alpha=alpha^+} is stationary as well as co-stationary then for all n< omega and for all bounded X subset kappa, M_n^#(X) exists. Theorem A answers a question of Gitik and Mitchell, and Theorem B yields a lower bound for an assertion discussed in Gitik, M., Introduction to Prikry type forcing notions, in: Handbook of set theory, Foreman, Kanamori, Magidor (see Problem 4 there). The proofs of these theorems combine pcf theory with core model theory. Along the way we establish some ZFC results in cardinal arithmetic, motivated by Silver s theorem and we obtain results of core model theory, motivated by the task of building a ``stable core model.   Both sets of results are of independent interest.
This article continues the study of computable elementary topology started by the author and T. Grubba in 2009 and extends the author s 2010 study of axioms of computable separation. Several computable T3- and Tychonoff separation axioms are introduced and their logical relation is investigated. A number of implications between these axioms are proved and several implications are excluded by counter examples, however, many questions have not yet been answered. Known results on computable metrization of T3-spaces from M. Schr/\"oder (1998) and T. Grubba, M. Schr/\"oder and the author (2007) are proved under uniform assumptions and with partly simpler proofs, in particular, the theorem that every computably regular computable topological space with non-empty base elements can be embedded into a computable metric space. Most of the computable separation axioms remain true for finite products of spaces.
The problem of artificial precision is a major objection to any theory of vagueness based on real numbers as degrees of truth. Suppose you are willing to admit that, under sufficiently specified circumstances, a predication of \"is red\" receives a unique, exact number from the real unit interval [0,1]. You should then be committed to explain what is it that determines that value, settling for instance that my coat is red to degree 0.322 rather than 0.321. In this note I revisit the problem in the important case of {\\L}ukasiewicz infinite-valued propositional logic that brings to the foreground the role of maximally consistent theories. I argue that the problem of artificial precision, as commonly conceived of in the literature, actually conflates two distinct problems of a very different nature.
We regard Forcing Notions P adding real numbers and the algebras of P-measurable sets. As for Cohen- and Random-Forcing we can show that each analytic set is P-measurable using Solovay s Unfolding Trick for infinite games. To show this we develop the notion of strategic fusion and give a proof of a uniform unfolding theorem which allows us to reduce the proof of analytic measurability to the definition of a certain function.
Let kappa be an uncountable cardinal and the edges of a complete graph with kappa vertices be colored with aleph_0 colors. For kappa >2^{aleph_0} the Erd\\H{o}s-Rado theorem implies that there is an infinite monochromatic subgraph. However, if kappa <= 2^{aleph_0}, then it may be impossible to find a monochromatic triangle. This paper is concerned with the latter situation. We consider the types of colorings of finite subgraphs that must occur when kappa <= 2^{aleph_0}. In particular, we are concerned with the case aleph_1 <= kappa <= aleph_omega
With every $\\sigma$-ideal $I$ on a Polish space we associate the $\\sigma$-ideal $I^*$ generated by the closed sets in $I$. We study the forcing notions of Borel sets modulo the respective $\\sigma$-ideals $I$ and $I^*$ and find connections between their forcing properties. To this end, we associate to a $\\sigma$-ideal on a Polish space an ideal on a countable set and show how forcing properties of the forcing depend on combinatorial properties of the ideal. For $\\sigma$-ideals generated by closed sets we also study the degrees of reals added in the forcing extensions. Among corollaries of our results, we get necessary and sufficient conditions for a $\\sigma$-ideal $I$ generated by closed sets, under which every Borel function can be restricted to an $I$-positive Borel set on which it is either 1-1 or constant.
The main question here is the possible generalization of the following theorem on ``simple   equivalence relation on 2^omega to higher cardinals. Theorem: (1) Assume that: (a) E is a Borel 2-place relation on 2^omega, (b) E is an equivalence relation, (c) if eta, nu in 2^omega and (exists ! n)(eta(n) not= nu(n)), then eta, nu are not E --equivalent. Then there is a perfect subset of 2^omega of pairwise non E-equivalent members. (2) Instead of ``E is Borel  , ``E is analytic (or even a Borel combination of analytic relations)   is enough. (3) If E is a Pi^1_2 relation which is an equivalence relation satisfying clauses (b)+(c) in V^Cohen, then the conclusion of (1) holds.
A typical kind of question in mathematical logic is that for the necessity of a certain axiom: Given a proof of some statement $\\phi$ in some axiomatic system $T$, one looks for minimal subsystems of $T$ that allow deriving $\\phi$. In particular, one asks whether, given some system $T+\\psi$, $T$ alone suffices to prove $\\phi$. We show that this problem is undecidable unless $T+\\neg\\psi$ is decidable.
This paper continues the study of generalized amalgamation properties. Part of the paper provides a finer analysis of the groupoids that arise from failure of 3-uniqueness in a stable theory. We show that such groupoids must be abelian and link the binding group of the groupoids to a certain automorphism group of the monster model, showing that the group must be abelian as well. We also study connections between n-existence and n-uniqueness properties for various \"dimensions\" n in the wider context of simple theories. We introduce a family of weaker existence and uniqueness properties. Many of these properties did appear in the literature before; we give a category-theoretic formulation and study them systematically. Finally, we give examples of first-order simple unstable theories showing, in particular, that there is no straightforward generalization of the groupoid construction in an unstable context.
We use ideas from topological dynamics (amenability), combinatorics (structural Ramsey theory) and model theory (Fra\\\" {i}ss\\  e limits) to study closed amenable subgroups $G$ of the symmetric group $S_\\infty$ of a countable set, where $S_\\infty$ has the topology of pointwise convergence. We construct $G$-invariant measures on the universal minimal flows associated with these groups $G$ in, moreover, an algorithmic manner. This leads to an identification of the generic elements, in the sense of being Martin-L\\\" of random, of these flows with respect to the constructed invariant measures. Along these lines we study the random elements of $S_\\infty$, which are permutations that transform recursively presented universal structures into such structures which are Martin-L\\\" of random.
We introduce Black Boxes, the intention being provably in ZFC, we have guesses of extra structure. The guesses are pairwise quite far but together are \"dense\". We first deal with the simplest case, were the existence comes from winning a game by just writing down the opponent s moves. We show how it helps when instead orders we have tress with boundedly many levels, having freedom in the last. After this we quite systematically look at existence of black boxes, and make connection to non-saturation of natural ideals and diamonds on them. Chapter IV of upcoming book \"Nonstructure Theory\".
We address the following question: Can we expand an NIP theory by adding a linear order such that the expansion is still NIP? Easily, if acl(A)=A for all A, then this is true. Otherwise, we give counterexamples. More precisely, there is a totally categorical theory for which every expansion by a linear order has IP. There is also an \\omega-stable NDOP theory for which every expansion by a linear order interprets bounded arithmetic.
We prove that some natural \"outside\" property is equivalent (for a first order class) to being stable. For a model, being resplendent is a strengthening of being kappa-saturated. Restricting ourselves to the case kappa > |T| for transparency, a model M is kappa-resplendent means: when we expand M by <kappa individual constants (c_i:i < alpha), if (M, c_i)_ {i<alpha} has an elementary extension expandable to be a model of T  where Th((M,c_i)_{i<alpha}) subseteq T , |T | < kappa then already (M,c_i)_{i<\\alpha} can be expanded to a model of T . Trivially any saturated model of cardinality lambda is lambda-resplendent. We ask: how may kappa-resplendent models of a (first order complete) theory T of cardinality lambda are there? Naturally we restrict ourselves to cardinals lambda=lambda^ kappa + 2^ {|T|}. Then we get a complete and satisfying answer: this depends just on T being stable or unstable. In this case proving that for stable T we get few, is not hard; in fact every resplendent model of T is saturated hence determined by its cardinality up to isomorphism. The inverse is more problematic because naturally we have to use Skolem functions with any alpha<kappa places. Normally we use relevant partition theorems (Ramsey theorem or Erd\\H{o}s-Rado theorem), but in our case the relevant partitions theorems fails so we have to be careful.
Although algorithmic randomness with respect to various non-uniform computable measures is well-studied, little attention has been paid to algorithmic randomness with respect to computable \\emph{trivial} measures, where a measure $\\mu$ on $2^\\omega$ is trivial if the support of $\\mu$ consists of a countable collection of sequences. In this article, it is shown that there is much more structure to trivial computable measures than has been previously suspected.
We show that positive measure domination implies uniform almost everywhere domination and that this proof translates into a proof in the subsystem WWKL$_0$ (but not in RCA$_0$) of the equivalence of various Lebesgue measure regularity statements introduced by Dobrinen and Simpson. This work also allows us to prove that low for weak $2$-randomness is the same as low for Martin-L\\\"of randomness (a result independently obtained by Nies). Using the same technique, we show that $\\leq_{LR}$ implies $\\leq_{LK}$, generalizing the fact that low for Martin-L\\\"of randomness implies low for $K$.
We develop a general framework for forcing with coherent adequate sets on $H(\\lambda)$ as side conditions, where $\\lambda \\ge \\omega_2$ is a cardinal of uncountable cofinality. We describe a class of forcing posets which we call coherent adequate type forcings. The main theorem of the paper is that any coherent adequate type forcing preserves CH. We show that there exists a forcing poset for adding a club subset of $\\omega_2$ with finite conditions while preserving CH, solving a problem of Friedman.
We show that the class of representable substitution algebras is characterized by a set of universal first order sentences. In addition, it is shown that a necessary and sufficient condition for a substitution algebra to be representable is that it is embeddable in a substitution algebra in which elements are distinguished. Furthermore, conditions in terms of neat embeddings are shown to be equivalent to representability.
This paper represents classical propositional proofs as *combinatorial proofs*, which are more abstract than proof nets: superposition (contraction/weakening) is modelled mathematically, as a lax form of fibration, rather than syntactically (as in proof nets, which involve contraction and weakening nodes). A combinatorial proof is a `fibred  multiplicative linear proof net, hence the slogan in the title. Cut elimination retains its richness from sequent calculus: its non-determinism does not collapse to become confluent. [Note: this is merely a 2-page synopsis, accepted for a short presentation at Logic in Computer Science  05.]
Let $F_{\\omega_1}$ be the countable admissible ordinal equivalence relation defined on ${}^\\omega 2$ by $x \\ F_{\\omega_1} \\ y$ if and only if $\\omega_1^x = \\omega_1^y$. It will be shown that $F_{\\omega_1}$ is classifiable by countable structures and must be classified by structures of high Scott rank. If $E$ and $F$ are equivalence relations, then $E$ is almost Borel reducible to $F$ if and only if there is a Borel reduction of $E$ to $F$, except possibly on countably many $E$-classes. Let $E_{\\omega_1}$ denote the equivalence of order types of reals coding well-orderings. It will be shown that in the constructible universe $L$ and set generic extensions of $L$, $E_{\\omega_1}$ is not almost Borel reducible to $F_{\\omega_1}$, although a result of Zapletal implies such an almost Borel reduction exists if there is a measurable cardinal. Lastly, it will be shown that the isomorphism relation induced by a counterexample to Vaught s conjecture cannot be Borel reducible to $F_{\\omega_1}$ in $L$ and set generic extensions of $L$. This shows the consistency of a negative answer to a question of Sy-David Friedman.
In this paper we study the notion of strong non-reflection, and its contrapositive weak reflection. We say theta strongly non-reflects at lambda iff there is a function F: theta ---> lambda such that for all alpha < theta with cf(alpha)= lambda there is C club in alpha such that F restriction C is strictly increasing. We prove that it is consistent to have a cardinal theta such that strong non-reflection and weak reflection each hold on an unbounded set of cardinals less than theta .
These notes provide an opportunity to discover the beauty of Bourbaki set theory, and I hope that they will facilitate the task to those who find it difficult to read this book, one of the most critical elements of the mathematics of Bourbaki. ---- Ces notes constituent une occasion pour d\\ ecouvrir la beaut\\ e de la th\\ eorie des ensembles de Bourbaki, et j esp\\`ere qu elles faciliteront la t\\^ache \\`a ceux qui ont trouv\\ e des difficult\\ es en lisant ce livre qui est l un des plus critiqu\\ e des \\ el\\ ements de math\\ ematique de Bourbaki.
For each $a \\in {^\\omega \\omega}$, we define a Baire class one function $f_a : {^\\omega \\omega} \\to {^\\omega \\omega}$ which encodes $a$ in a certain sense. We show that for each Borel $g : {^\\omega \\omega} \\to {^\\omega \\omega}$, $f_a \\cap g = \\emptyset$ implies $a \\in \\Delta^1_1(c)$ where $c$ is any code for $g$. We generalize this theorem for $g$ in a larger pointclass $\\Gamma$. Specifically, when $\\Gamma = \\mathbf{\\Delta}^1_2$, $a \\in L[c]$. Also for all $n \\in \\omega$, when $\\Gamma = \\mathbf{\\Delta}^1_{3 + 2n}$, $a \\in \\mathcal{M}_{2 + 2n}(c)$.
We call a bipartite graph {\\it homogeneous} if every finite partial automorphism which respects left and right can be extended to a total automorphism. A $(\\kappa,{\\lambda} )$ bipartite graph is a bipartite graph with left side of size $\\kappa$ and right side of size ${\\lambda}$. We show, using a theorem of Hrushovski on finite graphs, that there is a homogeneous $({\\aleph_0},2^{\\aleph_0} )$ bipartite graph of girth 4 (thus answering negatively a question by Kupitz and Perles), and that depending on the underlying set theory all homogeneous $({\\aleph_0},\\aleph_1)$ bipartite graphs may be isomorphic, or there may be $2^{\\aleph_1}$ many isomorphism types of $(\\aleph_0,\\aleph_1)$ homogeneous graphs.
In this paper we construct a Beth model for intuitionistic functionals of high types and use it to create a relatively strong theory SLP containg intuitionistic principles for functionals, in particular, the theory of the \"creating subject\", axioms for lawless functionals and some versions of choice axioms. We prove that the intuitionistic theory SLP is equiconsistent with a classical typed set theory TI, where the comprehension axiom for sets of type n is restricted to formulas with no parameters of types > n. We show that each fragment of SLP with types <= s is equiconsistent with the corresponding fragment of TI and that it is stronger than the previous fragment of SLP. Thus, both SLP and TI are much stronger than the second order arithmetic. By constructing the intuitionistic theory SLP and interpreting in it the classical set theory TI, we contribute to the program of justifying classical mathematics from the intuitionistic point of view.
This article surveys results regarding the Tukey theory of ultrafilters on countable base sets. The driving forces for this investigation are Isbell s Problem and the question of how closely related the Rudin-Keisler and Tukey reducibilities are. We review work on the possible structures of cofinal types and conditions which guarantee that an ultrafilter is below the Tukey maximum. The known canonical forms for cofinal maps on ultrafilters are reviewed, as well as their applications to finding which structures embed into the Tukey types of ultrafilters. With the addition of some Ramsey theory, fine analyses of the structures at the bottom of the Tukey hierarchy are made.
We develop tame topology over dp-minimal structures equipped with definable uniformities satisfying certain assumptions. Our assumptions are enough to ensure that definable sets are tame: there is a good notion of dimension on definable sets, definable functions are almost everywhere continuous, and definable sets are finite unions of graphs of definable continuous \"multi-valued functions\". This generalizes known statements about weakly o-minimal, C-minimal and P-minimal theories.
Classification is an important goal in many branches of mathematics. The idea is to describe the members of some class of mathematical objects, up to isomorphism or other important equivalence in terms of relatively simple invariants. Where this is impossible, it is useful to have concrete results saying so. In model theory and descriptive set theory, there is a large body of work, showing that certain classes of mathematical structures admit classification, while others do not. In the present paper, we describe some recent work on classification in computable structure theory.
In 1968, Galvin conjectured that an uncountable poset $P$ is the union of countably many chains if and only if this is true for every subposet $Q \\subseteq P$ with size $\\aleph_1$. In 1981, Rado formulated a similar conjecture that an uncountable interval graph $G$ is countably chromatic if and only if this is true for every induced subgraph $H \\subseteq G$ with size $\\aleph_1$. Todorcevic has shown that Rado s Conjecture is consistent relative to the existence of a supercompact cardinal, while the consistency of Galvin s Conjecture remains open. In this paper, we survey and collect a variety of results related to these two conjectures. We also show that the extension of Rado s conjecture to the class of all chordal graphs is relatively consistent with the existence of a supercompact cardinal.
The Scott process of a relational structure $M$ is the sequence of sets of formulas given by the Scott analysis of $M$. We present axioms for the class of Scott processes of structures in a relational vocabulary $\\tau$, and use them to give a proof of an unpublished theorem of Leo Harrington from the 1970 s, showing that a counterexample to Vaught s Conjecture has models of cofinally many Scott ranks below $\\omega_{2}$. Our approach also gives a theorem of Harnik and Makkai, showing that if there exists a counterexample to Vaught s Conjecture, then there is a counterexample whose uncountable models have the same $\\mathcal{L}_{\\omega_{1}, \\omega}(\\tau)$-theory, and which has a model of Scott rank $\\omega_{1}$. Moreover, we show that if $\\phi$ is a sentence of $\\mathcal{L}_{\\omega_{1}, \\omega}(\\tau)$ giving rise to a counterexample to Vaught s Conjecture, then for every limit ordinal $\\alpha$ greater than the quantifier depth of $\\phi$ and below $\\omega_{2}$, $\\phi$ has a model of Scott rank $\\alpha$.
We show that the generic automorphism is axiomatisable in the green field of Poizat (once Morleyised) as well as in the bad fields which are obtained by collapsing this green field to finite Morley rank. As a corollary, we obtain \"bad pseudofinite fields\" in characteristic 0. In both cases, we give geometric axioms. In fact, a general framework is presented allowing this kind of axiomatisation. We deduce from various constructibility results for algebraic varieties in characteristic 0 that the green and bad fields fall into this framework. Finally, we give similar results for other theories obtained by Hrushovski amalgamation, e.g. the free fusion of two strongly minimal theories having the definable multiplicity property. We also close a gap in the construction of the bad field, showing that the codes may be chosen to be families of strongly minimal sets.
J. Zapletal asked if all the forcing notions considered in his monograph are homogeneous. Specifically, he asked if the forcing consisting of Borel sets of $\\sigma$-finite 2-dimensional Hausdorff measure in $\\mathbb{R}^3$ (ordered under inclusion) is homogeneous. We answer both questions in the negative. Let $\\mathcal{N}^1_2$ be the ideal of sets in the plane of $1$-dimensional Hausdorff measure zero. D. H. Fremlin determined the position of the cardinal invariants of this ideal in the Cicho\\ n Diagram. This required proving numerous inequalities, and in all but three cases it was known that the inequalities can be strict in certain models. For one of the remaining ones Fremlin posed this as an open question in his monograph. We answer this by showing that consistently $\\mathrm{cov}(\\mathcal{N}^1_2) > \\mathrm{cov}(\\mathcal{N})$, where $\\mathcal{N}$ is the usual Lebesgue null ideal. We also prove that the remaining two inequalities can be strict. Moreover, we fit the cardinal invariants of the ideal of sets of $\\sigma$-finite Hausdorff measure into the diagram. P. Humke and M. Laczkovich raised the following question. Is it consistent that there is an ordering of the reals in which all proper initial segments are Lebesgue null but for every ordering of the reals there is a proper initial segment that is not null with respect to the $1/2$-dimensional Hausdorff measure? We determine the values of the cardinal invariants of the Cicho\\ n Diagram as well as the invariants of the nullsets of Hausdorff measures in the first model mentioned in the previous paragraph, and as an application we answer this question of Humke and Laczkovich affirmatively.
The tree theorem for pairs ($\\mathsf{TT}^2_2$), first introduced by Chubb, Hirst, and McNicholl, asserts that given a finite coloring of pairs of comparable nodes in the full binary tree $2^{<\\omega}$, there is a set of nodes isomorphic to $2^{<\\omega}$ which is homogeneous for the coloring. This is a generalization of the more familiar Ramsey s theorem for pairs ($\\mathsf{RT}^2_2$), which has been studied extensively in computability theory and reverse mathematics. We answer a longstanding open question about the strength of $\\mathsf{TT}^2_2$, by showing that this principle does not imply the arithmetic comprehension axiom ($\\mathsf{ACA}_0$) over the base system, recursive comprehension axiom ($\\mathsf{RCA}_0$), of second-order arithmetic. In addition, we give a new and self-contained proof of a recent result of Patey that $\\mathsf{TT}^2_2$ is strictly stronger than $\\mathsf{RT}^2_2$. Combined, these results establish $\\mathsf{TT}^2_2$ as the first known example of a natural combinatorial principle to occupy the interval strictly between $\\mathsf{ACA}_0$ and $\\mathsf{RT}^2_2$. The proof of this fact uses an extension of the bushy tree forcing method, and develops new techniques for dealing with combinatorial statements formulated on trees, rather than on $\\omega$.
Let $E\\subseteq F$ and $E \\subseteq F $ be Borel equivalence relations on the standard Borel spaces $X$ and $Y$, respectively. The pair $(E,F)$ is simultaneously Borel reducible to the pair $(E ,F )$ if there is a Borel function $f:X\\to Y$ that is both a reduction from $E$ to $E $ and a reduction from $F$ to $F $. Simultaneous Borel embeddings and isomorphisms are defined analogously. We classify all pairs $E\\subseteq F$ of smooth countable Borel equivalence relations up to simultaneous Borel bireducibility and biembeddability, and a significant portion of such pairs up to simultaneous Borel isomorphism. We generalize Mauldin s notion of Borel parametrization in order to identify large natural subclasses of pairs of smooth countable equivalence relations and of singleton smooth (not necessarily countable) equivalence relations for which the natural combinatorial isomorphism invariants are complete, and we present counterexamples outside these subclasses. Finally, we relate isomorphism of smooth equivalence relations and of pairs of smooth countable equivalence relations to Borel equivalence of Borel functions as discussed in Komisarski, Michalewski, and Milewski.
We work with a finite relational vocabulary with at least one relation symbol with arity at least 2. Fix any integer $m > 1$. For almost all finite structures (labelled or unlabelled) such that at least $m$ elements are moved by some automorphisms, the automorphism group is $(Z_2)^i$ for some $i \\leq (m+1)/2$; and if some relation symbol has arity at least 3, then the automorphism group is almost always $Z_2$.
In this thesis three topics on the model theory of partial differential fields are considered: the generalized Galois theory for partial differential fields, geometric axioms for the theory of partial differentially closed fields, and the existence and properties of the model companion of the theory of partial differential fields with an automorphism. The approach taken here to these subjects is to relativize the algebro geometric notions of prolongation and D-variety to differential notions with respect to a fixed differential structure.
We employ the Zermelo-Fraenkel Axioms that characterize sets as mathematical primitives. The Anti-foundation Axiom plays a significant role in our development, since among other of its features, its replacement for the Axiom of Foundation in the Zermelo-Fraenkel Axioms motivates Platonic interpretations. These interpretations also depend on such allied notions for sets as pictures, graphs, decorations, labelings and various mappings that we use. A syntax and semantics of operators acting on sets is developed. Such features enable construction of a theory of non-well-founded sets that we use to frame mathematical foundations of consciousness. To do this we introduce a supplementary axiomatic system that characterizes experience and consciousness as primitives. The new axioms proceed through characterization of so- called consciousness operators. The Russell operator plays a central role and is shown to be one example of a consciousness operator. Neural networks supply striking examples of non-well-founded graphs the decorations of which generate associated sets, each with a Platonic aspect. Employing our foundations, we show how the supervening of consciousness on its neural correlates in the brain enables the framing of a theory of consciousness by applying appropriate consciousness operators to the generated sets in question.
We solve a well--known problem in the theory of compact scattered spaces and superatomic boolean algebras by showing that, under GCH and for each regular cardinal $\\kappa \\geq \\omega$, there is a poset $\\mathcal P_\\kappa$ preserving all cardinals and forcing the existence of a $\\kappa$--thin very tall locally compact scattered space. For $\\kappa > \\omega$, we conceive the poset $\\mathcal P_\\kappa$ as a higher analogue of the poset $\\mathcal P_\\omega$ originally introduced by Asper\\ {o} and Bagaria in the context of an (unpublished) alternative consistency proof.
An action is a pair of sets, $C$ and $S$, and a function $f\\colon C\\times S \\to C$. Rothschild and Yalcin gave a simple axiomatic characterization of those actions arising from set intersection, i.e.\\ for which the elements of $C$ and $S$ can be identified with sets in such a way that elements of $S$ act on elements of $C$ by intersection. We introduce and axiomatically characterize two natural classes of actions which arise from set intersection and union. In the first class, the $\\uparrow\\mathrel{\\mspace{-2mu}}\\downarrow$-actions, each element of $S$ is identified with a pair of sets $(s^\\downarrow,s^\\uparrow)$, which act on a set $c$ by intersection with $s^\\downarrow$ and union with $s^\\uparrow$. In the second class, the $\\uparrow\\mathrel{\\mspace{-2mu}}\\downarrow$-biactions, each element of $S$ is labeled as an intersection or a union, and acts accordingly on $C$. We give intuitive examples of these actions, one involving conversations and another a university s changing student body. The examples give some motivation for considering these actions, and also help give intuitive readings of the axioms. The class of $\\uparrow\\mathrel{\\mspace{-2mu}}\\downarrow$-actions is closely related to a class of single-sorted algebras, which was previously treated by Margolis et al., albeit in another guise (hyperplane arrangements), and we note this connection. Along the way, we make some useful, though very general, observations about axiomatization and representation problems for classes of algebras.
A Polish group is surjectively universal if it can be continuously homomorphically mapped onto every Polish group. Making use of a type of new metrics on free groups \\cite{DG}, we prove the existence of surjectively universal Polish groups, answering in the positive a question of Kechris. In fact, we give several examples of surjectively universal Polish groups. We find a sufficient condition to guarantee that the new metrics on free groups can be computed directly. We also compare this condition with CLI groups.
We compare three notions of effectiveness on uncountable structures. The first notion is that of a $\\real$-computable structure, based on a model of computation proposed by Blum, Shub, and Smale, which uses full-precision real arithmetic. The second notion is that of an $F$-parameterizable structure, defined by Morozov and based on Mal tsev s notion of a constructive structure. The third is $\\Sigma$-definability over $HF(\\real)$, defined by Ershov as a generalization of the observation that the computably enumerable sets are exactly those $\\Sigma_1$-definable in $HF(\\mathbb{N})$. We show that every $\\real$-computable structure has an $F$-parameterization, but that the expansion of the real field by the exponential function is $F$-parameterizable but not $\\real$-computable. We also show that the structures with $\\real$-computable copies are exactly the structures with copies $\\Sigma$-definable over $HF(\\real)$. One consequence of this equivalence is a method of approximating certain $\\real$-computable structures by Turing computable structures.
In this paper we study set mappings on 4-tuples. We continue a previous work of Komjath and Shelah by getting new finite bounds on the size of free sets in a generic extension. This is obtained by an entirely different forcing construction. Moreover we prove a ZFC result for set mappings on 4-tuples and also as another application of our forcing construction we give a consistency result for set mappings on triples.
In a game where both contestants have perfect information, there is a strict limit on how perfect that information can be. By contrast, when one player is deprived of all information, the limit on the other player s information disappears, admitting a hierarchy of levels of lopsided perfection of information. We turn toward the question of when the player with super-perfect information has a winning strategy, and we exactly answer this question for a specific family of lopsided-information games which we call guessing games.
For $n\\geq 3$, define $T_n$ to be the theory of the generic $K_n$-free graph, where $K_n$ is the complete graph on $n$ vertices. We prove a graph theoretic characterization of dividing in $T_n$, and use it to show that forking and dividing are the same for complete types. We then give an example of a forking and nondividing formula. Altogether, $T_n$ provides a counterexample to a recent question of Chernikov and Kaplan.
This dissertation includes many theorems which show how to change large cardinal properties with forcing. I consider in detail the degrees of inaccessible cardinals (an analogue of the classical degrees of Mahlo cardinals) and provide new large cardinal definitions for degrees of inaccessible cardinals extending the hyper-inaccessible hierarchy. I showed that for every cardinal $\\kappa$, and ordinal $\\alpha$, if $\\kappa$ is $\\alpha$-inaccerssible, then there is a $\\mathbb{P}$ forcing that $\\kappa$ which preserves that $\\alpha$-inaccessible but destorys that $\\kappa$ is $(\\alpha+1)$-inaccessible. I also consider Mahlo cardinals and degrees of Mahlo cardinals. I showed that for every cardinal $\\kappa$, and ordinal $\\alpha$, there is a notion of forcing $\\mathbb{P}$ such that $\\kappa$ is still $\\alpha$-Mahlo in the extension, but $\\kappa$ is no longer $(\\alpha +1)$-Mahlo. I also show that a cardinal $\\kappa$ which is Mahlo in the ground model can have every possible inaccessible degree in the forcing extension, but no longer be Mahlo there. The thesis includes a collection of results which give forcing notions which change large cardinal strength from weakly compact to weakly measurable, including some earlier work by others that fit this theme. I consider in detail measurable cardinals and Mitchell rank. I show how to change a class of measurable cardinals by forcing to an extension where all measurable cardinals above some fixed ordinal $\\alpha$ have Mitchell rank below $\\alpha.$ Finally, I consider supercompact cardinals, and a few theorems about strongly compact cardinals. Here, I show how to change the Mitchell rank for supercompactness for a class of cardinals.
This is a non-standard paper, containing some problems, mainly in model theory, which I have, in various degrees, been interested in. Sometimes with a discussion on what I have to say; sometimes, of what makes them interesting to me, sometimes the problems are presented with a discussion of how I have tried to solve them, and sometimes with failed tries, anecdote and opinion. So the discussion is quite personal, in other words, egocentric and somewhat accidental. As we discuss many problems, history and side references are erratic, usually kept at a minimum (\"See...\" means: see the references there and possibly the paper itself). The base were lectures in Rutgers Fall  97 and reflect my knowledge then. The other half, math.LO/9906113, concentrating on set theory, is in print, but the two halves are independent. We thank A. Blass, G. Cherlin and R. Grossberg for some corrections.
We give arithmetical proofs of the strong normalization of two symmetric $\\lambda$-calculi corresponding to classical logic. The first one is the $\\bar{\\lambda}\\mu\\tilde{\\mu}$-calculus introduced by Curien & Herbelin. It is derived via the Curry-Howard correspondence from Gentzen s classical sequent calculus LK in order to have a symmetry on one side between \"program\" and \"context\" and on other side between \"call-by-name\" and \"call-by-value\". The second one is the symmetric $\\lambda \\mu$-calculus. It is the $\\lambda \\mu$-calculus introduced by Parigot in which the reduction rule $\\mu $, which is the symmetric of $\\mu$, is added. These results were already known but the previous proofs use candidates of reducibility where the interpretation of a type is defined as the fix point of some increasing operator and thus, are highly non arithmetical.
In the first edition of Classification Theory, the second author characterized the stable theories in terms of saturation of ultrapowers. Prior to this theorem, stability had already been defined in terms of counting types, and the unstable formula theorem was known. A contribution of the ultrapower characterization was that it involved sorting out the global theory, and introducing nonforking, seminal for the development of stability theory. Prior to the present paper, there had been no such characterization of an unstable class. In the present paper, we first establish the existence of so-called optimal ultrafilters on Boolean algebras, which are to simple theories as Keisler s good ultrafilters are to all theories. Then, assuming a supercompact cardinal, we characterize the simple theories in terms of saturation of ultrapowers. To do so, we lay the groundwork for analyzing the global structure of simple theories, in ZFC, via complexity of certain amalgamation patterns. This brings into focus a fundamental complexity in simple unstable theories having no real analogue in stability.
In this paper we prove: Theorem 1. Let $\\mathcal{K}$ be an abstract elementary class which satisfies the joint embedding and amalgamation properties. Suppose $\\lambda>\\mu\\geq LS(\\mathcal{K})$ and $\\theta$ is a limit ordinal $<\\lambda^+$. If $\\mathcal{K}$ is $\\mu$ superstable and $\\mu^+$-superstable and satisfies $\\mu^+$-symmetry, then for any increasing sequence $\\langle M_i\\mid i<\\theta\\rangle$ of $\\mu^+$-saturated models of cardinality $\\lambda$, the model $\\bigcup_{i<\\theta}M_i$ is $\\mu^+$-saturated.
We study the model theory of countable right-angled buildings with infinite residues. For every Coxeter graph we obtain a complete theory with a natural axiomatisation, which is $\\omega$-stable and equational. Furthermore, we provide sharp lower and upper bounds for its degree of ampleness, computed exclusively in terms of the associated Coxeter graph. This generalises and provides an alternative treatment of the free pseudospace.
The main result of this paper is a positive answer to the Conjecture 5.1 by A. Chernikov, I. Kaplan and P. Simon: If M is a PRC field, then Th(M) is NTP_2 if and only if M is bounded. In the case of PpC fields, we prove that if M is a bounded PpC field, then Th(M) is NTP_2. We also generalize this result to obtain that, if M is a bounded PRC or PpC field with exactly n orders or p-adic valuations respectively, then Th(M) is strong of burden n. This also allows us to explicitly compute the burden of types, and to describe forking.
There is a well-known global equivalence between \\Sigma^1_2 sets having the Universal Baire property, two-step \\Sigma^1_3 generic absoluteness, and the closure of the universe under the sharp operation. In this note, we determine the exact consistency strength of \\Sigma^1_2 sets being (2^{\\omega})^{+}-cc Universally Baire, which is below 0^{#}. In a model obtained, there is a \\Sigma^1_2 set which is weakly \\omega_2-Universally Baire but not \\omega_2-Universally Baire.
We characterize those standard models M of ZFC which are embeddable, as the class of all standard sets, in a model of internal set theory IST. The necessary and sufficient condition is that 1) there is a wellordering < of M which does not destroy the ZFC schemata, and 2) the truth relation for (M,<) does not destroy Separation. The result is interpreted as the answer for the question in the title.
Jech proved that every partially ordered set can be embedded into the cardinals of some model of $ZF$. We extend this result to show that every partially ordered set can be embedded into the cardinals of some model of $ZF+DC_{<\\kappa}$ for any regular $\\kappa$. We use this theorem to show that for all $\\kappa$, the assumption of $DC_\\kappa$ does not entail that there are no decreasing chains of cardinals. We also show how to extend the result to and embed into the cardinals a proper class which is definable over the ground model. We use this extension to give a large cardinals-free proof of independence of the weak choice principle known as $WISC$.
We consider the theory of algebraically closed fields of characteristic zero with multivalued operations $x\\mapsto x^r$ (raising to powers). It is in fact the theory of equations in exponential sums. In an earlier paper we have described complete first-order theories of such structures, conditional on a Diophantine conjecture that generalises the Mordell-Lang conjecture (CIT). Here we get this result unconditionally. The field of complex numbers with raising to real powers satisfies the corresponding theory if Schanuel s conjecture holds. In particular, we have proved that a (weaker) version of Schanuel s conjecture implies that every well-defined system of exponential sums with real exponents has a solution in the complex numbers. Recent result by Bays, Kirby and Wilkie states that the required version of Schanuel s conjecture holds for almost every choice of exponents. It follows that for the corresponding choice of real exponents we have an unconditional description of the first order theory of the complex numbers with raising to these powers.
Boykin and Jackson recently introduced a property of countable Borel equivalence relations called Borel boundedness, which they showed is closely related to the union problem for hyperfinite equivalence relations. In this paper, we introduce a family of properties of countable Borel equivalence relations which correspond to combinatorial cardinal characteristics of the continuum in the same way that Borel boundedness corresponds to the bounding number $\\mathfrak b$. We analyze some of the basic behavior of these properties, showing for instance that the property corresponding to the splitting number $\\mathfrak s$ coincides with smoothness. We then settle many of the implication relationships between the properties; these relationships turn out to be closely related to (but not the same as) the Borel Tukey ordering on cardinal characteristics.
This paper uses the framework of reverse mathematics to investigate the strength of two recurrence theorems of topological dynamics. It establishes that one of these theorems, the existence of an almost periodic point, lies strictly between WKL and ACA (working over RCA_0). This is the first example of a theorem with this property. It also shows the existence of an almost periodic point is conservative over RCA_0 for Pi^1_1 sentences. These results establish the existence of a new upwards-closed subclass of the PA degrees
We extend to singular cardinals the model-theoretical relation $\\lambda \\stackrel{\\kappa}{\\Rightarrow} \\mu$ introduced in P. Lipparini, The compactness spectrum of abstract logics, large cardinals and combinatorial principles, Boll. Unione Matematica Italiana ser. VII, {\\bf 4-B} 875--903 (1990). We extend some results obtained in Part II, finding equivalent conditions involving uniformity of ultrafilters and the existence of certain infinite matrices. Our present definition suggests a new compactness property for abstract logics.
We introduce a property of posets which strengthens the (\\omega_1+1)-strategic closedness. This property is defined using a variation of Banach-Mazur game on posets, where the first player chooses a countable set of conditions instead of a single condition at each turn. We prove PFA is preserved under any forcing over a poset with this property. As an application we reproduce a proof of Magidor s theorem about the consistency of PFA with some weak variations of the square principles. We also argue how different this property is from the (\\omega_1+1)-operational closedness, which we introduced in our previous work, by observing which portions of MA^+(\\omega_1-closed) are preserved or destroyed under forcing over posets with either property.
Various theorems for the preservation of set-theoretic axioms under forcing are proved, regarding both forcing axioms and axioms true in the Levy-Collapse. These show in particular that certain applications of forcing axioms require to add generic countable sequences high up in the set-theoretic hierarchy even before collapsing everything down to $\\aleph\\_1$. Later we give applications, among them the consistency of ${\\rm MM}$ with $\\aleph\\_\\omega$ not being Jonsson which answers a question raised during Oberwolfach 2005.
This paper introduces a new theory which encompasses concepts and ideas from set theory, type theory, and Le\\ {s}niewski s mereology and describes its possibility as an alternative foundation for mathematics. In the introduction section I will introduce motives for development of the theory and some remarks on the methods of presentation. Axioms of the theory and their philosophical background and justification on the basis of intuitive view are discussed next. Discussed after are realizations of mathematical concepts such as $\\mathbb{N}$, $\\mathbb{Z}$, $\\mathbb{Q}$, $\\mathbb{R}$, $\\mathbb{C}$, etc. Then this paper concludes with comparisons between the theory and ZFC and its mathematical limitations.
A bounded automorphism of a field or a group with trivial approximate centre is definable. In an expansion of a field by a Pfaffian family F of additive endomorphisms such that algebraic closure in the expansion coincides with relative field-algebraic closure of the F-substructure generated, a bounded endomorphism, possibly composed with a power of the Frobenius, is a composition of endomorphisms associated with F.
It was recently shown that arbitrary first-order models canonically extend to models (of the same language) consisting of ultrafilters. The main precursor of this construction was the extension of semigroups to semigroups of ultrafilters, a technique allowing to obtain significant results in algebra and dynamics. Here we consider another particular case where the models are linearly ordered sets. We explicitly calculate the extensions of a given linear order and the corresponding operations of minimum and maximum on a set. We show that the extended relation is not more an order however is close to the natural linear ordering of nonempty half-cuts of the set and that the two extended operations define a skew lattice structure on the set of ultrafilters.
In this paper we develop an almost general process to switch from abstract logics in the sense of Brown and Suszko to lattices. With this method we can establish dualities between some categories of abstract logics to the correspondent topological space categories. In more detail we will explain the duality between the category of abstract intuitionistic logics with intuitionistic morphisms and the category of Esakia spaces with the Esakia morphisms.
An $\\aleph_1$-Souslin tree is a complicated combinatorial object whose existence cannot be decided on the grounds of ZFC alone. But 15 years after Tennenbaum and independently Jech devised notions of forcing for introducing such a tree, Shelah proved that already the simplest forcing notion --- Cohen forcing --- adds an $\\aleph_1$-Souslin tree. In this paper, we identify a rather large class of notions of forcing that, assuming a GCH-type assumption, add a $\\lambda^+$-Souslin tree. This class includes Prikry, Magidor and Radin forcing.
In $\\mathsf{ZFC}$, if there is a measurable cardinal with infinitely many Woodin cardinals below it, then for every equivalence relation $E \\in L(\\mathbb{R})$ on $\\mathbb{R}$ with all $\\mathbf{\\Delta}_1^1$ classes and every $\\sigma$-ideal $I$ on $\\mathbb{R}$ so that the associated forcing $\\mathbb{P}_I$ of $I^+$ $\\mathbf{\\Delta}_1^1$ subsets is proper, there exists some $I^+$ $\\mathbf{\\Delta}_1^1$ set $C$ so that $E \\upharpoonright C$ is a $\\mathbf{\\Delta}_1^1$ equivalence relation. In $\\mathsf{ZF} + \\mathsf{DC} + \\mathsf{AD}_\\mathbb{R} + V = L(\\mathscr{P}(\\mathbb{R}))$, for every equivalence relation $E$ on $\\mathbb{R}$ with all $\\mathbf{\\Delta}_1^1$ classes and every $\\sigma$-ideal $I$ on $\\mathbb{R}$ so that the associated forcing $\\mathbb{P}_I$ is proper, there is some $I^+$ $\\mathbf{\\Delta}_1^1$ set $C$ so that $E \\upharpoonright C$ is a $\\mathbf{\\Delta}_1^1$ equivalence relation.
We extend a dichotomy between 1-basedness and supersimplicity proved in a previous paper. The generalization we get is to arbitrary language, with no restrictions on the topology (we do not demand type-definabilty of the open set in the definition of essential 1-basedness). We conclude that every (possibly uncountable) hypersimple unidimensional theory that is not s-essentially 1-based by means of the forking topology is supersimple. We also obtain a strong version of the above dichotomy in the case where the language is countable.
We investigate the strength of the existence of a non-principal ultrafilter over fragments of higher order arithmetic. Let U be the statement that a non-principal ultrafilter exists and let ACA_0^{\\omega} be the higher order extension of ACA_0. We show that ACA_0^{\\omega}+U is \\Pi^1_2-conservative over ACA_0^{\\omega} and thus that ACA_0^{\\omega}+\\U is conservative over PA. Moreover, we provide a program extraction method and show that from a proof of a strictly \\Pi^1_2 statement \\forall f \\exists g A(f,g) in ACA_0^{\\omega}+U a realizing term in G\\\"odel s system T can be extracted. This means that one can extract a term t, such that A(f,t(f)).
We develop \\emph{Fra\\\"iss\\ e theory}, namely the theory of \\emph{Fra\\\"iss\\ e classes} and \\emph{Fra\\\"iss\\ e limits}, in the context of metric structures. We show that a class of finitely generated structures is Fra\\\"iss\\ e if and only if it is the age of a separable approximately homogeneous structure, and conversely, that this structure is necessarily the unique limit of the class, and is universal for it. We do this in a somewhat new approach, in which   finite maps up to errors   are coded by \\emph{approximate isometries}.
A real X is defined to be relatively c.e. if there is a real Y such that X is c.e.(Y) and Y does not compute X. A real X is relatively simple and above if there is a real Y <_T X such that X is c.e.(Y) and there is no infinite subset Z of the complement of X such that Z is c.e.(Y). We prove that every nonempty Pi^0_1 class contains a member which is not relatively c.e. and that every 1-generic real is relatively simple and above.
By Easton s theorem one can force the exponential function on regular cardinals to take rather arbitrary cardinal values provided monotonicity and Koenig s lemma are respected. In models without choice we employ a \"surjective\" version of the exponential function. We then prove a choiceless Easton s theorem: one can force the surjective exponential function on all infinite cardinals to take arbitrary cardinal values, provided monotonicity and Cantor s theorem are satisfied, irrespective of cofinalities.
We study the reverse mathematics of the theory of countable second-countable topological spaces, with a focus on compactness. We show that the general theory of such spaces works as expected in the subsystem $\\mathsf{ACA}_0$ of second-order arithmetic, but we find that many unexpected pathologies can occur in weaker subsystems. In particular, we show that $\\mathsf{RCA}_0$ does not prove that every compact discrete countable second-countable space is finite and that $\\mathsf{RCA}_0$ does not prove that the product of two compact countable second-countable spaces is compact. To circumvent these pathologies, we introduce strengthened forms of compactness, discreteness, and Hausdorffness which are better behaved in subsystems of second-order arithmetic weaker than $\\mathsf{ACA}_0$.
We establish a surprisingly close relationship between universal Horn classes of directed graphs and varieties generated by so-called adjacency semigroups which are Rees matrix semigroups over the trivial group with the unary operation of reversion. In particular, the lattice of subvarieties of the variety generated by adjacency semigroups that are regular unary semigroups is essentially the same as the lattice of universal Horn classes of reflexive directed graphs. A number of examples follow, including a limit variety of regular unary semigroups and finite unary semigroups with NP-hard variety membership problems.
We study some dynamical aspects of the action of automorphisms in model theory in particular in the presence of invariant measures. We give some characterizations for NIP theories in terms of dynamics of automorphisms and invariant measures for example in terms of compact systems, entropy and measure algebras. Moreover, we study the concept of symbolic representation for models. Amongst the results, we give some characterizations for dividing lines and combinatorial configurations such as independence property, order property and strictly order property in terms of symbolic representations.
For a fixed natural number $n \\geq 1$, the Hart-Shelah example is an abstract elementary class (AEC) with amalgamation that is categorical exactly in the infinite cardinals less than or equal to $\\aleph_n$. We investigate recently-isolated properties of AECs in the setting of this example. We isolate the exact amount of type-shortness holding in the example and show that it has a type-full good $\\aleph_{n-1}$-frame which fails the existence property for uniqueness triples. This gives the first example of such a frame.
In this research a new algebraic semantics of rough set theory including additional meta aspects is proposed. The semantics is based on enhancing the standard rough set theory with notions of  relative ability of subsets of approximation spaces to approximate . The eventual algebraic semantics is developed via many deep results in convexity in ordered structures. A new variation of rough set theory, namely  ill-posed rough set theory  in which it may suffice to know some of the approximations of sets, is eventually introduced.
Assuming the obvious definitions (see paper) we show the a decidable model that is effectively prime is also effectively atomic. This implies that two effectively prime (decidable) models are computably isomorphic. This is in contrast to the theorem that there are two atomic decidable models which are not computably isomorphic. The implications of this work in reverse mathematics is that \"effectively prime implies effectively atomic\" holds in topped models. But due to an observation of David Belanger, \"effectively prime implies effectively atomic\" fails for some Scott sets. The reserve mathematical strength of \"Prime Uniqueness\" remains open.
In the setup of abstract elementary classes satisfying a local version of superstability, we prove the uniqueness property for a certain independence notion arising from splitting. This had been a longstanding technical difficulty when constructing forking-like notions in this setup. As an application, we show that the two versions of forking symmetry appearing in the literature (the one defined by Shelah for good frames and the one defined by VanDieren for splitting) are equivalent.
We investigate $IPA$ - real closed fields, that is, real closed fields which admit an integer part whose non-negative cone is a model of Peano Arithmetic. We show that the value group of an $IPA$ - real closed field is an exponential group in the residue field, and that the converse fails in general. As an application, we classify (up to isomorphism) value groups of countable recursively saturated exponential real closed fields. We exploit this characterization to construct countable exponential real closed fields which are not $IPA$ - real closed fields.
We give an induction-free axiom system for diophantine correct open induction. We relate the problem of whether a finitely generated ring of Puiseux polynomials is diophantine correct to a problem about the value-distribution of a tuple of semialgebraic functions with integer arguments. We use this result, and a theorem of Bergelson and Leibman on generalized polynomials, to identify a class of diophantine correct subrings of the field of descending Puiseux series with real coefficients.
Moisil logic, having as algebraic counterpart \\L ukasiewicz-Moisil algebras, provide an alternative way to reason about vague information based on the following principle: a many-valued event is characterized by a family of Boolean events. However, using the original definition of \\L ukasiewicz-Moisil algebra, the principle does not apply for subalgebras. In this paper we identify an alternative and equivalent definition for the $n$-valued \\L ukasiewicz-Moisil algebras, in which the determination principle is also saved for arbitrary subalgebras, which are characterized by a Boolean algebra and a family of Boolean ideals. As a consequence, we prove a duality result for the $n$-valued \\L ukasiewicz-Moisil algebras, starting from the dual space of their Boolean center. This leads us to a duality for MV$_n$-algebras, since are equivalent to a subclass of $n$-valued \\L ukasiewicz-Moisil algebras.
We show that for many pairs of infinite cardinals $\\kappa > \\mu^+ > \\mu$, $(\\kappa^{+}, \\kappa)\\twoheadrightarrow (\\mu^+, \\mu)$ is consistent relative to the consistency of a supercompact cardinal. We also show that it is consistent, relative to a huge cardinal that $(\\kappa^{+}, \\kappa)\\twoheadrightarrow (\\mu^+, \\mu)$ for every successor cardinal $\\kappa$ and every $\\mu < \\kappa$, answering a question of Foreman.
The Kalikow problem for a pair (lambda, kappa) of cardinal numbers, lambda > kappa (in particular kappa =2) is whether we can map the family of omega --sequences from lambda to the family of omega --sequences from kappa in a very continuous manner. Namely, we demand that for eta, nu in lambda^omega we have: eta, nu are almost equal if and only if their images are. We show consistency of the negative answer e.g. for aleph_omega but we prove it for smaller cardinals. We indicate a close connection with the free subset property and its variants.
Reverse Mathematics is a program in the foundations of mathematics. Its results give rise to an elegant classification of theorems of ordinary mathematics based on computability. In particular, the majority of these theorems fall into only five categories of which the associated logical systems are dubbed `the Big Five . Recently, a lot of effort has been directed towards finding \\emph{exceptional} theorems, i.e.\\ which fall outside the Big Five categories. The so-called Reverse Mathematics zoo is a collection of such exceptional theorems (and their relations). In this paper, we show that the uniform versions of the zoo-theorems, i.e. where a functional computes the objects stated to exist, all fall in the third Big Five category arithmetical comprehension, inside Kohlenbach s higher-order Reverse Mathematics. In other words, the zoo seems to disappear at the uniform level. Our classification applies to all theorems whose objects exhibit little structure, a notion we conjecture to be connected to Montalban s notion robustness. Surprisingly, our methodology reveals a hitherto unknown `computational  aspect of Nonstandard Analysis: We shall formulate an algorithm $\\mathfrak{RS}$ which takes as input the proof of a specific equivalence in Nelson s internal set theory, and outputs the proof of the desired equivalence (not involving Nonstandard Analysis) between the uniform zoo principle and arithmetical comprehension. Moreover, the equivalences thus proved are even explicit, i.e. a term from the language converts the functional from one uniform principle into the functional from the other one and vice versa.
We study the question, ``For which reals $x$ does there exist a measure $\\mu$ such that $x$ is random relative to $\\mu$?   We show that for every nonrecursive $x$, there is a measure which makes $x$ random without concentrating on $x$. We give several conditions on $x$ equivalent to there being continuous measure which makes $x$ random. We show that for all but countably many reals $x$ these conditions apply, so there is a continuous measure which makes $x$ random. There is a meta-mathematical aspect of this investigation. As one requires higher arithmetic levels in the degree of randomness, one must make use of more iterates of the power set of the continuum to show that for all but countably many $x$ s there is a continuous $\\mu$ which makes $x$ random to that degree.
For every natural number $m$, the existentially closed models of the theory of fields with $m$ commuting derivations can be given a first-order geometric characterization in several ways. In particular, the theory of these differential fields has a model-companion. The axioms are that certain differential varieties determined by certain ordinary varieties are nonempty. There is no restriction on the characteristic of the underlying field.
In this paper, using definability of types over indiscernible sequences as a template, we study a property of formulas and theories called \"uniform definability of types over finite sets\" (UDTFS). We explore UDTFS and show how it relates to well-known properties in model theory. We recall that stable theories and weakly o-minimal theories have UDTFS and UDTFS implies dependence. We then show that all dp-minimal theories have UDTFS.
We define the property of Pi_2-compactness of a statement phi of set theory, meaning roughly that the hard core of the impact of phi on combinatorics of aleph_1 can be isolated in a canonical model for the statement phi. We show that the following statements are Pi_2-compact: ``dominating number = aleph_1,   ``cofinality of the meager ideal = aleph_1  , ``cofinality of the null ideal = aleph_1  , existence of various types of Souslin trees and variations on uniformity of measure and category = aleph_1. Several important new metamathematical patterns among classical statements of set theory are pointed out.
According to Cantor, a set is a collection into a whole of defined and separate (we shall say distinct) objects. So, a natural question is ``How to treat as `sets  collections of indistinguishable objects?\". This is the aim of quasi-set theory, and this problem was posed as the first of present day mathematics, in the list resulting from the Congress on the Hilbert Problems in 1974. Despite this pure mathematical motivation, quasi-sets have also a strong commitment to the way quantum physics copes with elementary particles. In this paper, we discuss the axiomatics of quasi-set theory and sketch some of its applications in physics. We also show that quasi-set theory allows us a better and deeper understanding of the role of the concept of equality in mathematics.
In sparse light splitting all-optical WDM networks, the more destinations a light-tree can accommodate, the fewer light-trees andwavelengths amulticast session will require. In this article, a Hypo-Steiner light-tree algorithm (HSLT) is proposed to construct a HSLT light-tree to include as many destinations as possible. The upper bound cost of the light-trees built by HSLT is given as N(N -1)/2, where N is the number of nodes in the network. The analytical model proves that, under the same condition, more destinations could be held in a HSLT than a Member-Only (Zhang et al., J. Lightware Technol, 18(12), 1917-1927 2000.) light-tree. Extensive simulations not only validate the proof but also show that the proposed heuristic outperforms the existing multicast routing algorithms by a large margin in terms of link stress, throughput, and efficiency ofwavelength usage.
Many organizations have the mission of assessing the quality of broadband access services offered by Internet Service Providers (ISPs). They deploy network probes that periodically perform network measures towards selected Internet services. By analyzing the data collected by the probes it is often possible to gain a reasonable estimate of the bandwidth made available by the ISP. However, it is much more difficult to use such data to explain who is responsible of the fluctuations of other network qualities. This is especially true for latency, that is fundamental for several nowadays network services. On the other hand, there are many publicly accessible BGP routers that collect the history of routing changes and that are good candidates to be used for understanding if latency fluctuations depend on interdomain routing. In this paper we provide a methodology that, given a probe that is located inside the network of an ISP and that executes latency measures and given a set of publicly accessible BGP routers located inside the same ISP, decides which routers are best candidates (if any) for studying the relationship between variations of network performance recorded by the probe and interdomain routing changes. We validate the methodology with experimental studies based on data gathered by the RIPE NCC, an organization that is well-known to be independent and that publishes both BGP data within the Routing Information Service (RIS) and probe measurement data within the Atlas project.
Wireless sensor/actuator networks (WSANs) are emerging as a new generation of sensor networks. Serving as the backbone of control applications, WSANs will enable an unprecedented degree of distributed and mobile control. However, the unreliability of wireless communications and the real-time requirements of control applications raise great challenges for WSAN design. With emphasis on the reliability issue, this paper presents an application-level design methodology for WSANs in mobile control applications. The solution is generic in that it is independent of the underlying platforms, environment, control system models, and controller design. To capture the link quality characteristics in terms of packet loss rate, experiments are conducted on a real WSAN system. From the experimental observations, a simple yet efficient method is proposed to deal with unpredictable packet loss on actuator nodes. Trace-based simulations give promising results, which demonstrate the effectiveness of the proposed approach.
The Available Bit Rate (ABR) service in ATM networks has been specified to allow fair and efficient support of data applications over ATM utilizing capacity left over after servicing higher priority classes. One of the architectural features in the ABR specification [tm4] is the Virtual Source/Virtual Destination (VS/VD) option. This option allows a switch to divide an end-to-end ABR connection into separately controlled ABR segments by acting like a destination on one segment, and like a source on the other. The coupling in the VS/VD switch between the two ABR control segments is implementation specific. In this paper, we model a VS/VD ATM switch and study the issues in designing coupling between ABR segments. We identify a number of implementation options for the coupling. A good choice significantly improves the stability and transient performance of the system and reduces the buffer requirements at the switches.
MillimeterWave communications in the 60 GHz band are considered one of the key technologies for enabling multi-gigabit wireless access. However, the high propagation loss in such a band poses major obstacles to the optimal utilization of the wireless resources, where the problem of efficient client association to access points (APs) is of vital importance. In this paper, the client association in 60 GHz wireless access networks is investigated. The AP utilization and the quality of the rapidly vanishing communication links are the control parameters. Because of the tricky non-convex and combinatorial nature of the client association optimization problem, a novel solution method is developed to guarantee balanced and fair resource allocation. A new distributed, lightweight and easy to implement association algorithm, based on Lagrangian duality theory and subgradient methods, was proposed. It is shown that the algorithm is asymptotically optimal, that is, the relative duality gap diminishes to zero as the number of clients increases. Both theoretical and numerical results evince numerous useful properties of the algorithm, such as fast convergence, scalability, time efficiency, and fair execution in comparison to existing approaches. It is concluded that the proposed solution can be applied in the forthcoming 60 GHz wireless access networks.
Energy efficiency has gained its significance when service providers  operational costs burden with the rapidly growing data traffic demand in cellular networks. In this paper, we propose an energy efficiency model for Poisson-Voronoi tessellation (PVT) cellular networks considering spatial distributions of traffic load and power consumption. The spatial distributions of traffic load and power consumption are derived for a typical PVT cell, and can be directly extended to the whole PVT cellular network based on the Palm theory. Furthermore, the energy efficiency of PVT cellular networks is evaluated by taking into account traffic load characteristics, wireless channel effects and interference. Both numerical and Monte Carlo simulations are conducted to evaluate the performance of the energy efficiency model in PVT cellular networks. These simulation results demonstrate that there exist maximal limits for energy efficiency in PVT cellular networks for given wireless channel conditions and user intensity in a cell.
Three types of explicit estimators are proposed here to estimate the loss rates of the links in a network of the tree topology. All of them are derived by the maximum likelihood principle and proved to be either asymptotic unbiased or unbiased. In addition, a set of formulae are derived to compute the efficiencies and variances of the estimators that also cover some of the estimators proposed previously. The formulae unveil that the variance of the estimates obtained by a maximum likelihood estimator for the pass rate of the root link of a multicast tree is equal to the variance of the pass rate of the multicast tree divided by the pass rate of the tree connected to the root link. Using the formulae, we are able to evaluate the estimators proposed so far and select an estimator for a data set.
Satellite networks provide unique challenges that can restrict users  quality of service. For example, high packet erasure rates and large latencies can cause significant disruptions to applications such as video streaming or voice-over-IP. Network coding is one promising technique that has been shown to help improve performance, especially in these environments. However, implementing any form of network code can be challenging. This paper will use an example of a generation-based network code and a sliding-window network code to help highlight the benefits and drawbacks of using one over the other. In-order packet delivery delay, as well as network efficiency, will be used as metrics to help differentiate between the two approaches. Furthermore, lessoned learned during the course of our research will be provided in an attempt to help the reader understand when and where network coding provides its benefits.
This paper proposes a Traffic-Differentiated Two-Hop Routing protocol for Quality of Service (QoS) in Wireless Sensor Networks (WSNs). It targets WSN applications having different types of data traffic with several priorities. The protocol achieves to increase Packet Reception Ratio (PRR) and reduce end-to-end delay while considering multi-queue priority policy, two-hop neighborhood information, link reliability and power efficiency. The protocol is modular and utilizes effective methods for estimating the link metrics. Numerical results show that the proposed protocol is a feasible solution to addresses QoS service differenti- ation for traffic with different priorities.
Standard routing protocols for Low power and Lossy Networks are typically designed to optimize bottom-up data flows, by maintaining a cycle-free network topology. The advantage of such topologies is low memory footprint to store routing information (only the parent s address needs to me known by each node). The disadvantage is that other communication patterns, like top-down and bidirectional data flows, are not easily implemented. In this work we propose MHCL: IPv6 Multihop Host Configuration for Low-Power Wireless Networks. MHCL employs hierarchical address allocation that explores cycle-free network topologies and aims to enable top-down data communication with low message overhead and memory footprint. We evaluated the performance of MHCL both analytically and through simulations. We implemented MHCL as a subroutine of RPL protocol on Contiki OS and showed that it significantly improves top-down message delivery in RPL, while using a constant amount of memory (i.e., independent of network size) and being efficient in terms of setup time and number of control messages.
Mobile gaming presents a number of main issues which remain open. These are concerned mainly with connectivity, computational capacities, memory and battery constraints. In this paper, we discuss the design of a fully distributed approach for the support of mobile Multiplayer Online Games (MOGs). In mobile environments, several features might be exploited to enable resource sharing among multiple devices / game consoles owned by different mobile users. We show the advantages of trading computing / networking facilities among mobile players. This operation mode opens a wide number of interesting sharing scenarios, thus promoting the deployment of novel mobile online games. In particular, once mobile nodes make their resource available for the community, it becomes possible to distribute the software modules that compose the game engine. This allows to distribute the workload for the game advancement management. We claim that resource sharing is in unison with the idea of ludic activity that is behind MOGs. Hence, such schemes can be profitably employed in these contexts.
Communication protocols for mobile ad hoc networks (MANETs) follow either an Optimum Routing Approach (ORA) or the Least Overhead Routing Approach (LORA): With ORA, protocols tend to determine and use the optimal communication structure at every time instant; whereas with LORA, a protocol tends to use a chosen communication structure as long as it exists. In this paper, we study the impact of the ORA and LORA strategies on minimum hop routes and minimum connected dominating sets (MCDS) in MANETs. Our primary hypothesis is that the LORA strategy could yield routes with a larger time-averaged hop count and MCDS node size when compared to the minimum hop count of routes and the node size of the MCDS determined using the ORA strategy. Our secondary hypothesis is that the impact of ORA vs. LORA also depends on how long the communication structure is being used. Our hypotheses are evaluated using extensive simulations under diverse conditions of network density, node mobility and mobility models such as the Random Waypoint model, City Section model and the Manhattan model. In the case of minimum hop routes, which exist for relatively a much longer time compared to the MCDS, the hop count of routes maintained according to LORA, even though not dramatically high, is appreciably larger (6-12%) than those maintained according to ORA; on the other hand, the number of nodes constituting a MCDS maintained according to LORA is only at most 6% larger than the node size of a MCDS maintained under the ORA strategy.
Wireless sensor nodes along with Base Station (BS) constitute a Wireless Sensor Network (WSN). Nodes comprise of tiny power battery. Nodes sense the data and send it to BS. WSNs need protocol for efficient energy consumption of the network. In direct transmission and minimum transmission energy routing protocols, energy consumption is not well distributed. However, LEACH (Low-Energy Adaptive Clustering Hierarchy) is a clustering protocol; randomly selects the Cluster Heads (CHs) in each round. However, random selection of CHs does not guarantee efficient energy consumption of the network. Therefore, we proposed new clustering techniques in routing protocols, Location-aware Permanent CH (LPCH) and User Defined Location-aware Permanent CH (UDLPCH). In both protocols, network field is physically divided in to two regions, equal number of nodes are randomly deployed in each region. In LPCH, number of CHs are selected by LEACH algorithm in first round. However in UDLPCH, equal and optimum number of CHs are selected in each region, throughout the network life time number of CHs are remain same. Simulation results show that stability period and throughput of LPCH is greater than LEACH, stability period and throughput of UDLPCH is greater than LPCH.
Wireless Sensor Networks (WSNs) are composed of nodes that gather metrics like temperature, pollution or pressure from events generated by external entities. Localization in WSNs is paramount, given that the collected metrics must be related to the place of occurrence. This document presents an alternative way towards localization in randomly deployed WSNs based on the composability of localization protocols. Results show a totally distributed localization procedure that achieves a higher number of located nodes than the conventional, individual execution of localization protocols while maintaining the same low levels of battery consumption.
In recent years, smartphones have become prevalent. Much attention is being paid to developing and making use of mobile applications that require position information. The Global Positioning System (GPS) is a very popular localization technique used by these applications because of its high accuracy. However, GPS incurs an unacceptable energy consumption, which severely limits the use of smartphones and reduces the battery lifetime. Then an urgent requirement for these applications is a localization strategy that not only provides enough accurate position information to meet users  need but also consumes less energy. In this paper, we present an energy-efficient localization strategy for smartphone applications. On one hand, it can dynamically estimate the next localization time point to avoid unnecessary localization operations. On the other hand, it can also automatically select the energy-optimal localization method. We evaluate the strategy through a series of simulations. Experimental results show that it can significantly reduce the localization energy consumption of smartphones while ensuring a good satisfaction degree.
During the past few years, advances in mobile communication theory have enabled the development and deployment of different wireless technologies, complementary to each other. Hence, their integration can realize a unified wireless system that has the best features of the individual networks. Next-Generation Wireless Systems (NGWS) integrate different wireless systems, each of which is optimized for some specific services and coverage area to provide ubiquitous communications to the mobile users. In this paper, we propose to enhance the handoff performance of mobile IP in wireless IP networks by reducing the false handoff probability in the NGWS handoff management protocol. Based on the information of false handoff probability, we analyze its effect on mobile speed and handoff signaling delay.
In the context of ambient networks where each small device must trust its neighborhood rather than a fixed network, we propose in this paper a \\textit{trust management framework} inspired by known social patterns and based on the following statements: each mobile constructs itself a local level of trust what means that it does not accept recommendation by other peers, and the only relevant parameter, beyond some special cases discussed later, to evaluate the level of trust is the number of common trusted mobiles. These trusted mobiles are considered as entries in a local database called history for each device and we use identity-based cryptography to ensure strong security: history must be a non-tansferable object.
Transmission Control Protocol (TCP) is often preferred to be implemented at the transport layer of a Mobile Ad-hoc Network (MANET) because of its wide range of applications, which enjoys the advantage of reliable data transmission in the Internet. However, because of some unique characteristics of MANET, TCP cannot offer reliable services while using e-mail, internet search and file transmission in such a network. The research investigates how well the different versions of TCP respond to various performance differentials when subjected to different network stresses and topology changes, aside from identifying the most efficient and robust TCP version(s) for different MANET scenarios. Among several TCP variants, three types are considered important for the analysis, namely TCP Reno, TCP New Reno and TCP Selective Acknowledgment (SACK). In most cases, the TCP performance is found in our study to decrease when the node size and mobility rate is increased in the network. There is, however, exception to this. As our simulation results demonstrate, the increases in the node velocity sometimes help the TCP to attain a better performance. The study also reveals that out of the three variants, TCP SACK can adapt relatively well to the changing network sizes while TCP Reno performs most robustly in the presence of different mobility rates within MANET.
Virtual Content Delivery Network (vCDN) migration is necessary to optimize the use of resources and improve the performance of the overall SDN/NFV-based CDN function in terms of network operator cost reduction and high streaming quality. It requires intelligent and enticed joint SDN/NFV migration algorithms due to the evident huge amount of traffic to be delivered to end customers of the network. In this paper, two approaches for finding the optimal and near optimal path placement(s) and vCDN migration(s) are proposed (OPAC and HPAC). Moreover, several scenarios are considered to quantify the OPAC and HPAC behaviors and to compare their efficiency in terms of migration cost, migration time, vCDN replication number, and other cost factors. Then, they are implemented and evaluated under different network scales. Finally, the proposed algorithms are integrated in an SDN/NFV framework. Index Terms: vCDN; SDN/NFV Optimization; Migration Algorithms; Scalability Algorithms.
During the design of ABR traffic management at the ATM Forum, we performed several analyses to ensure that the ABR service will operate efficiently over satellite links. In the cases where the performance was unacceptable, we suggested modifications to the traffic management specifications. This paper describes one such issue related to the count of missing resource management cells (Crm) parameter of the ABR source behavior. The analysis presented here led to the changes which are now part of the ATM traffic management (TM 4.0) specification. In particular, the size of the transient buffer exposure (TBE) parameter was set to 24 bits, and no size was enforced for the Crm parameter. This simple change improved the throughput over OC-3 satellite links from 45 Mbps to 140 Mbps.
The aim of this technical report is to give a short overview of known techniques for network tomography (introduced in the paper of Vardi (1996)), extended by a Bayesian approach originating Tebaldi and West (1998). Since the studies of A.K. Erlang (1878-1929) on telephone networks in the last millennium, lots of needs are seen in todays applications of networks and network tomography, so for instance networks are a critical component of the information structure supporting finance, commerce and even civil and national defence. An attack on a network can be performed as an intrusion in the network or as sending a lot of fault information and disturbing the network flow. Such attacks can be detected by modelling the traffic flows in a network, by counting the source destination packets and even by measuring counts over time and by drawing a comparison with this  time series  for instance.
Vehicular communication requires vehicles to self-organize through the exchange of periodic beacons. Recent analysis on beaconing indicates that the standards for beaconing restrict the desired performance of vehicular applications. This situation can be attributed to the quality of the available transmission medium, persistent change in the traffic situation and the inability of standards to cope with application requirements. To this end, this paper is motivated by the classifications and capability evaluations of existing adaptive beaconing approaches. To begin with, we explore the anatomy and the performance requirements of beaconing. Then, the beaconing design is analyzed to introduce a design-based beaconing taxonomy. A survey of the state-of-the-art is conducted with an emphasis on the salient features of the beaconing approaches. We also evaluate the capabilities of beaconing approaches using several key parameters. A comparison among beaconing approaches is presented, which is based on the architectural and implementation characteristics. The paper concludes by discussing open challenges in the field.
This paper argues for the adoption of a information centric system model instead of the current service-oriented one. We present an architecture for a global information storage and dissemination network which provides for efficient interaction and coordination among autonomous actors through a shared information space. We believe that the resulting, loosely coupled systems, while probabilistic in nature, will lead to robust outcomes at large scales.
In sensor networks communication by broadcast methods involves many hazards, especially collision. Several MAC layer protocols have been proposed to resolve the problem of collision namely ARBP, where the best achieved success rate is 90%. We hereby propose a MAC protocol which achieves a greater success rate (Success rate is defined as the percentage of delivered packets at the source reaching the destination successfully) by reducing the number of collisions, but by trading off the average propagation delay of transmission. Our proposed protocols are also shown to be more energy efficient in terms of energy dissipation per message delivery, compared to the currently existing protocol.
In this paper the performance of INET s emulation mode is evaluated. In particular, the focus of the study is on the precision of the delay emulation. It is shown, that this precision is low in INET 2.6 (respectively a later version provided in the integration branch that fixed the crashes of 2.6 in emulation mode). Two errors in the implementation are identified and an alternative configuration for packet capturing is proposed. The performance tests are re-run with such a modified version of the real-time scheduler (which is now included in the recent INET 3.0 release) and it is shown that the responsiveness of the emulation mode and the precision of delay emulation are improved significantly. Finally, the negative impact of the modified capturing configuration is briefly analyzed. Packet loss in the capturing process has deteriorated but in fact is has already plagued the emulation mode of previous implementations and this topic clearly demands for further studies.
Push message delivery, where a client maintains an ``always-on   connection with a server in order to be notified of a (asynchronous) message arrival in real-time, is increasingly being used in Internet services. The key message in this paper is that push message delivery on the World Wide Web is not scalable for servers, intermediate network elements, and battery-operated mobile device clients. We present a measurement analysis of a commercially deployed WWW push email service to highlight some of these issues. Next, we suggest content-based optimization to reduce the always-on connection requirement of push messaging. Our idea is based on exploiting the periodic nature of human-to-human messaging. We show how machine learning can accurately model the times of a day or week when messages are least likely to arrive; and turn off always-on connections these times. We apply our approach to a real email data set and our experiments demonstrate that the number of hours of active always-on connections can be cut by half while still achieving real-time message delivery for up to 90% of all messages.
One of the emerging applications that belong to ambient systems is to transparently and directly interconnect vehicles on roads, making an ad hoc network that enables a variety of applications through distributed software without the need of any fixed and dedicated infrastructure. The network as well as the embedded computers and sensors in the vehicle will be invisible to the driver, who will get the required services during his journey. New type of ad hoc network is the Vehicular Ad hoc Network, in which vehicles constitute the mobile nodes in the network. Due to the prohibitive cost of deploying and implementing such as system in a real world, most research work in VANET relies on simulations for evaluation purpose. The key concept for VANET simulations is a real world vehicular mobility model which will ensures conclusions drawn from simulation experiments will carry through to real world deployments. In this paper we present a tool SUMO, MOVE that allows users to easily generate real world mobility models for VANET simulations. MOVE tool is built on top of SUMO which is open source micro traffic simulator. Output of MOVE is a real world mobility model and can used by NS-2 and Qual-net simulator. In this paper we evaluate and compare ad hoc routing performance for vehicular nodes using MOVE, which is using random way point model. The simulation results are obtained when nodes are moving according to a real world mobility model which is significantly different from that of the generally used random way point model.
Despite the tremendous success of BitTorrent, its swarming system suffers from a fundamental limitation: lower or no availability of unpopular contents. Recently, Menasche et al. has shown that bundling is a promising solution to mitigate this availability problem; it improves the availability and reduces download times for unpopular contents by combining multiple files into a single swarm. There also have been studies on bundling strategies and performance issues in bundled swarms. In spite of the recent surge of interest in the benefits of and strategies for bundling, there are still little empirical grounding for understanding, describing, and modeling it. This is the first empirical study that measures and analyzes how prevalent contents bundling is in BitTorrent and how peers access the bundled contents, in comparison to the other non-bundled (i.e., single-filed) ones. To our surprise, we found that around 70% of BitTorrent swarms contain multiple files, which indicate that bundling has become widespread for contents sharing. We also show that the amount of bytes shared in bundled swarms is estimated to be around 85% out of all the BitTorrent contents logged in our datasets. Inspired from our findings, we raise and discuss three important research questions in the field of file sharing systems as well as future contents-oriented networking: i) bundling strategies, ii) bundling-aware sharing systems in BitTorrent, and iii) implications on content-oriented networking.
Prioritized network entry is desirable for establishing preferential network connectivity for the higher priority users when different priority users exist over a given network. In line with such desirability, we propose a simple but efficient priority differentiated initial ranging mechanism considering an Orthogonal Frequency Division Multiple Access (OFDMA) based IEEE 802.16 network. In the proposed mechanism, we introduce an approach that integrates an explicit CDMA-ranging code reservation scheme with a Ranging Slot Selection Window (RSSW) differentiation scheme. Simulation results are provided to characterize the performance of the proposed mechanism.
By combining the features of CSMA and TDMA, fully decentralised WLAN MAC schemes have recently been proposed that converge to collision-free schedules. In this paper we describe a MAC with optimal long-run throughput that is almost decentralised. We then design two \\changed{schemes} that are practically realisable, decentralised approximations of this optimal scheme and operate with different amounts of sensing information. We achieve this by (1) introducing learning algorithms that can substantially speed up convergence to collision free operation; (2) developing a decentralised schedule length adaptation scheme that provides long-run fair (uniform) access to the medium while maintaining collision-free access for arbitrary numbers of stations.
In this paper, a deterministic channel model for vehicle-to-vehicle (V2V) communication, is compared against channel measurement data collected during a V2V channel measurement campaign using a channel sounder. Channel metrics such as channel gain, delay and Doppler spreads, eigenvalue decomposition and antenna correlations are derived from the ray tracing (RT) simulations as well as from the measurement data obtained from two different measurements in an urban four-way intersection scenario. The channel metrics are compared separately for line-of-sight (LOS) and non-LOS (NLOS) situation. Most power contributions arise from the LOS component (if present) as well as from multipaths with single bounce reflections. Measurement and simulation results show a very good agreement in the presence of LOS, as most of the received power is contributed from the LOS component. In NLOS, the difference is large because the ray tracer is unable to capture some of the multi bounced propagation paths that are present in the measurements. Despite the limitations of the ray-based propagation model identified in this work, the model is suitable to characterize the channel properties in a sufficient manner.
The main problem in designing DWDM transport networks is the wavelength assignment of light paths. One way of solving this problem is to use the algorithm BCO-RWA. However, BCO-RWA has the following disadvantages: algorithm not solved the problem of choosing the location of the optical convector in the network; base algorithm ignores placement optical convector during calculating route selecting probability; base algorithm do not take into account the nonlinear four-wave mixing phenomenon. In this paper we present an algorithm which takes into account a number of disadvantages due to modifications introduced in the algorithm.
We study a problem of scheduling real-time traffic with hard delay constraints in an unreliable wireless channel. Packets arrive at a constant rate to the network and have to be delivered within a fixed number of slots in a fading wireless channel. For an infrastructure mode of traffic with a centralized scheduler, we are interested in the long time average throughput achievable for the real time traffic. In [1], the authors have stud- ied the feasible throughput vectors by identifying the necessary and sufficient conditions using work load characterization. In our work, we provide a characterization of the feasible throughput vectors using the notion of the rate region. We then discuss an extension to the network model studied in [1] by allowing multiple access during contention and propose an enhancement to the rate region of the wireless network. We characterize the feasible throughput vectors with the multiple access technique and study throughput optimal and utility maximizing strategies for the network scenario. Using simulations, we evaluate the performance of the proposed strategy and discuss its advantages.
Recent FCC regulations on TV white spaces allow geo-location databases to be the sole source of spectrum information for White Space Devices (WSDs). Geo-location databases protect TV band incumbents by keeping track of TV transmitters and their protected service areas based on their location, transmission parameters and sophisticated propagation models. In this article, we argue that keeping track of both TV transmitters and TV receivers (i.e. TV sets) can achieve significant improvement in the availability of white spaces. We first identify wasted spectrum opportunities, both temporal and spatial, due to the current approach of white spaces detection. We then propose DynaWhite, a cloud-based architecture that orchestrates the detection and dissemination of highly-dynamic, real-time, and fine-grained TV white space information. DynaWhite introduces the next generation of geo-location databases by combining traditional sensing techniques with a novel unconventional sensing approach based on the detection of the passive TV receivers using standard cell phones. We present a quantitative evaluation of the potential gains in white space availability for large scale deployments of DynaWhite. We finally identify challenges that need to be addressed in the research community in order to exploit this potential for leveraging dynamic real-time fine-grained TV white spaces.
Software-Defined Networking enables the centralized orchestration of data traffic within a network. However, proposed solutions require a high degree of architectural penetration. The present study targets the orchestration of network elements that do not wish to yield much of their internal operations to an external controller. Backpressure routing principles are used for deriving flow routing rules that optimally stabilize a network, while maximizing its throughput. The elements can then accept in full, partially or reject the proposed routing rule-set. The proposed scheme requires minimal, relatively infrequent interaction with a controller, limiting its imposed workload, promoting scalability. The proposed scheme exhibits attracting network performance gains, as demonstrated by extensive simulations and proven via mathematical analysis.
In this work we consider the problem of an optimal geographic placement of content in wireless cellular networks modelled by Poisson point processes. Specifically, for the typical user requesting some particular content and whose popularity follows a given law (e.g. Zipf), we calculate the probability of finding the content cached in one of the base stations. Wireless coverage follows the usual signal-to-interference-and noise ratio (SINR) model, or some variants of it. We formulate and solve the problem of an optimal randomized content placement policy, to maximize the user s hit probability. The result dictates that it is not always optimal to follow the standard policy \"cache the most popular content, everywhere\". In fact, our numerical results regarding three different coverage scenarios, show that the optimal policy significantly increases the chances of hit under high-coverage regime, i.e., when the probabilities of coverage by more than just one station are high enough.
Multicast is a central challenge for emerging multi-hop wireless architectures such as wireless mesh networks, because of its substantial cost in terms of bandwidth. In this report, we study one specific case of multicast: broadcasting, sending data from one source to all nodes, in a multi-hop wireless network. The broadcast we focus on is based on network coding, a promising avenue for reducing cost; previous work of ours showed that the performance of network coding with simple heuristics is asymptotically optimal: each transmission is beneficial to nearly every receiver. This is for homogenous and large networks of the plan. But for small, sparse or for inhomogeneous networks, some additional heuristics are required. This report proposes such additional new heuristics (for selecting rates) for broadcasting with network coding. Our heuristics are intended to use only simple local topology information. We detail the logic of the heuristics, and with experimental results, we illustrate the behavior of the heuristics, and demonstrate their excellent performance.
Coordinated multi-point (CoMP) transmission has been widely recognized as a spectrally efficient technique in future cellular systems. To exploit the abundant patial resources provided by the cooperating base stations, however, considerable training overhead is required to acquire the channel information. To avoid the extra overhead outweighing the cooperative gain, we propose a method that allows each user to select transmission mode between coherent CoMP and Non-CoMP. We first analyze the average throughput of each user under CoMP and Non-CoMP transmission after taking into account the downlink training overhead. A closed-form mode selection rule is then developed, which depends on the user location and system settings, i.e, the number of cooperating base stations and transmit antennas, training overhead and cell-edge signal to noise ratio. Simulation results show that the proposed downlink transmission mode selection method achieves higher throughput than CoMP for cell-center users and than Non-CoMP for cell-edge users after accounting for the overhead. As a by-product, the backhaul load is also reduced significantly.
The continuing expansion of Internet media consumption has increased traffic volumes, and hence congestion, on access links. In response, both mobile and wireline ISPs must either increase capacity or perform traffic engineering over existing resources. Unfortunately, provisioning timescales are long, the process is costly, and single-homing means operators cannot balance across the last mile. Inspired by energy and transport networks, we propose demand-side management of users to reduce the impact caused by consumption patterns out-pacing that of edge network provision. By directly affecting user behaviour through a range of incentives, our techniques enable resource management over shorter timescales than is possible in conventional networks. Using survey data from 100 participants we explore the feasibility of introducing the principles of demand-side management in today s networks.
In this paper, the topology dynamic of Gnutella is studied through phase space. The dynamic changes in peer degree are studied as a time series in two dimensional phase space which is defined as the number of connected leaves and the number of connected ultras. The reported degrees are concentrated in three special Software related regions that we named as Ultra Stable Region, Leaf Stable Region and Transition Belt. A method is proposed to classify degree traces in phase space into different classes. Connection churn then is studied along with the churn in degree. It shows that the topological structure of Gnutella is rather stable in its connection degree but not the topology itself. The connection drop rate is estimated and the live time of connections is inferred afterwards. M/M/m/m loss queue system is introduced to model the degree keeping process in Gnutella. This model revealed that the degree stable is ensured by large new connection efforts. In other words the stable in topological structure of Gnutella is a results of essential unstable in its topology. That opens a challenge to the basic design philosophy of this network.
Network congestion has become a critical issue for resource constrained Wireless Sensor Networks (WSNs), especially for Wireless Multimedia Sensor Networks (WMSNs)where large volume of multimedia data is transmitted through the network. If the traffic load is greater than the available capacity of the sensor network, congestion occurs and it causes buffer overflow, packet drop, deterioration of network throughput and quality of service (QoS). Again, the faulty nodes of the network also aggravate congestion by diffusing useless packets or retransmitting the same packet several times. This results in the wastage of energy and decrease in network lifetime. To address this challenge, a new congestion control algorithm is proposed in which the faulty nodes are identified and blocked from data communication by using the concept of trust. The trust metric of all the nodes in the WMSN is derived by using a two-stage Fuzzy inferencing scheme. The traffic flow from source to sink is optimized by implementing the Link State Routing Protocol. The congestion of the sensor nodes is controlled by regulating the rate of traffic flow on the basis of the priority of the traffic. Finally we compare our protocol with other existing congestion control protocols to show the merit of the work.
Programmability and verifiability lie at the heart of the software-defined networking paradigm. While OpenFlow and its match-action concept provide primitive operations to manipulate hardware configurations, over the last years, several more expressive network programming languages have been developed. This paper presents WNetKAT, the first network programming language accounting for the fact that networks are inherently weighted, and communications subject to capacity constraints (e.g., in terms of bandwidth) and costs (e.g., latency or monetary costs). WNetKAT is based on a syntactic and semantic extension of the NetKAT algebra. We demonstrate several relevant applications for WNetKAT, including cost- and capacity-aware reachability, as well as quality-of-service and fairness aspects. These applications do not only apply to classic, splittable and unsplittable (s; t)-flows, but also generalize to more complex network functions and service chains. For example, WNetKAT allows to model flows which need to traverse certain waypoint functions, which may change the traffic rate. This paper also shows the relation between the equivalence problem of WNetKAT and the equivalence problem of the weighted finite automata, which implies undecidability of the former. However, this paper also succeeds to prove the decidability of another useful problem, which is sufficient in many practical scnearios: whether an expression equals to 0. Moreover, we initiate the discussion of decidable subsets of the whole language.
We analyze TCP-controlled bulk file transfers in a single station (STA) WLAN with nonzero propagation delay between the file server and the WLAN. Our approach is to model the flow of packets as a closed queueing network (BCMP network) with 3 service centres, one each for the Access Point (AP) and the STA, and the third for the propagation delay. The service rates of the first two are obtained by analyzing the WLAN MAC. Simulations show a very close match with the theory.
In this paper, we introduce a new networking architecture called Group Centric Networking (GCN), which is designed to support the large number of devices expected with the emergence of the Internet of Things. GCN is designed to enable these devices to operate collaboratively in a highly efficient and resilient fashion, while not sacrificing their ability to communicate with one another. We do a full protocol implementation of GCN in NS3, and demonstrate that GCN utilizes up to an order of magnitude fewer network resources than traditional wireless networking schemes, while providing high connectivity and reliability.
The aim of this paper is a theoretical study of a cache system in order to optimize proxy cache systems and to modernize construction principles including prefetching schemes. Two types of correlations, Zipf-like distribution and normalizing conditions, play a role of the fundamental laws. A corresponding system of equations allows to describe the basic effects like ratio between construction parts, steady-state performance, optimal size, long-term prefetching, etc. A modification of the fundamental laws leads to the description of new effects of documents  renewal in the global network. An internet traffic caching system based on Zipf-like distribution (ZBS) is invented. The additional module to the cache construction gives an effective prefetching by lifetime.
The femtocaching idea was proposed as a solution to compensate for the weak backhaul capacity, by deploying coverage-limited nodes with high storage capacity called femtocaches (FCs). In this paper, the macrocell offloading problem in femtocaching-assisted cellular networks is investigated. The objective is to minimize the number of transmissions by the macrocell base station (MBS) given that all requests should be served simultaneously to satisfy quality-of-experience (QoE) of the clients. We first formulate this MBS offloading problem as an optimization problem over a network coding graph, and show that it is NP-hard. Therefore, we propose an ONC-broadcast offloading scheme that exploits both broadcasting and opportunistic network coding (ONC) to minimize the number of required MBS transmissions. We utilize a random graph model to approximate the performance of the proposed ONC-broadcast scheme in terms of the resultant average number of transmissions by the MBS. Moreover, despite the complexity of finding the optimal solution for each and every case, we prove that this ONC-broadcast scheme is asymptotically optimal, i.e., for large number of requests, the ONC-broadcast scheme achieves a similar macrocell offloading performance to that of the optimal solution. To implement the ONC-broadcast scheme, we devise a heuristic that employs a dual conflict graph or broadcasting at the FCs such that the remaining requests can be served using the minimum number of transmissions at the MBS. Simulations show that the dual graph scheme improves MBS offloading as compared to the traditional separate graph scheme. Furthermore, the simple heuristic proposed to implement the ONC-broadcast scheme achieves a very close performance to the optimal ONC-broadcast scheme.
License Assisted Access (LAA) LTE (LTE-LAA) is a new type of LTE that aggregates the licensed LTE bands with the unlicensed bands via carrier aggregation. To operate in unlicensed bands, LTE-LAA adopts the listen-before-talk policy and designs its channel access mechanism similar to WLAN s DCF. In this paper, we consider an LAA network consisting of an LTE-LAA eNB coexisting with a Wi-Fi STA, and capture the {\\em asymmetric hidden terminal problem} where the eNB recognizes the STA while the opposite is not true, which is caused by the asymmetric CCA thresholds between them. We model the network as a joint Markov chain (MC) consisting of two individual MCs, and derive its steady-state probabilities, throughput, and channel access delay along with other key metrics like transmit, busy, collision, and doubling probabilities. Through extensive evaluation, we confirm that the proposed model well predicts the dynamics of the LAA network, and identify important design guidelines for fair coexistence between LTE-LAA and WLAN as follows. First, LTE-LAA should design its contention window (CW) doubling policy by considering Wi-Fi s packet duration and subframe-dependent collision probabilities. Second, there exists a tradeoff between throughput and channel access delay, according to which the CW doubling policy should be adapted.
Link failures in wide area networks are common and cause significant data losses. Mesh-based protection schemes offer high capacity efficiency but they are slow and require complex signaling. Additionally, real-time reconfiguration of a cross-connect threatens their transmission integrity. On the other hand, coding-based protection schemes are proactive. Therefore, they have higher restoration speed, lower signaling complexity, and higher transmission integrity. This paper introduces a coding-based protection scheme, named Coded Path Protection (CPP). In CPP, a backup copy of the primary data is encoded with other data streams, resulting in capacity savings. This paper presents an optimal and simple capacity placement and coding group formation algorithm. The algorithm converts the sharing structure of any solution of a Shared Path Protection (SPP) technique into a coding structure with minimum extra capacity. We conducted quantitative and qualitative comparisons of our technique with the SPP and, another technique, known as p-cycle protection. Simulation results confirm that the CPP is significantly faster than the SPP and p-cycle techniques. CPP incurs marginal extra capacity on top of SPP. Its capacity efficiency is lower than the p-cycle technique for dense networks but can be higher for sparse networks. In addition, unlike p-cycle protection, CPP is inherently suitable for the wavelength continuity constraint in optical networks.
In the last years, the advancements in signal processing and integrated circuits technology allowed several research groups to develop working prototypes of in-band full-duplex wireless systems. The introduction of such a revolutionary concept is promising in terms of increasing network performance, but at the same time poses several new challenges, especially at the MAC layer. Consequently, innovative channel access strategies are needed to exploit the opportunities provided by full-duplex while dealing with the increased complexity derived from its adoption. In this direction, this paper proposes the design of a MAC layer scheme for full-duplex ad hoc wireless networks, based on the idea of time-frequency channel contention. According to this approach, different OFDM subcarriers are used to coordinate nodes access to the shared medium. The proposed scheme leads to efficient transmission scheduling with the result of avoiding collisions and exploiting full-duplex opportunities. The considerable performance improvements with respect to standard and state-of-the-art MAC protocols for wireless networks are highlighted through both theoretical analysis and network simulations.
A TCP trunk is an IP tunnel under TCP control, capable of carrying packets from any number of user flows. By exploiting properties of TCP, a TCP trunk provides elastic and reliable transmission over a network, and automatically shares the network fairly with other competing trunks. Moreover, by aggregating user flows into a single trunk flow, TCP trunking can significantly reduce the number of flows that the network needs to manage, thereby allowing use of simplified management to achieve improved perfor mance. For example, when dealing with only a small number of TCP trunk flows, a router with a simple FIFO buffer can experience low packet loss rates. A TCP trunk is a \"soft\" circuit in the sense that it requires no flow states to be maintained inside the network. Setting up a TCP trunk involves only configuring the two end nodes. This is in contrast with traditional methods of configuring circuits via signaling of network nodes. A simple packet-dropping mechanism based on packet accounting at the transmitter of a TCP trunk assures that, when the trunk reduces its bandwidth in response to network congestion, user TCP flows carried by the trunk will reduce their bandwidths by the same proportion. Simu lation results have demonstrated that TCP trunks can provide improved network performance to users, while achieving high network utilization.
We propose using the predictability of human motion to eliminate the overhead of distributed location services in human-carried MANETs, dubbing the technique location profile routing. This method outperforms the Geographic Hashing Location Service when nodes change locations 2x more frequently than they initiate connections (e.g., start new TCP streams), as in applications like text- and instant-messaging. Prior characterizations of human mobility are used to show that location profile routing achieves a 93% delivery ratio with a 1.75x first-packet latency increase relative to an oracle location service.
Barrier coverage is a critical issue in wireless sensor networks for many practical applications,e.g., national border monitoring, security surveillance and intruder detection, etc. Its aim is to detect intruders that attempt to cross the protected region. In this paper, we study how to efficiently improve barrier coverage using mobile camera sensors, where camera sensors are deployed by a grid-based strategy.
Several approaches can be employed to counter pervasive monitoring at large scale on the Internet. One category of approaches aims to harden the current Internet architecture and to increase the security of high profile targets (data centers, exchange points etc.). Another category of approaches aims instead for target dispersal, i.e. disabling systematic mass surveillance via the elimination of existing vantage points, thus forcing surveillance efforts to be more specific and personalized. This paper argues how networking approaches that do not rely on central entities -- but rather on spontaneous interaction, as locally as possible, between autonomous peer entities -- can help realize target dispersal and thus counter pervasive monitoring.
Many sensor applications are interested in computing a function over measurements (e.g., sum, average, max) as opposed to collecting all sensor data. Today, such data aggregation is done in a cluster-head. Sensor nodes transmit their values sequentially to a cluster-head node, which calculates the aggregation function and forwards it to the base station. In contrast, this paper explores the possibility of computing a desired function over the air. We devise a solution that enables sensors to transmit coherently over the wireless medium so that the cluster-head directly receives the value of the desired function. We present analysis and preliminary results that demonstrate that such a design yield a large improvement in network throughput.
An infrastructure network is a self-organizing network which uses Access Point (AP) of wireless links that connecting one node with another. These nodes can communicate without using ad hoc, instead these nodes form an arbitrary topology (BSS/ESS) in which these nodes play the role of routers. Though the efficiency of Infrastructure networks is high, they are highly vulnerable to security attacks. Detecting/Preventing these attacks over the network is highly challenging task. Many solutions are proposed to provide authentication, confidentiality, availability, secure routing and intrusion avoidance in infrastructure networks. Providing security in such dynamically changing networks is a hard task. Characteristic of infrastructure network should also be taken into consideration in order to design efficient solutions. In this study, we focus on efficiently increasing the flow transmission confidentiality in infrastructure networks based on multi-path routing. In order to increase confidentiality of transmitted data, we take advantage of the existence of multiple paths between nodes in an infrastructure network with the help of Access Point. In this approach the original data is split into package and are forwarded through access point. The encrypted packets are then forwarded in different disjoint paths that exist between sender and receiver. Even if an attacker succeeds to obtain one or more transmitted packets, the probability of reconstructing the original message is very low.
The topic of this paper is the evaluation of QoS parameters in live Pre-Wimax environments. The main contribution is the validation of an analytical delay-jitter behavior model. These models can be used in optimization algorithms in order to provide opportunistic and reliable all-IP networks. It allows understanding the impact of the jitter constraints on the throughput and packet loss in wireless systems. However, we show that the real-time QoS requirements of real-time and interactive services can be avoided to a large degree by controlling only the packet delay-jitter in a fixed and mobile environment. The QoS metrics have been computed from live measurements in a Pre-Wimax realistic environment (Toulouse/Blagnac Airport).
We study joint spectrum allocation and user association in heterogeneous cellular networks with multiple tiers of base stations. A stochastic geometric approach is applied as the basis to derive the average downlink user data rate in a closed-form expression. Then, the expression is employed as the objective function in jointly optimizing spectrum allocation and user association, which is of non-convex programming in nature. A computationally efficient Structured Spectrum Allocation and User Association (SSAUA) approach is proposed, solving the optimization problem optimally when the density of users is low, and near-optimally with a guaranteed performance bound when the density of users is high. A Surcharge Pricing Scheme (SPS) is also presented, such that the designed association bias values can be achieved in Nash equilibrium. Simulations and numerical studies are conducted to validate the accuracy and efficiency of the proposed SSAUA approach and SPS.
Integrating time-frequency resource conversion (TFRC), a new network resource allocation strategy, with call admission control can not only increase the cell capacity but also reduce network congestion effectively. However, the optimal setting of TFRC-oriented call admission control suffers from the curse of dimensionality, due to Markov chain-based optimization in a high-dimensional space. To address the scalability issue of TFRC, in [1] we extend the study of TFRC into the area of scheduling. Specifically, we study downlink scheduling based on TFRC for an LTE-type cellular network, to maximize service delivery. The service scheduling of interest is formulated as a joint request, channel and slot allocation problem which is NP-hard. An offline deflation and sequential fixing based algorithm (named DSFRB) with only polynomial-time complexity is proposed to solve the problem. For practical online implementation, two TFRC-enabled low-complexity algorithms, modified Smith ratio algorithm (named MSR) and modified exponential capacity algorithm (named MEC), are proposed as well. In this report, we present detailed numerical results of the proposed offline and online algorithms, which not only show the effectiveness of the proposed algorithms but also corroborate the advantages of the proposed TFRC-based schedule techniques in terms of quality-of-service (QoS) provisioning for each user and revenue improvement for a service operator.
One challenge in understanding the evolution of Internet infrastructure is the lack of systematic mechanisms for monitoring the extent to which allocated IP addresses are actually used. In this paper we try to advance the science of inferring IPv4 address space utilization by analyzing and correlating results obtained through different types of measurements. We have previously studied an approach based on passive measurements that can reveal used portions of the address space unseen by active approaches. In this paper, we study such passive approaches in detail, extending our methodology to four different types of vantage points, identifying traffic components that most significantly contribute to discovering used IPv4 network blocks. We then combine the results we obtained through passive measurements together with data from active measurement studies, as well as measurements from BGP and additional datasets available to researchers. Through the analysis of this large collection of heterogeneous datasets, we substantially improve the state of the art in terms of: (i) understanding the challenges and opportunities in using passive and active techniques to study address utilization; and (ii) knowledge of the utilization of the IPv4 space.
Design of control applications over wireless sensor networks (WSNs) is a challenging issue due to the bandwidth-limited communication medium, energy constraints and real-time data delivery requirements. This paper introduces a new information extraction method for WSN-based control applications, which reduces the number of required data transmissions to save energy and avoid data congestion. According to the proposed approach, control applications recognize when new data readings have to be collected and determine sensor nodes that have to be activated on the basis of uncertainty analysis. Processing of the selectively collected input data is based on definition of information granules that describe state of the controlled system as well as performance of particular control decisions. This method was implemented for object tracking in WSNs. The task is to control movement of a mobile sink, which has to reach a target in the shortest possible time. Extensive simulation experiments were performed to compare performance of the proposed approach against state-of-the-art methods. Results of the experiments show that the presented information extraction method allows for substantial reduction in the amount of transmitted data with no significant negative effect on tracking performance.
Sensor nodes are low cost, low power devices that are used to collect physical data and monitor environmental conditions from remote locations. Wireless Sensor Networks(WSN) are collection of sensor nodes, coordinating among themselves to perform a particular task. Localization is defined as the deployment of the sensor nodes at known locations in the network. Localization techniques are classified as Centralized and Distributed. MDS-Map and SDP are some of the centralized algorithms while Diffusion, Gradient,APIT, Bounding Box, Relaxation-Based and Coordinate System Stitching come under Distributed algorithms. In this paper, we propose a new hybrid localization technique, which combines the advantages of the centralized and distributed algorithms and overcomes some of the drawbacks of the existing techniques. Simulations done with J-Sim prove advantage of the proposed scheme in terms of localization error calculated by varying the sink nodes, increasing node density and increasing communication range.
Stochastic network calculus is an evolving theory which accounts for statistical multiplexing and uses an envelope approach for probabilistic delay and backlog analysis of networks. One of the key ideas of stochastic network calculus is the possibility to describe service offered at network node as a stochastic service envelope, which in turn can be used to describe the stochastic service available in a network of nodes and determine end-to-end probabilistic delay and backlog bounds. This paper introduces a new definition of stochastic service envelopes which yield a simple network service envelope and tighter end-to-end performance bounds. It is shown for ($\\sigma(\\theta), \\rho(\\theta)$) - constrained traffic model that the end-to-end performance measures computed using the new stochastic network service envelope are tight in comparison to the ones obtained using the existing start-of-the-art definition of statistical network service envelope and are bounded by ${\\cal O}(H \\log{H})$, where $H$ is the number of nodes traversed by the arrival traffic.
Epidemics-inspired techniques have received huge attention in recent years from the distributed systems and networking communities. These algorithms and protocols rely on probabilistic message replication and redundancy to ensure reliable communication. Moreover, they have been successfully exploited to support group communication in distributed systems, broadcasting, multicasting and information dissemination in fixed and mobile networks. However, in most of the existing work, the probability of infection is determined heuristically, without relying on any analytical model. This often leads to unnecessarily high transmission overheads. In this paper we show that models of epidemic spreading in complex networks can be applied to the problem of tuning and controlling the dissemination of information in wireless ad hoc networks composed of devices carried by individuals, i.e., human-based networks. The novelty of our idea resides in the evaluation and exploitation of the structure of the underlying human network for the automatic tuning of the dissemination process in order to improve the protocol performance. We evaluate the results using synthetic mobility models and real human contacts traces.
Wireless sensor networks (WSNs) are commonly used in various ubiquitous and pervasive applications. Due to limited power resources, the optimal dynamic base station (BS) replacement could be Prolong the sensor network lifetime. In this paper we ll present a dynamic optimum method for base station replacement so that can save energy in sensors and increases network lifetime. Because positioning problem is a NPhard problem [1], therefore we ll use genetic algorithm to solve positioning problem. We ve considered energy and distance parameters for finding BS optimized position. In our represented algorithm base station position is fixed just during each round and its positioning is done at the start of next round then it ll be placed in optimized position. Evaluating our proposed algorithm, we ll execute DBSR algorithm on LEACH & HEED Protocols.
Reduced energy consumption in sensor nodes is one of the major challenges in Wireless Sensor Networks (WSNs) deployment. In this regard, Error Control Coding (ECC) is one of techniques used for energy optimization in WSNs. Similarly, critical distance is another term being used for energy efficiency, when used with ECC provides better results of energy saving. In this paper three different critical distance values are used against different coding gains for sake of energy saving. If distance lies below critical distance values then particular encoders are selected with respect to their particular coding gains. Coding gains are used for critical distances estimation of all encoders. This adaptive encoder and transmit power selection scheme with respect to their coding gain results in a significant energy saving in WSNs environment. Simulations provide better results of energy saving achieved by using this adaptive scheme.
Distributed Denial of Service (DDoS) is one of the most prevalent attacks that an organizational network infrastructure comes across nowadays. We propose a deep learning based multi-vector DDoS detection system in a software-defined network (SDN) environment. SDN provides flexibility to program network devices for different objectives and eliminates the need for third-party vendor-specific hardware. We implement our system as a network application on top of an SDN controller. We use deep learning for feature reduction of a large set of features derived from network traffic headers. We evaluate our system based on different performance metrics by applying it on traffic traces collected from different scenarios. We observe high accuracy with a low false-positive for attack detection in our proposed system.
Device-to-device (D2D) communications as an underlay of a LTE-A (4G) network can reduce the traffic load as well as power consumption in cellular networks by way of utilizing peer-to-peer links for users in proximity of each other. This would enable other cellular users to increment their traffic, and the aggregate traffic for all users can be significantly increased without requiring additional spectrum. However, D2D communications may increase interference to cellular users (CUs) and force CUs to increase their transmit power levels in order to maintain their required quality-of-service (QoS). This paper proposes an energy-efficient resource allocation scheme for D2D communications as an underlay of a fully loaded LTE-A (4G) cellular network. Simulations show that the proposed scheme allocates cellular uplink resources (transmit power and channel) to D2D pairs while maintaining the required QoS for D2D and cellular users and minimizing the total uplink transmit power for all users.
In this paper we examine the problem of designing and allocating transmission sequences to users in a mobile ad hoc network that has no spatial boundary. A basic tenet of the transmission sequence approach for addressing media access control is that under normal operating conditions, there is no feedback triggered re-transmission. This obviously is a major departure from the Slotted-ALOHA or CSMA type approaches. While these solutions enjoy excellent throughput performance, a fundamental drawback is that they are based on feedback information. For systems without naturally defined central controller that can play the role of a base station, the task of providing feedback information could easily become unmanageable. This highlights the advantage of the feedback-free approach. A second advantage is the ability to handle unlimited spatial coverage. We propose in this paper a concept for media access control that is akin to frequency reuse. However, instead of reusing frequency, the new approach allows transmission sequences be reused. A study of the transmission sequence approach against other approaches is conducted by comparing the minimal frame lengths that can guarantee the existence of conflict-free transmissions.
With the introduction of various hardware/software technologies such as Cloud Technologies or Virtualization technologies, there has been a great potential to reuse ICT artifacts thanks to Abstraction and also Exchangeability features achieved via these technologies. These technologies also provide various advantages with respect to sustainability including resource consumption reduction (in the use phase only or in the whole life cycle). However, there is an additional but untapped potential associated with the anonymization of resources introduced by both abstraction and exchangeability features. By realizing on this potential, we can improve cloud solutions and reduce their by-product opacity, which usually prevents leveraging on the specialized but tweakable (i.e., nonessential modifications without changing the main function) features of components that are captured in the component models. This is especially a challenge in the case heterogeneous/disaggregated infrastructure where developing models to cover everything is practically impossible. In this work, by leveraging on the concept of pathways, we develop a few mechanisms that enable transparency and therefore tweakability of features even in the presence of abstraction and heterogeneity. In particular, the layered-stack approach to system decomposition is considered because of its role in both software defined networking (SDN) and Network Function Virtualization (NFV) system decompositions. For a concrete example, the case of dynamic frequency scaling of processors is considered and it is shown that the associated consumption could be considerably reduced without requiring additional changes to the middle components.
We study routing for massively dense wireless networks, i.e., wireless networks that contain so many nodes that, in addition to their usual microscopic description, a novel macroscopic description becomes possible. The macroscopic description is not detailed, but nevertheless contains enough information to permit a meaningful study and performance optimization of the network. Within this context, we continue and significantly expand previous work on the analogy between optimal routing and the propagation of light according to the laws of Geometrical Optics. Firstly, we pose the analogy in a more general framework than previously, notably showing how the eikonal equation, which is the central equation of Geometrical Optics, also appears in the networking context. Secondly, we develop a methodology for calculating the cost function, which is the function describing the network at the macroscopic level. We apply this methodology for two important types of networks: bandwidth limited and energy limited.
We consider a set of primary channels that operate in an unslotted fashion, switching activity at random times. A secondary user senses the primary channels searching for transmission opportunities. If a channel is sensed to be free, the secondary terminal transmits, and if sensed to be busy, the secondary transmitter remains silent.We solve the problem of determining the optimal time after which a primary channel needs to be sensed again depending on the sensing outcome. The objective is to find the inter-sensing times such that the mean secondary throughput is maximized while imposing a constraint over the maximum tolerable interference inflicted on the primary network. Our numerical results show that by optimizing the sensing-dependent inter-sensing times, our proposed scheme reduces the impact of sensing errors caused by false alarm and misdetection and outperforms the case of a single sensing period.
Sensor Networks produce a large amount of data. According to the needs this data requires to be processed, delivered and accessed. This processed data when made available with the physical device location, user preferences, time constraints; generically called as context-awareness; is widely referred to as the core function for ubiquitous systems. To our best knowledge there is lack of analysis of context information fusion for ubiquitous sensor networks. Adopting appropriate information fusion techniques can help in screening noisy measurements, control data in the network and take necessary inferences that can help in contextual computing. In this paper we try and explore different context information fusion techniques by comparing a large number of solutions, their methods, architectures and models.
Energy efficient mobility management is an important problem in modern wireless networks with heterogeneous cell sizes and increased nodes densities. We show that optimization-based mobility protocols cannot achieve long-term optimal energy consumption, particularly for ultra-dense networks (UDN). To address the complex dynamics of UDN, we propose a non-stochastic online-learning approach which does not make any assumption on the statistical behavior of the small base station (SBS) activities. In addition, we introduce handover cost to the overall energy consumption, which forces the resulting solution to explicitly minimize frequent handovers. The proposed Batched Randomization with Exponential Weighting (BREW) algorithm relies on batching to explore in bulk, and hence reduces unnecessary handovers. We prove that the regret of BREW is sublinear in time, thus guaranteeing its convergence to the optimal SBS selection. We further study the robustness of the BREW algorithm to delayed or missing feedback. Moreover, we study the setting where SBSs can be dynamically turned on and off. We prove that sublinear regret is impossible with respect to arbitrary SBS on/off, and then develop a novel learning strategy, called ranking expert (RE), that simultaneously takes into account the handover cost and the availability of SBS. To address the high complexity of RE, we propose a contextual ranking expert (CRE) algorithm that only assigns experts in a given context. Rigorous regret bounds are proved for both RE and CRE with respect to the best expert. Simulations show that not only do the proposed mobility algorithms greatly reduce the system energy consumption, but they are also robust to various dynamics which are common in practical ultra-dense wireless networks.
We address the problem of localising a mobile terminal (\"blind\" node) in unknown position from a set of \"anchor\" nodes in known positions. The proposed method does not require any form of node synchronisation nor measurement (or control) of the transmission times, which is difficult or anyway costly to achieve in practice. It relies exclusively on reception timestamps collected by the anchor nodes, according to their local clocks, that overhear packets transmitted by the blind node and by (at least one) other transmitting node(s) in known position, e.g., other anchors. The clock differences between the nodes are not eliminated ex ante through clock synchronisation, as in traditional ToA and TDoA methods. Instead, they are counteracted ex post, during the data processing stage, leveraging the data redundancy that is intrinsic to the multiple reception of the same packet by different (anchor) nodes. We validate the proposed method in different experimental settings, indoor and outdoor, using exclusively low-cost Commercial-Off-The-Shelf WiFi devices, achieving sub-meter accuracy in full Line-of-Sight conditions and meter-level accuracy in mild Non-line-of-sight environment. The proposed method does not require that the blind node participate actively to the localisation procedure and can use \"opportunistically\" any legacy signal or packet available over-the-air for communication purposes. Considering the very minimal requirement on the system - basically, only that anchors in known positions are able to collect and share reception timestamps - the proposed approach can enable practical adoption of opportunistic and/or cooperative localisation on top of existing radio communication systems.
In this paper correspondence between experimental data for packet delay and two theoretical types of distribution is investigated. Statistical tests have shown that only exponential distribution can be used for the description of packet delays in global network. Precision experimental data to within microseconds are gathered by means of the RIPE Test Box. Statistical verification of hypothesis has shown that distribution parameters remain constants during 500 second intervals at least. In paper cumulative distribution function and generating function for packet delay in network are in an explicit form written down, the algorithm of search of parameters of distribution is resulted.
Over the last decade, the growing amount of UL and DL mobile data traffic has been characterized by substantial asymmetry and time variations. Dynamic time-division duplex (TDD) has the capability to accommodate to the traffic asymmetry by adapting the UL/DL configuration to the current traffic demands. In this work, we study a two-tier heterogeneous cellular network (HCN) where the macro tier and small cell tier operate according to a dynamic TDD scheme on orthogonal frequency bands. To offload the network infrastructure, mobile users in proximity can engage in D2D communications, whose activity is determined by a carrier sensing multiple access (CSMA) scheme to protect the ongoing infrastructure-based and D2D transmissions. We present an analytical framework to evaluate the network performance in terms of load-aware coverage probability and network throughput. The proposed framework allows to quantify the effect on the coverage probability of the most important TDD system parameters, such as the UL/DL configuration, the base station density, and the bias factor. In addition, we evaluate how the bandwidth partition and the D2D network access scheme affect the total network throughput. Through the study of the tradeoff between coverage probability and D2D user activity, we provide guidelines for the optimal design of D2D network access.
Impulse Radio Ultra Wide Band (IR-UWB) is a promising technology to address Wireless Sensor Network (WSN) constraints. However, existing network simulation tools do not provide a complete WSN simulation architecture, with the IR-UWB specificities at the PHYsical (PHY) and the Medium Access Control (MAC) layers. In this paper, we propose a WSN simulation architecture based on the IR-UWB technique. At the PHY layer, we take into account the pulse collision by dealing with the pulse propagation delay. We also modelled MAC protocols specific to IRUWB, for WSN applications. To completely fit the WSN simulation requirements, we propose a generic and reusable sensor and sensing channel model. Most of the WSN application performances can be evaluated thanks to the proposed simulation architecture. The proposed models are implemented on a scalable and well known network simulator: Global Mobile Information System Simulator (GloMoSim). However, they can be reused for all other packet based simulation platforms.
In this paper we look at content placement in the high-dimensional regime: there are n servers, and O(n) distinct types of content. Each server can store and serve O(1) types at any given time. Demands for these content types arrive, and have to be served in an online fashion; over time, there are a total of O(n) of these demands. We consider the algorithmic task of content placement: determining which types of content should be on which server at any given time, in the setting where the demand statistics (i.e. the relative popularity of each type of content) are not known a-priori, but have to be inferred from the very demands we are trying to satisfy. This is the high- dimensional regime because this scaling (everything being O(n)) prevents consistent estimation of demand statistics; it models many modern settings where large numbers of users, servers and videos/webpages interact in this way. We characterize the performance of any scheme that separates learning and placement (i.e. which use a portion of the demands to gain some estimate of the demand statistics, and then uses the same for the remaining demands), showing it is order-wise strictly suboptimal. We then study a simple adaptive scheme - which myopically attempts to store the most recently requested content on idle servers - and show it outperforms schemes that separate learning and placement. Our results also generalize to the setting where the demand statistics change with time. Overall, our results demonstrate that separating the estimation of demand, and the subsequent use of the same, is strictly suboptimal.
Energy saving is becoming an important issue in the design and use of computer networks. In this work we propose a problem that considers the use of rate adaptation as the energy saving strategy in networks. The problem is modeled as an integral demand-routing problem in a network with discrete cost functions at the links. The discreteness of the cost function comes from the different states (bandwidths) at which links can operate and, in particular, from the energy consumed at each state. This in its turn leads to the non-convexity of the cost function, and thus adds complexity to solve this problem. We formulate this routing problem as an integer program, and we show that the general case of this problem is NP-hard, and even hard to approximate. For the special case when the step ratio of the cost function is bounded, we show that effective approximations can be obtained. Our main algorithm executes two processes in sequence: relaxation and rounding. The relaxation process eliminates the non-convexity of the cost function, so that the problem is transformed into a fractional convex program solvable in polynomial time. After that, a randomized rounding process is used to get a feasible solution for the original problem. This algorithm provides a constant approximation ratio for uniform demands and an approximation ratio of $O(\\log^{\\beta-1} d)$ for non-uniform demands, where $\\beta$ is a constant and $d$ is the largest demand.
Recent interest in networked control systems (NCS) has instigated research in both communication networks and control. Analysis of NCSs has usually been performed from either the network or the control point of view, but not many papers exist where the analysis of both is done in the same context. In this paper an overall analysis of the networked control system is presented. First, the procedure of obtaining the upper bound delay value for packet transmission in the switched Ethernet network is presented. Next, the obtained delay estimate is utilised in delay compensation for improving the Quality of Performance (QoP) of the control systems. The presented upper bound delay algorithm applies ideas from network calculus theory. For the improvement of QoP, two delay compensation strategies, the Smith predictor based and the robust control based delay compensation strategies, are presented and compared.
Efficient virtual machine (VM) management can dramatically reduce energy consumption in data centers. Existing VM management algorithms fall into two categories based on whether the VMs  resource demands are assumed to be static or dynamic. The former category fails to maximize the resource utilization as they cannot adapt to the dynamic nature of VMs  resource demands. Most approaches in the latter category are heuristical and lack theoretical performance guarantees. In this work, we formulate dynamic VM management as a large-scale Markov Decision Process (MDP) problem and derive an optimal solution. Our analysis of real-world data traces supports our choice of the modeling approach. However, solving the large-scale MDP problem suffers from the curse of dimensionality. Therefore, we further exploit the special structure of the problem and propose an approximate MDP-based dynamic VM management method, called MadVM. We prove the convergence of MadVM and analyze the bound of its approximation error. Moreover, MadVM can be implemented in a distributed system, which should suit the needs of real data centers. Extensive simulations based on two real-world workload traces show that MadVM achieves significant performance gains over two existing baseline approaches in power consumption, resource shortage and the number of VM migrations. Specifically, the more intensely the resource demands fluctuate, the more MadVM outperforms.
Assuming a random uniform distribution of n sensor nodes over a virtual grid, this paper addresses the problem of finding the maximum number of connected set covers each ensuring 100% coverage of the query region. The connected sets remain active one after another in a round robin fashion such that if there are P such set covers, it can enhance the network lifetime P-fold. From graph-theoretic point of view, a centralized O(n3) heuristic is proposed here to maximize P. Next, for large self-organized sensor networks, a distributed algorithm is developed. The proposed algorithm is to be executed just once, during the initialization of the network. In case of failure, a distributed recovery algorithm is executed to rearrange the partitions. Simulation studies show that the performance of the proposed distributed algorithm is comparable with that of the centralized algorithm in terms of number of partitions. Also, comparison with earlier works shows significant improvement in terms of number of partitions, message complexity and network lifetime.
With the growing deployment of IPv6, the question arises whether and to what extent this new protocol is co-deployed with IPv4 on existing hardware or whether new hardware or proxy solutions are deployed. Understanding the resulting cross-dependencies between IPv4 and IPv6 hosts will add a significant level of insight into Internet structure and resilience research. In this work we present an active measurement technique to determine whether an IPv4-IPv6 address pair resides on the same physical host. This technique is based on measuring clock skew through TCP timestamps, and introduces new capabilities to classify nonlinear clock skews. We achieve 97.7% accuracy on a ground truth data set of 458 hosts. We prove this technique s value by applying it to 371k sibling candidates, of which we classify 80k as siblings. We release the classified siblings among other data and code from this work for public use.
The concept of the IXP, an Ethernet fabric central to the structure of the global Internet, is largely absent from the development of community-driven collaborative network infrastructure. The reasons for this are two-fold. IXPs exist in central, typically urban, environments where strong network infrastructure ensures high levels of connectivity. Between rural and remote regions, where networks are separated by distance and terrain, no such infrastructure exists. In this paper we present RemIX a distributed IXPs architecture designed for the community network environment. We examine this praxis using an implementation in Scotland, with suggestions for future development and research.
Mobile Ad-hoc Networks (MANETS) is a collection of wireless nodes without any infrastructure support. The nodes in MANET can act as either router or source and the control of the network is distributed among nodes. The nodes in MANETS are highly mobile and it maintains dynamic interconnection between those mobile nodes. MANTEs have been considered as isolated stand-alone network. This can turn the dream of networking \"at any time and at any where\" into reality. The main purpose of this paper is to study the issues in route discovery process in AODV protocol for MANET. Flooding of route request message imposes major concern in route establishment. This paper suggests a new approach to reduce the routing overhead during the route discovery phase. By considering the previous behaviour of the network, the new protocol reduces the unwanted searches during route establishment process
In this paper, we implement an application-aware scheduler that differentiates users running real-time applications and delay-tolerant applications while allocating resources. This approach ensures that the priority is given to real-time applications over delay-tolerant applications. In our system model, we include realistic channel effects of Long Term Evolution (LTE) system. Our application-aware scheduler runs in two stages, the first stage is resource block allocation and the second stage is power allocation. In the optimal solution of resource block allocation problem, each user is inherently guaranteed a minimum Quality of Experience (QoE) while ensuring priority given to users with real-time applications. In the power allocation problem, a new power allocation method is proposed which utilizes the optimal solution of the application-aware resource block scheduling problem. As a proof of concept, we run a simulation comparison between a conventional proportional fairness scheduler and the application-aware scheduler. The simulation results show better QoE with the application-aware scheduler.
Understanding the fundamental end-to-end delay performance in mobile ad hoc networks (MANETs) is of great importance for supporting Quality of Service (QoS) guaranteed applications in such networks. While upper bounds and approximations for end-to-end delay in MANETs have been developed in literature, which usually introduce significant errors in delay analysis, the modeling of exact end-to-end delay in MANETs remains a technical challenge. This is partially due to the highly dynamical behaviors of MANETs, but also due to the lack of an efficient theoretical framework to capture such dynamics. This paper demonstrates the potential application of the powerful Quasi-Birth-and-Death (QBD) theory in tackling the challenging issue of exact end-to-end delay modeling in MANETs. We first apply the QBD theory to develop an efficient theoretical framework for capturing the complex dynamics in MANETs. We then show that with the help of this framework, closed form models can be derived for the analysis of exact end-to-end delay and also per node throughput capacity in MANETs. Simulation and numerical results are further provided to illustrate the efficiency of these QBD theory-based models as well as our theoretical findings.
This article considers the problem of delay optimal bundling of the input symbols into transmit packets in the entry point of a wireless sensor network such that the link delay is minimized under an arbitrary arrival rate and a given channel error rate. The proposed policy exploits the variable packet length feature of contemporary communications protocols in order to minimize the link delay via packet length regularization. This is performed through concrete characterization of the end-to-end link delay for zero error tolerance system with First Come First Serve (FCFS)queuing discipline and Automatic Repeat Request (ARQ) retransmission mechanism. The derivations are provided for an uncoded system as well as a coded system with a given bit error rate. The proposed packetization policy provides an optimal packetization interval that minimizes the end-to-end delay for a given channel with certain bit error probability. This algorithm can also be used for near-optimal bundling of input symbols for dynamic channel conditions provided that the channel condition varies slowly over time with respect to symbol arrival rate. This algorithm complements the current network-based delay-optimal routing and scheduling algorithms in order to further reduce the end-to-end delivery time. Moreover, the proposed method is employed to solve the problem of energy efficiency maximization under an average delay constraint by recasting it as a convex optimization problem.
This paper discusses a method for pipelining the calculation of CRC s, such as ITU/CCITT CRC32, into a mostly feed-forward architecture. This method allows several benefits such as independent scaling of circuit frequency and data throughput. Additionally it allows calculation over packet tails (packet length not a multiple of CRC input width). Finally it offers the ability to update a CRC where a subset of data in the packet has changed.
In Wireless Sensor Network, sensor nodes life time is the most critical parameter. Many researches on these lifetime extension are motivated by LEACH scheme, which by allowing rotation of cluster head role among the sensor nodes tries to distribute the energy consumption over all nodes in the network. Selection of clusterhead for such rotation greatly affects the energy efficiency of the network. Different communication protocols and algorithms are investigated to find ways to reduce power consumption. In this paper brief survey is taken from many proposals, which suggests different clusterhead selection strategies and a global view is presented. Comparison of their costs of clusterhead selection in different rounds, transmission method and other effects like cluster formation, distribution of clusterheads and creation of clusters shows a need of a combined strategy for better results.
Networked communications inherently depend on the ability of the sender of a message to indicate through some token how the message should be delivered to a particular recipient. The tokens that refer messages to recipients are variously known as routes, addresses,handles, and names} ordered by their relative nearness to network topology vs. human meaning. All four sorts of token refer in some way to a recipient, but they are controlled by different authorities and their meanings depend on different contextual parameters. Today s global Internet employs dynamically determined routes, IP addresses, and domain names. Domain names combine the functions of handles and names. The high value of domain names as names leads to substantial social and legal dispute about their assignment, degrading their value as handles. The time has come to provide a distinct open network handle system (ONHS), using handles that are not meaningful in natural language and are therefore not subject to the disputes surrounding the use of names. A handle service may be deployed easily as a handle domain within the current Domain Name System. In order to minimize the administrative load, and maximize their own autonomy, netizens may use public-key cryptography to assign their own handles.
-Performance of Vehicular Adhoc Networks (VANETs) in high node density situation has long been a major field of studies. Particular attention has been paid to the frequent exchange of Cooperative Awareness Messages (CAMs) on which many road safety applications rely. In the present paper, se focus on the European Telecommunications Standard Institute (ETSI) Decentralized Congestion Control (DCC) mechanism, particularly on the evaluation of its facility layers component when applied in the context of dense networks. For this purpose, a set of simulations has been conducted over several scenarios, considering rural highway and urban mobility in order to investigate unfairness and oscillation issues, and analyze the triggering factors. The experimental results show that the latest technical specification of the ETSI DCC presents a significant enhancement in terms of fairness. In contrast, the stability criterion leaves room for improvement as channel load measurement presents (i) considerable fluctuations when only the facility layer control is applied and (i.i) severe state oscillation when different DCC control methods are combined.
Coloring is used in wireless networks to improve communication efficiency, mainly in terms of bandwidth, energy and possibly end-to-end delays. In this research report, we define the h-hop node coloring problem, with h any positive integer. We prove that the associated decision problem is NP-complete. We then present a 3-hop distributed coloring algorithm that is optimized for dense networks: a node does not need to exchange the priorities and colors of its 2-hop neighbors. Through simulation results, we highlight the impact of priority assignment on the number of colors obtained for any network. We then focus on grids and identify a color pattern that can be reproduced to color the whole grid. We show how the coloring algorithm can use regularity properties to obtain a periodic color pattern with the optimal number of colors. We then consider grids with holes and study how to extend our results.
Rapid and innovative improvement in wireless communication technologies has led to an increase in the demand for mobile internet transactions. However, internet access from mobile devices is very expensive due to limited bandwidth available on wireless links and high mobility rate of mobile hosts. When a user executes a transaction with a web portal from a mobile device, the disconnection necessitates failure of the transaction or redoing all the steps after reconnection, to get back into consistent application state. Thus considering challenges in wireless mobile networks, a new log management scheme is proposed for recovery of mobile transactions. In this proposed approach, the model parameters that affect application state recovery are analyzed. The proposed scheme is compared with the existing Lazy and Pessimistic scheme and a trade off analysis between the cost invested to manage log and the return of investment in terms of improved failure recoverability is made. From the analysis, the best checkpoint interval period that yields the best return of investment is identified.
Recent advances in the integration of vehicular sensor network (VSN) technology, and crowd sensing leveraging pervasive sensors called onboard units (OBUs), like smartphones and radio frequency IDentifications to provide sensing services, have attracted increasing attention from both industry and academy. Nowadays, existing vehicular sensing applications lack good mechanisms to improve the maximum achievable throughput and minimizing service time of participating sensing OBUs in vehicular sensor networks. To fill these gaps, in this paper, first, we introduce real imperfect link states to the calculation of Markov chains. Second, we incorporate the result of different link states for multiple types of vehicles with the calculations of uplink throughput and service time. Third, in order to accurately calculate the service time of an OBU, we introduce the steady state probability to calculate the exact time of a duration for back-off decrement, rather than using the traditional relative probability. Additionally, to our best knowledge, we first explore a multichannel scheduling strategy of uplink data access in a single roadside unit (RSU) by using a non-cooperative game in a RSU coverage region to maximize the uplink throughput and minimize service time under saturated and unsaturated traffic loads. To this end, we conduct a theoretical analysis and find the equilibrium point of the scheduling. The numerical results show that the solution of the equilibrium points are consistent with optimization problems.
This dissertation has extensively looked into all aspects of VoIP commu-nications technology, and information presented in preceding chapters, which build up a solid framework to discuss the conceptual design model, and investigate features that could be incorporated for actual Pro-jects, with parameters that are tested on field values. The dissertation follows a five-course model, for answering different questions, both tech-nical and businesslike, around central issues, that have been crucial to explanation of the topic; starting with a general overview of VoIP tech-nology, analyzing current VoIP encryption methods, identifying security threats, designing a robust VoIP system based on particulars discussed in preceding chapters, and finally, a VoIP simulation.
The Internet is becoming more and more content-oriented, where one of main components in content-oriented Internet architectures is network caching. Despite a surge of extensive use of network cashing in the current and future Internet architectures, analysis on the performance of general cache networks are still quite limited due to complex inter-plays among various components and thus analytical intractability. We study asymptotic delay performance of cache networks, in particular, focusing on the impact of heterogeneous content popularities and nodes  geometric `importances  in caching policies. Our theoretical findings provide useful engineering implications such as when and how various factors have impact on caching performance, and we provide extensive simulation results on the real Internet topology.
This paper presents a solution for reducing the ill effects of free-riders in decentralised unstructured P2P networks. An autonomous replication scheme is proposed to improve the availability and enhance system performance. Q-learning is widely employed in different situations to improve the accuracy in decision making by each peer. Based on the performance of neighbours of a peer, every neighbour is awarded different levels of ranks. At the same time a low-performing node is allowed to improve its rank in different ways. Simulation results show that Q-learning based free riding control mechanism effectively limits the services received by free-riders and also encourages the low-performing neighbours to improve their position. The popular files are autonomously replicated to nodes possessing required parameters. Due to this improvement of quantity of popular files, free riders are given opportunity to lift their position for active participation in the network for sharing files. Q-feed effectively manages queries from free riders and reduces network traffic significantly
The applications require coverage of the whole monitored area for long periods of time. Clustering is a way to reduce communications, minimize energy consumption and organize messages among the cluster head and their members. The message exchange of communication and data transmission between the different sensor nodes must be minimized to keep and extended the lifetime of the network because of limited energy resources of the sensors. In this paper, we take into consideration the problem isolated nodes that are away from the cluster head (CH) and by consequence or CH is not within the reach from these nodes. To solve this problem, we propose O-LEACH (Orphan Low Energy Adaptive Clustering Hierarchy) a routing protocol that takes into account the orphan nodes. Indeed, a cluster member will be able to play the role of a gateway which allows the joining of orphan nodes. Our contribution is to election a cluster head that has enough energy for a better now to coordinate with these member nodes and maintain the full coverage for applications which requires of useful data for the entire area to be covered. The simulation results show that O-LEACH performs better than LEACH in terms of connectivity rate, energy, scalability and coverage.
In this paper, the relationship between the network synchronizability and the edge distribution of its associated graph is investigated. First, it is shown that adding one edge to a cycle definitely decreases the network sychronizability. Then, since sometimes the synchronizability can be enhanced by changing the network structure, the question of whether the networks with more edges are easier to synchronize is addressed. It is shown by examples that the answer is negative. This reveals that generally there are redundant edges in a network, which not only make no contributions to synchronization but actually may reduce the synchronizability. Moreover, an example shows that the node betweenness centrality is not always a good indicator for the network synchronizability. Finally, some more examples are presented to illustrate how the network synchronizability varies following the addition of edges, where all the examples show that the network synchronizability globally increases but locally fluctuates as the number of added edges increases.
In this paper we look at polynomials arising from statistics on the classes of involutions, $I_n$, and involutions with no fixed points, $J_n$, in the symmetric group. Our results are motivated by F. Brenti s conjecture which states that the Eulerian distribution of $I_n$ is log-concave. Symmetry of the generating functions is shown for the statistics $des,maj$ and the joint distribution $(des,maj)$. We show that $exc$ is log-concave on $I_n$, $inv$ is log-concave on $J_n$ and $des$ is partially unimodal on both $I_n$ and $J_n$. We also give recurrences and explicit forms for the generating functions of the inversions statistic on involutions in Coxeter groups of types $B_n$ and $D_n$. Symmetry and unimodality of $inv$ is shown on the subclass of signed permutations in $D_n$ with no fixed points. In light of these new results, we present further conjectures at the end of the paper.
A radio labeling of a graph $G$ is a mapping $f: V(G) \\rightarrow \\{0, 1, 2, \\ldots\\}$ such that $|f(u)-f(v)|\\geq d + 1 - d(u,v)$ for every pair of distinct vertices $u, v$ of $G$, where $d$ is the diameter of $G$ and $d(u,v)$ the distance between $u$ and $v$ in $G$. The radio number of $G$ is the smallest integer $k$ such that $G$ has a radio labeling $f$ with $\\max\\{f(v) : v \\in V(G)\\} = k$. We give a necessary and sufficient condition for a lower bound on the radio number of trees to be achieved, two other sufficient conditions for the same bound to be achieved by a tree, and an upper bound on the radio number of trees. Using these, we determine the radio number for three families of trees.
The problem of computing products of Schubert classes in the cohomology ring can be formulated as the problem of expanding skew Schur polynomials into the basis of ordinary Schur polynomials. In contrast, the problem of computing the structure constants of the Grothendieck ring of a Grassmannian variety with respect to its basis of Schubert structure sheaves is not equivalent to expanding skew stable Grothendieck polynomials into the basis of ordinary stable Grothendiecks. Instead, we show that the appropriate K-theoretic analogy is through the expansion of skew reverse plane partitions into the basis of polynomials which are Hopf-dual to stable Grothendieck polynomials. We combinatorially prove this expansion is determined by Yamanouchi set-valued tableaux. A by-product of our results is a dual approach proof for Buch s K-theoretic Littlewood-Richardson rule for the product of stable Grothendieck polynomials.
We prove the following: Fix an integer $k\\geq 2$, and let $T$ be a real number with $T\\geq 1.5$. Let $\\cH=(V,\\cE_2\\cup \\cE_3\\cup\\dots\\cup\\cE_k)$ be a non-uniform hypergraph with the vertex set $V$ and the set $\\cE_i$ of edges of size $i=2,\\ldots , k$. Suppose that $\\cH$ has no $2$-cycles (regardless of sizes of edges), and neither contains $3$-cycles nor $4$-cycles consisting of $2$-element edges. If the average degrees $t_i^{i-1} := i |\\cE_i|/ |V|$ satisfy that $t_i^{i-1} \\leq T^{i-1} (\\ln T)^{\\frac{k-i}{k-1}}$ for $i= 2, \\dots , k$, then there exists a constant $C_k > 0$, depending only on $k$, such that $\\alpha(\\cH)\\geq C_k \\frac{|V|}{T} (\\ln T)^{\\frac{1}{k-1}}$, where $\\alpha(\\cH)$ denotes the independence number of $\\cH$. This extends results of Ajtai, Koml\\ os, Pintz, Spencer and Szemer\\ edi and Duke, R\\\"odl and the second author for uniform hypergraphs. As an application, we consider an anti-Ramsey type problem on non-uniform hypergraphs. Let $\\cH=\\cH(n;2,\\ldots,\\ell)$ be the hypergraph on the $n$-vertex set $V$ in which, for $s=2,\\ldots,\\ell$, each $s$-subset of $V$ is a hyperedge of $\\cH$. Let $\\Delta$ be an edge-coloring of $\\cH$ satisfying the following: (a) two hyperedges sharing a vertex have different colors; (b) two hyperedges with distinct size have different colors; (c) a color used for a hyperedge of size $s$ appears at most $u_s$ times. For such a coloring $\\Delta$, let $f_{\\Delta}(n;u_2,\\ldots,u_{\\ell})$ be the maximum size of a subset $U$ of $V$ such that each hyperedge of $\\cH[U]$ has a distinct color, and let $f(n;u_2,\\ldots,u_{\\ell}):=\\min_{\\Delta} f_{\\Delta}(n;u_2,\\ldots,u_{\\ell}).$ We determine $f(n;u_2,\\ldots,u_{\\ell})$ up to a multiplicative logarithm factor.
Fomin and Zelevinsky show that a certain two-parameter family of rational recurrence relations, here called the (b,c) family, possesses the Laurentness property: for all b,c, each term of the (b,c) sequence can be expressed as a Laurent polynomial in the two initial terms. In the case where the positive integers b,c satisfy bc<4, the recurrence is related to the root systems of finite-dimensional rank 2 Lie algebras; when bc>4, the recurrence is related to Kac-Moody rank 2 Lie algebras of hyperbolic type. Here we investigate the borderline cases bc=4, corresponding to Kac-Moody Lie algebras of affine type. In these cases, we show that the Laurent polynomials arising from the recurence can be viewed as generating functions that enumerate the perfect matchings of certain graphs. By providing combinatorial interpretations of the individual coefficients of these Laurent polynomials, we establish their positivity.
Base sequences BS(m,n) are quadruples (A;B;C;D) of {+1,-1}-sequences, A and B of length m and C and D of length n, the sum of whose non-periodic auto-correlation functions is zero. Base sequences and some special subclasses of BS(n+1,n) known as normal and near-normal sequences, NS(n) and NN(n), as well as T-sequences and orthogonal designs play a prominent role in modern constructions of Hadamard matrices. In our previous papers (see the references) we have classified the near-normal sequences NN(s) for all even integers s <= 32 (they do not exist for odd s>1). We now extend the classification to the case s=34. Moreover we construct the first example of near-normal sequences NN(36). Consequently, we construct for the first time T-sequences of length 73. For all smaller lengths, T-sequences were already known. Another consequence is that 73 is a Yang number, and a few important consequences of this fact are given.
For a graph G, the generating function of rooted forests, counted by the number of connected components, can be expressed in terms of the eigenvalues of the graph Laplacian. We generalize this result from graphs to cell complexes of arbitrary dimension. This requires generalizing the notion of rooted forest to higher dimension. We also introduce orientations of higher dimensional rooted trees and forests. These orientations are discrete vector fields which lead to open questions concerning expressing homological quantities combinatorially.
The point sets of all known optimal rectilinear drawings of $K_n$ share an unmistakeable clustering property, the so--called {\\em 3--decomposability}. It is widely believed that the underlying point sets of all optimal rectilinear drawings of $K_n$ are 3--decomposable. We give a lower bound for the minimum number of $(\\le k)$--sets in a 3--decomposable $n$--point set. As an immediate corollary, we obtain a lower bound for the crossing number $\\rcr(\\dd)$ of any rectilinear drawing $\\dd$ of $K_n$ with underlying 3--decomposable point set, namely $\\rcr(\\dd) > {2/27}(15-\\pi^{2})\\binom{n}{4}+\\Theta(n^{3}) \\approx 0.380029\\binom{n}{4} + \\Theta(n^3)$. This closes this gap between the best known lower and upper bounds for the rectilinear crossing number $\\rcr(K_n)$ of $K_n$ by over 40%, under the assumption of 3--decomposability.
Regular $A_n$-, $B_n$- and $C_n$-crystals are edge-colored directed graphs, with ordered colors $1,2,...,n$, which are related to representations of quantized algebras $U_q(\\mathfrak{sl}_{n+1})$, $U_q(\\mathfrak{sp}_{2n})$ and $U_q(\\mathfrak{so}_{2n+1})$, respectively. We develop combinatorial methods to reveal refined structural properties of such objects. Firstly, we study subcrystals of a regular $A_n$-crystal $K$ and characterize pairwise intersections of maximal subcrystals with colors $1,...,n-1$ and colors $2,...,n$. This leads to a recursive description of the structure of $K$ and provides an efficient procedure of assembling $K$. Secondly, using merely combinatorial means, we demonstrate a relationship between regular $B_n$-crystals (resp. $C_n$-crystals) and regular symmetric $A_{2n-1}$-crystals (resp. $A_{2n}$-crystals).
Given a family ${\\mathcal F}$ and a host graph $H$, a graph $G\\subseteq H$ is ${\\mathcal F}$-saturated relative to $H$ if no subgraph of $G$ lies in ${\\mathcal F}$ but adding any edge from $E(H)-E(G)$ to $G$ creates such a subgraph. In the ${\\mathcal F}$-saturation game on $H$, players Max and Min alternately add edges of $H$ to $G$, avoiding subgraphs in ${\\mathcal F}$, until $G$ becomes ${\\mathcal F}$-saturated relative to $H$. They aim to maximize or minimize the length of the game, respectively; $\\textrm{sat}_g({\\mathcal F};H)$ denotes the length under optimal play (when Max starts). Let ${\\mathcal O}$ denote the family of all odd cycles and ${\\mathcal T}$ the family of $n$-vertex trees, and write $F$ for ${\\mathcal F}$ when ${\\mathcal F}=\\{F\\}$. Our results include $\\textrm{sat}_g({\\mathcal O};K_{2k})=k^2$, $\\textrm{sat}_g({\\mathcal T};K_n)=\\binom{n-2}{2}+1$ for $n\\ge6$, $\\textrm{sat}_g(K_{1,3};K_n)=2\\lfloor n/2 \\rfloor$ for $n\\ge8$, $\\textrm{sat}_g(K_{1,r+1};K_n)=\\frac{rn}{2}-\\frac{r^2}{8}+O(1)$, and $|\\textrm{sat}_g(P_4;K_n)-(4n-1)/5|\\le 1$. We also determine $\\textrm{sat}_g(P_4;K_{m,n})$; with $m\\ge n$, it is $n$ when $n$ is even, $m$ when $n$ is odd and $m$ is even, and $m+\\lfloor n/2 \\rfloor$ when $mn$ is odd. Finally, we prove the lower bound $\\textrm{sat}_g(C_4;K_{n,n})\\ge\\frac{1}{10.4}n^{13/12}-O(n^{35/36})$. The results are very similar when Min plays first, except for the $P_4$-saturation game on $K_{m,n}$.
A $P_q(t,k,n)$ $q$-packing design is a selection of $k$-subspaces of $\\F_q^n$ such that each $t$-subspace is contained in at most one element of the collection. A successful approach adopted from the Kramer-Mesner-method of prescribing a group of automorphisms was applied by Kohnert and Kurz to construct some constant dimension codes with moderate parameters which arise by $q$-packing designs. In this paper we recall this approach and give a version of the Kramer-Mesner-method breaking the condition that the whole $q$-packing design must admit the prescribed group of automorphisms. Afterwards, we describe the basic idea of an algorithm to tackle the integer linear optimization problems representing the $q$-packing design construction by means of a metaheuristic approach. Finally, we give some improvements on the size of $P_2(2,3,n)$ $q$-packing designs.
A proof is sketched of the Polynomial Conjecture of the author (circulated as preprint \"Brick Tiling and Monotone Boolean Functions\", available at the this http URL url) which says that the family of minimal tilable-boxes grows polynomially with dimension. An important ingredient of the argument is translating the problem from its finite-dimensional geometric framework to the algebraic setting of an infinite-dimensional lattice.
We define a number of natural (from geometric and combinatorial points of view) deformation spaces of valuations on finite graphs, and study functions over these deformation spaces. These functions include both direct metric invariants (girth, diameter), and spectral invariants (the determinant of the Laplace operator, or complexity; bottom non-zero eigenvalue of the Laplace operator). We show that almost all of these functions are, surprisingly, convex, and we characterize the valuations extremizing these invariant
A tree $T$ in an edge-colored graph is called a {\\it proper tree} if no two adjacent edges of $T$ receive the same color. Let $G$ be a connected graph of order $n$ and $k$ be an integer with $2\\leq k \\leq n$. For $S\\subseteq V(G)$ and $|S| \\ge 2$, an $S$-tree is a tree containing the vertices of $S$ in $G$. Suppose $\\{T_1,T_2,\\ldots,T_\\ell\\}$ is a set of $S$-trees, they are called \\emph{internally disjoint} if $E(T_i)\\cap E(T_j)=\\emptyset$ and $V(T_i)\\cap V(T_j)=S$ for $1\\leq i\\neq j\\leq \\ell$. For a set $S$ of $k$ vertices of $G$, the maximum number of internally disjoint $S$-trees in $G$ is denoted by $\\kappa(S)$. The $\\kappa$-connectivity $\\kappa_k(G)$ of $G$ is defined by $\\kappa_k(G)=\\min\\{\\kappa(S)\\mid S$ is a $k$-subset of $V(G)\\}$. For a connected graph $G$ of order $n$ and for two integers $k$ and $\\ell$ with $2\\le k\\le n$ and $1\\leq \\ell \\leq \\kappa_k(G)$, the \\emph{$(k,\\ell)$-proper index $px_{k,\\ell}(G)$} of $G$ is the minimum number of colors that are needed in an edge-coloring of $G$ such that for every $k$-subset $S$ of $V(G)$, there exist $\\ell$ internally disjoint proper $S$-trees connecting them. In this paper, we show that for every pair of positive integers $k$ and $\\ell$ with $k \\ge 3$, there exists a positive integer $N_1=N_1(k,\\ell)$ such that $px_{k,\\ell}(K_n) = 2$ for every integer $n \\ge N_1$, and also there exists a positive integer $N_2=N_2(k,\\ell)$ such that $px_{k,\\ell}(K_{m,n}) = 2$ for every integer $n \\ge N_2$ and $m=O(n^r) (r \\ge 1)$. In addition, we show that for every $p \\ge c\\sqrt[k]{\\frac{\\log_a n}{n}}$ ($c \\ge 5$), $px_{k,\\ell}(G_{n,p})\\le 2$ holds almost surely, where $G_{n,p}$ is the Erd\\\"{o}s-R\\ {e}nyi random graph model.
A digraph that represents reasonably a scheduling problem should be a directed acyclic graph. Here down we shall deal with special kind of graded $DAGs$ named $KoDAGs$. For their definition and first primary properties see $ [1]$, where natural join of directed biparted graphs and their corresponding adjacency matrices is defined and then applied to investigate cobweb posets and their $Hasse$ digraphs called $KoDAGs$. In this report we extend the notion of cobweb poset while delivering some elementary consequences of the description and observations established in $[1]$.
The distinguishing number (index) $D(G)$ ($D (G)$) of a graph $G$ is the least integer $d$ such that $G$ has an vertex labeling (edge labeling) with $d$ labels that is preserved only by a trivial automorphism. Motivated by a theorem (Kalinowski and Pil\\ sniak, 2015) which state that for every graph of order $n \\geqslant 3$, $D (G) \\leqslant D(G) + 1$, we characterize all finite simple connected graphs with $D (G) = D(G) + 1$. Also, we describe all finite simple connected graphs with $D (G) = D(G)$ and $| E(G)| \\leqslant | V(G)|$.
The growing size of the multiprocessor system increases its vulnerability to component failures. It is crucial to locate and to replace the faulty processors to maintain a system s high reliability. The fault diagnosis is the process of identifying faulty processors in a system through testing. This paper shows that the largest connected component of the survival graph contains almost all remaining vertices in the $(n,k)$-arrangement graph $A_{n,k}$ when the number of moved faulty vertices is up to twice or three times the traditional connectivity. Based on this fault resiliency, we establishes that the conditional diagnosability of $A_{n,k}$ under the comparison model. We prove that for $k\\geq 4$, $n\\geq k+2$, the conditional diagnosability of $A_{n,k}$ is $(3k-2)(n-k)-3$; the conditional diagnosability of $A_{n,n-1}$ is $3n-7$ for $n\\geq 5$.
Let $T$ be a weighted tree. The weight of a subtree $T_1$ of $T$ is defined as the product of weights of vertices and edges of $T_1$. We obtain a linear-time algorithm to count the sum of weights of subtrees of $T$. As applications, we characterize the tree with the diameter at least $d$, which has the maximum number of subtrees, and we characterize the tree with the maximum degree at least $\\Delta$, which has the minimum number of subtrees.
One theorem of Nemhauser and Trotter ensures that, under certain conditions, a stable set of a graph G can be enlarged to a maximum stable set of this graph. For example, any stable set consisting of only simplicial vertices is contained in a maximum stable set of G. In this paper we demonstrate that an inverse assertion is true for trees of order greater than one, where, in fact, all the simplicial vertices are pendant. Namely, we show that any maximum stable set of such a tree contains at least one pendant vertex. Moreover, we prove that if T does not own a perfect matching, then a stable set, consisting of at least two pendant vertices, is included in the intersection of all its maximum stable sets. For trees, the above assertion is also a strengthening of one result of Hammer, Hansen, and Simeone, stating that if half of order of G is less than the cardinality of a maximum stable set of G, then the intersection of all its maximum stable sets is non-empty.
Begin with a set of four points in the real plane in general position. Add to this collection the intersection of all lines through pairs of these points. Iterate. Ismailescu and Radoi\\v{c}i\\ {c} (2003) showed that the limiting set is dense in the plane. We give doubly exponential upper and lower bounds on the number of points at each stage. The proof employs a variant of the Szemer\\ edi-Trotter Theorem and an analysis of the ``minimum degree   of the growing configuration.
The classical Erd\\H os-Ko-Rado theorem states that if $k\\le\\floor{n/2}$ then the largest family of pairwise intersecting $k$-subsets of $[n]=\\{0,1,...,n\\}$ is of size ${{n-1}\\choose{k-1}}$. A family of $k$ subsets satisfying this pairwise intersecting property is called an EKR family. We generalize the EKR property and provide asymptotic lower bounds on the size of the largest family ${\\cal A}$ of $k$-subsets of $[n]$ that satisfies the following property: For each $A,B,C\\in{\\cal A}$, each of the four sets $A\\cap B\\cap C;A\\cap B\\cap C^C; A\\cap B^C\\cap C; A^C\\cap B\\cap C$ are non-empty. This generalized EKR (GEKR) property is motivated, generalizations are suggested, and a comparison is made with fixed weight 3-covering arrays. Our techniques are probabilistic.
We study 2-player impartial games, so called \\emph{invariant subtraction games}, of the type, given a set of allowed moves the players take turn in moving one single piece on a large Chess board towards the position $\\boldsymbol 0$. Here, invariance means that each allowed move is available inside the whole board. Then we define a new game, $\\star$ of the old game, by taking the $P$-positions, except $\\boldsymbol 0$, as moves in the new game. One such game is $\\W^\\star=$ (Wythoff Nim)$^\\star$, where the moves are defined by complementary Beatty sequences with irrational moduli. Here we give a polynomial time algorithm for infinitely many $P$-positions of $\\W^\\star$. A repeated application of $\\star$ turns out to give especially nice properties for a certain subfamily of the invariant subtraction games, the \\emph{permutation games}, which we introduce here. We also introduce the family of \\emph{ornament games}, whose $P$-positions define complementary Beatty sequences with rational moduli---hence related to A. S. Fraenkel s `variant  Rat- and Mouse games---and give closed forms for the moves of such games. We also prove that ($k$-pile Nim)$^{\\star\\star}$ = $k$-pile Nim.
A variety of descent and major-index statistics have been defined for symmetric groups, hyperoctahedral groups, and their generalizations. Typically associated to pairs of such statistics is an Euler--Mahonian distribution, a bivariate generating function identity encoding these statistics. We use techniques from polyhedral geometry to establish new multivariate generalizations for many of the known Euler--Mahonian distributions. The original bivariate distributions are then straightforward specializations of these multivariate identities. A consequence of these new techniques are bijective proofs of the equivalence of the bivariate distributions for various pairs of statistics.
A configuration of the lit-only $\\sigma$-game on a finite graph $\\Gamma$ is an assignment of one of two states, on or off, to all vertices of $\\Gamma.$ Given a configuration, a move of the lit-only $\\sigma$-game on $\\Gamma$ allows the player to choose an on vertex $s$ of $\\Gamma$ and change the states of all neighbors of $s.$ Given any integer $k$, we say that $\\Gamma$ is $k$-lit if, for any configuration, the number of on vertices can be reduced to at most $k$ by a finite sequence of moves. Assume that $\\Gamma$ is a tree with a perfect matching. We show that $\\Gamma$ is 1-lit and any tree obtained from $\\Gamma$ by adding a new vertex on an edge of $\\Gamma$ is 2-lit.
A coloring of the $q$-ary $n$-dimensional cube (hypercube) is called perfect if, for every $n$-tuple $x$, the collection of the colors of the neighbors of $x$ depends only on the color of $x$. A Boolean-valued function is called correlation-immune of degree $n-m$ if it takes the value 1 the same number of times for each $m$-dimensional face of the hypercube. Let $f=\\chi^S$ be a characteristic function of some subset $S$ of hypercube. In the present paper it is proven the inequality $\\rho(S)q({\\rm cor}(f)+1)\\leq \\alpha(S)$, where ${\\rm cor}(f)$ is the maximum degree of the correlation immunity of $f$, $\\alpha(S)$ is the average number of neighbors in the set $S$ for $n$-tuples in the complement of a set $S$, and $\\rho(S)=|S|/q^n$ is the density of the set $S$. Moreover, the function $f$ is a perfect coloring if and only if we obtain an equality in the above formula.Also we find new lower bound for the cardinality of components of perfect coloring and 1-perfect code in the case $q>2$. Keywords: hypercube, perfect coloring, perfect code, MDS code, bitrade, equitable partition, orthogonal array.
A tree containing exactly two non-pendant vertices is called a double-star. Let $k_1$ and $k_2$ be two positive integers. The double-star with degree sequence $(k_1+1, k_2+1, 1, \\ldots, 1)$ is denoted by $S_{k_1, k_2}$. If $G$ is a cubic graph and has an $S$-decomposition, for a double-star $S$, then $S$ is isomorphic to $S_{1,1}$, $S_{1,2}$ or $S_{2,2}$. It is known that a cubic graph has an $S_{1,1}$-decomposition if and only if it contains a perfect matching. In this paper we study the $S_{1,2}$-decomposition of cubic graphs. First, we present some necessary conditions for the existence of an $S_{1,2}$-decomposition in cubic graphs. Then we prove that every $\\{C_3, C_5, C_7\\}$-free cubic graph of order $n$ with $\\alpha(G)= \\frac{3n}{8}$ has an $S_{1,2}$-decomposition, where $\\alpha(G)$ denotes the independence number of $G$. Finally, we obtain some results on the $S_{1,r-1}$-decomposition of $r$-regular graphs.
The {\\em metric dimension} of a graph $\\Gamma$ is the least number of vertices in a set with the property that the list of distances from any vertex to those in the set uniquely identifies that vertex. We consider the Grassmann graph $G_q(n,k)$ (whose vertices are the $k$-subspaces of $\\mathbb{F}_q^n$, and are adjacent if they intersect in a $(k-1)$-subspace) for $k\\geq 2$, and find a constructive upper bound on its metric dimension. Our bound is equal to the number of 1-dimensional subspaces of $\\mathbb{F}_q^n$.
We investigate the asymptotic structure of a random perfect graph $P_n$ sampled uniformly from the perfect graphs on vertex set $\\{1,\\ldots,n\\}$. Our approach is based on the result of Pr\\\"omel and Steger that almost all perfect graphs are generalised split graphs, together with a method to generate such graphs almost uniformly. We show that the distribution of the maximum of the stability number $\\alpha(P_n)$ and clique number $\\omega(P_n)$ is close to a concentrated distribution $L(n)$ which plays an important role in our generation method. We also prove that the probability that $P_n$ contains any given graph $H$ as an induced subgraph is asymptotically $0$ or $\\frac12$ or $1$. Further we show that almost all perfect graphs are $2$-clique-colourable, improving a result of Bacs\\ o et al from 2004; they are almost all Hamiltonian; they almost all have connectivity $\\kappa(P_n)$ equal to their minimum degree; they are almost all in class one (edge-colourable using $\\Delta$ colours, where $\\Delta$ is the maximum degree); and a sequence of independently and uniformly sampled perfect graphs of increasing size converges almost surely to the graphon $W_P(x, y) = \\frac12(\\mathbb{1}[x \\le 1/2] + \\mathbb{1}[y \\le 1/2])$.
For $k\\ge 1$, we consider interleaved $k$-tuple colorings of the nodes of a graph, that is, assignments of $k$ distinct natural numbers to each node in such a way that nodes that are connected by an edge receive numbers that are strictly alternating between them with respect to the relation $<$. If it takes at least $\\chi_{int}^k(G)$ distinct numbers to provide graph $G$ with such a coloring, then the interleaved multichromatic number of $G$ is $\\chi_{int}^*(G)=\\inf_{k\\ge 1}\\chi_{int}^k(G)/k$ and is known to be given by a function of the simple cycles of $G$ under acyclic orientations if $G$ is connected [1]. This paper contains a new proof of this result. Unlike the original proof, the new proof makes no assumptions on the connectedness of $G$, nor does it resort to the possible applications of interleaved $k$-tuple colorings and their properties.
In this paper we investigate the existence of singular endomorphisms of the cuboidal Hamming graph $H(n_1,...,n_d,S)$ over the set $\\left[ n_1\\right]\\times \\left[ n_2\\right]\\times \\cdots \\times \\left[ n_d\\right]$, where $\\left[ n\\right]=\\{1,...,n\\}$, which is a generalisation of the well-known (cubic) Hamming graph over $\\left[ n\\right]^{d}$. Two vertices in $H$ are adjacent, if their Hamming distance lies in the set $S$. In this paper $S=\\{1,...,r\\}$, for some integer $1\\leq r\\leq d-1$, and we first show that the singular endomorphisms of minimal rank ( which is the size of their image) of $H(n,...,n,S)$ correspond to Latin hypercubes of class $r$ (those were originally defined by Kishen (1950)). Then we generalise those hypercubes to Latin hypercuboids of class $r$. We discuss the existence of these objects, provide constructions and count Latin hypercuboids for small parameters. In the last part, we extend the natural connection between Latin hypercubes of class $r$ and MDS codes to Latin hypercuboids of class $r$ leading to the definition of MDS codes for mixed codes (mixed MDS codes), that is for codes over hypercuboids. Here, we demonstrate the interdependence between graph endomorphisms, Latin hypercuboids and mixed MDS codes.
Recently S. Chmutov introduced a generalization of the dual of a ribbon (or embedded) graph and proved a relation between Bollobas and Riordan s ribbon graph polynomial of a ribbon graph and its generalized duals. Here I show that the duality relation satisfied by the ribbon graph polynomial can be understood in terms of knot theory and I give a simple proof of the relation via the homfly polynomial of a knot.
We study the rate of growth of $p(n,S,M)$, the number of partitions of $n$ whose parts all belong to $S$ and whose multiplicities all belong to $M$, where $S$ (resp. $M$) are given infinite sets of positive (resp. nonnegative) integers. We show that if $M$ is all nonnegative integers then $p(n,S,M)$ cannot be of only polynomial growth, and that no sharper statement can be made. We ask: if $p(n,S,M)>0$ for all large enough $n$, can $p(n,S,M)$ be of polynomial growth in $n$?
In 2009, Blagojevic, Matschke & Ziegler established the first tight colored Tverberg theorem, but no lower bounds for the number of colored Tverberg partitions. We develop a colored version of our previous results (2008), and we extend our results from the uncolored version: Evenness and non-trivial lower bounds for the number of colored Tverberg partitions. This follows from similar results on the number of colored Birch partitions.
The Hadwiger number h(G) of a graph G is the maximum size of a complete minor of G. Hadwiger s Conjecture states that h(G) >= \\chi(G). Since \\chi(G) \\alpha(G) >= |V(G)|, Hadwiger s Conjecture implies that \\alpha(G) h(G) >= |V(G)|. We show that (2 \\alpha(G) - \\lceil log_t(t \\alpha(G)/2) \\rceil) h(G) \\geq |V(G)| where t is approximately 6.83. For graphs with \\alpha(G) \\geq 14, this improves on a recent result of Kawarabayashi and Song who showed (2 \\alpha(G) - 2) h(G) >= |V(G)| when \\alpha(G) >= 3.
The {\\em Fibonacci cube} of dimension $n$, denoted as $\\Gamma\\_n$, is the subgraph of $n$-cube $Q\\_n$ induced by vertices with no consecutive 1 s. We study the maximum number of disjoint subgraphs in $\\Gamma\\_n$ isomorphic to $Q\\_k$, and denote this number by $q\\_k(n)$. We prove several recursive results for $q\\_k(n)$, in particular we prove that $q\\_{k}(n) = q\\_{k-1}(n-2) + q\\_{k}(n-3)$. We also prove a closed formula in which $q\\_k(n)$ is given in terms of Fibonacci numbers, and finally we give the generating function for the sequence $\\{q\\_{k}(n)\\}\\_{n=0}^{ \\infty}$.
Young s lattice, the lattice of all Young diagrams, has the Robinson-Schensted-Knuth correspondence, the correspondence between certain matrices and pairs of semi-standard Young tableaux with the same shape. Fomin introduced generalized Schur operators to generalize the Robinson-Schensted-Knuth correspondence. In this sense, generalized Schur operators are generalizations of semi-standard Young tableaux. We define a generalization of Schur polynomials as expansion coefficients of generalized Schur operators. We show that the commutating relation of generalized Schur operators implies Pieri s formula to generalized Schur polynomials.
We use methods from spectral graph theory to obtain bounds on the number of incidences between $k$-planes and $h$-planes in $\\mathbb{F}_q^d$ which generalize a recent result given by Bennett, Iosevich, and Pakianathan (2014). More precisely, we prove that the number of incidences between a set $\\mathcal{P}$ of $k$-planes and a set $\\mathcal{H}$ of $h$-planes with $h\\ge 2k+1$, which is denoted by $I(\\mathcal{P},\\mathcal{H})$, satisfies \\[\\left\\vert I(\\mathcal{P},\\mathcal{H})-\\frac{|\\mathcal{P}||\\mathcal{H}|}{q^{(d-h)(k+1)}}\\right\\vert \\lesssim q^{\\frac{(d-h)h+k(2h-d-k+1)}{2}}\\sqrt{|\\mathcal{P}||\\mathcal{H}|}. \\]
We give an interpretation of the coefficients of the two variable refinement $D_{\\Sh_n}(q,t)$ of the distance enumerator of the Shi hyperplane arrangement $\\Sh_n$ in $n$ dimensions. This two variable refinement was defined by Stanley \\cite{stan-rota} for the general $r$-extended Shi hyperplane arrangements. We give an interpretation when $r=1$. We define three natural three-dimensional partitions of the number $(n+1)^{n-1}$. The first arises from parking functions of length $n$, the second from special posets on $n$ vertices defined by Athanasiadis and the third from spanning trees on $n+1$ vertices. We call the three partitions as the parking partition, the tree-poset partition and the spanning-tree partition respectively. We show that one of the parts of the parking partition is identical to the number of edge-labelled trees with label set $\\{1,2,...,n\\}$ on $n+1$ unlabelled vertices. We prove that the parking partition majorises the tree-poset partition and conjecture that the spanning-tree partition also majorises the tree-poset partition.
We prove that a $q$-deformation $\\Disc k\\X q$ of the powers of the discriminant is equal, up to a normalization, to a specialization of a Macdonald polynomial indexed by a staircase partition. We investigate the expansion of $\\Disc k\\X q$ on different basis of symmetric functions. In particular, we show that its expansion on the monomial basis can be explicitly described in terms of standard tableaux and we generalize a result of King-Toumazet-Wybourne about the expansion of the $q$-discriminant on the Schur basis.
Evidence is presented to suggest that, in three dimensions, spherical 6-designs with N points exist for N=24, 26, >= 28; 7-designs for N=24, 30, 32, 34, >= 36; 8-designs for N=36, 40, 42, >= 44; 9-designs for N=48, 50, 52, >= 54; 10-designs for N=60, 62, >= 64; 11-designs for N=70, 72, >= 74; and 12-designs for N=84, >= 86. The existence of some of these designs is established analytically, while others are given by very accurate numerical coordinates. The 24-point 7-design was first found by McLaren in 1963, and -- although not identified as such by McLaren -- consists of the vertices of an \"improved\" snub cube, obtained from Archimedes  regular snub cube (which is only a 3-design) by slightly shrinking each square face and expanding each triangular face. 5-designs with 23 and 25 points are presented which, taken together with earlier work of Reznick, show that 5-designs exist for N=12, 16, 18, 20, >= 22. It is conjectured, albeit with decreasing confidence for t >= 9, that these lists of t-designs are complete and that no others exist. One of the constructions gives a sequence of putative spherical t-designs with N= 12m points (m >= 2) where N = t^2/2 (1+o(1)) as t -> infinity.
We give a new proof of the sufficiency of Landau s conditions for a non-decreasing sequence of integers to be the score sequence of a tournament. The proof involves jumping down a total order on sequences satisfying Landau s conditions and provides a $O(n^2)$ algorithm that can be used to construct a tournament whose score sequence is any in the total order. We also compare this algorithm with to other algorithms that jump along this total order, one jumping down and one jumping up.
Generating trees are a useful technique in the enumeration of various combinatorial objects, particularly restricted permutations. Quite often the generating tree for the set of permutations avoiding a set of patterns requires infinitely many labels. Sometimes, however, this generating tree needs only finitely many labels. We characterize the finite sets of patterns for which this phenomenon occurs. We also present an algorithm - in fact, a special case of an algorithm of Zeilberger - that is guaranteed to find such a generating tree if it exists.
Let $\\mathcal{G}(n,r,s)$ denote the uniform model of random $r$-regular $s$-uniform hypergraphs on $n$ vertices, where $s$ is a fixed constant and $r=r(n)$ may grow with $n$. An $\\ell$-overlapping Hamilton cycle is a Hamilton cycle in which successive edges overlap in precisely $\\ell$ vertices, and 1-overlapping Hamilton cycles are called loose Hamilton cycles. When $r,s\\geq 3$ are fixed integers, we establish a threshold result for the property of containing a loose Hamilton cycle. This partially verifies a conjecture of Dudek, Frieze, Rucinski and Sileikis (2015). In this setting, we also find the asymptotic distribution and expected value of the number of loose Hamilton cycles in $\\mathcal{G}(n,r,s)$. Finally we prove that for $\\ell = 2,\\ldots, s-1$ and for $r$ growing moderately as $n\\to\\infty$, the probability that $\\mathcal{G}(n,r,s)$ has a $\\ell$-overlapping Hamilton cycle tends to zero.
This paper studies the rainbow connection number of the power graph $\\Gamma_G$ of a finite group $G$. We determine the rainbow connection number of $\\Gamma_G$ if $G$ has maximal involutions or is nilpotent, and show that the rainbow connection number of $\\Gamma_G$ is at most three if $G$ has no maximal involutions. The rainbow connection numbers of power graphs of some nonnilpotent groups are also given.
A \\emph{sign pattern (matrix)} is a matrix whose entries are from the set $\\{+, -, 0\\}$. The \\emph{minimum rank} (respectively, \\emph{rational minimum rank}) of a sign pattern matrix $\\cal A$ is the minimum of the ranks of the real (respectively, rational) matrices whose entries have signs equal to the corresponding entries of $\\cal A$. A sign pattern $\\cal A$ is said to be \\emph{condensed} if $\\cal A$ has no zero row or column and no two rows or columns are identical or negatives of each other. In this paper, a new direct connection between condensed $m \\times n $ sign patterns with minimum rank $r$ and $m$ point--$n$ hyperplane configurations in ${\\mathbb R}^{r-1}$ is established. In particular, condensed sign patterns with minimum rank 3 are closed related to point--line configurations on the plane. It is proved that for any sign pattern $\\cal A$ with minimum rank $r\\geq 3$, if the number of zero entries on each column of $\\cal A$ is at most $r-1$, then the rational minimum rank of $\\cal A$ is also $r$. Furthermore, we construct the smallest known sign pattern whose minimum rank is 3 but whose rational minimum rank is greater than 3.
Let $\\mathcal{T}_3$ be the three-rowed strip. Recently Regev conjectured that the number of standard Young tableaux with $n-3$ entries in the \"skew three-rowed strip\" $\\mathcal{T}_3 / (2,1,0)$ is $m_{n-1}-m_{n-3}$, a difference of two Motzkin numbers. This conjecture, together with hundreds of similar identities, were derived automatically and proved rigorously by Zeilberger via his powerful program and WZ method. It appears that each one is a linear combination of Motzkin numbers with constant coefficients. In this paper we will introduce a simple bijection between Motzkin paths and standard Young tableaux with at most three rows. With this bijection we answer Zeilberger s question affirmatively that there is a uniform way to construct bijective proofs for all of those identites.
We provide several constructions for problems in Ramsey theory. First, we prove a superexponential lower bound for the classical 4-uniform Ramsey number $r_4(5,n)$, and the same for the iterated $(k-4)$-fold logarithm of the $k$-uniform version $r_k(k+1,n)$. This is the first improvement of the original exponential lower bound for $r_4(5,n)$ implicit in work of Erdos and Hajnal from 1972 and also improves the current best known bounds for larger $k$ due to the authors. Second, we prove an upper bound for the hypergraph Erdos-Rogers function $f^k_{k+1, k+2}(N)$ that is an iterated $(k-13)$-fold logarithm in $N$. This improves the previous upper bounds that were only logarithmic and addresses a question of Dudek and the first author that was reiterated by Conlon, Fox and Sudakov. Third, we generalize the results of Erdos and Hajnal about the 3-uniform Ramsey number of $K_4$ minus an edge versus a clique to $k$-uniform hypergraphs. Finally, we observe that Ramsey graphs can be transformed to tournaments with no large transitive subtournament, and this gives explicit constructions of superpolynomial size for the Erdos-Moser problem about tournaments with no large transitive subtournament.
Motivated by a connection with the factorization of multivariate polynomials, we study integral convex polytopes and their integral decompositions in the sense of the Minkowski sum. We first show that deciding decomposability of integral polygons is NP-complete then present a pseudo-polynomial time algorithm for decomposing polygons. For higher dimensional polytopes, we give a heuristic algorithm which is based upon projections and uses randomization. Applications of our algorithm include absolute irreducibility testing and factorization of polynomials via their Newton polytopes.
In rotor walk on a finite directed graph, the exits from each vertex follow a prescribed periodic sequence. Here we consider the case of rotor walk where a particle starts from a designated source vertex and continues until it hits a designated target set, at which point the walk is restarted from the source. We show that the sequence of successively hit targets, which is easily seen to be eventually periodic, is in fact periodic. We show moreover that reversing the periodic patterns of all rotor sequences causes the periodic pattern of the hitting sequence to be reversed as well. The proofs involve a new notion of equivalence of rotor configurations, and an extension of rotor walk incorporating time-reversed particles.
We study multiplication of any Schubert polynomial $\\mathfrak{S}_w$ by a Schur polynomial $s_\\lambda$ (the Schubert polynomial of a Grassmannian permutation) and the expansion of this product in the ring of Schubert polynomials. We derive explicit nonnegative combinatorial expressions for the expansion coefficients for certain special partitions $\\lambda$, including hooks and the 2x2 box. We also prove combinatorially the existence of such nonnegative expansion when the Young diagram of $\\lambda$ is a hook plus a box at the (2,2) corner. We achieve this by evaluating Schubert polynomials at the Dunkl elements of the Fomin-Kirillov algebra and proving special cases of the nonnegativity conjecture of Fomin and Kirillov. This approach works in the more general setup of the (small) quantum cohomology ring of the complex flag manifold and the corresponding (3-point) Gromov-Witten invariants. We provide an algebro-combinatorial proof of the nonnegativity of the Gromov-Witten invariants in these cases, and present combinatorial expressions for these coefficients.
A hypergraph is said to be 2-colorable if there exists a 2-coloring of its vertices such that no hyperedge is monochromatic. On the other hand, a hypergraph is called non-2-colorable if there exists at least one monochromatic hyperedge in each of the possible 2-colorings of its vertex set. Let m(n) denote the minimum number of hyperedges in a non-2-colorable n-uniform hypergraph. Establishing the lower and upper bounds on m(n) has been a well-studied research direction over several decades. In this paper, we improve the upper bounds for m(8), m(13), m(14), m(16) and m(17) by constructing non-2-colorable n-uniform hypergraphs. We also improve the lower bound for m(5).
A common theme in many extremal problems in graph theory is the relation between local and global properties of graphs. One of the most celebrated results of this type is the Ruzsa-Szemer\\ edi triangle removal lemma, which states that if a graph is $\\varepsilon$-far from being triangle free, then most subsets of vertices of size $C(\\varepsilon)$ are not triangle free. Unfortunately, the best known upper bound on $C(\\varepsilon)$ is given by a tower-type function, and it is known that $C(\\varepsilon)$ is not polynomial in $\\varepsilon^{-1}$. The triangle removal lemma has been extended to many other graph properties, and for some of them the corresponding function $C(\\varepsilon)$ is polynomial. This raised the natural question, posed by Goldreich in 2005 and more recently by Alon and Fox, of characterizing the properties for which one can prove removal lemmas with polynomial bounds. Our main results in this paper are new sufficient and necessary criteria for guaranteeing that a graph property admits a removal lemma with a polynomial bound. Although both are simple combinatorial criteria, they imply almost all prior positive and negative results of this type. Moreover, our new sufficient conditions allow us to obtain polynomially bounded removal lemmas for many properties for which the previously known bounds were of tower-type. In particular, we show that every {\\em semi-algebraic} graph property admits a polynomially bounded removal lemma. This confirms a conjecture of Alon.
We introduce the Tesler polytope Tes_n(a_1,a_2,...,a_n), whose integer points are the Tesler matrices of size n with hook sums a_1,a_2,...,a_n in Z_{\\geq 0}. We show that Tes_n(a) is a flow polytope and therefore the number of Tesler matrices is counted by the type A_n Kostant partition function evaluated at (a_1,a_2,...,a_n,-\\sum_{i=1}^n a_i). We describe the faces of this polytope in terms of \"Tesler tableaux\" and characterize when the polytope is simple. We prove that the h-vector of Tes_n(a) when all a_i>0 is given by the Mahonian numbers and calculate the volume of Tes_n(1,1,...,1) to be a product of consecutive Catalan numbers multiplied by the number of standard Young tableaux of staircase shape.
Let $ES(n)$ be the minimal integer such that any set of $ES(n)$ points in the plane in general position contains $n$ points in convex position. The problem of estimating $ES(n)$ was first formulated by Erd\\H{o}s and Szekeres, who proved that $ES(n) \\leq \\binom{2n-4}{n-2}+1$. The current best upper bound, $\\lim\\sup_{n \\to \\infty} \\frac{ES(n)}{\\binom{2n-5}{n-2}}\\le \\frac{29}{32}$, is due to Vlachos. We improve this to $$\\lim\\sup_{n \\to \\infty} \\frac{ES(n)}{\\binom{2n-5}{n-2}}\\le \\frac{7}{8}.$$
We study Dohmen--P\\\"onitz--Tittmann s bivariate chromatic polynomial $c_\\Gamma(k,l)$ which counts all $(k+l)$-colorings of a graph $\\Gamma$ such that adjacent vertices get different colors if they are $\\le k$. Our first contribution is an extension of $c_\\Gamma(k,l)$ to signed graphs, for which we obtain an inclusion--exclusion formula and several special evaluations giving rise, e.g., to polynomials that encode balanced subgraphs. Our second goal is to derive combinatorial reciprocity theorems for $c_\\Gamma(k,l)$ and its signed-graph analogues, reminiscent of Stanley s reciprocity theorem linking chromatic polynomials to acyclic orientations.
We describe some theoretical results on triangulations of surfaces and we develop a theory on roots, decompositions and genus-surfaces. We apply this theory to describe an algorithm to list all triangulations of closed surfaces with at most a fixed number of vertices. We specialize the theory for the case where the number of vertices is at most 11 and we get theoretical restrictions on genus-surfaces allowing us to get the list of triangulations of closed surfaces with at most 11 vertices.
A $k$-tuple total dominating set ($k$TDS) of a graph $G$ is a set $S$ of vertices in which every vertex in $G$ is adjacent to at least $k$ vertices in $S$; the minimum size of a $k$TDS is denoted $\\gamma_{\\times k,t}(G)$. We give a Vizing-like inequality for Cartesian product graphs, namely $\\gamma_{\\times k,t}(G) \\gamma_{\\times k,t}(H) \\leq 2k \\gamma_{\\times k,t}(G \\Box H)$ provided $\\gamma_{\\times k,t}(G) \\leq 2k\\rho(G)$, where $\\rho$ is the packing number. We also give bounds on $\\gamma_{\\times k,t}(G \\Box H)$ in terms of (open) packing numbers, and consider the extremal case of $\\gamma_{\\times k,t}(K_n \\Box K_m)$, i.e., the rook s graph, giving a constructive proof of a general formula for $\\gamma_{\\times 2, t}(K_n \\Box K_m)$.
We present a method, illustrated by several examples, to find explicit counts of permutations containing a given multiset of three letter patterns. The method is recursive, depending on bijections to reduce to the case of a smaller multiset, and involves a consideration of separate cases according to how the patterns overlap. Specifically, we use the method (i) to provide combinatorial proofs of Bona s formula {2n-3}choose{n-3} for the number of n-permutations containing one 132 pattern and Noonan s formula 3/n {2n}choose{n+3} for one 123 pattern, (ii) to express the number of n-permutations containing exactly k 123 patterns in terms of ballot numbers for k<=4, and (iii) to express the number of 123-avoiding n-permutations containing exactly k 132 patterns as a linear combination of powers of 2, also for k<=4. The results strengthen the conjecture that the counts are algebraic for all k.
We prove that every $k$-list-critical graph ($k \\ge 7$) on $n \\ge k+2$ vertices has at least $\\frac12 \\left(k-1 + \\frac{k-3}{(k-c)(k-1) + k-3}\\right)n$ edges where $c = (k-3)\\left(\\frac12 - \\frac{1}{(k-1)(k-2)}\\right)$. This improves the bound established by Kostochka and Stiebitz. The same bound holds for online $k$-list-critical graphs, improving the bound established by Riasat and Schauz. Both bounds follow from a more general result stating that either a graph has many edges or it has an Alon-Tarsi orientable induced subgraph satisfying a certain degree condition.
This paper primarily studies monomial ideals by their associated lcm-lattices. It first introduces notions of weak coordinatizations of finite atomic lattices which have weaker hypotheses than coordinatizations and shows the characterizations of all such weak coordinatizations. It then defines a finite super-atomic lattice in $\\mathcal{L}(n)$, investigates the structures of $\\mathcal{L}(n)$ by their super-atomic lattices and proposes an algorithm to calculate all the super-atomic lattices in $\\mathcal{L}(n)$. It finally presents a specific labeling of finite atomic lattice and obtains the conditions that the specific labelings of finite atomic lattices are the weak coordinatizations or the coordinatizations by using the terminology of super-atomic lattices.
A k-ary semi-algebraic relation E on R^d is a subset of R^{kd}, the set of k-tuples of points in R^d, which is determined by a finite number of polynomial equations and inequalities in kd real variables. The description complexity of such a relation is at most t if the number of polynomials and their degrees are all bounded by t. A subset A of R^d is called homogeneous if all or none of the k-tuples from A satisfy E. A large number of geometric Ramsey-type problems and results can be formulated as questions about finding large homogeneous subsets of sets in R^d equipped with semi-algebraic relations. In this paper we study Ramsey numbers for k-ary semi-algebraic relations of bounded complexity and give matching upper and lower bounds, showing that they grow as a tower of height k-1. This improves on a direct application of Ramsey s theorem by one exponential and extends a result of Alon, Pach, Pinchasi, Radoi\\v{c}i\\ c, and Sharir, who proved this for k=2. We apply our results to obtain new estimates for some geometric Ramsey-type problems relating to order types and one-sided sets of hyperplanes. We also study the off-diagonal case, achieving some partial results.
In this paper we first analyze the behaviour of the identifying code number under union and join operations in graphs. This study forced us to analyze three new parameters related to identifying codes, dominating sets and total dominating sets of the complementary graph. We obtain closed formulas for these parameters on spider and quasi-spider graphs. These results easily derive in a linear dynamic programming-based algorithm for the Identifying Code problem for $P_4$-tidy graphs.
We generalize the results of Ksavrelof and Zeng about the multidistribution of the excedance number of $S_n$ with some natural parameters to the colored permutation group and to the Coxeter group of type $D$. We define two different orders on these groups which induce two different excedance numbers. Surprisingly, in the case of the colored permutation group, we get the same generalized formulas for both orders.
A subset $S\\subseteq V$ in a graph $G=(V,E)$ is a total $[1,2]$-set if, for every vertex $v\\in V$, $1\\leq |N(v)\\cap S|\\leq 2$. The minimum cardinality of a total $[1,2]$-set of $G$ is called the total $[1,2]$-domination number, denoted by $\\gamma_{t[1,2]}(G)$. We establish two sharp upper bounds on the total [1,2]-domination number of a graph $G$ in terms of its order and minimum degree, and characterize the corresponding extremal graphs achieving these bounds. Moreover, we give some sufficient conditions for a graph without total $[1,2]$-set and for a graph with the same total $[1,2]$-domination number, $[1,2]$-domination number and domination number.
To flatten a set partition (with apologies to Mathematica) means to form a permutation by erasing the dividers between its blocks. Of course, the result depends on how the blocks are listed. For the usual listing--increasing entries in each block and blocks arranged in increasing order of their first entries--we count the partitions of [n] whose flattening avoids a single 3-letter pattern. Five counting sequences arise: a null sequence, the powers of 2, the Fibonacci numbers, the Catalan numbers, and the binomial transform of the Catalan numbers.
In this paper, we show that the new lower bound for sorting signed permutations by reversals obtained recently by Chen and Reidys, via plane permutations, can be interpreted as the topological genera of orientable surfaces associated to signed permutations. We also prove that the lower bound equals the lower bound obtained by Bafna and Pevzner through breakpoint graphs. The ideas used in the proof establish a conjecture on skew-symmetric plane permutations as well.
Given a graph $H$, the size Ramsey number $r_e(H,q)$ is the minimal number $m$ for which there is a graph $G$ with $m$ edges such that every $q$-coloring of $G$ contains a monochromatic copy of $H$. We study the size Ramsey number of the directed path of length $n$ in oriented graphs, where no antiparallel edges are allowed. We give nearly tight bounds for every fixed number of colors, showing that for every $q\\geq 1 $ there are constants $c_1 = c_1(q),c_2$ such that $$\\frac{c_1(q) n^{2q}(\\log n)^{1/q}}{(\\log\\log n)^{(q+2)/q}} \\leq r_e(\\overrightarrow{P_n},q+1) \\leq c_2 n^{2q}(\\log {n})^2.$$ Our results show that the path size Ramsey number in oriented graphs is asymptotically larger than the path size Ramsey number in general directed graphs. Moreover, the size Ramsey number of a directed path is polynomially dependent in the number of colors, as opposed to the undirected case. Our approach also gives tight bounds on $r_e(\\overrightarrow{P_n},q)$ for general directed graphs with $q \\geq 3$, extending previous results.
The minimum number of distinct eigenvalues, taken over all real symmetric matrices compatible with a given graph $G$, is denoted by $q(G)$. Using other parameters related to $G$, bounds for $q(G)$ are proven and then applied to deduce further properties of $q(G)$. It is shown that there is a great number of graphs $G$ for which $q(G)=2$. For some families of graphs, such as the join of a graph with itself, complete bipartite graphs, and cycles, this minimum value is obtained. Moreover, examples of graphs $G$ are provided to show that adding and deleting edges or vertices can dramatically change the value of $q(G)$. Finally, the set of graphs $G$ with $q(G)$ near the number of vertices is shown to be a subset of known families of graphs with small maximum multiplicity.
Metacirculants are a basic and well-studied family of vertex-transitive graphs, and weak metacirculants are generalizations of them. A graph is called a weak metacirculant if it has a vertex-transitive metacyclic automorphism group. This paper is devoted to the study of weak metacirculants with odd prime power order. We first prove that a weak metacirculant of odd prime power order is a metacirculant if and only if it has a vertex-transitive split metacyclic automorphism group. We then prove that for any odd prime $p$ and integer $\\ell\\geq 4$, there exist weak metacirculants of order $p^\\ell$ which are Cayley graphs but not Cayley graphs of any metacyclic group; this answers a question in [C. H. Li, S. J. Song and D. J. Wang, A characterization of metacirculants, J. Combin. Theory Ser. A 120 (2013) 39--48]. We construct such graphs explicitly by introducing a construction which is a generalization of generalized Petersen graphs. Finally, we determine all smallest possible metacirculants of odd prime power order which are Cayley graphs but not Cayley graphs of any metacyclic group.
In this paper we unify many existing regularity conditions for graphs, including strong regularity, $k$-isoregularity, and the $t$-vertex condition. We develop an algebraic composition/decomposition theory of regularity conditions. Using our theoretical results a we show that a family of graphs satisfying the $7$-vertex condition fulfills an even stronger condition --- $(3,7)$-regularity (the notion is defined in the text). Derived from this family we obtain a new infinite family of non-rank 3 strongly regular graphs satisfying the $6$-vertex condition.
We analyze the asymptotic extremal growth rate of the Betti numbers of clique complexes of graphs on n vertices not containing a fixed forbidden induced subgraph H. In particular, we prove a theorem of the alternative: for any H the growth rate achieves exactly one of five possible exponentials, that is, independent of the field of coefficients, the nth root of the maximal total Betti number over n-vertex graphs with no induced copy of H has a limit, as n tends to infinity, and, ranging over all H, exactly five different limits are attained. For the interesting case where H is the 4-cycle, the above limit is 1, and we prove a slightly superpolynomial upper bound.
We show that every graph of maximum degree 3 can be represented as the intersection graph of axis parallel boxes in three dimensions, that is, every vertex can be mapped to an axis parallel box such that two boxes intersect if and only if their corresponding vertices are adjacent. In fact, we construct a representation in which any two intersecting boxes just touch at their boundaries. Further, this construction can be realized in linear time.
We study the exactness of certain combinatorially defined complexes which generalize the Orlik-Solomon algebra of a geometric lattice. The main results pertain to complex reflection arrangements and their restrictions. In particular, we consider the corresponding relation complexes and give a simple proof of the $n$-formality of these hyperplane arrangements. As an application, we are able to bound the Castelnouvo-Mumford regularity of certain modules over polynomial rings associated to Coxeter arrangements (real reflection arrangements) and their restrictions. The modules in question are defined using the relation complex of the Coxeter arrangement and fiber polytopes of the dual Coxeter zonotope. They generalize the algebra of piecewise polynomial functions on the original arrangement.
Using the combinatorial formula for the transformed Macdonald polynomials of Haglund, Haiman, and Loehr, we investigate the combinatorics of the symmetry relation $\\widetilde{H}_\\mu(\\mathbf{x};q,t) = \\widetilde{H}_{\\mu^\\ast}(\\mathbf{x};t,q)$. We provide a purely combinatorial proof of the relation in the case of Hall-Littlewood polynomials ($q=0$) when $\\mu$ is a partition with at most three rows, and for the coefficients of the square-free monomials in $\\mathbf{x}$ for all shapes $\\mu$. We also provide a proof for the full relation in the case when $\\mu$ is a hook shape, and for all shapes at the specialization $t=1$. Our work in the Hall-Littlewood case reveals a new recursive structure for the cocharge statistic on words.
In this paper, we propose a notion of colored Motzkin paths and establish a bijection between the $n$-cell standard Young tableaux (SYT) of bounded height and the colored Motzkin paths of length $n$. This result not only gives a lattice path interpretation of the standard Young tableaux but also reveals an unexpected intrinsic relation between the set of SYTs with at most $2d+1$ rows and the set of SYTs with at most 2d rows.
We show that every bridgeless cubic graph $G$ with $m$ edges has a cycle cover of length at most $1.6 m$. Moreover, if $G$ does not contain any intersecting circuits of length $5$, then $G$ has a cycle cover of length $212/135 \\cdot m \\approx 1.570 m$ and if $G$ contains no $5$-circuits, then it has a cycle cover of length at most $14/9 \\cdot m \\approx 1.556 m$. To prove our results, we show that each $2$-edge-connected cubic graph $G$ on $n$ vertices has a $2$-factor containing at most $n/10+f(G)$ circuits of length $5$, where the value of $f(G)$ only depends on the presence of several subgraphs arising from the Petersen graph. As a corollary we get that each $3$-edge-connected cubic graph on $n$ vertices has a $2$-factor containing at most $n/9$ circuits of length $5$ and each $4$-edge-connected cubic graph on $n$ vertices has a $2$-factor containing at most $n/10$ circuits of length $5$.
We show that for every $\\varepsilon>0$ there is an absolute constant $c(\\varepsilon)>0$ such that the following is true. The union of any $n$ arithmetic progressions, each of length $n$, with pairwise distinct differences must consist of at least $c(\\varepsilon)n^{2-\\varepsilon}$ elements. We observe, by construction, that one can find $n$ arithmetic progressions, each of length $n$, with pairwise distinct differences such that the cardinality of their union is $o(n^2)$. We refer also to the non-symmetric case of $n$ arithmetic progressions, each of length $\\ell$, for various regimes of $n$ and $\\ell$.
The metric dimension is quite a well-studied graph parameter. Recently, the adjacency metric dimension and the local metric dimension have been introduced. We combine these variants and introduce the local adjacency metric dimension. We show that the (local) metric dimension of the corona product of a graph of order $n$ and some non-trivial graph $H$ equals $n$ times the (local) adjacency metric dimension of $H$. This strong relation also enables us to infer computational hardness results for computing the (local) metric dimension, based on according hardness results for (local) adjacency metric dimension that we also provide. We also study combinatorial properties of the strong product of graphs and emphasize the role different types of twins play in determining in particular the adjacency metric dimension of a graph.
In this paper we present a topological framework for studying signed permutations and their reversal distance. As a result we can give an alternative approach and interpretation of the Hannenhalli-Pevzner formula for the reversal distance of signed permutations. Our approach utlizes the Poincar\\ e dual, upon which reversals act in a particular way and obsoletes the notion of \"padding\" of the signed permutations. To this end we construct a bijection between signed permutations and an equivalence class of particular fatgraphs, called $\\pi$-maps, and analyze the action of reversals on the latter. We show that reversals act via either slicing, gluing or half-flipping of external vertices, which implies that any reversal changes the topological genus by at most one. Finally we revisit the Hannenhalli-Pevzner formula employing orientable and non-orientable, irreducible, $\\pi$-maps.
In this paper we prove a sufficient condition for the existence of a Hamilton cycle, which is applicable to a wide variety of graphs, including relatively sparse graphs. In contrast to previous criteria, ours is based on only two properties: one requiring expansion of ``small   sets, the other ensuring the existence of an edge between any two disjoint ``large   sets. We also discuss applications in positional games, random graphs and extremal graph theory.
Neighborly cubical polytopes exist: for any $n\\ge d\\ge 2r+2$, there is a cubical convex d-polytope $C^n_d$ whose $r$-skeleton is combinatorially equivalent to that of the $n$-dimensional cube. This solves a problem of Babson, Billera & Chan. Kalai conjectured that the boundary $\\partial C^n_d$ of a neighborly cubical polytope $C^n_d$ maximizes the $f$-vector among all cubical $(d-1)$-spheres with $2^n$ vertices. While we show that this is true for polytopal spheres for $n\\le d+1$, we also give a counter-example for $d=4$ and $n=6$. Further, the existence of neighborly cubical polytopes shows that the graph of the $n$-dimensional cube, where $n\\ge5$, is ``dimensionally ambiguous   in the sense of Gr\\\"unbaum. We also show that the graph of the 5-cube is ``strongly 4-ambiguous  . In the special case $d=4$, neighborly cubical polytopes have $f_3=f_0/4 \\log_2 f_0/4$ vertices, so the facet-vertex ratio $f_3/f_0$ is not bounded; this solves a problem of Kalai, Perles and Stanley studied by Jockusch.
For given a graph $H$, a graphic sequence $\\pi=(d_1,d_2,...,d_n)$ is said to be potentially $H$-graphic if there exists a realization of $\\pi$ containing $H$ as a subgraph. Let $K_m-H$ be the graph obtained from $K_m$ by removing the edges set $E(H)$ where $H$ is a subgraph of $K_m$. In this paper, we characterize potentially $K_{2,5}$-graphic sequences. This characterization implies a special case of a theorem due to Yin et al. [26].
We describe procedures for generating all 2-cell embedded simple graphs with up to a fixed number of vertices on a given surface. We also modify these procedures to generate closed 2-cell embeddings and polyhedral embeddings. We give results of computer implementations of these procedures for seven surfaces: the sphere, the torus, the double torus, the projective plane, the Klein bottle, the triple cross surface, and the quadruple cross surface.
A linear chord diagram of size $n$ is a partition of the set $\\{1,2,\\cdots,2n\\}$ into sets of size two, called chords. From a table showing the number of linear chord diagrams of degree $n$ such that every chord has length at least $k$, we observe that if we proceed far enough along the diagonals, they are given by a geometric sequence. We prove that this holds for all diagonals, and identify when the effect starts.
We answer some questions concerning the so called sigma-game of Sutner. It is played on a graph where each vertex has a lamp, the light of which is toggled by pressing any vertex with an edge directed to the lamp. For example, we show that every configuration of lamps can be lit if and only if the number of complete matchings in the graph is odd. In the special case of an orthogonal grid one gets a criterion for whether the number of monomer-dimer tilings of an m times n grid is odd or even.
Assume that D is a digraph without cyclic triangles and its vertices are partitioned into classes A_1,...,A_t of independent vertices. A set $U=\\cup_{i\\in S} A_i$ is called a dominating set of size |S| if for any vertex $v\\in \\cup_{i\\notin S} A_i$ there is a w in U such that (w,v) is in E(D). Let beta(D) be the cardinality of the largest independent set of D whose vertices are from different partite classes of D. Our main result says that there exists a h=h(beta(D)) such that D has a dominating set of size at most h. This result is applied to settle a problem related to generalized Gallai colorings, edge colorings of graphs without 3-colored triangles.
Let $G$ be a graph and $\\mathcal{K}_G$ be the set of all cliques of $G$, then the clique graph of G denoted by $K(G)$ is the graph with vertex set $\\mathcal{K}_G$ and two elements $Q_i,Q_j \\in \\mathcal{K}_G$ form an edge if and only if $Q_i \\cap Q_j \\neq \\emptyset$. Iterated clique graphs are defined by $K^0(G)=G$, and $K^n(G)=K(K^{n-1}(G))$ for $n>0$. In this paper we determine the number of cliques in $K(G)$ when $G=G_1+G_2$, prove a necessary and sufficient condition for a clique graph $K(G)$ to be complete when $G=G_1+G_2$, give a characterization for clique convergence of the join of graphs and if $G_1$, $G_2$ are Clique-Helly graphs different from $K_1$ and $G=G_1 \\Box G_2$, then $K^2(G) = G$.
For the elements of a Coxeter group, we present a statistic called depth, defined in terms of factorizations of the elements into products of reflections. Depth is bounded above by length and below by the average of length and reflection length. In this article, we focus on the case of the symmetric group, where we show that depth is equal to sum_i max{w(i)-i, 0}. We characterize those permutations for which depth equals length: these are the 321-avoiding permutations (and hence are enumerated by the Catalan numbers). We also characterize those permutations for which depth equals reflection length: these are permutations avoiding both 321 and 3412 (also known as boolean permutations, which we can hence also enumerate). In this case, it also happens that length equals reflection length, leading to a new perspective on a result of Edelman.
The smallest number of cliques, covering all edges of a graph $ G $, is called the (edge) clique cover number of $ G $ and is denoted by $ cc(G) $. It is an easy observation that for every line graph $ G $ with $ n $ vertices, $cc(G)\\leq n $. G. Chen et al. [Discrete Math. 219 (2000), no. 1--3, 17--26; MR1761707] extended this observation to all quasi-line graphs and questioned if the same assertion holds for all claw-free graphs. In this paper, using the celebrated structure theorem of claw-free graphs due to Chudnovsky and Seymour, we give an affirmative answer to this question for all claw-free graphs with independence number at least three. In particular, we prove that if $ G $ is a connected claw-free graph on $ n $ vertices with $ \\alpha(G)\\geq 3 $, then $ cc(G)\\leq n $ and equality holds if and only if $ G $ is either the graph of icosahedron, or the complement of a graph on $10$ vertices called twister or the $p^{th}$ power of the cycle $ C_n $, for $1\\leq p \\leq \\lfloor (n-1)/3\\rfloor $.
Every bi-uniform matroid is representable over all sufficiently large fields. But it is not known exactly over which finite fields they are representable, and the existence of efficient methods to find a representation for every given bi-uniform matroid has not been proved. The interest of these problems is due to their implications to secret sharing. The existence of efficient methods to find representations for all bi-uniform matroids is proved here for the first time. The previously known efficient constructions apply only to a particular class of bi-uniform matroids, while the known general constructions were not proved to be efficient. In addition, our constructions provide in many cases representations over smaller finite fields.
A graph with vertex set V and edge set E is called a (d,c)-expander if the maximum degree of a vertex is d and, for every subset W of V that has cardinality at most |V|/2, the number of edges between vertices in W and vertices outside of W is at least c|V|. This note considers a related combinatorial question: \"For which integers d and functions f_d does there exist, for every large enough v, a bipartite d-regular multigraph on 2v nodes with node sets V and W having the following property: For every U that is a subset of either V or W, the cardinality of the set of neighbours of U is at least f_d(|U|)?\" Graphs with the above property seem to behave well also with respect to other, more complicated, expansion-type properties. We provide results for d in {5,6,7,8} and give a description of a fairly general methodology for devising computer-assisted proofs for a wide class of mathematical claims using so called interval arithmetic.
Generalized Dyck paths (or discrete excursions) are one-dimensional paths that take their steps in a given finite set S, start and end at height 0, and remain at a non-negative height. Bousquet-M\\ elou showed that the generating function E_k of excursions of height at most k is of the form F_k/F_{k+1}, where the F_k are polynomials satisfying a linear recurrence relation. We give a combinatorial interpretation of the polynomials F_k and of their recurrence relation using a transfer matrix method. We then extend our method to enumerate discrete meanders (or paths that start at 0 and remain at a non-negative height, but may end anywhere). Finally, we study the particular case where the set S is symmetric and show that several simplifications occur.
We provide new evidence that spanning forests of graphs satisfy the same negative correlation properties as spanning trees, derived from Lord Rayleigh s monotonicity property for electrical networks. The main result of this paper is that the Rayleigh difference for the spanning forest generating polynomial of a series parallel graph can be expressed as a certain positive sum of monomials times squares of polynomials. We also show that every regular matroid is independent-set-Rayleigh if and only if every basis-Rayleigh binary matroid is also independent-set-Rayleigh.
A tight Heffter array H(m,n) is an m x n matrix with nonzero entries from Z_{2mn+1} such that i) the sum of the elements in each row and each column is 0, and ii) no element from {x,-x\\ appears twice. We prove that H(m,n) exist if and only if both m and n are at least 3. If all entries are integers of magnitude at most mn satisfying every row and column sum is 0 over the integers and also satisfying ii) we call H an integer Heffter array. We show integer Heffter arrays exist if and only if mn \\equiv 0,3 (mod 4). Finally, an integer Heffter array is shiftable if each row and column contains an the same number of positive and negative integers. We show that shiftable integer arrays exists exactly when both $m,n$ are even. This research report contains all of the details of the proofs. It is meant to accompany the journal version of this paper.
A graph is called normal if its vertex set can be covered by cliques and also by stable sets, such that every such clique and stable set have non-empty intersection. This notion is due to Korner, who introduced the class of normal graphs as an extension of the class of perfect graphs. Normality has also relevance in information theory. Here we prove, that the line graphs of cubic graphs are normal.
The proper parts of face lattices of convex polytopes are shown to satisfy a strong form of the Cohen--Macaulay property, namely that removing from their Hasse diagram all edges in any closed interval results in a Cohen--Macaulay poset of the same rank. A corresponding notion of edgewise Cohen--Macaulay connectivity for partially ordered sets is investigated. Examples and open questions are discussed.
Let $(X,S)$ be an association scheme where $X$ is a finite set and $S$ is a partition of $X\\times X$. We say that $(X,S)$ is symmetric if $\\sigma_s$ is symmetric for each $s\\in S$ where $\\sigma_s$ is the adjacency matrix of $s$, and integral if $\\bigcup_{s\\in S}\\mathrm{ev}(\\sigma_s)\\subseteq \\mathbb{Z}$ where $\\mathrm{ev}(\\sigma_s)$ is the set of all eigenvalues of $\\sigma_s$. For an association scheme $(X,T)$ we say that $(X,T)$ is a fusion of $(X,S)$ if each element of $T$ is a union of elements of $S$. In this article we aim to characterize association schemes all of whose symmetric fusions are integral, and classify those obtained from a regular action of a finite group by taking its orbitals.
Determining if a symmetric function is Schur-positive is a prevalent and, in general, a notoriously difficult problem. In this paper we study the Schur-positivity of a family of symmetric functions. Given a partition \\lambda, we denote by \\lambda^c its complement in a square partition (m^m). We conjecture a Schur-positivity criterion for symmetric functions of the form s_{\\mu }s_{\\mu^c}-s_{\\lambda }s_{\\lambda^c}, where \\lambda is a partition of weight |\\mu|-1 contained in \\mu and the complement of \\mu is taken in the same square partition as the complement of \\lambda. We prove the conjecture in many cases.
The packing chromatic number $\\chi_{\\rho}(G)$ of a graph $G$ is the smallest integer $p$ such that vertices of $G$ can be partitioned into disjoint classes $X_{1}, ..., X_{p}$ where vertices in $X_{i}$ have pairwise distance greater than $i$. For $k < t$ we study the packing chromatic number of infinite distance graphs $D(k, t)$, i.e. graphs with the set $\\Z$ of integers as vertex set and in which two distinct vertices $i, j \\in \\Z$ are adjacent if and only if $|i - j| \\in \\{k, t\\}$. We generalize results by Ekstein et al. for graphs $D (1, t)$. For sufficiently large $t$ we prove that $\\chi_{\\rho}(D(k, t)) \\leq 30$ for both $k$, $t$ odd, and that $\\chi_{\\rho}(D(k, t)) \\leq 56$ for exactly one of $k$, $t$ odd. We also give some upper and lower bounds for $\\chi_{\\rho}(D(k, t))$ with small $k$ and $t$. Keywords: distance graph; packing coloring; packing chromatic number
Let $K_n^c$ be an edge-coloured complete graph on $n$ vertices. Let $\\Delta_{\\rm mon}(K_n^c)$ denote the largest number of edges of the same colour incident with a vertex of $K_n^c$. A properly coloured cycle is a cycle such that no two adjacent edges have the same colour. In 1976, Bollob\\ as and Erd\\H{o}s conjectured that every $K_n^c$ with $\\Delta_{\\rm mon}(K_n^c) < \\lfloor n/2 \\rfloor$ contains a properly coloured Hamiltonian cycle. In this paper, we show that for any $\\varepsilon > 0 $, there exists an integer $n_0$ such that every $K_n^c$ with $\\Delta_{\\rm mon}(K_n^c) < (1/2 - \\varepsilon) n $ and $n \\ge n_0$ contains a properly coloured Hamiltonian cycle. This improves a result of Alon and Gutin. Hence, the conjecture of Bollob\\ as and Erd\\H{o}s is true asymptotically.
In this paper, we introduce and study various kinds of decomposition complexity. First, we give a characterization of residually finite groups having finite decomposition complexity (FDC). Secondly, we introduce equi-variant straight FDC (sFDC), and prove that a group having equi-variant sFDC if and only if its box space having sFDC. Finally, we show that elementary amenable groups have equi-variant sFDC by introducing something called stable FDC.
In this paper we give the results of a computer search for biracks of small size and we give various interpretations of these findings. The list includes biquandles, racks and quandles together with new invariants of welded knots and examples of welded knots which are shown to be non-trivial by the new invariants. These can be used to answer various questions concerning virtual and welded knots. As an application we reprove the result that the Burau map from braids to matrices is non injective and give an example of a non-trivial virtual (welded) knot which cannot be distinguished from the unknot by any linear biquandles. (This is a revised version of an earlier paper of the same name)
Let N and P be smooth manifolds of dimensions n and p (n \\geq p \\geq 2) respectively. Let \\Omega(N,P) denote an open subspace of J^{infty}(N,P) which consists of all regular jets and jets with prescribed singularities of types A_{i}, D_{j} and E_{k}. An \\Omega-regular map f:N \\to P refers to a smooth map having only singularities in \\Omega(N,P) and satisfy the transversality condition. We will prove the homotopy principle in the existence level for \\Omega-regular maps.
A knot K is called a 1-genus 1-bridge knot in a 3-manifold M if (M,K) has a Heegaard splitting (V_1,t_1)\\cup (V_2,t_2) where V_i is a solid torus and t_i is a boundary parallel arc properly embedded in V_i. If the exterior of a knot has a genus 2 Heegaard splitting, we say that the knot has an unknotting tunnel. Naturally the exterior of a 1-genus 1-bridge knot K allows a genus 2 Heegaard splitting, i.e., K has an unknotting tunnel. But, in general, there are unknotting tunnels which are not derived form this procedure. Some of them may be levelled with the torus \\partial V_1=\\partial V_2, whose case was studied in our previous paper. In this paper, we consider the remaining case.
A well-known conjecture in knot theory says that the percentage of hyperbolic knots amongst all of the prime knots of $n$ or fewer crossings approaches $100$ as $n$ approaches infinity. In this paper, it is proved that this conjecture contradicts several other plausible conjectures, including the 120-year-old conjecture on additivity of the crossing number of knots under connected sum and the conjecture that the crossing number of a satellite knot is not less than that of its companion.
In 1983 Conway and Gordon proved that any embedding of the complete graph $K_7$ into $\\mathbb{R}^3$ contains at least one nontrivial knot as its Hamiltonian cycle. After their work knots (also links) are considered as intrinsic properties of abstract graphs, and numerous subsequent works have been continued until recently. In this paper we are interested in knotted Hamiltonian cycles in linear embedding of $K_7$. Concretely it is shown that any linear embedding of $K_7$ contains at most three figure-8 knots as its Hamiltonian cycles.
In the present paper, we construct a monomorphism from (Artin) pure braid group $PB_{n}$ into a group, which is `bigger  than $PB_{n}$. Roughly speaking, this mapping is defined on words of braids by adding `new generators  between generators of $PB_{n}$. By this mapping we can get a new invariant for classical braids. As one of application of this invariant, we will show examples, which are minimal words in $PB_{n}$ and the minimality can be shown by the invariant.
Translation surfaces with poles correspond to meromorphic differentials on compact Riemann surfaces. They appear in compactifications of strata of the moduli space of Abelian differentials and in the study of stability conditions. Such structures have different geometrical and dynamical properties than usual translation surfaces. In particular, they always have infinite area and can have a finite number of saddle connections. We provide a combinatorial characterization of the strata for which there can be an infinite number of saddle connections and give lower and upper bounds for the number of saddle connections and related quantities.
The construction of knots via annular twisting has been used to create families of knots yielding the same manifold via Dehn surgery. Prior examples have all involved Dehn surgery where the surgery slope is an integral multiple of 2. In this note we prove that for any integer $n$ there exist infinitely many different knots in $S^3$ such that $n$-surgery on those knots yields the same manifold. In particular, when $|n|=1$ homology spheres arise from these surgeries. In addition, when $n \\neq 0$ the bridge numbers of the knots constructed tend to infinity as the number of twists along the annulus increases.
We study some aspects of the geometric representation theory of the Thompson and Neretin groups, suggested by their analogies with the diffeomorphism groups of the circle. We prove that the Burau representation of the Artin braid groups extends to a mapping class group $A_T$ related to Thompson s group $T$ by a short exact sequence $B_{\\infty}\\hookrightarrow A_T\\to T$, where $B_{\\infty}$ is the infinite braid group. This {\\it non-commutative} extension abelianises to a central extension $0\\to \\Z\\to A_T/[B_{\\infty},B_{\\infty}]\\to T\\to 1$ detecting the {\\it discrete} version $\\bar{gv}$ of the Bott-Virasoro-Godbillon-Vey class. A morphism from the above non-commutative extension to a reduced Pressley-Segal extension is then constructed, and the class $\\bar{gv}$ is realised as a pull-back of the reduced Pressley-Segal class. A similar program is carried out for an extension of the Neretin group related to the {\\it combinatorial} version of the Bott-Virasoro-Godbillon-Vey class.
Skeleta and other pure subsets of manifold stratified spaces are shown to have neighborhoods which are teardrops of stratified approximate fibrations (under dimension and compactness assumptions). In general, the stratified approximate fibrations cannot be replaced by bundles, and the teardrops cannot be replaced by mapping cylinder neighborhoods. Thus, this is the best possible topological tubular neighborhood theorem in the stratified setting.
We give sharp two-sided linear bounds of the crosscap number (non-orientable genus) of alternating links in terms of their Jones polynomial. Our estimates are often exact and we use them to calculate the crosscap numbers for several infinite families of alternating links and for several alternating knots with up to twelve crossings. We also discuss generalizations of our results for classes of non-alternating links.
This note is about the geometry of the pants graph P(S), a natural simplicial graph associated to a finite type topological surface S where vertices represents pants decompositions. The main result in this note ascserts that for a multicurve Q whose complement is a number of subsurfaces of complexity at most 1. We prove that the corresponding subgraph P(Q) is totally geodesic in P, previously considering this as a metric space assigning length one to each edge. A flat is a graph isomorphic to the Cayley graph of an abelian torsion free group of finite rank. As a consequence of the main theorem we make explicit the existence of maximal size flats (large flats) in the pants graph.
Given a finite metric CW complex $X$ and an element $\\alpha \\in \\pi_n(X)$, what are the properties of a geometrically optimal representative of $\\alpha$? We study the optimal volume of $k\\alpha$ as a function of $k$. Asymptotically, this function, whose inverse, for reasons of tradition, we call the volume distortion, turns out to be an invariant with respect to the rational homotopy of $X$. We provide a number of examples and techniques for studying this invariant, with a special focus on spaces with few rational homotopy groups. Our main theorem characterizes those $X$ in which all non-torsion homotopy classes are undistorted, that is, their distortion functions are linear.
We continue here the investigation of the relationship between the intersection of a pair of subgroups of a Kleinian group, and in particular the limit set of that intersection, and the intersection of the limit sets of the subgroups. Of specific interest is the extent to which the intersection of the limit sets being non-empty implies that the intersection of the subgroups is non-trivial. We present examples to show that a conjecture of Susskind, stating that the intersection of the sets of conical limit points of subgroups $\\Phi$ and $\\Theta$ of a Kleinian group $\\Gamma$ is contained in the limit set of $\\Phi\\cap \\Theta$, is as sharp as can reasonably be expected. We further show that Susskind s conjecture holds most of the time.
We show that Rasmussen s knot-invariant, which provided a lower bound for the slice-genus of knots in the 3-sphere, is equal to an invariant which can be defined in a very similar manner using instanton knot homology. As a corollary, it is shown that Rasmussen s invariant provides a bound for the genus of a bounding surface not only in the standard 4-ball, but in any homotopy 4-ball. Thus, this knot-invariant cannot be used to detect counterexamples to the smooth 4-dimensional Poincar\\ e conjecture.
In this paper we consider two connected closed Haken manifolds denoted by M^3 and N^3, with the same Gromov simplicial volume. We give a simple homological criterion to decide when a given map f: M^3-->N^3 between M^3 and N^3 can be changed by a homotopy to a homeomorphism. We then give a convenient process for constructing maps between M^3 and N^3 satisfying the homological hypothesis of the map f.
Let $Y$ be an $L$-space obtained by $p/q$-surgery on a knot in $K\\subseteq S^3$. Ozsv\\ ath and Szab\\ o have shown that the Heegaard Floer homology of $Y$ is determined by the surgery coefficient and the Alexander polynomial of $K$. In this paper, we prove a result in the opposite direction. We show that if $Y$ bounds a sharp 4-manifold and the surgery slope exceeds $4g(K)+4$, then the Alexander polynomial of $K$ is uniquely determined by $Y$ and $p/q$. We also show that if $S^3_{p/q}(K)$ bounds a sharp 4-manifold, then $S^3_{p /q }(K)$ bounds a sharp 4-manifold for all $p /q \\geq p/q$. As an application, we extend work of Ni and Zhang on characterizing slopes of torus knots.
Let $\\mathcal{A}$ be a central hyperplane arrangement in $\\mathbb{C}^{n+1}$ and $H_i,i=1,2,...,d$ be the defining equations of the hyperplanes of $\\mathcal{A}$. Let $f=\\prod_i H_i$. There is a global Milnor fibration $F\\hookrightarrow \\mathbb{C}^{n+1} \\setminus \\mathcal{A} \\xrightarrow{f} \\mathbb{C}^*,$ where $F$ is called the Milnor fiber and can be identified as the affine hypersurface $f=1$ in $\\mathbb{C}^{n+1}$. Many open questions have been raised subject to $F$. In particular, it has been conjectured that the integral homology, or the characteristic polynomial, hence the Betti numbers, of $F$ are also determined by the intersection lattice $L(\\mathcal{A})$. In this paper, we find a combinatorial upper bound for the first the characteristic polynomial of the Milnor fiber for central hyperplane arrangements, which improves existing results in the study. As a corollary, we obtain a combinatorial obstruction for trivial algebraic monodromy of the first homology of Milnor fiber. Calculations and comparisons to known examples computed using Fox calculus will be provided.
We show here that the Nielsen core of the bumping set of the domain of discontinuity of a Kleinian group $\\Gamma$ is the boundary of the characteristic submanifold of the associated 3-manifold with boundary. Some examples of interesting characteristic submanifolds are given. We also give a construction of the characteristic submanifold directly from the Nielsen core of the bumping set. The proofs are from \"first principles\", using properties of uniform domains and the fact that quasi-conformal discs are uniform domains.
If $X$ is an orientable, strongly minimal $PD_4$-complex and $\\pi_1(X)$ has one end then it has no nontrivial locally-finite normal subgroup. Hence if $\\pi$ is a 2-knot group then (a) if $\\pi$ is virtually solvable then either $\\pi$ has two ends or $\\pi\\cong\\Phi$, with presentation $\\langle{a,t}|ta=a^2t\\rangle$, or $\\pi$ is torsion-free and polycyclic of Hirsch length 4; (b) either $\\pi$ has two ends, or $\\pi$ has one end and the centre $\\zeta\\pi$ is torsion-free, or $\\pi$ has infinitely many ends and $\\zeta\\pi$ is finite; and (c) the Hirsch-Plotkin radical $\\sqrt\\pi$ is nilpotent.
Wu has shown that if a link or a knot $L$ in $S^3$ in thin position has thin spheres, then the thin sphere of lowest width is an essential surface in the link complement. In this paper we show that if we further assume that $L \\subset S^3$ is prime, then the thin sphere of lowest width also does not have any vertical cut-disks. We also prove the result for a specific kind of tangles in $S^2 \\times [-1,1]$.
We use topology of configuration spaces to give a characterization of Neuwirth--Stallings pairs $(S^5, K)$ with $\\dim K = 2$. As a consequence, we construct polynomial map germs $(\\mathbb{R}^{6},0)\\to (\\mathbb{R}^{3},0)$ with an isolated singularity at the origin such that their Milnor fibers are not diffeomorphic to a disk, thus putting an end to Milnor s non-triviality question. Furthermore, for a polynomial map germ $(\\mathbb{R}^{2n},0) \\to (\\mathbb{R}^{n},0)$ or $(\\mathbb{R}^{2n+1},0) \\to (\\mathbb{R}^{n},0)$, $n \\geq 3$, with an isolated singularity at the origin, we study the conditions under which the associated Milnor fiber has the homotopy type of a bouquet of spheres. We then construct, for every pair $(n, p)$ with $n/2 \\geq p \\geq 2$, a new example of a polynomial map germ $(\\mathbb{R}^n,0) \\to (\\mathbb{R}^p,0)$ with an isolated singularity at the origin such that its Milnor fiber has the homotopy type of a bouquet of a positive number of spheres.
The disk complex of a surface in a 3-manifold is used to define its {\\it topological index}. Surfaces with well-defined topological index are shown to generalize well-known classes, such as incompressible, strongly irreducible, and critical surfaces. The main result is that one may always isotope a surface $H$ with topological index $n$ to meet an incompressible surface $F$ so that the sum of the indices of the components of $H \\setminus N(F)$ is at most $n$. This theorem and its corollaries generalize many known results about surfaces in 3-manifolds, and often provides more efficient proofs. The paper concludes with a list of questions and conjectures, including a natural generalization of Hempel s {\\it distance} to surfaces with topological index $\\ge 2$.
Two singular links are cobordant if one can be obtained from the other by singular link isotopy together with a combination of births or deaths of simple unknotted curves, and saddle point transformations. A movie description of a singular link cobordism in 4-space is a sequence of singular link diagrams obtained from a projection of the cobordism into 3-space by taking 2-dimensional cross sections perpendicular to a fixed direction. We present a set of movie moves that are sufficient to connect any two movies of isotopic singular link cobordisms.
Let L be a link in an thickened annulus. We specify the embedding of this annulus in the three sphere, and consider its complement thought of as the axis to L. In the right circumstances this axis lifts to a null-homologous knot in the double branched cover of the three sphere, branched over the embedded copy of L. This paper shows that the knot Floer homology of this lift, with mod 2 coefficients, can be computed from a spectral sequence starting at a type of Khovanov homology already described by Asaeda, Przytycki, and Sikora. We extend the known results about this type of Khovanov homology, and use it to provide a very simple explanation of the case when L is alternating for the obvious projection.
Polyak showed that any Milnor s $\\overline{\\mu}$-invariant of length 3 can be represented as a combination of Conway polynomials of knots obtained by certain band sum of the link components. On the other hand, Habegger and Lin showed that Milnor invariants are also invariants for string links, called $\\mu$-invariants. We show that any Milnor s ${\\mu}$-invariant of length $\\leq k+2$ can be represented as a combination of the HOMFLYPT polynomials of knots obtained from the string link by some operation, if all ${\\mu}$-invariants of length $\\leq k$ vanish. Moreover, ${\\mu}$-invariants of length $3$ are given by a combination of the Conway polynomials and linking numbers without any vanishing assumption.
Let $M$ be a complete oriented hyperbolic 3-manifold of finite volume. Using classifying spaces for families of subgroups we construct a class $\\beta_P(M)$ in the Hochschild relative homology group $H_3([PSL_2(\\C):\\bar{P}];\\Z)$, where $\\bar{P}$ is the subgroup of parabolic transformations which fix infinity in the Riemann sphere. We prove that the group $H_3([PSL_2(\\C):\\bar{P}];\\Z)$ and the Takasu relative homology group $H_3(PSL_2(\\C),\\bar{P};\\Z)$ are isomorphic and under this isomorphism the class $\\beta_P(M)$ corresponds to Zickert s fundamental class. This proves that Zickert s fundamental class is well-defined and independent of the choice of decorations by horospheres. We also construct a homomorphism from $H_3([PSL_(\\C):\\bar{P}];\\Z)$ to the extended Bloch group $\\hat{\\mathcal{B}}(\\C)$ which is isomorphic to $H_3(PSL_2(\\C);\\Z)$. The image of $\\beta_P(M)$ under this homomorphism is the $PSL$-fundamental class constructed by Neumann and Zickert.
Let M be a (possibly non-orientable) compact 3-manifold with (possibly empty) boundary consisting of tori and Klein bottles. Let $X\\subset\\partial M$ be a trivalent graph such that $\\partial M\\setminus X$ is a union of one disc for each component of $\\partial M$. Building on previous work of Matveev, we define for the pair (M,X) a complexity c(M,X) and show that, when M is closed, irreducible and P^2-irreducible, $c(M,\\emptyset)$ is the minimal number of tetrahedra in a triangulation of M. Moreover c is additive under connected sum, and, given any n>=0, there are only finitely many irreducible and P^2-irreducible closed manifolds having complexity up to n. We prove that every irreducible and P^2-irreducible pair (M,X) has a finite splitting along tori and Klein bottles into pairs having the same properties, and complexity is additive on this splitting. As opposed to the JSJ decomposition, our splitting is not canonical, but it involves much easier blocks than all Seifert and simple manifolds. In particular, most Seifert and hyperbolic manifolds appear to have non-trivial splitting. In addition, a given set of blocks can be combined to give only a finite number of pairs (M,X). Our splitting theorem provides the theoretical background for an algorithm which classifies 3-manifolds of any given complexity. This algorithm has been already implemented and proved effective in the orientable case for complexity up to 9.
Final revision. To appear in the Journal of Differential Geometry. This paper studies knots that are transversal to the standard contact structure in $\\reals^3$, bringing techniques from topological knot theory to bear on their transversal classification. We say that a transversal knot type $\\cTK$ is {\\it transversally simple} if it is determined by its topological knot type $\\cK$ and its Bennequin number. The main theorem asserts that any $\\cTK$ whose associated $\\cK$ satisfies a condition that we call {\\em exchange reducibility} is transversally simple. As a first application, we prove that the unlink is transversally simple, extending the main theorem in \\cite{El}. As a second application we use a new theorem of Menasco (Theorem 1 of \\cite{Me}) to extend a result of Etnyre \\cite{Et} to prove that iterated torus knots are transversally simple. We also give a formula for their maximum Bennequin number. We show that the concept of exchange reducibility is the simplest of the constraints that one can place on $\\cK$ in order to prove that any associated $\\cTK$ is transversally simple. We also give examples of pairs of transversal knots that we conjecture are {\\em not} transversally simple.
We introduce a representation of compact 3-manifolds without spherical boundary components via (regular) 4-colored graphs, which turns out to be very convenient for computer aided study and tabulation. Our construction is a direct generalization of the one given in the eighties by S. Lins for closed 3-manifolds, which is in turn dual to the earlier construction introduced by Pezzana s school in Modena. In this context we establish some results concerning fundamental groups, connected sums, moves between graphs representing the same manifold, Heegaard genus and complexity, as well as an enumeration and classification of compact 3-manifolds representable by graphs with few vertices ($\\le 6$ in the non-orientable case and $\\le 8$ in the orientable one).
An invariant of orientable 3-manifolds is defined by taking the minimum $n$ such that a given 3-manifold embeds in the connected sum of $n$ copies of $S^2 \\times S^2$, and we call this $n$ the embedding number of the 3-manifold. We give some general properties of this invariant, and make calculations for families of lens spaces and Brieskorn spheres. We show how to construct rational and integral homology spheres whose embedding numbers grow arbitrarily large, and which can be calculated exactly if we assume the 11/8-Conjecture. In a different direction we show that any simply connected 4-manifold can be split along a rational homology sphere into a positive definite piece and a negative definite piece.
Let M be a closed, oriented, n-dimensional manifold. In this paper we give a Morse theoretic description of the string topology operations introduced by Chas and Sullivan, and extended by the first author, Jones, Godin, and others. We do this by studying maps from surfaces with cylindrical ends to M, such that on the cylinders, they satisfy the gradient flow equation of a Morse function on the loop space, LM. We then give Morse theoretic descriptions of related constructions, such as the Thom and Euler classes of a vector bundle, as well as the shriek, or unkehr homomorphism.
Results are obtained on extending flat vector bundles or equivalently general representations from the fundamental group of S, a connected subsurface of the connected boundary of a compact, connected, oriented 3-dimensional manifold, to the whole manifold M. These are applied to representations of fundamental groups of 3-dimensional rational homology cobordisms. The proofs use the introduction and complete computation up to sign of new numerical invariants which \"count with multiplicities and signs\" the number of representations up to conjugacy of the fundamental group of M to the unitary group U(n) (resp., the special unitary group SU(n)) which when restricted to S are conjugate to a specified irreducible representation, rho, of the fundamental group of S. These invariants are inspired by Casson s work on SU(2) representations of closed manifolds. All the invariants treated here are independent of the choice of rho. If T equals the difference of the Euler characteristics of S and M and is non-negative, then a T times (dim U(n)) (resp., dim SU(n)) cycle is produced that carries information about the space of such U(n) (resp., SU(n)) representations. For T = 0, the above integer invariant results and it is entirely computed up to sign. For T > 0, under the assumption that rho sends each boundary component of S to the identity, a list of invariants for U(n) (resp. SU(n)) results which are expressed as a homogeneous polynomial in many variables, reminiscent of the work of Donaldson on 4-manifolds.
Let $P : \\Sigma \\rightarrow S$ be a finite degree covering map between surfaces. Rafi and Schleimer show that there is an induced quasi-isometric embedding $\\Pi : \\mathcal{C}(S) \\rightarrow \\mathcal{C}(\\Sigma)$ between the associated curve complexes. We define an operation on curves in $\\mathcal{C}(\\Sigma)$ using minimal intersection number conditions and prove that it approximates a nearest point projection to $\\Pi(\\mathcal{C}(S))$. We also approximate hulls of finite sets of vertices in the curve complex, together with their corresponding nearest point projections, using intersection numbers.
We provide analogues for non-orientable surfaces with or without boundary or punctures of several basic theorems in the setting of the Thurston theory of surfaces which were developed so far only in the case of orientable surfaces. Namely, we provide natural analogues for non-orientable surfaces of the Fenchel-Nielsen theorem on the parametrization of the Teichm\\\"uller space of the surface, the Dehn-Thurston theorem on the parametrization of measured foliations in the surface, and the Hatcher-Thurston theorem, which gives a complete minimal set of moves between pair of pants decompositions of the surface. For the former two theorems, one in effect drops the twisting number for any curve in a pants decomposition which is 1-sided, and for the latter, new elementary moves on pants decompositions are introduced.
The rho-invariant is an invariant of odd-dimensional manifolds with finite fundamental group, and lies in the representations modulo the regular representations (after tensoring with Q). It is a fundamental invariant that occurs in classifying lens spaces, their homotopy analogues, and is intimately related to the eta-invariant for the signature operator. The goal of this note is to use some of the technology developed in studying the Novikov higher signature conjecture to define an analogous invariant for certain situations with infinite fundamental group.
We construct a covering of Culler-Vogtmann Outer space by the Teichmuller spaces of punctured surfaces. By considering the equivariant homology for the action of Out(F_n) on this covering, we construct a spectral sequence converging to the homology of Out(F_n) that has E^1 terms given by the homology of mapping class groups and groups that are, up to finite index, subgroups of mapping class groups. This spectral sequence can be seen as encoding all of the information of how the homology of Out(F_n) is related to the homology of mapping class groups and their subgroups.
Augmentations of knot contact homology are quite useful for relating it to other knot invariants. We describe a correspondence between augmentations and certain representations of the knot group. The correspondence implies the 2-variable augmentation polynomial equals a generalization of the classical $A$-polynomial. It also associates to each augmentation a rank, which is bounded by the bridge number and has the same behavior under connect sums. We also study augmentations with rank equal to the braid index.
Kearton observed that mutation can change the concordance class of a knot. A close examination of his example reveals that it is of 4-genus 1 and has a mutant of 4-genus 0. The first goal of this paper is to construct examples to show that for any pair of nonnegative integers m and n there is a knot of 4-genus m with a mutant of 4-genus n. A second result of this paper is a crossing change formula for the algebraic concordance class of a knot, which is then applied to prove the invariance of the algebraic concordance class under mutation. The paper concludes with an application of crossing change formulas to give a short new proof of Long s theorem that strongly positive amphicheiral knots are algebraically slice.
A {\\it wrinkled embedding} $f:V^n\\to W^m$ is a topological embedding which is a smooth embedding everywhere on $V$ except a set of $(n-1)$-dimensional spheres, where $f$ has cuspidal corners. In this paper we prove that any rotation of the tangent plane field $TV\\subset TW$ of a {\\it smoothly embedded} submanifold $V\\subset W$ can be approximated by a homotopy of {\\it wrinkled embeddings} $V\\to W$.
We give a combinatorial proof of the quasi-invertibility of $\\widehat{CFDD}(\\mathbb{I}_\\mathcal{Z})$ in bordered Heegaard Floer homology, which implies a Koszul self-duality on the dg-algebra $\\mathcal{A}(\\mathcal{Z})$, for each pointed matched circle $\\mathcal{Z}$. This is done by giving an explicit description of a rank 1 model for $\\widehat{CFAA}(\\mathbb{I}_\\mathcal{Z})$, the quasi-inverse of $\\widehat{CFDD}(\\mathbb{I}_\\mathcal{Z})$. This description is obtained by applying homological perturbation theory to a larger, previously known model of $\\widehat{CFAA}(\\mathbb{I}_\\mathcal{Z})$.
We study the action of the mapping class group M(F) on the complex of curves of a non-orientable surface F. We obtain, by using a result of K. S. Brown, a presentation for M(F) defined in terms of the mapping class groups of the complementary surfaces of collections of curves, provided that F is not sporadic, i.e. the complex of curves of F is simply connected. We also compute a finite presentation for the mapping class group of each sporadic surface.
Let M be a twisted interval bundle over a nonorientable hyperbolizable surface. Let X(M) be the PSL(2,C)-character variety of \\pi_1(M). We examine the dynamics of the action of Out(\\pi_1(M)) on X(M), and in particular, we find an open set on which the action is properly discontinuous that is strictly larger than the interior of the deformation space of marked hyperbolic manifolds homotopy equivalent to M. Further, we identify which discrete and faithful representations can lie in a domain of discontinuity for the action of Out(\\pi_1(M)) on X(M).
I answer an open question left by Gui-Song Li in \"On self-intersections of immersed surfaces\" (AMS Proceedings, Volume 126, 1998, pp.3721-3726.) The intersection graph $M(i)$ of a generic surface $i:F \\to S^3$ is the set of values which are either singularities or intersections. It is a multigraph whose edges are transverse intersections of two surfaces and whose vertices are triple intersections and cross-caps. $M(i)$ has an additional structure which Li called \"a daisy graph.\" If F is oriented then the orientation further refines $M(i)$ s structure into what Li called an \"arrowed daisy graph.\" Li left the open question \"which arrowed daisy graphs can be realized as the intersection graph of an oriented generic surface?\" The main theorem of this article will answer this. I will also provide some generalizations and extensions to this theorem in sections 4 and 5.
In the previous paper the author defined an infinite order plug $(P,\\varphi)$ which gives rise to infinite Fintushel-Stern s knot-surgeries. Here, we give two 4-dimensional infinitely many exotic families $Y_n$, $Z_n$ of exotic enlargements of the plug. The families $Y_n$, $Z_n$ have $b_2=3$, $4$ and the boundaries are 3-manifolds with $b_1=1$, $0$ respectively. We give a plug (or g-cork) twist $(P,\\varphi_{p,q})$ producing the 2-bridge knot or link surgery by combining the plug $(P,\\varphi)$. As a further example, we describe a 4-dimensional twist $(M,\\mu)$ between knot-surgeries for two mutant knots. The twisted double concerning $(M,\\mu)$ gives a candidate of exotic $\\#^2S^2\\times S^2$.
This work treats on the question whether a given map f: M -> B of smooth closed manifolds is homotopic to a smooth fiber bundle. We define a first obstruction in H^1(B;Wh(\\pi_1(E))) and, provided that this obstruction vanishes and one additional condition is verified, a second obstruction in Wh(\\pi_1(E)) >. Both elements vanish if the answer to the above question is positive. In the case where B is the 1-sphere and the dimension of M exceeds five, we show that the converse is also true, using a relationship with two obstructions defined by Farrell in this particular situation.
We show that on a hyperbolic knot $K$ in $S^3$, the distance between any two finite surgery slopes is at most two and consequently there are at most three nontrivial finite surgeries. Moreover in case that $K$ admits three nontrivial finite surgeries, $K$ must be the pretzel knot $P(-2,3,7)$. In case that $K$ admits two noncyclic finite surgeries or two finite surgeries at distance two, the two surgery slopes must be one of ten or seventeen specific pairs respectively. For $D$-type finite surgeries, we improve a finiteness theorem due to Doig by giving an explicit bound on the possible resulting prism manifolds, and also prove that $4m$ and $4m+4$ are characterizing slopes for the torus knot $T(2m+1,2)$ for each $m\\geq 1$.
The normalized Yamada polynomial is a polynomial invariant in variable A for theta-curves. In this work, we show that the coefficients of the power series obtained from this polynomial by the substitution A=e^x=1+x+x^2/2+x^3/6+... are finite-type invariants for theta-curves although the coefficients of original polynomial are not. A similar result can be obtained in the case of Yokota polynomial for theta-curves.
We show there exists a linear function w: N->N with the following property. Let K be a hyperbolic knot in a hyperbolic 3-manifold M admitting a non-longitudinal S^3 surgery. If K is put into thin position with respect to a strongly irreducible, genus g Heegaard splitting of M then K intersects a thick level at most 2w(g) times. Typically, this shows that the bridge number of K with respect to this Heegaard splitting is at most w(g), and the tunnel number of K is at most w(g) + g-1.
We describe some regular techniques of calculating finite degree invariants of triple points free smooth plane curves $S^1 \\to R^2$. They are a direct analog of similar techniques for knot invariants and are based on the calculus of {\\em triangular diagrams} and {\\em connected hypergraphs} in the same way as the calculation of knot invariants is based on the study of chord diagrams and connected graphs. E.g., the simplest such invariant is of degree 4 and corresponds to the diagram consisting of two triangles with alternating vertices in a circle in the same way as the simplest knot invariant (of degree 2) corresponds to the 2-chord diagram $\\bigoplus$. Also, following V.I.Arnold and other authors we consider invariants of {\\em immersed} triple points free curves and describe similar techniques also for this problem, and, more generally, for the calculation of homology groups of the space of immersed plane curves without points of multiplicity $\\ge k$ for any $k \\ge 3.$
We investigate the rigidity of hyperbolic cone metrics on $3$-manifolds which are isometric gluing of ideal and hyper-ideal tetrahedra in hyperbolic spaces. These metrics will be called ideal and hyper-ideal hyperbolic polyhedral metrics. It is shown that a hyper-ideal hyperbolic polyhedral metric is determined up to isometry by its curvature and a decorated ideal hyperbolic polyhedral metric is determined up to isometry and change of decorations by its curvature. The main tool used in the proof is the Fenchel dual of the volume function.
We describe a polynomial-time algorithm to compute a (tight) geodesic between two curves in the curve graph. As well as enabling us to compute the distance between a pair of curves, this has several applications to mapping classes. For example, we can use these geodesics to compute the asymptotic translation length, Nielsen--Thurston type, and canonical curve system of a mapping class in polynomial time in its word length.
Given any diagram of a link, we define on the cube of Kauffman s states a \"2-complex\" whose homology is an invariant of the associated framed links, and such that the graded Euler characteristic reproduces the unnormalized Kauffman bracket. This includes a categorification of brackets skein relation. Then we incorporate the orientation information and get a further complex on the same cube that gives rise to a new invariant homology for oriented links, so that the graded Euler characteristic reproduces the unnormalized Jones polynomial in Kauffman s version. Finally we clarify the relations between this homology and the original Khovanov homology of oriented links, extending the well known relation between the associated two versions of the Jones polynomial.
In this paper we study the convergence behavior of grafting rays to the Thurston boundary of Teichmuller space. When the grafting is done along a weighted system of simple closed curves or along a maximal uniquely ergodic lamination this behavior is the same as for Teichmuller geodesics and lines of minima. We also show that the ray grafted along a weighted system of simple closed curves is at bounded distance from Teichmuller geodesic.
We construct an infinite commutative lattice of groups whose dual spaces give Kauffman finite-type invariants of long virtual knots. The lattice is based \"horizontally\" upon the Polyak algebra and extended \"vertically\" using Manturov s functorial map $f$. For each $n$, the $n$-th vertical line in the lattice contains an infinite dimensional subspace of Kauffman finite-type invariants of degree $n$. Moreover, the lattice contains infinitely many inequivalent extensions of the Conway polynomial to long virtual knots, all of which satisfy the same skein relation. Bounds for the rank of each group in the lattice are obtained.
We construct a combinatorial invariant of 3-orbifolds with singular set a link that generalizes the Turaev torsion invariant of 3-manifolds. We give several gluing formulas from which we derive two consequences. The first is an understanding of how the components of the invariant change when we remove a curve from the singular set. The second is a formula relating the invariant of the 3-orbifold to the Turaev torsion invariant of the underlying 3-manifold in the case when the singular set is a nullhomologous knot.
An (flat) affine $3$-manifold is a $3$-manifold with an atlas of charts to an affine space ${\\mathbf R}^3$ with transition maps in the affine transformation group $Aff({\\mathbf R}^3)$. We will show that a closed affine $3$-manifold is either an affine Hopf $3$-manifold or decomposes canonically to concave affine submanifolds with incompressible boundary, toral $\\pi$-submanifolds and $2$-convex affine manifolds, each of which is an irreducible $3$-manifold. This will help us with understanding the affine $3$-manifolds better.
We study the rational Kontsevich integral of torus knots. We construct explicitely a series of diagrams made of circles joined together in a tree-like fashion and colored by some special rational functions. We show that this series codes exactly the unwheeled rational Kontsevich integral of torus knots, and that it behaves very simply under branched coverings. Our proof is combinatorial. It uses the results of Wheels and Wheeling and various spaces of diagrams.
We address the question of detecting minimal virtual diagrams with respect to the number of virtual crossings. This problem is closely connected to the problem of detecting the minimal number of additional intersection points for a generic immersion of a singular link in $R^{2}$. We tackle this problem by the so-called $\\xi$-polynomial whose leading (lowest) degree naturally estimates the virtual crossing number. Several sufficient conditions for minimality together with infinite series of new examples are given. We also state several open questions about $M$-diagrams, which are minimal according to our sufficient conditions.
The first part of this paper exposits a simple geometric description of the Kirby-Siebenmann invariant of a 4--manifold in terms of a quadratic refinement of its intersection form. This is the first in a sequence of higher-order intersection invariants of Whitney towers studied by the authors, particularly for the 4--ball. In the second part of this paper, a general theory of quadratic forms is developed and then specialized from the non-commutative to the commutative to finally, the symmetric settings. The intersection invariant for twisted Whitney towers is shown to be the universal symmetric refinement of the framed intersection invariant. As a corollary we obtain a short exact sequence that has been essential in the understanding of Whitney towers in the 4--ball.
The derived group of a permutation representation, introduced by R.H. Crowell, unites many notions of knot theory. We survey Crowell s construction, and offer new applications. The twisted Alexander group of a knot is defined. Using it, we obtain twisted Alexander modules and polynomials. Also, we extend a well-known theorem of Neuwirth and Stallings giving necessary and sufficient conditions for a knot to be fibered. Virtual Alexander polynomials provide obstructions for a virtual knot that must vanish if the knot has a diagram with an Alexander numbering. The extended group of a virtual knot is defined, and using it a more sensitive obstruction is obtained.
We study the twisted Alexander polynomial $\\Delta_{K,\\rho}$ of a knot $K$ associated to a non-abelian representation $\\rho$ of the knot group into $SL_2(\\BC)$. It is known for every knot $K$ that if $K$ is fibered, then for every non-abelian representation, $\\Delta_{K,\\rho}$ is monic and has degree $4g(K)-2$ where $g(K)$ is the genus of $K$. Kim and Morifuji recently proved the converse for 2-bridge knots. In fact they proved a stronger result: if a 2-bridge knot $K$ is non-fibered, then all but finitely many non-abelian representations on some component have $\\Delta_{K,\\rho}$ non-monic and degree $4g(K)-2$. In this paper, we consider two special families of non-fibered 2-bridge knots including twist knots. For these families, we calculate the number of non-abelian representations where $\\Delta_{K,\\rho}$ is monic and calculate the number of non-abelian representations where the degree of $\\Delta_{K,\\rho}$ is less than $4g(K)-2$.
The Lorentzian length, which is one of the most significant functions in Lorentzian geometry, is a complex-valued function. Its square gives a real-valued non-degenerate quadratic function. In this paper, we define naturally extended mappings of Lorentzian distance-squared functions, wherein each component is a Lorentzian distance-squared function; and classify these mappings completely by the likeness of recognition subspaces.
A double pants decomposition of a 2-dimensional surface is a collection of two pants decomposition of this surface introduced in arXiv:1005.0073v2. There are two natural operations acting on double pants decompositions: flips and handle twists. It is shown in arXiv:1005.0073v2 that the groupoid generated by flips and handle twists acts transitively on admissible double pants decompositions where the class of admissible decompositions has a natural topological and combinatorial description. In this paper, we label the curves of double pants decompositions and show that for all but one surfaces the same groupoid acts transitively on all labeled admissible double pants decompositions. The only exclusion is a sphere with two handles, where the groupoid has 15 orbits.
We develop obstructions to a knot K in the 3-sphere bounding a smooth punctured Klein bottle in the 4-ball. The simplest of these is based on the linking form of the 2-fold branched cover of the 3-sphere branched over K. Stronger obstructions are based on the Ozsvath-Szabo correction term in Heegaard-Floer homology, along with the G-signature theorem and the Guillou-Marin generalization of Rokhlin s theorem. We also apply Casson-Gordon theory to show that for every n greater than one there exists a knot that does not bound a topologically embedded nonorientable ribbon surface F in the 4-ball with first Betti number less than n.
The present paper follows the computational approach to 3-manifold classification via edge-coloured graphs, already performed by several authors with respect to orientable 3-manifolds up to 28 coloured tetrahedra, non-orientable 3-manifolds up to 26 coloured tetrahedra, genus two 3-manifolds up to 34 coloured tetrahedra: in fact, by automatic generation and analysis of suitable edge-coloured graphs, called crystallizations, we obtain a catalogue of all orientable 3-manifolds admitting coloured triangulations with 30 tetrahedra. These manifolds are unambiguously identified via JSJ decompositions and fibering structures. It is worth noting that, in the present work, a suitable use of elementary combinatorial moves yields an automatic partition of the elements of the generated crystallization catalogue into equivalence classes, which are proved to be in one-to one correspondence with the homeomorphism classes of the represented manifolds.
In this paper we construct graph cobordism maps for all flavors of Heegaard Floer homology and prove invariance of such maps. In the process we also finish the proof of invariance of the 4-manifold invariants constructed by Ozsv\\ {a}th and Szab\\ {o}. The graph cobordism maps are defined for a very general class of cobordisms, including cobordisms which are disconnected, or have disconnected or empty ends. We also define a sort of TQFT for graphs inside a fixed 3-manifold. As an application we compute the chain homotopy type of the $\\pi_1$-action on $CF^\\circ$, showing that it is chain homotopic to the identity map for the $+,-$ and $\\infty$ flavors, but the chain homotopy is not $U$-equivariant. For the cobordisms originally considered by Ozsv\\ {a}th and Szab\\ {o} (connected path cobordisms with connected ends and a single path), this implies that, after taking homology, the cobordism maps don t depend on the path for the $+,-$ and $\\infty$ flavors.
In this paper we define a new state sum based on the regions defined by tangles on a surface which is an oriented closed surface with a finite number of open holes drilled. From this state sum we obtain an invariant of regular isotopy for the tangles named $u$-invariant. The values of the $u$-invariant are in $\\mathbb{Z}[u]$, where $u$ is a primitive fifth root of the unity. Various basic properties of the invariant are proved and discussed. It can be specialized to invariants of framed links in $\\mathbb{R}^3$. Its categoric aspect is emphasized: composition of tangles in surfaces correspond to matrix multiplication. The values of the $u$-invariant conjugate under taking the mirror of the tangle.
We show that if the connected sum of two knots with coprime Alexander polynomials is doubly slice, then the Ozsv\\ ath-Szab\\ o correction terms as smooth double sliceness obstructions vanish for both knots. Recently, Jeffrey Meier gave smoothly slice knots that are topologically doubly slice, but not smoothly doubly slice. As an application, we give a new example of such knots that is distinct from Meier s knots modulo doubly slice knots.
In this paper we prove two results, one folklore and the other new. The folklore result, which goes back to Thurston, is that the geometrization theorem implies that there is an algorithm for the homeomorphism problem for closed, oriented, triangulated 3-manifolds. We give a self-contained proof, with several variations at each stage, that uses only the statement of the geometrization theorem, basic hyperbolic geometry, and old results from combinatorial topology and computer science. For this result, we do not rely on normal surface theory, methods from geometric group theory, nor methods used to prove geometrization. The new result is that the homeomorphism problem is elementary recursive, i.e., that the computational complexity is bounded by a bounded tower of exponentials. This result makes essential use of normal surface theory, Mostow rigidity, and improved bounds on the computational complexity of solving algebraic equations.
A Seifert surgery is an integral surgery on a knot in S^3 producing a Seifert fiber space which may contain an exceptional fiber of index 0. The Seifert Surgery Network is a 1-dimensional complex whose vertices correspond to Seifert surgeries; its edges correspond to single twistings along \"seiferters\" or \"annular pairs of seiferters\". One problem of the network is whether there is a path from each vertex to a vertex on a torus knot, the most basic Seifert surgery. We give a method to find seiferters and annular pairs of seiferters for Seifert surgeries obtained by taking two--fold branched covers of tangles. Concerning three infinite families of Seifert surgeries obtained by the second author via branched covers, we find explicit paths in the network from such surgeries to Seifert surgeries on torus knots.
The complex of curves $\\mathcal{C}(S_g)$ of a closed orientable surface of genus $g \\geq 2$ is the simplicial complex having its vertices, $\\mathcal{C}^0(S_g)$, are isotopy classes of essential curves in $S_g$. Two vertices co-bound an edge of the $1$-skeleton, $\\mathcal{C}^1(S_g)$, if there are disjoint representatives in $S_g$. A metric is obtained on $\\mathcal{C}^0(S_g)$ by assigning unit length to each edge of $\\mathcal{C}^1(S_g)$. Thus, the distance between two vertices, $d(v,w)$, corresponds to the length of a geodesic---a shortest edge-path between $v$ and $w$ in $\\mathcal{C}^1 (S_g)$. Recently, Birman, Margalit and the second author introduced the concept of {\\em initially efficient geodesics} in $\\mathcal{C}^1(S_g)$ and used them to give a new algorithm for computing the distance between vertices. In this note we introduce the software package MICC ({\\em Metric in the Curve Complex}), a partial implementation of the initially efficient geodesic algorithm. We discuss the mathematics underlying MICC and give applications. In particular, we give examples of distance four vertex pairs, for $g=2$ and 3. Previously, there was only one known example, in genus $2$, due to John Hempel.
Topological 4-dimensional surgery is conjectured to fail, in general, for free fundamental groups. M. Freedman and P. Teichner have shown that surgery problems with an arbitrary fundamental group have a solution, provided they satisfy a certain condition on Dwyer s filtration on second homology. We give a new geometric proof of this result, and analyze its relation to the canonical surgery problems.
We show that the properties of admitting a co-oriented taut foliation and having a left-orderable fundamental group are equivalent for rational homology $3$-sphere graph manifolds and relate them to the property of not being a Heegaard-Floer L-space. This is accomplished in several steps. First we show how to detect families of slopes on the boundary of a Seifert fibred manifold in four different fashions - using representations, using left-orders, using foliations, and using Heegaard-Floer homology. Then we show that each method of detection determines the same family of detected slopes. Next we provide necessary and sufficient conditions for the existence of a co-oriented taut foliation on a graph manifold rational homology $3$-sphere, respectively a left-order on its fundamental group, which depend solely on families of detected slopes on the boundaries of its pieces. The fact that Heegaard-Floer methods can be used to detect families of slopes on the boundary of a Seifert fibred manifold combines with certain conjectures in the literature to suggest an L-space gluing theorem for rational homology $3$-sphere graph manifolds as well as other interesting problems in Heegaard-Floer theory.
Surgery triangles are an important computational tool in Floer homology. Given a connected oriented surface $\\Sigma$, we consider the abelian group $K(\\Sigma)$ generated by bordered 3-manifolds with boundary $\\Sigma$, modulo the relation that the three manifolds involved in any surgery triangle sum to zero. We show that $K(\\Sigma)$ is a finitely generated free abelian group and compute its rank. We also construct an explicit basis and show that it generates all bordered 3-manifolds in a certain stronger sense. Our basis is strictly contained in another finite generating set which was constructed previously by Baldwin and Bloom. As a byproduct we confirm a conjecture of Blokhuis and Brouwer on spanning sets for the binary symplectic dual polar space.
We show that an n-dimensional compactum X embeds in R^m, where m>3(n+1)/2, if and only if X x X - \\Delta admits an equivariant map to S^{m-1}. In particular, X embeds in R^{2n}, n>3, iff the top power of the (twisted) Euler class of the factor-exchanging involution on X x X - \\Delta is trivial. Assuming that X quasi-embeds in R^{2n} (i.e. is an inverse limit of n-polyhedra, embeddable in R^{2n}), this is equivalent to the vanishing of an obstruction in lim^1 H^{2n-1}(K_i) over compact subsets K_i\\subset X x X - \\Delta. One application is that an n-dimensional ANR embeds in R^{2n} if it quasi-embeds in R^{2n-1}, n>3. We construct an ANR of dimension n>1, quasi-embeddable but not embeddable in R^{2n}, and an AR of dimension n>1, which does not \"movably\" embed in R^{2n}. These examples come close to, but don t quite resolve, Borsuk s problem: does every n-dimensional AR embed in R^{2n}? In the affirmative direction, we show that an n-dimensional compactum X embeds in R^{2n}, n>3, if H^n(X)=0 and H^{n+1}(X,X-pt)=0 for every pt\\in X. There are applications in the entire metastable range as well. An n-dimensional compactum X with H^{n-i}(X-pt)=0 for each pt\\in X and all i\\le k embeds in R^{2n-k}. This generalizes Bryant and Mio s result that k-connected n-dimensional generalized manifolds embed in R^{2n-k}. Also, an acyclic compactum X embeds in R^m iff X x I embeds in R^{m+1} iff X x (triod) embeds in R^{m+2}. As a byproduct, we answer a question of T. Banakh on stable embeddability of the Menger cube.
This paper is a continuation of the previous paper of the author[M]. We show that an affine deformation space of a hyperbolic surface of type (g,b) can be parametrized by Margulis invariants and affine twist parameters with a certain decomposition of the surface, which are associated with the Fenchel-Nielsen coordinates in Teichmuller theory. W.Goldman and G.Margulis[GM] introduced that a translation part of an affine deformation canonically corresponds to a tangent vector on the Teichmuller space. By this correspondence, we explicitly represent tangent vectors on the Teichmuller space from the perspective of Lorentzian geometry, only when the tangent vectors correspond to Fenchel-Nielsen twists along separating geodesic curves on a hyperbolic surface.
In 1993, Fenn, Rourke and Sanderson introduced rack spaces and rack homotopy invariants, and modifications to quandle spaces and quandle homotopy invariants were introduced by Nosaka in 2011. In this paper, we define the Cayley-type graph and the extended quandle space of a quandle in analogy to rack and quandle spaces. Moreover, we construct the shadow homotopy invariant of a classical link and prove that the shadow homotopy invariant is equal to the quandle homotopy invariant multiplied by the order of a quandle.
Round handles are affiliated with smooth 4-manifolds in two major ways: 5-dimensional round handles appear extensively as the building blocks in cobordisms between 4-manifolds, whereas 4-dimensional round handles are the building blocks of broken Lefschetz fibrations on them. The purpose of this article is to shed more light on these interactions. We prove that if X and X  are cobordant closed smooth 4-manifolds with the same euler characteristics, and if one of them is simply-connected, then there is a cobordism between them which is composed of round 2-handles only, and therefore one can pass from one to the other via a sequence of generalized logarithmic transforms along tori. As a corollary, we obtain a new proof of a theorem of Iwase s, which is a 4-dimensional analogue of the Lickorish-Wallace theorem for 3-manifolds: Every closed simply-connected 4-manifold can be produced by a surgery along a disjoint union of tori contained in a connected sum of copies of CP^2, -CP^2 and S^1 x S^3. These answer some of the open problems posted by Ron Stern, while suggesting more constraints on the cobordisms in consideration. We also use round handles to show that every infinite family of mutually non-diffeomorphic closed smooth oriented simply-connected 4-manifolds in the same homeomorphism class constructed up to date consists of members that become diffeomorphic after one stabilization with S^2 x S^2 if members are all non-spin, and with S^2 x S^2 # -CP^2 if they are spin. In particular, we show that simple cobordisms exist between knot surgered manifolds. We then show that generalized logarithmic transforms can be seen as standard logarithmic transforms along fiber components of broken Lefschetz fibrations, and show how changing the smooth structures on a fixed homeomorphism class of a closed smooth 4-manifold can be realized as relevant modifications of a broken Lefschetz fibration on it.
This paper is devoted to the construction of norm-preserving maps between bounded cohomology groups. For a graph of groups with amenable edge groups we construct an isometric embedding of the direct sum of the bounded cohomology of the vertex groups in the bounded cohomology of the fundamental group of the graph of groups. With a similar technique we prove that if (X,Y) is a pair of CW-complexes and the fundamental group of each connected component of Y is amenable, the isomorphism between the relative bounded cohomology of (X,Y) and the bounded cohomology of X in degree at least 2 is isometric. As an application we provide easy and self-contained proofs of Gromov Equivalence Theorem and of the additivity of the simplicial volume with respect to gluings along \\pi_1-injective boundary components with amenable fundamental group.
Given a topological space X denote by exp_k(X) the space of non-empty subsets of X of size at most k, topologised as a quotient of X^k. This space may be regarded as a union over 0 < l < k+1 of configuration spaces of l distinct unordered points in X. In the special case X=S^1 we show that: (1) exp_k(S^1) has the homotopy type of an odd dimensional sphere of dimension k or k-1; (2) the natural inclusion of exp_{2k-1}(S^1) h.e. S^{2k-1} into exp_2k(S^1) h.e. S^{2k-1} is multiplication by two on homology; (3) the complement exp_k(S^1)-exp_{k-2}(S^1) of the codimension two strata in exp_k(S^1) has the homotopy type of a (k-1,k)-torus knot complement; and (4) the degree of an induced map exp_k(f): exp_k(S^1)-->exp_k(S^1) is (deg f)^[(k+1)/2] for f: S^1-->S^1. The first three results generalise known facts that exp_2(S^1) is a Moebius strip with boundary exp_1(S^1), and that exp_3(S^1) is the three-sphere with exp_1(S^1) inside it forming a trefoil knot.
The motivation for this paper is to justify a remark of Thurston that the algebraic degree of stretch factors of pseudo-Anosov maps on a surface $S$ can be as high as the dimension of the Teichm\\\"uller space of $S$. In addition to proving this, we completely determine the set of possible algebraic degrees of pseudo-Anosov stretch factors on almost all finite type surfaces. As a corollary, we find the possible degrees of the number fields that arise as trace fields of Veech groups of flat surfaces homeomorphic to $S$. Our construction gives an algorithm for finding a pseudo-Anosov map on a given surface whose stretch factor has a prescribed degree. One ingredient of the proofs is a novel asymptotic irreducibility criterion for polynomials.
By the work of Harer, the reduced homology of the complex of curves is a fundamental cohomological object associated to all torsion free finite index subgroups of the mapping class group. We call this homology group the Steinberg module of the mapping class group. It was previously known that the curve complex has the homotopy type of a bouquet of spheres. Here, we give the first explicit homologically nontrivial sphere in the curve complex and show that under the action of the mapping class group, the orbit of this homology class generates the reduced homology of the curve complex.
The action dimension of a discrete group $\\Gamma$ is the smallest dimension of a contractible manifold which admits a proper action of $\\Gamma$. Associated to any flag complex $L$ there is a right-angled Artin group, $A_L$. We compute the action dimension of $A_L$ for many $L$. Our calculations come close to confirming the conjecture that if an $\\ell^2$-Betti number of $A_L$ in degree $l$ is nonzero, then the action dimension of $A_L$ is $\\ge 2l$.
The purpose of this article is to give a preliminary clarification on the relation between crossing number and crossing change. With a main focus on the span of X polynomial, we prove that, as our theorem claims, the crossing number of the link after crossing change can be estimated when certain conditions are met. At the end of the article, we give an example to demonstrate a special case for the theorem and a counterexample to explain that the theorem cannot be applied if the obtained link is not alternating.
We provide a novel proof that the set of directions that admit a saddle connection on a meromorphic quadratic differential with at least one pole of order at least two is closed, which generalizes a result of Bridgeland and Smith, and Gaiotto, Moore, and Neitzke. Secondly, we show that this set has finite Cantor-Bendixson rank and give a tight bound. Finally, we present a family of surfaces realizing all possible Cantor-Bendixson ranks. The techniques in the proof of this result exclusively concern Abelian differentials on Riemann surfaces, also known as translation surfaces. The concept of a \"slit translation surface\" is introduced as the primary tool for studying meromorphic quadratic differentials with higher order poles.
In the previous three papers in this series, [WKO1]-[WKO3] (arXiv:1405.1956, arXiv:1405.1955, and to appear), Z. Dancso and I studied a certain theory of \"homomorphic expansions\" of \"w-knotted objects\", a certain class of knotted objects in 4-dimensional space. When all layers of interpretation are stripped off, what remains is a study of a certain number of equations written in a family of spaces $A^w$, closely related to degree-completed free Lie algebras and to degree-completed spaces of cyclic words. The purpose of this paper is to introduce mathematical and computational tools that enable explicit computations (up to a certain degree) in these $A^w$ spaces and to use these tools to solve the said equations and verify some properties of their solutions, and as a consequence, to carry out the computation (up to a certain degree) of certain knot-theoretic invariants discussed in [WKO1]-[WKO3] and in my related paper [KBH] (arXiv:1308.1721).
Let $S_{g,p}$ denote the genus $g$ orientable surface with $p$ punctures. We show that nested train track sequences constitute $O((g,p)^{2})$-quasiconvex subsets of the curve graph, effectivizing a theorem of Masur and Minsky. As a consequence, the genus $g$ disk set is $O(g^{2})$-quasiconvex. We also show that splitting and sliding sequences of birecurrent train tracks project to $O((g,p)^{2})$-unparameterized quasi-geodesics in the curve graph of any essential subsurface, an effective version of a theorem of Masur, Mosher, and Schleimer.
Let $C$ be a curve in a closed orientable surface $F$ of genus $g \\geq 2$ that separates $F$ into subsurfaces $\\widetilde {F_i}$ of genera $g_i$, for $i = 1,2$. We study the set of roots in $\\Mod(F)$ of the Dehn twist $t_C$ about $C$. All roots arise from pairs of $C_{n_i}$-actions on the $\\widetilde{F_i}$, where $n=\\lcm(n_1,n_2)$ is the degree of the root, that satisfy a certain compatibility condition. The $C_{n_i}$ actions are of a kind that we call nestled actions, and we classify them using tuples that we call data sets. The compatibility condition can be expressed by a simple formula, allowing a classification of all roots of $t_C$ by compatible pairs of data sets. We use these data set pairs to classify all roots for $g = 2$ and $g = 3$. We show that there is always a root of degree at least $2g^2+2g$, while $n \\leq 4g^2+2g$. We also give some additional applications.
We define an invariant of tangles and framed tangles given a finite crossed module and a pair of functions, called a Reidemeister pair, satisfying natural properties. We give several examples of Reidemeister pairs derived from racks, quandles, rack and quandle cocycles, and central extensions of groups. We prove that our construction includes all rack and quandle cohomology (framed) link invariants, as well as the Eisermann invariant of knots. We construct a class of Reidemeister pairs which constitute a lifting of the Eisermann invariant, and show through an example that this class is strictly stronger than the Eisermann invariant itself.
This paper analyzes commensurability of the class of surface automorphism generated by two Dehn multitwists. We show pairwise noncommensurability between several classes arising from canonical curve configurations. In addition, we consider the Kenyon-Smillie invariant J of flat surfaces in this setting. We also introduce a general construction of infinite classes of commensurable pseudo-Anosov homeomorphisms.
We study the asymptotic behavior of the twisted Alexander polynomial for the sequence of SL(n ,C)-representations induced from an irreducible metabelian SL(2, C)-representation of a knot group. We give the limits of the leading coefficients in the asymptotics of the twisted Alexander polynomial and related Reidemeister torsion. The concrete computations for all genus one two-bridge knots are also presented.
The singularity set of a generic standard projection to the three space of a closed surface linked in four space, consists of at most three types: double points, triple points or branch points. We say that this generic projection image is p-diagram if it does not contain any triple point. Two p-diagrams of equivalent surface links are called p-equivalent if there exists a finite sequence of local moves, such that each of them is one of the four moves taken from the seven on the well known Roseman list, that connects only p-diagrams. It is natural to ask: are any of two p-diagrams of equivalent surface links always p-equivalent? We introduce an invariant of p-equivalent diagrams and an example of linked surfaces that answers our question negatively.
Macbeath gave a formula for the number of fixed points for each non-identity element of a cyclic group of automorphisms of a compact Riemann surface in terms of the universal covering transformation group of the cyclic group. We observe that this formula generalizes to determine the fixed-point set of each non-identity element of a cyclic group of automorphisms acting on a closed non-orientable surface with one exception; namely, when this element has order 2. In this case the fixed-point set may have simple closed curves (called ovals) as well as fixed points. In this note we extend Macbeath s results to include the number of ovals and also determine whether they are twisted or not.
In the author s earlier work there appeared a new way to specify any smooth closed 4-manifold by a surface diagram, which consists of an orientable surface decorated with simple closed curves. These curves are cyclically indexed, and each curve has a unique transverse intersection with the next. Each surface diagram comes from a certain type of map from the 4-manifold to the two-sphere. The aim of this paper is to give a uniqueness theorem stating that surface diagrams coming from maps within a fixed homotopy class are unique up to four moves: stabilization, handleslide, multislide, and shift.
Let $S$ be a surface of finite type which is not a sphere with at most four punctures, a torus with at most two punctures, or a closed surface of genus two. Let $\\mathcal{MF}$ be the space of equivalence classes of measured foliations of compact support on $S$ and let $\\mathcal{UMF}$ be the quotient space of $\\mathcal{MF}$ obtained by identifying two equivalence classes whenever they can be represented by topologically equivalent foliations, that is, forgetting the transverse measure. The extended mapping class group $\\Gamma^*$ of $S$ acts as by homeomorphisms of $\\mathcal{UMF}$. We show that the restriction of the action of the whole homeomorphism group of $\\mathcal{UMF}$ on some dense subset of $\\mathcal{UMF}$ coincides with the action of $\\Gamma^*$ on that subset. More precisely, let $\\mathcal{D}$ be the natural image in $\\mathcal{UMF}$ of the set of homotopy classes of not necessarily connected essential disjoint and pairwise nonhomotopic simple closed curves on $S$. The set $\\mathcal{D}$ is dense in $\\mathcal{UMF}$, it is invariant by the action of $\\Gamma^*$ on $\\mathcal{UMF}$ and the restriction of the action of $\\Gamma^*$ on $\\mathcal{D}$ is faithful. We prove that the restriction of the action on $\\mathcal{D}$ of the group $\\mathrm{Homeo}(\\mathcal{UMF})$ coincides with the action of $\\Gamma^*(S)$ on that subspace.
We define a `nice representation  of a finitely presented group G as being a non-degenerate essentially surjective simplicial map f from a `nice  space X into a 3-complex associated to a presentation of G, with a strong control over the singularities of f, and such that X is WGSC (weakly geometrically simply connected), meaning that it admits a filtration by simply connected and compact subcomplexes. In this paper we study such representations for a very large class of groups, namely QSF (quasi-simply filtered) groups, where QSF is a topological tameness condition of groups that is similar, but weaker, than WGSC. In particular, we prove that any QSF group admits a WGSC representation which is locally finite, equivariant and whose double point set is closed.
In the classical knot theory there is a well-known notion of descending diagram. From an arbitrary diagram one can easily obtain, by some crossing changes, a descending diagram which is a diagram of the unknot or unlink. In this paper the notion of descending diagram for knots and links in the real space is extended to the case of nonoriented knots and links in the projective space. It is also shown that this notion cannot be extended to oriented links.
We construct a simple topological invariant of certain 3-manifolds, including quotients of the 3-sphere by finite groups, based on the fact that the tangent bundle of an orientable 3-manifold is trivialisable. This invariant is strong enough to yield the classification of lens spaces of odd, prime order. We also use properties of this invariant to show that there is an oriented 3-manifold with no universally tight contact structure. We generalise and sharpen this invariant to an invariant of a finite covering of a 3-manifold.
The Directed Layering Problem (DLP) solves a step of the widely used layer-based approach to automatically draw directed acyclic graphs. To cater for cyclic graphs, usually a preprocessing step is used that solves the Feedback Arc Set Problem (FASP) to make the graph acyclic before a layering is determined. Here we present the Generalized Layering Problem (GLP), which solves the combination of DLP and FASP simultaneously, allowing general graphs as input. We present an integer programming model and a heuristic to solve the NP-complete GLP and perform thorough evaluations on different sets of graphs and with different implementations for the steps of the layer-based approach. We observe that GLP reduces the number of dummy nodes significantly, can produce more compact drawings, and improves on graphs where DLP yields poor aspect ratios.
We propose a simple solution to the uncertain delay problem in USRP (Universal Software Radio Peripheral)-based SDR (Software-Defined Radio)-radar systems. Instead of time-synchronization as employed in (pseudo-) passive radar configurations, which require at least two synchronized receivers, we use direct reception signal in a single receiver system as a reference to the exact location of the target echoes. After finding the reference position, reordering of the echoes is conducted by circular shift so that the reference moved to the origin. We demonstrate the effectiveness of the proposed method by simulating the problem on Matlab and implementing a 128 length random code radar on a USRP. The random code is constructed from zero padded Barker sequence product. Experiments on measuring multiple echoes of the targets at precise range bins confirm the applicability of the proposed method.
Many sources of errors exist in the manufacturing process of complex shapes. Some approximations occur at each step from the design geometry to the machined part. The aim of the paper is to present a method to evaluate the effect of high speed and high dynamic load on volumetric errors at the tool center point. The interpolator output signals and the machine encoder signals are recorded and compared to evaluate the contouring errors resulting from each axis follow-up error. The machine encoder signals are also compared to the actual tool center point position as recorded with a non-contact measuring instrument called CapBall to evaluate the total geometric errors. The novelty of the work lies in the method that is proposed to decompose the geometric errors in two categories: the quasi-static geometric errors independent from the speed of the trajectory and the dynamic geometric errors, dependent on the programmed feed rate and resulting from the machine structure deflection during the acceleration of its axes. The evolution of the respective contributions for contouring errors, quasi-static geometric errors and dynamic geomet- ric errors is experimentally evaluated and a relation between programmed feed rate and dynamic errors is highlighted.
The purpose of this document is to specify the basic data types required for storing electrophysiology and optical imaging data to facilitate computer-based neuroscience studies and data sharing. These requirements are being developed within a working group of the Electrophysiology Task Force in the International Neuroinformatics Coordinating Facility (INCF) Program on Standards for Data Sharing. While this document describes the requirements of the standard independent of the actual storage technology, the Task Force has recommended basing a standard on HDF5. This is in line with a number of groups who are already using HDF5 to store electrophysiology data, although currently without being based on a standard.
We present a fundamentally different approach to orthogonal layout of data flow diagrams with ports. This is based on extending constrained stress majorization to cater for ports and flow layout. Because we are minimizing stress we are able to better display global structure, as measured by several criteria such as stress, edge-length variance, and aspect ratio. Compared to the layered approach, our layouts tend to exhibit symmetries, and eliminate inter-layer whitespace, making the diagrams more compact.
This paper proposes a signal processing methodology of communication system and realized that circuits using operational transconductance amplifier (OTA). Two important classes of communication circuit, delta modulator and compander have been designed using that procedure. In the first implementation coded pulse modulation system is demonstrated which employ sampling, quantizing and coding to convert analog waveforms to digital signals while the second gives data compression and expansion in digital communication system. The proposed compander circuit is realized with operational transconductance amplifier and diode. Required power supply to operate the circuit is 3.5V. Performance of the circuits realized with OTAs has been demonstrated through SPICE simulation.
The 8th edition of the European Conference on Python in Science, EuroSciPy was held for the second time in the beautiful city of Cambridge, UK from August, 26th to 29th, 2014. More than 200 participants, both from academia and industry, attended the conference. As usual, the conference kicked off with two days of tutorials, divided into an introductory and an advanced track. The introductory track, presented by Joris Vankerschaver, Valerio Maggio Joris Van den Bossche, Stijn Van Hoey and Nicolas Rougier, gave a quick but thorough overview of the SciPy stack, while the experience track focused on different advanced topics. This second track began with an introduction to Bokeh, by Bryan Van den Ven, followed by an image processing tutorial with scikit-image by Emmanuelle Gouillart and Juan Nunez-Iglesias. The afternoon continued with two tutorials on data analysis: the first, intitulated \"How  good  is your model, and how can you make it better?\" (by Chih-Chun Chen, Dimitry Foures, Elena Chatzimichali, Giuseppe Vettigli) focused on the challenges face while attempting model selections, and the first day concluded with a statistics in python tutorial by Gael Varoquaux. During the second day, the attendees tackled an in depth 4 hour tutorial on Cython, presented by Stefan Behnel, and a crash course on \"Evidence-Based Teaching: What We Know and How to Use It\", by Greg Wilson.
Many filters are proposed for impulse noise removal. However, they are hard to keep excellent denoising performance with high computational efficiency. In response to this difficulty, this paper presents a novel fast filter, adaptive minimum-maximum exclusive mean (AMMEM) filter to remove impulse noise. Although the AMMEM filter is a variety of the maximum-minimum exclusive mean (MMEM) filter, however, the AMMEM filter inherits the advantages, and overcomes the drawbacks, compared with the MMEM filter. To increase the various performances of noise removal, the AMMEM filter uses an adaptive size window, introduces two flexible factors, projection factor P and detection factor T, and limits the calculation scope of the AVG. The experimental results show the AMMEM filter makes a significant improvement in terms of noise detection, image restoration, and computational efficiency. Even at noise level as high as 95%, the AMMEM filter still can restore the images with good visual effect.
This paper presents case-study results on the application of information theoretic approach to gate-level evolutionary circuit design. We introduce information measures to provide better estimates of synthesis criteria of digital circuits. For example, the analysis of signal propagation during evolving gate-level synthesis can be improved by using information theoretic measures that will make it possible to find the most effective geometry and therefore predict the cost of the final design solution. The problem is considered from the information engine point of view. That is, the process of evolutionary gate-level circuit design is presented via such measures as entropy, logical work and information vitality. Some examples of geometry driven synthesis are provided to prove the above idea.
During recent years, microelectronics helped to develop complex and varied technologies. It appears that many of these technologies can be applied successfully to realize Seebeck micro generators: photolithography and deposition methods allow to elaborate thin thermoelectric structures at the micro-scale level. Our goal is to scavenge energy by developing a miniature power source for operating electronic components. First Bi and Sb micro-devices on silicon glass substrate have been manufactured with an area of 1cm2 including more than one hundred junctions. Each step of process fabrication has been optimized: photolithography, deposition process, anneals conditions and metallic connections. Different device structures have been realized with different micro-line dimensions. Each devices performance will be reviewed and discussed in function of their design structure.
Modern digital circuit design relies on fast digital timing simulation tools and, hence, on accurate binary-valued circuit models that faithfully model signal propagation, even throughout a complex design. Unfortunately, it was recently proved [F\\\"ugger et al., ASYNC 13] that no existing binary-valued circuit model proposed so far, including the two most commonly used pure and inertial delay channels, faithfully captures glitch propagation: For the simple Short-Pulse Filtration (SPF) problem, which is related to a circuit s ability to suppress a single glitch, we showed that the quite broad class of bounded single-history channels either contradict the unsolvability of SPF in bounded time or the solvability of SPF in unbounded time in physical circuits. In this paper, we propose a class of binary circuit models that do not suffer from this deficiency: Like bounded single-history channels, our involution channels involve delays that may depend on the time of the previous output transition. Their characteristic property are delay functions which are based on involutions, i.e., functions that form their own inverse. A concrete example of such a delay function, which is derived from a generalized first-order analog circuit model, reveals that this is not an unrealistic assumption. We prove that, in sharp contrast to what is possible with bounded single-history channels, SPF cannot be solved in bounded time due to the nonexistence of a lower bound on the delay of involution channels, whereas it is easy to provide an unbounded SPF implementation. It hence follows that binary-valued circuit models based on involution channels allow to solve SPF precisely when this is possible in physical circuits. To the best of our knowledge, our model is hence the very first candidate for a model that indeed guarantees faithful glitch propagation.
The purpose of this research is to develop an Information System of Selling and Services using Microsoft Visual Basic and Microsoft Access for it database. The benefits of this research is to help CV Computer Plus in selling and services data processing everyday. To develop this IS is used 5 (five) steps: 1) Planning, 2) Analysis, 3) Design, 4) Implementation, and 5) Evaluation. The Information System can record the selling and services data, it also prepared usefull reports. By using this IS, CV Computer Plus can operate their selling and services efficiency and effectively. In the future it can be upgraded for network application.
In this paper the feasibility study of an IR sensor card is presented. The methodology and the results of a quasi real-time thermal characterization tool and method for the temperature mapping of circuits and boards based on sensing the infrared radiation is introduced. With the proposed method the IR radiation-distribution of boards from the close proximity of the sensor card is monitored in quasi real-time. The proposed method is enabling in situ IR measurement among operating cards of a system e.g. in a rack.
Micro lens array is crucial in various kinds of optical and electronic applications. A micro lens array with high numerical aperture (NA) and low aberration is in particular needed. This research is aimed to design and fabricate such a micro lens array with simple structure while keeps the same NA of a same-diameter hemisphere lens. A bi-convex semispherical micro lens array, with corresponding NA 0.379, by PDMS is first designed and analyzed. Experiments are further conducted to fabricate the designed micro lens array by the thermal reflow process. The formed profile is then sputtered with copper to serve as the mold. The front and the rear micro lens array are fabricated by plating PDMS to the mold and then assembled to form the designed micro lens array.
On Intel Sandy Bridge processor, last level cache (LLC) is divided into cache slices and all physical addresses are distributed across the cache slices using an hash function. With this undocumented hash function existing, it is impossible to implement cache partition based on page coloring. This article cracks the hash functions on two types of Intel Sandy processors by converting the problem of cracking the hash function to the problem of classifying data blocks into different groups based on eviction relationship existing between data blocks that are mapped to the same cache set. Based on the cracking result, this article proves that it s possible to implement cache partition based on page coloring on cache indexed by hashing.
The ability to manipulate or separate a biological small particle, such as a living cell and embryo, is fundamental needed to many biological and medical applications. The insulator-based dielectrophoresis (iDEP) trapping is composed of conductless tetragon structures in micro-chip. In this study, a lower conductive material of photoresist was adopted as a structure in open-top microchannel instead of a metallic wire to squeeze the electric field in a conducting solution, therefore, creating a high field gradient with a local maximum. The microchip with the open-top microchannels was designed and fabricated herein. The insulator-based DEP trapping microchip with the open-top microchannels was designed and fabricated in this work. The cells trapped by DEP force could be further treated or cultured in the open-top microchannel ; however, those trapped in the microchip with enclosed microchannels could not be proceeded easily.
This paper describes \"Variable Zo,\" a novel and proprietary approach to antenna design and optimization. The new methodology is illustrated by applying it to the design of a resistively-loaded bowtie antenna and to two broadband Yagi-Uda arrays. Variable Zo is applicable to any antenna design or optimization methodology. Using it will result in generally better antenna designs across any user-specified set of performance objectives.
Thermalcycler were extensively used machine for amplify DNA sample. One of the major problems in the working time was that it spent most of time for cooling and heating. In order to improve the efficient, this study presented a novel method for amplify DNA sample. For this concept, the DNA sample in the silicon chamber which was pushed by a beam through three temperature regions around a center and then the DNA segments could be amplified rapidly after 30 cycles. The polymerase chain reaction platform was composed of thin-film heaters, copper plates, DC powers, and temperature controllers. The photolithography and bulk etching technologies were utilized to construct the thin-film heater and DNA reaction chambers. Finally, 1 pound gL 100bp DNA segment of E. coli K12 was amplified successfully within 36 minutes on this PCR platform.
This paper introduces a method to generate hierarchically modular networks with prescribed node degree list by link switching. Unlike many existing network generating models, our method does not use link probabilities to achieve modularity. Instead, it utilizes a user-specified topology to determine relatedness between pairs of nodes in terms of edge distances and links are switched to increase edge distances. To measure the modular-ness of a network as a whole, a new metric called Q2 is proposed. Comparisons are made between the Q [15] and Q2 measures. We also comment on the effect of our modularization method on other network characteristics such as clustering, hierarchy, average path length, small-worldness, degree correlation and centrality. An application of this method is reported elsewhere [12]. Briefly, the generated networks are used as test problems to explore the effect of modularity and degree distribution on evolutionary search algorithms.
Power consumption has become a critical concern in both high performance and portable applications. Methods for power reduction based on the application of adiabatic techniques to CMOS circuits have recently come under renewed investigation. In thermodynamics, an adiabatic energy transfer through a dissipative medium is one in which losses are made arbitrarily small by causing the transfer to occur sufficiently slowly. In this work adiabatic technique is used for reduction of average power dissipation. Simulation of 6T SRAM cell has been done for 180nm CMOS technology. It shows that average power dissipation is reduced up to 75% using adiabatic technique and also shows the effect on static noise margin.
In this paper, a new voltage-mode first order all-pass filter using minimum active and passive components is presented. The proposed circuit employs one fully differential second generation current conveyor (FDCCII), one grounded capacitor, one resistor and offers the following advantages: the use of only grounded capacitor which is attractive for integrated circuit implementation, low active and passive sensitivities, providing inverting and non-inverting voltage-mode all-pass responses simultaneously from the single circuit and no requirement for component matching conditions. The theory is validated through PSPICE simulation using TSMC 0.35micrometer CMOS process parameters.
The paper deals with associating the optimal machining strategy to a given pocket geometry, within the context of High-Speed Machining (HSM) of aeronautical pockets. First we define different classes of pocket features according to geometrical criteria. Following, we propose a method allowing to associate a set of capable tools to the features. Each capable tool defines a machined zone with a specific geometry. The last part of the paper is thus dedicated to associate the optimal machining strategy to a given geometry within the context of HSM. Results highlight that analyses must be conducted in a dynamical as well as a geometrical viewpoint. In particular, it becomes necessary to integrate dynamical specifities associated to the behavior of the couple machine/NC unit in the tool path calculation.
In this work, a 3-D simulation is performed to study for the solid-fluid coupling effect driven by piezoelectric materials and utilizes asymmetric obstacles to control the flow direction. The result of simulation is also verified. For a micropump, it is crucial to find the optimal working frequency which produce maximum net flow rate. The PZT plate vibrates under the first mode, which is symmetric. Adjusting the working frequency, the maximum flow rate can be obtained. For the micrpump we studied, the optimal working frequency is 3.2K Hz. At higher working frequency, say 20K Hz, the fluid-solid membrane may come out a intermediate mode, which is different from the first mode and the second mode. It is observed that the center of the mode drifts. Meanwhile, the result shows that a phase shift lagging when the excitation force exists in the vibration response. Finally, at even higher working frequency, say 30K Hz, a second vibration mode is observed.
A noise map facilitates the monitoring of environmental noise pollution in urban areas. However, state-of-the-art techniques for rendering noise maps in urban areas are expensive and rarely updated, as they rely on population and traffic models rather than on real data. Smart phone based urban sensing can be leveraged to create an open and inexpensive platform for rendering up-to- date noise maps. In this paper, we present the design, implementation and performance evaluation of an end-to-end, context-aware, noise mapping system called Ear-Phone. Ear-Phone investigates the use of different interpolation and regularization methods to address the fundamental problem of recovering the noise map from incomplete and random samples obtained by crowdsourcing data collection. Ear-Phone, implemented on Nokia N95, N97 and HP iPAQ, HTC One mobile devices, also addresses the challenge of collecting accurate noise pollution readings at a mobile device. A major challenge of using smart phones as sensors is that even at the same location, the sensor reading may vary depending on the phone orientation and user context (for example, whether the user is carrying the phone in a bag or holding it in her palm). To address this problem, Ear-Phone leverages context-aware sensing. We develop classifiers to accurately determine the phone sensing context. Upon context discovery, Ear-Phone automatically decides whether to sense or not. Ear-phone also implements in-situ calibration which performs simple calibration that can be carried out without any technical skills whatsoever required on the user s part. Extensive simulations and outdoor experiments demonstrate that Ear-Phone is a feasible platform to assess noise pollution, incurring reasonable system resource consumption at mobile devices and providing high reconstruction accuracy of the noise map.
Coal blending is a critically important process in the coal mining industry as it directly influences the number of product tonnes and the total revenue generated by a mine site. Coal blending represents a challenging and complex problem with numerous blending possibilities, multiple constraints and competing objectives. At many mine sites, blending decisions are made using heuristics that have been developed through experience or made by using computer assisted control algorithms or linear programming. While current blending procedures have achieved profitable outcomes in the past, they often result in a sub-optimal utilization of high quality coal. This sub-optimality has a considerable negative impact on mine site productivity as it can reduce the amount of lower quality ROM that is blended and sold. This article reviews the coal blending problem and discusses some of the difficult trade-offs and challenges that arise in trying to address this problem. We highlight some of the risks from making simplifying assumptions and the limitations of current software optimization systems. We conclude by explaining how the mining industry would significantly benefit from research and development into optimization algorithms and technologies that are better able to combine computer optimization algorithm capabilities with the important insights of engineers and quality control specialists.
Presented are a methodology and a DFII-based tool for AC-stability analysis of a wide variety of closed-loop continuous-time (operational amplifiers and other linear circuits). The methodology used allows for easy identification and diagnostics of ac-stability problems including not only main-loop effects but also local-instability loops in current mirrors, bias circuits and emitter or source followers without breaking the loop. The results of the analysis are easy to interpret. Estimated phase margin is readily available. Instability nodes and loops along with their respective oscillation frequencies are immediately identified and mapped to the existing circuit nodes thus offering significant advantages compared to traditional \"black-box\" methods of stability analysis (Transient Overshoot, Bode and Phase margin plots etc.). The tool for AC-Stability analysis is written in SKILL? and is fully integrated in DFII? environment. Its \"push-button\" graphical user interface (GUI) is easy to use and understand. The tool can be invoked directly from Composer? schematic and does not require active Analog Artist? session. The tool is not dependent on the use of a specific fabrication technology or Process Design Kit customization. It requires OCEAN?, Spectre? and Waveform calculator capabilities to run.
This article is present high precision multiwave rectifier circuit operating in low voltage plus or minus 1.5 Volt current modes by CMOS technology 0.5 \\mum, receive input and give output in current mode, respond at high frequency period. The structure compound with high speed current comparator circuit, current mirror circuit, and CMOS inverter circuit. PSpice program used for confirmation the performance of testing. The PSpice program shows operating of circuit is able to working at maximum input current 400 \\muAp p, maximum frequency responding 200 MHz, high precision and low power losses, and non-precision zero crossing output signal.
The learning and assessment activities have undergone major changes due to the development of modern technologies. The computer-assisted learning and testing has proven a number of advantages in the development of modern educational system. The paper suggests a solution for the computer-assisted testing, which uses XML technologies, a solution that could make the basis for developing a learning computer-assisted system.
The main objective of this paper is to design and develop an automatic vehicle, fully controlled by a computer system. The vehicle designed in the present work can move in a pre-determined path and work automatically without the need of any human operator and it also controlled by human operator. Such a vehicle is capable of performing wide variety of difficult tasks in space research, domestic, scientific and industrial fields. For this purpose, an IBM compatible PC with Pentium microprocessor has been used which performed the function of the system controller. Its parallel printer port has been used as data communication port to interface the vehicle. A suitable software program has been developed for the system controller to send commands to the vehicle.
In his Discourse on the Method of Rightly Conducting the Reason, and Seeking Truth in the Sciences, Rene Descartes sought ``clear and certain knowledge of all that is useful in life.   Almost three centuries later, in ``The foundations of mathematics,   David Hilbert tried to ``recast mathematical definitions and inferences in such a way that they are unshakable.   Hilbert s program relied explicitly on formal systems (equivalently, computational systems) to provide certainty in mathematics. The concepts of computation and formal system were not defined in his time, but Descartes  method may be understood as seeking certainty in essentially the same way. In this article, I explain formal systems as concrete artifacts, and investigate the way in which they provide a high level of certainty---arguably the highest level achievable by rational discourse. The rich understanding of formal systems achieved by mathematical logic and computer science in this century illuminates the nature of programs, such as Descartes  and Hilbert s, that seek certainty through rigorous analysis.
Engineering activities involve large groups of people from different domains and disciplines. They often generate important information flows that are difficult to manage. To face these difficulties, a knowledge engineering process is necessary to structure the information and its use. This paper presents a deployment of a knowledge capitalization process based on the enrichment of MOKA methodology to support the integration of Process Planning knowledge in a CAD System. Our goal is to help different actors to work collaboratively by proposing one referential view of the domain, the context and the objectives assuming that it will help them in better decision-making.
The design of cyber-physical systems (CPSs) faces various new challenges that are unheard of in the design of classical real-time systems. Power optimization is one of the major design goals that is witnessing such new challenges. The presence of interaction between the cyber and physical components of a CPS leads to dependence between the time delay of a computational task and the amount of workload in the next iteration. We demonstrate that it is essential to take this delay-workload dependence into consideration in order to achieve low power consumption. In this paper, we identify this new challenge, and present the first formal and comprehensive model to enable rigorous investigations on this topic. We propose a simple power management policy, and show that this policy achieves a best possible notion of optimality. In fact, we show that the optimal power consumption is attained in a \"steady-state\" operation and a simple policy of finding and entering this steady state suffices, which can be quite surprising considering the added complexity of this problem. Finally, we validated the efficiency of our policy with experiments.
Orthogonal Frequency Division Multiplexing (OFDM) has recently been used widely in wireless communication systems. OFDM is very effective in combating intersymbol interference and can achieve high data rate in frequency selective channel. For OFDM communication systems, the frequency offsets in mobile radio channels distort the orthogonality between subcarriers resulting in Inter Carrier Interference (ICI). ICI causes power leakage among subcarriers thus degrading the system performance. A wellknown problem of OFDM is its sensitivity to frequency offset between the transmitted and received carrier frequencies. There are two deleterious effects caused by frequency offset one is the reduction of signal amplitude in the output of the filters matched to each of the carriers and the second is introduction of ICI from the other carriers. This research work investigates three effective methods for combating the effects of ICI: ICI Self Cancellation (SC), Maximum Likelihood (ML) estimation, and Extended Kalman Filter (EKF) method. These three methods are compared in terms of bit error rate performance and bandwidth efficiency. Through simulations, it is shown that the three techniques are effective in mitigating the modulation schemes, the ML and EKF methods perform better than the SC method.
Modelling MEMS involves a variety of software tools that deal with the analysis of complex geometrical structures and the assessment of various interactions among different energy domains and components. Moreover, the MEMS market is growing very fast, but surprisingly, there is a paucity of modelling and simulation methodology for precise performance verification of MEMS products in the nonlinear regime. For that reason, an efficient and rapid modelling approach is proposed that meets the linear and nonlinear dynamic behaviour of MEMS systems.
This paper present a survey and discussion of the Reference Model for Open Distributed Processing (RM-ODP) viewpoints; oriented approaches to requirements engineering viewpoint and a presentation of new work in the application wireless mobile phone, this area which has been designed with practical application using the Unified Modelling Language (UML)/VHDL_AMS (VHSIC Hardware Description Language Analog and Mixed-Signal). We mainly focus on rising and fulling time, action, uplink behaviour constraints (sequentiality, non determinism and concurrency constraints).We discuss the practical problems of introducing viewpoint; oriented requirements engineering into industrial software engineering practice and why these have prevented the widespread use of existing approaches. The goal of this article is to check the uplink path using the MIC (Microphone amplifier) with all analog inputs, and check the amplifier gain. This paper provides an example of using the Uplink Framework to build a comprehensive, good solution for Application Wireless Mobile Phone. Finally, we discuss how well this approach addresses some outstanding problems in requirements engineering (RE) and the practical industrial problems of introducing new requirements engineering methods.
Inspired by the emergent membrane computing (P Systems) concepts, some efforts are carried out introducing simulation models, some are software oriented, and others are hardware, yet all are applied with the current vision of the conventional computers, based on \"Von Neumann architecture\", which is a sequential design in its essence. We think that these models will need \"as a consequent result\" to a new architecture exposing a true parallel design, in this paper; we try to investigate and introduce a global view for how it would be like to have such architecture. The main goal is to point out to this direction broadly, suggesting that it might be useful considering some aspects, like the need for a new definition of an operating system and its programs, which will eventually lead to a higher scope: the membrane computer.
In this paper, a new synesthetic documentation method that contributes to media art conservation is presented. This new method is called e-Installation in analogy to the idea of the e-Book as the electronic version of a real book. An e-Installation is a virtualized media artwork that reproduces all synesthesia, interaction, and meaning levels of the artwork. Advanced 3D modeling and telepresence technologies with a very high level of immersion allow the virtual re-enactment of works of media art that are no longer performable or rarely exhibited. The virtual re-enactment of a media artwork can be designed with a scalable level of complexity depending on whether it addresses professionals such as curators, art restorers, and art theorists or the general public. An e-Installation is independent from the artwork s physical location and can be accessed via head-mounted display or similar data goggles, computer browser, or even mobile devices. In combination with informational and preventive conservation measures, the e-Installation offers an intermediate and long-term solution to archive, disseminate, and pass down the milestones of media art history as a synesthetic documentation when the original work can no longer be repaired or exhibited in its full function.
Broadband Wireless Access (BWA) has emerged as a promising solution for providing last mile internet access technology to provide high speed internet access to the users in the residential as well as in the small and medium sized enterprise sectors. IEEE 802.16e is one of the most promising and attractive candidate among the emerging technologies for broadband wireless access. The emergence of WiMAX protocol has attracted various interests from almost all the fields of wireless communications. MIMO systems which are created according to the IEEE 802.16-2005 standard (WiMAX) under different fading channels can be implemented to get the benefits of both the MIMO and WiMAX technologies. In this paper analysis of higher level of modulations (i.e. M-PSK and M-QAM for different values of M) with different code rates and on WiMAX-MIMO system is presented for Rayleigh channel by focusing on spatial multiplexing MIMO technique. Signal-to Noise Ratio (SNR) vs Bit Error Rate (BER) analysis has been done.
This paper focus on the study of the motion activity descriptor for shot boundary detection in video sequences. We interest in the validation of this descriptor in the aim of its real time implementation with reasonable high performances in shot boundary detection. The motion activity information is extracted in uncompressed domain based on adaptive rood pattern search (ARPS) algorithm. In this context, the motion activity descriptor was applied for different video sequence.
The paper presents a current tunable multifunction filter using current conveyor. The proposed circuit can be realized as on chip tunable low pass, high pass, band pass and elliptical notch filter. The circuit employs two current conveyors, one OTA, four resistors and two grounded capacitors, ideal for integration. It has only one output terminal and the number of input terminals may be used. Further, there is no requirement for component matching in the circuit. The resonance frequency ({\\omega}0) and bandwidth ({\\omega}0 /Q) enjoy orthogonal tuning. The cutoff frequency of the filter is tunable by changing the bias current, which makes it on chip tunable filter. The circuit is realized by using commercially available current conveyor AD844 and OTA LM13700. A HSPICE simulation of circuit is also studied for the verification of theoretical results.
General-purpose computing on graphics processing units (GPGPU) has recently gained considerable attention in various domains such as bioinformatics, databases and distributed computing. GPGPU is based on using the GPU as a co-processor accelerator to offload computationally-intensive tasks from the CPU. This study starts from the observation that a number of GPU features (such as overlapping communication and computation, short lived buffer reuse, and harnessing multi-GPU systems) can be abstracted and reused across different GPGPU applications. This paper describes CrystalGPU, a modular framework that transparently enables applications to exploit a number of GPU optimizations. Our evaluation shows that CrystalGPU enables up to 16x speedup gains on synthetic benchmarks, while introducing negligible latency overhead.
We propose a general approach to compute the seed sensitivity, that can be applied to different definitions of seeds. It treats separately three components of the seed sensitivity problem - a set of target alignments, an associated probability distribution, and a seed model - that are specified by distinct finite automata. The approach is then applied to a new concept of subset seeds for which we propose an efficient automaton construction. Experimental results confirm that sensitive subset seeds can be efficiently designed using our approach, and can then be used in similarity search producing better results than ordinary spaced seeds.
We study the problem of scheduling periodic real-time tasks so as to meet their individual minimum reward requirements. A task generates jobs that can be given arbitrary service times before their deadlines. A task then obtains rewards based on the service times received by its jobs. We show that this model is compatible to the imprecise computation models and the increasing reward with increasing service models. In contrast to previous work on these models, which mainly focus on maximize the total reward in the system, we aim to fulfill different reward requirements by different tasks, which offers better fairness and allows fine-grained tradeoff between tasks. We first derive a necessary and sufficient condition for a system, along with reward requirements of tasks, to be feasible. We also obtain an off-line feasibility optimal scheduling policy. We then studies a sufficient condition for a policy to be feasibility optimal or achieves some approximation bound. This condition can serve as a guideline for designing on-line scheduling policy and we obtains a greedy policy based on it. We prove that the on-line policy is feasibility optimal when all tasks have the same periods and also obtain an approximation bound for the policy under general cases.
In this demonstration, we present an open source toolkit for evaluating non-intrusive load monitoring research; a field which aims to disaggregate a household s total electricity consumption into individual appliances. The toolkit contains: a number of importers for existing public data sets, a set of preprocessing and statistics functions, a benchmark disaggregation algorithm and a set of metrics to evaluate the performance of such algorithms. Specifically, this release of the toolkit has been designed to enable the use of large data sets by only loading individual chunks of the whole data set into memory at once for processing, before combining the results of each chunk.
As the Internet help us cross language and cultural border by providing different types of translation tools, cross language plagiarism, also known as translation plagiarism are bound to arise. Especially among the academic works, such issue will definitely affect the student s works including the quality of their assignments and paper works. In this paper, we propose a new approach in detecting cross language plagiarism. Our web based cross language plagiarism detection system is specially tuned to detect translation plagiarism by implementing different techniques and tools to assist the detection process. Google Translate API is used as our translation tool and Google Search API, which is used in our information retrieval process. Our system is also integrated with the fingerprint matching technique, which is a widely used plagiarism detection technique. In general, our proposed system is started by translating the input documents from Malay to English, followed by removal of stop words and stemming words, identification of similar documents in corpus, comparison of similar pattern and finally summary of the result. Three least-frequent 4-grams fingerprint matching is used to implement the core comparison phase during the plagiarism detection process. In K-gram fingerprint matching technique, although any value of K can be considered, yet K = 4 was stated as an ideal choice. This is because smaller values of K (i.e., K = 1, 2, or 3), do not provide good discrimination between sentences. On the other hand, the larger the values of K (i.e., K = 5, 6, 7...etc), the better discrimination of words in one sentence from words in another.
This paper presents the study of an original closed-loop conditioning approach for fully-integrated convective inertial sensors. The method is applied to an accelerometer manufactured on a standard CMOS technology using an auto-aligned bulk etching step. Using the thermal behavior of the sensor as a summing function, a first order sigma-delta modulator is built. This \"electro-physical\" modulator realizes an analog-to-digital conversion of the signal. Besides the feedback scheme should improve the sensor performance.
Mobility is an important attribute in todays computing world. Mobile devices,smartphone and tablet PC are becoming an integral part of human life because they are most effective and convenient communication tools. This paper proposes a system to connect and access the desktops of remote computer systems using an android based Smartphone. Virtual Network Computing based architecture is used to develop the proposed system. Through a VirtuMob viewer provided on the users Smartphone, the user will be able to access and manipulate the desktops of remote computers. Several functionality such as viewing the desktop, mouse operations, keyboard operations, manipulation of documents can be performed from the Smartphone. VirtuMob server should be running on the remote system and it must be attached to a network. VirtuMob Accelerator is used to process the RFB frames of the desktop, perform Encoding of the frames and then relay the frames to the viewer over the internet. Several Encoding techniques are studied and analysed to determine which is best suited for the proposed system.
Nowadays, many vegetables are grown insidegreenhouses in which environment is controlled and nutrition can be supplied through water supply using electrical pump, namely fertigation. Dosage of nutrition in water for many vegetable plants are also known so that by controllingwater supply all the needsfor the plants to grow are available. Furthermore, water supply can be controlled using electrical pump which is activated according to theplants conditionin relation with water supply. In order to supply water and nutrition in the right amount and time, plants condition can be observed using a CCD camera attached to image processing facilitiesto develop a speaking plant approach. In this study, plants development during their growing periodare observedusing image processing. Three populationsof tomato plants, with less, enough, and exceeded nutrition in water,are captured using a CCD camera every three days, and the images were analyzed using a developed computer program for the heightof plants. The results showed that the development of the plants can be monitored using this method. After that, the responseof plant growth in the same condition was monitored, and the responsewas used as input for the fertigation system to turn electrical pump automatically on and off, so the fertigation system could maintain the growth of the plants.
Results of an exhaustive search for minimum peak sidelobe level binary sequences are presented. Several techniques for efficiency implementation of search algorithm are described. A table of number of non-equivalent optimal binary sequences with minimum peak sidelobe (MPS) level up to length 68 is given. This number can be used in prediction of the longest length for a given sidelobe level of binary sequences. The examples of optimal binary MPS sequences having high merit factor are shown.
Commercially available scheduling tools such as Primavera and Microsoft Project fail to provide information pertaining to the spatial aspects of construction project. A methodology using geographical information systems (GIS) is developed to represent spatial aspects of the construction progress graphically by synchronizing it with construction schedule. The spatial aspects are depicted by 3D model developed in AutoCAD and construction schedule is generated using Microsoft Excel. Spatial and scheduling information are linked together into the GIS environment (ArcGIS). The GIS-based system developed in this study may help in better understanding the schedule along with its spatial aspects.
This paper presents a novel software driven voltage tuning method that utilises multi-purpose Ring Oscillators (ROs) to provide process variation and environment sensitive energy reductions. The proposed technique enables voltage tuning based on the observed frequency of the ROs, taken as a representation of the device speed and used to estimate a safe minimum operating voltage at a given core frequency. A conservative linear relationship between RO frequency and silicon speed is used to approximate the critical path of the processor. Using a multi-purpose RO not specifically implemented for critical path characterisation is a unique approach to voltage tuning. The parameters governing the relationship between RO and silicon speed are obtained through the testing of a sample of processors from different wafer regions. These parameters can then be used on all devices of that model. The tuning method and software control framework is demonstrated on a sample of XMOS XS1-U8A-64 embedded microprocessors, yielding a dynamic power saving of up to 25% with no performance reduction and no negative impact on the real-time constraints of the embedded software running on the processor.
With its ever growing popularity, providing Internet based applications tuned towards practical applications is on the rise. Advantages such as no external plugins and additional software, ease of use, updating and maintenance have increased the popularity of web applications. In this work, a web-based application has been developed which can perform size optimization of truss structure as a whole as well as topology optimization of individual gusset plate of each joint based on specified joint displacements and load conditions. This application is developed using cutting-edge web technologies such as Three.js and HTML5. The client side boasts of an intuitive interface which in addition to its modeling capabilities also recommends configurations based on user input, provides analysis options and finally displays the results. The server side, using a combination of Scilab and DAKOTA, computes solution and also provides the user with comparisons of the optimal design with that conforming to Indian Standard (IS 800-2007). It is a freely available one-stop web-based application to perform optimal and/or code based design of trusses.
This paper reports on the systematic electromechanical characterization of a new three-axial force sensor used in dimensional metrology of micro components. The siliconbased sensor system consists of piezoresistive mechanicalstress transducers integrated in thin membrane hinges supporting a suspended flexible cross structure. The mechanical behavior of the fragile micromechanical structure isanalyzed for both static and dynamic load cases. This work demonstrates that the silicon microstructure withstands static forces of 1.16N applied orthogonally to the front-side of the structure. A statistical Weibull analysis of the measured data shows that these values are significantly reduced if the normal force is applied to the back of the sensor. Improvements of the sensor system design for future development cycles are derived from the measurement results.
This study undertakes the theoretical design, CAD modeling, realization, and performance analysis of a microwave low-noise amplifier (LNA) which has been accurately developed for operation at 3.0 GHz (S-band). The objective of this research is to thoroughly analyze and develop a reliable microstrip LNA intended for a potential employment in wireless communication systems, and satellite applications. The S-band microwave LNA demonstrates the appropriateness to develop a high-performance and well-established device realization for wireless RF systems. The microwave amplifier simulations have been conducted using the latest version of the AWR Design Environment software.
This paper proposes a new variable step-size (VSS) scheme for the recently introduced zero-point attracting projection (ZAP) algorithm. The proposed variable step-size ZAPs are based on the gradient of the estimated filter coefficients sparseness that is approximated by the difference between the sparseness measure of current filter coefficients and an averaged sparseness measure. Simulation results demonstrate that the proposed approach provides both faster convergence rate and better tracking ability than previous ones.
The Gemini Observatory is planning to implement a Multi Conjugate Adaptive Optics (MCAO) System as a facility instrument for the Gemini-South telescope. The system will include 5 Laser Guide Stars, 3 Natural Guide Stars, and 3 Deformable mirrors optically conjugated at different altitudes to achieve near-uniform atmospheric compensation over a 1 arc minute square field of view. The control of such a system will be split into 3 main functions: the control of the opto-mechanical assemblies of the whole system (including the Laser, the Beam Transfer Optics and the Adaptive Optics bench), the control of the Adaptive Optics System itself at a rate of 800FPS and the control of the safety system. The control of the Adaptive Optics System is the most critical in terms of real time performances. The control system will be an EPICS based system. In this paper, we will describe the requirements for the whole MCAO control system, preliminary designs for the control of the opto-mechanical devices and architecture options for the control of the Adaptive Optics system and the safety system.
In this paper we present an electronic circuit for position or capacitance estimation of MEMS electrostatic actuators based on a switched capacitor technique. The circuit uses a capacitive divider configuration composed by a fixed capacitor and the variable capacitance of the electrostatic actuator for generating a signal that is a function of the input voltage and capacitive ratio. The proposed circuit can be used to actuate and to sense position of an electrostatic MEMS actuator without extra sensing elements. This approach is compatible with the requirements of most analog feedback systems and the circuit topology of pulsed digital oscillators (PDO).
The European Proximity Operation Simulator (EPOS) of the DLR-German Aerospace Center is a robotics-based simulator that aims at validating and verifying a satellite docking phase. The generic concept features a robotics tracking system working in closed loop with a force/torque feedback signal. Inherent delays in the tracking system combined with typical high stiffness at contact challenge the stability of the closed-loop system. The proposed concept of operations is hybrid: the feedback signal is a superposition of a measured value and of a virtual value that can be tuned in order to guarantee a desired behavior. This paper is concerned with an analytical study of the system s closed-loop stability, and with an experimental validation of the hybrid concept of operations in one dimension (1D). The robotics simulator is modeled as a second-order loop-delay system and closed-form expressions for the critical delay and associated frequency are derived as a function of the satellites  mass and the contact dynamics stiffness and damping parameters. A numerical illustration sheds light on the impact of the parameters on the stability regions. A first-order Pade approximation provides additional means of stability investigation. Experiments were performed and tests results are described for varying values of the mass and the damping coefficients. The empirical determination of instability is based on the coefficient of restitution and on the observed energy. There is a very good agreement between the critical damping values predicted by the analysis and observed during the tests...
To ensure safety in confined environments such as mines or subway tunnels, a (wireless) sensor network can be deployed to monitor various environmental conditions. One of its most important applications is to track personnel, mobile equipment and vehicles. However, the state-of-the-art algorithms assume that the positions of the sensors are perfectly known, which is not necessarily true due to imprecise placement and/or dropping of sensors. Therefore, we propose an automatic approach for simultaneous refinement of sensors  positions and target tracking. We divide the considered area in a finite number of cells, define dynamic and measurement models, and apply a discrete variant of belief propagation which can efficiently solve this high-dimensional problem, and handle all non-Gaussian uncertainties expected in this kind of environments. Finally, we use ray-tracing simulation to generate an artificial mine-like environment and generate synthetic measurement data. According to our extensive simulation study, the proposed approach performs significantly better than standard Bayesian target tracking and localization algorithms, and provides robustness against outliers.
In a 1950 article in Mind, decades before the existence of anything resembling an artificial intelligence system, Alan Turing addressed the question of how to test whether machines can think, or in modern terminology, whether a computer claimed to exhibit intelligence indeed does so. The current paper raises the analogous issue for olfaction: how to test the validity of a system claimed to reproduce arbitrary odors artificially, in a way recognizable to humans, in face of the unavailability of a general naming method for odors. Although odor reproduction systems are still far from being viable, the question of how to test candidates thereof is claimed to be interesting and nontrivial, and a novel method is proposed. To some extent, the method is inspired by Turing`s test for AI, in that it involves a human challenger and the real and artificial entities, yet it is very different: our test is conditional, requiring from the artificial no more than is required from the original, and it employs a novel method of immersion that takes advantage of the availability of near-perfect reproduction methods for sight and sound.
Automatic door is an automated movable barrier installed in the entry of a room or building to restrict access, provide ease of opening a door or provide visual privacy. As a result of enhanced civilization and modernization, the human nature demands more comfort to his life. The man seeks ways to do things easily and which saves time. So thus, the automatic gates are one of the examples that human nature invent to bring comfort and ease in its daily life. To this end, we model and design an automatic sliding door with a room light control system to provide the mentioned needs. This was achieved by considering some factors such as economy, availability of components and research materials, efficiency, compatibility and portability and also durability in the design process. The performance of the system after test met design specifications. This system works on the principle of breaking an infrared beam of light, sensed by a photodiode. It consists of two transmitting infrared diodes and two receiving photo-diodes. The first one is for someone coming in and the second one is for someone going out of the room. The photodiodes are connected to comparators, which give a lower output when the beam is broken and high output when transmitting normally. The general operation of the work and performance is dependent on the presence of an intruder entering through the door and how close he/she is in closer to the door. The door is meant to open automatically but in a case where there is no power supply trying to force the door open would damage the mechanical control system of the unit. The overall work was implemented with a constructed work, tested working and perfectly functional.
A modular, programmable, and high performance Power Gating strategy, called cluster based tunable sleep transistor cell Power Gating, has been introduced in the present paper with a few modifications. Furthermore, a detailed comparison of its performance with some of the other conventional Power Gating schemes; such as Cluster Based Sleep Transistor Design (CBSTD), Distributed Sleep Transistor Network (DSTN) etc.; has also been presented here. Considering the constraints of power consumption, performance, and the area overhead, while doing the actual implementation of any Power Gating scheme, it becomes important to deal with the various design issues like the proper sizing of the sleep transistors (STs), controlling the voltage drop (IR drop) across the STs, and obviously maintaining a desired performance with lower amount of delay degradation. With this notion, we tried to find out an efficient Power Gating strategy which can reduce the overall power consumption of any CMOS circuit by virtue of reducing the standby mode leakage current. Taking the different performance parameters into account, for an example circuit, which is actually the conventional 4x4 multiplier design, we found that the modified tunable sleep transistor cell Power Gating gives very much promising results. The reported architecture of the 4x4 multiplier with the tunable sleep transistor cell Power Gating, is designed using 45 nm technology and it consumes 1.3638x10-5 Watt of Average Power while being operated with the nominal case of the bit configuration word, that is, 1000. ...........
Today s peer review process for scientific articles is unnecessarily opaque and offers few incentives to referees. Likewise, the publishing process is unnecessarily inefficient and its results are only rarely made freely available to the public. Here we outline a comparatively simple extension of arXiv.org, an online preprint archive widely used in the mathematical and physical sciences, that addresses both of these problems. Under the proposal, editors invite referees to write public and signed reviews to be attached to the posted preprints, and then elevate selected articles to \"published\" status.
This paper proposes a method to vibration analysis in order to on-line monitoring of milling process quality. Adapting envelope analysis to characterize the milling tool materials is an important contribution to the qualitative and quantitative characterization of milling capacity and a step by modeling the three-dimensional cutting process. An experimental protocol was designed and developed for the acquisition, processing and analyzing three-dimensional signal. The vibration envelope analysis is proposed to detect the cutting capacity of the tool with the optimization application of cutting parameters. The research is focused on FFT Fourier transform optimization of vibration analysis and vibration envelope to evaluate the dynamic behavior of the machine/ tool/workpiece
The beauty of Information Technology (IT) is with its multifunction nature; it is a support system, a networking system, a storage system, as well as an information facilitator. Aided with their broad line of services, an IT system aims to support or even drive organizations towards desired paths. Trends of IT and information security awareness (ISA) in society today, particularly within the business environment is quite interesting phenomenon. The overviews of the role of IT in the modern world as well as the perception towards ISA are initially introduced. A series of scope are outlined, and also further examination on matter of IT and ISA in the business environment-emphasis on revolution of business with ISA, security threats such as identity thefts, hacking and web harassment, and the different mode of protections that are applied in different business environments. Unfortunately, the advancement of IT is not followed by the awareness of its security issues properly, especially in the context of the business settings and functions. This research and review is expected to influence the awareness of information security issues in business processes.
This paper presents a smart cushion for real time heart rate monitoring. The cushion comprises of an integrated micro-bending fiber sensor, which records the BCG (Ballistocardiogram) signal without direct skin-electrode contact, and an optical transceiver that does signal amplification, digitization, and pre-filtering. To remove the artifacts and extract heart rate from BCG signal, a computationally efficient heart rate detection algorithm is developed. The system doesn t require any pre-training and is highly responsive with the outputs updated every 3 sec and initial response within first 10 sec. Tests conducted on human subjects show the detected heart rate closely matches the one from a commercial SpO2 device.
The increase in dissipated power per unit area of electronic components sets higher demands on the performance of the heat sink. Also if we continue at our current rate of miniaturisation, laptops and other electronic devices can get heated up tremendously. Hence we require a better heat dissipating system to overcome the excess heat generating problem of using nanoelectronics, which is expected to power the next generation of computers. To handle the excessive and often unpredictable heating up of high performance electronic components like microprocessors, we need to predict the temperature profile of the heat sink used. This also helps us to select the best heat sink for the operating power range of any microprocessor. Understanding the temperature profile of a heat sink and a microprocessor helps us to handle its temperature efficiently for a range of loads. In this work, a method to estimate the normal response of a heat sink to various loads of a microprocessor is explained.
This paper is to describe a design and fabrication method for a valve-less peristaltic micro-pump. The valve-less peristaltic micro-pump with three membrane chambers in a serial is actuated by three piezoelectric (PZT) actuators. With the fluidic flow design, liquid in the flow channel is pumped to a constant flow speed ranged from 0.4 to 0.48 mm/s. In term of the maximum flow rate of the micro-pump is about 365 mircoliters/min, when the applied voltage is 24V and frequency 50 Hz. Photolithography process was used to fabricate the micro-pump mold. PDMS molding and PDMS bonding method were used to fabricate the micro-channel and actuator chambers. A portable drive controller was designed to control three PZT actuators in a proper sequence to drive the chamber membrane. Then, all parts were integrated into the portable valve-less peristaltic micro-pump system.
Depending on the type of Micro-Electro-Mechanical System (MEMS), packaging costs are contributing up to 80% of the total device cost. Each MEMS device category, its function and operational environment will individually dictate the packaging requirement. Due to the lack of standardized testing procedures, the reliability of those MEMS packages sometimes can only be proven by taking into consideration its functionality over lifetime. Innovation with regards to cost reduction and standardization in the field of packaging is therefore of utmost importance to the speed of commercialisation of MEMS devices. Nowadays heavily driven by consumer applications the MEMS device market is forecasted to enjoy a compound annual growth rate (CAGR) above 13%, which is when compared to the IC device market, an outstanding growth rate. Nevertheless this forecasted value can drift upwards or downwards depending on the rate of innovation in the field of packaging. MEMS devices typically require a specific fabrication process where the device wafer is bonded to a second wafer which effectively encapsulates the MEMS structure. This method leaves the device free to move within a vacuum or an inert gas atmosphere.
In this paper, a study on the end-to-end performance of dual-hop wireless communication systems equipped with fixed-gain relays and operating over Generalized-Gamma (GG) fading channels is presented. A novel closed form expression for the moments of the end-to-end signal-to-noise ratio (SNR) is derived. The average bit error probability for coherent and non-coherent modulation schemes as well as the end-to-end outage probability of the considered system are also studied. Extensive numerically evaluated and computer simulations results are presented that verify the accuracy of the proposed mathematical analysis.
Embedded systems have pervaded all walks of our life. With the increasing importance of mobile embedded systems and flexible applications, considerable progress in research has been made for power management. Power constraints are increasingly becoming the critical component of the design specifications of these systems. It helps in pre-determining the suitable hardware architecture for the target application. The aim of this paper is to present a technique to estimate  pre-run time  and  power  of a software mapped onto a hardware system; guaranteeing the compliance of temporal constraints while generating a schedule of tasks of software. Real time systems must handle several independent macro-tasks, each represented by a task graph, which includes communications and precedence constraints. We propose a novel approach for power estimation of embedded software using the Control Data Flow Graph (CDFG) or task graph model. This methodology uses an existing Hierarchical Concurrent Flow Graph (HCFG) technique for the power analysis of the CDFGs. We have evaluated our technique for energy efficient scheduling over various task graph benchmarks. The results obtained prove the utility and efficacy of our proposed approach for power analysis of embedded software. We also present a methodology to obtain an energy optimal voltage assignment and perform scheduling by taking advantage of the relaxation in execution time of tasks.
Informatics world digitizes the human beings, with the contribution made by all the industrial people. In the recent survey it is proved that people are not accustomed or they are not able to access the electronic devices to its extreme usage. Also people are more dependent to the technologies and their day-to-day activities are ruled by the same. In this paper we discuss on one of the advanced technology which will soon rule the world and make the people are more creative and at the same time hassle-free. This concept is introduced as 6th sense technology by an IIT, Mumbai student who is presently Ph.D., scholar in MIT, USA. Similar to this research there is one more research going on under the title Augmented Reality. This research makes a new association with the real world to digital world and allows us to share and manipulate the information directly with our mental thoughts. A college which implements state of the art technology for teaching and learning, Higher College of Technology, Muscat, (HCT) tries to identify the opportunities and limitations of implementing this augmented reality for teaching and learning. The research team of HCT, here, tries to give two scenarios in which augmented reality can fit in. Since this research is in the conceptual level we are trying to illustrate the history of this technology and how it can be adopted in the teaching environment
Deoxyribonucleic acid is increasingly being understood to be an informational molecule, capable of information processing.It has found application in the determination of non-deterministic algorithms and in the design of molecular computing devices. This is a theoretical analysis of the mathematical properties and relations of the molecules which constituting DNA, which explains in part why DNA is a successful computing molecule.
The need for wearable or abandoned microsystems, as well as the trend to a lower power consumption of electronic devices, make miniaturized renewable energy generators a viable alternative to batteries. Among the different alternatives, an interesting option is the use of inertial microgenerators for energy scavenging from vibrations present in the environment. These devices constitute perpetual energy sources without the need for refilling, thus being well suited for abandoned sensors, wireless systems or microsystems which must be embedded within the structure, without outside physical connections. Different electromagnetic energy scavenging devices have been described in the literature [1,2,3], based on the use of a velocity damped resonator, which is well suited for harvesting of vibrational energy induced by the operation of machines. These vibrations are characterized by a well defined frequency (in the range between few Hz s and few kHz s) and low displacement amplitudes. Adjusting the resonant frequency of the system to that of the vibrations allows amplification of these low amplitude displacements. Moreover, for these applications, the use of an electromagnetic device has the potential advantages of a good level of compatibility with Si Microsystem technology, as well as the possibility of relatively high electromechanical coupling with simple designs.
We designed new photodiodes sensors including current mirror amplifiers. These photodiodes have been fabricated using a CMOS 0.6 micrometers process from Austria Micro System (AMS). The Photodiode areas are respectiveley 1mm x 1mm and 0.4mm x 0.4mm with fill factor 98 % and total chip area is 2 square millimetres. The sensor pixels show a logarithmic response in illumination and are capable of detecting very low blue light (less than 0.5 lux) . These results allow to use our sensor in new Gamma Camera solid-state concept.
Computer systems in the pipeline oil transporting that the greatest amount of data can be gathered, analyzed and acted upon in the shortest amount of time. Most operators now have some form of computer based monitoring system employing either commercially available or custom developed software to run the system. This paper presented the SCADA systems to oil pipeline in concordance to the Romanian environmental reglementations.
Many embedded real-time control systems suffer from resource constraints and dynamic workload variations. Although optimal feedback scheduling schemes are in principle capable of maximizing the overall control performance of multitasking control systems, most of them induce excessively large computational overheads associated with the mathematical optimization routines involved and hence are not directly applicable to practical systems. To optimize the overall control performance while minimizing the overhead of feedback scheduling, this paper proposes an efficient feedback scheduling scheme based on feedforward neural networks. Using the optimal solutions obtained offline by mathematical optimization methods, a back-propagation (BP) neural network is designed to adapt online the sampling periods of concurrent control tasks with respect to changes in computing resource availability. Numerical simulation results show that the proposed scheme can reduce the computational overhead significantly while delivering almost the same overall control performance as compared to optimal feedback scheduling.
Energy meter reading is a monotonous and an expensive task. Now the meter reader people goes to each meter and take the meter reading manually to issue the bill which will later be entered in the billing software for billing and payment automation. If the manual meter reading and bill data entry process can be automated then it would reduced the laborious task and financial wastage. \"Automatic Electric Meter Reading (AMR) System\" is a metering system that is to be used for data collecting from the meter and processing the collected data for billing and other decision purposes. In this paper we have proposed an automatic meter reading system which is low cost, high performance, highest data rate, highest coverage area and most appropriate for Bangladesh perspective. In this AMR system there are four basic units. They are reading unit, communication unit, data receiving and processing unit and billing system. For reading unit we identified the disk rotation of the energy meter and stored the data in microcontroller. So it is not required to change the current analog energy meter. An external module will be added with the current energy meter. In the communication unit Wimax transceiver was used for wireless communication between meter end and the server end because of its wide coverage area. In the data receiving and processing unit meter reading will be collected from the transceiver which is controlled by another microcontroller. There will be a computer application that will take the data from the microcontroller. This will also help to avoid any tampering or break down of energy meter. There are various AMR system exists all over the world. Those systems were analyzed and we found they are not feasible for Bangladesh.
This paper theoretically and experimentally investigates frequency-tuned and impedance-tuned wireless non-radiative power transfer (WNPT) systems. Closed-form expressions for the efficiencies of both systems, as a function of frequency and system (circuit) parameters, are presented. In the frequency-tuned system, the operating frequency is adjusted to compensate for changes in mutual inductance that occur for variations of transmitter and receiver loop positions. Frequency-tuning is employed for a range of distances over which the loops are strongly coupled. In contrast, the impedance-tuned system employs varactor-based matching networks to compensate for changes in mutual inductance and achieve a simultaneous conjugate impedance match over a range of distances. The frequency-tuned system is simpler to implement, while the impedance-tuned system is more complex but can achieve higher efficiencies. Both of the experimental WNPT systems studied employ resonant shielded loops as transmitting and receiving devices.
In this paper we study the simultaneous problems of food waste and hunger in the context of the possible solution of food (waste) rescue and redistribution. To this end, we develop an empirical model that can be used in Monte Carlo simulations to study the dynamics of the underlying problem. Our model s parameters are derived from a unique data set provided by a large food bank and food rescue organization in north central Colorado. We find that food supply is a non-parametric heavy-tailed process that is well-modeled with an extreme value peaks-over-threshold model. Although the underlying process is stochastic, the basic approach of food rescue and redistribution appears to be feasible both at small and large scales. The ultimate efficacy of this model is intimately tied to the rate at which food expires and hence the ability to preserve and quickly transport and redistribute food. The cost of the redistribution is tied to the number and density of participating suppliers, and costs can be reduced (and supply increased) simply by recruiting additional donors to participate. Our results show that with sufficient funding and manpower, a significant amount of food can be rescued from the waste stream and used to feed the hungry.
The era of Big Data is here now, which has brought both unprecedented opportunities and critical challenges. In this article, from a perspective of cognitive wireless networking, we start with a definition of Big Spectrum Data by analyzing its characteristics in terms of six Vs, i.e., volume, variety, velocity, veracity, viability, and value. We then present a high-level tutorial on research frontiers in Big Spectrum Data analytics to guide the development of practical algorithms. We also highlight Big Spectrum Data as the new resource for cognitive wireless networking by presenting the emerging use cases.
In order to help children with dyslalia we created a set of software exercises. This set has a unitary software block (data base, programming language, programming philosophy). In this paper we present this software infrastructure with its advantage and disadvantage. The exercises are part of a software system named LOGOMON. Therefore, besides horizontal compatibilities (between exercises) vertical compatibilities are also presented (with LOGOMON system). Concerning database tables used for modulus of exercises, a part of them is \"inherited\" from LOGOMON application and another are specific for exercises application. We also need to specify that there were necessary minor changes of database tables used by LOGOMON. As programming language we used C#, implemented in Visual Studio 2005. We developed specific interfaces elements and classes. We also used multimedia resources that were necessary for exercises (images, correct pronouncing obtained from speech therapist recording, video clips). Another section of this application is related to loading of exercises on mobile devices (Pocket PC). A part of code has been imported directly, but there were a lot of files that need to be rewritten. Anyway, the multimedia resources were used without any processing.
Data compression is very important feature in terms of saving the memory space. In this proposal, an indexed dictionary based compression is used for text data, where the word s reference in dictionary is used for compression. This approach is not file based, a common dictionary is used for compression. Which contains the words, the position of the word in dictionary is one of the key parts of encoded frame which is compressed form of the text word. This is loss-less compression. This compression approach is also take cares of small words like one or two characters words which usually decrease the efficiency of compression algorithms. This approach is also deals with file having special characters as a word. Special character words, alpha numeric words, normal texted words and small words all deals differently which makes this approach more efficient. Since a centralized dictionary is used for data compression, therefore, this approach is not preferred for transfer compressed file, while it is suitable to store text data in compressed form in hard disk drive and centralized storage or cloud drive for memory utilization.
Pi Fractions are used to create deterministic uniformly distributed pseudorandom decision space sample points for a global search and optimization algorithm. These fractions appear to be uniformly distributed on [0,1] and can be used in any stochastic algorithm rendering it effectively deterministic without compromising its ability to explore the decision space. Pi Fractions are generated using the BBP Pi digit extraction algorithm. The Pi Fraction approach is tested using genetic algorithm Pi-GASR with very good results. A Pi Fraction data file is available upon request.
Deflection behavior of several encapsulant materials under uniform pressure was studied to determine the best encapsulant for MEMS device. Encapsulation is needed to protect movable parts of MEMS devices during high pressure transfer molded packaging process. The selected encapsulant material has to have surface deflection of less than 5 ?m under 100 atm vertical loading. Deflection was simulated using CoventorWare ver.2005 software and verified with calculation results obtained using shell bending theory. Screening design was used to construct a systematic approach for selecting the best encapsulant material and thickness under uniform pressure up to 100 atm. Materials considered for this study were polyimide, parylene C and carbon based epoxy resin. It was observed that carbon based epoxy resin has deflection of less than 5 ?m for all thickness and pressure variations. Parylene C is acceptable and polyimide is unsuitable as high strength encapsulant. Carbon based epoxy resin is considered the best encapsulation material for MEMS under high pressure packaging process due to its high strength.
Emerging 3D chips stacking and MEMS/Sensors packaging technologies are using DRIE (Deep Reactive Ion Etching) to etch through-silicon via (TSV) for advanced interconnections. The interconnection step can be done prior to or post CMOS manufacturing, each requiring different etch process performances. A review of the DRIE capability in terms of etching profile, etch rate, etch depth has been carried out. Excellent tool flexibility allows a wide range of basic and complex profiles to be achieved. Unlike other techniques, DRIE has the capability to etch feature sizes ranging from sub-micron to millimeter width. The main specificity of the DRIE is that etch rate is sensitive to the total exposed area and the aspect ratio. For the TSV applications, where the total exposed area is lower than 10%, high etch rates are achievable. A study has also been done to highlight the importance of via profile for the success of the refilling step. In addition, due to the high flexibility of DRIE, we also explore the capability of using this technique for wafer thinning and plasma die separation.
Due to scaling laws, in microfluidic, flows are laminar. Consequently, mixing between two liquids is mainly obtained by natural diffusion which may take a long time or equivalently requires centimetre length channels. To reduce time and length for mixing, it is possible to generate chaotic-like flows either by modifying the channel geometry or by creating an external perturbation of the flow. In this paper, an active micromixer is presented consisting on thermal actuation with heating resistors. In order to disturb the liquid flow, an oscillating transverse flow is generated by heating the liquid. Depending on the value of boiling point, either bubble expansion or volumetric dilation controlled the transverse flow amplitude. A chaotic like mixing is then induced under particular conditions depending on volume expansion, liquid velocity, frequency of actuation... This solution presents the advantage to achieve mixing in a very short time (1s) and along a short channel distance (channel width). It can also be integrated in a more complex device due to actuator integration with microfluidics.
In this paper, the bulge test is used to determine the mechanical properties of very thin dielectric membranes. Commonly, this experimental method permits to determine the residual stress (s0) and biaxial Young s modulus (E/(1-u)). Associating square and rectangular membranes with different length to width ratios, the Poisson s ratio (u) can also be determined. LPCVD Si3N4 monolayer and Si3N4/SiO2 bilayer membranes, with thicknesses down to 100 nm, have been characterized giving results in agreement with literature for Si3N4, E = 212 $\\pm$ 14 GPa, s0 = 420 $\\pm$ 8 and u = 0.29.
Mahler s PHD (Probability Hypothesis Density) filter and its particle implementation (as called the particle PHD filter) have gained popularity to solve general MTT (Multi-target Tracking) problems. However, the resampling procedure used in the particle PHD filter can cause sample impoverishment. To rejuvenate the diversity of particles, two easy-to-implement roughening approaches are presented to enhance the particle PHD filter. One termed as \"separate-roughening\" is inspired by Gordon s roughening procedure that is applied on the resampled particles. Another termed as \"direct-roughening\" is implemented by increasing the simulation noise of the state propagation of particles. Four proposals are presented to customize the roughening approach. Simulations are presented showing that the roughening approach can benefit the particle PHD filter, especially when the sample size is small.
Online monitoring remains an important requirement for a range of microsystems. The solution based on the injection of an actuating test stimulus into the bias structure of active devices holds great potential. This paper presents an improved solution that aims to remove the measurand-induced signal from the sensor output. It involves encoding the test stimulus and using a covariance algorithm to reject the signal that does not contain the code. The trade-off between the sine wave rejection ratio of the technique and the test time response is studied and, in the case of a MEMS accelerometer, it is demonstrated that the rejection is higher than 14dB for a test time of about 0.7s. Furthermore, the accuracy of the test signal can be evaluated to guarantee the integrity of the online test output.
We consider the problem of model--checking for Process Rewrite Systems (PRSs) in normal form. In a PRS in normal form every rewrite rule either only deals with procedure calls and procedure termination, possibly with value return, (this kind of rules allows to capture Pushdown Processes), or only deals with dynamic activation of processes and synchronization (this kind of rules allows to capture Petri Nets). The model-checking problem for PRSs and action-based linear temporal logic (ALTL) is undecidable. However, decidability of model--checking for PRSs and some interesting fragment of ALTL remains an open question. In this paper we state decidability results concerning generalized acceptance properties about infinite derivations (infinite term rewritings) in PRSs in normal form. As a consequence, we obtain decidability of the model-checking (restricted to infinite runs) for PRSs in normal form and a meaningful fragment of ALTL.
The objective of this research was to design a 2.4 GHz class AB Power Amplifier, with 0.18 um SMIC CMOS technology by using Cadence software, for health care applications. The ultimate goal for such application is to minimize the trade-offs between performance and cost, and between performance and low power consumption design. The performance of the power amplifier meets the specification requirements of the desired.
This paper presents the performance analysis of directions of arrival estimation techniques, Subspace and the Non-Subspace methods. In this paper, exploring the analysis category of high resolution and super resolution algorithms, presentation of description, comparison and the performance and resolution analyses of these algorithms are made. Sensitivity to various perturbations and the effect of parameters related to the design of the sensor array itself such as the number of array elements and their spacing are also investigated.
Spectrum sensing is the challenge for cognitive radio design and implementation, which allows the secondary user to access the primary bands without interference with primary users. Cognitive radios should decide on the best spectrum band to meet the Quality of service requirements over all available spectrum bands. This paper investigates the integrated centralized spectrum sensing techniques in multipath fading environment and the performance was analyzed with energy detection and wavelet based sensing techniques for unknown signal. Keywords: Cognitive Radio, Spectrum Sensing, Signal Detection, Primary User, Secondary User
In this digital age organizations depend upon the technologies to provide customer-centric solutions by understanding well about their customers  behaviour and continuously improving business process of the organization. Business intelligence (BI) applications will play a vital role at this stage by discovering the knowledge hidden in internal as well as external sources. On the other hand, Knowledge Management (KM) will enhance the organisations performance by providing collaborative tools to learn, create and share the knowledge among the employees. The main intention of the BI is to enhance the employees  knowledge with information that allows them to make decisions to achieve its organisational strategies. However only twenty percent of data exist in structured form, majority of banks knowledge is in unstructured or minds of its employees. Organizations are needed to integrate KM with Knowledge which is discovered from data and information. The purpose of this paper is to discuss the need of business insiders in the process of knowledge discovery and distribution, to make BI more relevant to business of the bank. We have also discussed about the BI/KM applications in banking industry and provided a framework to integrate BI and KM in banking industry.
The Proportional-Integral-Derivative Controller is widely used in industries for process control applications. Fractional-order PID controllers are known to outperform their integer-order counterparts. In this paper, we propose a new technique of fractional-order PID controller synthesis based on peak overshoot and rise-time specifications. Our approach is to construct an objective function, the optimization of which yields a possible solution to the design problem. This objective function is optimized using two popular bio-inspired stochastic search algorithms, namely Particle Swarm Optimization and Differential Evolution. With the help of a suitable example, the superiority of the designed fractional-order PID controller to an integer-order PID controller is affirmed and a comparative study of the efficacy of the two above algorithms in solving the optimization problem is also presented.
We propose a novel theoretical biomolecular design to implement any Boolean circuit using the mechanism of DNA strand displacement. The design is scalable: all species of DNA strands can in principle be mixed and prepared in a single test tube, rather than requiring separate purification of each species, which is a barrier to large-scale synthesis. The design is time-responsive: the concentration of output species changes in response to the concentration of input species, so that time-varying inputs may be continuously processed. The design is digital: Boolean values of wires in the circuit are represented as high or low concentrations of certain species, and we show how to construct a single-input, single-output signal restoration gate that amplifies the difference between high and low, which can be distributed to each wire in the circuit to overcome signal degradation. This means we can achieve a digital abstraction of the analog values of concentrations. Finally, the design is energy-efficient: if input species are specified ideally (meaning absolutely 0 concentration of unwanted species), then output species converge to their ideal concentrations at steady-state, and the system at steady-state is in (dynamic) equilibrium, meaning that no energy is consumed by irreversible reactions until the input again changes. Drawbacks of our design include the following. If input is provided non-ideally (small positive concentration of unwanted species), then energy must be continually expended to maintain correct output concentrations even at steady-state. In addition, our fuel species - those species that are permanently consumed in irreversible reactions - are not \"generic\"; each gate in the circuit is powered by its own specific type of fuel species. Hence different circuits must be powered by different types of fuel. Finally, we require input to be given according to the dual-rail convention, so that an input of 0 is specified not only by the absence of a certain species, but by the presence of another. That is, we do not construct a \"true NOT gate\" that sets its output to high concentration if and only if its input s concentration is low. It remains an open problem to design scalable, time-responsive, digital, energy-efficient molecular circuits that additionally solve one of these problems, or to prove that some subset of their resolutions are mutually incompatible.
The Boolean autonomous dynamical systems, also called regular autonomous asynchronous systems are systems whose  vector field  is a function {\\Phi}:{0,1}^{n}{\\to}{0,1}^{n} and time is discrete or continuous. While the synchronous systems have their coordinate functions {\\Phi}_{1},...,{\\Phi}_{n} computed at the same time: {\\Phi},{\\Phi}{\\circ}{\\Phi},{\\Phi}{\\circ}{\\Phi}{\\circ}{\\Phi},... the asynchronous systems have {\\Phi}_{1},...,{\\Phi}_{n} computed independently on each other. The purpose of the paper is that of studying the basins of attraction of the fixed points, of the orbits and of the {\\omega}-limit sets of the regular autonomous asynchronous systems. The bibliography consists in analogies.
Over two million containers crossed the docks at Sydney s Port Botany in 2011/12; a figure that is forecast increase more than threefold by the end of the next decade. To cope with such large growth in volumes the NSW Government plans to double rail mode share at the port by the year 2020. Conventional wisdom from industry and the media says that existing infrastructure cannot handle such volumes. In this paper we use a combination of data analytics and simulation to examine operations at the port and evaluate the efficacy of current infrastructure to handle projected growth in volumes. Contrary to conventional wisdom we find that current rail resources appear distinctly under-utilised. Moreover: (i) the peak rail capacity of Port Botany is 1.78 million TEU per annum; over six times higher than 2011/12 rail volumes; (ii) there are no infrastructural impediments to the achievement of peak rail capacity; (iii) operational changes, not infrastructural investment, are the key to unlocking the potential of the port; (iv) Port Botany is well positioned to handle projected increases in container volumes over the next decade and beyond, including the 28% rail mode share target established by the New South Wales State Government.
Videos are composed of sequence of interrelated frames. There is a minute difference among frames. Flicker is an error which is found in every video. It is like a checker box in a video, there are several reasons behind flickers generation, one of the main reasons is refresh rate of the monitor and second reason is number of frames per second in a video. The main objective of this study is to propose and develop a framework that identifies flicker location and minimizes the flickers rate. Analysis shows that flickers can be minimize by adjusting the persistence of pixel and higher refresh rate of CRT monitor. Further we have compared different isotopes of phosphorous pixels and generate its graphs. This paper highlighted the cause of flicker and its avoidance .Statistical research proves that proposed algorithm improves the video quality and reduce flickers ratio up to 90%.
A new two-layer model has been proposed to study microscale heat transfer associated with a developing flow boundary layer. As an example, a cold, microscale film of liquid impinging on an isothermal hot, horizontal surface has been investigated. The boundary layer is divided into two regions: a micro layer at microscale away from the surface and a macro layer at macroscale away from the surface. An approximate solution for the velocity and temperature distributions in the flow along the horizontal surface is developed, which exploits the hydrodynamic similarity solution for microscale film flow. The approximate solution may provide a valuable basis for assessing microscale flow and heat transfer in more complex settings.
A new 3D transition turbulence model, more accurate and faster than an empirical transition model, is proposed. The model is based on the calculation of the pre-transitional u v  due to mean flow shear. The present transition model is fully described and verified against eight benchmark test cases. Computations are performed for the ERCOFTAC flat-plate T3A, T3C and T3L test cases. Further, the model is validated for bypass, cross-flow and separation induced transition and compared with empirical transition models. The model presents very good results for bypass transition under zero-pressure gradient and with pressure gradient flow conditions. Also the model is able to correctly predict separation induced transition. However, for very low speed and low free-stream turbulence intensity the model delays separation induced transition onset. The model also shows very good results for transition under complex cross-flow conditions in three-dimensional geometries. The 3D tested case was the 6:1 prolate-spheroid under three flow conditions.
A cold, thin film of liquid impinging on an isothermal hot, horizontal surface has been investigated. An approximate solution for the velocity and temperature distributions in the flow along the horizontal surface is developed, which exploits the hydrodynamic similarity solution for thin film flow. The approximate solution may provide a valuable basis for assessing flow and heat transfer in more complex settings.
The dynamics in the thin boundary layers of temperature and velocity is the key to a deeper understanding of turbulent transport of heat and momentum in thermal convection. The velocity gradient at the hot and cold plates of a Rayleigh-B\\ {e}nard convection cell forms the two-dimensional skin friction field and is related to the formation of thermal plumes in the respective boundary layers. Our analysis is based on a direct numerical simulation of Rayleigh-B\\ {e}nard convection in a closed cylindrical cell of aspect ratio $\\Gamma=1$ and focused on the critical points of the skin friction field. We identify triplets of critical points, which are composed of two unstable nodes and a saddle between them, as the characteristic building block of the skin friction field. Isolated triplets as well as networks of triplets are detected. The majority of the ridges of line-like thermal plumes coincide with the unstable manifolds of the saddles. From a dynamical Lagrangian perspective, thermal plumes are formed together with an attractive hyperbolic Lagrangian Coherent Structure of the skin friction field. We also discuss the differences from the skin friction field in turbulent channel flows from the perspective of the Poincar\\ {e}-Hopf index theorem for two-dimensional vector fields.
This paper proposes a simple new closure principle for turbulent shear flows. The turbulent flow field is divided into an outer and an inner region. The inner region is made up of a log-law region and a wall layer. The wall layer is viewed in terms of the well known inrush-sweep-burst sequence observed since 1967. It is modelled as a transient laminar sub-boundary layer, which obeys the Stokes solution for an impulsively started flat plate. The wall layer may also be modelled with a steady state solution by adding a damping function to the log-law. Closure is achieved by matching the unsteady and steady state solutions at the edge of the wall layer. This procedure in effect feeds information about the transient coherent structures back into the time-averaged solution and determines theoretically the numerical coefficient of the logarithmic law of the wall The method gives a new technique for writing accurate wall functions, valid for all Reynolds numbers, in computer fluid dynamics (CFD) programmes. Keywords: Reynolds equations, modelling, closure technique, wall layer, log-law, CFD.
We present numerical studies of wetting on various topographic substrates, including random topographies. We find good agreement with recent predictions based on an analytical interface-displacement-type theory \\cite{Herminghaus2012, Herminghaus2012a}. The phase diagrams are qualitatively as predicted, but differently in this study the critical points are found to lie within the physical parameter range (i.e., at positive contact angle) in all cases studied. Notably, it is corroborated that Gaussian random surfaces behave qualitatively different from all non-Gaussian topographies investigated, exhibiting a qualitatively different phase diagram. This shows that Gaussian random surfaces must be used with great care in the context of wetting phenomena.
We investigate the processes that lead to the generation of mean flows in two-dimensional anelastic convection. The simple model consists of a plane layer that is rotating about an axis inclined to gravity. The results are two-fold: firstly we numerically investigate the onset of convection in three-dimensions, paying particular attention to the role of stratification and highlight a curious symmetry. Secondly, we investigate the mechanisms that drive both zonal and meridional flows in two dimensions. We find that, in general, non-trivial Reynolds stresses can lead to systematic flows and, using statistical measures, we quantify the role of stratification in modifying the coherence of these flows.
In this paper, the Immersed Boundary Method (IBM) proposed by Pinelli is implemented for finite volume approximations of incompressible Navier-Stokes equations solutions in the open source toolbox OpenFOAM version 2.2. Solid obstacles are described using a discrete forcing approach for boundary conditions. Unlike traditional approaches encompassing the presence of a solid body using conformal meshes and imposing no-slip boundary conditions on the boundary faces of the mesh, the solid body is here represented on the Eulerian Cartesian mesh through an ad-hoc body force evaluated on a set of Lagrangian markers. The markers can move across the Eulerian mesh, hence allowing for a straightforward analysis of motion or deformation of the body. The IBM method is described and implemented in PisoFOAM, whose Pressure-Implicit Split-Operator (PISO) solver is modified accordingly. The presence of the solid body and the divergence-free of the fluid velocity are imposed simultaneously by sub-iterating between IBM and the pressure correction step. This scheme allows for the use of fast optimized Poisson solvers while granting excellent accuracy with respect to the previously mentioned constraints. Various 2D and 3D well-documented test cases of flows around fixed or moving circular cylinders are simulated and carefully validated against existing data from the literature. The capability of the new solver is discussed in terms of accuracy and numerical performances.
We experimentally investigate the dynamics of water cooled from below at 0^oC and heated from above. Taking advantage of the unusual property that water s density maximum is at about 4^oC, this set-up allows us to simulate in the laboratory a turbulent convective layer adjacent to a stably stratified layer, which is representative of atmospheric and stellar conditions. High precision temperature and velocity measurements are described, with a special focus on the convectively excited internal waves propagating in the stratified zone. Most of the convective energy is at low frequency, and corresponding waves are localized to the vicinity of the interface. However, we show that some energy radiates far from the interface, carried by shorter horizontal wavelength, higher frequency waves. Our data suggest that the internal wave field is passively excited by the convective fluctuations, and the wave propagation is correctly described by the dissipative linear wave theory.
A distributed parameter model of pipeline transmission line behaviour is presented, based on a Galerkin method incorporating frequency-dependent friction. This is readily interfaced to an existing model of the pumping dynamics of a plunger pump to allow time-domain simulations of pipeline pressure pulsations in both suction and delivery lines. A new model for the pump inlet manifold is also proposed.
This paper derives transport equations for medium rarefied gases from the Bhatnagar-Gross-Krook (BGK) model kinetic equation using a Hermite polynomial approximation for the monoatomic gas distribution function. We apply the Chapman-Enskog regularization method to Grad s velocity distribution function that corresponds to his thirteen moment equation, extending these equations to the third order of the Knudsen number. We show that the obtained set of Grad s regularized thirteen moment equations is complete, and that all previously obtained closures for Grad s thirteen moment equations are the sets of truncated equations obtained in this paper. Using the truncated transport equations may lead to losing accuracy in computing gas flows and heat transfer in rarefied gases. The velocity distribution function for the resulting 13 regularized moment equations is presented.
This paper considers the influence of nanoparticles on the nonlinear Jeffery-Hamel flow problem. Investigation is performed for three types of nanoparticles namely copper Cu, alumina Al2O3 and titania TiO2 by considering water as a base fluid. The resulting nonlinear governing equations and their associated boundary conditions are solved for both semi-analytical and numerical solutions. The semi-analytical solution is developed by using Homotopy Perturbation Method (HPM) whereas the numerical solution is presented by Runge-Kutta scheme. Dimensionless velocity, temperature, skin friction coefficient and Nusselt number are addressed for the involved pertinent parameters. It is observed that the influence of solid volume fraction of nanoparticles on the heat transfer and fluid flow parameters is more noticeable when compared with the type of nanoparticles. The achieved results reveal that HPM is very effective, convenient and accurate for this problem.
This study is concerned with numerical linear stability analysis of liquid metal flow in a square duct with thin electrically conducting walls subject to a uniform transverse magnetic field. We derive an asymptotic solution for the base flow which is valid not only for high but also moderate magnetic fields. This solution shows that for low wall conductance ratios $c\\ll1,$ an extremely strong magnetic field with the Hartmann number $Ha\\sim c^{-4}$ is required to attain the asymptotic flow regime considered in the previous studies. We use a vector stream function/vorticity formulation and a Chebyshev collocation method to solve the eigenvalue problem for three-dimensional small-amplitude perturbations in ducts with realistic wall conductance ratios $c=1,0.1,0.01$ and Hartmann numbers up to $10^{4}.$ As for similar flows, instability in a sufficiently strong magnetic field is found to occur in the side-wall jets with the characteristic thickness $\\delta\\sim Ha^{-1/2}.$ This results in the critical Reynolds number and wavenumber increasing asymptotically with the magnetic field as $Re_{c}\\sim110Ha^{1/2}$ and $k_{c}\\sim0.5Ha^{1/2}.$ The respective critical Reynolds number based on the total volume flux in a square duct with $c\\ll1$ is $\\bar{Re}_{c}\\approx520.$ Although this value is somewhat larger than$\\bar{Re}_{c}\\approx313$ found by Ting et al. (1991) for the asymptotic side-wall jet profile, it still appears significantly lower than the Reynolds numbers at which turbulence is observed in experiments as well as in direct numerical simulations of this type of flows.
This fluid dynamics video showcases how optically induced electrokinetic forces can be used to drive three-dimensional micro-vortices. The strong microfluidic vortices are used constructively in conjunction with other electrokinetic forces to dynamically and rapidly aggregate particle groups. Particle manipulation is achieved on the surface of a parallel-plate gold/indium tin oxide (ITO) electrode that is illuminated with near-infrared (1064 nm) optical patterns and biased with a low frequency ($<$ 100 kHz) alternating current (AC) signal. The fluid dynamics video shows how electrokinetically driven flows in the microdomain can be used for non-invasive particle manipulation.
Large eddy simulations of wind farms are performed to study the effects of wind turbine row alignment with respect to the incoming flow direction. Various wind farms with fixed stream-wise spacing (7.85 rotor diameters) and varying lateral displacements and span-wise turbine spacings are considered, for a fixed inflow direction. Simulations show that, contrary to common belief, a perfectly staggered (checker-board) configuration does not necessarily give the highest average power output. Instead, the highest mean wind farm power output is found to depend on several factors, the most important one being the alignment that leads to minimization of wake effects from turbines in several upstream rows. This alignment typically occurs at significantly smaller angles than those corresponding to perfect staggering. The observed trends have implications for wind farm designs, especially in sites with a well-defined prevailing wind direction.
This paper puts forth a coarse grid projection (CGP) multiscale method to accelerate computations of quasigeostrophic (QG) models for large scale ocean circulation. These models require solving an elliptic sub-problem at each time step, which takes the bulk of the computational time. The method we propose here is a modular approach that facilitates data transfer with simple interpolations and uses black-box solvers for solving the elliptic sub-problem and potential vorticity equations in the QG flow solvers. After solving the elliptic sub-problem on a coarsened grid, an interpolation scheme is used to obtain the fine data for subsequent time stepping on the full grid. The potential vorticity field is then updated on the fine grid with savings in computational time due to the reduced number of grid points for the elliptic solver. The method is applied to both single layer barotropic and two-layer stratified QG ocean models for mid-latitude oceanic basins in the beta plane, which are standard prototypes of more realistic ocean dynamics. The method is found to accelerate these computations while retaining the same level of accuracy in the fine-resolution field. A linear acceleration rate is obtained for all the cases we consider due to the efficient linear-cost fast Fourier transform based elliptic solver used. We expect the speed-up of the CGP method to increase dramatically for versions of the method that use other, suboptimal, elliptic solvers, which are generally quadratic cost. It is also demonstrated that numerical oscillations due to lower grid resolutions, in which the Munk scales are not resolved adequately, are effectively eliminated with CGP method.
Inertial fluid flow deformation around pillars in a microchannel is a new method for controlling fluid flow. Sequences of pillars have been shown to produce a rich phase space with a wide variety of flow transformations. Previous work has successfully demonstrated manual design of pillar sequences to achieve desired transformations of the flow cross-section, with experimental validation. However, such a method is not ideal for seeking out complex sculpted shapes as the search space quickly becomes too large for efficient manual discovery. We explore fast, automated optimization methods to solve this problem. We formulate the inertial flow physics in microchannels with different micropillar configurations as a set of state transition matrix operations. These state transition matrices are constructed from experimentally validated streamtraces. This facilitates modeling the effect of a sequence of micropillars as nested matrix-matrix products, which have very efficient numerical implementations. With this new forward model, arbitrary micropillar sequences can be rapidly simulated with various inlet configurations, allowing optimization routines quick access to a large search space. We integrate this framework with the genetic algorithm and showcase its applicability by designing micropillar sequences for various useful transformations. We computationally discover micropillar sequences for complex transformations that are substantially shorter than manually designed sequences. We also determine sequences for novel transformations that were difficult to manually design. Finally, we experimentally validate these computational designs by fabricating devices and comparing predictions with the results from confocal microscopy.
We investigate long-time properties of three-dimensional MHD turbulence in the absence of forcing and examine in particular the role played by the quadratic invariants of the system and by the symmetries of the initial configurations. We observe that, when sufficient accuracy is used, initial conditions with a high degree of symmetries, as in the absence of helicity, do not travel through parameter space over time whereas by perturbing these solutions either explicitly or implicitly using for example single precision for long times, the flows depart from their original behavior and can become either strongly helical, or have a strong alignment between the velocity and the magnetic field. When the symmetries are broken, the flows evolve towards different end states, as predicted by statistical arguments for non-dissipative systems with the addition of an energy minimization principle, as already analyzed in \\cite{stribling_90} for random initial conditions using a moderate number of Fourier modes. Furthermore, the alignment properties of these flows, between velocity, vorticity, magnetic potential, induction and current, correspond to the dominance of two main regimes, one helically dominated and one in quasi-equipartition of kinetic and magnetic energy. We also contrast the scaling of the ratio of magnetic energy to kinetic energy as a function of wavenumber to the ratio of eddy turn-over time to Alfv\\ en time as a function of wavenumber. We find that the former ratio is constant with an approximate equipartition for scales smaller than the largest scale of the flow whereas the ratio of time scales increases with increasing wavenumber.
A two-scale modelling approach is discussed to predict the performance and energetics of a large number (more than a few hundred) of marine turbines installed as a power farm in a general coastal environment. The kernel of this approach is that the outer, or coastal-scale, model/simulation is to assess the reduction of flow passing through a given farm area as a function of the increase of head loss across the farm, whereas the inner, or device-scale, model/simulation employs this function to account for the (otherwise unknown) effect of coastal dynamics for that farm site, i.e. diminution of the power removed from the farm area due to the reduction of flow through the farm. Large-eddy simulations (LES) of periodic open channel flow (with a porous plate model representing turbines) are then presented as a device-scale part of such a two-scale model of large marine turbine arrays. Results demonstrate the usefulness of this approach to study how the overall energetics of turbine arrays (i.e. extraction, dissipation and diminution of energy within the entire farm area) may change depending on the characteristics of the farm site, array configuration and operating conditions of the turbines in the farm.
We outline a statistical theory of turbulence based on the Lagrangian formulation of fluid motion. We derive a hierarchy of evolution equations for Lagrangian N-point probability distributions as well as a functional equation for a suitably defined probability functional which is the analog of Hopf s functional equation. Furthermore, we adress the derivation of a generalized Fokker-Plank equation for the joint velocity - position probability density of N fluid particles.
Being considered as a prototype for description of oceanic rogue waves (RWs), the Peregrine breather solution of the nonlinear Schr\\\"odinger equation (NLS) has been recently observed and intensely investigated experimentally in particular within the context of water waves. Here, we report the experimental results showing the evolution of the Peregrine solution in the presence of wind forcing in the direction of wave propagation. The results show the persistence of the breather evolution dynamics even in the presence of strong wind and chaotic wave field generated by it. Furthermore, we have shown that characteristic spectrum of the Peregrine breather persists even at the highest values of the generated wind velocities thus making it a viable characteristic for prediction of rogue waves.
This paper presents simulations of stoichiometric methane/air premixed flames into a microchannel at atmospheric pressure. These simulations result from numerical resolutions of reduced-order models. Indeed, combustion control into microchannels would be allowed by fast simulations that in turn enable real-time adjustments of the device s parameters. Former experimental studies reported the occurrence of a Flame Repetitive Extinction/Ignition (FREI) phenomenon provided that a temperature gradient is sustained at the channel s walls. Conducting unsteady one-dimensional simulations including complex chemistry, a late numerical study tried to explain the occurrence of this phenomenon. The present study therefore explores low-dimensional models that potentially reproduce the FREI phenomenon. Provided a calibration of some empirical constants, an unsteady two-dimensional model including one-step chemical reaction is shown to decently reproduce the FREI regime all along the range of mixture flow rates investigated by the experimental studies. Complementing the aforementioned numerical study, furthermore, when the channel s diameter is varied, the two-dimensional model unveils an unstable regime that a one-dimensional model cannot capture. As two-dimensional hydrodynamics appears to play a key role into the flame s dynamics, therefore the heat rate released by the microcombustor, one-dimensional models are not believed to deliver an adequate strategy of combustion control into such microchannels.
The simulation of the turbulent and potentially separating flow around a rotating, twisted, and tapered airfoil is a challenging task for CFD simulations. This paper describes CFD simulations of the NREL Phase VI turbine that was experimentally characterized in the 24.4m x 36.6m NREL/NASA Ames wind tunnel (Hand et al., 2001). All computations in this article are performed on the experimental base configuration of 0o yaw angle, 3o tip pitch angle, and a rotation rate of 72 rpm. The significance of specific mesh resolution regions to the accuracy of the CFD prediction is discussed. The ability of CFD to capture bulk quantities, such as the shaft torque, and the detailed flow characteristics, such as the surface pressure distributions, are explored for different inlet wind speeds. Finally, the significant three-dimensionality of the boundary layer flow is demonstrated.
To bridge the gap between single/isolated pore systems to multi-pore systems, such as membranes/electrodes, we studied an array of nanochannels with varying interchannel spacing that controlled the degree of channel communication. Instead of treating them as individual channels connected in parallel or an assembly like a homogeneous membrane, this study resolves the pore-pore interaction. We found that increased channel isolation leads to current intensification whereas at high voltages electro-convective effects control the degree of communication via suppression of the diffusion layer growth
The turbulent flow in an infinitely extended plane channel is analysed by solving the Navier-Stokes equations with a DNS approach. Solutions are obtained in a numerical solution domain of finite size in the streamwise as well as in the lateral direction setting periodic boundary conditions in both directions. Their impact on large scale structures in the turbulent flow field is analysed carefully in order to avoid their suppression. When this is done appropriately well known stripe patterns in these flows can be observed and analysed especially with respect to their relative motion compared to the mean flow velocity. Various details of this stripe pattern dominated velocity field are shown. Also global parameters like the friction factor in the flow field and the Nusselt number in the temperature field are determined based on the statistics of the flow and temperature data in a very large time period that guarantees fully developed turbulent flow and heat transfer.
We present a new method to transform an expanded class of non-selfadjoint advection-diffusion operators into self-adjoint operators. The transform is based on a combination of a point transform and Lie transform in conjunction with an asymptotic expansion in terms of the diffusivity. We illustrate the method in the context of simple shear flow where the expansion is exact and all transformation steps can be performed explicitly.
The paper addresses the question if there exists a finite stopping time for an unforced motion of a yield stress fluid with free surface. A variation inequality formulation is deduced for the problem of yield stress fluid dynamics with a free surface. Free surface is assumed to evolve with a normal velocity the flow. We also consider capillary forces acting along the free surface. Based on the variational inequality formulation an energy equality is obtained, where kinetic and free energy rate of change is in a balance with the internal energy viscoplastic dissipation and the work of external forces. Further, the paper considers free small-amplitude oscillations of a droplet of Herschel-Bulkley fluid under the action of surface tension forces. Under certain assumptions it is shown that the finite stopping time $T_f$ of oscillations exists once the yield stress parameter is positive and the flow index $\\alpha$ satisfies ($\\alpha\\ge1$). Results of several numerical experiments illustrate the analysis, reveal the dependence of $T_f$ on problem parameters and suggest an instantaneous transition of the whole drop from yielding state to the rigid one.
Turbulent flows are notoriously difficult to describe and understand based on first principles. One reason is that turbulence contains highly intermittent bursts of vorticity and strain-rate with highly non-Gaussian statistics. Quantitatively, intermittency is manifested in highly elongated tails in the probability density functions of the velocity increments between pairs of points. A long-standing open issue has been to predict the origins of intermittency and non-Gaussian statistics from the Navier-Stokes equations. Here we derive, from the Navier-Stokes equations, a simple nonlinear dynamical system for the Lagrangian evolution of longitudinal and transverse velocity increments. From this system we are able to show that the ubiquitous non-Gaussian tails in turbulence have their origin in the inherent self-amplification of longitudinal velocity increments, and cross amplification of the transverse velocity increments.
This paper studies the effects of velocity gradients and secondary currents on the distribution of the shear force between the walls and bed of rectangular open channels. We show that neglecting the effect of secondary currents and assuming zero-shear division lines does not yield acceptable results. We, accordingly, introduce a method to determine the percentage of the total shear force acting on the walls and bed of rectangular open channels, which takes both the velocity gradients and secondary currents into account. Using the channel bisectors, along which there is no secondary flows effect, and orthogonal trajectories to isovels, along which there is no shear stress, we divide the channel cross section into three major subsections, namely bed area, walls area, and shared area. The geometry of each subsection is derived given the location of the maximum velocity. The share of the bed and wall shear forces from the shared area, are calculated afterward. The results for bed and walls shear forces agree well with the experimental data with an average relative error less than 5% for both regular flows and flows carrying suspended sediment. This method also provides a physics-driven range for the wall and bed shear forces which nicely covers the experimental data.
This work presents fluid dynamics videos obtained via numerical (CFD) calculations using ComSol (finite elements method) software, showing the evaporation of HFE7100 (3M company refrigerant) into a nitrogen gas flow along the liquid interface. The overall temperature evolution and liquid motion, which is caused by surface-tension (Marangoni) and buoyancy (Rayleigh) instability mechanisms, are shown as well. Flow behavior in the liquid caused by the aforementioned instability mechanisms can be nicely seen. Finally, these observations are made for three liquid thicknesses in order to appreciate the qualitative influence of confinement.
This fluid dynamics video shows high-frequency capillary waves excited by the volumetric oscillations of microbubbles near a free surface. The frequency of the capillary waves is controlled by the oscillation frequency of the microbubbles, which are driven by an ultrasound field. Radial capillary waves produced by single bubbles and interference patterns generated by the superposition of capillary waves from multiple bubbles are shown.
In plants, osmotically driven flows are believed to be responsible for translocation of sugar in the pipe-like phloem cell network, spanning the entire length of the plant. In this paper, we present an experimental and theoretical study of transient osmotically driven flows through pipes with semipermeable walls. We extend the experimental work of Eschrich, Evert and Young \\cite[]{Eschrich:1972} by providing a more accurate version of their experiment allowing for better comparison with theory. In the experiments we measure the dynamics and structure of a \"sugar front\", i.e. the transport and decay of a sudden loading of sugar in a pipe which is closed in both ends. We include measurements of pressure inside the membrane tube allowing us to compare the experiments directly with theory and, in particular, to confirm quantitatively the exponential decay of the front in a closed tube.In a novel setup we are able to measure the entire concentration profile as the sugar front moves. In contrast to previous studies we find very good agreement between experiment and theory. In the limit of low axial resistance (valid in our experiments as well as in many cases in plants) we show that the equations can be solved exactly by the method of characteristics yielding, in general, an implicit solution. Further we show that under more general conditions the equations of motion can be rewritten as a single integro-differential equation, which can be readily solved numerically. The applicability of our results to plants is discussed and it is shown that it is probable that the pressure-flow hypothesis can account for short distance transport of sugar in plants.
We review three different types of viscoelastic surface instabilities: The Rayleigh -- Plateau, the Saffman -- Taylor and the Faraday instability. These instabilities are classical examples of hydrodynamic surface instabilities. The addition of a small amount of polymers to pure water can alter its flow behavior drastically and the type of instability may change not only quantitatively but also qualitatively. We will show that some of the observed new phenomena can be explained by the use of simple rheological models that contain most of the underlying physical mechanisms leading to the instability. A quantitative description however is often only possible close to the onset of the instability or for weak deviations from Newtonian behavior. A complete theoretical description is still lacking when the system is driven far from equilibrium or for fluids with strong non-Newtonian behavior.
An inviscid two-dimensional fluid model with nonlinear dispersion that arises simultaneously in coarse-grained descriptions of the dynamics of the Euler equation and in the description of non-Newtonian fluids of second grade is considered. The scaling of the equilibrium states of this model for conserved energy and enstrophy retains the corresponding scaling for the Euler equations on the large scales and at the same time greatly deemphasizes the importance of small scales. This is the first clear demonstration of the beneficial effect of nonlinear dispersion in the model, and should highlight its utility as a subgrid model in more realistic situations.
The impact of a buoyancy driven oil droplet with an oil-water interface is investigated using time-resolved Particle Image Velocimetry (PIV) along with a phase discrimination by means of high-speed Laser Induced Fluorescence (LIF). In this paper we focus on the investigation of strategies to optimize the performance of high-speed PIV algorithms. Furthermore this data will be used for validation of numerical simulations of two phase flows. To simultaneously measure the flow velocities inside and around the oil droplet by PIV the refractive indices of both phases need to be matched. The aqueous phase consists of a mixture of corn syrup and water, which defines the viscosity as well as the refractive index. The disperse phase consists of a mixture of two mineral oils. The latter are mixed to match the refractive index of the continuous phase. Both phases are seeded with tracer particles required for PIV. A fluorescent dye is added to the dispersed phase to allow discrimination of the PIV signals originating from both phases by LIF. The LIF and PIV signals are captured by two high-speed cameras. In order to study the impact of an oil droplet into an oil-water interface, it is necessary to accurately measure a velocity range that is spread over three orders of magnitude. The impact of the droplet is measured in a time series of PIV recordings with a high temporal resolution. This allows to optimize the time interval between two correlated frames within the time series to achieve a high signal-to-noise ratio, while still being able to measure a large velocity dynamic range. An approach to estimate an optimal time separation is presented in this study. The results are compared to the experimental data and the effectiveness of the introduced optimization on the data quality is discussed. Furthermore, the results of this experiment are compared to a numerical simulation.
We present a fluid-mechanical model of the coalescence of a number of elastic objects due to surface tension. We consider an array of spring-block elements separated by thin liquid films, whose dynamics are modelled using lubrication theory. With this simplified model of elastocapillary coalescence, we present the results of numerical simulations for a large number of elements, $N=O(10^4)$. A linear stability analysis shows that pairwise coalescence is always the most unstable mode of deformation. However, the numerical simulations show that the cluster sizes actually produced by coalescence from a small white-noise perturbation have a distribution that depends on the relative strength of surface tension and elasticity, as measured by an elastocapillary number $K$. Both the maximum cluster size and the mean cluster size scale like $K^{-1/2}$ for small $K$. An analytical solution for the response of the system to a localized perturbation shows that such perturbations generate propagating disturbance fronts, which leave behind `frozen-in  clusters of a predictable size that also depends on $K$. A good quantitative comparison between the cluster-size statistics from noisy perturbations and this `frozen-in  cluster size suggests that propagating fronts may play a crucial role in the dynamics of coalescence.
A technique for measuring the mean impulse response function of stationary homogeneous isotropic turbulence is proposed. Such measurement is carried out here on the basis of Direct Numerical Simulation (DNS). A zero-mean white-noise volume forcing is used to probe the turbulent flow, and the response function is obtained by accumulating the space-time correlation between the white forcing and the velocity field. This technique to measure the turbulent response in a DNS numerical experiment is a new research tool in that field of spectral closures where the linear response concept is invoked either by resorting to renormalized perturbations theories or by introducing the well-known Fluctuation-Dissipation Relation (FDR). Though the results obtained in the present work are limited to relatively low values of the Reynolds number, a preliminary analysis is possible. Both the characteristic form and the time scaling properties of the response function are investigated in the universal subrange of dissipative wavenumbers; a comparison with the response approximation given by the FDR is proposed through the independent DNS measurement of the correlation function. Very good agreement is found between the measured response and Kraichnan s description of random energy-range advection effects.
The study of vortex flows in the vicinity of multiple solid obstacles is of considerable theoretical interest and practical importance. In particular, the case of flows past a circular cylinder placed above a plane wall has attracted a lot of attention recently. In this case, a stationary vortex is formed in front of the cylinder, in contradistinction to the usual case without the plane where a vortex pair is observed behind the cylinder. In the present work, we apply modern complex analysis techniques to obtain the complex potential for the problem of one point-vortex placed in a uniform stream past a circular cylinder above a plane. A typical streamline pattern is also shown.
We consider Rayleigh-B\\ enard convection in a layer of fluid between rough no-slip boundaries where the top and bottom boundary heights are functions of the horizontal coordinates with square-integrable gradients. We use the background method to derive an upper bound on mean heat flux across the layer for all admissible boundary geometries. This flux, normalized by the temperature difference between the boundaries, can grow with the Rayleigh number ($Ra$) no faster than ${\\cal O}(Ra^{1/2})$ as $Ra \\rightarrow \\infty$. Our analysis yields a family of similar bounds, depending on how various estimates are tuned, but every version depends explicitly on the boundary geometry. In one version the coefficient of the ${\\cal O}(Ra^{1/2})$ leading term is $0.242 + 2.925\\Vert\\nabla h\\Vert^2$, where $\\Vert\\nabla h\\Vert^2$ is the mean squared magnitude of the boundary height gradients. Application to a particular geometry is illustrated for sinusoidal boundaries.
The transfer of heat between the air and surrounding soil in underground tunnels ins investigated, as part of the analysis of environmental conditions in underground rail systems. Using standard turbulent modelling assumptions, flow profiles are obtained in both open tunnels and in the annulus between a tunnel wall and a moving train, from which the heat transfer coefficient between the air and tunnel wall is computed. The radial conduction of heat through the surrounding soil resulting from changes in the temperature of air in the tunnel are determined. An impulse change and an oscillating tunnel air temperature are considered separately. The correlations between fluctuations in heat transfer coefficient and air temperature are found to increase the mean soil temperature. Finally, a model for the coupled evolution of the air and surrounding soil temperature along a tunnel of finite length is given.
Large Scale Particle Image Velocimetry (LSPIV) is widely recognized as a reliable method to measure water surface velocity field in open channels and rivers. LSPIV technique is based on a camera view that frames the water surface in a sequence, and image-processing methods to compute water surface displacements between consecutive frames. Using LSPIV, high flow velocities, as for example flood conditions, were accurately measured, whereas determinations of low flow velocities is more challenging, especially in absence of floating seeding transported by the flow velocity. In fact, in unseeded conditions, typical surface features dynamics must be taken into account: besides surface structures convected by the current, capillary-gravity waves travel in all directions, with their own dynamics. Discrimination between all these phenomena is here discussed, providing a new method to distinguish and to correct unseeded LSPIV measurements associated with wavy structures, accounting for their phase speed magnitude and direction. This has been done measuring wavenumber vectors by using the same images exploited for PIV analysis. All measurements are performed without any flow seeding and in total absence of suspended materials, using the specular reflection of the water surface as a key marker. Results obtained at low-flow regimes in a straight concrete-made rectangular-section channel and in a river are satisfying, especially if compared to those obtained from classic LSPIV application without discrimination and correction. Moreover, a novel simple and safe procedure to orthorectify images is here presented.
This paper presents the linear global stability analysis of the incompressible axisymmetric boundary layer on a circular cylinder. The base flow is parallel to the axis of the cylinder at inlet. The pressure gradient is zero in the streamwise direction. The base flow velocity profile is fully non-parallel and non-similar in nature. The boundary layer grows continuously in the spatial directions. Linearized Navier-Stokes(LNS) equations are derived for the disturbance flow quantities in the cylindrical polar coordinates. The LNS equations along with homogeneous boundary conditions forms a generalized eigenvalues problem. Since the base flow is axisymmetric, the disturbances are periodic in azimuthal direction. Chebyshev spectral collocation method and Arnoldi s iterative algorithm is used for the solution of the general eigenvalues problem. The global temporal modes are computed for the range of Reynolds numbers and different azimuthal wave numbers. The largest imaginary part of the computed eigenmodes are negative and hence the flow is temporally stable. The spatial structure of the eigenmodes shows that the flow is convectively unstable because the disturbance amplitudes grow in size and magnitude when moving towards downstream. The global modes of axisymmetric boundary layer are more stable than that of 2D flat plate boundary layer at low Reynolds number. However, at high Reynolds number they approaches to 2D flat plate boundary layer. Thus, the damping effect of transverse curvature is significant at low Reynolds number. The wave-like nature of the disturbances is found for most unstable eigenmodes.
It is usually believed that the geo-dynamo of the Earth or more generally of other planets, is created by the convective fluid motions inside their molten cores. An alternative to this thermal or compositional convection can however be found in the inertial waves resonances generated by the eventual precession of these planets or by the possible tidal distorsions of their liquid cores. We will review in this paper some of our experimental works devoted to the elliptical instability and present some new results when the experimental fluid is a liquid metal. We show in particular that an imposed magnetic field is distorted by the spin- over mode generated by the elliptical instability. In our experiment, the field is weak (20 Gauss) and the Lorenz force is negligible compared to the inertial forces, therefore the magnetic field does not modify the fluid flow and the pure hydrodynamics growth rates of the instability are recovered through magnetic measurements.
In this fluid dynamics video we investigate the flow field around straight-line swimming and right and left turning Paramecia using micro- particle image velocimetry ({\\mu}PIV). A Paramecium controls its ciliary beating to produce different fluid velocities on either side of its body. This phenomenon is visualized by applying {\\mu}PIV to images in which Paramecia swim in a dilute suspension of 1 {\\mu}m polystyrene spheres. Paramecia that swim straight exhibit similar magnitudes of velocity on either side of their bodies. In contrast, right-turning Paramecia exhibit greater magnitudes of velocity on their right sides, while left-turning organisms show the opposite.
Flow past a low pressure turbine blade in a cascade at $Re \\approx 52000$ and angle of incidence $\\alpha = 45.5^{0}$ is solved using a code developed in-house for solving 3D compressible Navier-Stokes equations. This code, named ANUROOP, has been developed in the finite volume framework using kinetic energy preserving second order central differencing scheme for calculating fluxes, and is compatible with hybrid grids. ANUROOP was verified and validated against several test cases with Mach numbers ranging from 0.1 (Taylor-Green vortex) to 1.5 (compressible turbulent channel flow). The code was found to be robust and stable, and the kinetic energy decay obeys the compressible Navier-Stokes equations. A hybrid grid, with a high resolution hexahedral orthogonal mesh in the boundary layer and unstructured (also hexahedral) elements in the rest of the domain, is used for the turbine blade simulation. Total grid size (160 million) is approximately an order of magnitude higher than in previous simulations for the same flow conditions and using similar numerical methods. The discrepancy in the pressure distribution in earlier studies compared to experimental data has been removed in this simulation. The trailing edge separation bubble has been characterized and a detailed discussion on the effect of surface curvature is presented.
We present a detailed study of of a global bifurcation occuring in a turbulent von K\\ arm\\ an swirling flow. In this system, the statistically steady states progressively display hysteretic behaviour when the Reynolds number is increased above the transition to turbulence. We examine in detail this hysteresis using asymmetric forcing conditions --- rotating the impellers at different speeds. For very high Reynolds numbers, we study the sensitivity of the hysteresis cycle --- using complementary Particle Image Velocimetry (PIV) and global mechanical measurements --- to the forcing nature, imposing either the torque or the speed of the impellers. New mean states, displaying multiple quasi-steady states and negative differential responses, are experimentally observed in torque control. A simple analogy with electrical circuits is performed to understand the link between multi-stability and negative responses. The system is compared to other, similar \"bulk\" systems, to understand some relevant ingredients of negative differential responses, and studied in the framework of thermodynamics of long-range interacting systems. The experimental results are eventually compared to the related problem of Rayleigh-B\\ enard turbulence.
We report on experimental determinations of the temperature field in the interior (bulk) of turbulent Rayleigh-Benard convection for a cylindrical sample with aspect ratio (diameter over height) of 0.50, both in the classical and in the ultimate state. The Prandtl number was close to 0.8. We find a \"logarithmic layer\" in which the temperature varies as A*ln(z/L) + B with the distance z from the bottom plate of the sample. The amplitude A varies with radial position r. In the classical state these results are in good agreement with direct numerical simulations (DNS); in the ultimate state there are as yet no DNS. A close analogy between the temperature field in the classical state and the \"Law of the Wall\" for the time-averaged down-stream velocity in shear flow is discussed.
Large-scale hydrodynamic instabilities of periodic helical flows are investigated using $3$D Floquet numerical computations. A minimal three-modes analytical model that reproduce and explains some of the full Floquet results is derived. The growth-rate $\\sigma$ of the most unstable modes (at small scale, low Reynolds number $Re$ and small wavenumber $q$) is found to scale differently in the presence or absence of anisotropic kinetic alpha (\\AKA{}) effect. When an $AKA$ effect is present the scaling $\\sigma \\propto q\\; Re,$ predicted by the $AKA$ effect theory [U. Frisch, Z. S. She, and P. L. Sulem, Physica D: Nonlinear Phenomena 28, 382 (1987)] is recovered for $Re\\ll 1$ as expected (with most of the energy of the unstable mode concentrated in the large scales). However, as $Re$ increases, the growth-rate is found to saturate and most of the energy is found at small scales. In the absence of \\AKA{} effect, it is found that flows can still have large-scale instabilities, but with a negative eddy-viscosity scaling $\\sigma \\propto \\nu(b Re^2-1) q^2$. The instability appears only above a critical value of the Reynolds number $Re^{c}$. For values of $Re$ above a second critical value $Re^{c}_{S}$ beyond which small-scale instabilities are present, the growth-rate becomes independent of $q$ and the energy of the perturbation at large scales decreases with scale separation. A simple two-modes model is derived that well describes the behaviors of energy concentration and growth-rates of various unstable flows. In the non-linear regime (at moderate values of $Re$) and in the presence of scale separation, the forcing scale and the largest scales of the system are found to be the most dominant energetically.
The linked fluid dynamics videos depict Rayleigh-Taylor turbulence when driven by a complex acceleration profile involving two stages of acceleration interspersed with a stage of stabilizing deceleration. Rayleigh-Taylor (RT) instability occurs at the interface separating two fluids of different densities, when the lighter fluid is accelerated in to the heavier fluid. The turbulent mixing arising from the development of the miscible RT instability is of key importance in the design of Inertial Confinement Fusion capsules, and to the understanding of astrophysical events, such as Type Ia supernovae. By driving this flow with an accel-decel-accel profile, we have investigated how structures in RT turbulence are affected by a sudden change in the direction of the acceleration first from destabilizing acceleration to deceleration, and followed by a restoration of the unstable acceleration. By studying turbulence under such highly non-equilibrium conditions, we hope to develop an understanding of the response and recovery of self-similar turbulence to sudden changes in the driving acceleration.
The effect of Prandtl number on the evolution of Kelvin-Helmholtz (KH) billows and the amount of mixing they generate is studied through direct numerical simulation (DNS). The results indicate that the time evolution of the rate of mixing through different stages of the life-cycle of KH flow is significantly influenced by the Prandtl number. As the Prandtl number increases, the final amount of mixing increases for Reynolds that are too low to support active three-dimensional motions. This trend is the opposite in sufficiently high Reynolds number KH flows that can overcome viscous effects, and develop significant three-dimensional instabilities. While the mixing generated in the two-dimensional flows, uniform in the span-wise direction, is not significantly dependent on the Prandtl number, the turbulent mixing induced by three-dimensional motions is a function of the Prandtl number. The turbulent mixing efficiency near the end of the turbulence decay phase approaches 0.2, the commonly observed value in the ocean. A smooth transition in mixing is observed by increasing the buoyancy Reynolds number.
Transition to turbulence in straight pipes occurs in spite of the linear stability of the laminar Hagen--Poiseuille flow if the amplitude of flow perturbations as well as the Reynolds number exceed a minimum threshold (subcritical transition). As the pipe curvature increases centrifugal effects become important, modifying the basic flow as well as the most unstable linear modes. If the curvature (tube-to-coiling diameter $d/D$) is sufficiently large a Hopf bifurcation (supercritical instability) is encountered before turbulence can be excited (subcritical instability). We trace the instability thresholds in the $Re-d/D$ parameter space in the range $0.01\\leq\\ d/D \\leq0.1$ by means of laser-Doppler velocimetry and determine the point where the subcritical and supercritical instabilities meet. Two different experimental setups were used: a closed system where the pipe forms an axisymmetric torus and an open system employing a helical pipe. Implications for the measurement of friction factors in curved pipes are discussed.
Multicomponent multiphase reactive transport processes with dissolution-precipitation are widely encountered in energy and environment systems. A pore-scale two-phase multi-mixture model based on the lattice Boltzmann method (LBM) is developed for such complex transport processes, where each phase is considered as a mixture of miscible components in it. The liquid-gas fluid flow with large density ratio is simulated using the multicomponent multiphase pseudo-potential LB model; the transport of certain solute in the corresponding solvent is solved using the mass transport LB model; and the dynamic evolutions of the liquid-solid interface due to dissolution-precipitation are captured by an interface tracking scheme. The model developed can predict coupled multiple physicochemical processes including multiphase flow, multicomponent mass transport, homogeneous reactions in the bulk fluid and heterogeneous dissolution-precipitation reactions at the fluid-solid interface, and dynamic evolution of the solid matrix geometries at the pore-scale. The model is then applied to a physicochemical system encountered in shale gas/oil industry involving multiphase flow, multicomponent reactive transport and dissolution-precipitation, with several reactions whose rates can be several orders of magnitude different at a given temperature. The pore-scale phenomena and complex interaction between different sub-processes are investigated and discussed in detail.
The instability of a streak and its nonlinear evolution are investigated by direct numerical simulation (DNS) for plane Poiseuille flow at Re=3000. It is suggested that there exists a traveling-wave solution (TWS). The TWS is localized around one of the two walls and notably resemble to the coherent structures observed in experiments and DNS so far. The phase space structure around this TWS is similar to a saddle point. Since the stable manifold of this TWS is extended close to the quasi two dimensional (Q2D) energy axis, the approaching process toward the TWS along the stable manifold is approximately described as the instability of the streak (Q2D flow) and the succeeding nonlinear evolution. Bursting corresponds to the escape from the TWS along the unstable manifold. These manifolds constitute part of basin boundary of the turbulent state.
Boundary layers in turbulent flows require fine grid spacings near the walls which depend on the choice of turbulence model. To satisfy these requirements a semi-structured mesh is generally used in this area with orthogonal and layered elements. Adaptation of such a mesh needs to take into account the flow physics along with the standard error indicator approach. In this paper a novel methodology which combines Hessian based error indicators with flow physics to drive mesh adaptation is illustrated. Particular focus is on the thickness adaptation of the layered mesh. The technique is applied to two turbulent incompressible flow cases and its effectiveness is studied.
We use boundary-integral methods to compute the time-dependent deformation of a drop of dielectric fluid immersed in another dielectric fluid in a uniform electric field E. Steady state theory predicts, when the permittivity ratio, \\beta, is large enough, a conical interface can exist at two cone angles, with \\theta_<(\\beta) stable and \\theta_>(\\beta) unstable. Our numerical evidence instead shows a dynamical process which produces a cone-formation and a transient finite-time singularity, when E and \\beta are above their critical values. Based on a scaling analysis of the electric stress and the fluid motion, we are able to apply approximate boundary conditions to compute the evolution of the tip region. We find in our non-equilibrium case where the electric stress is substantially larger than the surface tension, the ratio of the electric stress to the surface tension in the newly-grown cone region can converge to a \\beta dependent value, \\alpha_c(\\beta)>1, while the cone angle converges to \\theta_<(\\beta). This new dynamical solution is self-similar.
We investigate experimentally the influence of the liquid viscosity on the problem of the generation of waves by a turbulent wind at the surface of a liquid, extending the results of Paquier, Moisy and Rabaud [Phys. Fluids {\\bf 27}, 122103 (2015)] over nearly three decades of viscosity. The surface deformations are measured with micrometer accuracy using the Free-Surface Synthetic Schlieren method. We recover the two regimes of surface deformations previously identified: the wrinkles regime at small wind velocity, resulting from the viscous imprint on the liquid surface of the turbulent fluctuations in the boundary layer, and the regular wave regime at large wind velocity. Below the wave threshold, we find that the characteristic amplitude of the wrinkles scales as $\\nu^{-1/2} u^{* 3/2}$ over nearly the whole range of viscosities, whereas their size are essentially unchanged. We propose a simple model for this scaling, which compares well with the data. We finally show that the critical friction velocity $u^*$ for the onset of regular waves slowly increases with viscosity as $\\nu^{0.2}$. Whereas the transition between wrinkles and waves is smooth at small viscosity, including for water, it becomes rather abrupt at large viscosity. Finally, a new regime is found at $\\nu > 100-200 \\times 10^{-6}$~m$^2$~s$^{-1}$, characterized by a slow, nearly periodic emission of large-amplitude isolated fluid bumps.
The universality of intermittency in hydrodynamic turbulence is considered based on a recent model for the velocity gradient tensor evolution. Three possible versions of the model are investigated differing in the assumed correlation time-scale and forcing strength. Numerical tests show that the same (universal) anomalous relative scaling exponents are obtained for the three model variants. It is also found that transverse velocity gradients are more intermittent than longitudinal ones, whereas dissipation and enstrophy scale with the same exponents. The results are consistent with the universality of intermittency and relative scaling exponents, and suggest that these are dictated by the self-stretching terms that are the same in each variant of the model.
Wetting flows are controlled by the contact line motion. We derive an equation that describes the slow time evolution of the triple solid-liquid-fluid contact line for an arbitrary distribution of defects on a solid surface. The capillary rise along a partially wetted infinite vertical wall is considered. The contact line is assumed to be only slightly deformed by the defects. The derived equation is solved exactly for a simple example of a single defect. Introduction.
In this paper we introduce concepts from relativity and geometric algebra to aeroacoustics. We do this using an acoustic space-time transformation within the framework of sound propagation in uniform flows. By using Geometric Algebra we are able to provide a simple geometric interpretation to the space-time transformation, and are able to give neat and lucid derivations of the free-field Green s function for the convected wave equation and the Doppler shift for a stationary observer and a source in uniform rectilinear motion in a uniform flow.
A basic aspect of the kinetic descriptions of incompressible fluids based on an inverse kinetic approaches is the possibility of satisfying an H-theorem. This property is in fact related to the identification of the kinetic distribution function with a probability density in an appropriate phase space. Goal of this investigation is to analyze the conditions of validity of an H-theorem for the inverse kinetic theory recently proposed by Ellero and Tessarotto [2004, 2005]. It is found that the time-dependent contribution to the kinetic pressure, characteristic of such a kinetic model, can always be uniquely defined in such a way to warrant the constancy of the entropy.
In this paper we present an investigation of flow noise in sonar applications. Based on a careful identification of the dominant coupling effects, the acoustic noise at the sensor position resulting from the turbulent wall pressure fluctuations is modelled with a system of hydrodynamic, bending and acoustic waves. We describe an analytical solution of the problem which is based on a coupled eigenfunction expansion method. Finally, it is demonstrated that the analytical solution describes the flow noise generation and propagation mechanisms of the considered sea trials.
At a fixed distance from the body which creates the wake, entrainment is only seen to increase with the Reynolds number ($R$) up to a distance of almost 20 body scales. This increase levels up to a Reynolds number close to the critical value for the onset of the first instability. The entrainment is observed to be almost extinguished at a distance which is nearly the same for all the steady wakes within the $R$ range here considered, i.e. [20-100], which indicates that supercritical steady wakes have the same entrainment length as the subcritical ones. It is observed that this distance is equal to a number of body lengths that is equal to the value of the critical Reynolds number ($\\sim 47$), as indicated by a large compilation of experimental results. {\\it A fortiori} of these findings, we propose to interpret the unsteady bifurcation as a process that allows a smooth increase-redistribution of the entrainment along the wake according to the weight of the convection over the diffusion. The entrainment variation along the steady wake has been determined using a matched asymptotic expansion of the Navier-Stokes velocity field [Tordella and Belan, {\\it Physics of Fluids}, 15(2003)] built on criteria that include the matching of the transversal velocity produced by the entrainment process.
Analytic predictions of mean velocity profile (MVP) and streamwise ($x$) development of related integral quantities are presented for flows in channel and turbulent boundary layer (TBL), based on a symmetry analysis of eddy length and total stress. Specific predictions are the friction velocity $u_\\tau$: ${ U_e/u_\\tau }\\approx 2.22\\ln Re_x+2.86-3.83\\ln(\\ln Re_x)$; the boundary layer thickness $\\delta_e$: $x/\\delta_e \\approx 7.27\\ln Re_x-5.18-12.52\\ln(\\ln Re_x)$; the momentum thickness Reynolds number: $Re_x/Re_\\theta=4.94[{(\\ln {{\\mathop{\\rm Re}\\nolimits} _{\\theta} } + 1.88)^2} + 1]$, all in good agreement with empirical data.
Travelling-wave solutions are shown to bifurcate from relative periodic orbits in plane Poiseuille flow at Re = 2000 in a saddle-node infinite period bifurcation. These solutions consist in self-sustaining sinuous quasi-streamwise streaks and quasi- streamwise vortices located in the bulk of the flow. The lower branch travelling-wave solutions evolve into spanwise localized states when the spanwise size Lz of the domain in which they are computed is increased. On the contrary, upper branch of travelling-wave solutions develop multiple streaks when Lz is increased. Upper branch travelling-wave solutions can be continued into coherent solutions of the filtered equations used in large-eddy simulations where they represent turbulent coherent large-scale motions.
Plane Couette flow perturbed by a spanwise oriented ribbon, similar to a configuration investigated experimentally at the Centre d Etudes de Saclay, is investigated numerically using a spectral-element code. 2D steady states are computed for the perturbed configuration; these differ from the unperturbed flows mainly by a region of counter-circulation surrounding the ribbon. The 2D steady flow loses stability to 3D eigenmodes at Re = 230, beta = 1.3 for rho = 0.086 and Re = 550, beta = 1.5 for rho = 0.043, where Re is the Reynolds number, beta is the spanwise wavenumber and rho is the half-height of the ribbon. For rho = 0.086, the bifurcation is determined to be subcritical by calculating the cubic term in the normal form equation from the timeseries of a single nonlinear simulation; steady 3D flows are found for Re as low as 200. The critical eigenmode and nonlinear 3D states contain streamwise vortices localized near the ribbon, whose streamwise extent increases with Re. All of these results agree well with experimental observations.
The flow of fluid confined between a heated rotating cylinder and a cooled stationary cylinder is a canonical experiment for the study of heat transfer in engineering. The theoretical treatment of this system is greatly simplified if the cylinders are assumed to be of infinite length or periodic in the axial direction, in which cases heat transfer occurs only through conduction as in a solid. We here investigate numerically heat transfer and the onset of turbulence in such flows by using both periodic and no-slip boundary conditions in the axial direction. We obtain a simple linear criterion that determines whether the infinite-cylinder assumption can be employed. The curvature of the cylinders enters this linear relationship through the slope and additive constant. For a given length-to-gap aspect ratio there is a critical Rayleigh number beyond which the laminar flow in the finite system is convective and so the behaviour is entirely different from the periodic case. The criterion does not depend on the Prandtl number and appears quite robust with respect to the Reynolds number. In particular, it continues to work reasonably in the turbulent regime.
This study presents numerical simulations and experiments considering the flow of an electrically conducting fluid inside a cube driven by a rotating magnetic field (RMF). The investigations are focused on the spin-up, where a liquid metal (GaInSn) is suddenly exposed to an azimuthal body force generated by the RMF, and the subsequent flow development. The numerical simulations rely on a semi-analytical expression for the induced electromagnetic force density in an electrically conducting medium. Velocity distributions in two perpendicular planes are measured using a novel dual-plane, two-component ultrasound array Doppler velocimeter (UADV) with continuous data streaming, enabling long term measurements for investigating transient flows. This approach allows to identify the main emerging flow modes during the spontaneous transition from a stable flow to unstable flow regimes with exponentially growing velocity oscillations using the Proper Orthogonal Decomposition (POD) method. Characteristic frequencies in the oscillating flow regimes are determined in the super critical range above the critical magnetic Taylor number Ta_c = 1.3x10^5, where the transition from the steady double vortex structure of the secondary flow to an unstable regime with exponentially growing oscillations is detected. The mean flow structures and the temporal evolution of the flow predicted by the numerical simulations and observed in experiments are in very good agreement.
The possible transport of fibers by fluid flow in fractures is investigated experimentally in transparent models using flexible polyester thread (mean diameter $280 \\mu\\mathrm{m}$) and Newtonian and shear thinning fluids. In the case of smooth parallel walls, fibers of finite length $\\ell = 20-150 \\mathrm{mm}$ move at a constant velocity of the order of the maximum fluid velocity in the aperture. In contrast, for fibers lying initially at the inlet side of the model and dragged by the flow inside it, the velocity increases with the depth of penetration (this results from the lower velocity - and drag - in the inlet part). In both cases, the friction of the fiber with the smooth walls is weak. For rough self-affine walls and a continuous gradient of the local mean aperture transverse to the flow, transport of the fibers by a water flow is only possible in the region of larger aperture ($\\bar{a} \\gtrsim 1.1 \\mathrm{mm}$) and is of \"stop and go\" type at low velocities. Time dependent distorsions of the fiber are also often observed. When water is replaced by a shear thinning polymer solution, the fibers move faster and continuously in high aperture regions and their friction with the walls is reduced. Fiber transport becomes also possible in narrower regions where irreversible pinning occurred for water. In a third rough model with no global aperture gradient but with rough walls and a channelization parallel to the mean flow, fiber transport was only possible in shear-thinning flows and pinning and entanglement effects were studied.
We examine the interaction of two-dimensional solitary pulses on falling liquid films. We make use of the second-order model derived by Ruyer-Quil and Manneville [Eur. Phys. J. B 6, 277 (1998); Eur. Phys. J. B 15, 357 (2000); Phys. Fluids 14, 170 (2002)] by combining the long-wave approximation with a weighted residuals technique. The model includes (second-order) viscous dispersion effects which originate from the streamwise momentum equation and tangential stress balance. These effects play a dispersive role that primarily influences the shape of the capillary ripples in front of the solitary pulses. We show that different physical parameters, such as surface tension and viscosity, play a crucial role in the interaction between solitary pulses giving rise eventually to the formation of bound states consisting of two or more pulses separated by well-defined distances and travelling at the same velocity. By developing a rigorous coherent-structure theory, we are able to theoretically predict the pulse-separation distances for which bound states are formed. Viscous dispersion affects the distances at which bound states are observed. We show that the theory is in very good agreement with computations of the second-order model. We also demonstrate that the presence of bound states allows the film free surface to reach a self-organized state that can be statistically described in terms of a gas of solitary waves separated by a typical mean distance and characterized by a typical density.
Some approach to the solution of boundary value problems for finding functions, which are analytical in a wedge, is proposed. If the ratio of the angle at the wedge vertex to a number \\pi is rational, then the boundary value problem is reduced to the finite system of ordinary differential equations. Such approach, applied the problem of inertial motion of a liquid wedge, made it possible to sum series with small denominators arising in the problem and find four exact examples of self-similar flows with a free boundary.
The finite element method is applied to obtain numerical solutions to the recently derived nonlinear equation for shallow water wave problem for several cases of bottom shapes. Results for time evolution of KdV solitons and cnoidal waves under stochastic forces are presented. Though small effects originating from second order dynamics may be obscured by stochastic forces, the main waves, both cnoidal and solitary ones, remain very robust against any distortions.
Here we report the first evidence of the inverse energy cascade in a flow dominated by 3D motions. Experiments are performed in thick fluid layers where turbulence is driven electromagnetically. It is shown that if the free surface of the layer is not perturbed, the top part of the layer behaves as quasi-2D and supports the inverse energy cascade regardless of the layer thickness. Well below the surface the cascade survives even in the presence of strong 3D eddies developing when the layer depth exceeds half the forcing scale. In a bounded flow at low bottom dissipation, the inverse energy cascade leads to the generation of a spectral condensate below the free surface. Such coherent flow can destroy 3D eddies in the bulk of the layer and enforce the flow planarity over the entire layer thickness.
The well-known problem of unidirectional plane flow of a fluid in a half-space due to the impulsive motion of the plate it rests upon is discussed in the context of the second-grade and the Oldroyd-B non-Newtonian fluids. The governing equations are derived from the conservation laws of mass and momentum and three correct known representations of their exact solutions given. Common mistakes made in the literature are identified. Simple numerical schemes that corroborate the analytical solutions are constructed.
According to the recent revision of the theory of thermal radiation, thermal black-body radiation has an induced origin. We show that in single-bubble sonoluminescence thermal radiation is emitted by a spherical resonator, coincident with the sonoluminescing bubble itself, instead of the ensemble of elementary resonators emitting thermal black-body radiation in the case of open gaseous media. For a given wavelength, the diameter of the resonator is fixed, and this explains the very high constancy in phase of light flashes from the sonoluminesing bubble, which is better than the constancy of period of a driving acoustic wave.
We present a perturbation solution for a pressure-driven fluid flow in a rotating toroidal channel. The analysis shows the difference between the solutions of full and simplified equations studied earlier. The result is found to be reliable for {\\it low} Reynolds number ($\\R$) as was the case for a previously studied solution for high $\\R$. The convergence conditions are defined for the whole range of governing parameters. The viscous flow exhibits some interesting features in flow pattern and hydrodynamic characteristics.
Capillary dynamics has been and is yet an important field of research, because of its very relevant role played as the core mechanism at the base of many applications. In this context, we are particularly interested in the liquid penetration inspection technique. Due to the obviously needed level of reliability involved with such a non-destructive test, this paper is devoted to study how the presence of an entrapped gas in a close-end capillary may affect the inspection outcome. This study is carried out through a 1D ordinary differential model that despite its simplicity is able to point out quite well the capillary dynamics under the effect of an entrapped gas. The paper is divided into two main parts; the first starts from an introductory historical review of capillary flows modeling, goes on presenting the 1D second order ordinary differential model, taking into account the presence of an entrapped gas and therefore ends by showing some numerical simulation results. The second part is devoted to the analytical study of the model by separating the initial transitory behavior from the stationary one. Besides, these solutions are compared with the numerical ones and finally an expression is deduced for the threshold radius switching from a fully damped transitory to an oscillatory one.
In this paper it is shown that the location of the characteristic overshoot of the Richardson s annular effect changes with the Kinematic Reynolds number $\\omega^*=\\omega r_0^2 /\\nu$ in the range of frequencies within the laminar regime. From the study of the Richardson s overshoot at different times it was identified the existence of aparent transverse damped waves similar to those ones observed in the famous Stokes second problem, the physical analysis of this waves was used for the establishment of a semi-empirical law that gives the functional relation of the mean overshoot maximum with the kinematic reynolds number, say $B_0(\\omega^*)=2.28 + 0.51{\\omega^*}^{-1/2}$. Finally a transient solution was constructed and verified asymptotically for large times, and the tipical time for which the transient solution resembles the steady oscillating one was identified to be dependent of the viscosity of the fluid and of the radius of the pipe.
Modeling and simulating overland flow fed by rainfall is a common issue in watershed surface hydrology. Modelers have to choose among various friction models when defining their simulation framework. The purpose of this work is to compare the simulation quality for the Manning, Darcy-Weisbach, and Poiseuille friction models on the simple case of a constant rain on a thin experimental flume. Results show that the usual friction law of Manning is not suitable for this type of flow. The Poiseuille friction model gave the best results both on the flux at the outlet and the velocity and depth profile along the flume. The Darcy-Weisbach model shows good results for laminar flow. Additional testing should be carried out for turbulent cases.
Experimental results are used to validate a 2D phenomenological model of the near wake based on Van Der Pol wake oscillators, which is the first one which describes the 2D motion of a cylinder in its transversal plan. In the case of a single cylinder, experimental and numerical results are in relatively good agreement. Those first results show that the proposed model can be used as a simple computation tool in the prediction of 2D VIV effects.
The effects of wall velocity slip on the linear stability of a gravity-driven miscible two-fluid flow down an incline are examined. The fluids have the matched density but different viscosity. A smooth viscosity stratification is achieved due to the presence of a thin mixed layer between the fluids. The results show that the presence of slip exhibits a promise for stabilizing the miscible flow system by raising the critical Reynolds number at the onset and decreasing the bandwidth of unstable wave numbers beyond the threshold of the dominant instability. This is different from its role in the case of a single fluid down a slippery substrate where slip destabilizes the flow system at the onset. Though the stability properties are analogous to the same flow system down a rigid substrate, slip is shown to delay the surface mode instability for any viscosity contrast. It has a damping/promoting effect on the overlap modes (which exist due to the overlap of critical layer of dominant disturbance with the mixed layer) when the mixed layer is away/close from/to the slippery inclined wall. The trend of slip effect is influenced by the location of the mixed layer, the location of more viscous fluid and the mass diffusivity of the two fluids. The stabilizing characteristics of slip can be favourably used to suppress the non-linear breakdown which may happen due to the coexistence of the unstable modes in a flow over a substrate with no slip. The results of the present study suggest that it is desirable to design a slippery surface with appropriate slip sensitivity in order to meet a particular need for a specific application.
Collisions between particles suspended in a fluid play an important role in many physical processes. As an example, collisions of microscopic water droplets in clouds are a necessary step in the production of macroscopic raindrops. Collisions of dust grains are also conjectured to be important for planet formation in the gas surrounding young stars, and also to play a role in the dynamics of sand storms. In these processes, collisions are favoured by fast turbulent motions. Here we review recent advances in the understanding of collisional aggregation due to turbulence. We discuss the role of fractal clustering of particles, and caustic singularities of their velocities. We also discuss limitations of the Smoluchowski equation for modelling these processes. These advances lead to a semi-quantitative understanding on the influence of turbulence on collision rates, and point to deficiencies in the current understanding of rainfall and planet formation.
In this final note we demonstrate that the authors of manuscripts arXiv:1210.2036, arXiv:1309.0405 and arXiv:1309.5513 use mathematical notations and notions sometimes in the standard meaning and sometimes in a sense which differs from the standard. As this specific use is not defined beforehand, the authors  statements are self-contradictory which makes any further scientific discussion meaningless.
We investigate the motion of a spherical drop in a general quadratic flow acted upon by an arbitrarily oriented externally applied uniform electric field. The drop and media are considered to be leaky dielectrics. The flow field affects the distribution of charges on the drop surface, which leads to alteration in the electric field, thereby affecting the velocity field through the Maxwell stress on the fluid-fluid interface. The two-way coupled electrohydrodynamics is central towards dictating the motion of the drop in the flow field. We analytically address the electric potential distribution and Stokesian flow field in and around the drop in a general quadratic flow for small electric Reynolds number (which is the ratio of the charge relaxation time scale to the convective time scale). As a special case, we consider a drop in an unbounded cylindrical Poiseuille flow and show that, an otherwise absent, cross-stream drop migration may be obtained in the presence of a uniform electric field. Depending on the direction of the applied electric field and the relative electrical properties of the drop and media, the drop may migrate towards or away from the centreline of the imposed Poiseuille flow.
We report a new thermal boundary layer equation for turbulent Rayleigh-Benard convection for Prandtl number Pr>1 that takes into account the effect of turbulent fluctuations. These fluctuations are neglected in existing equations, which are based on steady-state and laminar assumptions. Using this new equation, we derive analytically the mean temperature profiles in two limits: (a) Pr>1, Pr~1 and (b) Pr>>1. These two theoretical predictions are in excellent agreement with the results of our direct numerical simulations for Pr=4.38 (water) and Pr=2547.9 (glycerol) respectively.
The nonlinear dynamic behaviour of microscopic bubbles near a wall is investigated. The Keller-Miksis-Parlitz equation is adopted, but modified to account for the presence of the wall. This base model describes the time evolution of the bubble surface, which is assumed to remain spherical, and accounts for the effect of acoustic radiation losses owing to liquid compressibility in the momentum conservation. Two situations are considered: the base case of an isolated bubble in an unbounded medium; and a bubble near a solid wall. In the latter case, the wall influence is modeled by including a symmetrically oscillating image bubble. The bubble dynamics is traced using a numerical solution of the model equation. Subsequently, Floquet theory is used to accurately detect the bifurcation point where bubble oscillations stop following the driving ultrasound frequency and undergo period-changing bifurcations. Of particular interest is the detection of the subcritical period tripling and quadrupling transition. The parametric bifurcation maps are obtained as functions of non-dimensional parameters representing the bubble radius, the frequency and pressure amplitude of the driving ultrasound field and the distance from the wall. It is shown that the presence of the wall generally stabilises the bubble dynamics, so that much larger values of the pressure amplitude are needed to generate nonlinear responses.
Mixing is relevant to many areas of science and engineering, including the pharmaceutical and food industries, oceanography, atmospheric sciences, and civil engineering. In all these situations one goal is to quantify and often then to improve the degree of homogenisation of a substance being stirred, referred to as a passive scalar or tracer. A classical measure of mixing is the variance of the concentration of the scalar, which can be related to the $L^2$ norm of the concentration field. Recently other norms have been used to quantify mixing, in particular the mix-norm as well as negative Sobolev norms. These norms have the advantage that unlike variance they decay even in the absence of diffusion, and their decay corresponds to the flow being mixing in the sense of ergodic theory. General Sobolev norms weigh scalar gradients differently, and are known as multiscale norms for mixing. We review the applications of such norms to mixing and transport, and show how they can be used to optimise the stirring and mixing of a decaying passive scalar. We then review recent work on the less-studied case of a continuously-replenished scalar field --- the source-sink problem. In that case the flows that optimally reduce the norms are associated with transport rather than mixing: they push sources onto sinks, and vice versa.
We solve for the first time the classical linear Cauchy--Poisson problem for the time evolution an initial surface disturbance when a uniform shear current is present beneath the surface. The solution is general, including the effects of gravity, surface tension and constant finite depth. The particular case of an initially Gaussian disturbance of width $b$ is studied for different values of three system parameters: a \"shear Froude number\" $S\\sqrt{b/g}$ ($S$ is the uniform vorticity), the Bond number and the depth relative to the initial perturbation width. Different phase and group velocity in different directions yield very different wave patterns in different parameter regimes when the shear is strong, and the well known pattern of diverging ring waves in the absence of shear can take on very different qualitative behaviours. For a given shear Froude number, both finite depth and nonzero capillary effects are found to weaken the influence of the shear on the resulting wave pattern. The various patterns are analysed and explained in light of the shear-modified dispersion relation.
This article describes the fluid dynamics video: \"Turbulent Bubbly Channel Flow: Role of Bubble Deformability.\" The effect of bubble deformability on the flow rate of bubbly upflow in a turbulent vertical channel is examined using direct numerical simulations. A series of simulations with bubbles of decreasing deformability shows a transition from flow where deformable bubbles remain in the middle of the channel to a situation where nearly spherical bubbles slide along the walls.
We find a further class of exact solutions to the Lighthill Whitham Richards Payne (LWRP) traffic flow equations. As before, using two consecutive Lagrangian transformations, a linearization is achieved. Next, depending on the initial density, we either obtain exact formulae for the dependence of the car density and velocity on x, t, or else, failing that, the same result in a parametric representation. The calculation always involves two possible factorizations of a consistency condition. Both must be considered. In physical terms, the lineup usually separates into two offshoots at different velocities. Each velocity soon becomes uniform. This outcome in many ways resembles not only Rowlands, Infeld and Skorupski J. Phys. A: Math. Theor. 46 (2013) 365202 (part I) but also the two soliton solution to the Korteweg-de Vries equation. This paper can be read independently of part I. This explains unavoidable repetitions. Possible uses of both papers in checking numerical codes are indicated at the end. Since LWRP, numerous more elaborate models, including multiple lanes, traffic jams, tollgates etc. abound in the literature. However, we present an exact solution. These are few and far between, other then found by inverse scattering. The literature for various models, including ours, is given. The methods used here and in part I may be useful in solving other problems, such as shallow water flow.
A numerical solution is presented for the natural convection from inclined wall plumes which arise from a line thermal source imbedded at the leading edge of an adiabatic plate with arbitrary tilt angle and embedded in a fluid-saturated porous medium. An appropriate transformation of the governing boundary-layer equations is proposed and a very efficient novel numerical solution is proposed to obtain rigorous numerical solutions of the transformed nonsimilar equations over a wide range of tilt angle from the vertical to the horizontal.
Linear stability and the non-modal transient energy growth in compressible plane Couette flow are investigated for two prototype mean flows: (a) the {\\it uniform shear} flow with constant viscosity, and (b) the {\\it non-uniform shear} flow with {\\it stratified} viscosity. Both mean flows are linearly unstable for a range of supersonic Mach numbers ($M$). For a given $M$, the critical Reynolds number ($Re$) is significantly smaller for the uniform shear flow than its non-uniform shear counterpart. An analysis of perturbation energy reveals that the instability is primarily caused by an excess transfer of energy from mean-flow to perturbations. It is shown that the energy-transfer from mean-flow occurs close to the moving top-wall for ``mode I   instability, whereas it occurs in the bulk of the flow domain for ``mode II  . For the non-modal analysis, it is shown that the maximum amplification of perturbation energy, $G_{\\max}$, is significantly larger for the uniform shear case compared to its non-uniform counterpart. For $\\alpha=0$, the linear stability operator can be partitioned into ${\\cal L}\\sim \\bar{\\cal L} + Re^2{\\cal L}_p$, and the $Re$-dependent operator ${\\cal L}_p$ is shown to have a negligibly small contribution to perturbation energy which is responsible for the validity of the well-known quadratic-scaling law in uniform shear flow: $G(t/{\\it Re}) \\sim {\\it Re}^2$. A reduced inviscid model has been shown to capture all salient features of transient energy growth of full viscous problem. For both modal and non-modal instability, it is shown that the {\\it viscosity-stratification} of the underlying mean flow would lead to a delayed transition in compressible Couette flow.
In this paper, the relation between skin friction and heat transfer along windward sides of blunt-nosed bodies in hypersonic flows is investigated. The self-similar boundary layer analysis is accepted to figure out the distribution of the ratio of skin friction to heat transfer coefficients along the wall. It is theoretically obtained that the ratio depends linearly on the local slope angle of the wall surface, and an explicit analogy expression is presented for circular cylinders, although the linear distribution is also found for other nose shapes and even in gas flows with chemical reactions. Furthermore, based on the theoretical modelling of the second order shear and heat transfer terms in Burnett equations, a modified analogy is derived in the near continuum regime by considering the rarefied gas effects. And a bridge function is also constructed to describe the nonlinear analogy in the transition flow regime. At last, the direct simulation Monte Carlo method is used to validate the theoretical results. The general analogy, beyond the classical Reynolds analogy, is applicable to both flat plates and blunt-nosed bodies, in either continuous or rarefied hypersonic flows.
We report and discuss case study simulations of the Rayleigh-Taylor instability in the Boussinesq, incompressible regime developed to turbulence. Our main focus is on a statistical analysis of density and velocity fluctuations inside of the already developed and growing in size mixing zone. Novel observations reported in the manuscript concern self-similarity of the velocity and density fluctuations spectra inside of the mixing zone snapshot, independence of the spectra of the horizontal slice level, and universality showing itself in a virtual independence of the internal structure of the mixing zone, measured in the re-scaled spatial units, of the initial interface perturbations.
This experimental study addresses the re-initiation mechanism of detonation waves following the Mach reflection of a shock-flame complex. The detonation diffraction around a cylinder is used to reproducibly generate the shock-flame complex of interest. The experiments are performed in methane-oxygen. We use a novel experimental technique of coupling a two-in-line-spark flash system with a double-frame camera in order to obtain microsecond time resolution permitting accurate schlieren velocimetry. The first series of experiments compares the non-reactive sequence of shock reflections with the reflection over a rough wall under identical conditions. It was found that the hot reaction products generated along the rough wall are entrained by the wall jet into a large vortex structure behind the Mach stem. The second series of experiments performed in more sensitive mixtures addressed the sequence of events leading to the detonation establishment along the Mach and transverse waves. Following ignition and jet entrainment, a detonation first appears along the Mach stem while the transverse wave remains non-reactive. The structure of the unburned tongue however indicates local instabilities and hot spot formation, leading to the rapid reaction of this gas. Numerical simulations are also reported, confirming the sequence of ignition events obtained experimentally.
A liquid drop impacting a dry solid surface with sufficient kinetic energy will splash, breaking apart into numerous secondary droplets. This phenomenon shows many similarities to forced wetting, including the entrainment of air at the contact line. Because of these similarities and the fact that forced wetting has been shown to depend on the wetting properties of the surface, existing theories predict splashing to depend on wetting properties as well. However, using high-speed interference imaging we observe that wetting properties have no effect on splashing for various liquid-surface combinations. Additionally, by fully resolving the Navier-Stokes equations at length and time scales inaccessible to experiments, we find that the shape and motion of the air-liquid interface at the contact line are independent of wettability. We use these findings to evaluate existing theories and to compare splashing with forced wetting.
The dynamics of two-dimensional thin premixed flames is addressed in the framework of mathematical models where the flow field on either side of the front is piecewise incompressible and vorticity-free. Flames confined in channels with asymptotically-straight impenetrable walls are considered. Beside a few free propagations along straight channels, attention is focused on flames propagating against high-speed flows and positioned near a round central obstacle, or near two symmetric bumps protruding inward. Combining conformal maps and Green s functions, a regularised generalisation of Frankel s integro-differential equation for the instantaneous front shape in each configuration is derived, and solved numerically. This produces a variety of real looking phenomena: steady fronts (symmetric or not), noise-induced sub-wrinkles, flash-back events and breathing fronts in pulsating flows. Perspectives and open mathematical/physical problems are finally evoked.
The spectra of turbulent heat flux $\\mathrm{H}(k)$ in Rayleigh-B\\ {e}nard convection with and without uniform rotation are presented. The spectrum $\\mathrm{H}(k)$ scales with wave number $k$ as $\\sim k^{-2}$. The scaling exponent is almost independent of the Taylor number $\\mathrm{Ta}$ and Prandtl number $\\mathrm{Pr}$ for higher values of the reduced Rayleigh number $r$ ($ > 10^3$). The exponent, however, depends on $\\mathrm{Ta}$ and $\\mathrm{Pr}$ for smaller values of $r$ ($<10^3$). The probability distribution functions of the local heat fluxes are non-Gaussian and have exponential tails.
Soft and hard spontaneous breaking of space translational symmetry (homogeneity) have been studied in turbulent wakes by means of distributed chaos. In the case of the soft translational symmetry breaking the vorticity correlation integral $\\int_{V} \\langle {\\boldsymbol \\omega} ({\\bf x},t) \\cdot {\\boldsymbol \\omega} ({\\bf x} + {\\bf r},t) \\rangle_{V} d{\\bf r}$ dominates the distributed chaos and the chaotic spectra $\\exp-(k/k_{\\beta})^{\\beta }$ have $\\beta =1/2$. In the case of the hard translational symmetry breaking, control on the distributed chaos is switched from one type of fundamental symmetry to another (in this case to Lagrangian relabeling symmetry). Due to the Noether s theorem the relabeling symmetry results in the inviscid helicity conservation and helicity correlation integral $I=\\int \\langle h({\\bf x},t)~h({\\bf x}+{\\bf r}, t)\\rangle d{\\bf r}$ (Levich-Tsinober invariant) dominates the distributed chaos with $\\beta =1/3$. Good agreement with the experimental data has been established for turbulent wakes behind a cylinder, behind grids (for normal and super-fluids) and for bubbling flows. In the last case even small concentration of bubbles leads to a drastic change of the turbulent velocity spectra due to the hard spontaneous symmetry breaking in the bubbles  wakes.
We introduce a novel approach to scale-decomposition of the fluid kinetic energy (or other quadratic integrals) into band-pass contributions from a series of length-scales. Our decomposition is based on a multiscale generalization of the ``Germano identity   for smooth, graded filter kernels. We employ this method to derive a budget equation that describes the transfers of turbulent kinetic energy both in space and in scale. It is shown that the inter-scale energy transfer is dominated by local triadic interactions, assuming only the scaling properties expected in a turbulent inertial-range. We derive rigorous upper bounds on the contributions of non-local triads, extending the work of Eyink (2005) for low-pass filtering. We also propose a physical explanation of the differing exponents for our rigorous upper bounds and for the scaling predictions of Kraichnan (1966,1971). The faster decay predicted by Kraichnan is argued to be the consequence of additional cancellations in the signed contributions to transfer from non-local triads, after averaging over space. This picture is supported by data from a $512^3$ pseudospectral simulation of Navier-Stokes turbulence with phase-shift dealiasing.
Although amphitheater-shaped valley heads can be cut by groundwater flows emerging from springs, recent geological evidence suggests that other processes may also produce similar features, thus confounding the interpretations of such valley heads on Earth and Mars. To better understand the origin of this topographic form we combine field observations, laboratory experiments, analysis of a high-resolution topographic map, and mathematical theory to quantitatively characterize a class of physical phenomena that produce amphitheater-shaped heads. The resulting geometric growth equation accurately predicts the shape of decimeter-wide channels in laboratory experiments, 100-meter wide valleys in Florida and Idaho, and kilometer wide valleys on Mars. We find that whenever the processes shaping a landscape favor the growth of sharply protruding features, channels develop amphitheater-shaped heads with an aspect ratio of pi.
We demonstrate ultra-low timing jitter optical pulse trains from free- running, 80 MHz repetition rate, mode-locked Yb-fiber lasers. Timing jitter of various mode-locking conditions at close-to-zero intra-cavity dispersion (-0.004 to +0.002 ps2 range at 1040 nm center wavelength) is characterized using a sub-20-attosecond-resolution balanced optical cross-correlation method. The measured lowest rms timing jitter is 175 attoseconds when integrated from 10 kHz to 40 MHz (Nyquist frequency) offset frequency range, which corresponds to the record-low timing jitter from free-running mode-locked fiber lasers so far. We also experimentally found the mode-locking conditions of fiber lasers where both ultra-low timing jitter and relative intensity noise can be achieved.
Pulse self-compression followed by the generation of resonant radiation is a well known phenomenon in non-linear optics. Resonant radiation is important as it allows for efficient and tunable wavelength conversion. We vary the chirp of the initial pulse and find in simulations and experiments that a small positive chirp enhances the pulse compression and strongly increases the generation of resonant radiation. This result corroborates previously published simulation results indicating an improved degree of pulse compression for a small positive chirp [1]. It also demonstrates how pulse evolution can be studied without cutting back the fiber.
We report on the first experimental evidence of guided resonances (GRs) in photonic crystal slabs based on aperiodically-ordered supercells. Using the Ammann-Beenker (quasiperiodic, 8-fold symmetric) tiling geometry, we present our study on the fabrication, experimental characterization, and full-wave numerical simulation of two representative structures (with different filling parameters) operating at near-infrared wavelengths (1300-1600 nm). Our results show a fairly good agreement between measurements and numerical predictions, and pave the way for the development of new strategies (based, e.g., on the lattice symmetry breaking) for GR engineering.
We demonstrate feedback and harmonic locking of chip-scale slot-type optomechanical oscillators to external low-noise reference clocks, with suppressed timing jitter by three orders of magnitude. The feedback and compensation techniques significantly reduce the close-to-carrier phase noise, especially within the locking bandwidth for the integral root-mean-square timing jitter. Harmonic locking via high-order carrier signals is also demonstrated with similar phase noise and integrated root-mean-square timing jitter reduction. The chip-scale optomechanical oscillators are tunable over an 80-kHz range by tracking the reference clock, with potential applications in tunable radio-frequency photonics platforms.
The demand for nonlinear effects within a silicon platform to support photonic circuits requiring phase-only modulation, frequency doubling, and/or difference frequency generation, is becoming increasingly clear. However, the symmetry of the silicon crystal inhibits second order optical nonlinear susceptibility, $\\chi^{(2)}$. Here, we show that the crystalline symmetry is broken when a DC field is present, inducing a $\\chi^{(2)}$ in a silicon waveguide that is proportional to the large $\\chi^{(3)}$ of silicon. First, Mach-Zehnder interferometers using the DC Kerr effect optical phase shifters in silicon ridge waveguides with p-i-n junctions are demonstrated with a $V_{\\pi}L$ of $2.4Vcm$ in telecom bands $({\\lambda}_{\\omega}=1.58{\\mu}m)$ without requiring to dope the silicon core. Second, the pump and second harmonic modes in silicon ridge waveguides are quasi-phase matched when the magnitude, spatial distribution of the DC field and $\\chi^{(2)}$ are controlled with p-i-n junctions. Using these waveguides, second harmonic generation at multiple pump wavelengths are observed with a maximum efficiency of $P_{2{\\omega}}/P_{\\omega}^2$=12%/W at ${\\lambda}_{\\omega}=2.29{\\mu}m$ in a 1mm long waveguide. This corresponds to a field-induced $\\chi^{(2)}=41pm/V$, comparable to non-centrosymmetric media (LiNbO3, GaAs, GaN). The field-induced nonlinear silicon photonics will lead to a new class of CMOS compatible integrated devices spanning from near to mid infrared spectrum.
Self-assembled Plasmonic Nanoparticle Networks (PNN) composed of chains of 12-nm diameter crystalline gold nanoparticles exhibit a longitudinally coupled plasmon mode cen- tered at 700 nm. We have exploited this longitudinal absorption band to efficiently confine light fields and concentrate heat sources in the close vicinity of these plasmonic chain net- works. The mapping of the two phenomena on the same superstructures was performed by combining two-photon luminescence (TPL) and fluorescence polarization anisotropy (FPA) imaging techniques. Besides the light and heat concentration, we show experimentally that the planar spatial distribution of optical field intensity can be simply modulated by controlling the linear polarization of the incident optical excitation. On the contrary, the heat production, which is obtained here by exciting the structures within the optically transparent window of biological tissues, is evenly spread over the entire PNN. This contrasts with the usual case of localized heating in continuous nanowires, thus opening opportunities for these networks in light-induced hyperthermia applications. Furthermore, we propose a unified theoretical framework to account for both the non-linear optical and thermal near-fields around PNN. The associated numerical simulations, based on a Green s function formalism, are in excellent agreement with the experimental images. This formalism therefore provides a versatile tool for the accurate engineering of optical and thermodynamical properties of complex plasmonic colloidal architectures.
From the demonstration of saturable absorption by Vavilow and Levshin in 1926, and with invention of the laser, unavailability of strongly nonlinear materials was a key obstacle for developing optical signal processing, in particular in transparent telecommunication networks. Today, most advanced photonic switching materials exploit gain dynamics and near-band and excitonic effects in semiconductors, nonlinearities in organic media with weakly-localized electrons and nonlinearities enhanced by hybridization with metamaterials. Here we report on a new type of artificial nonlinearity that is nano-opto-mechanical in nature. It was observed in an artificial metamaterial array of plasmonic meta-molecules supported by a flexible nano-membrane. Here nonlinearity is underpinned by the reversible reconfiguration of its structure induced by light. In a film of only 100 nanometres thickness we demonstrated modulation of light with light using milliwatt power telecom diode lasers.
Invisibility cloak is drawing much attention due to its special camouflage when exposed to physical field varing from wave (electromagnetic field, acoustic field, elastic wave, etc.) to scalar field (thermal field, static magnetic field, dc electric field and mass diffusion). Here, an electrostatic field invisibility cloak has been theoretically investigated, and experimentally demonstrated for the first time to perfectly hide a certain region from sight without disturbing the external electrostatic field. The desired cloaking effect has been achieved via both scattering cancelling technology and transformation optics (TO).This present work will pave a novel way for manipulating of electrostatic field where would enable a wide range of potential applications and sustainable products made available.
The diffuse reflectance (albedo) and transmittance of a Raman random gain medium are calculated via semi-analytic two-stream equations with power-dependent coefficients. The results show good agreement with the experimental data for barium nitrate powder. Both the Raman albedo AR and Raman transmittance TR diverge at a critical gain gc, interpreted as the threshold for diffusive Raman laser generation. However, the ratio TR/AR approaches a finite limiting value dependent on particle scattering albedo v and scattering asymmetry g. The dependence of the generation threshold on the scattering parameters is analysed and the feedback effect of Fresnel reflection at the gain boundaries evaluated. The addition of external mirrors, particularly at the pumped surface, significantly reduces the threshold gain.
We model the process of ultra broadband light generation in which a pair of laser pulses separated by the Raman frequency drive a Raman transition. In contrast to the usual approach using separate field envelopes for the different frequency components, we treat the field as a single entity. This requires the inclusion of few-cycle corrections to the pulse propagation. Our single-field model makes fewer approximations and is mathematically (and hence computationally) simpler, although it does require greater computational resources to implement. The single-field theory reduces to the traditional multi-field one using appropriate approximations.
We present novel hysteretic behaviour of a three-level ladder atomic system exhibiting double-cavity optical bistability in the mean-field limit. The two fields coupling the atomic system experience feedback via two independent, unidirectional, single mode ring cavities and exhibit cooperative phenomena, simultaneously. The system displays a range of rich dynamical features varying from normal switching to self pulsing and a period-doubling route to chaos for both the fields. We focus our attention to a new hump like feature in the bistable curve arising purely due to cavity induced inversion, which eventually leads to negative hysteresis in the bistable response. This is probably the only all-optical bistable system that exhibits positive as well as negative bistable hysteresis in different input field intensity regimes. For both the fields, the switching times, the associated critical slowing down, the self-pulsing characteristics, and the chaotic behaviour can be controlled to a fair degree, moreover, all these effects occur at low input light levels.
We report on a three-waveguide electro-optic switch for compact photonic integrated circuits and data routing applications. The device features a plasmonic metal-oxide-semiconductor (MOS) mode for enhanced light-matter-interactions. The switching mechanism originates from a capacitor-like design where the refractive index of the active medium, Indium-Tin-Oxide, is altered via shifting the plasma frequency due to carrier accumulation inside the waveguide-based MOS structure. This light manipulation mechanism controls the transmission direction of transverse magnetic polarized light into either a CROSS or BAR waveguide port. The extinction ratio of 18 dB (7) dB for the CROSS (BAR) state, respectively, is achieved via a gating voltage bias. The ultrafast broadband fJ/bit device allows for seamless integration with Siliconon- Insulator platforms to for low-cost manufacturing.
Subwavelength structured surfaces, known as metasurfaces, hold promise for future compact and optically thin devices with versatile functionalities. Here, by revisiting the concept of detour phase at the basis of the first computer generated holograms we have designed high-performance transmissive dielectric meta-holograms with new functionalities. In one class of such devices wavelength- independent phase masks have been generated by compensating the inherent dispersion of the detour phase with that of the subwavelength structures. This leads to broadband operation from the visible to the near infrared with efficiency as high as 75% in the 1000 to 1400 nm range. We have also shown that we can fully control the effective focal length of the imaging optical system by incorporating a lens-like function in the meta-hologram. In a second class of devices we have incorporated in the phase map a geometric phase to achieve for the first time chiral imaging: the projection of different images depends on the handedness of the reference beam. The compactness, lightweight and ability to produce images even at large angles of our devices have significant potential for important emerging applications such as wearable optics.
We explore possibilities of waveguide-mode interference lithography (WMIL) technique for high contrast subwavelength structures in the visible region. Selecting an appropriate waveguide-mode, we demonstrate high contrast resist mask patterns for the first time. TM1 mode in the waveguide is shown to be useful for providing a three-dimensional structure whose cross section is checkerboard pattern. Applying our WMIL technique, we demonstrate 1D, 2D and 3D subwavelength resist patterns that are widely used for the fabrication of metamteterials in the visible region. In addition to the resist patterns, we demonstrate a resonance at 1.9 eV for a split tube structure experimentally.
Previously we considered the effect of experimental parameters on optimized transmission through opaque media using spatial light modulator (SLM)-based wavefront shaping. In this study we consider the opposite geometry, in which we optimize reflection from an opaque surface such that the backscattered light is focused onto a spot on an imaging detector. By systematically varying different experimental parameters (genetic algorithm iterations, bin size, SLM active area, target area, spot size, and sample angle with respect to the optical axis) and optimizing the reflected light we determine how each parameter affects the intensity enhancement. We find that the effects of the experimental parameters on the enhancement are similar to those measured for a transmissive geometry, but with the exact functional forms changed due to the different geometry and the use of a genetic algorithm instead of an iterative algorithm. Additionally, we find preliminary evidence of greater enhancements than predicted by random matrix theory, suggesting a possibly new physical mechanism to be investigated in future work.
We demonstrate the possibility of ultrabroadband super-Planckian radiative heat transfer be- tween two metal plates patterned with tapered hyperbolic metamaterial arrays. It is shown that, by employing profile-patterned hyperbolic media, one can design photonic bands to populate a desired thermal radiation window, with a spectral density of modes much higher than what can be achieved with unstructured media. For nanometer-sized gaps between two plates, the modes occupy states both inside and outside the light cone, giving rise to ultrabroadband super-Planckian radiative heat transfer. Our study reveals that structured hyperbolic metamaterial offers unprecedented potential in achieving a controllable super-Planckian radiative heat transfer.
We propose the use of graded-index few-mode fibers for mode-conversion by long-period gratings (LPG) transiently written by ultrashort laser pulses using the optical Kerr effect. The mode inter- action is studied by numerically solving the multi-mode coupled nonlinear Schroedinger equations. We present highly efficient conversion of the LP 01 - into the LP 11 -mode preserving the pulse shape in contrast to previous results in step-index fibers. Furthermore, mode conversion using different wavelengths for inducing and probing the LPG is shown. Due to the flat phase-matching curve of the examined modes in the graded-index fiber, mode-conversion can be observed for probe center wavelengths of 1100nm up to 1800nm with a write beam centered around 1030nm. Therefore, a complete separation of the probe from the write beam should be possible as well as the application of optically induced guided mode conversion for all optical modulation across a broad wavelength range.
Near-infrared epsilon-near-zero (ENZ) metamaterial slabs based on silver-germanium (Ag-Ge) multilayers are experimentally demonstrated. Transmission, reflection and absorption spectra are characterized and used to determine the complex refractive indices and the effective permittivities of the ENZ metamaterial slabs, which match the results obtained from both the numerical simulations and the optical nonlocalities analysis. A rapid post-annealing process is used to reduce the collision frequency of silver and therefore decrease the optical absorption loss of multilayer metamaterial slabs. Furthermore, multilayer grating structures are studied to enhance the optical transmission and also tune the location of ENZ wavelength. The demonstrated near-infrared ENZ multilayer metamaterial slabs are important for realizing many exotic applications, such as phase front shaping and engineering of photonic density of states.
The majority of silicon photonics is built on silicon-on-insulator (SOI) wafers while the majority of electronics, including CPUs and memory, are built on bulk silicon wafers, limiting broader acceptance of silicon photonics. This discrepancy is a result of silicon photonics s requirement for a single-crystalline silicon (c-Si) layer and a thick undercladding for optical guiding that bulk silicon wafers to not provide. While the undercladding problem can be partially addressed by substrate removal techniques, the complexity of co-integrating photonics with state-of-the-art transistors and real estate competition between electronics and photonics remain problematic. We show here a platform for deposited GHz silicon photonics based on polycrystalline silicon with high optical quality suitable for high performance electro-optic devices. We demonstrate 3 Gbps polysilicon electro-optic modulator fabricated on a deposited polysilicon layer fully compatible with CMOS backend integration. These results open up an array of possibilities for silicon photonics including photonics on DRAM and flexible substrates.
A parameter, called the degree of diffraction, is defined to describe the diffractive spreading of a monochromatic light beam. The same as the degree of paraxiality that was introduced by Gawhary and Severini in Opt. Lett. 33, 1360 (2008), the degree of diffraction depends only on beam s angular spectrum. With this definition, it is possible to quantitatively compare the diffractive spreading of different light beams.
We demonstrate photonic crystal nanobeam cavities that support both TE- and TM-polarized modes, each with a Quality factor greater than one million and a mode volume on the order of the cubic wavelength. We show that these orthogonally polarized modes have a tunable frequency separation and a high nonlinear spatial overlap. We expect these cavities to have a variety of applications in resonance-enhanced nonlinear optics.
Silicon and germanium are perhaps the two most well-understood semiconductor materials in the context of solid state device technologies and more recently micromachining and nanotechnology. Meanwhile, these two materials are also important in the field of infrared lens design. Optical instruments designed for the wavelength range where these two materials are transmissive achieve best performance when cooled to cryogenic temperatures to enhance signal from the scene over instrument background radiation. In order to enable high quality lens designs using silicon and germanium at cryogenic temperatures, we have measured the absolute refractive index of multiple prisms of these two materials using the Cryogenic, High-Accuracy Refraction Measuring System (CHARMS) at NASA Goddard Space Flight Center, as a function of both wavelength and temperature. For silicon, we report absolute refractive index and thermo-optic coefficient (dn/dT) at temperatures ranging from 20 to 300 K at wavelengths from 1.1 to 5.6 microns, while for germanium, we cover temperatures ranging from 20 to 300 K and wavelengths from 1.9 to 5.5 microns. We compare our measurements with others in the literature and provide temperature-dependent Sellmeier coefficients based on our data to allow accurate interpolation of index to other wavelengths and temperatures. Citing the wide variety of values for the refractive indices of these two materials found in the literature, we reiterate the importance of measuring the refractive index of a sample from the same batch of raw material from which final optical components are cut when absolute accuracy greater than +/-5 x 10^-3 is desired.
In this work we have studied the optical properties of disordered photonic structures, in which we have controlled the distribution of the random layer thickness. Such structures are characterized by an alternation of high and low refractive index layers, but the layer thicknesses follow the aforementioned distributions. We have used two types of distribution: a distribution in which each thickness has the same probability to occur and one in which the thickness follows a Gaussian function. We have simulated the average transmission all over the spectrum for photonic structure characterized by a different width of the distribution. We have found that the choice of the distribution of the layer thickness is a control of the average transmission of a random photonic structure.
Pulse trains growing from modulated continuous waves (CWs) are considered, using solutions of the Hirota equation for solitons on a finite background. The results demonstrate that pulses extracted from the maximally compressed trains can propagate preserving their shape and forming robust arrays. The dynamics of double high-power pulse trains produced by modulated CWs in a model of optical fibers, including the Raman effect and other higher-order terms, is considered in detail too. It is demonstrated that the double trains propagate in a robust form, with frequencies shifted by the Raman effect.
We describe effects of nonlinearity on propagation of surface plasmon polaritons (SPPs) at an interface between a metal and an amplifying medium of the externally pumped two-level atoms. Using Maxwell equations we derive the nonlinear dispersion law and demonstrate that, the nonlinear saturation of the linear gain leads to formation of stationary SPP modes with the intensities independent from the propagation distance. Transition to the regime of stationary propagation is similar to the threshold crossover in lasers and leads to narrowing of the SPP spectrum.
The geometric Spin Hall Effect of Light (geometric SHEL) amounts to a polarization-dependent positional shift when a light beam is observed from a reference frame tilted with respect to its direction of propagation. Motivated by this intriguing phenomenon, the energy density of the light beam is decomposed into its Cartesian components in the tilted reference frame. This illustrates the occurrence of the characteristic shift and the significance of the effective response function of the detector. We introduce the concept of a tilted polarizing interface and provide a scheme for its experimental implementation. A light beam passing through such an interface undergoes a shift resembling the original geometric SHEL in a tilted reference frame. This displacement is generated at the polarizer and its occurrence does not depend on the properties of the detection system. We give explicit results for this novel type of geometric SHEL and show that at grazing incidence this effect amounts to a displacement of multiple wavelengths, a shift larger than the one introduced by Goos-H\\\"anchen and Imbert-Fedorov effects.
We demonstrate, for the first time, an all-dielectric metamaterial resonator in the mid-wave infrared based on high-index tellurium cubic inclusions. Dielectric resonators are desirable compared to conventional metallo-dielectric metamaterials at optical frequencies as they are largely angular invariant, free of ohmic loss, and easily integrated into three-dimensional volumes. With these low-loss, isotropic elements, disruptive optical metamaterial designs, such as wide-angle lenses and cloaks, can be more easily realized.
In this work we show theoretically that it is possible to design a large band gap in the infrared range using a one-dimensional Photonic Crystal heterostructure made of porous silicon. Stacking together multiple photonic crystal substructures of the same contrast index, but of different lattice periods, it is possible to broad the narrow forbidden band gap that can be reached by the low contrast index of the porous silicon multilayers. The main idea in this work is that we can construct a Giant Photonic Band Gap -as large as desired- by combining a tandem of photonic crystals substructures by using a simple analytical rule to determine the period of each substructure.
We experimentally demonstrate high Quality factor dual-polarized TE-TM photonic crystal nanobeam cavities. The free-standing nanobeams are fabricated in a 500 nm thick silicon layer, and are probed using both tapered optical fiber and free-space resonant scattering set-ups. We measure Q-factors greater than 10^4 for both TM and TE modes, and observe large fiber transmission drops (0.3 -- 0.4) at the TM mode resonances.
We demonstrate a monolithic optical whispering gallery mode resonator fabricated with barium fluoride (BaF$_2$) with an ultra-high quality ($Q$) factor above $10^9$ at $1550$ nm, and measured with both the linewidth and cavity-ring-down methods. Vertical scanning optical profilometry shows that the root mean square surface roughness of $2$ nm is achieved for our mm-size disk. To the best of our knowledge, we show for the first time that one billion $Q$-factor is achievable by precision polishing in relatively soft crystals with mohs hardness of ~$3$. We show that complex thermo-optical dynamics can take place in these resonators. Beside usual applications in nonlinear optics and microwave photonics, high energy particle scintillation detection utilizing monolithic BaF$_2$ resonators potentially becomes feasible.
The temperature-dependent photoluminescence (PL) spectra of zinc oxide (ZnO) nanocrystals deposited inside the ultraviolet (UV) opal were studied. ZnO was grown in the voids between FCC packed silicon dioxide spheres using spray pyrolysis under ultrasonic vibration in the solution containing a zinc nitrate precursor. The ZnO nanoparticles inside opal matrix with UV photonic band-gap exhibit suppression of the excitonic emission and enhancement of the deep level emission. Suppression of the excitonic lines is due to the inhibition of spontaneous emission, while enhancement and broadening of the DL emission in the green spectral region is due to Purcell effect. The infiltration of ZnO inside the photonic crystal may be a useful technique to increase its emission efficiency in the selected spectral region.
Recently, we have shown that the wave-front of short pulses can be accurately and efficiently reversed by use of simple one-dimensional zero-gap photonic crystals. In this Article, we describe the analytical approach in detail, and discuss specific structures and modulation techniques as well as the required steps for achieving complete time-reversal. We also show that our scheme is only very weakly sensitive to material losses and dispersion.
Photonic crystal materials are based on a periodic modulation of the dielectric constant on length scales comparable to the wavelength of light. These materials can exhibit photonic band gaps; frequency regions for which the propagation of electromagnetic radiation is forbidden due to the depletion of the density of states. In order to exhibit a full band gap, 3D PCs must present a threshold refractive index contrast that depends on the crystal structure. In the case of the so-called woodpile photonic crystals this threshold is comparably low, approximately 1.9 for the direct structure. Therefore direct or inverted woodpiles made of high refractive index materials like silicon, germanium or titanium dioxide are sought after. Here we show that, by combining multiphoton lithography and atomic layer deposition, we can achieve a direct inversion of polymer templates into TiO$_{2}$ based photonic crystals. The obtained structures show remarkable optical properties in the near-infrared region with almost perfect specular reflectance, a transmission dip close to the detection limit and a Bragg length comparable to the lattice constant.
We designed a metallic programmable mirror for optical wavelengths made up of a large number of discrete steps which can be moved independently by actuators. The device is able to easily reshape an incident beam, imprinting on it an optical vortex with tunable topological charge and orbital angular momentum (OAM). Furthermore it is possible to generate almost arbitrary field profiles which can be used for spatial encoding.
We report on a simple method of locking a laser to a birefringent cavity using polarization spectroscopy. The birefringence of the resonator permits the simple extraction of an error signal by using one polarization state as a phase reference for another state. No modulation of the light or the resonator is required, reducing the complexity of the laser locking setup. This method of producing an error signal can be used on most birefringent optical resonators, even if the details of birefringence and eigenpolarizations are not known. This technique is particularly well suited for fiber ring resonators due to the inherent birefringence of the fiber and the unknown nature of that birefringence. We present an experimental demonstration of this technique using a fiber ring.
We propose a simple and straightforward method to generate a spatially variant lattice structures by optical interference lithography method. Using this method, it is possible to independently vary the orientation and period of the two-dimensional lattice. The method consists of two steps which are: numerical synthesis of corresponding phase mask by employing a two-dimensional integrated gradient calculations and experimental implementation of synthesized phase mask by making use of a phase only spatial light modulator in an optical 4f Fourier filtering setup. As a working example, we provide the experimental fabrication of a spatially variant square lattice structure which has the possibility to guide a Gaussian beam through a 90{\\deg} bend by photonic crystal self-collimation phenomena. The method is digitally reconfigurable, is completely scalable and could be extended to other kind of lattices as well.
We investigate the generation of ultraviolet (UV) second-harmonic radiation on the boundary of a UV transparent crystal, which is derived from the automatic partial phase matching of the incident wave and the total internal reflection. By adhering to another UV non-transparency crystal with larger second-order nonlinear coefficient \\chi^{(2)}, an nonlinear interface with large disparity in \\chi^{(2)} is formed and the enhancement of UV second-harmonic radiation is observed experimentally. The intensity of enhanced second harmonic wave generated at the nonlinear interface was up to 11.6 times at the crystal boundary. As a tunable phase-matching method, it may suggest potential applications in the UV, even vacuum-UV, spectral region.
We develop a compact whispering-gallery-mode (WGM) sensing system by integrating multiple components, including a tunable laser, a temperature controller, a function generator, an oscilloscope, a photodiode detector, and a testing computer, into a phone-sized embedded system. We demonstrate a thermal sensing experiment by using this portable system. Such a system successfully eliminates bulky measurement equipment required for characterizing optical resonators and will open up new avenues for practical sensing applications by using ultra-high Q WGM resonators.
Directionality in a holographic screen may be useful for projecting images to be seen in complete horizontal parallax. The continuous sequence of views from an object may be transferred from the object and enlarged at the screen giving the same appearence of a holographic image. Due to the actual movement of the object, images in four dimensions may now be produced with a projector whose spatial dimensions are much smaller than those of the screen. One technique that allows for this result is the chromatic encoding of views by means of holographic optical elements. This is demonstrated to be a complete reproduction of the original light distribution, although its spectral continuous distribution of colors makes each view monochromatic, not allowing for a good color reproduction. The resulting system may substitute conventional holography in some visual applications were registering is not necessary but only the effect of the phantasmagoric image. Furthermore, it allows for the enlarging of holographic images, performing also the direct conversion of the image of a conventional off-axis hologram to a white-light image.
Noise-immune cavity-enhanced optical frequency comb spectroscopy (NICE-OFCS) is a recently developed technique that utilizes phase modulation to obtain immunity to frequency-to-amplitude noise conversion by the cavity modes and yields high absorption sensitivity over a broad spectral range. We describe the principles of the technique and discuss possible comb-cavity matching solutions. We present a theoretical description of NICE-OFCS signals detected with a Fourier transform spectrometer (FTS), and validate the model by comparing it to experimental CO2 spectra around 1575 nm. Our system is based on an Er:fiber femtosecond laser locked to a cavity and phase-modulated at a frequency equal to a multiple of the cavity free spectral range (FSR). The NICE-OFCS signal is detected by a fast-scanning FTS equipped with a high-bandwidth commercial detector. We demonstrate a simple method of passive locking of the modulation frequency to the cavity FSR that significantly improves the long term stability of the system, allowing averaging times on the order of minutes. Using a cavity with a finesse of ~9000 we obtain absorption sensitivity of 6.4 x 10^{-11} cm^{-1} Hz^{-1/2} per spectral element, and concentration detection limit for CO2 of 450 ppb Hz^{-1/2}, determined by multiline fitting.
Since the invention of digital cameras there has been a concerted drive towards detector arrays with higher spatial resolution. Microscanning is a technique that provides a final higher resolution image by combining multiple images of a lower resolution. Each of these low resolution images is subject to a sub-pixel sized lateral displacement. In this work we apply the microscanning approach to an infrared single-pixel camera. For the same final resolution and measurement resource, we show that microscanning improves the signal-to-noise ratio (SNR) of reconstructed images by approximately 50%. In addition, this strategy also provides access to a stream of low-resolution  preview  images throughout each high-resolution acquisition. Our work demonstrates an additional degree of flexibility in the trade-off between SNR and spatial resolution in single-pixel imaging techniques.
We have performed a numerical solution for band structure of an Abrikosov vortex lattice in type-II superconductors forming a periodic array in two dimensions for applications of incorporating the photonic crystals concept into superconducting materials with possibilities for optical electronics. The implemented numerical method is based on the extensive numerical solution of the Ginzburg-Landau equation for calculating the parameters of the two-fluid model and obtaining the band structure from the permittivity, which depends on the above parameters and the frequency. This is while the characteristics of such crystals highly vary with an externally applied static normal magnetic field, leading to nonlinear behavior of the band structure, which also has nonlinear dependence on the temperature. The similar analysis for every arbitrary lattice structure is also possible to be developed by this approach as presented in this work. We also present some examples and discuss the results.
We demonstrate that twisting one part of a chiral photonic structure about its helical axis produces a single circularly polarized localized mode that gives rise to an anomalous crossover in propagation. Up to a crossover thickness, this defect results in a peak in transmission and exponential scaling of the linewidth for a circularly polarized wave with the same handedness as structure. Above the crossover, however, the linewidth saturates and the defect mode can be excited only by the oppositely polarized wave, resulting in a peak in reflection instead of transmission.
We present a general theory for designing realistic omega-type bianisotropic metasurfaces (O-BMSs), unlocking their full potential for molding electromagnetic fields. These metasurfaces, characterized by electric surface impedance, magnetic surface admittance, and magnetoelectric coupling coefficient, were previously considered for wavefront manipulation. However, previous reports mainly considered plane-wave excitations, and implementations included cumbersome metallic features. In this work, we prove that any field transformation which locally conserves real power can be implemented via passive and lossless meta-atoms characterized by closed-form expressions; this allows rigorous incorporation of arbitrary source and scattering configurations. Subsequently, we show that O-BMS meta-atoms can be implemented using an asymmetric stack of three impedance sheets, an appealing structure for printed circuit board fabrication. Our formulation reveals that, as opposed to Huygens  metasurfaces (HMSs), which exhibit negligible magnetoelectric coupling, O-BMSs are not limited to controlling the phase of transmitted fields, but can rather achieve high level of control over the amplitude and phase of reflected fields. This is demonstrated by designing O-BMSs for reflectionless wide-angle refraction, independent surface-wave guiding, and a highly-directive low-profile antenna, verified with full-wave simulations. This straightforward methodology facilitates development of O-BMS-based devices for controlling the near and far fields of arbitrary sources in complex scattering configurations.
We report the first experimental observation of multi-stable states in a single-longitudinal mode semiconductor ring laser. We show how the operation of the device can be steered to either monostable, bistable or multi-stable dynamical regimes in a controlled way. We observe that the dynamical regimes are organized in well reproducible sequences that match the bifurcation diagrams of a two-dimensional model. By analyzing the phase space in this model, we predict how the stochastic transitions between multi-stable states take place and confirm it experimentally.
Stimulated Raman scattering (SRS) in ultra-high-Q surface-tension-induced spherical and chip-based toroid microcavities is considered both theoretically and experimentally. These microcavities are fabricated from silica, exhibit small mode volume (typically 1000 $\\mu m^{3}$) and possess whispering-gallery type modes with long photon storage times (in the range of 100 ns), significantly reducing the threshold for stimulated nonlinear optical phenomena. Oscillation threshold levels of less than 100 $\\mu $% -Watts of launched fiber pump power, in microcavities with quality factors of 100 million are observed. Using a steady state analysis of the coupled-mode equations for the pump and Raman whispering-gallery modes, the threshold, efficiencies and cascading properties of SRS in UHQ devices are derived. The results are experimentally confirmed in the telecommunication band (1550nm) using tapered optical fibers as highly efficient waveguide coupling elements for both pumping and signal extraction. The device performance dependence on coupling, quality factor and modal volume are measured and found to be in good agreement with theory. This includes analysis of the threshold and efficiency for cascaded Raman scattering. The side-by-side study of nonlinear oscillation in both spherical microcavities and toroid microcavities on-a-chip also allows for comparison of their properties. In addition to the benefits of a wafer-scale geometry, including integration with optical, electrical or mechanical functionality, microtoroids on-a-chip exhibit single mode Raman oscillation over a wide range of pump powers.
Starting from the infinite-dimensional Ikeda map, we derive an extended temporal Lugiato-Lefever equation that may account for the effects of the conjugate electromagnetic fields (also called `negative frequency fields ). In the presence of nonlinearity in a ring cavity, these fields lead to new forms of modulational instability and resonant radiations. Numerical simulations based on the new extended Lugiato-Lefever model show that the negative-frequency resonant radiations emitted by ultrashort cavity solitons can impact Kerr frequency comb formation in externally pumped temporal optical cavities of small size. Our theory is very general, is not based on the slowly-varying envelope approximation, and the predictions are relevant to all kinds of resonators, such as fiber loops, microrings and microtoroids.
Propagation of ultrashort light pulses in disordered multilayers is studied by using numerical simulations in time domain. We consider cases of instantaneous and noninstantaneous Kerr nonlinearities of the structure materials. The competitive nature of disorder and nonlinearity is revealed on the long and short timescales. We also pay special attention to the effect of pulse self-trapping in the photonic crystal with relaxing nonlinearity and show the dependence of this effect on the level of disorder. We believe that the results reported here will be useful not only in the field of optics but also from the standpoint of the general problem of classical waves propagation in nonlinear disordered periodic media.
We experimentally demonstrate intensity and phase modulation of terahertz radiation using actively controlled large-area planar metamaterial (metafilm) hybridized with a 12 um thick layer of a liquid crystal. Active control was introduced through in-plane electrical switching of the liquid crystal, which enabled us to achieve a reversible single-pass absolute transmission change of 20 % and a phase change of 40 deg at only 20 V.
We have investigated that the Goos-H\\\"anchen (GH) shifts in frustrated total internal reflection (FTIR) studied with wave packet propagation. In the first-order approximation of the transmission coefficient, the GH shift is exactly the expression given by stationary phase method, thus saturates an asymptotic constant in two different ways depending on the angle of incidence. Taking account into the second-order approximation, the GH shift always depends on the width of the air gap due to the modification of the beam width. It is further shown that the GH shift with second-order correction increases with decreasing the beam width at the small incidence angles, while for the large incidence angles it reveals a strong decrease with decreasing the beam width. These phenomena offers the better understanding of the tunneling delay time in FTIR.
The report deals with classical and quantum descriptions of particles that interact with smooth random potentials, for example ultracold atoms in the dipole potential of an optical speckle pattern. In addition, a discussion of the link between Radiative Transfer theory and the underlying coherence theory of wave optics is presented. The Radiative Transfer Equation is shown to emerge as a limiting case of the Bethe-Salpeter Equation, and some next-order corrections are discussed.
High-Q microresonator has been suggested a promising platform for optical frequency comb generation, via dissipative soliton formation. To achieve a higher Q and obtain the necessary anomalous dispersion, $Si_3N_4$ microresonators made of multi-mode waveguides were previously implemented. However, coupling between different transverse mode families in the multi-mode waveguides results in periodic disruption of dispersion and quality factor, introducing perturbation to dissipative soliton formation and amplitude modulation to the corresponding spectrum. Careful choice of pump wavelength to avoid the mode crossing region is thus critical in conventional $Si_3N_4$ microresonators. Here, we report a novel design of $Si_3N_4$ microresonator such that single mode operation, high quality factor, and anomalous dispersion are attained simultaneously. The microresonator is consisted of uniform single mode waveguides in the semi-circle region, to eliminate bending induced mode coupling, and adiabatically tapered waveguides in the straight region, to avoid excitation of higher order modes. The intrinsic Q of the microresonator reaches $1.36 \\times 10^6$ while the GVD remains to be anomalous at $-50 fs^2/mm$. We demonstrate, with this novel microresonator, broadband phase-locked Kerr frequency combs with flat and smooth spectra can be generated by pumping at any resonances in the optical C-band.
We investigate enhanced harmonic generation processes in gain-assisted, near-zero permittivity metamaterials composed of spherical plasmonic nanoshells. We report the presence of narrow-band features in transmission, reflection and absorption induced by the presence of an active material inside the core of the nanoshells. The damping-compensation mechanism used to achieve the near-zero effective permittivity condition also induces a significant increase in field localization and strength and, consequently, enhancement of linear absorption. When only metal nonlinearities are considered, second and third harmonic generation efficiencies obtained by probing the structure in the vicinity of the near-zero permittivity condition approach values as high as for irradiance value as low as . These results clearly demonstrate that a relatively straightforward path now exists to the development of exotic and extreme nonlinear optical phenomena in the KW/cm2 range
We developed an improved model in order to predict the RF behavior and the slow light properties of the SOA valid for any experimental conditions. It takes into account the dynamic saturation of the SOA, which can be fully characterized by a simple measurement, and only relies on material fitting parameters, independent of the optical intensity and the injected current. The present model is validated by showing a good agreement with experiments for small and large modulation indices.
We study a polarizer-analyzer mounting for the terahertz regime with perfectly conducting metallic polarizers made of a periodic subwavelength pattern. We analytically investigate the influence on the transmission response of the multiple reflections which occur between polarizer and analyzer with a renewed Jones formalism. We demonstrate that this interaction leads to a modified transmission response: the extended Malus  Law. In addition, we show that the transmission response can be controlled by the distance between polarizer and analyzer. For particular set-ups, the mounting exhibits extremely sensitive transmission responses. This interesting feature can be employed for high precision sensing and characterization applications. We specifically propose a general design for measuring electro-optical response of materials in the terahertz domain allowing detection of refractive index variations as small as $10^{-5}$.
We develop a model for the coupling of quasi-normal modes in open photonic systems consisting of two resonators. By expressing the modes of the coupled system as a linear combination of the modes of the individual particles, we obtain a generalized eigenvalue problem involving small size dense matrices. We apply this technique to dielectric rod dimmer of rectangular cross section for Transverse Electric (TE) polarization in a two-dimensional (2D) setup. The results of our model show excellent agreement with full-wave finite element simulations. We provide a convergence analysis, and a simplified model with a few modes to study the influence of the relative position of the two resonators. This model provides interesting physical insights on the coupling scheme at stake in such systems and pave the way for systematic and efficient design and optimization of resonances in more complicated systems, for applications including sensing, antennae and spectral filtering.
Plasmonics is a research area merging the fields of optics and nanoelectronics by confining light with relatively large free-space wavelength to the nanometer scale - thereby enabling a family of novel devices. Current plasmonic devices at telecommunication and optical frequencies face significant challenges due to losses encountered in the constituent plasmonic materials. These large losses seriously limit the practicality of these metals for many novel applications. This paper provides an overview of alternative plasmonic materials along with motivation for each material choice and important aspects of fabrication. A comparative study of various materials including metals, metal alloys and heavily doped semiconductors is presented. The performance of each material is evaluated based on quality factors defined for each class of plasmonic devices. Most importantly, this paper outlines an approach for realizing optimal plasmonic material properties for specific frequencies and applications, thereby providing a reference for those searching for better plasmonic materials.
We report on local superficial blood flow monitoring in biological tissue from laser Doppler holographic imaging. In time averaging recording conditions, holography acts as a narrowband bandpass filter, which, combined with a frequency shifted reference beam, permits frequency selective imaging in the radiofrequency range. These Doppler images are acquired with an off axis Mach Zehnder interferometer. Microvascular hemodynamic components mapping is performed in the cerebral cortex of the mouse and the eye fundus of the rat with near-infrared laser light without any exogenous marker. These measures are made from a basic inverse method analysis of local first order optical fluctuation spectra at low radiofrequencies, from 0 Hz to 100 kHz. Local quadratic velocity is derived from Doppler broadenings induced by fluid flows, with elementary diffusing wave spectroscopy formalism in backscattering configuration. We demonstrate quadratic mean velocity assessment in the 0.1 to 10 millimeters per second range in vitro and imaging of superficial blood perfusion with a spatial resolution of about 10 micrometers in rodent models of cortical and retinal blood flow.
A robust wedge setup is proposed to unambiguously demonstrate negative refraction for negative index metamaterials. We applied our setup to several optical metamaterials from the literature and distinctly observed the phenomena of negative refraction. This further consolidates the reported negative-index property. It is found there generally exists a lateral shift for the outgoing beam through the wedge. We derived a simple expression for calculating this beam shift and interestingly, it provides us a strategy to quantitatively estimate the loss of the wedge material (Im[n]). Addition- ally, we offered a design of metamaterials, compatible with nano-imprinting-lithography, showing negative refractive index in the visible regime (around yellow-light wavelengths). The multi-layer- system retrieval was utilized to extract the effective refractive index of the metamaterial. It was also intuitively characterized through our wedge setup to demonstrate corresponding phenomena of refraction.
We have considered new type of singular beams with fractional topological charges that were called the optical quarks possessed rather unique properties, their topological charges being half of the integer order. There are four types of optical quarks: even and odd with opposite signs of the topological charges. The sums or difference of the even and odd quarks form the standard vortex (or non-vortex) beams with the integer order topological charges. All quarks in the same beam annihilate, the beam vanishes. The analysis of the quark angular spectra showed that the optical quarks are structurally unstable field forms under the free-space propagation. We have analyzed their propagation properties for different types of the beam envelope including the symmetric beam array with discrete optical quarks. We have discussed the properties of the possible structurally stable quark forms and medium capable to maintain optical quarks
We propose an iterative method of energy flow shaping in the focal region with the amplitude, phase and polarization modulation of incident light. By using an iterative optimization based on the diffraction calculation with help of the fast Fourier transform, we can tailor the polarization and phase structure in the focal plane. By appropriate design of the polarization and phase gradients, arbitrary energy flow including spin and orbital parts can be designed and tailored independently. The capability of energy flow structuring is demonstrated by the measurement of the Stokes parameters and self-interference pattern. This provides a novel method to control the vectorial feature of the focal volume.
We propose a new scheme to achieve sub-Rayleigh resolution of interference pattern with independent laser beams. We perform an experimental observation of a double-slit interference with two orthogonally polarized laser beams. The resolution of the interference pattern measured by a two-photon detection is doubled provided the two beams illuminate the double-slit with certain incident angles. The scheme is simple and can be in favor of both high intensity and perfect visibility.
Optical microcavities have received much attention over the last decade from different research fields ranging from fundamental issues of cavity QED to specific applications such as microlasers and bio-sensors. A major issue in the latter applications is the difficulty to obtain directional emission of light in the far-field while keeping high energy densities inside the cavity (i.e. high quality factor). To improve our understanding of these systems, we have studied the annular cavity (a dielectric disk with a circular hole), where the distance cavity-hole centers, d, is used as a parameter to alter the properties of cavity resonances. We present results showing how one can affect the directionality of the far-field while preserving the uniformity (hence the quality factor) of the near-field simply by increasing the value of d. Interestingly, the transition between a uniform near- and far-field to a uniform near- and directional far-field is rather abrupt. We can explain this behavior quite nicely with a simple model, supported by full numerical calculations, and we predict that the effect will also be found in a large class of eigenmodes of the cavity.
We study correlated two-photon transport in a (quasi) one-dimensional photonic waveguide coupled to a three-level $\\Lambda$-type emitter driven by a classical light field. Two-photon correlation is much stronger in the waveguide for a driven three-level emitter (3LE) than a two-level emitter. The driven 3LE waveguide shows electromagnetically induced transparency (EIT), and we investigate the scaling of EIT for one and two photons. We show that the two transmitted photons are bunched together at any distance separation when energy of the incident photons meets \"two-photon resonance\" criterion for EIT.
We report a new strategy to remove the reflections resulted from the finite embedded transformation-optical design by proposing an impedance-tunable coordinate transformation, on which the functions of impedance coefficients can be derived in the original space without changing the refractive index. Based on the new approach, two-dimensional (2D) reflectionless beam compressors/expanders, bends, shifters and splitters are designed using the modified anisotropic medium. It is found that the reflections can be removed in magnetic response materials for TE polarization or dielectric response materials for TM polarization. The numerical simulations confirm that various reflectionless optical elements can be realized in the pure transformation optics. The impedance-tunable coordinate transformation can be generalized to three-dimensional (3D) cases and be applied to other transformation-optical designs.
We present a pedagogic derivation of the electromagnetic field established in a dielectric material by an impinging external field. We consider the problem from the point of view of the physical mechanism involved at the microscopic level. The internal field emerges when the material is thought of as an assembly of atoms in vacuum, each of them being polarized by the external incident field and by the re-radiated fields of all the other polarized atoms of the material. In this way, each atom becomes itself a source of secondary radiation that adds and interferes with all the other internal fields (including the internal extension of the externally impinging field), contributing to build up the total internal field within the dielectric material as well as the externally scattered field. This picture naturally leads to a connection between the microscopic properties of the material and its index of refraction, that describes the dielectric response to the applied electromagnetic field. Calculations also show that the incident radiation is extinguished inside the dielectric by an equal but opposite field generated by the total induced polarization currents, and is substituted by a macroscopic electric field which propagates with the new speed c/n.
Surfaces patterned with arrays of quasi-periodic air holes having conical depth profile have been studied for their effectiveness in suppressing air-substrate reflection in the wavelength range of 450-1350 nm (limited by our measurement). The role of quasi-periodic air-hole pattern, depth of holes and launch angle on the observed antireflection behavior are investigated. The average optical transmittance of the patterned quartz substrate at near normal incidence is more than 97% and reflectance is less than 2%. Patterned quartz surfaces with 450 nm thin graded rarefaction region maintain the antireflective property up to 30{\\deg} (limited by our measurements) angle of incidence.
We present the setup and test of a transportable clock laser at 698 nm for a strontium lattice clock. A master-slave diode laser system is stabilized to a rigidly mounted optical reference cavity. The setup was transported by truck over 400 km from Braunschweig to D\\\"usseldorf, where the cavity-stabilized laser was compared to a stationary clock laser for the interrogation of ytterbium (578 nm). Only minor realignments were necessary after the transport. The lasers were compared by a Ti:Sapphire frequency comb used as a transfer oscillator. The thus generated virtual beat showed a combined linewidth below 1 Hz (at 1156 nm). The transport back to Braunschweig did not degrade the laser performance, as was shown by interrogating the strontium clock transition.
A high reflectivity and polarization selective high contrast grating mirror has been designed with the use of an automated optimization algorithm. Through a precise study of the tolerance of the different lengths of the structure, the robustness with respect to the fabrication errors has been enhanced to high tolerance values between 5 % and 210 %. This adjustment of the dimensions of the structure leads to a 250 nm large bandwidth mirror well adapted for a VCSEL application at \\lambda = 2.65 $\\mu$m and can easily be scaled for other wavelengths.
A novel time-reversal subwavelength transmission technique, based on pulse shaping circuits (PSCs), is proposed. Compared to previously reported approaches, this technique removes the need for complex or electrically large electromagnetic structures by generating channel diversity via pulse shaping instead of angular spectrum transformation. Moreover, the pulse shaping circuits (PSCs) are based on Radio Analog Signal Processing (R-ASP), and therefore do not suffer from the well-known issues of digital signal processing in ultrafast regimes. The proposed PSC time-reversal systems is mathematically shown to offer high channel discrimination under appropriate PSC design conditions, and is experimentally demonstrated for the case of two receivers.
We report the existence, symmetry breaking and other instabilities of dark polariton-solitons in semiconductor microcavities operating in the strong coupling regime. These half-light half-matter solitons are potential candidates for applications in all-optical signal processing. Their excitation time and required pump powers are a few orders of magnitude less than those of their weakly coupled light-only counterparts.
We present experimental observations of strong electric and magnetic interactions between split ring resonators (SRRs) in metamaterials. We fabricated near-infrared (1.4 $\\mu$m) planar metamaterials with different inter-SRR spacings along different directions. Our transmission measurements show blueshifts and redshifts of the magnetic resonance, depending on SRR orientation relative to the lattice. The shifts agree well with a simple model with simultaneous magnetic and electric near-field dipole coupling. We also find large broadening of the resonance, accompanied by a decrease in effective cross section per SRR with increasing density. These effects result from superradiant scattering. Our data shed new light on Lorentz-Lorenz approaches to metamaterials.
We study optical response of a resonant medium possessing nonlinear coupling to external field driven by a few-cycle pump pulse sequence. We demonstrate the possibility to directly produce unipolar half-cycle pulses from the medium possessing an arbitrary nonlinearity, by choosing the proper pulse-to-pulse distance of the pump pulses in the sequence. We examine the various ways of the shaping of the medium response using different geometrical configurations of nonlinear oscillators and different wavefront shapes for the excitation pulse sequence. Our approach defines a general framework to produce unipolar pulses of controllable form.
Inverted nonlinear photonic crystals are the crystals featuring competition between linear and nonlinear lattices, with minima of the linear potential coinciding with maxima of the nonlinear pseudopotential, and vice versa. Traditional inverted nonlinear photonic crystals only have two channels, and can be attained experimentally by means of Rhodamine B (RhB, a dye featuring saturable absorption) doped into the SU-8 polymer. In this paper, a new type of inverted nonlinear photonic crystal is constructed by juxtaposing three kinds of channels into a period. These three channels are a purely linear channel, a saturable self-focusing nonlinear channel, and a saturable self-defocusing nonlinear channel. This optical device is assumed to be fabricated by means of SU-8 polymer material periodically doped with two types of active dyes. The nonlinear propagation of a light field inside this device (passing along the channel) can be described by a nonlinear Schrodinger equation. Stable multi-peak fundamental and dipole solitons are found in the first gap of the system. These solitons sufficiently exhibit some interesting digital properties, which may have potential in optical communications.
The concept of SNR enhancement in impulse radio transceivers based on phasers of opposite chirping slopes is introduced. It is shown that signal to-noise radio (SNR) enhancements by factors M2 and M are achieved for burst noise and Gaussian noise, respectively, where M is the stretching factor of the phasers. An experimental demonstration is presented, using stripline cascaded C-section phasers, where SNR enhancements in agreement with theory are obtained. The proposed radio analog signal processing transceiver system is simple, low-cost and frequency scalable, and may therefore be suitable for broadband impulse radio ranging and communication applications.
We reelaborate on the basic properties of lossless multilayers by using bilinear transformations. We study some interesting properties of the multilayer transfer function in the unit disk, showing that hyperbolic geometry turns out to be an essential tool for understanding multilayer action. We use a simple trace criterion to classify multilayers into three classes that represent rotations, translations, or parallel displacements. Moreover, we show that these three actions can be decomposed as a product of two reflections in hyperbolic lines. Therefore, we conclude that hyperbolic reflections can be considered as the basic pieces for a deeper understanding of multilayer optics.
We propose a vortex-like metamaterial device that is capable of transferring image along a spiral route without losing subwavelength information of the image. The super-resolution image can be guided and magnified at the same time with one single design. Our design may provide insights in manipulating super-resolution image in a more flexible manner. Examples are given and illustrated with numerical simulations.
We propose a family of {\\it local} $\\cal{PT}$-symmetric photonic lattices with transverse index gradient $\\omega$, where the emergence of {\\it stable} Bloch-Zener oscillations are controlled by the degree of non-Hermiticity $\\gamma$ of the lattice. In the exact $\\cal{PT}$-symmetric phase we identify a condition between $\\omega$ and $\\gamma$ for which a wavepacket self -imaging together with a cascade of splittings and giant recombinations occurs at various propagation distances. The giant wavepacket recombination is further enhanced by introducing local impurities.
We report a novel approach for on-chip electrical detection of the radiation guided by dielectric-loaded surface plasmon polariton waveguides (DLSPPW) and DLSPPW-based components. The detection is realized by fabricating DLSPPW components on the surface of a gold (Au) pad supported by a silicon (Si) substrate supplied with aluminum pads facilitating electrical connections, with the gold pad being perforated in a specific locations below the DLSPPWs in order to allow a portion of the DLSPPW-guided radiation to leak into the Si-substrate, where it is absorbed and electrically detected. We present two-dimensional photocurrent maps obtained when the laser beam is scanning across the gold pad containing the fabricated DLSPPW components that are excited via grating couplers located at the DLSPPW tapered terminations. By comparing photocurrent signals obtained when scanning over a DLSPPW straight waveguide with those related to a DLSPPW racetrack resonator, we first determine the background signal level and then the corrected DLSPPW resonator spectral response, which is found consistent with that obtained from full wave numerical simulations. The approach developed can be extended to other plasmonic waveguide configurations and advantageously used for rapid characterization of complicated plasmonic circuits.
This paper extends the existing theory of two carrier photorefractivity resonance, which is generally applied to Iron doped Indium Phosphide (InP:Fe), to the case of low non-harmonic illumination. The space charge field profile is computed, and the variations of its amplitude, width and position are determined as functions of the background intensity. The effect of photorefractive resonance on these quantities is evidenced, contributing to the understanding of published experimental results in InP:Fe.
We performed extreme ultraviolet spectroscopy using an 80 lines/mm TEM mesh as dispersive element. We present the usefulness of this instrument for dispersing a high harmonic spectrum from the 13th to the 29th harmonic of a Ti:Sapph laser, corresponding to a wavelength range from 60 to 27 nm. The resolution of the instrument is limited by the image size of the high harmonic generation region on the detector. The best resolution in first order diffraction is under 2 nm over the entire spectral range.
We study the interplay between rotation and openness for mode coupling in wavelength-scale microcavities. In cavities deformed from a circular disk, the decay rates of a quasi-degenerate pair of resonances may cross or anti-cross with increasing rotation speed. The standing-wave resonances evolve to traveling-wave resonances at high rotation speed, however, both the clockwise (CW) and counter-clockwise (CCW) traveling-wave resonances can have a lower cavity decay rate, in contrary to the intuitive expectation from rotation-dependent effective index. With increasing rotation speed, a phase locking between the CW and CCW wave components in a resonance takes place. These phenomena result from the rotation-induced mode coupling, which is strongly influenced by the openness of the microcavity. The possibility of a non-monotonic Sagnac effect is also discussed.
An optical technique based on stability transfer among modes of a monolithic optical microresonator is proposed for long therm frequency stabilization of a radiofrequency (RF) oscillator. We show that locking two resonator modes, characterized with dissimilar sensitivity in responding to an applied forcing function, to a master RF oscillator allows enhancing the long term stability of a slave RF oscillator locked to two resonator modes having nearly identical sensitivity. For instance, the stability of a 10 MHz master oscillator characterized with Allan deviation of 10^-7 at 10^4s can be increased and transferred to a slave oscillator with identical stability performance, so that the resultant Allan deviation of the slave oscillator becomes equal to 10-13 at 10^4s. The method does not require absolute frequency references to achieve such a performance.
This book chapter is the first part of a review of nanoporous materials for optical applications. Whereas the second part [J.Sauer, F. Marlow and F.Schueth, pp. 153-172 of the same volume] discusses material properties, this part gives a self-contained discussion of fluorescence and lasing in dielectric microresonators, with special emphasis on the hexagonal morphology found in molecular-sieve-dye compounds.
We propose a novel technique to efficiently excite a surface plasmon polariton (SPP) mode at a gold-glass interface by exploiting the near field excitation of an engineered high index (silicon) gabled tip at the telecom wavelengths. The proposed structure can theoretically convert 49% of the input optical power to a SPP mode. The device is compact, it will facilitate the on-chip excitation of the SPP, its fabrication is compatible with the standard Si fabrication processes, and as such, it is expected to be useful in the design of future integrated sensors.
We investigate the effects of two dimensional confinement on the lasing properties of a classical random laser system operating in the incoherent feedback (diffusive) regime. A suspension of 250nm rutile (TiO2) particles in a Rhodamine 6G solution was inserted into the hollow core of a photonic crystal fiber (PCF) generating the first random fiber laser and a novel quasi-one-dimensional RL geometry. Comparison with similar systems in bulk format shows that the random fiber laser presents an efficiency that is at least two orders of magnitude higher.
Experimental observation of Doppler-free signals for weak transitions can be greatly facilitated by an estimate for their expected amplitudes. We derive an analytical model which allows the Doppler-free amplitude to be estimated for small Doppler-free signals. Application of this model to formaldehyde allows the amplitude of experimentally observed Doppler-free signals to be reproduced to within the experimental error.
The solution of a boundary--value problem formulated for the Kretschmann configuration shows that the phase speed of a surface--plasmon--polariton (SPP) wave guided by the planar interface of a sufficiently thin metal film and a sculptured thin film (STF) depends on the vapor incidence angle used while fabricating the STF by physical vapor deposition. Furthermore, it may be possible to engineer the phase speed by periodically varying the vapor incidence angle. The phase speed of the SPP wave can be set by selecting higher mean value and/or the modulation amplitude of the vapor incidence angle.
In this paper we present the design, manufacturing, characterization and analysis of the coupling ratio spectral response for Multimode Interference (MMI) couplers in Silicon-on-Insulator (SOI) technology. The couplers were designed using a Si rib waveguide with SiO 2 cladding, on a regular 220 nm film and 2 {\\mu}m buried oxide SOI wafer. A set of eight different designs, three canonical and five using a widened/narrowed coupler body, have been subject of study, with coupling ratios 50:50, 85:15 and 72:28 for the former, and 95:05, 85:15, 75:25, 65:35 and 55:45 for the latter. Two wafers of devices were fabricated, using two different etch depths for the rib waveguides. A set of six dies, three per wafer, whose line metrology matched the design, were retained for characterization. The coupling ratios obtained in the experimental results match, with little deviations, the design targets for a wavelength range between 1525 and 1575 nm, as inferred from spectral measurements and statistical analyses. Excess loss for all the devices is conservatively estimated to be less than approximately 2 dB. All the design parameters, body width and length, input/output positions and widths, and tapers dimensions are disclosed for reference.
Stimulated emission in small-molecule organic films at a high dye concentration is generally hindered by fluorescence quenching, especially in the red region of the spectrum. Here we demonstrate the achievement of high net gains (up to 50 cm-1) around 640 nm in thermally evaporated non-doped films of 4-di(4 -tert-butylbiphenyl-4-yl)amino-4 -dicyanovinylbenzene, which makes this material suitable for green-light pumped single-mode organic lasers with low threshold and superior stability. Lasing effect is demonstrated in a DBR resonator configuration, as well as under the form of random lasing at high pump intensities.
A numerical study is presented of one-dimensional and two-dimensional random lasers as a function of the pumping rate above the threshold for lasing. Depending on the leakiness of the cavity modes, we observe that the stationary lasing regime becomes unstable above a second threshold. Coherent instabilities are observed as self pulsation of the total output intensity, population inversion, and polarization.
In this article, we report an imaging method, termed Fourier ptychographic microscopy (FPM), which iteratively stitches together a number of variably illuminated, low-resolution intensity images in Fourier space to produce a wide-field, high-resolution complex sample image. By adopting a wavefront correction strategy, the FPM method can also correct for aberrations and digitally extend a microscope s depth-of-focus beyond the physical limitations of its optics. As a demonstration, we built a microscope prototype with a resolution of 0.78 um, a field-of-view of ~120 mm2, and a resolution-invariant depth-of-focus of 0.3 mm (characterized at 632 nm). Gigapixel colour images of histology slides verify FPM s successful operation. The reported imaging procedure transforms the general challenge of high-throughput, high-resolution microscopy from one that is coupled to the physical limitations of the system s optics to one that is solvable through computation.
Multilayered structures consisting of alternating negative-permittivity and dielectric layers are explored to obtain high-resolution imaging of subwavelength objects. The peaks with the smallest |ky| (ky is the transverse wave vector) on the transmission curves, which come from the guided modes of the multilayered structures, can not be completely damped by material loss. This makes the amplitudes of the evanescent waves around these peaks inappropriate after transmitted through the imaging structures, and the imaging quality is not good. To solve such a problem, the permittivity of the dielectric layers is appropriately chosen to make these sharp peaks merge with their neighboring peaks. Wide flat upheavals are then generated on the transmission curves so that evanescent waves in a large range are transmitted through the structures with appropriate amplitudes. In addition, it is found that the sharp peaks with the smallest |ky| can be eliminated by adding appropriate coating layers and wide flat upheavals can also be obtained.
Sub-wavelength dielectric gratings (SWG) have emerged recently as a promising alternative to distributed-Bragg-reflection (DBR) dielectric stacks for broadband, high-reflectivity filtering applications. A SWG structure composed of a single dielectric layer with the appropriate patterning can sometimes perform as well as thirty or forty dielectric DBR layers, while providing new functionalities such as polarization control and near-field amplification. In this paper, we introduce a remarkable property of grating mirrors that cannot be realized by their DBR counterpart: we show that a non-periodic patterning of the grating surface can give full control over the phase front of reflected light while maintaining a high reflectivity. This new feature of dielectric gratings could have a substantial impact on a number of applications that depend on low-cost, compact optical components, from laser cavities to CD/DVD read/write heads.
We report the observation of the self-guided propagation of 120 fs, 0.56 mJ infrared radiation in air for distances greater than one meter. In contrast to the known case of filamentation, in the present experiment the laser power is lower than the collapse threshold. Therefore the counter balance between Kerr self focussing and ionization induced defocussing as the stabilizing mechanism is ruled out. Instead, we find evidences of a process in which the transversal beam distribution reshapes into a form similar to a Townes soliton. We include numerical support for this conclusion.
We measured and calculated transmission spectra of two-dimensional quasiperiodic photonic crystals (PCs) based on a 5-fold (Penrose) or 8-fold (octagonal) symmetric quasiperiodic pattern. The photonic crystal consisted of dielectric cylindrical rods in air placed normal to the basal plane on vertices of tiles composing the quasiperiodic pattern. An isotropic photonic band gap (PBG) appeared in the TM mode, where electric fields were parallel to the rods, even when the real part of a dielectric constant of the rod was as small as 2.4. An isotropic PBG-like dip was seen in tiny Penrose and octagonal PCs with only 6 and 9 rods, respectively. These results indicate that local multiple light scattering within the tiny PC plays an important role in the PBG formation. Besides the isotropic PBG, we found dips depending on the incident angle of the light. This is the first report of anisotropic structures clearly observed in transmission spectra of quasiperiodic PCs. Based on rod-number and rod-arrangement dependence, it is thought that the shapes and positions of the anisotropic dips are determined by global multiple light scattering covering the whole system. In contrast to the isotropic PBG due to local light scattering, we could not find any PBGs due to global light scattering even though we studied transmission spectra of a huge Penrose PC with 466 rods.
Toroidal dipole, first described by Ia. B. Zeldovich [Sov. Phys. JETP 33, 1184 (1957)], is a distinct electromagnetic excitation that differs both from the electric and the magnetic dipoles. It has a number of intriguing properties: static toroidal nuclear dipole is responsible for parity violation in atomic spectra; interactions between static toroidal dipole and oscillating magnetic dipole are claimed to violate Newton s Third Law while non-stationary charge-current configurations involving toroidal multipoles have been predicted to produce vector potential in the absence of electromagnetic fields. Existence of the toroidal response in metamaterials was recently demonstrated and is now a growing field of research. However, no direct analytical link has yet been established between the transmission and reflection of macroscopic electromagnetic media and toroidal dipole excitations. To address this essential gap in electromagnetic theory we have developed an analytical approach linking microscopic and macroscopic electromagnetic response of a metamaterial and showed, using a case study, the key role of the toroidal dipole in shaping the electromagnetic properties of the metamaterial.
We study the Compton scattering of light by free electrons inside a hyperbolic medium. We demonstrate that the unconventional dispersion and local density of states of the electromagnetic modes in such media can lead to a giant Compton shift and dramatic enhancement of the scattering cross section. We develop an universal approach for the study of coupled multi-photon processes in nanostructured media and derive the spectral intensity function of the scattered radiation for realistic metamaterial structures. We predict the Compton shift of the order of a few meVs for the infrared spectrum that is at least one order of magnitude larger than the Compton shift in any other system.
Plasmonic vortices (PV) excited by a highly focused radially polarized optical vortex (RPOV) beam on a metal surface are investigated experimentally and theoretically. The proposed method reveals a direct phase singularity and orbital angular momentum (OAM) transfer from an incident structured beam to its counterpart in surface plasmon with dynamic, reconfigurable and high-efficiency advantages. The plasmonic field pattern, phase distributions, Poynting vector and focusing efficiency of PV are studied in detail. Experimental verification further shows that nanoparticles can be confined and manipulated within the region of PV and orbital rotation speed of the trapped particles is altered dynamically by changing the topological charge of the incident light.
The origin and properties of the transverse non-reciprocal magneto-optical (nMO) effect were studied. The transverse nMO effect occurs in the case when light propagates perpendicularly to the magnetic field. It was demonstrated that light can experience the transverse nMO effect only when it propagates in the vicinity of a boundary between two materials and the optical field at least in one material is evanescent. The transverse nMO effect is pronounced in the cases of surface plasmons and waveguiding modes. The magnitude of the transverse nMO effect is comparable to or greater than the magnitude of the longitudinal nMO effect. In the case of surface plasmons propagating at a boundary between the transition metal and the dielectric it is possible to magnify the transverse nMO effect and the magneto-optical figure-of-merit may increase from a few percents to above 100%. The scalar dispersion relation, which describes the transverse MO effect in cases of waveguide modes and surface plasmons propagating in a multilayer MO slab, was derived.
Inspired by the work of Pratt and coworkers on a sum rule for the polarization correlations in electron bremsstrahlung when the outgoing electron is not observed, we derive the corresponding sum rule for the elementary process of bremsstrahlung. This sum rule is valid for arbitrary electron wavefunctions provided the electron is emitted in the reaction plane. The numerical evaluation of this sum rule within the Dirac partial-wave theory for bare inert spin-zero nuclei and collision energies in the range of 1-10 MeV reveals violations for high nuclear charge. Such violations serve as a measure of the inaccuracies in the bremsstrahlung calculations.
We present an accurate ab initio method of calculating transition energies and isotope shifts in the 3d-transition metals. It extends previous work that combines the configuration-interaction calculation with many-body perturbation theory by including the effective three-body interaction and modification of the energy denominator. We show that these effects are of importance in Ti II. The need to develop methods that can accurately calculate isotope shifts in 3d-transition metals comes from studies of quasar absorption spectra that seek to measure possible variation of the fine-structure constant alpha over the lifetime of the Universe. Isotope shift can also be used to measure isotope abundances in gas clouds in the early Universe, which are needed in order to test models of chemical evolution.
Electron elastic-scattering phase shifts and cross sections along with the differential and total cross sections and polarization of low-frequency bremsstrahlung upon low-energy electron collision with endohedral fullerenes $A$@C$_{60}$ are theoretically scrutinized versus the nature, size and spin of the encapsulated atom $A$. The case-study-atoms $A$ are N, Ar, Cr, Mn, Mo, Tc, Xe, Ba, and Eu. They are thoughtfully picked out of different rows of the periodic table. The study is performed in the framework of a model static approximation. There, both the encapsulated atom $A$ and C$_{60}$ cage are regarded as non-polarizable targets. The C$_{60}$ cage is modeled by an attractive spherical annular potential well. The study provides the most complete initial understanding of how the processes of interest might evolve upon electron collision with various $A$@C$_{60}$. Calculated results identify the most interesting and/or useful future measurements or more rigorous calculations to perform.
We present a measurement of the dynamic scalar and tensor polarizabilities of the excited state 3D1 in atomic ytterbium. The polarizabilities were measured by analyzing the spectral lineshape of the 408-nm 1S0->3D1 transition driven by a standing wave of resonant light in the presence of static electric and magnetic fields. Due to the interaction of atoms with the standing wave, the lineshape has a characteristic polarizability-dependent distortion. A theoretical model was used to simulate the lineshape and determine a combination of the polarizabilities of the ground and excited states by fitting the model to experimental data. This combination was measured with a 13% uncertainty, only 3% of which is due to uncertainty in the simulation and fitting procedure. The scalar and tensor polarizabilities of the state 3D1 were measured for the first time by comparing two different combinations of polarizabilities. We show that this technique can be applied to similar atomic systems.
We study the influence of the lattice topography and the coupling between motion in different directions, for a three-dimensional Brownian motor based on cold atoms in a double optical lattice. Due to controllable relative spatial phases between the lattices, our Brownian motor can induce drifts in arbitrary directions. Since the lattices couple the different directions, the relation between the phase shifts and the directionality of the induced drift is non trivial. Here is therefore this relation investigated experimentally by systematically varying the relative spatial phase in two dimensions, while monitoring the vertically induced drift and the temperature. A relative spatial phase range of 2pi x 2pi is covered. We show that a drift, controllable both in speed and direction, can be achieved, by varying the phase both parallel and perpendicular to the direction of the measured induced drift. The experimental results are qualitatively reproduced by numerical simulations of a simplified, classical model of the system.
The closed form of the first order non-linear differential equation that is satisfied by the effective range within the variable phase formulation of scattering theory is discussed. It is shown that the conventional method of determining the effective range, by fitting a numerical solution of the Schr\\\"odinger equation to known asymptotic boundary conditions, can be modified to include the first order contribution of a long range interaction.
We demonstrate a one-dimensional optical lattice clock with a spin-polarized fermionic isotope designed to realize a collision-shift-free atomic clock with neutral atom ensembles. To reduce systematic uncertainties, we developed both Zeeman shift and vector light-shift cancellation techniques. By introducing both an H-maser and a Global Positioning System (GPS) carrier phase link, the absolute frequency of the $^1S_0(F=9/2) - {}^3P_0(F=9/2)$ clock transition of the $^{87}$Sr optical lattice clock is determined as 429,228,004,229,875(4) Hz, where the uncertainty is mainly limited by that of the frequency link. The result indicates that the Sr lattice clock will play an important role in the scope of the redefinition of the ``second   by optical frequency standards.
Ionization of atoms and molecules in strong laser fields is a fundamental process in many fields of research, especially in the emerging field of attosecond science. So far, demonstrably accurate data have only been acquired for atomic hydrogen (H), a species that is accessible to few investigators. Here we present measurements of the ionization yield for argon, krypton, and xenon with percentlevel accuracy, calibrated using H, in a laser regime widely used in attosecond science. We derive a transferrable calibration standard for laser peak intensity, accurate to 1.3%, that is based on a simple reference curve. In addition, our measurements provide a much-needed benchmark for testing models of ionisation in noble-gas atoms, such as the widely employed single-active electron approximation.
A method to determine the state of a single quantized cavity mode is proposed. By adiabatic passage, the quantum state of the field is transfered completely onto an internal Zeeman sub-manifold of an atom. Utilizing a method of Newton and Young, we can determine this angular momentum state uniquely, by a finite number of magnetic dipole measurements with Stern-Gerlach analyzers. An example illustrates the influence of dissipation.
We derive the properties of polaritons in single-$\\Lambda$ and double-$\\Lambda$ media using a microscopic equation-of-motion technique. In each case, the polaritonic dispersion relation and composition arise from a matrix eigenvalue problem for arbitrary control field strengths. We show that the double-$\\Lambda$ medium can be used to up- or down-convert single photons while preserving quantum coherence. The existence of a dark-state polariton protects this single-photon four-wave mixing effect against incoherent decay of the excited atomic states. The efficiency of this conversion is limited mainly by the sample size and the lifetime of the metastable state.
The recently reported precise experimental determination of the dipole polarizability of the H_2^+ molecular ion ground state [P.L. Jacobson, R.A. Komara, W.G. Sturrus, and S.R. Lundeen, Phys. Rev. A 62, 012509 (2000)] reveals a discrepancy between theory and experiment of about 0.0007a_0^3, which has been attributed to relativistic and QED effects. In present work we analyze an influence of the relativistic effects on the scalar dipole polarizability of an isolated H_2^+ molecular ion. Our conclusion is that it accounts for only 1/5 of the measured discrepancy.
Ion traps, which were first introduced in the late 1950s and early 1960s, have established themselves as indispensable tools in many areas of physics, chemistry and technology. This chapter gives a brief survey of the operating principles and development of ion traps, together with a short description of how ions are loaded and detected. This is followed by a brief account of some of the current applications of ion traps.
We present calculations of the one-loop vacuum polarization contribution (Uehling potential) for the two-center problem in the NRQED formalism. The cases of hydrogen molecular ions ($Z_1=Z_2=1$) as well as antiprotonic helium ($Z_1=2$, $Z_2=-1$) are considered. Numerical results of the vacuum polarization contribution at $m\\alpha^7$ order for the fundamental transitions $(v=0,L=0)\\to(v =1,L =0)$ in H$_2^+$ and HD$^+$ are presented.
Recent proposals suggest that lasers based on narrow dipole-forbidden transitions in cold alkaline earth atoms could achieve linewidths that are orders of magnitude smaller than linewidths of any existing lasers. Here, we demonstrate a laser based on the 7.5 kHz linewidth dipole forbidden $^3 $P$_1$ to $^1 $S$_0$ transition in laser-cooled and tightly confined $^{88}$Sr. We can operate this laser in the bad-cavity regime, where coherence is primarily stored in the atoms, or continuously tune to the more conventional good-cavity regime, where coherence is primarily stored in the light field. We show that the cold-atom gain medium can be repumped to achieve quasi steady-state lasing, and demonstrate up to an order of magnitude suppression in the sensitivity of laser frequency to changes in cavity length, the primary limitation for the most frequency stable lasers today.
Electric polarizabilities of four low-J even-parity states and three low-J odd-parity states of atomic barium in the range $35,600 $ to $36,000\\ $cm$^{-1}$ are investigated. The states of interest are excited (in an atomic beam) via an intermediate odd-parity state with a sequence of two laser pulses. The odd-parity states can be excited due to the Stark-induced mixing with even-parity states. The polarizabilities are measured via direct spectroscopy on the second-stage transition. Several states have tensor and scalar polarizabilities that exceed the values that might be expected from the known energy levels of barium by more than two orders of magnitude. Two of the Stark-induced transitions cannot be identified from the known energy spectrum of barium. The observations suggest the existence of as yet unidentified odd-parity energy states, whose energies and angular momenta are determined in the present experiment. A tentative identification of these states as [Xe]$6s8p ^3P_{0,2}$ is suggested.
We present traps with toroidal $(T^{2})$ and ring-shaped topologies, based on adiabatic potentials for radio-frequency dressed Zeeman states in a ring-shaped magnetic quadrupole field. Simple adjustment of the radio-frequency fields provides versatile possibilities for dynamical parameter tuning, topology change, and controlled potential perturbation. We show how to induce toroidal and poloidal rotations, and demonstrate the feasibility of preparing degenerate quantum gases with reduced dimensionality and periodic boundary conditions. The great level of dynamical and even state dependent control is useful for atom interferometry.
A method and code for calculations of diatomic molecules in the external variable electromagnetic field have been developed. Code applied for calculation of systematics in the electron s electric dipole moment search experiment on ThO $H^3\\Delta_1$ state related to geometric phases, including dependence on $\\Omega$-doublet, rotational level, and external static electric field. It is found that systematics decrease cubically with respect to the frequency of the rotating transverse component of the electric field. Calculation confirms that experiment on ThO $H^3\\Delta_1$ state is very robust against systematic errors related to geometric phases.
In this paper, we propose an in-depth review of the vector and tensor polarizabilities of the two energy levels of the 87Sr clock transition whose measurement was reported in [P. G. Westergaard et al., Phys. Rev. Lett. 106, 210801 (2011)]. We conduct a theoretical calculation that reproduces the measured coefficients. In addition, we detail the experimental conditions used for their measurement in two Sr optical lattice clocks, and exhibit the quadratic behaviour of the vector and tensor shifts with the depth of the trapping potential and evaluate their impact on the accuracy of the clock.
The absolute frequencies of the hyperfine components of the R(26) 62-0 transition in molecular iodine at 501.7 nm are measured for the first time with an optical clockwork based on a femtosecond laser frequency comb generator. The set-up is composed of an Ar+ laser locked to a hyperfine component of the R(26) 62-0 transition detected in a continuously pumped low-pressure cell (0.33 Pa). The detected resonances show a linewidth of 45 kHz (half-width at half-maximum). The uncertainty of the frequency measurement is estimated to be 250 Hz.
In the presence of a neighboring atom, electron-ion recombination can proceed resonantly via excitation of an electron in the atom, with subsequent relaxation through radiative decay. It is shown that this two-center dielectronic process can largely dominate over single-center radiative recombination at internuclear distances as large as several nanometers. The relevance of the predicted process is demonstrated by using examples of water-dissolved alkali cations and warm dense matter.
We analyse a narrow Feshbach resonance with ultra-cold chromium atoms colliding in d-wave. The resonance is made possible by dipole-dipole interactions, which couple an incoming $l=2$ collision channel with a bound molecular state with $l=0$. We find that three-body losses associated to this resonance increase with temperature, and that the loss feature width as a function of magnetic field also increases linearly with temperature. The analysis of our experimental data shows that the Feshbach coupling is small compared both to the temperature and to the density limited lifetime of the resonant bound molecular state. One consequence is that the three body losse rate is proportionnal to the square of the number of atoms, and that we can directly relate the amplitude of the losses to the Feshbach coupling parameter. We compare our measurement to a calculation of the coupling between the collisionnal channel and the molecular bound state by dipole-dipole interactions, and find a good agreement, with no adjustable parameter. An analysis of the loss lineshape is also performed, which enables to precisely measure the position of the resonance.
Imaginary- and real-time versions of an equation for the condensate density are presented which describe dynamics and decay of any spherical Bose-Einstein condensate (BEC) within the mean field appraoch. We obtain quantized energies of collective finite amplitude radial oscillations and exact numerical instanton solutions which describe quantum tunneling from both the metastable and radially excited states of the BEC of 7Li atoms. The mass parameter for the radial motion is found different from the gaussian value assumed hitherto, but the effect of this difference on decay exponents is small. The collective breathing states form slightly compressed harmonic spectrum, n=4 state lying lower than the second Bogolyubov (small amplitude) mode. The decay of these states, if excited, may simulate a shorter than true lifetime of the metastable state. By scaling arguments, results extend to other attractive BEC-s.
The finite nuclear size corrections to the relativistic recoil effect in H-like ions are calculated within the Breit approximation. The calculations are performed for the $1s$, $2s$, and $2p_{1/2}$ states in the range $Z =$ 1-110. The obtained results are compared with previous evaluations of this effect. It is found that for heavy ions the previously neglected corrections amount to about 20% of the total nuclear size contribution to the recoil effect calculated within the Breit approximation.
The complete gauge-invariant set of the one-loop QED corrections to the parity-nonconserving (PNC) amplitude in cesium and francium is evaluated to all orders in $\\alpha Z$ using a local form of the Dirac-Fock potential. The calculations are performed in both length and velocity gauges for the absorbed photon and the total binding QED correction is found to be $-$0.27(3)% for Cs and $-$0.28(5)% for Fr. Moreover, a high-precision calculation of the electron-correlation and Breit-interaction effects on the 7$s-8s$ PNC amplitude in francium using a large-scale configuration-interaction Dirac-Fock method is performed. The obtained results are employed to improve the theoretical predictions for the PNC transition amplitude in Cs and Fr. Using an average value from two most accurate measurements of the vector transition polarizability, the weak charge of $^{133}$Cs is derived to amount to $ Q_W=-72.65(29)_{\\rm exp}(36)_{\\rm theor}$. This value deviates by $1.1\\sigma$ from the prediction of the standard model. The values of the $7s$-$8s$ PNC amplitude in $^{223}$Fr and $^{210}$Fr are obtained to be $-$15.49(15) and $-$14.16(14), respectively, in units of i$\\times 10^{-11}(-Q_W)/N$ a.u.
We have studied hydrogen-hydrogen-alkali three-body systems in the adiabatic hyperspherical representation. For the spin-stretched case, there exists a single $X$H molecular state when $X$ is one of the bosonic alkali atoms: $^7$Li, $^{23}$Na, $^{39}$K, $^{87}$Rb and $^{133}$Cs. As a result, the {\\em only} recombination process is the one that leads to formation of $X$H molecules, H+H+$X$$\\rightarrow$$X$H+H, and such molecules will be stable against vibrational relaxation. We have calculated the collision rates for recombination and collision induced dissociation as well as the elastic cross-sections for H+$X$H collisions up to a temperature of 0.5 K, including the partial wave contributions from $J^\\Pi$=$0^+$ to $5^-$. We have also found that there is just one three-body bound state for such systems for $J^\\Pi$=$0^+$ and no bound states for higher angular momenta.
In this paper we describe and compare different methods used for accurate determination of forces acting on matter-wave packets in optical lattices. The quantum interference nature responsible for the production of both Bloch oscillations and coherent delocalization is investigated in detail. We study conditions for optimal detection of Bloch oscillation for a thermal ensemble of cold atoms with a large velocity spread. We report on the experimental observation of resonant tunneling in an amplitude-modulated (AM) optical lattice up to the sixth harmonic with Fourier-limited linewidth. We then explore the fundamental and technical phenomena which limit both the sensitivity and the final accuracy of the atomic force sensor at 10^{-7} precision level [1], with an analysis of the coherence time of the system and addressing few simple setup changes to go beyond the current accuracy.
We propose a novel Sisyphus cooling scheme for atoms confined in a far off resonance optical dipole trap. Utilizing the differential trap-induced AC Stark shift, two electronic levels of the atom are resonantly coupled by a cooling laser preferentially near the trap bottom. After absorption of a cooling photon, the atom loses energy by climbing the steeper potential, and then spontaneously decays preferentially away from the trap bottom. The proposed method is particularly suited to cooling alkaline-earth-like atoms where two-level systems with narrow electronic transitions are present. Numerical simulations for the cases of $^{88}$Sr and $^{174}$Yb demonstrate the expected recoil and Doppler temperature limits. The method requires a relatively small number of scattered photons and can potentially lead to phase space densities approaching quantum degeneracy in sub-second timescales.
The analytic form of the electrostatic potential felt by a slowly moving test charge in quantum plasma is being derived. It has been shown that the potential composed of two parts: Debye-Huckel screening term and near-field wake potential which depends on the velocity of the test charge and the number density of the plasma electrons. Rayleigh-Ritz variational calculation has been done to estimate precise energy eigenvalues of hydrogen-like ion under such plasma environment. A detailed analysis shows that the energy levels are gradually moves to the continuum with increasing plasma electron density while level crossing phenomenon have been observed with the variation of ion velocity.
We present two new approaches for the design of a Zeeman-Slower, which rely on optimal compliance with the adiabatic following condition and are applicable to a wide variety of systems. The first approach is an analytical one, based on the assumption that the noise in the system is position independent. When compared with the traditional approach, which requires constant deceleration, for a typical system, we show an improvement of $\\sim$ 10% in the maximal capture velocity, allowing for a larger slower acceptance, or a reduction of $sim$ 25% in slower length, allowing for a simpler design and a better collimated beam. The second approach relies on an optimization of a system in which the magnetic field and the noise profile are well known. As an example, we use our 12-coil modular design and show an improvement of $sim$ 9% in maximal capture velocity or, alternatively, a reduction of $\\sim$ 33% in slower length as compared with the traditional approach.
The properties of low-density, low-energy matter wavepackets propagating through waveguide bends are investigated. Time-dependent quantum mechanical calculations using simple harmonic oscillator confining potentials are performed for a range of parameters close to those accessible by recent ``atom chip  -based experiments. We compare classical calculations based on Ehrenfest s theorem to these results to determine whether classical mechanics can predict the amount of transverse excitation as measured by the transverse heating. The present results thus elucidate some of the limits for which matter wave propagation through microstructures can be reliably considered using classical particle motion.
Rydberg states of atomic helium with principal quantum numbers ranging from n=20 to n=100 have been prepared by non-resonance-enhanced single-color two-photon excitation from the metastable 2 {^3}S{_1} state. Photoexcitation was carried out using linearly and circularly polarized pulsed laser radiation. In the case of excitation with circularly polarized radiation, Rydberg states with azimuthal quantum number |m_{\\ell}|=2 were prepared in zero electric field, and in homogeneous electric fields oriented parallel to the propagation axis of the laser radiation. In sufficiently strong electric fields, individual Rydberg-Stark states were resolved spectroscopically, highlighting the suitability of non-resonance-enhanced multiphoton excitation schemes for the preparation of long-lived high-|m_{\\ell}| hydrogenic Rydberg states for deceleration and trapping experiments. Applications of similar schemes for Doppler-free excitation of positronium atoms to Rydberg states are also discussed.
A thermal atomic beam of dysprosium (Dy) atoms is cooled using the $4f^{10}6s^2 (J=8) \\to 4f^{10}6s6p (J=9)$ transition at 421 nm. The cooling is done via a standing light wave orthogonal to the atomic beam. Efficient transverse cooling to the Doppler limit is demonstrated for all observable isotopes of dysprosium. Branching ratios to metastable states are demonstrated to be $<5\\times10^{-4}$. A scheme for enhancement of the nonzero-nuclear-spin-isotope cooling, as well as a method for direct identification of possible trap states, is proposed.
Shaped ultrafast laser pulses were used to study and control the ionization dynamics of electronically excited pyrazine in a pump and probe experiment. For pump pulses created without feedback from the product signal, the ion growth curve (the parent ion signal as a function of pump/probe delay) was described quantitatively by the classical rate equations for internal conversion of the $S_2$ and $S_1$ states. Very different, non-classical behavior was observed when a genetic algorithm (GA) was used to minimize the ion signal at some pre-determined target time, T. Two qualitatively different control mechanisms were identified for early (T$<1.5$ ps) and late (T$>1.5$ ps) target times. In the former case, the ion signal was largely suppressed for $t<T$, while for $t \\gg T$ the ion signal produced by the GA-optimized pulse and a transform limited (TL) pulse coalesced. In contrast, for $T>1.5$ ps the ion growth curve followed the classical rate equations for $t<T$, while for $t \\gg T$ the quantum yield for the GA-optimized pulse was much smaller than for a TL pulse. We interpret the first type of behavior as an indication that the wave packet produced by the pump laser is localized in a region of the $S_2$ potential energy surface where the vertical ionization energy exceeds the probe photon energy, whereas the second type of behavior may be described by a reduced absorption cross section for $S_0 \\rightarrow S_2$ followed by incoherent decay of the excited molecules.
In a recent paper by Porsev et al. [arXiv:1201.5615v1], the authors have claimed to have resolved the controversy arising from the different ab initio results available for the EDM enhancement factor of Tl. In our opinion, any such attempt to resolve the discrepancies between different calculations has to thoroughly compare the basis sets used, methods employed and approximations considered in the two different cases. However, Porsev et al. have not succeeded in doing so in their current paper. We clarify some of their misunderstandings about our work and address some specific issues in this note.
We present a novel experimental tool allowing for kinematically complete studies of break-up processes of laser-cooled atoms. This apparatus, the  MOTReMi , is a combination of a magneto-optical trap (MOT) and a Reaction Microscope (ReMi). Operated in an ion-storage ring, the new setup enables to study the dynamics in swift ion-atom collisions on an unprecedented level of precision and detail. In first experiments on collisions with 1.5 MeV/amu O$^{8+}$-Li the pure ionization of the valence electron as well as ionization-excitation of the lithium target has been investigated.
Enhanced positron annihilation on polyatomic molecules is a long-standing and complex problem. We report the results of calculations of resonant positron annihilation on methyl halides. A free parameter of our theory is the positron binding energy. A comparison with energy-resolved annihilation rates measured for CH$_3$F, CH$_3$Cl, CH$_3$Br [Barnes et al. Phys. Rev. A {\\bf 74}, 012706 (2006)] shows good agreement and yields estimates of the binding energies.
We introduce an ad-hoc electrodynamics with advanced and retarded Lienard-Wiechert interactions plus the dissipative Lorentz-Dirac self-interaction force. We study the covariant dynamical system of the electromagnetic two-body problem, i.e., the hydrogen atom. We perform the linear stability analysis of circular orbits for oscillations perpendicular to the orbital plane. In particular we study the normal modes of the linearized dynamics that have an arbitrarily large imaginary eigenvalue. These large eigenvalues are fast frequencies that introduce a fast (stiff) timescale into the dynamics. As an application, we study the phenomenon of resonant dissipation, i.e., a motion where both particles recoil together in a drifting circular orbit (a bound state), while the atom dissipates center-of-mass energy only. This balancing of the stiff dynamics is established by the existence of a quartic resonant constant that locks the dynamics to the neighborhood of the recoiling circular orbit. The resonance condition quantizes the angular momenta in reasonable agreement with the Bohr atom. The principal result is that the emission lines of quantum electrodynamics (QED) agree with the prediction of our resonance condition within one percent average deviation.
Understanding and controlling the electronic as well as ro-vibrational motion and, thus, the entire chemical dynamics in molecules is the ultimate goal of ultrafast laser and imaging science. In photochemistry, laser-induced dissociation has become a valuable tool for modification and control of reaction pathways and kinetics. Here, we present a pump-probe study of the dissociation dynamics of H$_2^+$ using ultrashort extreme-ultraviolet (XUV) and near-infrared (IR) laser pulses. The reaction kinematics can be controlled by varying the pump-probe delay. We demonstrate that the nuclear motion through the transition state can be reduced to isolated pairs of initial vibrational states. The dynamics is well reproduced by intuitive semi-classical trajectories on a time-dependent potential curve. From this most fundamental scenario we gain insight in the underlying mechanisms which can be applied as design principles for molecular quantum control, particularly for ultrafast reactions involving protons.
We consider the frequency shift in optical lattice clocks which arises from the coupling of the electronic motion to the atomic motion within the lattice. For the simplest of 3-D lattice geometries this coupling is shown to only affect clocks based on blue-detuned lattices. We have estimated the size of this shift for the prospective strontium lattice clock operating at the 390 nm blue-detuned magic wavelength. The resulting fractional frequency shift is found to be on the order of $10^{-18}$ and is largely overshadowed by the electric quadrupole shift. For lattice clocks based on more complex geometries or other atomic systems, this shift could potentially be a limiting factor in clock accuracy.
We revisit the time-resolved photoemission in neon atoms as probed by attosecond streaking. We calculate streaking time shifts for the emission of 2p and 2s electrons and compare the relative delay as measured in a recent experiment by Schultze et al. [Science 328, 1658 (2010)]. The B-spline R-matrix method is employed to calculate accurate Eisenbud-Wigner-Smith time delays from multi- electron dipole transition matrix elements for photoionization. The additional laser field-induced time shifts in the exit channel are obtained from separate, time-dependent simulations of a full streaking process by solving the time-dependent Schr\\\"odinger equation on the single-active-electron level. The resulting accurate total relative streaking time shifts between 2s and 2p emission lie well below the experimental data. We identify the presence of unresolved shake-up satellites in the experiment as a potential source of error in the determination of streaking time shifts.
Doppler cooling on a narrow transition is limited by the noise of single scattering events. It shows novel features, which are in sharp contrast with cooling on a broad transition, such as a non-Gaussian momentum distribution, and divergence of its mean square value close to the resonance. We have observed those features using 1D cooling on an intercombination transition in strontium, and compared the measurements with theoretical predictions and Monte Carlo simulations. We also find that for a very narrow transition, cooling can be improved using a dipole trap, where the clock shift is canceled.
We study the repulsive van der Waals interaction of cold rubidium $70S_{1/2}$ Rydberg atoms by analysis of time-delayed pair correlation functions. After excitation, Rydberg atoms are allowed to accelerate under the influence of the van der Waals force. Their positions are then measured using a single-atom imaging technique. From the average pair correlation function of the atom positions we obtain the initial atom-pair separation and the terminal velocity, which yield the van der Waals interaction coefficient $C_{6}$. The measured $C_{6}$ value agrees well with calculations. The experimental method has been validated by simulations. The data hint at anisotropy in the overall expansion, caused by the shape of the excitation volume. Our measurement implies that the interacting entities are individual Rydberg atoms, not groups of atoms that coherently share a Rydberg excitation.
We present a new scheme of compact Rubidium cold-atom clock which performs the diffuse light cooling, the microwave interrogation and the detection of the clock signal in a cylindrical microwave cavity. The diffuse light is produced by the reflection of the laser light at the inner surface of the microwave cavity. The pattern of injected laser beams is specially designed to make most of the cold atoms accumulate in the center of the microwave cavity. The microwave interrogation of cold atoms in the cavity leads to Ramsey fringes whose line-width is 24.5 Hz and the contrast of 95.6% when the free evolution time is 20 ms. The frequency stability of $7.3\\times10^{-13}\\tau^{-1/2}$ has been achieved recently. The scheme of this physical package can largely reduce the complexity of the cold atom clock, and increase the performance of the clock.
The density operator of the arbitrary physical system must be positive definite. Employing the general master equation technique which preserves this property we derive equations of motion for the density operator of an active atom which interacts collisionally with the reservoir of perturber atoms. The obtained general relations applied to the two-level atom yield Bloch-Boltzmann equations (BBE). The form of the BBE obtained by us differs from that known from literature which, as we show, are not guaranteed to preserve the required positivity. We argue that our results are the correct ones and as such should be used in practical applications. Moreover, the structure and the terms which appear in our set of BBE seem to allow simpler and more straightforward physical interpretation.
This article reports the first optical frequency measurement of the $1\\mathrm{S}-3\\mathrm{S}$ transition in hydrogen. The excitation of this transition occurs at a wavelength of 205 nm which is obtained with two frequency doubling stages of a titanium sapphire laser at 820 nm. Its frequency is measured with an optical frequency comb. The second-order Doppler effect is evaluated from the observation of the motional Stark effect due to a transverse magnetic field perpendicular to the atomic beam. The measured value of the $1\\mathrm{S}_{1/2}(F=1)-3\\mathrm{S}_{1/2}(F=1)$ frequency splitting is $2 922 742 936.729 (13) \\mathrm{MHz}$ with a relative uncertainty of $4.5\\times10^{-12}$. After the measurement of the $1\\mathrm{S}-2\\mathrm{S}$ frequency, this result is the most precise of the optical frequencies in hydrogen.
The measurements of the metrological characteristics (amplitude, width, and shift in the magnetic field) of the dark pseudoresonance, which was proposed by Kazakov et al. [quant-ph/0506167] as the reference resonance for an atomic frequency standard, are reported. It has been shown that the characteristics of the pseudoresonance are worse than those of the unsplit electromagnetically induced transparency resonance for the excitation scheme with the lin||lin polarization on the D1 line of the 87Rb atom.
The transfer of weakly bound KRb molecules from levels just below the dissociation threshold into the vibrational ground state with shaped laser pulses is studied. Optimal control theory is employed to calculate the pulses. The complexity of modelling the molecular structure is successively increased in order to study the effects of the long-range behavior of the excited state potential, resonant spin-orbit coupling and singlet-triplet mixing.
We explore how the extraordinary properties of Rydberg atoms can be employed to impact the motion of ultracold ground state atoms. Specifically, we use an off-resonant two-photon laser dressing to map features of the Rydberg states on ground state atoms. It is demonstrated that the interplay between the spatially varying quantization axis of the considered Ioffe-Pritchard field and the fixed polarizations of the laser transitions provides the possibility of substantially manipulating the ground state trapping potential.
We report electromagnetically induced transparency (EIT) in cold 85Rb atoms, trapped in the lower hyperfine level F = 2, of the ground state 5$^{2}S_{1/2}$ (Tiwari V B \\textit{et al} 2008 {\\it Phys. Rev.} A {\\bf 78} 063421). Two steady state $\\Lambda$-type systems of hyperfine energy levels are investigated using probe transitions into the levels F$^{\\prime}$ = 2 and F$^{\\prime}$ = 3 of the excited state 5$^{2}P_{3/2}$ in the presence of coupling transitions F = 3 $\\to$ F$^{\\prime}$ = 2 and F = 3 $\\to$ F$^{\\prime}$ = 3, respectively. The effects of uncoupled magnetic sublevel transitions and coupling field s Rabi frequency on the EIT signal from these systems are studied using a simple theoretical model.
Stark deceleration has been utilized for slowing and trapping several species of neutral, ground-state polar molecules generated in a supersonic beam expansion. Due to the finite physical dimension of the electrode array and practical limitations of the applicable electric fields, only molecules within a specific range of velocities and positions can be efficiently slowed and trapped. These constraints result in a restricted phase space acceptance of the decelerator in directions both transverse and parallel to the molecular beam axis; hence, careful modeling is required for understanding and achieving efficient Stark decelerator operation. We present work on slowing of the hydroxyl radical (OH) elucidating the physics controlling the evolution of the molecular phase space packets both with experimental results and model calculations. From these results we deduce experimental conditions necessary for efficient operation of a Stark decelerator.
High-resolution photoelectron momentum distributions of Xe atoms ionized by 800-nm linearly polarized laser fields have been traced at intensities from 1.1*1013 to 3.5*1013W/cm2 using velocity-map imaging techniques. At certain laser intensities, the momentum spectrum exhibits a distinct double-ring structure for low-order above-threshold ionization, which appears to be absent at lower or higher laser intensities. By investigating the intensity-resolved photoelectron energy spectrum, we find that this double-ring structure originates from resonant multiphoton ionization involving multiple Rydberg states of atoms. Varying the laser intensity, we can selectively enhance the resonant multiphoton ionization through certain atomic Rydberg states. The photoelectron angular distributions of multiphoton resonance are also investigated for the low-order above-threshold ionization.
The energies at geometries close to the equilibrium for the e$^+$BeO and e$^+$LiF ground states were computed by means of diffusion Monte Carlo simulations. These results allow us to predict the equilibrium geometries and the vibrational frequencies for these exotic systems,and to discuss their stability with respect to the various dissociation channels. Since the adiabatic positron affinities were found to be smaller than the dissociation energies for both complexes, we propose these two molecules as possible candidates in the challenge to produce and detect stable positron-molecule systems.
We have estimated the shift and broadening of the resonance lines in the spectrum of antiprotonic helium atoms $\\bar{p}\\mathrm{He}^{+}$ implanted in solid helium $^4$He. The application of the response function for crystalline helium has enabled determination of the contributions from the collective degrees of freedom to the shift and broadening. It occurs that the broadening due to the collective motion is negligible compared to the natural line width. The available pair-correlation functions for crystalline $^4$He have been applied for estimating the resonance-line shift due to collisions of $\\bar{p}\\mathrm{He}^{+}$ atom with the surrounding $^4$He atoms. The dependence of the line shift, which has been calculated in the quasistatic limit, on the solid-$^4$He density is nonlinear.
Hot, dense plasmas exhibit screened Coulomb interactions, resulting from the collective effects of correlated many-particle interactions. In the lowest particle correlation order (pair-wise correlations), the interaction between charged plasma particles reduces to the Debye-H\\\"uckel (Yukawa-type) potential, characterized by the Debye screening length D. Due to the importance of Coulomb interaction screening in dense laboratory and astrophysical plasmas, hundreds of theoretical investigations have been carried out in the past few decades on the plasma screening effects on the electronic structure of atoms and their collision processes employing the Debye-H\\\"uckel screening model. The present article aims at providing a comprehensive review of the recent studies in atomic physics in Debye plasmas. Specifically, the work on atomic electronic structure, photon excitation and ionization, electron/positron impact excitation and ionization, and excitation, ionization and charge transfer of ion-atom/ion collisions will be reviewed.
Fundamental aspects of ultracold collisions between identical bosonic or fermionic dipoles are studied under quasi-two-dimensional (Q2D) confinement. In the strongly dipolar regime, bosonic and fermion species are found to share important collisional properties as a result of the confining geometry, which suppresses the inelastic rates irrespective of the quantum statistics obeyed. A potential negative is that the confinement causes dipole-dipole resonances to be extremely narrow, which could make it difficult to explore Q2D dipolar gases with tunable interactions. Such properties are shown to be universal, and a simple WKB model reproduces most of our numerical results. In order to shed light on the many-body behavior of dipolar gases in Q2D we have analyzed the scattering amplitude and developed an energy-analytic form of the pseudopotentials for dipoles. For specific values of the dipolar interaction, the pseudopotential coefficient can be tuned to arbitrarily large values, indicating the possibility of realizing Q2D dipolar gases with tunable interactions.
We investigate the temperature dependence of the Casimir-Polder interaction in the electrostatic limit. This unusual phenomenon relies on the coupling between a virtual atomic transition and a thermal excitation of surface polariton modes. We first focus on the scenario where a Cs(8P3/2) atom is next to a CaF2 or a BaF2 surface. Our theoretical predictions show a strong temperature dependence of the van der Waals coefficient at experimentally accessible conditions. A series of spectroscopic measurements performed in a specially designed Cs vapour cell containing a CaF2 tube is presented. Our results illustrate the sensitivity of atom surface-interaction experiments to the quality and chemical stability of the surface material and emphasize the need of using more durable materials, such as sapphire. We finally discuss selective reflection experiments on Cs(7D3/2) in an all-sapphire cell that clearly demonstrate a temperature dependent van der Waals coefficient.
We establish the existence of spin-statistic selection rules (SSSR) for multi-equal-photon transitions in atomic systems. These selection rules are similar to those for systems of many equivalent electrons in atomic theory. The latter ones are the direct consequence of Pauli exclusion principle. In this sense the SSSR play the role of the exclusion principle for photons: they forbid some particular states for the photon systems. We established several SSSR for few-photon systems. 1) First rule (SSSR-1): two-equivalent photons involved in any atomic transition can have only even values of the total angular momentum J. This selection rule is an extension of the Landau-Yang theorem to the photons involved in atomic transitions. 2) second rule (SSSR-2): three equivalent dipole photons involved in any atomic transition can have only odd values of the total angular momentum J=1,3. 3) third rule (SSSR-3): four equivalent dipole photons involved in any atomic transition can have only even values of the total angular momentum J=0,2,4. We also suggest a method for a possible experimental test of these SSSR by means of laser experiments.
We present a theoretical study of the spectra produced by optical-radio-frequency double resonance devices, in which resonant linearly polarized light is used in the optical pumping and detection processes. We extend previous work by presenting algebraic results which are valid for atomic states with arbitrary angular momenta, arbitrary rf intensities, and arbitrary geometries. The only restriction made is the assumption of low light intensity. The results are discussed in view of their use in optical magnetometers.
Radio-frequency induced spin transitions of one individual proton are observed for the first time. The spin quantum jumps are detected via the continuous Stern-Gerlach effect, which is used in an experiment with a single proton stored in a cryogenic Penning trap. This is an important milestone towards a direct high-precision measurement of the magnetic moment of the proton and a new test of the matter-antimatter symmetry in the baryon sector.
We report extentions and corrections to the measurement of the Feshbach resonance in 85Rb cold atom collisions reported earlier [J. L. Roberts et al., Phys. Rev. Lett. 81, 5109 (1998)]. In addition to a better determination of the position of the resonance peak (154.9(4) gauss) and its width (11.0(4) gauss), improvements in our techniques now allow the measurement of the absolute size of the elastic scattering rate. This provides a new measure of the s-wave scasttering length as a function of magnetic field near the Feshbach resonance and contrains the Rb-Rb interaction potential.
We explore possible pathways for the creation of ultracold polar NaK molecules in their absolute electronic and rovibrational ground state starting from ultracold Feshbach molecules. In particular, we present a multi-channel analysis of the electronic ground and K(4p)+Na(3s) excited state manifold of NaK, analyze the spin character of both the Feshbach molecular state and the electronically excited intermediate states and discuss possible coherent two-photon transfer paths from Feshbach molecules to rovibronic ground state molecules. The theoretical study is complemented by the demonstration of STIRAP transfer from the X^1\\Sigma^+ (v=0) state to the a^3\\Sigma^+ manifold on a molecular beam experiment.
We report on the first experimental observation of a new threshold behavior observed in the 5g partial channel in photodetachment of K-. It arises from the repulsive polarization interaction between the detached electron and the residual K(5g) atom, which has a large negative dipole polarizability. In order to account for the observation in the K(5g) channel, we have developed a semiclassical model that predicts an exponential energy dependence for the cross section. The measurements were made with collinear laser-ion beams and a resonance ionization detection scheme.
A comprehensive universal description of the rotational-vibrational spectrum for two identical particles of mass $m$ and the third particle of the mass $m_1$ in the zero-range limit of the interaction between different particles is given for arbitrary values of the mass ratio $m/m_1$ and the total angular momentum $L$. If the two-body scattering length is positive, a number of vibrational states is finite for $L_c(m/m_1) \\le L \\le L_b(m/m_1)$, zero for $L>L_b(m/m_1)$, and infinite for $L<L_c(m/m_1)$. If the two-body scattering length is negative, a number of states is either zero for $L \\ge L_c(m/m_1)$ or infinite for $L<L_c(m/m_1)$. For a finite number of vibrational states, all the binding energies are described by the universal function $\\epsilon_{LN}(m/m_1) = {\\cal E}(\\xi, \\eta)$, where $\\xi=\\displaystyle\\frac{N-1/2}{\\sqrt{L(L + 1)}}$, $\\eta=\\displaystyle\\sqrt{\\frac{m}{m_1 L (L + 1)}}$,and $N$ is the vibrational quantum number. This scaling dependence is in agreement with the numerical calculations for $L > 2$ and only slightly deviates from those for $L = 1, 2$. The universal description implies that the critical values $L_c(m/m_1)$ and $L_b(m/m_1)$ increase as $0.401 \\sqrt{m/m_1}$ and $0.563 \\sqrt{m/m_1}$, respectively, while a number of vibrational states for $L \\ge L_c(m/m_1)$ is within the range $N \\le N_{max} \\approx 1.1 \\sqrt{L(L+1)}+1/2$.
We demonstrate polarization spectroscopy of an excited state transition in room temperature cesium vapor. An anisotropy induced by a circularly polarized pump beam on the D2 transition is observed using a weak probe on the 6P3/2 to 7S1/2 transition. When the D2 transition is saturated, a sub-natural linewidth feature is observed which theoretical modeling shows is enhanced by Doppler averaging. Polarization spectroscopy provides a simple modulation-free signal suitable for laser frequency stabilization to excited state transitions.
We analyze second-order $M1$-$M1$ and $M1$-$E2$ effects to the hyperfine structure (HFS) of the lowest energy $P$ states of alkali-metal atoms arising from the coupling of the two ($J=1/2,3/2$) fine-structure levels through the hyperfine interaction. We find these effects to be especially sizable in Li, leading to a $9\\sigma$ correction to the most accurate reported experimental value of the $A(P_{1/2})$ HFS constant of $^7$Li [D. Das and V. Natarajan, J. Phys. B \\textbf{41}, 035001 (2008)]. For the remaining alkali-metal systems, the results tabulated within may be referenced as higher precision is sought in experimental determination of the HFS constants.
A systematic study of the decay rates of antiprotonic helium (\\pbhef and \\pbhet) at CERN AD (Antiproton Decelerator) has been made by a laser spectroscopic method. The decay rates of some of its short-lived states, namely those for which the Auger rates $\\gamma_{\\mathrm{A}}$ are much larger than their radiative decay rates ($\\gamma_{\\mathrm{rad}} \\sim 1$ $\\mu$s$^{-1}$), were determined from the time distributions of the antiproton annihilation signals induced by laser beams, and the widths of the atomic resonance lines. The magnitude of the decay rates, especially their relation with the transition multipolarity, is discussed and compared with theoretical calculations.
At impact energies $ \\stackrel{>}{\\sim}1$ GeV/u the projectile-electron excitation and loss occurring in collisions between highly charged ions and neutral atoms is already strongly influenced by the presence of atomic electrons. In order to treat these processes in collisions with heavy atoms we generalize the symmetric eikonal model, used earlier for considerations of electron transitions in ion-atom collisions within the scope of a three-body Coulomb problem. We show that at asymptotically high collision energies this model leads to an exact transition amplitude and is very well suited to describe the projectile-electron excitation and loss at energies above a few GeV/u. In particular, by considering a number of examples we demonstrate advantages of this model over the first Born approximation at impact energies $\\sim 1$--30 GeV/u, which are of special interest for atomic physics experiments at the future GSI facilities.
Developments in atom interferometry have led to atomic inertial sensors with extremely high sensitivity. Their performances are for the moment limited by the ground vibrations, the impact of which is exacerbated by the sequential operation, resulting in aliasing and dead time. We discuss several experiments performed at LNE-SYRTE in order to reduce these problems and achieve the intrinsic limit of atomic inertial sensors. These techniques have resulted in transportable and high-performance instruments that participate in gravity measurements, and pave the way to applications in inertial navigation.
We propose a novel scheme for resolving the contribution of inner- and outer-valence electrons in XUV-initiated high-harmonic generation in neon. By probing the atom with a low energy (below the 2s ionisation threshold) ultrashort XUV pulse, the 2p electron is steered away from the core, while the 2s electron is enabled to describe recollision trajectories. By selectively suppressing the 2p recollision trajectories we can resolve the contribution of the 2s electron to the high-harmonic spectrum. We apply the classical trajectory model to account for the contribution of the 2s electron, which allows for an intuitive understanding of the process.
Noise properties of an idealized atomic magnetometer that utilizes spin squeezing induced by a continuous quantum nondemolition measurement are considered. Such a magnetometer measures spin precession of $N$ atomic spins by detecting optical rotation of far-detuned light. Fundamental noise sources include the quantum projection noise and the photon shot-noise. For measurement times much shorter than the spin-relaxation time observed in the absence of light ($\\tau_{\\rm rel}$) divided by $\\sqrt{N}$, the optimal sensitivity of the magnetometer scales as $N^{-3/4}$, so an advantage over the usual sensitivity scaling as $N^{-1/2}$ can be achieved. However, at longer measurement times, the optimized sensitivity scales as $N^{-1/2}$, as for a usual shot-noise limited magnetometer. If strongly squeezed probe light is used, the Heisenberg uncertainty limit may, in principle, be reached for very short measurement times. However, if the measurement time exceeds $\\tau_{\\rm rel}/N$, the $N^{-1/2}$ scaling is again restored.
Total cross sections for the scattering of low-energy electrons and positrons by atomic beryllium in the energy range below the first inelastic thresholds are calculated. A Ramsauer-Townsend minimum is seen in the electron scattering cross sections, while no such effect is found in the case of positron scattering. A minimum total cross section of 0.016 a.u. at 0.0029 eV is observed for the electron case. In the limit of zero energy, the cross sections yield a scattering length of -0.61 a.u. for electron and +13.8 a.u. for positron scattering.
In this work, the controversy between the interpretations of recent measurements on dense aluminum plasma created with Linac coherent light sources (LCLS) X-ray free electron laser (FEL) and Orion laser has been addressed. In both kind of experiments, helium-like and hydrogen-like spectral lines are used for plasma diagnostics . However, there exist no precise theoretical calculations for He-like ions within dense plasma environment. The strong need for an accurate theoretical estimates for spectral properties of He-like ions in strongly coupled plasma environment leads us to perform ab initio calculations in the framework of Rayleigh-Ritz variation principle in Hylleraas coordinates where ion-sphere potential is used. An approach to resolve the long-drawn problem of numerical instability for evaluating two-electron integrals with extended basis inside a finite domain is presented here. The present values of electron densities corresponding to disappearance of different spectral lines obtained within the framework of ion-sphere potential show excellent agreement with Orion laser experiments in Al plasma and with recent theories. Moreover, this method is extended to predict the critical plasma densities at which the spectral lines of H-like and He-like carbon and argon ions disappear. Incidental degeneracy and level-crossing phenomena are being reported for the first time for two-electron ions embedded in strongly coupled plasma. Thermodynamic pressure experienced by the ions in their respective ground states inside the ion-spheres are also reported.
We explore properties of atoms whose magnetic hyperfine sub-levels are coupled by an external magnetic radio frequency (rf) field. We perform a thorough theoretical analysis of this driven system and present a number of systematic approximations which eventually give rise to dressed adiabatic radio frequency potentials. The predictions of this analytical investigation are compared to numerically exact results obtained by a wave packet propagation. We outline the versatility and flexibility of this new class of potentials and demonstrate their potential use to build atom optical elements such as double-wells, interferometers and ringtraps. Moreover, we perform simulations of interference experiments carried out in rf induced double-well potentials. We discuss how the nature of the atom-field coupling mechanism gives rise to a decrease of the interference contrast.
This contribution reviews a selection of findings on atomic density functions and discusses ways for reading chemical information from them. First an expression for the density function for atoms in the multi-configuration Hartree--Fock scheme is established. The spherical harmonic content of the density function and ways to restore the spherical symmetry in a general open-shell case are treated. The evaluation of the density function is illustrated in a few examples. In the second part of the paper, atomic density functions are analyzed using quantum similarity measures. The comparison of atomic density functions is shown to be useful to obtain physical and chemical information. Finally, concepts from information theory are introduced and adopted for the comparison of density functions. In particular, based on the Kullback--Leibler form, a functional is constructed that reveals the periodicity in Mendeleev s table. Finally a quantum similarity measure is constructed, based on the integrand of the Kullback--Leibler expression and the periodicity is regained in a different way.
Antiprotonic helium, a neutral exotic three-body system consisting of a helium nucleus, an electron and an antiproton, is being studied at the Antiproton Decelerator of CERN by the ASAUCSA collaboration. Using laser spectroscopy of the energy levels of the antiproton in this system and comparison to theory, a value of the antiproton-to-electron mass ratio with an error of 3 ppb could be obtained. This result agrees with the most precise measurement of the value of the proton and allows us to extract a limit of the equality of the proton and antiproton charge and mass of 2 ppb. Using microwave spectroscopy, the hyperfine structure of antiprotonic helium has been measured to 30 ppm. Experimental improvements are expected to soon provide a new value for the magnetic moment of the antiproton.
We demonstrate runaway evaporative cooling directly with a tightly confining optical dipole trap and achieve fast production of condensates of 1.5x10^5 87Rb atoms. Our scheme is characterized by an independent control of the optical trap confinement and depth, permitting forced evaporative cooling without reducing the trap stiffness. Although our configuration is particularly well suited to the case of 87Rb atoms in a 1565nm optical trap, where an efficient initial loading is possible, our scheme is general and should allow all-optical evaporative cooling at constant stiffness for most species.
Precision saturation spectroscopy of the $^{88}{\\rm Sr} ^1S_0-^3P_1$ is performed in a vapor cell filled with various rare gas including He, Ne, Ar, and Xe. By continuously calibrating the absolute frequency of the probe laser, buffer gas induced collision shifts of $\\sim $kHz are detected with gas pressure of 1-20 mTorr. Helium gave the largest fractional shift of $1.6 \\times 10^{-9} {\\rm Torr}^{-1}$. Comparing with a simple impact calculation and a Doppler-limited experiment of Holtgrave and Wolf [Phys. Rev. A {\\bf 72}, 012711 (2005)], our results show larger broadening and smaller shifting coefficient, indicating effective atomic loss due to velocity changing collisions. The applicability of the result to the $^1S_0-^3P_0$ optical lattice clock transition is also discussed.
We have measured the hyperfine splitting of the $7P_{1/2}$ state at the 100 ppm level in Fr isotopes ($^{206g,206m, 207, 209, 213, 221}$Fr) near the closed neutron shell ($N$ = 126 in $^{213}$Fr). The measurements in five isotopes and a nuclear isomeric state of francium, combined with previous determinations of the $7S_{1/2}$ splittings, reveal the spatial distribution of the nuclear magnetization, i.e. the Bohr-Weisskopf effect. We compare our results with a simple shell model consisting of unpaired single valence nucleons orbiting a spherical nucleus, and find good agreement over a range of neutron-deficient isotopes ($^{207-213}$Fr). Also, we find near-constant proton anomalies for several even-$ N$ isotopes. This identifies a set of Fr isotopes whose nuclear structure can be understood well enough for the extraction of weak interaction parameters from parity non-conservation studies.
The collinear eZe configuration of helium, with the electrons on opposite sides of the nucleus, is studied in the presence of an external electromagnetic (laser or microwave) field. We show that the classically unstable \"asymmetric stretch\" orbit, on which doubly excited intrashell states of helium with maximum interelectronic angle are anchored, can be stabilized by means of a resonant driving where the frequency of the electromagnetic field equals the frequency of Kepler-like oscillations along the orbit. A static magnetic field, oriented parallel to the oscillating electric field of the driving, can be used to enforce the stability of the configuration with respect to deviations from collinearity. Quantum Floquet calculations within a collinear model of the driven two-electron atom reveal the existence of nondispersive wave packets localized on the stabilized asymmetric stretch orbit, for double excitations corresponding to principal quantum numbers of the order of N > 10.
Coherent optical bichromatic forces have been shown to be effective tools for rapidly slowing and cooling simple atomic systems. While previous estimates suggest that these forces may also be effective for rapidly decelerating molecules or complex atoms, a quantitative treatment for multilevel systems has been lacking. We describe detailed numerical modeling of bichromatic forces by direct numerical solution for the time-dependent density matrix in the rotating-wave approximation. We describe both the general phenomenology of an arbitrary few-level system and the specific requirements for slowing and cooling on a many-level transition in calcium monofluoride (CaF), one of the molecules of greatest current experimental interest. We show that it should be possible to decelerate a cryogenic buffer-gas-cooled beam of CaF nearly to rest without a repumping laser and within a longitudinal distance of about 1 cm. We also compare a full 16-level simulation for the CaF B$\\leftrightarrow$X system with a simplified numerical model and with a semiquantitative estimate based on 2-level systems. The simplified model performs nearly as well as the complete version, whereas the 2-level model is useful for making order-of-magnitude estimates, but nothing more.
Decoherence due to scattering from background gas particles is observed for the first time in a Mach-Zehnder atom interferometer, and compared with decoherence due to scattering photons. A single theory is shown to describe decoherence due to scattering either atoms or photons. Predictions from this theory are tested by experiments with different species of background gas, and also by experiments with different collimation restrictions on an atom beam interferometer.
We report on coherent control of excitation processes of translationally ultracold rubidium dimers in a magneto-optical trap by using shaped femtosecond laser pulses. Evolution strategies are applied in a feedback loop in order to optimize the photoexcitation of the Rb2 molecules, which subsequently undergo ionization or fragmentation. A superior performance of the resulting pulses compared to unshaped pulses of the same pulse energy is obtained by distributing the energy among specific spectral components. The demonstration of coherent control to ultracold ensembles opens a path to actively influence fundamental photo-induced processes in molecular quantum gases.
We present a semiclassical two-step model for strong-field ionization that accounts for path interferences of tunnel-ionized electrons in the ionic potential beyond perturbation theory. Within the framework of a classical trajectory Monte-Carlo representation of the phase-space dynamics, the model employs the semiclassical approximation to the phase of the full quantum propagator in the exit channel. By comparison with the exact numerical solution of the time-dependent Schr\\\"odinger equation for strong-field ionization of hydrogen, we show that for suitable choices of the momentum distribution after the first tunneling step, the model yields good quantitative agreement with the full quantum simulation. The two-dimensional photoelectron momentum distributions, the energy spectra, and the angular distributions are found to be in good agreement with the corresponding quantum results. Specifically, the model quantitatively reproduces the fan-like interference patterns in the low-energy part of the two-dimensional momentum distributions as well as the modulations in the photoelectron angular distributions.
The quest for the value of the electron s atomic mass has been subject of continuing efforts over the last decades. Among the seemingly fundamental constants which parameterize the Standard Model (SM) of physics and which are thus responsible for its predictive power, the electron mass me plays a prominent role, as it is responsible for the structure and properties of atoms and molecules. This manifests in the close link with other fundamental constants, such as the Rydberg constant and the fine-structure constant {\\alpha}. However, the low mass of the electron considerably complicates its precise determination. In this work we present a substantial improvement by combining a very accurate measurement of the magnetic moment of a single electron bound to a carbon nucleus with a state-of-the-art calculation in the framework of bound-state Quantum Electrodynamics. The achieved precision of the atomic mass of the electron surpasses the current CODATA value by a factor of 13. Accordingly, the result presented in this letter lays the foundation for future fundamental physics experiments and precision tests of the SM.
Atom interferometers using Bose-Einstein condensate that is confined in a waveguide and manipulated by optical pulses have been limited by their short coherence times. We present a theoretical model that offers a physically simple explanation for the loss of contrast and propose the method for increasing the fringe contrast by recombining the atoms at a different time. A simple, quantitatively accurate, analytical expression for the optimized recombination time is presented and used to place limits on the physical parameters for which the contrast may be recovered.
Atomic co-magnetometers are widely used in precision measurements searching for spin interactions beyond the Standard Model. We describe a new $^3$He-$^{129}$Xe co-magnetometer probed by Rb atoms and use it to identify two general classes of systematic effects in gas co-magnetometers, one associated with diffusion in second-order magnetic field gradients and another due to temperature gradients. We also develop a general and practical approach for calculating spin relaxation and frequency shifts due to arbitrary magnetic field gradients and confirm it experimentally.
Originating from the weak interaction, parity violation in chiral molecules has been considered as a possible origin of the biohomochirality. It was predicted in 1974 but has never been observed so far. Parity violation should lead to a very tiny frequency difference in the rovibrational spectra of the enantiomers of a chiral molecule. We have proposed to observe this predicted frequency difference using the two photon Ramsey fringes technique on a supersonic beam. Promising candidates for this experiment are chiral oxorhenium complexes, which present a large effect, can be synthesized in large quantity and enantiopure form, and can be seeded in a molecular beam. As a first step towards our objective, a detailed spectroscopic study of methyltrioxorhenium (MTO) has been undertaken. It is an ideal test molecule as the achiral parent molecule of chiral candidates for the parity violation experiment. For the 187Re MTO isotopologue, a combined analysis of Fourier transform microwave and infrared spectra as well as ultra-high resolution CO2 laser absorption spectra enabled the assignment of 28 rotational lines and 71 rovibrational lines, some of them with a resolved hyperfine structure. A set of spectroscopic parameters in the ground and first excited state, including hyperfine structure constants, was obtained for the antisymmetric Re=O stretching mode of this molecule. This result validates the experimental approach to be followed once a chiral derivative of MTO will be synthesized, and shows the benefit of the combination of several spectroscopic techniques in different spectral regions, with different set-ups and resolutions. First high resolution spectra of jet-cooled MTO, obtained on the set-up being developed for the observation of molecular parity violation, are shown, which constitutes a major step towards the targeted objective.
We performed an absolute frequency measurement of the $^1S_{0}$-$^3P_{0}$ transition in $^{87}$Sr with a fractional uncertainty of $1.2 \\times 10^{-15}$, which is less than one third that of our previous measurement. A caesium fountain atomic clock was used as a transfer oscillator to reduce the uncertainty of the link between a strontium optical lattice clock and the SI second. The absolute value of the transition frequency is 429 228 004 229 873.56(49) Hz.
Molecules show a much increased multiple ionization rate in a strong laser field as compared to atoms of similar ionization energy. A widely accepted model attributes this to the action of the joint fields of the adjacent ionic core and the laser on its neighbor inside the same molecule. The underlying physical picture for the enhanced ionization is that the up-field atom that gets ionized. However, this is still debated and remains unproven. Here we report an experimental verification of this long-standing prediction. This is accomplished by probing the two-site double ionization of ArXe, where the instantaneous field direction at the moment of electron release and the emission direction of the correlated ionizing center are measured by detecting the recoil sum- and relative-momenta of the fragment ions. Our results unambiguously prove the intuitive picture of the enhanced multielectron dissociative ionization of molecules and clarify a long-standing controversy.
We discuss the propagation of hydrogen atoms in static electric and magnetic fields in a longitudinal atomic beam spin echo (lABSE) apparatus. Depending on the choice of the external fields the atoms may acquire both dynamical and geometrical quantum mechanical phases. As an example of the former, we show first in-beam spin rotation measurements on atomic hydrogen, which are in excellent agreement with theory. Additional calculations of the behaviour of the metastable 2S states of hydrogen reveal that the geometrical phases may exhibit the signature of parity-(P-)violation. This invites for possible future lABSE experiments, focusing on P-violating geometrical phases in the lightest of all atoms.
Spectroscopic measurements of the helium atom are performed to high precision using an atomic beam apparatus and electro-optic laser techniques. These measurements, in addition to serving as a test of helium theory, also provide a new determination of the fine structure constant {\\alpha}. An apparatus was designed and built to overcome limitations encountered in a previous experiment. Not only did this allow an improved level of precision but also enabled new consistency checks, including an extremely useful measurement in 3He. I discuss the details of the experimental setup along with the major changes and improvements. A new value for the J = 0 to 2 fine structure interval in the 23P state of 4He is measured to be 31 908 131.25(30) kHz. The 300 Hz precision of this result represents an improvement over previous results by more than a factor of three. Combined with the latest theoretical calculations, this yields a new determination of {\\alpha} with better than 5 ppb uncertainty, {\\alpha}-1 = 137.035 999 55(64).
Recently we calculated relativistic recoil corrections to the energy levels of the low lying states in muonic hydrogen induced by electron vacuum polarization effects. The results were obtained by Breit-type and Grotch-type calculations. The former were described in our previous papers in detail, and here we present the latter. The Grotch equation was originally developed for pure Coulomb systems and allowed to express the relativistic recoil correction in order $(Z\\alpha)^4m^2/M$ in terms of the relativistic non-recoil contribution $(Z\\alpha)^4m$. Certain attempts to adjust the method to electronic vacuum polarization took place in the past, however, the consideration was incomplete and the results were incorrect. Here we present a Groth-type approach to the problem and in a series of papers consider relativistic recoil effects in order $\\alpha(Z\\alpha)^4m^2/M$ and $\\alpha^2(Z\\alpha)^4m^2/M$. That is the first paper of the series and it presents a general approach, while two other papers present results of calculations of the $\\alpha(Z\\alpha)^4m^2/M$ and $\\alpha^2(Z\\alpha)^4m^2/M$ contributions in detail. In contrast to our previous calculation, we address now a variety of states in muonic atoms with a certain range of the nuclear charge $Z$.
We investigate the dynamics of the photodissociation of the hydrohelium cation HeH$^+$ by XUV radiation with the aim to establish a detailed comparison with a recent experimental work carried out at the FLASH free electron laser using both vibrationally hot and cold ions. As shown in previous theoretical works, the comparison is hindered by the fact that the experimental ro-vibrational distribution of the ions is unknown. We determine this distribution using a dissociative charge transfer set-up and the same source conditions as in the FLASH experiment. Using a non-adiabatic time-dependent wave packet method, we calculate the partial photodissociation cross sections for the $n=1-3$ coupled electronic states of HeH$^+$. We find a good agreement with the experiment for the total cross section into the He + H$^+$ dissociative channel. By performing an adiabatic calculation involving the $n=4$ states, we then show that the experimental observation of the importance of the electronic states with $n>3$ cannot be well explained theoretically, especially for cold ($v=0$) ions. We also calculate the relative contributions to the cross section of the $\\Sigma$ and $\\Pi$ states. The agreement with the experiment is excellent for the He$^+$ + H channel, but only qualitative for the He + H$^+$ channel. We discuss the factors that could explain the remaining discrepancies between theory and experiment.
An exterior complex scaling technique is applied to compute Stark resonance parameters for two molecular orbitals ($1b_{1}$ and $1b_{2}$) represented in the field-free limit in a single-center expansion. For electric DC field configurations that guarantee azimuthal symmetry of the solution the calculation is carried out by solving a two-dimensional partial differential equation in spherical polar coordinates using a finite-element method. The resonance positions and widths as a function of electric field strengths are shown for field strengths starting in the tunnelling ionization regime, and extending well into the over-barrier ionization region.
Energies, wavelengths, transition probabilities, and oscillator strengths have been calculated for the 4s24p2-4s4p3, 4s24p2-4s24p4d and 4s4p3-4p4 allowed transitions in heavy Ge-like ions with Z=59-63. The fully relativistic Multiconfiguration Dirac-Fock (MCDF) method taking into account both the correlations within the n=4 complex and the quantum electrodynamic (QED) effects have been used in the calculations. MCDFGME code is used to calculate electron impact excitation cross sections for the 4s24p2-4s4p3 and 4s24p2-4s24p4d transitions with plane-wave Born approximation. The results of Pr XXVIII, Nd XXIX, Pm XXX, Sm XXXI and Eu XXXII are compared with HFR method results.
We present an {\\it ab initio} and non-perturbative time-dependent approach to the problem of double ionization of a general atom driven by intense XUV laser pulses. After using a highly flexible $B$-Spline $R$-matrix method to generate field-free Hamiltonian and electric dipole matrices, the initial state is propagated in time using an efficient Arnoldi-Lanczos scheme. Test calculations for double ionization of He by a single laser pulse yield good agreement with benchmark results obtained with other methods. The method is then applied to two-color pump-probe processes, for which momentum and energy distributions of the two outgoing electrons are presented.
The exact ground-state Kohn-Sham(KS) potential for the helium atom is known from accurate wavefunction calculations of the ground-state density. The threshold for photoabsorption from this potential matches the physical system exactly. By carefully studying its absorption spectrum, we show the answer to the title question is no. To address this problem in detail, we generate a highly accurate simple fit of a two-electron spectrum near the threshold, and apply the method to both the experimental spectrum and that of the exact ground-state Kohn-Sham potential.
Ionization of an atom or molecule presents surprising richness beyond our current understanding: strong-field ionization with low-frequency fields recently revealed unexpected kinetic energy structures (1, 2). A solid grasp on electron dynamics is however pre-requisite for attosecond-resolution recollision imaging (3), orbital tomography (4), for coherent sources of keV light (5), or to produce zeptosecond-duration x-rays (6). We present a methodology that enables scrutinizing strong-field dynamics at an unprecedented level. Our method provides high-precision measurements only 1 meV above the threshold despite 5 orders higher ponderomotive energies. Such feat was realized with a specifically developed ultrafast mid-IR light source in combination with a reaction microscope. We observe electron dynamics in the tunneling regime ({\\gamma} = 0.3) and show first 3D momentum distributions demonstrating surprising new observations of near-zero momentum electrons and low momentum structures, below the eV, despite quiver energies of 95 eV.
We study the formation of highly excited neutral atoms during the break-up of strongly-driven molecules. Past work on this significant phenomenon has shown that during the formation of highly excited neutral atoms ($\\mathrm{H^{*}}$) during the break-up of H$_{2}$ in a linear laser field the electron that escapes does so either very quickly or after remaining bound for a few periods of the laser field. Here, we address the electron-nuclear dynamics in $\\mathrm{H^{*}}$ formation in elliptical laser fields, through Coulomb explosion. We show that with increasing ellipticity two-electron effects are effectively \"switched-off\". We perform these studies using a toolkit we have developed for semiclassical computations for strongly-driven multi-center molecules. This toolkit includes the formulation of the probabilities of strong-field phenomena in a transparent way. This allows us to identify the shortcomings of currently used initial phase space distributions for the electronic degrees of freedom. In addition, it includes a 3-dimensional method for time-propagation that fully accounts for the Coulomb singularity. This technique has been previously developed in the context of celestial mechanics and we currently adopt it to strongly-driven systems. Moreover, we allow for tunneling during the time-propagation. We find that this is necessary in order to accurately describe the fragmentation of strongly-driven molecules.
Multi-electron giant dipole resonances of atoms in crossed electric and magnetic fields are investigated. Stationary configurations corresponding to a highly symmetric arrangement of the electrons on a decentered circle are derived, and a normal-mode and stability analysis are performed. A classification of the various modes, which are dominated by the magnetic field or the Coulomb interactions, is provided. Based on the MCTDH approach, we carry out a six-dimensional wave-packet dynamical study for the two-electron resonances, yielding in particular lifetimes of more than 0.1 $\\mu$s for strong electric fields.
This paper, mostly tutorial in nature, deals with the problem of characterizing the capacity of fading channels in the high signal-to-noise ratio (SNR) regime. We focus on the practically relevant noncoherent setting, where neither transmitter nor receiver know the channel realizations, but both are aware of the channel law. We present, in an intuitive and accessible form, two tools, first proposed by Lapidoth & Moser (2003), of fundamental importance to high-SNR capacity analysis: the duality approach and the escape-to-infinity property of capacity-achieving distributions. Furthermore, we apply these tools to refine some of the results that appeared previously in the literature and to simplify the corresponding proofs.
In this paper, we consider the Ice-Wine problem: Two transmitters send their messages over the Gaussian Multiple-Access Channel (MAC) and a receiver aims to recover a linear combination of codewords. The best known achievable rate-region for this problem is due to [1],[2] as $R_{i}\\leq\\frac{1}{2}\\log\\left(\\frac{1}{2}+{\\rm SNR}\\right)$ $(i=1,2)$. In this paper, we design a novel scheme using lattice codes and show that the rate region of this problem can be improved. The main difference between our proposed scheme with known schemes in [1],[2] is that instead of recovering the sum of codewords at the decoder, a non-integer linear combination of codewords is recovered. Comparing the achievable rate-region with the outer bound, $R_{i}\\leq\\frac{1}{2}\\log\\left(1+{\\rm SNR}\\right),,(i=1,2)$, we observe that the achievable rate for each user is partially tight. Finally, by applying our proposed scheme to the Gaussian Two Way Relay Channel (GTWRC), we show that the best rate region for this problem can be improved.
In this paper we consider the communication problem that involves transmission of correlated sources over broadcast channels. We consider a graph-based framework for this information transmission problem. The system involves a source coding module and a channel coding module. In the source coding module, the sources are efficiently mapped into a nearly semi-regular bipartite graph, and in the channel coding module, the edges of this graph are reliably transmitted over a broadcast channel. We consider nearly semi-regular bipartite graphs as discrete interface between source coding and channel coding in this multiterminal setting. We provide an information-theoretic characterization of (1) the rate of exponential growth (as a function of the number of channel uses) of the size of the bipartite graphs whose edges can be reliably transmitted over a broadcast channel and (2) the rate of exponential growth (as a function of the number of source samples) of the size of the bipartite graphs which can reliably represent a pair of correlated sources to be transmitted over a broadcast channel.
Concatenation is a method of building long codes out of shorter ones, it attempts to meet the problem of decoding complexity by breaking the required computation into manageable segments. Concatenated Continuous Phase Frequency Shift Keying (CPFSK) facilitates powerful error correction. CPFSK also has the advantage of being bandwidth efficient and compatible with nonlinear amplifiers. Bandwidth efficient concatenated coded modulation schemes were designed for communication over Additive White Gaussian noise (AWGN), and Rayleigh fading channels. An analytical bounds on the performance of serial concatenated convolutional codes (SCCC), and parallel concatenated convolutionalcodes (PCCC), were derived as a base of comparison with the third category known as hybrid concatenated trellis codes scheme (HCTC). An upper bound to the average maximum-likelihood bit error probability of the three schemes were obtained. Design rules for the parallel, outer, and inner codes that maximize the interleaver s gain were discussed. Finally, a low complexity iterative decoding algorithm that yields a better performance is proposed.
A power constrained sensor network that consists of multiple sensor nodes and a fusion center (FC) is considered, where the goal is to estimate a random parameter of interest. In contrast to the distributed framework, the sensor nodes may be partially connected, where individual nodes can update their observations by (linearly) combining observations from other adjacent nodes. The updated observations are communicated to the FC by transmitting through a coherent multiple access channel. The optimal collaborative strategy is obtained by minimizing the expected mean-square-error subject to power constraints at the sensor nodes. Each sensor can utilize its available power for both collaboration with other nodes and transmission to the FC. Two kinds of constraints, namely the cumulative and individual power constraints are considered. The effects due to imperfect information about observation and channel gains are also investigated. The resulting performance improvement is illustrated analytically through the example of a homogeneous network with equicorrelated parameters. Assuming random geometric graph topology for collaboration, numerical results demonstrate a significant reduction in distortion even for a moderately connected network, particularly in the low local-SNR regime.
This paper exploits the potential of physical layer security in massive multiple-input multiple-output (MIMO) aided two-tier heterogeneous networks (HetNets). We focus on the downlink secure transmission in the presence of multiple eavesdroppers. We first address the impact of massive MIMO on the maximum receive power based user association. We then derive the tractable upper bound expressions for the secrecy outage probability of a HetNets user.We show that the implementation of massive MIMO significantly improves the secrecy performance, which indicates that physical layer security could be a promising solution for safeguarding massive MIMO HetNets. Furthermore, we show that the secrecy outage probability of HetNets user first degrades and then improves with increasing the density of PBSs.
Spatially-coupled low-density parity-check (LDPC) codes, which were first introduced as LDPC convolutional codes, have been shown to exhibit excellent performance under low-complexity belief-propagation decoding. This phenomenon is now termed threshold saturation via spatial coupling. Spatially-coupled codes have been successfully applied in numerous areas. In particular, it was proven that spatially-coupled regular LDPC codes universally achieve capacity over the class of binary memoryless symmetric (BMS) channels under belief-propagation decoding. Recently, potential functions have been used to simplify threshold saturation proofs for scalar and vector recursions. In this paper, potential functions are used to prove threshold saturation for irregular LDPC and low-density generator-matrix (LDGM) codes on BMS channels, extending the simplified proof technique to BMS channels. The corresponding potential functions are closely related to the average Bethe free entropy of the ensembles in the large-system limit. These functions also appear in statistical physics when the replica method is used to analyze optimal decoding.
A framework for linear-programming (LP) decoding of nonbinary linear codes over rings is developed. This framework facilitates linear-programming based reception for coded modulation systems which use direct modulation mapping of coded symbols. It is proved that the resulting LP decoder has the  maximum-likelihood certificate  property. It is also shown that the decoder output is the lowest cost pseudocodeword. Equivalence between pseudocodewords of the linear program and pseudocodewords of graph covers is proved. It is also proved that if the modulator-channel combination satisfies a particular symmetry condition, the codeword error rate performance is independent of the transmitted codeword. Two alternative polytopes for use with linear-programming decoding are studied, and it is shown that for many classes of codes these polytopes yield a complexity advantage for decoding. These polytope representations lead to polynomial-time decoders for a wide variety of classical nonbinary linear codes. LP decoding performance is illustrated for the [11,6] ternary Golay code with ternary PSK modulation over AWGN, and in this case it is shown that the performance of the LP decoder is comparable to codeword-error-rate-optimum hard-decision based decoding. LP decoding is also simulated for medium-length ternary and quaternary LDPC codes with corresponding PSK modulations over AWGN.
To decrease the training overhead and improve the channel estimation accuracy in uplink cloud radio access networks (C-RANs), a superimposed-segment training design is proposed. The core idea of the proposal is that each mobile station superimposes a periodic training sequence on the data signal, and each remote radio heads prepends a separate pilot to the received signal before forwarding it to the centralized base band unit pool. Moreover, a complex-exponential basis-expansion-model based channel estimation algorithm to maximize a posteriori probability is developed, where the basis-expansion-model coefficients of access links (ALs) and the channel fading of wireless backhaul links are first obtained, after which the time-domain channel samples of ALs are restored in terms of maximizing the average effective signal-to-noise ratio (AESNR). Simulation results show that the proposed channel estimation algorithm can effectively decrease the estimation mean square error and increase the AESNR in C-RANs, thus significantly outperforming the existing solutions.
In 1998, Zhang and Yeung found the first unconditional non-Shannon-type information inequality. Recently, Dougherty, Freiling and Zeger gave six new unconditional non-Shannon-type information inequalities. This work generalizes their work and provides a method to systematically derive non-Shannon-type information inequalities. An application of this method reveals new 4-variable non-Shannon-type information inequalities.
The use of mmWave frequencies is one of the key strategies to achieve the fascinating 1000x increase in the capacity of future 5G wireless systems. While for traditional sub-6 GHz cellular frequencies several well-developed statistical channel models are available for system simulation, similar tools are not available for mmWave frequencies, thus preventing a fair comparison of independently developed transmission and reception schemes. In this paper we provide a simple albeit accurate statistical procedure for the generation of a clustered MIMO channel model operating at mmWaves, for both the cases of slowly and rapidly time-varying channels. Matlab scripts for channel generation are also provided, along with an example of their use.
Various applications of wireless Machine-to-Machine (M2M) communications have rekindled the research interest in random access protocols, suitable to support a large number of connected devices. Slotted ALOHA and its derivatives represent a simple solution for distributed random access in wireless networks. Recently, a framed version of slotted ALOHA gained renewed interest due to the incorporation of successive interference cancellation (SIC) in the scheme, which resulted in substantially higher throughputs. Based on similar principles and inspired by the rateless coding paradigm, a frameless approach for distributed random access in slotted ALOHA framework is described in this paper. The proposed approach shares an operational analogy with rateless coding, expressed both through the user access strategy and the adaptive length of the contention period, with the objective to end the contention when the instantaneous throughput is maximized. The paper presents the related analysis, providing heuristic criteria for terminating the contention period and showing that very high throughputs can be achieved, even for a low number for contending users. The demonstrated results potentially have more direct practical implications compared to the approaches for coded random access that lead to high throughputs only asymptotically.
There is a known best possible upper bound on the probability of undetected error for linear codes. The $[n,k;q]$ codes with probability of undetected error meeting the bound have support of size $k$ only. In this note, linear codes of full support ($=n$) are studied. A best possible upper bound on the probability of undetected error for such codes is given, and the codes with probability of undetected error meeting this bound are characterized.
A statistical model of interference in wireless networks is considered, which is based on the traditional propagation channel model and a Poisson model of random spatial distribution of nodes in 1-D, 2-D and 3-D spaces with both uniform and non-uniform densities. The power of nearest interferer is used as a major performance indicator, instead of a traditionally-used total interference power, since at the low outage region, they have the same statistics so that the former is an accurate approximation of the latter. This simplifies the problem significantly and allows one to develop a unified framework for the outage probability analysis, including the impacts of complete/partial interference cancelation, of different types of fading and of linear filtering, either alone or in combination with each other. When a given number of nearest interferers are completely canceled, the outage probability is shown to scale down exponentially in this number. Three different models of partial cancelation are considered and compared via their outage probabilities. The partial cancelation level required to eliminate the impact of an interferer is quantified. The effect of a broad class of fading processes (including all popular fading models) is included in the analysis in a straightforward way, which can be positive or negative depending on a particular model and propagation/system parameters. The positive effect of linear filtering (e.g. by directional antennas) is quantified via a new statistical selectivity parameter. The analysis results in formulation of a tradeoff relationship between the network density and the outage probability, which is a result of the interplay between random geometry of node locations, the propagation path loss and the distortion effects at the victim receiver.
This paper provides an explicit expression for the capacity region of the two-user broadcast Z channel and proves that the optimal boundary can be achieved by independent encoding of each user. Specifically, the information messages corresponding to each user are encoded independently and the OR of these two encoded streams is transmitted. Nonlinear turbo codes that provide a controlled distribution of ones and zeros are used to demonstrate a low-complexity scheme that operates close to the optimal boundary.
A key aspect of many resource allocation problems is the need for the resource controller to compute a function, such as the max or arg max, of the competing users metrics. Information must be exchanged between the competing users and the resource controller in order for this function to be computed. In many practical resource controllers the competing users  metrics are communicated to the resource controller, which then computes the desired extremization function. However, in this paper it is shown that information rate savings can be obtained by recognizing that controller only needs to determine the result of this extremization function. If the extremization function is to be computed losslessly, the rate savings are shown in most cases to be at most 2 bits independent of the number of competing users. Motivated by the small savings in the lossless case, simple achievable schemes for both the lossy and interactive variants of this problem are considered. It is shown that both of these approaches have the potential to realize large rate savings, especially in the case where the number of competing users is large. For the lossy variant, it is shown that the proposed simple achievable schemes are in fact close to the fundamental limit given by the rate distortion function.
Cognitive radio has been widely considered as one of the prominent solutions to tackle the spectrum scarcity. While the majority of existing research has focused on single-band cognitive radio, multiband cognitive radio represents great promises towards implementing efficient cognitive networks compared to single-based networks. Multiband cognitive radio networks (MB-CRNs) are expected to significantly enhance the network s throughput and provide better channel maintenance by reducing handoff frequency. Nevertheless, the wideband front-end and the multiband spectrum access impose a number of challenges yet to overcome. This paper provides an in-depth analysis on the recent advancements in multiband spectrum sensing techniques, their limitations, and possible future directions to improve them. We study cooperative communications for MB-CRNs to tackle a fundamental limit on diversity and sampling. We also investigate several limits and tradeoffs of various design parameters for MB-CRNs. In addition, we explore the key MB-CRNs performance metrics that differ from the conventional metrics used for single-band based networks.
Linear precoding exploits the spatial degrees of freedom offered by multi-antenna transmitters to serve multiple users over the same frequency resources. The present work focuses on simultaneously serving multiple groups of users, each with its own channel, by transmitting a stream of common symbols to each group. This scenario is known as physical layer multicasting to multiple co-channel groups. Extending the current state of the art in multigroup multicasting, the practical constraint of a maximum permitted power level radiated by each antenna is tackled herein. The considered per antenna power constrained system is optimized in a maximum fairness sense. In other words, the optimization aims at favoring the worst user by maximizing the minimum rate. This Max-Min Fair criterion is imperative in multicast systems, where the performance of all the receivers listening to the same multicast is dictated by the worst rate in the group. An analytic framework to tackle the Max-Min Fair multigroup multicasting scenario under per antenna power constraints is therefore derived. Numerical results display the accuracy of the proposed solution and provide insights to the performance of a per antenna power constrained system.
This paper studies the use of directional antennas for received signal strength difference (RSSD) based localization using ultra-wideband and demonstrates the achievable accuracy with this localization method applied to UWB. As introduced in our previous work the RSSD localization is assisted with one Time Difference of Arrival (TDOA) estimation. The use of directional receiving antennas and an omni-directional transmitting antenna is assumed. Localization is performed in 2D. Two localization approaches are considered: RSSD using statistical channel model and fingerprinting approach. In the case of statistical channel model simulations are performed using Matlab. In the case of fingerprinting approach localization is done based on real indoor-measurements.
In this paper, a multi-hop (MH) decode-and-forward (DF) multiple-input multiple-output (MIMO) relay network has been studied. To consider a more realistic scenario, Full-Duplex (FD) operation with Relay Self-Interference (RSI) is employed. Assuming that the MIMO channels are subject to Rayleigh fading, a simple and compact closed-form outage probability expression has been derived. The key assumption to derive this result is that the mutual information of each channel could be well approximated by a Gaussian random variable. In order to obtain the resultant outage probability, a new excellent accurate approximation has been obtained for the sum of Wishart distributed complex random matrices. Numerical Monte Carlo simulations have been performed to validate our result. These simulations have shown that, for low and medium interference regime, FD mode performs better than Half-Duplex (HD) mode. On the other hand, when RSI increases, HD mode can outperforms FD mode.
In many practical applications such as direction-of-arrival (DOA) estimation and line spectral estimation, the sparsifying dictionary is usually characterized by a set of unknown parameters in a continuous domain. To apply the conventional compressed sensing to such applications, the continuous parameter space has to be discretized to a finite set of grid points. Discretization, however, incurs errors and leads to deteriorated recovery performance. To address this issue, we propose an iterative reweighted method which jointly estimates the unknown parameters and the sparse signals. Specifically, the proposed algorithm is developed by iteratively decreasing a surrogate function majorizing a given objective function, which results in a gradual and interweaved iterative process to refine the unknown parameters and the sparse signal. Numerical results show that the algorithm provides superior performance in resolving closely-spaced frequency components.
Channel state information (CSI) in the interference channel can be used to precode, align, and reduce the dimension of interference at the receivers, to achieve the channel s maximum multiplexing gain, through what is known as interference alignment. Most interference alignment algorithms require knowledge of all the interfering channels to compute the alignment precoders. CSI, considered available at the receivers, can be shared with the transmitters via limited feedback. When alignment is done by coding over frequency extensions in a single antenna system, the required CSI lies on the Grassmannian manifold and its structure can be exploited in feedback. Unfortunately, the number of channels to be shared grows with the square of the number of users, creating too much overhead with conventional feedback methods. This paper proposes Grassmannian differential feedback to reduce feedback overhead by exploiting both the channel s temporal correlation and Grassmannian structure. The performance of the proposed algorithm is characterized both analytically and numerically as a function of channel length, mobility, and the number of feedback bits. The main conclusions are that the proposed feedback strategy allows interference alignment to perform well over a wide range of Doppler spreads, and to approach perfect CSI performance in slowly varying channels. Numerical results highlight the trade-off between the frequency of feedback and the accuracy of individual feedback updates.
Next generation wireless communications rely on multiple input multiple output (MIMO) techniques to achieve high data rates. Feedback of channel information can be used in MIMO precoding to fully activate the strongest channel modes and improve MIMO performance. Unfortunately, the bandwidth of the control channel via which the feedback is conveyed is severely limited. An important issue is how to improve the MIMO precoding performance with minimal feedback. In this letter, we present a method that uses a rotating codebook technique to effectively improve the precoding performance without the need of increasing feedback overhead. The basic idea of the rotating codebook precoding is to expend the effective precoding codebook size via rotating multiple codebooks so that the number of feedback bits remains unchanged. Simulation results are presented to show the performance gain of the proposed rotating codebook precoding over the conventional precoding.
Many components used in signal processing and communication applications, such as power amplifiers and analog-to-digital converters, are nonlinear and have a finite dynamic range. The nonlinearity associated with these devices distorts the input, which can degrade the overall system performance. Signal-to-noise-and-distortion ratio (SNDR) is a common metric to quantify the performance degradation. One way to mitigate nonlinear distortions is by maximizing the SNDR. In this paper, we analyze how to maximize the SNDR of the nonlinearities in optical wireless communication (OWC) systems. Specifically, we answer the question of how to optimally predistort a double-sided memory-less nonlinearity that has both a \"turn-on\" value and a maximum \"saturation\" value. We show that the SNDR-maximizing response given the constraints is a double-sided limiter with a certain linear gain and a certain bias value. Both the gain and the bias are functions of the probability density function (PDF) of the input signal and the noise power. We also find a lower bound of the nonlinear system capacity, which is given by the SDNR and an upper bound determined by dynamic signal-to-noise ratio (DSNR). An application of the results herein is to design predistortion linearization of nonlinear devices like light emitting diodes (LEDs).
This work presents sample mean and sample variance based features that distinguish continuous phase FSK from QAM and PSK modulations. Root raised cosine pulses are used for signal generation. Support vector machines are employed for signals separation. They are trained for only one value of SNR and used to classify the signals from a wide range of SNR. A priori information about carrier amplitude, carrier phase, carrier offset, roll-off factor and initial symbol phase is relaxed. Effectiveness of the method is tested by observing the joint effects of AWGN, carrier offset, lack of symbol and sampling synchronization, and fast fading.
Consider several source nodes communicating across a wireless network to a destination node with the help of several layers of relay nodes. Recent work by Avestimehr et al. has approximated the capacity of this network up to an additive gap. The communication scheme achieving this capacity approximation is based on compress-and-forward, resulting in noise accumulation as the messages traverse the network. As a consequence, the approximation gap increases linearly with the network depth. This paper develops a computation alignment strategy that can approach the capacity of a class of layered, time-varying wireless relay networks up to an approximation gap that is independent of the network depth. This strategy is based on the compute-and-forward framework, which enables relays to decode deterministic functions of the transmitted messages. Alone, compute-and-forward is insufficient to approach the capacity as it incurs a penalty for approximating the wireless channel with complex-valued coefficients by a channel with integer coefficients. Here, this penalty is circumvented by carefully matching channel realizations across time slots to create integer-valued effective channels that are well-suited to compute-and-forward. Unlike prior constant gap results, the approximation gap obtained in this paper also depends closely on the fading statistics, which are assumed to be i.i.d. Rayleigh.
This paper proposes a spatially common sparsity based adaptive channel estimation and feedback scheme for frequency division duplex based massive multi-input multi-output (MIMO) systems, which adapts training overhead and pilot design to reliably estimate and feed back the downlink channel state information (CSI) with significantly reduced overhead. Specifically, a non-orthogonal downlink pilot design is first proposed, which is very different from standard orthogonal pilots. By exploiting the spatially common sparsity of massive MIMO channels, a compressive sensing (CS) based adaptive CSI acquisition scheme is proposed, where the consumed time slot overhead only adaptively depends on the sparsity level of the channels. Additionally, a distributed sparsity adaptive matching pursuit algorithm is proposed to jointly estimate the channels of multiple subcarriers. Furthermore, by exploiting the temporal channel correlation, a closed-loop channel tracking scheme is provided, which adaptively designs the non-orthogonal pilot according to the previous channel estimation to achieve an enhanced CSI acquisition. Finally, we generalize the results of the multiple-measurement-vectors case in CS and derive the Cramer-Rao lower bound of the proposed scheme, which enlightens us to design the non-orthogonal pilot signals for the improved performance. Simulation results demonstrate that the proposed scheme outperforms its counterparts, and it is capable of approaching the performance bound.
We consider the problem of using polar codes over slow fading wireless channels. For design, we focus on a parallel slow fading channel with 2 blocks, and polar codes with rate <= 1/2. Motivated by Arikan s systematic polar code construction, we propose an interleaver design for a general polar code. The interleaver comprises of using the bit reversal of the order of polarized bit channels. This interleaver is called a diversity interleaver. In addition to the diversity interleaver, a diversity polar code is proposed to further increase the diversity gain. The proposed designs are evaluated via link simulations for AWGN and fading channels. The simulation results show a performance close to the outage probability (within 2 dB) and significant gains over using a random interleaver.
In this paper, we analyze the benefits of including downlink pilots in a cell-free massive MIMO system. We derive an approximate per-user achievable downlink rate for conjugate beamforming processing, which takes into account both uplink and downlink channel estimation errors, and power control. A performance comparison is carried out, in terms of per-user net throughput, considering cell-free massive MIMO operation with and without downlink training, for different network densities. We take also into account the performance improvement provided by max-min fairness power control in the downlink. Numerical results show that, exploiting downlink pilots, the performance can be considerably improved in low density networks over the conventional scheme where the users rely on statistical channel knowledge only. In high density networks, performance improvements are moderate.
In this paper, the problem of designing a linear precoder for Multiple-Input Multiple-Output (MIMO) systems in conjunction with Quadrature Amplitude Modulation (QAM) is addressed. First, a novel and efficient methodology to evaluate the input-output mutual information for a general Multiple-Input Multiple-Output (MIMO) system as well as its corresponding gradients is presented, based on the Gauss-Hermite quadrature rule. Then, the method is exploited in a block coordinate gradient ascent optimization process to determine the globally optimal linear precoder with respect to the MIMO input-output mutual information for QAM systems with relatively moderate MIMO channel sizes. The proposed methodology is next applied in conjunction with the complexity-reducing per-group processing (PGP) technique, which is semi-optimal, to both perfect channel state information at the transmitter (CSIT) as well as statistical channel state information (SCSI) scenarios, with high transmitting and receiving antenna size, and for constellation size up to $M=64$. We show by numerical results that the precoders developed offer significantly better performance than the configuration with no precoder, and the maximum diversity precoder for QAM with constellation sizes $M=16,~32$, and $~64$ and for MIMO channel size $100\\times100$.
Random sampling in compressive sensing (CS) enables the compression of large amounts of input signals in an efficient manner, which is useful for many applications. CS reconstructs the compressed signals exactly with overwhelming probability when incoming data can be sparsely represented with a few components. However, the theory of CS framework including random sampling has been focused on exact recovery of signal; impreciseness in signal recovery has been neglected. This can be problematic when there is uncertainty in the number of sparse components such as signal sparsity in dynamic systems that can change over time. We present a new theoretical framework that handles uncertainty in signal recovery from the perspective of recovery success and quality. We show that the signal recovery success in our model is more accurate than the success probability analysis in the CS framework. Our model is then extended to the case where the success or failure of signal recovery can be relaxed. We represent the number of components included in signal recovery with a right-tailed distribution and focus on recovery quality. Experimental results confirm the accuracy of our model in dynamic systems.
Multi-replicA decoding using corRelation baSed LocALisAtion (MARSALA) is a recent random access technique designed for satellite return links. It follows the multiple transmission and interference cancellation scheme of Contention Resolution Diversity Slotted Aloha (CRDSA). In addition, at the receiver side, MARSALA uses autocorrelation to localise replicas of a same packet so as to coherently combine them. Previous work has shown good performance of MARSALA with an assumption of ideal channel state information and perfectly coherent combining of the different replicas of a given packet. However, in a real system, synchronisation errors such as timing offsets and phase shifts between the replicas on separate timeslots will result in less constructive combining of the received signals. This paper describes a method to estimate and compensate the timing and phase differences between the replicas, prior to their combination. Then, the impact of signal misalignment in terms of residual timing offsets and phase shifts, is modeled and evaluated analytically. Finally, the performance of MARSALA in realistic channel conditions is assessed through simulations, and compared to CRDSA in various scenarios.
This letter studies the power-limited throughput of a communication system utilizing incremental redundancy (INR) hybrid automatic repeat request (HARQ). We use some recent results on the achievable rates of finite-length codes to analyze the system performance. With codewords of finite length, we derive closed-form expressions for the outage probabilities of INR HARQ and study the throughput in the cases with variable-length coding. Moreover, we evaluate the effect of feedback delay on the throughput and derive sufficient conditions for the usefulness of the HARQ protocols, in terms of power-limited throughput. The results show that, for a large range of HARQ feedback delays, the throughput is increased by finite-length coding INR HARQ, if the sub-codeword lengths are properly adapted.
Clarke and Barron analysed the relative entropy between an i.i.d. source and a Bayesian mixture over a continuous class containing that source. In this paper a comparable result is obtained when the source is permitted to be both non-stationary and dependent. The main theorem shows that Bayesian methods perform well for both compression and sequence prediction even in this most general setting with only mild technical assumptions.
In this paper, throughput and energy efficiency of cognitive multiple-input multiple-output (MIMO) systems operating under quality-of-service (QoS) constraints, interference limitations, and imperfect channel sensing, are studied. It is assumed that transmission power and covariance of the input signal vectors are varied depending on the sensed activities of primary users (PUs) in the system. Interference constraints are applied on the transmission power levels of cognitive radios (CRs) to provide protection for the PUs whose activities are modeled as a Markov chain. Considering the reliability of the transmissions and channel sensing results, a state-transition model is provided. Throughput is determined by formulating the effective capacity. First derivative of the effective capacity is derived in the low-power regime and the minimum bit energy requirements in the presence of QoS limitations and imperfect sensing results are identified. Minimum energy per bit is shown to be achieved by beamforming in the maximal-eigenvalue eigenspace of certain matrices related to the channel matrix. In a special case, wideband slope is determined for more refined analysis of energy efficiency. Numerical results are provided for the throughput for various levels of buffer constraints and different number of transmit and receive antennas. The impact of interference constraints and benefits of multiple-antenna transmissions are determined. It is shown that increasing the number of antennas when the interference power constraint is stringent is generally beneficial. On the other hand, it is shown that under relatively loose interference constraints, increasing the number of antennas beyond a certain level does not lead to much increase in the throughput.
The basic two-terminal common randomness (CR) and key generation models are considered, where the communication between the terminals may be limited, and in particular may not be enough to achieve the maximum CR/key rate. We introduce general notions of $XY$-absolutely continuity and $XY$-concave function, and characterize the first order CR/key-communication tradeoff in terms of the evaluation of the $XY$-concave envelope of a functional defined on a set of distributions, which is simpler than the multi-letter characterization. Two extreme cases are given special attention. First, in the regime of very small communication rates, the CR bits per interaction bit (CRBIB) and key bits per interaction bit (KBIB) are expressed with a new \"symmetrical strong data processing constant\", defined as the minimum of a parameter such that a certain information-theoretic functional touches its $XY$-concave envelope at a given source distribution. We also provide a computationally friendly strong converse bound for CRBIB and a similar (but not necessarily strong) one for KBIB in terms of the supremum of the maximal correlation coefficient over a set of distributions. The proof uses hypercontractivity and properties of the R\\ enyi divergence. A criterion the tightness of the bound is given with applications to binary symmetric sources. Second, a new characterization of the minimum interaction rate needed for achieving the maximum key rate (MIMK) is given, and we resolve a conjecture by Tyagi and Narayan \\cite{tyagi2013common} regarding the MIMK for binary sources. We also propose a new conjecture for binary symmetric sources.
Based on closed-form interference alignment (IA) solutions, a low overhead distributed interference alignment (LOIA) scheme is proposed in this paper for the $K$-user SISO interference channel, and extension to multiple antenna scenario is also considered. Compared with the iterative interference alignment (IIA) algorithm proposed by Gomadam et al., the overhead is greatly reduced. Simulation results show that the IIA algorithm is strictly suboptimal compared with our LOIA algorithm in the overhead-limited scenario.
We study the fundamental limits to secret key generation from an excited distributed source (EDS). In an EDS a pair of terminals observe dependent sources of randomness excited by a pre-arranged signal. We first determine the secret key capacity for such systems with one-way public messaging. We then characterize a tradeoff between the secret key rate and exponential bounds on the probability of key agreement failure and on the secrecy of the key generated. We find that there is a fundamental tradeoff between reliability and secrecy. We then explore this framework within the context of reciprocal wireless channels. In this setting, the users transmit pre-arranged excitation signals to each other. When the fading is Rayleigh, the observations of the users are jointly Gaussian sources. We show that an on-off excitation signal with an SNR-dependent duty cycle achieves the secret key capacity of this system. Furthermore, we characterize a fundamental metric -- minimum energy per key bit for reliable key generation -- and show that in contrast to conventional AWGN channels, there is a non-zero threshold SNR that achieves the minimum energy per key bit. The capacity achieving on-off excitation signal achieves the minimum energy per key bit at any SNR below the threshold. Finally, we build off our error exponent results to investigate the energy required to generate a key using a finite block length. Again we find that on-off excitation signals yield an improvement when compared to constant excitation signals. In addition to Rayleigh fading, we analyze the performance of a system based on binary channel phase quantization.
This paper addresses the problem of unsupervised soft bit error rate (BER) estimation for any communications system, where no prior knowledge either about transmitted information bits, or the transceiver scheme is available. We show that the problem of BER estimation is equivalent to estimating the conditional probability density functions (pdf)s of soft channel/receiver outputs. Assuming that the receiver has no analytical model of soft observations, we propose a non parametric Kernel-based pdf estimation technique, and show that the resulting BER estimator is asymptotically unbiased and point-wise consistent. We then introduce an iterative Stochastic Expectation Maximization (EM) algorithm for the estimation of both a priori and a posteriori probabilities of transmitted information bits, and the classification of soft observations according to transmitted bit values. These inputs serve in the iterative Kernel-based estimation procedure of conditional pdfs. We analyze the performance of the proposed unsupervised and non parametric BER estimator in the framework of a multiuser code division multiple access (CDMA) system with single user detection, and show that attractive performance are achieved compared with conventional Monte Carlo (MC)-aided techniques.
In full-duplex systems, oscillator phase noise (PN) problem is considered the bottleneck challenge that may face the self-interference cancellation (SIC) stage especially when orthogonal frequency division multiplexing (OFDM) transmission scheme is deployed. Phase noise degrades the SIC performance significantly, if not mitigated before or during the SIC technique. The presence of the oscillator phase noise has different impacts on the transmitted data symbol like common phase error (CPE) and inter-carrier interference (ICI). However, phase noise can be estimated and mitigated digitally in either time or frequency domain. Through this work, we propose a novel and simple time domain self-interference (SI) phase noise estimation and mitigation technique. The proposed algorithm is inspired from Wiener filtering in time domain. Simulation results show that the proposed algorithm has a superior performance than the already-existing time-domain or frequency domain PN mitigation solutions with a noticeable reduction in the computational complexity.
In this paper we investigate the achievable rate of a system that includes a nomadic transmitter with several antennas, which is received by multiple agents, exhibiting independent channel gains and additive circular-symmetric complex Gaussian noise. In the nomadic regime, we assume that the agents do not have any decoding ability. These agents process their channel observations and forward them to the final destination through lossless links with a fixed capacity. We propose new achievable rates based on elementary compression and also on a Wyner-Ziv (CEO-like) processing, for both fast fading and block fading channels, as well as for general discrete channels. The simpler two agents scheme is solved, up to an implicit equation with a single variable. Limiting the nomadic transmitter to a circular-symmetric complex Gaussian signalling, new upper bounds are derived for both fast and block fading, based on the vector version of the entropy power inequality. These bounds are then compared to the achievable rates in several extreme scenarios. The asymptotic setting with numbers of agents and transmitter s antennas taken to infinity is analyzed. In addition, the upper bounds are analytically shown to be tight in several examples, while numerical calculations reveal a rather small gap in a finite $2\\times2$ setting. The advantage of the Wyner-Ziv approach over elementary compression is shown where only the former can achieve the full diversity-multiplexing tradeoff. We also consider the non-nomadic setting, with agents that can decode. Here we give an achievable rate, over fast fading channel, which combines broadcast with dirty paper coding and the decentralized reception, which was introduced for the nomadic setting.
Let $m$, $k$ be positive integers such that $\\frac{m}{\\gcd(m,k)}\\geq 3$, $p$ be an odd prime and $\\pi $ be a primitive element of $\\mathbb{F}_{p^m}$. Let $h_1(x)$ and $h_2(x)$ be the minimal polynomials of $-\\pi^{-1}$ and $\\pi^{-\\frac{p^k+1}{2}}$ over $\\mathbb{F}_p$, respectively. In the case of odd $\\frac{m}{\\gcd(m,k)}$, when $k$ is even, $\\gcd(m,k)$ is odd or when $\\frac{k}{\\gcd(m,k)}$ is odd, Zhou et~al. in \\cite{zhou} obtained the weight distribution of a class of cyclic codes $\\mathcal{C}$ over $\\mathbb{F}_p$ with parity-check polynomial $h_1(x)h_2(x)$. In this paper, we further investigate this class of cyclic codes $\\mathcal{C}$ over $\\mathbb{F}_p$ in the rest case of odd $\\frac{m}{\\gcd(m,k)}$ and the case of even $\\frac{m}{\\gcd(m,k)}$. Moreover, we determine the weight distribution of cyclic codes $\\mathcal{C}$.
This paper is devoted to the finite-length analysis of turbo decoding over the binary erasure channel (BEC). The performance of iterative belief-propagation (BP) decoding of low-density parity-check (LDPC) codes over the BEC can be characterized in terms of stopping sets. We describe turbo decoding on the BEC which is simpler than turbo decoding on other channels. We then adapt the concept of stopping sets to turbo decoding and state an exact condition for decoding failure. Apply turbo decoding until the transmitted codeword has been recovered, or the decoder fails to progress further. Then the set of erased positions that will remain when the decoder stops is equal to the unique maximum-size turbo stopping set which is also a subset of the set of erased positions. Furthermore, we present some improvements of the basic turbo decoding algorithm on the BEC. The proposed improved turbo decoding algorithm has substantially better error performance as illustrated by the given simulation results. Finally, we give an expression for the turbo stopping set size enumerating function under the uniform interleaver assumption, and an efficient enumeration algorithm of small-size turbo stopping sets for a particular interleaver. The solution is based on the algorithm proposed by Garello et al. in 2001 to compute an exhaustive list of all low-weight codewords in a turbo code.
This paper studies the possibility of eliminating the redundant cyclic prefix (CP) of orthogonal frequency division multiplexing (OFDM) in massive multiple-input multiple-output systems. The absence of CP increases the bandwidth efficiency in expense of intersymbol interference (ISI) and intercarrier interference (ICI). It is known that in massive MIMO, different types of interference fade away as the number of base station (BS) antennas tends to infinity. In this paper, we investigate if the channel distortions in the absence of CP are averaged out in the large antenna regime. To this end, we analytically study the performance of the conventional maximum ratio combining (MRC) and realize that there always remains some residual interference leading to saturation of signal to interference (SIR). This saturation of SIR is quantified through mathematical equations. Moreover, to resolve the saturation problem, we propose a technique based on time-reversal MRC with zero forcing multiuser detection (TR-ZF). Thus, the SIR of our proposed TR-ZF does not saturate and is a linear function of the number of BS antennas. We also show that TR-ZF only needs one OFDM demodulator per user irrespective of the number of BS antennas; reducing the BS signal processing complexity significantly. Finally, we corroborate our claims as well as analytical results through simulations.
In this paper, a new family of proportionate normalized least mean square (PNLMS) adaptive algorithms that improve the performance of identifying block-sparse systems is proposed. The main proposed algorithm, called block-sparse PNLMS (BS-PNLMS), is based on the optimization of a mixed l2,1 norm of the adaptive filter coefficients. It is demonstrated that both the NLMS and the traditional PNLMS are special cases of BS-PNLMS. Meanwhile, a block-sparse improved PNLMS (BS-IPNLMS) is also derived for both sparse and dispersive impulse responses. Simulation results demonstrate that the proposed BS-PNLMS and BS-IPNLMS algorithms outperformed the NLMS, PNLMS and IPNLMS algorithms with only a modest increase in computational complexity.
This paper studies the information-theoretic limits of a secondary or cognitive radio (CR) network under spectrum sharing with an existing primary radio network. In particular, the fading cognitive multiple-access channel (C-MAC) is first studied, where multiple secondary users transmit to the secondary base station (BS) under both individual transmit-power constraints and a set of interference-power constraints each applied at one of the primary receivers. This paper considers the long-term (LT) or the short-term (ST) transmit-power constraint over the fading states at each secondary transmitter, combined with the LT or ST interference-power constraint at each primary receiver. In each case, the optimal power allocation scheme is derived for the secondary users to achieve the ergodic sum capacity of the fading C-MAC, as well as the conditions for the optimality of the dynamic time-division-multiple-access (D-TDMA) scheme in the secondary network. The fading cognitive broadcast channel (C-BC) that models the downlink transmission in the secondary network is then studied under the LT/ST transmit-power constraint at the secondary BS jointly with the LT/ST interference-power constraint at each of the primary receivers. It is shown that D-TDMA is indeed optimal for achieving the ergodic sum capacity of the fading C-BC for all combinations of transmit-power and interference-power constraints.
In this paper, we study the performance of the downlink of a cellular network with automatic repeat-request (ARQ) and a half duplex decode-and-forward shared relay. In this system, two multiple-input-multiple-output (MIMO) base stations serve two single antenna users. A MIMO shared relay retransmits the lost packets to the target users. First, we study the system with direct retransmission from the base station and derive a closed form expression for the outage probability of the system.We show that the direct retransmission can overcome the fading, however, it cannot overcome the interference. After that, we invoke the shared relay and design the relay beamforming matrices such that the signal-to-interference-and-noise ratio (SINR) is improved at the users subject to power constraints on the relay. In the case when the transmission of only one user fails, we derive a closed form solution for the relay beamformers. On the other hand when both transmissions fail, we pose the beamforming problem as a sequence of non-convex feasibility problems. We use semidefinite relaxation (SDR) to convert each feasibility problem into a convex optimization problem. We ensure a rank one solution, and hence, there is no loss of optimality in SDR. Simulation results are presented showing the superior performance of the proposed relay beamforming strategy compared to direct ARQ system in terms of the outage probability.
Cluster-sparse channels often exist in frequencyselective fading broadband communication systems. The main reason is received scattered waveform exhibits cluster structure which is caused by a few reflectors near the receiver. Conventional sparse channel estimation methods have been proposed for general sparse channel model which without considering the potential cluster-sparse structure information. In this paper, we investigate the cluster-sparse channel estimation (CS-CE) problems in the state of the art orthogonal frequencydivision multiplexing (OFDM) systems. Novel Bayesian clustersparse channel estimation (BCS-CE) methods are proposed to exploit the cluster-sparse structure by using block sparse Bayesian learning (BSBL) algorithm. The proposed methods take advantage of the cluster correlation in training matrix so that they can improve estimation performance. In addition, different from our previous method using uniform block partition information, the proposed methods can work well when the prior block partition information of channels is unknown. Computer simulations show that the proposed method has a superior performance when compared with the previous methods.
We consider correlated and distributed sources without cooperation at the encoder. For these sources, we derive the best achievable performance in the rate-distortion sense of any distributed compressed sensing scheme, under the constraint of high--rate quantization. Moreover, under this model we derive a closed--form expression of the rate gain achieved by taking into account the correlation of the sources at the receiver and a closed--form expression of the average performance of the oracle receiver for independent and joint reconstruction. Finally, we show experimentally that the exploitation of the correlation between the sources performs close to optimal and that the only penalty is due to the missing knowledge of the sparsity support as in (non distributed) compressed sensing. Even if the derivation is performed in the large system regime, where signal and system parameters tend to infinity, numerical results show that the equations match simulations for parameter values of practical interest.
The mathematical theory of compressed sensing (CS) asserts that one can acquire signals from measurements whose rate is much lower than the total bandwidth. Whereas the CS theory is now well developed, challenges concerning hardware implementations of CS-based acquisition devices-especially in optics-have only started being addressed. This paper presents an implementation of compressive sensing in fluorescence microscopy and its applications to biomedical imaging. Our CS microscope combines a dynamic structured wide-field illumination and a fast and sensitive single-point fluorescence detection to enable reconstructions of images of fluorescent beads, cells, and tissues with undersampling ratios (between the number of pixels and number of measurements) up to 32. We further demonstrate a hyperspectral mode and record images with 128 spectral channels and undersampling ratios up to 64, illustrating the potential benefits of CS acquisition for higher-dimensional signals, which typically exhibits extreme redundancy. Altogether, our results emphasize the interest of CS schemes for acquisition at a significantly reduced rate and point to some remaining challenges for CS fluorescence microscopy.
Accurate channel state information (CSI) is required for coherent detection in time-variant multiple-input multipleoutput (MIMO) communication systems using orthogonal frequency division multiplexing (OFDM) modulation. One of low-complexity and stable adaptive channel estimation (ACE) approaches is the normalized least mean square (NLMS)-based ACE. However, it cannot exploit the inherent sparsity of MIMO channel which is characterized by a few dominant channel taps. In this paper, we propose two adaptive sparse channel estimation (ASCE) methods to take advantage of such sparse structure information for time-variant MIMO-OFDM systems. Unlike traditional NLMS-based method, two proposed methods are implemented by introducing sparse penalties to the cost function of NLMS algorithm. Computer simulations confirm obvious performance advantages of the proposed ASCEs over the traditional ACE.
A rewriting code construction for flash memories based upon lattices is described. The values stored in flash cells correspond to lattice points. This construction encodes information to lattice points in such a way that data can be written to the memory multiple times without decreasing the cell values. The construction partitions the flash memory s cubic signal space into blocks. The minimum number of writes is shown to be linear in one of the code parameters. An example using the E8 lattice is given, with numerical results.
An information theoretic formulation of the distributed averaging problem previously studied in computer science and control is presented. We assume a network with m nodes each observing a WGN source. The nodes communicate and perform local processing with the goal of computing the average of the sources to within a prescribed mean squared error distortion. The network rate distortion function R^*(D) for a 2-node network with correlated Gaussian sources is established. A general cutset lower bound on R^*(D) is established and shown to be achievable to within a factor of 2 via a centralized protocol over a star network. A lower bound on the network rate distortion function for distributed weighted-sum protocols, which is larger in order than the cutset bound by a factor of log m is established. An upper bound on the network rate distortion function for gossip-base weighted-sum protocols, which is only log log m larger in order than the lower bound for a complete graph network, is established. The results suggest that using distributed protocols results in a factor of log m increase in order relative to centralized protocols.
This paper develops a low-complexity channel estimation (CE) scheme based on compressive sensing (CS) for time-domain synchronous (TDS) orthogonal frequency-division multiplexing (OFDM) to overcome the performance loss under doubly selective fading channels. Specifically, an overlap-add method of the time-domain training sequence is first proposed to obtain the coarse estimates of the channel length, path delays and path gains of the wireless channel, by exploiting the channel s temporal correlation to improve the robustness of the coarse CE under the severe fading channel with long delay spread. We then propose the priori-information aided (PA) iterative hard threshold (IHT) algorithm, which utilizes the priori information of the acquired coarse estimate for the wireless channel and therefore is capable of obtaining an accurate channel estimate of the doubly selective fading channel. Compared with the classical IHT algorithm whose convergence requires the $l_2$ norm of the measurement matrix being less than 1, the proposed PA-IHT algorithm exploits the priori information acquired to remove such a limitation as well as to reduce the number of required iterations. Compared with the existing CS based CE method for TDS-OFDM, the proposed PA-IHT algorithm significantly reduces the computational complexity of CE as well as enhances the CE accuracy. Simulation results demonstrate that, without sacrificing spectral efficiency and changing the current TDS-OFDM signal structure, the proposed scheme performs better than the existing CE schemes for TDS-OFDM in various scenarios, especially under severely doubly selective fading channels.
A centralized coded caching system, consisting of a server delivering N popular files, each of size F bits, to K users through an error-free shared link, is considered. It is assumed that each user is equipped with a local cache memory with capacity MF bits, and contents can be proactively cached into these caches over a low traffic period; however, without the knowledge of the user demands. During the peak traffic period each user requests a single file from the server. The goal is to minimize the number of bits delivered by the server over the shared link, known as the delivery rate, over all user demand combinations. A novel coded caching scheme for the cache capacity of M= (N-1)/K is proposed. It is shown that the proposed scheme achieves a smaller delivery rate than the existing coded caching schemes in the literature when K > N >= 3. Furthermore, we argue that the delivery rate of the proposed scheme is within a constant multiplicative factor of 2 of the optimal delivery rate for cache capacities 1/K <= M <= (N-1)/K, when K > N >= 3.
In this paper, a mathematical framework for the analysis of average symbol error probability (ASEP) in millimeter wave (mmWave) cellular networks with Poisson Point Process (PPP) distributed base stations (BSs) is developed using tools from stochastic geometry. The distinguishing features of mmWave communications such as directional beamforming and having different path loss laws for line-of-sight (LOS) and non-line-of-sight (NLOS) links are incorporated in the average error probability analysis. First, average pairwise error probability (APEP) expression is obtained by averaging pairwise error probability (PEP) over fading and random shortest distance from mobile user (MU) to its serving BS. Subsequently, average symbol error probability is approximated from APEP using the nearest neighbor (NN) approximation. ASEP is analyzed for different antenna gains and base station densities. Finally, the effect of beamforming alignment errors on ASEP is investigated to get insight on more realistic cases.
An uplink multi secondary user (SU) cognitive radio system having average delay constraints as well as an interference constraint to the primary user (PU) is considered. If the interference channels between the SUs and the PU are statistically heterogeneous due to the different physical locations of the different SUs, the SUs will experience different delay performances. This is because SUs located closer to the PU transmit with lower power levels. Two dynamic scheduling-and-power-allocation policies that can provide the required average delay guarantees to all SUs irrespective of their locations are proposed. The first policy solves the problem when the interference constraint is an instantaneous one, while the second is for problems with long-term average interference constraints. We show that although the average interference problem is an extension to the instantaneous interference one, the solution is totally different. The two policies, derived using the Lyapunov optimization technique, are shown to be asymptotically delay optimal while satisfying the delay and interference constraints. Our findings are supported by extensive system simulations and shown to outperform existing policies as well as shown to be robust to channel estimation errors.
In this study, we obtain new classes of linear codes over Hurwitz integers equipped with a new metric. We refer to the metric as Hurwitz metric. The codes with respect to Hurwitz metric use in coded modu- lation schemes based on quadrature amplitude modulation (QAM)-type constellations, for which neither Hamming metric nor Lee metric. Also, we define decoding algorithms for these codes when up to two coordinates of a transmitted code vector are effected by error of arbitrary Hurwitz weight.
In this paper we deal with the linear frequency modulated signals and radar signals that are affected by disturbance which is the inevitable phenomenon in everyday communications. The considered cases represent the cases when the signals of interest overlap with other signals or with noise. In order to successfully separate these signals we propose the compressive sensing method, which states that the useful signal part can be separated successfully from a small amount of measurements as long as the acquired signal can be presented as sparse in a certain transformation domain. The effectiveness of our approach is proven experimentally through examples.
Multiple-input multiple-output (MIMO) radar systems have been shown to achieve superior resolution as compared to traditional radar systems with the same number of transmit and receive antennas. This paper considers a distributed MIMO radar scenario, in which each transmit element is a node in a wireless network, and investigates the use of compressive sampling for direction-of-arrival (DOA) estimation. According to the theory of compressive sampling, a signal that is sparse in some domain can be recovered based on far fewer samples than required by the Nyquist sampling theorem. The DOA of targets form a sparse vector in the angle space, and therefore, compressive sampling can be applied for DOA estimation. The proposed approach achieves the superior resolution of MIMO radar with far fewer samples than other approaches. This is particularly useful in a distributed scenario, in which the results at each receive node need to be transmitted to a fusion center for further processing.
In this paper, we present a belief propagation (BP) based algorithm for decoding non-orthogonal space-time block codes (STBC) from cyclic division algebras (CDA) having {\\em large dimensions}. The proposed approach involves message passing on Markov random field (MRF) representation of the STBC MIMO system. Adoption of BP approach to decode non-orthogonal STBCs of large dimensions has not been reported so far. Our simulation results show that the proposed BP-based decoding achieves increasingly closer to SISO AWGN performance for increased number of dimensions. In addition, it also achieves near-capacity turbo coded BER performance; for e.g., with BP decoding of $24\\times 24$ STBC from CDA using BPSK (i.e., 576 real dimensions) and rate-1/2 turbo code (i.e., 12 bps/Hz spectral efficiency), coded BER performance close to within just about 2.5 dB from the theoretical MIMO capacity is achieved.
We consider energy-efficient wireless resource management in cellular networks where BSs are equipped with energy harvesting devices, using statistical information for traffic intensity and harvested energy. The problem is formulated as adapting BSs  on-off states, active resource blocks (e.g. subcarriers) as well as power allocation to minimize the average grid power consumption in a given time period while satisfying the users  quality of service (blocking probability) requirements. It is transformed into an unconstrained optimization problem to minimize a weighted sum of grid power consumption and blocking probability. A two-stage dynamic programming (DP) algorithm is then proposed to solve this optimization problem, by which the BSs  on-off states are optimized in the first stage, and the active BS s resource blocks are allocated iteratively in the second stage. Compared with the optimal joint BSs  on-off states and active resource blocks allocation algorithm, the proposed algorithm greatly reduces the computational complexity, while at the same time achieves close to the optimal energy saving performance.
In this paper we consider a time-division duplex cell-free massive multiple-input multiple-output (MIMO) system where many distributed access points (APs) simultaneously serve many users. A normalized conjugate beamforming scheme, which satisfies short-term average power constraints at the APs, is proposed and analyzed taking into account the effect of imperfect channel information. We derive an approximate closed-form expression for the per-user achievable downlink rate of this scheme. We also provide, analytically and numerically, a performance comparison between the normalized conjugate beamforming and the conventional conjugate beamforming scheme in [1] (which satisfies long-term average power constraints). Normalized conjugate beamforming scheme reduces the beamforming uncertainty gain, which comes from the users  lack of the channel state information knowledge, and hence, it improves the achievable downlink rate compared to the conventional conjugate beamforming scheme.
To reduce the implementation complexity of a belief propagation (BP) based low-density parity-check (LDPC) decoder, shuffled BP decoding schedules, which serialize the decoding process by dividing a complete parallel message-passing iteration into a sequence of sub-iterations, have been proposed. The so-called group horizontal shuffled BP algorithm partitions the check nodes of the code graph into groups to perform group-by-group message-passing decoding. This paper proposes a new grouping technique to accelerate the message-passing rate. Performance of the proposed algorithm is analyzed by a Gaussian approximation approach. Both analysis and numerical experiments verify that the new algorithm does yield a convergence rate faster than that of existing conventional or group shuffled BP decoder with the same computing complexity constraint.
This paper proposes an encoding/decoding framework for achieving the optimal channel capacities of the two-user broadcast channel where each user (receiver) has the message targeted for the other user (receiver) as side information. Since the link qualities of the channels from the base station to the two users are different, their respective single-user non-broadcast channel capacities are also different. A goal is to simultaneously achieve/approach the single-user non-broadcast channel capacities of the two users with a single broadcast transmission by applying network coding. This is referred to as the \\emph{rate-diverse wireless network coding} problem. For this problem, this paper presents a capacity-achieving framework based on linear- structured nested lattice codes. The significance of the proposed framework, besides its theoretical optimality, is that it suggests a general design principle for linear rate-diverse wireless network coding going beyond the use of lattice codes. We refer to this design principle as the \\emph{principle of virtual single-user channels}. Guided by this design principle, we propose two implementations of our encoding/decoding framework using practical linear codes amenable to decoding with affordable complexities: the first implementation is based on Low Density Lattice Codes (LDLC) and the second implementation is based on Bit-interleaved Coded Modulation (BICM). These two implementations demonstrate the validity and performance advantage of our framework.
The channel capacity theorem for additive white Gaussian noise channel (AWGN), widely known as the Shannon-Hartley Law, expresses the information capacity of a channel bandlimited in the conventional Fourier domain in terms of the signal-to-noise ratio in it. In this letter generalized versions of the Shannon-Hartley Law using the linear canonical transform (LCT) are presented. The channel capacity for AWGN channels is found to be a function of the LCT parameters.
In large scale distributed storage systems (DSS) deployed in cloud computing, correlated failures resulting in simultaneous failure (or, unavailability) of blocks of nodes are common. In such scenarios, the stored data or a content of a failed node can only be reconstructed from the available live nodes belonging to available blocks. To analyze the resilience of the system against such block failures, this work introduces the framework of Block Failure Resilient (BFR) codes, wherein the data (e.g., file in DSS) can be decoded by reading out from a same number of codeword symbols (nodes) from each available blocks of the underlying codeword. Further, repairable BFR codes are introduced, wherein any codeword symbol in a failed block can be repaired by contacting to remaining blocks in the system. Motivated from regenerating codes, file size bounds for repairable BFR codes are derived, trade-off between per node storage and repair bandwidth is analyzed, and BFR-MSR and BFR-MBR points are derived. Explicit codes achieving these two operating points for a wide set of parameters are constructed by utilizing combinatorial designs, wherein the codewords of the underlying outer codes are distributed to BFR codeword symbols according to projective planes.
Suppose that we have $r$ sensors and each one intends to send a function $z_i$ (e.g. a signal or an image) to a receiver common to all $r$ sensors. During transmission, each $z_i$ gets convolved with a function $g_i$. The receiver records the function $y$, given by the sum of all these convolved signals. When and under which conditions is it possible to recover the individual signals $z_i$ and the blurring functions $g_i$ from just one received signal $y$? This challenging problem, which intertwines blind deconvolution with blind demixing, appears in a variety of applications, such as audio processing, image processing, neuroscience, spectroscopy, and astronomy. It is also expected to play a central role in connection with the future Internet-of-Things. We will prove that under reasonable and practical assumptions, it is possible to solve this otherwise highly ill-posed problem and recover the $r$ transmitted functions $z_i$ and the impulse responses $g_i$ in a robust, reliable, and efficient manner from just one single received function $y$ by solving a semidefinite program. We derive explicit bounds on the number of measurements needed for successful recovery and prove that our method is robust in presence of noise. Our theory is actually a bit pessimistic, since numerical experiments demonstrate that, quite remarkably, recovery is still possible if the number of measurements is close to the number of degrees of freedom.
We consider a natural measure of relevance: the reduction in optimal prediction risk in the presence of side information. For any given loss function, this relevance measure captures the benefit of side information for performing inference on a random variable under this loss function. When such a measure satisfies a natural data processing property, and the random variable of interest has alphabet size greater than two, we show that it is uniquely characterized by the mutual information, and the corresponding loss function coincides with logarithmic loss. In doing so, our work provides a new characterization of mutual information, and justifies its use as a measure of relevance. When the alphabet is binary, we characterize the only admissible forms the measure of relevance can assume while obeying the specified data processing property. Our results naturally extend to measuring causal influence between stochastic processes, where we unify different causal-inference measures in the literature as instantiations of directed information.
The problem of maximizing the average rate in a multicast network subject to a coverage constraint (minimum quality of service) is studied. Assuming the channel state information is available only at the receiver side and single antenna nodes, the highest expected rate achievable by a random user in the network, called expected typical rate, is derived in two scenarios: hard coverage constraint and soft coverage constraint. In the first case, the coverage is expressed in terms of the outage probability, while in the second case, the expected rate should satisfy certain minimum requirement. It is shown that the optimum solution in both cases (achieving the highest expected typical rate for given coverage requirements) is achieved by an infinite layer superposition code for which the optimum power allocation among the different layers is derived. For the MISO case, a suboptimal coding scheme is proposed, which is shown to be asymptotically optimal, when the number of transmit antennas grows at least logarithmically with the number of users in the network.
In this paper, we consider the uplink of cell-free massive MIMO systems, where a large number of distributed single antenna access points (APs) serve a much smaller number of users simultaneously via limited backhaul. For the first time, we investigate the performance of compute-and-forward (C&F) in such an ultra dense network with a realistic channel model (including fading, pathloss and shadowing). By utilising the characteristic of pathloss, a low complexity coefficient selection algorithm for C\\&F is proposed. We also give a greedy AP selection method for message recovery. Additionally, we compare the performance of C&F to some other promising linear strategies for distributed massive MIMO, such as small cells (SC) and maximum ratio combining (MRC). Numerical results reveal that C&F not only reduces the backhaul load, but also significantly increases the system throughput for the symmetric scenario.
Cyclic codes are a subclass of linear codes and have applications in consumer electronics, data storage systems, and communication systems as they have efficient encoding and decoding algorithms. In this paper, a class of three-weight cyclic codes over $\\gf(p)$ whose duals have two zeros is presented, where $p$ is an odd prime. The weight distribution of this class of cyclic codes is settled. Some of the cyclic codes are optimal. The duals of a subclass of the cyclic codes are also studied and proved to be optimal.
A complete classification of the perfect binary one-error-correcting codes of length 15 as well as their extensions of length 16 was recently carried out in [P. R. J. \\\"Osterg{\\aa}rd and O. Pottonen, \"The perfect binary one-error-correcting codes of length 15: Part I--Classification,\" IEEE Trans. Inform. Theory vol. 55, pp. 4657--4660, 2009]. In the current accompanying work, the classified codes are studied in great detail, and their main properties are tabulated. The results include the fact that 33 of the 80 Steiner triple systems of order 15 occur in such codes. Further understanding is gained on full-rank codes via switching, as it turns out that all but two full-rank codes can be obtained through a series of such transformations from the Hamming code. Other topics studied include (non)systematic codes, embedded one-error-correcting codes, and defining sets of codes. A classification of certain mixed perfect codes is also obtained.
To detect M-ary pulse amplitude modulation signals reliably in an FSO communication system, the receiver requires accurate knowledge about the instantaneous channel attenuation on the signal. We derive here an optimum, symbol-by-symbol receiver that jointly estimates the attenuation with the help of past detected data symbols and detects the data symbols accordingly. Few pilot symbols are required, resulting in high spectral efficiency. Detection can be performed with a very low complexity. From both theoretical analysis and simulation, we show that as the number of the detected data symbols used for estimating the channel attenuation increases, the bit error probability of our receiver approaches that of detection with perfect channel knowledge.
In this paper, we propose a Bayesian Hypothesis Testing Algorithm (BHTA) for sparse representation. It uses the Bayesian framework to determine active atoms in sparse representation of a signal. The Bayesian hypothesis testing based on three assumptions, determines the active atoms from the correlations and leads to the activity measure as proposed in Iterative Detection Estimation (IDE) algorithm. In fact, IDE uses an arbitrary decreasing sequence of thresholds while the proposed algorithm is based on a sequence which derived from hypothesis testing. So, Bayesian hypothesis testing framework leads to an improved version of the IDE algorithm. The simulations show that Hard-version of our suggested algorithm achieves one of the best results in terms of estimation accuracy among the algorithms which have been implemented in our simulations, while it has the greatest complexity in terms of simulation time.
Polar codes are the first provable capacity-achieving forward error correction (FEC) codes. In general polar codes can be decoded via either successive cancellation (SC) or belief propagation (BP) decoding algorithm. However, to date practical applications of polar codes have been hindered by the long decoding latency and limited error-correcting performance problems. In this paper, based on our recent proposed early stopping criteria for the BP algorithm, we propose a hybrid BP-SC decoding scheme to improve the decoding performance of polar codes with relatively short latency. Simulation results show that, for (1024, 512) polar codes the proposed approach leads to at least 0.2dB gain over the BP algorithm with the same maximum number of iterations for the entire SNR region, and also achieves 0.2dB decoding gain over the BP algorithm with the same worst-case latency in the high SNR region. Besides, compared to the SC algorithm, the proposed scheme leads to 0.2dB gain in the medium SNR region with much less average decoding latency. In addition, we also propose the low-complexity unified hardware architecture for the hybrid decoding scheme, which is able to implement SC and BP algorithms using same hardware.
In this paper, we study the capacity of the diamond channel. We focus on the special case where the channel between the source node and the two relay nodes are two separate links with finite capacities and the link from the two relay nodes to the destination node is a Gaussian multiple access channel. We call this model the Gaussian multiple access diamond channel. We first propose an upper bound on the capacity. This upper bound is a single-letterization of an $n$-letter upper bound proposed by Traskov and Kramer, and is tighter than the cut-set bound. As for the lower bound, we propose an achievability scheme based on sending correlated codes through the multiple access channel with superposition structure. We then specialize this achievable rate to the Gaussian multiple access diamond channel. Noting the similarity between the upper and lower bounds, we provide sufficient and necessary conditions that a Gaussian multiple access diamond channel has to satisfy such that the proposed upper and lower bounds meet. Thus, for a Gaussian multiple access diamond channel that satisfies these conditions, we have found its capacity.
Recent result shows how to compute distributively and efficiently the linear MMSE for the multiuser detection problem, using the Gaussian BP algorithm. In the current work, we extend this construction, and show that operating this algorithm twice on the matching inputs, has several interesting interpretations. First, we show equivalence to computing one iteration of the Kalman filter. Second, we show that the Kalman filter is a special case of the Gaussian information bottleneck algorithm, when the weight parameter $\\beta = 1$. Third, we discuss the relation to the Affine-scaling interior-point method and show it is a special case of Kalman filter. Besides of the theoretical interest of this linking estimation, compression/clustering and optimization, we allow a single distributed implementation of those algorithms, which is a highly practical and important task in sensor and mobile ad-hoc networks. Application to numerous problem domains includes collaborative signal processing and distributed allocation of resources in a communication network.
In network cooperation strategies, nodes work together with the aim of increasing transmission rates or reliability. This paper demonstrates that enabling cooperation between the transmitters of a two-user multiple access channel, via a cooperation facilitator that has access to both messages, always results in a network whose maximal- and average-error sum-capacities are the same---even when those capacities differ in the absence of cooperation and the information shared with the encoders is negligible. From this result, it follows that if a multiple access channel with no transmitter cooperation has different maximal- and average-error sum-capacities, then the maximal-error sum-capacity of the network consisting of this channel and a cooperation facilitator is not continuous with respect to the output edge capacities of the facilitator. This shows that there exist networks where sharing even a negligible number of bits per channel use with the encoders yields a non-negligible benefit.
Exact-repair regenerating codes are considered for the case (n,k,d)=(4,3,3), for which a complete characterization of the rate region is provided. This characterization answers in the affirmative the open question whether there exists a non-vanishing gap between the optimal bandwidth-storage tradeoff of the functional-repair regenerating codes (i.e., the cut-set bound) and that of the exact-repair regenerating codes. To obtain an explicit information theoretic converse, a computer-aided proof (CAP) approach based on primal and dual relation is developed. This CAP approach extends Yeung s linear programming (LP) method, which was previously only used on information theoretic problems with a few random variables due to the exponential growth of the number of variables in the corresponding LP problem. The symmetry in the exact-repair regenerating code problem allows an effective reduction of the number of variables, and together with several other problem-specific reductions, the LP problem is reduced to a manageable scale. For the achievability, only one non-trivial corner point of the rate region needs to be addressed in this case, for which an explicit binary code construction is given.
We propose binary discrete parametric channel models for multi-level cell (MLC) flash memories that provide accurate ECC performance estimation by modeling the empirically observed error characteristics under program/erase (P/E) cycling stress. Through a detailed empirical error characterization of 1X-nm and 2Y-nm MLC flash memory chips from two different vendors, we observe and characterize the overdispersion phenomenon in the number of bit errors per ECC frame. A well studied channel model such as the binary asymmetric channel (BAC) model is unable to provide accurate ECC performance estimation. Hence we propose a channel model based on the beta-binomial probability distribution (2-BBM channel model) which is a good fit for the overdispersed empirical error characteristics and show through statistical tests and simulation results for BCH, LDPC and polar codes, that the 2-BBM channel model provides accurate ECC performance estimation in MLC flash memories.
Fano s inequality reveals the relation between the conditional entropy and the probability of error . It has been the key tool in proving the converse of coding theorems in the past sixty years. In this paper, an extended Fano s inequality is proposed, which is tighter and more applicable for codings in the finite blocklength regime. Lower bounds on the mutual information and an upper bound on the codebook size are also given, which are shown to be tighter than the original Fano s inequality. Especially, the extended Fano s inequality is tight for some symmetric channels such as the $q$-ary symmetric channels (QSC).
A novel technique for construction of minimum storage regenerating (MSR) codes is presented. Based on this technique, three explicit constructions of MSR codes are given. The first two constructions provide access-optimal MSR codes, with two and three parities, respectively, which attain the sub-packetization bound for access-optimal codes. The third construction provides longer MSR codes with three parities, which are not access-optimal, and do not necessarily attain the sub-packetization bound. In addition to a minimum storage in a node, all three constructions allow the entire data to be recovered from a minimal number of storage nodes. That is, given storage $\\ell$ in each node, the entire stored data can be recovered from any $2\\log_2 \\ell$ for 2 parity nodes, and either $3\\log_3\\ell$ or $4\\log_3\\ell$ for 3 parity nodes. Second, in the first two constructions, a helper node accesses the minimum number of its symbols for repair of a failed node (access-optimality). The generator matrix of these codes is based on perfect matchings of complete graphs and hypergraphs, and on a rational canonical form of matrices. The goal of this paper is to provide a construction of such optimal codes over the smallest possible finite fields. For two parities, the field size is reduced by a factor of two for access-optimal codes compared to previous constructions. For three parities, in the first construction the field size is $6\\log_3 \\ell+1$ (or $3\\log_3 \\ell+1$ for fields with characteristic 2), and in the second construction the field size is larger, yet linear in $\\log_3\\ell$. Both constructions with 3 parities provide a significant improvement over existing previous works, since only non-explicit constructions with exponential field size (in $\\log_3\\ell$) were known so far.
Full-duplex (FD) communication is optimistically promoted to double the spectral efficiency if sufficient self-interference cancellation (SIC) is achieved. However, this is not true when deploying FD-communication in a large-scale setup due to the induced mutual interference. Therefore, a large-scale study is necessary to draw legitimate conclusions about gains associated with FD-communication. This paper studies the FD operation for underlay device-to-device (D2D) communication sharing the uplink resources in cellular networks. We propose a disjoint fine-tuned selection criterion for the D2D and FD modes of operation. Then, we develop a tractable analytical paradigm, based on stochastic geometry, to calculate the outage probability and rate for cellular and D2D users. The results reveal that even in the case of perfect SIC, due to the increased interference injected to the network by FD-D2D communication, having all proximity UEs transmit in FD-D2D is not beneficial for the network. However, if the system parameters are carefully tuned, non-trivial network spectral-efficiency gains (64 shown) can be harvested. We also investigate the effects of imperfect SIC and D2D-link distance distribution on the harvested FD gains.
We study the problem of interpolating all values of a discrete signal f of length N when d<N values are known, especially in the case when the Fourier transform of the signal is zero outside some prescribed index set J; these comprise the (generalized) bandlimited spaces B^J. The sampling pattern for f is specified by an index set I, and is said to be a universal sampling set if samples in the locations I can be used to interpolate signals from B^J for any J. When N is a prime power we give several characterizations of universal sampling sets, some structure theorems for such sets, an algorithm for their construction, and a formula that counts them. There are also natural applications to additive uncertainty principles.
We consider two problems related to polar codes. First is the problem of polar codes construction and analysis of their performance without Monte-Carlo method. The formulas proposed are the same as those in [Mori-Tanaka], yet we believe that our approach is original and has clear advantages. The resulting computational procedure is presented in a fast algorithm form which can be easily implemented on a computer. Secondly, we present an original method of construction of concatenated codes based on polar codes. We give an algorithm for construction of such codes and present numerical experiments showing significant performance improvement with respect to original polar codes proposed by Ar\\i kan. We use the term \\emph{concatenated code} not in its classical sense (e.g. [Forney]). However we believe that our usage is quite appropriate for the exploited construction. Further, we solve the optimization problem of choosing codes minimizing the block error of the whole concatenated code under the constraint of its fixed rate.
In this paper, we introduce a game theoretic framework for studying the problem of minimizing the delay of instantly decodable network coding (IDNC) for cooperative data exchange (CDE) in decentralized wireless network. In this configuration, clients cooperate with each other to recover the erased packets without a central controller. Game theory is employed herein as a tool for improving the distributed solution by overcoming the need for a central controller or additional signaling in the system. We model the session by self-interested players in a non-cooperative potential game. The utility functions are designed such that increasing individual payoff results in a collective behavior achieving both a desirable system performance in a shared network environment and the Nash bargaining solution. Three games are developed: the first aims to reduce the completion time, the second to reduce the maximum decoding delay and the third the sum decoding delay. We improve these formulations to include punishment policy upon collision occurrence and achieve the Nash bargaining solution. Through extensive simulations, our framework is tested against the best performance that could be found in the conventional point-to-multipoint (PMP) recovery process in numerous cases: first we simulate the problem with complete information. We, then, simulate with incomplete information and finally we test it in lossy feedback scenario. Numerical results show that our formulation with complete information largely outperforms the conventional PMP scheme in most situations and achieves a lower delay. They also show that the completion time formulation with incomplete information also outperforms the conventional PMP.
The problem of random number generation from an uncorrelated random source (of unknown probability distribution) dates back to von Neumann s 1951 work. Elias (1972) generalized von Neumann s scheme and showed how to achieve optimal efficiency in unbiased random bits generation. Hence, a natural question is what if the sources are correlated? Both Elias and Samuelson proposed methods for generating unbiased random bits in the case of correlated sources (of unknown probability distribution), specifically, they considered finite Markov chains. However, their proposed methods are not efficient or have implementation difficulties. Blum (1986) devised an algorithm for efficiently generating random bits from degree-2 finite Markov chains in expected linear time, however, his beautiful method is still far from optimality on information-efficiency. In this paper, we generalize Blum s algorithm to arbitrary degree finite Markov chains and combine it with Elias s method for efficient generation of unbiased bits. As a result, we provide the first known algorithm that generates unbiased random bits from an arbitrary finite Markov chain, operates in expected linear time and achieves the information-theoretic upper bound on efficiency.
Multi-frequency interferometry (MFI) is well known as an accurate phase-based measurement scheme. The paper reveals the inherent relationship of the unambiguous measurement range (UMR), the outlier probability, the MSE performance with the frequency pattern in MFI system, and then provides the corresponding criterion for choosing the frequency pattern. We point out that the theoretical rigorous UMR of MFI deduced in the literature is usually optimistic for practical application and derive a more practical expression . It is found that the least-square (LS) estimator of MFI has a distinguished \"double threshold effect\". Distinct difference is observed for the MSE in moderate and high signal-to-noise ratio (SNR) region (denoted by MMSE and HMSE respectively) and the second threshold effect occurs during the rapid transition from MMSE to HMSE with increasing SNR. The closed-form expressions for the MMSE, HMSE and Cramer-Rao bound (CRB) are further derived, with HMSE coinciding with CRB. Since the HMSE is insensitive to frequency pattern, we focus on MMSE minimization by proper frequency optimization. We show that a prime-based frequency interval can be exploited for the purpose of both outlier suppression and UMR extension and design a special optimal rearrangement for any set of frequency interval, in the sense of MMSE minimization. An extremely simple frequency design method is finally developed. Simulation and field experiment verified that the proposed scheme considerably outperforms the existing method in UMR as well as MSE performance, especially in the transition from MMSE to HMSE, for Gaussian and non-Gaussian channel.
Multitrack detection with array-head reading is a promising technique proposed for next generation magnetic storage systems. The multihead multitrack (MHMT) system is characterized by intersymbol interference (ISI) in the downtrack direction and intertrack interference (ITI) in the crosstrack direction. Constructing the trellis of a MHMT maximum likelihood (ML) detector requires knowledge of the ITI, which is generally unknown at the receiver. In addition, to retain efficiency, the ML detector requires a static estimate of the ITI, whose true value may in reality vary. In this paper we propose a modified ML detector on the $n$-head, $n$-track ($n$H$n$T) channel which could efficiently track the change of ITI, and adapt to new estimates. The trellis used in the proposed detector is shown to be independent of the ITI level. A gain loop structure is used to estimate the ITI. Simulation results show that the proposed detector offers a performance advantage in settings where complexity constraints limit the traditional ML detector to use a static ITI estimate.
This paper investigates the tradeoff between energyefficiency (EE) and spectral-efficiency (SE) for full-duplex (FD) enabled cellular networks.We assume that small cell base stations are working in the FD mode while user devices still work in the conventional half-duplex (HD) mode. First, a necessary condition for a FD transceiver to achieve better EE-SE tradeoff than a HD one is derived. Then, we analyze the EE-SE relation of a FD transceiver in the scenario of single pair of users and obtain a closed-form expression. Next, we extend the result into the multiuser scenario and prove that EE is a quasi-concave function of SE in general and develop an optimal algorithm to achieve the maximum EE based on the Lagrange dual method. Our analysis is finally verified by extensive numerical results.
Motivated by a wide-spread use of convex optimization techniques, convexity properties of bit error rate of the maximum likelihood detector operating in the AWGN channel are studied for arbitrary constellations and bit mappings, which may also include coding under maximum-likelihood decoding. Under this generic setting, the pairwise probability of error and bit error rate are shown to be convex functions of the SNR in the high SNR regime with explicitly-determined boundary. The bit error rate is also shown to be a convex function of the noise power in the low noise/high SNR regime.
We studynthe high-SNR capacity of generic MIMO Rayleigh block-fading channels in the noncoherent setting where neither transmitter nor receiver has a priori channel state information but both are aware of the channel statistics. In contrast to the well-established constant block-fading model, we allow the fading to vary within each block with a temporal correlation that is \"generic\" (in the sense used in the interference-alignment literature). We show that the number of degrees of freedom of a generic MIMO Rayleigh block-fading channel with $T$ transmit antennas and block length $N$ is given by $T(1-1/N)$ provided that $T<N$ and the number of receive antennas is at least $T(N-1)/(N-T)$. A comparison with the constant block-fading channel (where the fading is constant within each block) shows that, for large block lengths, generic correlation increases the number of degrees of freedom by a factor of up to four.
The K-user cyclic Z-interference channel models a situation in which the kth transmitter causes interference only to the (k-1)th receiver in a cyclic manner, e.g., the first transmitter causes interference only to the Kth receiver. The impact of noiseless feedback on the capacity of this channel is studied by focusing on the Gaussian cyclic Z-interference channel. To this end, the symmetric feedback capacity of the linear shift deterministic cyclic Z-interference channel (LD-CZIC) is completely characterized for all interference regimes. Using insights from the linear deterministic channel model, the symmetric feedback capacity of the Gaussian cyclic Z-interference channel is characterized up to within a constant number of bits. As a byproduct of the constant gap result, the symmetric generalized degrees of freedom with feedback for the Gaussian cyclic Z-interference channel are also characterized. These results highlight that the symmetric feedback capacities for both linear and Gaussian channel models are in general functions of K, the number of users. Furthermore, the capacity gain obtained due to feedback decreases as K increases.
We analyze the outage performance of a two-way fixed gain amplify-and-forward (AF) relay system with beamforming, arbitrary antenna correlation, and co-channel interference (CCI). Assuming CCI at the relay, we derive the exact individual user outage probability in closed-form. Additionally, while neglecting CCI, we also investigate the system outage probability of the considered network, which is declared if any of the two users is in transmission outage. Our results indicate that in this system, the position of the relay plays an important role in determining the user as well as the system outage probability via such parameters as signal-to-noise imbalance, antenna configuration, spatial correlation, and CCI power. To render further insights into the effect of antenna correlation and CCI on the diversity and array gains, an asymptotic expression which tightly converges to exact results is also derived.
A well-known technique in estimating probabilities of rare events in general and in information theory in particular (used, e.g., in the sphere-packing bound), is that of finding a reference probability measure under which the event of interest has probability of order one and estimating the probability in question by means of the Kullback-Leibler divergence. A method has recently been proposed in [2], that can be viewed as an extension of this idea in which the probability under the reference measure may itself be decaying exponentially, and the Renyi divergence is used instead. The purpose of this paper is to demonstrate the usefulness of this approach in various information-theoretic settings. For the problem of channel coding, we provide a general methodology for obtaining matched, mismatched and robust error exponent bounds, as well as new results in a variety of particular channel models. Other applications we address include rate-distortion coding and the problem of guessing.
Over a finite field $\\F_q$ the $(n,d,q)$-Reed-Muller code is the code given by evaluations of $n$-variate polynomials of total degree at most $d$ on all points (of $\\F_q^n$). The task of testing if a function $f:\\F_q^n \\to \\F_q$ is close to a codeword of an $(n,d,q)$-Reed-Muller code has been of central interest in complexity theory and property testing. The query complexity of this task is the minimal number of queries that a tester can make (minimum over all testers of the maximum number of queries over all random choices) while accepting all Reed-Muller codewords and rejecting words that are $\\delta$-far from the code with probability $\\Omega(\\delta)$. (In this work we allow the constant in the $\\Omega$ to depend on $d$.) In this work we give a new upper bound of $(c q)^{(d+1)/q}$ on the query complexity, where $c$ is a universal constant. In the process we also give new upper bounds on the \"spanning weight\" of the dual of the Reed-Muller code (which is also a Reed-Muller code). The spanning weight of a code is the smallest integer $w$ such that codewords of Hamming weight at most $w$ span the code.
In contrast to a maximum-likelihood decoder, it is often desirable to use an incomplete decoder that can detect its decoding errors with high probability. One common choice is the bounded distance decoder. Bounds are derived for the total word error rate, Pw, and the undetected error rate, Pu. Excellent agreement is found with simulation results for a small code, and the bounds are shown to be tractable for a larger code.
We study the problem of compression for the purpose of similarity identification, where similarity is measured by the mean square Euclidean distance between vectors. While the asymptotical fundamental limits of the problem - the minimal compression rate and the error exponent - were found in a previous work, in this paper we focus on the nonasymptotic domain and on practical, implementable schemes. We first present a finite blocklength achievability bound based on shape-gain quantization: The gain (amplitude) of the vector is compressed via scalar quantization and the shape (the projection on the unit sphere) is quantized using a spherical code. The results are numerically evaluated and they converge to the asymptotic values as predicted by the error exponent. We then give a nonasymptotic lower bound on the performance of any compression scheme, and compare to the upper (achievability) bound. For a practical implementation of such a scheme, we use wrapped spherical codes, studied by Hamkins and Zeger, and use the Leech lattice as an example for an underlying lattice. As a side result, we obtain a bound on the covering angle of any wrapped spherical code, as a function of the covering radius of the underlying lattice.
Upper and lower bounds on the error probability of linear codes under maximum-likelihood (ML) decoding are shortly surveyed and applied to ensembles of codes on graphs. For upper bounds, focus is put on Gallager bounding techniques and their relation to a variety of other reported bounds. Within the class of lower bounds, we address de Caen s based bounds and their improvements, sphere-packing bounds, and information-theoretic bounds on the bit error probability of codes defined on graphs. A comprehensive overview is provided in a monograph by the authors which is currently in preparation.
An experimental device was developed to monitor the field soil suction using miniature tensiometer. This device consists of a double tube system that ensures a good contact between the tensiometer and the soil surface at the bottom of the testing borehole. This system also ensures the tensiometer periodical retrieving without disturbing the surrounding soil. This device was used to monitor the soil suction at the site of Boissy-le-Ch\\^atel, France. The measurement was performed at two depths (25 and 45 cm) during two months (May and June 2004). The recorded suction data are analyzed by comparing with the volumetric water content data recorded using TDR (Time Domain Reflectometer) probes as well as the meteorological data. A good agreement between these results was observed, showing a satisfactory performance of the developed device.
Underwater sound isolation has been a long-standing fundamental issue in industry and military fields. Starting from a simple theoretical model, here an air-sealed metasurface is proposed to overcome this problem. Comparing with the sample without filling air, the effective impedance of the air-sealed one is greatly reduced and strikingly mismatch with water, accompanying another merit of low sound speed. Deeply suppressed sound transmission (~10-5) through such a metasurface is observed experimentally over a wide range of ultrasonic frequencies and incident angles.
Why would anyone wish to generalize the already unappetizing subject of rigid body motion to an arbitrary number of dimensions? At first sight, the subject seems to be both repellent and superfluous. The author will try to argue that an approach involving no specifically three-dimensional constructs is actually easier to grasp than the traditional one and might thus be generally useful to understand rigid body motion both in three dimensions and in the general case. Specific differences between the viewpoint suggested here and the usual one include the following: here angular velocities are systematically treated as antisymmetric matrices, a symmetric tensor $I$ quite different from the moment of inertia tensor plays a central role, whereas the latter is shown to be a far more complex object, namely a tensor of rank four. A straightforward way to define it is given. The Euler equation is derived and the use of Noether s theorem to obtain conserved quantities is illustrated. Finally the equation of motion for two bodies linked by a spherical joint is derived to display the simplicity and the power of the method.
The TexSol is a composite geomaterial : a sand matrix and a wire network reinforcement. For small strains a thermodynamical continuous model of the TexSol including the unilaterality of the wire network is postulated. This model is described by two potentials which depend on some internal variables and a state variable either strain or stress tensor (the choice of this last one gives two different ways of identification). The TexSol continuous model is implemented in a finite element code to recover the mechanical behaviour given by discrete elements numerical experiments.
We study the force between two circular electrodes in different configurations. A formula analogous to Kelvin s formula for the spheres is given in the case of equal disks held at the same potential and when one plate is earthed. An expression for the force at short distance between two arbitrarily charged disks is found: the generic case shows a logarithmic repulsive force, also for disks carrying charges of opposite sign. Some numerical computations support the results. A classification for the possible behaviors of the force is proposed on the basis of a decomposition of the capacitance matrix. It is shown that the forces depend strongly on the dimensionality of the contact zone between the conductors. The analysis is supported by a numerical computation carried for the case of two disks of different radii.
In this paper, the thermo-mechanical behaviour of hemp fibres (Cannabis sativa L.) is investigated using a Dynamic Mechanical Analyser. Experiments are performed at a frequency of 1 Hz in the temperature range of 20 to 220\\degree C. When a periodic solicitation is applied to an elementary fibre, an increase of the fibre rigidity and a reduction of the damping capacity are observed. These evolutions aim at stabilization after an identified number of cycles, traducing a phenomenon of \"adaptation\". This specific mechanical behaviour certainly involves biochemical and/or structural modifications in the material organisation as microfibrils reorientation. In addition, the behaviour of hemp fibres is affected by temperature. Temperature acts as an activation factor but also as a degradation factor of the viscoelastic properties of fibres. The rigidity and the endurance of fibres are highly affected by thermal treatment at temperature above 150\\degree C to 180\\degree C. Taking into account these results, polypropylene-hemp fibres composites were manufactured using a specific processing cycle. By respecting the integrity of fibres during manufacturing, it appears that the relatively high level of the specific mechanical properties of composites is really encouraging in sight of applications requiring high mechanical performances.
This paper proposes a new method, in the frequency domain, to define absorbing boundary conditions for general two-dimensional problems. The main feature of the method is that it can obtain boundary conditions from the discretized equations without much knowledge of the analytical behavior of the solutions and is thus very general. It is based on the computation of waves in periodic structures and needs the dynamic stiffness matrix of only one period in the medium which can be obtained by standard finite element software. Boundary conditions at various orders of accuracy can be obtained in a simple way. This is then applied to study some examples for which analytical or numerical results are available. Good agreements between the present results and analytical solutions allow to check the efficiency and the accuracy of the proposed method.
We present a general dyadic vector circuit formalism, applicable for uniaxial magneto-dielectric slabs, with strong spatial dispersion explicitly taken into account. This formalism extends the vector circuit theory, previously introduced only for isotropic and chiral slabs. Here we assume that the problem geometry imposes strong spatial dispersion only in the plane, parallel to the slab interfaces. The difference arising from taking into account spatial dispersion along the normal to the interface is briefly discussed. We derive general dyadic impedance and admittance matrices, and calculate corresponding transmission and reflection coefficients for arbitrary plane wave incidence. As a practical example, we consider a metamaterial slab built of conducting wires and split-ring resonators, and show that neglecting spatial dispersion and uniaxial nature in this structure leads to dramatic errors in calculation of transmission characteristics.
In his monograph Thermodynamics, I. M\\\"uller proves that for incompressible media the volume does not change with the temperature. This M\\\"uller paradox yields an incompatibility between experimental evidence and the entropy principle. This result has generated much debate within the mathematical and thermodynamical communities as to the basis of Boussinesq approximation in fluid dynamics. The aim of this paper is to prove that for an appropriate definition of incompressibility, as a limiting case of quasi thermal-incompressible body, the entropy principle holds for pressures smaller than a critical pressure value. The main consequence of our result is the physically obvious one, that for very large pressures, no body can be perfectly incompressible. The result is first established in the fluid case. In the case of hyperelastic media subject to large deformations the approach is similar, but with a suitable definition of the pressure associated with convenient stress tensor decomposition.
A three-dimensional (3D) direct numerical simulation is combined with a laboratory study to describe the turbulent flow in an enclosed annular rotor-stator cavity characterized by a large aspect ratio G=(b-a)/h=18.32 and a small radius ratio a/b=0.152, where a and b are the inner and outer radii of the rotating disk and h is the interdisk spacing. The rotation rate Omega under consideration is equivalent to the rotational Reynolds number Re=Omegab2/nu=9.5 x 104, where nu is the kinematic viscosity of the fluid. This corresponds to a value at which an experiment carried out at the laboratory has shown that the stator boundary layer is turbulent, whereas the rotor boundary layer is still laminar. Comparisons of the 3D computed solution with velocity measurements have given good agreement for the mean and turbulent fields. The results enhance evidence of weak turbulence at this Reynolds number, by comparing the turbulence properties with available data in the literature. An approximately self-similar boundary layer behavior is observed along the stator side. The reduction of the structural parameter a1 under the typical value 0.15 and the variation in the wall-normal direction of the different characteristic angles show that this boundary layer is three-dimensional. A quadrant analysis of conditionally averaged velocities is performed to identify the contributions of different events (ejections and sweeps) on the Reynolds shear stress producing vortical structures. The asymmetries observed in the conditionally averaged quadrant analysis are dominated by Reynolds stress-producing events in this B\\\"{o}dewadt layer. Moreover, case 1 vortices (with a positive wall induced velocity) are found to be the major source of generation of special strong events, in agreement with the conclusions of Lygren and Andersson.
Leaky-wave antennas (LWAs) are widely used as single-point-fed linear antenna arrays. The extension of LWAs to 2D implies that they can be used as single-point-fed 2D antenna arrays without requiring a complex feeding network. However, generating a pencil beam from 2D LWAs is not straightforward and due care has to be taken for the design of the LWA. On the other hand, transmission-line (TL) grids have demonstrated interesting behaviors, such as an effective negative refractive index and growing of evanescent waves. In this paper, a singlepoint-fed TL-grid 2D Dirac leaky-wave antenna (DLWA) design is proposed that generates a pencil beam at both broadside and slightly tilted angles. The TL-grid unit cell is analytically treated in light of its scattering and impedance matrices. The optimized TL-grid unit cell is shown to exhibit a closed bandgap in the dispersion relation which is also linearly varying with frequency (hence it is a DLWA). The proposed 2D DLWA design is fabricated and the experimental results are presented.
In Minkowski spacetime, we consider an isolated system made of two pointlike bodies interacting at a distance, in the nonradiative approximation. Our framework is the covariant and a priori Hamiltonian formalism of \"predictive relativistic mechanics\", founded on the equal-time condition. The issue of an equivalent one-body description is discussed. We distinguish two different concepts: on the one hand an almost purely kinematic relative particle, on the other hand an effective particle which involves an explicit dynamical formulation; several versions of the latter are possible. Relative and effective particles have the same orbit, but may differ by their schedules.
Using physical arguments, I derive the physically correct equations of motion for a classical charged particle from the Lorentz-Abraham-Dirac equations (LAD) which are well known to be physically incorrect. Since a charged particle can classically not be a point particle because of the Coulomb field divergence, my derivation accounts for that by imposing a basic condition on the external force. That condition ensures that the particle s finite size charge distribution looks like a point charge to the external force. Finite radius charge distributions are known not to lead to differential equations of motion. The present work is in agreemnent with the results by Spohn and by others. An example, uniform acceleration, demonstrates what the above basic condition entails. For clarity of the argument, I discuss the non-relativistic case before the relativistic one.
Helmholtz decomposition theorem for vector fields is presented usually with too strong restrictions on the fields. Based on the work of Blumenthal of 1905 it is shown that the decomposition of vector fields is not only possible for asymptotically weakly decreasing vector fields, but even for vector fields, which asymptotically increase sublinearly. Use is made of a regularizatin of the Greens function and the mathematics of the proof is formulated as simply as possible. We also show a few examples for the decomposition of vector fields including the electric dipole radiation.
We present a clear and mathematically simple procedure explaining spontaneous symmetry breaking in quantum mechanical systems. The procedure is applicable to a wide range of models and can be easily used to explain the existence of a symmetry broken state in crystals, antiferromagnets and even superconductors. It has the advantage that it automatically brings to the fore the main players in spontaneous symmetry breaking: the symmetry breaking field, the thermodynamic limit, and the global excitations of the thin spectrum.
Three contradictory but state-of-the-art concepts for defining and evaluating stored electromagnetic energy are treated in this communication, and are collated with the widely accepted definition of stored energy, which is the total energy minus the radiated energy. All three concepts are compared, and the results are discussed on an example of a dominant spherical mode, which is known to yield dissimilar results for the concepts dealt with here. It is shown that various definitions of stored energy density immanently imply diverse meanings of the term \"radiation\".
Correspondences between the Thomson Problem and atomic electron shell-filling patterns are observed as systematic non-uniformities in the distribution of potential energy necessary to change configurations of $N\\le 100$ electrons into discrete geometries of neighboring $N-1$ systems. These non-uniformities yield electron energy pairs, intra-subshell pattern similarities with empirical ionization energy, and a salient pattern that coincides with size-normalized empirical ionization energies. Spatial symmetry limitations on discrete charges constrained to a spherical volume are conjectured as underlying physical mechanisms responsible for shell-filling patterns in atomic electronic structure and the Periodic Law.
We consider the question of existence of Hamiltonians for autonomous non-holonomic mechanical systems in this paper. The approach is elementary in the sense that the existence of a Hamiltonian for a given non-holonomic system is considered to be equivalent to the existence of a non-degenerate Lagrangian for the system in question. The possible existence of such a Lagrangian is related to the inverse problem of constructing a Lagrangian from the appropriate equations of motion. A simple example in three dimensions with one non-holonomic constraint is analysed in detail, and it is shown that in this case there is no Lagrangian reproducing the equations of motion in three dimensions. Thus the system does not admit a variational formulation in three dimensions. However, the system in question is equivalent to a two-dimensional system which admits a variational formulation. Two distinct Lagrangians and their corresponding Hamiltonians are constructed explicitly for this two-dimensional system
Non linear dynamic behaviour of a normally excited preloaded Hertzian contact (including possible contact losses) is investigated using an experimental test rig. It consists on a double sphere plane contact loaded by the weight of a rigid moving mass. Contact vibrations are generated by a external Gaussian white noise and exhibit vibroimpact responses when the input level is sufficiently high. Spectral contents and statistics of the stationary transmitted normal force are analysed. A single-degree-of-freedom non linear oscillator including loss of contact and Hertzian non linearities is built for modelling the experimental system. Theoretical responses are obtained by using the stationary Fokker-Planck equation and also Monte Carlo simulations. When contact loss occurrence is very occasional, numerical results shown a very good agreement with experimental ones. When vibroimpacts occur, results remain in reasonable agreement with experimental ones, that justify the modelling and the numerical methods described in this paper. The contact loss non linearity appears to be rather strong compared to the Hertzian non linearity. It actually induces a large broadening of the spectral contents of the response. This result is of great importance in noise generation for a lot of systems such as mechanisms using contacts to transform motions and forces (gears, ball-bearings, cam systems, to name a few). It is also of great importance for tribologists preoccupied to prevent surface dammage.
The magic \"Harry Potter s cloak\" has been the dream of human beings for really long time. Recently, transformation optics inspired from the advent of metamaterials offers great versatility for manipulating wave propagation at will to create amazing illusion effects. In the present work, we proposed a novel transformation recipe, in which the cloaking shell somehow behaves like a \"cloaking lens\", to provide almost all desired features one can expect for a real magic cloak. The most exciting feature of the current recipe is that an object with arbitrary characteristics (e.g., size, shape or material properties) can be invisibilized perfectly with positive-index materials, which significantly benefits the practical realization of a broad-band cloaking device fabricated with existing materials. Moreover, the one concealed in the hidden region is able to undistortedly communicate with the surrounding world, while the lens-like cloaking shell will protect the cloaked source/sensor from being traced back by outside detectors by creating a virtual image.
The equation derived by F. Rohrlich (Phys. Rev. E 77, 046609 (2008)) has been known for 60 years (C. J. Eliezer, Proc. Royal Soc. London. Ser. A 194, 543 (1948)). For a long time this equation has been considered to be incorrect. If there is any need to revisit this issue, the only relevant consideration is that the Eliezer equation is very difficult to solve numerically: the acceleration being expressed in terms of a function that, itself, depends on the acceleration.
The article by J. Rocha de Faria et al. under discussion is concerned with the evaluation of the perturbation undergone by the potential energy of a domain $\\Omega$ (in a 2-D, scalar Laplace equation setting) when a disk $B_{\\epsilon}$ of small radius $\\epsilon$ centered at a given location $\\hat{\\boldsymbol{x}\\in\\Omega$ is removed from $\\Omega$, assuming either Neumann or Dirichlet conditions on the boundary of the small `hole  thus created. In each case, the potential energy $\\psi(\\Omega_{\\epsilon})$ of the punctured domain $\\Omega_{\\epsilon}=\\Omega\\setminus\\B_{\\epsilon}$ is expanded about $\\epsilon=0$ so that the first two terms of the perturbation are given. The first (leading) term is the well-documented topological derivative of $\\psi$. The article under discussion places, logically, its main focus on the next term of the expansion. However, it contains incorrrect results, as shown in this discussion. In what follows, equations referenced with Arabic numbers refer to those of the article under discussion.
We perform a detailed analysis of the contact force network in a dense confined packing of pentagonal particles simulated by means of the contact dynamics method. The effect of particle shape is evidenced by comparing the data from pentagon packing and from a packing with identical characteristics except for the circular shape of the particles. A counterintuitive finding of this work is that, under steady shearing, the pentagon packing develops a lower structural anisotropy than the disk packing. We show that this weakness is compensated by a higher force anisotropy, leading to enhanced shear strength of the pentagon packing. We revisit \"strong\" and \"weak\" force networks in the pentagon packing, but our simulation data provide also evidence for a large class of \"very weak\" forces carried mainly by vertex-to-edge contacts. The strong force chains are mostly composed of edge-to-edge contacts with a marked zig-zag aspect and a decreasing exponential probability distribution as in a disk packing.
We define and compute the renormalized four-momentum of the composed physical system: classical Maxwell field interacting with charged point particles. As a `reference  configuration for the field surrounding the particle, we take the Born solution. Unlike in the previous approach [Gen. Relat. Grav. 26 (1994) 167; Acta Phys. Pol. A 85 (1994) 771; Commun. Math. Phys. 198 (1998), 711], based on the Coulomb `reference , a dependence of the four-momentum of the particle (`dressed  with the Born solution) upon its acceleration arises in a natural way. This will change the resulting equations of motion. Similarly, we treat the angular momentum tensor of the system.
We propose a modification of Maxwell s macroscopic fundamental set of equations in vacuum in order to clarify Faraday s law of induction. Using this procedure, the Lorentz force is no longer separate from Maxwell s equations. The Lorentz transformations are shown to be related to the convective derivative, which is introduced in the electrodynamics of moving bodies. The new formulation is in complete agreement with the actual set of Maxwell s equations for bodies at rest, the only novel feature is a new kind of electromotive force. Heinrich Hertz was the first to propose a similar electrodynamic theory of moving bodies, although its interpretation was based on the existence of the so called \"aether\". Examining the problem of a moving circuit with this procedure, it is shown that a new force of induction should act on a circuit moving through an inhomogeneous vector potential field. This overlooked induction force is related to the Aharanov-Bohm effect, but can also be related to the classical electromagnetic field when an external magnetic field is acting on the system. Technological issues, such as the so called Marinov motor are also addressed.
Ion transport in biological and synthetic nanochannels is characterized by phenomena such as ion current fluctuations and rectification. Recently, it has been demonstrated that nanofabricated synthetic pores can mimic transport properties of biological ion channels [P. Yu. Apel, {\\it et al.}, Nucl. Instr. Meth. B {\\bf 184}, 337 (2001); Z. Siwy, {\\it et al.}, Europhys. Lett. {\\bf 60}, 349 (2002)]. Here, the ion current rectification is studied within a reduced 1D Poisson-Nernst-Planck (PNP) model of synthetic nanopores. A conical channel of a few $\\mathrm{nm}$ to a few hundred of nm in diameter, and of few $\\mu$m long is considered in the limit where the channel length considerably exceeds the Debye screening length. The rigid channel wall is assumed to be weakly charged. A one-dimensional reduction of the three-dimensional problem in terms of corresponding entropic effects is put forward. The ion transport is described by the non-equilibrium steady-state solution of the 1D Poisson-Nernst-Planck system within a singular perturbation treatment. An analytic formula for the approximate rectification current in the lowest order perturbation theory is derived. A detailed comparison between numerical results and the singular perturbation theory is presented. The crucial importance of the asymmetry in the potential jumps at the pore ends on the rectification effect is demonstrated. This so constructed 1D theory is shown to describe well the experimental data in the regime of small-to-moderate electric currents.
The Fourier-based analysis customarily employed to analyze the dynamics of a simple pendulum is here revisited to propose an elementary iterative scheme aimed at generating a sequence of analytical approximants of the exact law of motion. Each approximant is expressed by a Fourier sum whose coefficients are given by suitable linear combinations of Bessel functions, which are expected to be more accessible, especially at an undergraduate level, with respect to Jacobian elliptic functions. The first three approximants are explicitely obtained and compared with the exact solution for typical initial angular positions of the pendulum. In particular, it is shown that, at the lowest approximation level, the law of motion of the pendulum turns out to be adequately described, up to oscillation amplitudes of $\\pi/2$, by a sinusoidal temporal behaviour with a frequency proportional to the square root of the so-called \"besinc\" function, well known in physical optics.
We generalize the derivation of electromagnetic fields of a charged particle moving with a constant acceleration [1] to a variable acceleration (piecewise constants) over a small finite time interval using Coulomb s law, relativistic transformations of electromagnetic fields and Thomson s construction [2]. We derive the average Lorentz self-force for a charged particle in arbitrary non-relativistic motion via averaging the fields at retarded time.
The equations of motion are solved analytically for speed and position for the case of blackbody friction on objects traveling at relativistic speeds with respect to observers fixed in the frame of the blackbody radiation. Two model cases are considered, both assume an object which is a perfect absorber of light, and one of which also assumes that the object maintains a constant rest mass by emitting photons in a momentum neutral process. The maximum distances attained for a light sail and a micron-size sand grain are determined under the assumption that the relevant blackbody source is that of cosmic background radiation. At a temperature of 3000K, the temperature at the time the universe became transparent, cosmic background radiation would cause a significant decay of speed fluctuations in dust clouds.
When identifying instruments that have had great influence on the history of physics, none comes to mind more quickly than the pendulum. Though  birthed  by Galileo in the 16th century, and in some respects nearly  dead  by the middle of the 20th century; the pendulum experienced  rebirth  by becoming an archetype of chaos. With the resulting acclaim for its surprising behavior at large amplitudes, one might expect that there would already be widespread interest in another of its significant nonlinearities. Such is not the case, however, and the complex motions of small amplitude physical pendula are barely known. The present paper shows that a simply-constructed metallic rod pendulum is capable of demonstrating rich physics in a largely unstudied area.
When anisotropy is involved, the wave equation becomes simultaneous partial differential equations that are not easily solved. Moreover, when the anisotropy occurs due to both permittivity and permeability, these equations are insolvable without a numerical or an approximate method. The problem is essentially due to the fact neither $\\e$ nor $\\m$ can be extracted from the curl term, when they are in it. The terms $\\na\\times {\\bf E}$ (or ${\\bf H})$ and $\\na\\times \\e{\\bf E}$ (or $\\;\\m{\\bf H})$ are practically independent variables, and $\\bf E$ and $\\bf H$ are coupled to each other. However, if Maxwell s equations are manipulated in a different way, new wave equations are obtained. The obtained equations can be applied in anisotropic, as well as isotropic, cases. In addition, $\\bf E$ and $\\bf H$ are decoupled in the new equations, so the equations can be solved analytically by using tensor Green s functions.
This paper addresses the total mechanical energy of a single degree of freedom fractional oscillator. Based on the energy storage and dissipation properties of the Caputo fractional derivatives, the expression for total mechanical energy in the single degree of freedom fractional oscillator is firstly presented. The energy regeneration due to the external exciting force and the energy loss due to the fractional damping force during the vibratory motion are analyzed. Furthermore, based on the mean energy dissipation of the fractional damping element in steady-state vibration, a new concept of mean equivalent viscous damping is suggested and the value of the damping coefficient is evaluated.
The analysis of RLC circuits is usually made by considering phasor transforms of sinusoidal signals (characterized by constant amplitude, period and phase) that allow the calculation of the AC steady state of RLC circuits by solving simple algebraic equations. In this paper I try to show that phasor representation of RLC circuits is analogue to consider the frequency response function (commonly designated by FRF) of the total impedance of the circuit. In this way I derive accurate expressions for the resonance and anti-resonance frequencies and their corresponding values of impedances of the parallel and series RLC circuits respectively, notwithstanding the presence of damping effects.
The spin-statistics connection is obtained for a simple formulation of a classical field theory containing even and odd Grassmann variables. To that end, the construction of irreducible canonical realizations of the rotation group corresponding to general causal fields is reviewed. The connection is obtained by imposing local commutativity on the fields and exploiting the parity operation to exchange spatial coordinates in the scalar product of classical field evaluated at one spatial location with the same field evaluated at a distinct location. The spin-statistics connection for irreducible canonical realizations of the Poincar\\ {e} group of spin $j$ is obtained in the form: Classical fields and their conjugate momenta satisfy fundamental field-theoretic Poisson bracket relations for 2$j$ even, and fundamental Poisson antibracket relations for 2$j$ odd
Aspects of the theory of characteristic modes, based on their variational formulation, are presented and an explicit form of a related functional, involving only currents in a spatial domain, is derived. The new formulation leads to deeper insight into the modal behavior of radiating structures as demonstrated by a detailed analysis of three canonical structures: a dipole, an array of two dipoles and a loop, cylinder and a sphere. It is demonstrated that knowledge of the analytical functional can be utilized to solve important problems related to the theory of characteristic modes decomposition such as the resonance of inductive modes or the benchmarking of method of moments code.
In this article, we use different models to compute displacements and stresses of a simply supported sandwich beam subjected to a uniform pressure. 8-node quadrilateral elements (Plane 82), multi-layered 8-node quadrilateral shell elements (Shell 91) and multi-layered 20-node cubic elements (Solid 46) are used. The influence of mesh refinement and of the ratio of Young s moduli of the layers are studied. Finally, a local Reissner method is presented and assessed, which permits an improvement in the accuracy of interface stresses for a high ratio of Young s moduli of the layers with Plane 82 elements.
The behavior of spinning particles in the stationary homogeneous magnetic field is considered and all types of trajectories for massive and massless particles are found. It is shown that spin of particles in a magnetic field is always arranged parallel or antiparallel to the field. Helicity $e$ plays a role of electric charge. The oscillation frequency of massless particle in a magnetic field increases.
Studies on nanoscale materials merit careful development of an electrostatics model concerning discrete point charges within dielectrics. The discrete charge dielectric model treats three unique interaction types derived from an external source: Coulomb repulsion among point charges, direct polarization between point charges and their associated surface charge elements, and indirect polarization between point charges and surface charge elements formed by other point charges. The model yields the potential energy, U(N), stored in a general $N$ point charge system differing from conventional integral formulations, $1/2\\int{\\bm E}\\cdot{\\bm D}dV$ and $1/2\\int\\rho\\Phi dV$, in a manner significant to the treatment of few electron systems.
We find the electric field of a point charge in `truncated hyperbolic motion , in which the charge moves at a constant velocity followed by motion with a constant acceleration in its instantaneous rest frame. The same Lienard-Wiechert formula holds for the acceleration phase and the constant velocity phase of the charge s motion. The only modification is that the formula giving the retarded time is different for the two motions, and the acceleration is zero for the constant velocity motion. The electric field lines are continuous as the retarded time increases through the transition time between constant velocity and accelerated motion. As the transition time approaches negative infinity the electric field develops a delta function contribution that has been introduced by others as necessary to preserve Gauss s law for the electric field.
It is shown that a new type of metamaterial, a 3D-array of toroidal solenoids, displays a significant toroidal response that can be readily measured. This is in sharp contrast to materials that exist in nature, where the toroidal component is weak and hardly measurable. The existence of an optimal configuration, maximizing the interaction with an external electromagnetic field, is demonstrated. In addition, it is found that a characteristic feature of the magnetic toroidal response is its strong dependence on the background dielectric permittivity of the host material, which suggests possible applications. Negative refraction and backward waves exist in a composite toroidal metamaterial, consisting of an array of wires and an array of toroidal solenoids.
We illustrate a theoretical procedure determining necessary conditions for which simultaneous pure rolling kinetic constraints acting on a mechanical system can be fulfilled. We also analyze the sufficiency of these conditions by generalizing to this case a well known and usually accepted assumption on the behavior of pure rolling constraint. We present in detail the application of the procedure to some significative mechanical systems.
Within the framework of Classical Electrodynamics (CED) it is common practice to choose freely an arbitrary gauge condition with respect to a gauge transformation of the electromagnetic potentials. The Lorenz gauge condition allows for the derivation of the inhomogeneous potential wave equations (IPWE), but this also means that scalar derivatives of the electromagnetic potentials are considered to be \\emph{unphysical}. However, these scalar expressions might have the meaning of a new physical field, $\\mathsf S$. If this is the case, then a generalised CED is required such that scalar field effects are predicted and such that experiments can be performed in order to verify or falsify this generalised CED. The IPWE are viewed as a generalised Gauss law and a generalised Ampe\\`re law, that also contain derivatives of $\\mathsf S$, after reformulating the IPWE in terms of fields. Some recent experiment show positive results that are in qualitative agreement with the presented predictions of scalar field effects, but further quantitative tests are required in order to verify or falsify the presented theory. The importance of Nikola Tesla s pioneering research, with respect to the predicted effects, cannot be overstated.
The end conditions of piano strings can be approximated by the input admittance at the bridge. Proper measurements of this value are therefore required. A method of validation of admittance measurements on simple structures is proposed in this paper. High resolution signal analysis performed on string vibrations yields an estimate for the input admittance. This method is implemented on a simplified device composed of a piano string coupled to a thin steel beam.
I introduce the exact relation between the displacement current $\\epsilon_0 \\partial \\v{E}/\\partial t$ and the ordinary current $\\v{J}$. I show that $\\epsilon_0 \\partial \\v{E}/\\partial t$ contains a local term determined by the present values of $\\v{J}$ plus a non-local term determined by the retarded values of $\\v{J}$. The non-local term implements quantitatively the suggestion made by Griffiths and Heald that the displacement current at a point is a surrogate for ordinary currents at other locations.
It will be shown that, in comparison with the pre-relativistic Galileo-invariant conceptions, special relativity tells us nothing new about the geometry of spacetime. It simply calls something else \"spacetime\", and this something else has different properties. All statements of special relativity about those features of reality that correspond to the original meaning of the terms \"space\" and \"time\" are identical with the corresponding traditional pre-relativistic statements. It will be also argued that special relativity and Lorentz theory are completely identical in both senses, as theories about spacetime and as theories about the behavior of moving physical objects.
Traditional methods for measuring the speed of light in dispersive media have been based on the detection of interference between light waves emitted from the same source. In the present study the elapsed times for single photons to move from a laser to a photomultiplier tube are measured electronically. Time-correlated single photon counting detection produces a characteristic instrument response which has the same shape independent of both the path length the light travels and the nature of the transparent media through which it passes. This allows for an accurate calibration of the chronograph by observing shifts in the location of the instrument response for different distances traveled by the light. Measurement of the corresponding shift which occurs when light moves the same distance through air and water then enables an accurate determination of the ratio of the photon velocities in these two media. Three different wavelengths of light have been used. In two cases good agreement is found between the present measured light speeds and those which can be inferred from existing refractive index measurements in water. The shortest wavelength studied is too far in the uv to obtain a reliable estimate on the same basis, and so the ng value (1.463) measured in the present work awaits independent confirmation. A theoretical discussion of the present results is undertaken with reference to Newton s original corpuscular theory of light. It is argued that his failure to predict that light travels more slowly in water than in air arose from the inadequacy of his mechanical theory rather than his assumptions about the elementary composition of light.
We propose a form for the action of a relativistic particle subject to a positional force that is invariant under time reparametrization and therefore allows for a consistent Hamiltonian formulation of the dynamics. This approach can be useful in the study of phenomenological models. Also the Dirac and Klein-Gordon equation differ from the standard formulation, with corrections of order (E-m)/m in the energy spectra.
The concept \"Classical Electromagnetism\" in the title of the paper here refers to a theory built on three foundations: relativity principles, the original Maxwell s equations, and the mathematics of exterior calculus. In this theory of electromagnetism the general laws are expressed as geometric (coordinate-free) relations between quantities on a four-dimensional spacetime manifold. Based on these laws, and exterior calculus on metric spaces, we derive fields and relations that describe electromagnetism from the inside perspective of Lorentz observers, inside the Minkowski spacetime (the ordinary flat spacetime). It is shown how fields and relations defined on the spacetime are sliced into three-dimensional fields and relations on time slices, and that Lorentz observers perceive these as time-dependent fields and relations on a single three-dimensional Euclidean space. In exterior calculus (on metric spaces) each field is associated to four field variants from which one can choose how a field is to appear. Using this feature, we derive alternative equation systems describing electromagnetism from the inside perspective. In one system, A, all field quantities are form fields. In another system, C, the fields are represented as vector and scalar fields. But in contrast to the traditional Maxwell s equations with div and curl operators, there is here no need for pseudo-vectors and pseudo-scalars. Some theorems of a pseudo-free vector analysis, adapted to the C-system, are derived. The paper concludes with a section where we analyse properties of the electromagnetic field and its laws with respect to mirror transformations.
A time-domain numerical modeling of brass instruments is proposed. On one hand, outgoing and incoming waves in the resonator are described by the Menguy-Gilbert model, which incorporates three key issues: nonlinear wave propagation, viscothermal losses, and a variable section. The non-linear propagation is simulated by a TVD scheme well-suited to non-smooth waves. The fractional derivatives induced by the viscothermal losses are replaced by a set of local-in-time memory variables. A splitting strategy is followed to couple optimally these dedicated methods. On the other hand, the exciter is described by a one-mass model for the lips. The Newmark method is used to integrate the nonlinear ordinary differential equation so-obtained. At each time step, a coupling is performed between the pressure in the tube and the displacement of the lips. Finally, an extensive set of validation tests is successfully completed. In particular, self-sustained oscillations of the lips are simulated by taking into account the nonlinear wave propagation in the tube. Simulations clearly indicate that the nonlinear wave propagation has a major influence on the timbre of the sound, as expected. Moreover, simulations also highlight an influence on playing frequencies, time envelopes and on the playability of the low frequencies in the case of a variable lips tension.
In this paper the concept of wave-guiding medium, previously introduced for planar structures, is defined for the spherically symmetric case. It is shown that a quarter-wavelength layer of such a medium serves as a transformer of boundary conditions between two spherical interfaces. As an application, the D B -boundary condition, requiring vanishing of normal derivatives of the normal components of D and B field vectors, is realized by transforming the DB-boundary conditions. To test the theory, scattering from a spherical DB object covered by a layer of wave-guiding material is compared to the corresponding scattering from an ideal D B  sphere, for varying medium parameters of the layer.
In the present work we study the well-known Two Capacitor Problem from a new perspective. Although this problem has been thoroughly investigated, as far as we know there are no studies of the thermodynamic aspects of the discharge process. We use the Free Electron Gas Model to describe the electrons  energy levels in both capacitors in the low temperature regime. We assume that the capacitors and the resistor can exchange energy freely with a heat reservoir. We assume that the resistance is large enough to consider an isothermal heat exchange between the resistor and the heat reservoir. Thereby we obtain a positive entropy variation due to the discharge process, corroborating its irreversibility.
The investigation of metasurface, which is of great current interest, has opened up new degrees of freedom to research metamaterials. In this paper, we propose an ultrathin acoustic metasurface consisting of a series of structurally simple drum-like subunit cells. Eight units with different sizes aer selected to realize discrete transmisson phase shifts ranging from 0 to 360 degrees ar 3.5 KHz. The designed metasurface is capable of manipulating sound waves at will, including anomalous refraction and conversion of propagating waves into surface waves, which can be predicted precisely by the generalized Snell s law. It id worth noting that the total thickness of such planar metasurface is approximately 1/5 of working wavelength, which may be beneficial to the miniaturization and integration of acoustic equipment.
A phenomenological method is developed to consider elastic guided wave propagation in complex curved waveguides. The theory on guided wave propagation in hollow circular cylinders is used in order to verify the method. The results are compared with solutions obtained by the Helmholtz decomposition method. The method given here is used to derive new analytical relations for torsional and longitudinal phase velocity dispersion curves. In addition, a new excitation method is proposed and examined for flexural modes. Some conceptual results and applications of the method are discussed.
The perturbative stability of catenoidal soap films formed between parallel, equal radii, coaxial rings is studied using analytical and semi-analytical methods. Using a theorem on the nature of eigenvalues for a class of Sturm--Liouville operators, we show that for the given boundary conditions, azimuthally asymmetric perturbations are stable, while symmetric perturbations lead to an instability--a result demonstrated in Ben Amar et. al [7] using numerics and experiment. Further, we show how to obtain the lowest real eigenvalue of perturbations, using the semi-analytical Asymptotic Iteration Method (AIM). Conclusions using AIM support the analytically obtained result as well as the results in [7]. Finally, we compute the eigenfunctions and show, pictorially, how the perturbed soap film evolves in time.
The Langevin theory of the polarization of a dilute collection of dipoles by an external field is often included in introductory solid state physics and physical chemistry curricula. The average polarization is calculated assuming the dipoles are in thermal equilibrium with a heat bath. The heart of the polarization calculation is a derivation of the average dipole-field projection, whose dependence on the external field is given by the Langevin function. The Langevin problem is revisited, here, and the average projection of any given dipole onto any other dipole from the collection is derived in terms of the Langevin function. A simple expression is obtained for the underlying dipole-dipole angular distribution function.
We discuss the multipolar expansion of the electromagnetic field with an emphasis on the radiated field. We investigate if the employment of Jefimenko s equations brings a new insight into the calculation of the radiation field. We show that the affirmation is valid if one finds an interesting example in which inverting the order between spatial derivatives and integration is not allowed. Further, we consider the generalization of the multipolar expansion of the power radiated by a confined system of charges and currents to a higher arbitrary order.
An effective method based on Hubbard-Schofield approach [Phys. Lett. A {\\bf 40}, 245 (1972)] is developed to calculate the free energy of classical Coulomb systems. This method significantly simplifies the derivation of the cluster expansion. A diagrammatic representation of the cluster integrals is proposed. Simple rules providing the leading order in density $n$ of each diagrammatic contribution are found. We calculate the $n^3$ contribution and recover the results at the order $n^{5/2}$ obtained by the traditional method of resummation of diverging Mayer bonds.
Point multipole expansions are widely used to gain physical insight into complex distributions of charges and to reduce the cost of computing interactions between such distributions. However, practical applications that typically retain only a few leading terms may suffer from unacceptable loss of accuracy in the near-field. We propose an alternative approach for approximating electrostatic charge distributions, Optimal Physical Multipoles (OPMs), which optimally represent the original charge distribution with a set of point charges. By construction, approximation of electrostatic potential based on OPMs retains many of the useful properties of the corresponding point multipole expansion, including the same asymptotic behavior of the approximate potential for a given multipole order. At the same time, OPMs can be significantly more accurate in the near field: up to 5 times more accurate for some of the charge distributions tested here which are relevant to biomolecular modeling. Unlike point multipoles, for point charge distributions the OPM always converges to the original point charge distribution at finite order. Furthermore, OPMs may be more computationally efficient and easier to implement into existing molecular simulations software packages than approximation schemes based on point multipoles. In addition to providing a general framework for computing OPMs to any order, closed-form expressions for the lowest order OPMs (monopole and dipole) are derived. Thus, for some practical applications Optimal Physical Multipoles may represent a preferable alternative to point multipoles.
This work addresses the electrostatic problem of a thin, curved, cylindrical conductor, or a conducting filament, and shows that the corresponding linear charge density slowly tends to uniformity as the inverse of the logarithm of a characteristic parameter. An alternative derivation of this result directly based on energy minimization is developed. These results are based on a general asymptotic analysis of the electric field components and potential near a charge filament in the limit of vanishing diameter. It is found that the divergent parts of the radial and azimuthal electric field components, as well as the electric potential, are determined by the local charge density while the axial component is determined by the local dipole density. For a straight filament, these results reduce to those for conducting needles discussed in the literature. For curved filaments, there is an additional length scale in the problem arising from the finite radius of curvature of the filament. Remarkably, the basic uniformity result survives the added complications, which include an azimuthal variation in the surface charge density of the filament. These uniformity results yield an asymptotic formula for the capacitance of a curved filament that generalizes Maxwell s original result. The examples of a straight filament with uniform and linearly varying charge densities, as well as a circular filament with a uniform charge distribution, are treated analytically and found to be in agreement with the results of the general analysis. Numerical calculations illustrating the slow convergence of linear charge distribution to uniformity for an elliptical filament are presented, and an interactive computer program implementing and animating the numerical calculations is provided.
We provide models to describe dynamics of a point-like body whose motion interacts with surroundings. We study various, given dynamics of real objects whose response to an external force is specified solely by the trajectory of a single point, whose velocity eventually stops changing after the cessation of the external force. We introduce novel models of the long term dynamics , which are polynomials in time derivatives of the external force.
An equation of motion is derived for a topologically cylindrical worldsheet of lightlike electromagnetic current, embedded in 3+1 dimensions in a smooth external electromagnetic field. Then it is shown that the static circle of uniformly distributed lightlike current solves this equation with the external field replaced by the self-field. From a characterisation of the singular behavior of the field strength near a general worldsheet, it is argued that the worldsheet of lightlike current has a well-defined dynamics. The energy-momentum tensor of the system and the possible coupling of the system (and its electromagnetically neutral analog) to gravitation are considered.
The dynamic of a classical system can be expressed by means of Poisson brackets. In this paper we generalize the relation between the usual non covariant Hamiltonian and the Poisson brackets to a covariant Hamiltonian and new brackets in the frame of the Minkowski space. These brackets can be related to those used by Feynman in his derivation of Maxwell s equations. The case of curved space is also considered with the introduction of Christoffel symbols, covariant derivatives, and curvature tensors.
The recently-emerged concept of \"invisible gateway\" with the extraordinary capability to block the waves but allow the passage of other entities has attracted great attentions due to the general interests in illusion devices. However, the possibility to realize such a fascinating phenomenon for acoustic waves has not yet been explored, which should be of paramount significance for acoustical applications but would necessarily involve experimental difficulty. Here we design and experimentally demonstrate an acoustic invisible gateway (AIG) capable of concealing a channel under the detection of sound. Instead of \"restoring\" a whole block of background medium by using transformation acoustics that inevitably requires complementary or restoring media with extreme parameters, we propose an inherently distinct methodology that only aims at engineering the surface impedance at the \"gate\" to mimic a rigid \"wall\" and can be conveniently implemented by decorating meta-structures behind the channel. Such a simple yet effective design of AIG also enables analyzing the physics behind this extraordinary phenomenon in an analytical manner, which agrees quite well with the numerical and experimental results. Furthermore, our scheme offers possibility to manipulate the symmetry of AIGs freely, which is proven both theoretically and experimentally by demonstrating two distinctive examples of one-way and two-way AIGs. We anticipate the realization of AIGs will open new avenues to illusion acoustics with potential applications in acoustic measurement and acoustic device, and provide inspirations for similar researches in other fields.
The paper presents an alternative way to classical stereocorrelation. First, 2D image processing of random patterns is described. Sub-pixel displacements are determined using phase analysis. Then distortion evaluation is presented. The distortion is identified without any assumption on the lens model because of the use of a grid technique approach. Last, shape measurement and shape variation is caught by fringe projection. Analysis is based on two pin-hole assumptions for the video-projector and the camera. Then, fringe projection is coupled to in-plane displacement to give rise to 3D measurement set-up. Metrological characterization shows a resolution comparable to classical (stereo) correlation technique (1/100th pixel). Spatial resolution seems to be an advantage of the method, because of the use of temporal phase stepping (shape measurement, 1 pixel) and windowed Fourier transform (in plane displacements measurement, 9 pixels). Two examples are given. First one is the study of skin properties; second one is a study on leather fabric. In both cases, results are convincing, and have been exploited to give mechanical interpretation.
In this paper the relaxed micromorphic continuum model with weighted free and gradient micro-inertia is used to describe the dynamical behavior of a real two-dimensional phononic crystal for a wide range of wavelengths. In particular, a periodic structure with specific micro-structural topology and mechanical properties, capable of opening a phononic band-gap, is chosen with the criterion of showing a low degree of anisotropy (the band-gap is almost independent of the direction of propagation of the traveling wave). A Bloch wave analysis is performed to obtain the dispersion curves and the corresponding vibrational modes of the periodic structure. A linear-elastic, isotropic, relaxed micromorphic model including both a free micro-inertia (related to free vibrations of the microstructures) and a gradient micro-inertia (related to the motions of the microstructure which are coupled to the macro-deformation of the unit cell) is introduced and particularized to the case of plane wave propagation. The parameters of the relaxed model, which are independent of frequency, are then calibrated on the dispersion curves of the phononic crystal showing an excellent agreement in terms of both dispersion curves and vibrational modes. Almost all the homogenized elastic parameters of the relaxed micromorphic model result to be determined. This opens the way to the design of morphologically complex meta-structures which make use of the chosen phononic structure as the basic building block and which preserve its ability of \"stopping\" elastic wave propagation at the scale of the structure.
This paper describes the appearance of abnormal film thickness features formed in elastohydrodynamic contacts lubricated by a fatty alcohol. Experiments were conducted by varying the slide to roll ratio between a steel ball and a glass disk in a ball-on-disk type device. Lauric alcohol was used as lubricant and film thickness was measured in the contact area by optical interferometry. Experimental results showed that the film thickness distributions under pure rolling conditions remained classical whereas the film shape changed when the slide to roll ratio was increased. The thickness in the central contact area increased and in the same time inlet and exit film thicknesses were modified. In addition, the film shapes observed when the ball surface was moving faster than the disk one and those obtained in the opposite case were different, i.e. when opposite signs but equal absolute values of the slide to roll ratio were applied.
Fractional analysis is applied to describe classical dynamical systems. Fractional derivative can be defined as a fractional power of derivative. The infinitesimal generators {H, .} and L=G(q,p) \\partial_q+F(q,p) \\partial_p, which are used in equations of motion, are derivative operators. We consider fractional derivatives on a set of classical observables as fractional powers of derivative operators. As a result, we obtain a fractional generalization of the equation of motion. This fractional equation is exactly solved for the simple classical systems. The suggested fractional equations generalize a notion of classical systems to describe dissipative processes.
We study the stability of circular orbits of the electromagnetic two-body problem in an electromagnetic setting that includes retarded and advanced interactions. We give a method to derive the equations of tangent dynamics about circular orbits up to nonlinear terms and we derive the linearized equations explicitly. In particular we study the normal modes of the linearized dynamics that have an arbitrarily large imaginary eigenvalue. These large imaginary eigenvalues define fast frequencies that introduce a fast (stiff) timescale into the dynamics. As an application of Dirac s electrodynamics of point charges with retarded-only interactions, we study the conditions for the two charges to perform a fast gyrating motion of small radius about a circular orbit. The fast gyration defines an angular momentum of the order of the orbital angular momentum, a vector that rotates in the orbital plane at a frequency of the order of the orbital frequency and causes a gyroscopic torque. We explore a consequence of this multiscale solution, i.e; the resonance condition that the angular momentum of the stiff spinning should rotate exactly at the orbital frequency. The resonant orbits turn out to have angular momenta that are integer multiples of Planck s constant to a good approximation. Among the many qualitative agreements with quantum electrodynamics (QED), the orbital frequency of the resonant orbits are given by a difference of two eigenvalues of a linear operator and the emission lines of QED agree with our predictions within a few percent.
It is proposed to identify damage variables and their growth with loading in two dimensions by only using full-field displacement measurements. The equilibrium gap method is used to estimate the damage field during a biaxial experiment on a sample made of a composite material. From the analysis of a sequence of measurements, a proposed form of constitutive law is tested and identified. The emphasis is put on the methodology that can be applied to a vast class of materials.
The charging of insulating samples degrades the quality and complicates the interpretation of images in scanning electron microscopy and is important in other applications, such as particle detectors. In this paper we analyze this nontrivial phenomenon on different time scales employing the drift-diffusion-reaction approach augmented with the trapping rate equations and a realistic semi-empirical source function describing the pulsed nature of the electron beam. We consider both the fast processes following the impact of a single primary electron, the slower dynamics resulting from the continuous bombardment of a sample, and the eventual approach to the steady-state regime.
A simple text book problem in mechanics\\cite{klep}, describes a massive horizontal bar placed on two oppositely rotating rollers, kept at a fixed center to center distance. Subsequent motion is to be found out in presence of kinetic frictions at the point of contacts of the two rollers\\cite{demo}. Introducing bulk rolling friction effects, through the contact planes and considering viscoelastic rollers, we find that the inverse of the square of the oscillation frequency of the bar has a linear relationship with the center to center distance. The gradient and intercept of the linear relation together with observations about two consecutive positions of the bar, determine the rolling friction coefficient of the viscoelastic materials of the two rollers fully.
We report on the dynamics of a model frictional system submitted to minute external perturbations. The system consists of a chain of sliders connected through elastic springs that rest on an incline. By introducing cyclic expansions and contractions of the springs we observe a reptation of the chain. We account for the average reptation velocity theoretically. The velocity of small systems exhibits a series of plateaus as a function of the incline angle. Due to elastic e ects, there exists a critical amplitude below which the reptation is expected to cease. However, rather than a full stop of the creep, we observe in numerical simulations a transition between a continuous-creep and an irregular-creep regime when the critical amplitude is approached. The latter transition is reminiscent of the transition between the continuous and the irregular compaction of granular matter submitted to periodic temperature changes.
In this paper we express the retarded fields of Maxwell s theory in terms of the instantaneous fields of a Galilei-invariant electromagnetic and we find the vector function whose spatial and temporal derivatives transform the instantaneous fields into the retarded ones. We conclude that the instantaneous fields can formally be introduced as unphysical objects into classical electrodynamics which can be used to find the physical retarded fields.
We realize a flat lens with graded negative refractive index by a two-dimensional phononic crystal. The index-grade is achieved by gradual modification of the filling fraction along the transverse direction to propagation. We demonstrate that this lens can realize the focusing and amplification of parallel incident acoustic waves. A formula for the refractive index profile is derived by which the lens with desired focal length can be precisely designed and the aberrations of image can be effectively reduced. This designable lens is expected to bear significance in applications such as coupling or integration with various types of acoustic devices.
When twisting a strip of paper or acetate under high longitudinal tension, one observes, at some critical load, a buckling of the strip into a regular triangular pattern. Very similar triangular facets have recently been observed in solutions to a new set of geometrically-exact equations describing the equilibrium shape of thin inextensible elastic strips. Here we formulate a modified boundary-value problem for these equations and construct post-buckling solutions in good agreement with the observed pattern in twisted strips. We also study the force-extension and moment-twist behaviour of these strips by varying the mode number n of triangular facets.
In order to study further the promising free piston Stirling engine architecture, there is a need of an analytical thermodynamic model which could be used in a dynamical analysis for preliminary design. To aim at more realistic values, the models have to take into account the heat losses and irreversibilities on the engine. An analytical model which encompasses the critical flaws of the regenerator and furthermore the heat exchangers effectivenesses has been developed. This model has been validated using the whole range of the experimental data available from the General Motor GPU-3 Stirling engine prototype. The effects of the technological and operating parameters on Stirling engine performance have been investigated. In addition to the regenerator influence, the effect of the cooler effectiveness is underlined.
This paper deals with the vibration of granular materials due to cyclic external excitation. It highlights the effect of the acceleration on the settlement speed and proves the existence of a relationship between settlement and loss of contacts in partially confined granular materials under vibration. The numerical simulations are carried out using the Molecular Dynamics method, where the discrete elements consist of polygonal grains. The data analyses are conducted based on multivariate autoregressive models to describe the settlement and permanent contacts number with respect to the number of loading cycles.
High speed machining has been improved thanks to considerable advancement on the tools (optimum geometry, harder materials), on machined materials (increased workability and machining capacity for harder workpieces) and finally on the machines (higher accuracy and power at the high speeds, performances of the numerical control system). However at such loading velocities, the cutting process generates high strain and high-speed strain which cause complex, various and irreversible phenomena in plasticity. These phenomena are comprehended through the complete measurement of the mechanical actions using a six-component dynamometer and flux and temperatures measurements at the tip of the cutting tool. Balanced energy assessments are the starting points of our reflection on the machining modelling. The modelling of these phenomena and the material behaviour under this type of loading requires a suitable theoretical approach. The main points of the strain gradient theory are developed. A theoretical behaviour law adapted to the cutting phenomena is then expressed.
The formalism of local maximization for entropy gradient producing the evolution and dynamical equations for closed systems. It eliminates the inconsistency between the reversibilty of time in dynamical equations and the strict direction of irreversible evolution for complex systems, causality contradictions and ambiguity of time flow in different systems. Independently it leads to basic principles of special relativity.
While it is well-known that quantum mechanics can be reformulated in terms of a path integral representation, it will be shown that such a formulation is also possible in the case of classical mechanics. From Koopman-von Neumann theory, which recasts classical mechanics in terms of a Hilbert space wherein the Liouville operator acts as the generator of motion, we derive a path integral representation of the classical propagator and suggest an efficient numerical implementation using fast fourier transform techniques. We then include a first quantum correction to derive a revealing expression for the semi-classical path integral, which augments the classical picture of a single trajectory through phase space with additional wave-like spreading.
Sound absorbing materials are usually defined by five parameters: open porosity, static airflow resistivity, tortuosity, and two characteristic lengths. In recent decades, different methods have been developed in order to characterize these parameters. These methods may be divided following three approaches: i) inverse, ii) indirect and iii) direct. The inverse approach is based on an optimisation problem where the material parameters are adjusted in the acoustic model to reproduce acoustical measurements. The indirect approach is based on the acoustical model from which analytical expressions linking the material parameters to acoustical measurements are derived. Contrary to the previous two approaches, the direct approach is not based on acoustical measurements. It is based on the physical and mathematical definition of the parameters and requires dedicated equipments. In this study, the five parameters have been measured for different porous materials using some direct, indirect and inverse methods. A comparison of the different results is carried out, and shows that the different methods may yield large variability in the found parameters. A discussion is given to explain the observed variability and the limitations of the methods.
We study the flow of energy between a harmonic oscillator (HO) and an external environment consisting of N two-degrees of freedom non-linear oscillators, ranging from integrable to chaotic according to a control parameter. The coupling between the HO and the environment is bilinear in the coordinates and scales with system size with the inverse square root of N. We study the conditions for energy dissipation and thermalization as a function of N and of the dynamical regime of the non-linear oscillators. The study is classical and based on single realization of the dynamics, as opposed to ensemble averages over many realizations. We find that dissipation occurs in the chaotic regime for a fairly small N, leading to the thermalization of the HO and environment a Boltzmann distribution of energies for a well defined temperature. We develop a simple analytical treatment, based on the linear response theory, that justifies the coupling scaling and reproduces the numerical simulations when the environment is in the chaotic regime.
Spatial coordinate transformation is used as a reliable tool to control electromagnetic fields. In this paper, we derive the permeability and permittivity tensors of a metamaterial able to transform an isotropically radiating source into a compact ultradirective antenna in the microwave domain. We show that the directivity of this antenna is competitive with regard to conventional directive antennas horn and reflector antennas, besides its dimensions are smaller. Numerical simulations using finite element method are performed to illustrate these properties. A reduction in the electromagnetic material parameters is also proposed for an easy fabrication of this antenna from existing materials. Following that, the design of the proposed antenna using a layered metamaterial is presented. The different layers are all composed of homogeneous and uniaxial anisotropic metamaterials, which can be obtained from simple metal-dielectric structures. When the radiating source is embedded in the layered metamaterial, a highly directive beam is radiated from the antenna
Active cancellation of broadband random noise requires the detection of the incoming noise with some time advance. In an duct for example this advance must be larger than the delays in the secondary path from the control source to the error sensor. In this paper it is shown that, in some cases, the advance required for perfect noise cancellation is theoretically infinite because the inverse of the secondary path, which is required for control, can include an infinite non-causal response. This is shown to be the result of two mechanisms: in the single-channel case (one control source and one error sensor), this can arise because of strong echoes in the control path. In the multi-channel case this can arise even in free field simply because of an unfortunate placing of sensors and actuators. In the present paper optimal feedforward control is derived through analytical and numerical computations, in the time and frequency domains. It is shown that, in practice, the advance required for significant noise attenuation can be much larger than the secondary path delays. Practical rules are also suggested in order to prevent infinite non-causality from appearing.
The inversion of cause and effect in the classic description of electromagnetism, gives rise to a conceptual error which is at the bottom of many paradoxes and exceptions. At present, the curious fact that unipolar induction or the Faraday Disc constitutes an exception to the Faraday induction law is generally accepted. When we establish the correct cause and effect relationship a close connection appears between mechanics and electromagnetism, as does a new induction law for which paradoxes or exceptions do not occur. Some paradoxical experiments in unipolar induction involving the unique geometry of the spiral are described demonstrating the inversion of cause and effect. The emf and torque of the Faraday Disc and the conducting spiral is due to the continuous variation of the electromagnetic angular moment of the continuous current. This experiments confirm the Lorentz Force and invalidate Faradays Induction Law. They show how in a closed circuit emf and unipolar torque are not produced by the variation in magnetic flux, which is constant, but by two variations in the electromagnetic angular moment. The three possible ways of varying the electromagnetic angular moment generated by the circulation of the charges gives rise to the different forms of electromagnetic induction.
Yield design formulation for porous media subjected to flow, using approximate pressure field. We attempt here to use the kinematic method of yield design in the case of a porous medium subjected to flow (with or without free surface), without looking for the exact solution of the pressure field. The method proposed here is based on the use of approximate pressure fields. In this paper, we show how, under different conditions concerning the yield criterion and the velocity field, the use of such approximate fields allows to obtain a necessary condition for stability without having to find the real pressure field. Nous cherchons ici \\`a utiliser la m\\ ethode cin\\ ematique du calcul \\`a la rupture dans le cas d un milieu poreux soumis \\`a un \\ ecoulement avec ou sans surface libre sans conna\\^itre la solution exacte du champ de pression. La m\\ ethode propos\\ ee ici repose sur l utilisation de champs de pression approch\\ es par d\\ efaut. Nous montrerons comment sous certaines conditions portant sur le crit\\`ere de r\\ esistance et sur le champ de vitesse utilis\\ e, l utilisation de tels champs de pression approch\\ es permet d obtenir une condition n\\ ecessaire de stabilit\\ e sans avoir \\`a d\\ eterminer exactement l \\ ecoulement.
This study addresses the perennial issue of acceleration runaway from radiation reaction noted in the dynamics of a charged particle. Through ab-initio formalism that works out the paths of stationary action considering the additional measure of minimum radiation loss in the paths, it is shown that the nonlocal force is a necessary addition for the dynamic description. The wave velocity governed force is shown to have a critical limit of defending coherence in the field-particle interaction against external perturbation. In the accelerated motion of charged particle, the defending force critically counterbalances the torsion component of radiation recoil and thereby it sets restraint to the unlimited growth of acceleration under abrupt withdrawal of external field and avoids the runaway situation. The dynamic description with the nonlocal mediation has the generality of comprehending the quantum feature of energy-momentum and the evolution features in the nonstationary situations. Key words: Lorentz-Abraham-Dirac equation, Nonlocality, Quantized action, Coherence and decoherence, Dissipation, Hawking radiation.
Small volume, reduced conductivity and high frequencies are major imperatives in the design of communications infrastructure. The radiation efficiency $\\eta_r$ impacts on the optimal gain, quality factor, and bandwidth. The current efficiency limit applies to structures confined to a radian sphere $ka$ ($k$ is the wave number, $a$ is the radius). Here we present new absolute limits to $\\eta_r$ for arbitrary antenna shapes based on $k^2S$ where $S$ is the conductor surface area. For a dipole with an electrical length of $10^{-5}$ our result is four orders of magnitude closer to the analytical solution when compared with previous bounds on the efficiency. The improved bound on $\\eta_r$ is more accurate, more general, and easier to calculate than other limits. It is based on the total surface area of the conductors and provides greatly improved estimations for electrically small radiators. We also predict the maximum radiation efficiency of structures with infinitely thin materials. The work is of great benefit to antenna designers assessing new materials such as graphene and conductive polymers.
There is a similar behaviour between the toroidal coordinates and the dipole magnetic field produced by a circular loop. In this work we evaluate up to what extent the former can be used as a representation of the latter. While the tori in the toroidal coordinates have circular cross sections, those of the circular loop magnetic field are nearly elliptical ovoids, but they are very similar for large aspect ratios.The centres of the latter displace from the axis faster than the former. By making a comparison between tori of similar aspect ratios, we find quantitative criteria to evaluate the accuracy of the approximation.
A method for designing transformation electromagnetics devices using tensor impedance surfaces (TISs) is presented. The method is first applied to idealized tensor impedance boundary conditions (TIBCs), and later to printed-circuit tensor impedance surfaces (PCTISs). A PCTIS is a practical realization of a TIBC. It consists of a tensor impedance sheet, which models a subwavelength patterned metallic cladding, over a grounded dielectric substrate. The method outlined in this paper allows anisotropic TIBCs and PCTISs to be designed that support tangential wave vector distributions and power flow directions specified by a coordinate transformation. As an example, beamshifting devices are designed, using TIBCs and PCTISs, that allow a surface wave to be shifted laterally. The designs are verified with a commercial full-wave electromagnetic solver. This work opens new opportunities for the design and implementation of anisotropic and inhomogeneous printed-circuit or graphene based surfaces that can guide or radiate electromagnetic fields.
The restrictions of analyticity, relativistic (Born) rigidity, and negligible O(a) terms involved in the evaluation of the self electromagnetic force on an extended charged sphere of radius \"a\" are explicitly revealed and taken into account in order to obtain a classical equation of motion of the extended charge that is both causal and conserves momentum-energy. Because the power-series expansion used in the evaluation of the self force becomes invalid during transition time intervals immediately following the application and termination of an otherwise analytic externally applied force, transition forces must be included during these transition time intervals to remove the noncausal pre-acceleration and pre-deceleration from the solutions to the equation of motion without the transition forces. For the extended charged sphere, the transition forces can be chosen to maintain conservation of momentum-energy in the causal solutions to the equation of motion within the restrictions of relativistic rigidity and negligible O(a) terms under which the equation of motion is derived. However, it is shown that renormalization of the electrostatic mass to a finite value as the radius of the charge approaches zero introduces a violation of momentum-energy conservation into the causal solutions to the equation of motion of the point charge if the magnitude of the external force becomes too large. That is, the causal classical equation of motion of a point charge with renormalized mass experiences a high acceleration catastrophe.
This work theoretically analyzes the sound absorption properties of a chirped multi-layer porous material including transmission, in particular showing the broadband unidirectional absorption properties of the system. Using the combination of the impedance matching condition and the balance between the leakage and the intrinsic losses, the system is designed to have broadband unidirectional and quasi perfect absorption. The transfer and scattering matrix formalism, together with numerical simulations based on the finite element method are used to demonstrate the results showing excellent agreement between them. The proposed system allows to construct broadband sound absorbers with improved absorption in the low frequency regime using less amount of material than the complete bulk porous layer.
Several new ideas related to Special and General Relativity are proposed. The black-box method is used for the synchronization of the clocks and the space axes between two inertial systems or two accelerated systems and for the derivation of the transformations between them. There are two consistent ways of defining the inputs and outputs to describe the transformations and relative motion between the systems. The standard approach uses a mixture of the two ways. By formulating the principle of special and general relativity as a symmetry principle we are able to specify these transformations to depend only on a constant. The transformations become Galilean if the constant is zero. Validity of the Clock Hypothesis for uniformly accelerated systems implies zero constant. If the constant is not zero, we can introduce a metric under which the transformations become self adjoint. In case of inertial systems, the metric is the Minkowski metric and we obtain a unique invariant maximal velocity. The ball of the relativistically admissible velocities is a bounded symmetric domain under projective maps. For uniformly accelerated systems the existence of an invariant \\textit{maximal acceleration} is predicted. This is the only method of describing transformations between uniformly accelerated systems without assuming the Clock Hypothesis.
There is actually a mistake in this paper, but it is still a nice try worth a read. It is (not quite) proved that within the framework of Special Relativity, a force exerted on a \\emph{classical particle} by a field must be of the form $\\yv{E}+\\yv{v}\\times\\yv{B}$, the Lorentz force form. The proof makes use of an action principle in which the action is the sum of a free particle part, and an interaction part.
In 1892 H.A. Lorentz started the search for a classical equation of motion for pointlike charged particles that takes into account the radiation reaction force. This search culminated in the Lorentz-Abraham-Dirac equation of motion, which is not satisfactory since it exhibits self-acceleration causing runaway solutions. In spite of ongoing efforts for more than a century, there is yet no acceptable classical equation of motion for a pointlike charge, cf. the recent paper by Rohrlich and the comments about his proposal. So, it is still an open question how to augment continuous classical electrodynamics with the physical concept of pointlike charged particles. The pointlike charge is presently only a common and handy computational device, which we generalized by the expansions in terms of co-moving moments of time-dependent, moving charges and currents.
This paper presents a theoretical study of oscillatory and rotational instabilities of a solid spherical body, levitated electromagnetically in axisymmetric coils made of coaxial circular loops. We apply our previous theory to analyze the static and dynamic stability of the sample depending on the ac frequency and the position of the sample in the coils for several simple configurations. We introduce an original analytical approach employing a gauge transformation for the vector potential. First, we calculate the spring constants that define the frequency of small-amplitude oscillations. For static stability, the spring constants must be positive. Dynamic instabilities are characterized by critical ac frequencies that, when exceeded, may result either in a spin-up or oscillations with increasing amplitude. We found that the critical frequencies increase with the nonuniformity of the field. We show that for a spherically harmonic field, the critical frequency for the spin-up instability in a field of degree $l$ coincides with the critical frequency for the oscillatory instability in a field of degree $l+1$.
Multiple scattering of wave in strong heterogeneity can cause resonance-like wave phenomenon where signal exhibits low-frequency, high intensity, and slowly propagating wave packet velocity. For example, long period event in volcanic seismology and plasmon wave and quantum Hall effect in wave-particle interactions. Collective behaviour in a many-body system is usually thought to be the source for generating the anomalies. However, the detail physical mechanism is not fully understood. Here I show by wave field modeling for microscopic bubble cloud model and 1D heterogeneity that the anomalies are associated with low-frequency resonance in strong small-scale heterogeneity. This low-frequency resonance is a kind of wave coherent scattering enhancement or emergence phenomenon that occurs in transient regime. Its resonance frequency is inversely proportional to heterogeneous scale and contrast and will further shift toward lower frequency with random heterogeneous scale and velocity fluctuations. Low-frequency resonance exhibits the characteristics of localized wave in space and the shape of ocean wave in time and is a ubiquitous wave phenomenon in wave physics.
For a one-dimensional conservative systems with position depending mass, one deduces consistently a constant of motion, a Lagrangian, and a Hamiltonian for the non relativistic case. With these functions, one shows the trajectories on the spaces $(x,v)$ and ($x,p)$ for a linear position depending mass. For the relativistic case, the Lagrangian and Hamiltonian can not be given explicitly in general. However, we study the particular system with constant force and mass linear dependence on the position where the Lagrangian can be found explicitly, but the Hamiltonian remains implicit in the constant of motion.
We address the problem of inertial property of matter through analysis of the motion of an extended charged particle. Our approach is based on the continuity equation for momentum (Newton s second law) taking due account of the vector potential and its convective derivative. We obtain a development in terms of retarded potentials allowing an intuitive physical interpretation of its main terms. The inertial property of matter is then discussed in terms of a kind of induction law related to the extended charged particle s own vector potential. Moreover, it is obtained a force term that represents a drag force acting on the charged particle when in motion relatively to its own vector potential field lines. The time rate of variation of the particle s vector potential leads to the acceleration inertia reaction force, equivalent to the Schott term responsible for the source of the radiation field. We also show that the velocity dependent term of the particle s vector potential is connected with the relativistic increase of mass with velocity and generates a longitudinal stress force that is the source of electric field lines deformation. In the framework of classical electrodynamics, we have shown that the electron mass has possibly a complete electromagnetic origin and the obtained covariant equation solves the \"4/3 mass paradox\" for a spherical charge distribution.
Bifurcation theory and continuation methods are well-established tools for the analysis of nonlinear mechanical systems subject to periodic forcing. We illustrate the added value and the complementary information provided by singularity theory with one distinguished parameter. While tracking bifurcations reveals the qualitative changes in the behaviour, tracking singularities reveals how structural changes are themselves organised in parameter space. The complementarity of that information is demonstrated in the analysis of detached resonance curves in a two-degree-of-freedom system.
A new type of pulse high voltage electric discharge through a thin conducting layer on the surface of glass plate has been investigated. The afterglow plasma of this discharge forms quasi-spherical object with a lifetime about 0.2-0.3 s. Electric properties of the objects were studied by electric probe method. Measurements of plasma radiation spectra kinetics at visible and near ultraviolet spectral ranges have been carried out. Comparative analysis of the physical properties of the plasmoids appearing in this discharges and of ones generated via thin metal wires burning is given. Possible mechanism of the plasma metastability are discussed.
High flux expansion divertor studies have been carried out in the National Spherical Torus Experiment using steady-state X-point height variations from 22 to 5-6 cm. Small-ELM H-mode confinement was maintained at all X-point heights. Divertor flux expansions from 6 to 26-28 were obtained, with associated reduction in X-point connection length from 5-6 m to 2 m. Peak divertor heat flux was reduced from 7-8 MW/m$^2$ to 1-2 MW/m$^2$. In low X-point configuration, outer strike point became nearly detached. Among factors affecting deposition of parallel heat flux in the divertor, the flux expansion factor appeared to be dominant
We report experimental results validating the concept that plasma confinement is enhanced in a magnetic cusp configuration when beta (plasma pressure/magnetic field pressure) is order of unity. This enhancement is required for a fusion power reactor based on cusp confinement to be feasible. The magnetic cusp configuration possesses a critical advantage: the plasma is stable to large scale perturbations. However, early work indicated that plasma loss rates in a reactor based on a cusp configuration were too large for net power production. Grad and others theorized that at high beta a sharp boundary would form between the plasma and the magnetic field, leading to substantially smaller loss rates. The current experiment validates this theoretical conjecture for the first time and represents critical progress toward the Polywell fusion concept which combines a high beta cusp configuration with an electrostatic fusion for a compact, economical, power-producing nuclear fusion reactor.
This proceedings paper from 2004 contains figures of discharges in different gap lengths at the same potential that are not available elsewhere. The 2004 abstract: The evolution of streamers is known to depend on gas composition and electrode geometry, on polarity and size of the voltage and also on the electric circuit that produces the high voltage pulse. To characterize the phenomena better and to compare with theory, a new larger experimental setup with vacuum enclosure has been built. We here present first results in this setup on positive streamers in air at fixed voltage and varying electrode distance. While next to the emitting anode tip, a similar number of streamers seems to emerge due to multiple branching, more streamers seem to survive over a fixed distance, when the gap is shorter. When lowering the voltage, streamers branch less at all distances from the anode tip or do not branch at all beyond a certain distance.
The effects of viscosity and small-scale atomic-level mixing on plasmas in inertial confinement fusion (ICF) currently represent challenges in ICF research. Many current ICF hydrodynamic codes ignore the effects of viscosity though recent research indicates viscosity and mixing by classical transport processes may have a substantial impact on implosion dynamics. We have implemented a Lagrange hydrodynamic code in one-dimensional spherical geometry with plasma viscosity and mass transport and including a three temperature model for ions, electrons, and radiation treated in a gray radiation diffusion approximation. The code is used to study ICF implosion differences with and without plasma viscosity and to determine the impacts of viscosity on temperature histories and neutron yield. It was found that plasma viscosity has substantial impacts on ICF shock dynamics characterized by shock burn timing, maximum burn temperatures, convergence ratio, and time history of neutron production rates. Plasma viscosity reduces the need for artificial viscosity to maintain numerical stability in the Lagrange formulation and also modifies the flux-limiting needed for electron thermal conduction.
A set of flux tube gyrokinetic equations that includes the effect of the spatial variation of the density, temperature and rotation gradients on the turbulence is derived. This new set of equations uses periodic boundary conditions. In the limit $l_\\bot/L \\ll 1$, where $l_\\bot$ is the characteristic perpendicular length of turbulent structures and $L$ is the characteristic size of the device, this new set of flux tube gyrokinetic equations is shown to be equivalent to the traditional global $\\delta f$ gyrokinetic equations to an order higher in $l_\\bot/L$ than the usual flux tube formulations.
The effects of friction on the ion acoustic (IA) wave in fully and partially ionized plasmas are studied. In a quasi-neutral electron-ion plasma the friction between the two species cancels out exactly and the wave propagates without any damping. If the Poisson equation is used instead of the quasi-neutrality, however, the IA wave is damped and the damping is dispersive. In a partially ionized plasma, the collisions with the neutrals modify the IA wave beyond recognition. For a low density of neutrals the mode is damped. Upon increasing the neutral density, the mode becomes first evanescent and then reappears for a still larger number of neutrals. A similar behavior is obtained by varying the mode wave-length. The explanation for this behavior is given. In an inhomogeneous plasma placed in an external magnetic field, and for magnetized electrons and un-magnetized ions, the IA mode propagates in any direction and in this case the collisions make it growing on the account of the energy stored in the density gradient. The growth rate is angle dependent. A comparison with the collision-less kinetic density gradient driven IA instability is also given.
It is pointed that there is a current jump between the edge plasma inside the last closed magnetic surface and the scrape-off layer and the current jump can lead the external kink modes to convert to the tearing modes, due to the current interchange effects [L. J. Zheng and M. Furukawa, Phys. Plasmas 17, 052508 (2010)]. The magnetic reconnection in the presence of tearing modes subsequently causes the tokamak edge plasma to be peeled off to link to the diverters. In particular, the peeling or peeling-ballooning modes can become the \"peeling-off\" modes in this sense. This phenomenon indicates that the tokamak edge confinement can be worse than the expectation based on the conventional kink mode picture.
To rigorously model fast ions in fusion plasmas, a non-Maxwellian equilibrium distribution must be used. In the work, the response of high-energy alpha particles to electrostatic turbulence has been analyzed for several different tokamak parameters. Our results are consistent with known scalings and experimental evidence that alpha particles are generally well-confined: on the order of several seconds. It is also confirmed that the effect of alphas on the turbulence is negligible at realistically low concentrations, consistent with linear theory. It is demonstrated that the usual practice of using a high-temperature Maxwellian gives incorrect estimates for the radial alpha particle flux, and a method of correcting it is provided. Furthermore, we see that the timescales associated with collisions and transport compete at moderate energies, calling into question the assumption that alpha particles remain confined to a flux surface that is used in the derivation of the slowing-down distribution.
The collective motion of dust particles during the mode-coupling induced melting of a two-dimensional plasma crystal is explored in molecular dynamics simulations. The crystal is compressed horizontally by an anisotropic confinement. This compression leads to an asymmetric triggering of the mode-coupling instability which is accompanied by alternating chains of in-phase and anti-phase oscillating particles. A new order parameter is proposed to quantify the synchronization with respect to different directions of the crystal. Depending on the orientation of the confinement anisotropy, mode-coupling instability and synchronized motion are observed in one or two directions. Notably, the synchronization is found to be direction-dependent. The good agreement with experiments suggests that the confinement anisotropy can be used to explain the observed synchronization process.
Plasmas in which there is a threshold for a dominant reaction to take place (such as recombination or attachment) will have particle distributions that evolve as the reaction progresses. The form of the Boltzmann collision term in such a context will cause the distribution to drift from its initial form, and so cause for example temperature fluctuations in the plasma if the distribution is originally Maxwellian. This behaviour will impact on the relevant reaction rates in a feedback loop that is missing from simple chemical kinetic descriptions since the plasma cannot be considered to be isothermal, as is the case in the latter approach. In this article we present a simple kinetic model that captures these essential features, showing how cumulative differences in the instantaneous species levels can arise over the purely chemical kinetic description, with implications for process yields and efficiencies.
We respond to the recent comment [arXiv:1105.1593] on our Letter [G. G. Plunk and T. Tatsuno, Phys. Rev. Lett. 106, 165003 (2011)]. The comment claims that our argument for spectral transfer direction is incomplete. The comment gives an incomplete account of our argument. We explain how the argument of our Letter, in full, is self-contained consistent and well-supported by numerical evidence. Other technical statements made in the comment are explained to be incorrect. We direct interested readers to our forthcoming article, which should clarify any remaining technical ambiguities and also illuminate deeper physical issues.
The application of resonant magnetic perturbations (RMPs) produces splitting of the divertor strike point due to the interaction of the RMP field and the plasma field. The application of a rotating RMP field causes the strike point splitting to rotate, distributing the particle and heat flux evenly over the divertor. The RMP coils in MAST have been used to generate a rotating perturbation with a toroidal mode number n=3. The ELM frequency is doubled with the application of the RMP rotating field, whilst maintaining the H mode. During mitigation, the ELM peak heat flux is seen to be reduced by 50% for a halving in the ELM energy and motion of the strike point, consistent with the rotation of the applied RMP field, is seen using high spatial resolution (1.5mm at the target) heat flux profiles measured using infrared (IR) thermography.
The onset and evolution of magnetic fields in laboratory and astrophysical plasmas is determined by several mechanisms, including instabilities, dynamo effects and ultra-high energy particle flows through gas, plasma and interstellar-media. These processes are relevant over a wide range of conditions, from cosmic ray acceleration and gamma ray bursts to nuclear fusion in stars. The disparate temporal and spatial scales where each operates can be reconciled by scaling parameters that enable to recreate astrophysical conditions in the laboratory. Here we unveil a new mechanism by which the flow of ultra-energetic particles can strongly magnetize the boundary between the plasma and the non-ionized gas to magnetic fields up to 10-100 Tesla (micro Tesla in astrophysical conditions). The physics is observed from the first time-resolved large scale magnetic field measurements obtained in a laser wakefield accelerator. Particle-in-cell simulations capturing the global plasma and field dynamics over the full plasma length confirm the experimental measurements. These results open new paths for the exploration and modelling of ultra high energy particle driven magnetic field generation in the laboratory.
A new kinetic theory Boltzmann-like collision term including correlations is proposed. In equilibrium it yields the one-particle distribution function in the form of a generalised-Lorentzian resembling but not being identical with the so-called $\\kappa$ distribution frequently found in collisionless turbulent systems like space plasmas. We show that this distribution function satisfies a generalised $H$-theorem, yields an expression for the entropy that is concave. Thus, the distribution is a `true  thermodynamic equilibrium distribution, presumably valid for turbulent systems. In equilibrium it is possible to construct the fundamental thermodynamic quantities. This is done for an ideal gas only. The new kinetic equation can form the basis for obtaining a set of hydrodynamic conservation laws and construction of a generalised transport theory for strongly correlated states of a system.
Generation of zonal ow (ZF) by energetic particle (EP) driven toroidal Alfven eigenmode (TAE) is investigated using nonlinear gyrokinetic theory. It is found that, nonlinear resonant EP contri- bution dominates over the usual Reynolds and Maxwell stresses due to thermal plasma nonlinear response. ZF can be forced driven in the linear growth stage of TAE, with the growth rate being twice the TAE growth rate. The ZF generation mechanism is shown to be related to polarization induced by resonant EP nonlinearity. The generated ZF has both the usual meso-scale and micro- scale radial structures. Possible consequences of this forced driven ZF on the nonlinear dynamics of TAE are also discussed.
We calculate exact one-dimensional collisionless plasma equilibria for a continuum of flux tube models, for which the total magnetic field is made up of the `force-free  Gold-Hoyle magnetic flux tube embedded in a uniform and anti-parallel background magnetic field. For a sufficiently weak background magnetic field, the axial component of the total magnetic field reverses at some finite radius. The presence of the background magnetic field means that the total system is not exactly force-free, but by reducing its magnitude the departure from force-free can be made as small as desired. The distribution function for each species is a function of the three constants of motion; namely the Hamiltonian and the canonical momenta in the axial and azimuthal directions. Poisson s Equation and Amp\\`{e}re s Law are solved exactly, and the solution allows either electrically neutral or non-neutral configurations, depending on the values of the bulk ion and electron flows. These equilibria have possible applications in various solar, space and astrophysical contexts, as well as in the laboratory.
A three-wave Budden model with two resonance layers is constructed that allows recirculation of energy fluxes along a quadrangle in ray phase space. The transmission, reflection, and conversion coefficients for this extended Budden problem are calculated by ray phase-space methods and the modular-eikonal approach. Analytical and numerical results show that all coefficients exhibit interference effects that depend on an interference phase calculated from the coupling constants and the area enclosed by the quadrangle.
It has been recently shown that the Bethe-Larkin formula for the energy losses of fast heavy-ion projectiles in dense hydrogen plasmas is corrected by the electron-ion correlations [Phys. Rev. Lett. \\textbf{101}, 075002 (2008)]. We report numerical estimates of this correction based on the values of $g_{ei}(0)$ obtained by numerical simulations in [Phys. Rev. E \\textbf{61}, 3470 (2000)]. We also extend this result to the case of projectiles with dicluster charge distribution. We show that the experimental visibility of the electron-ion correlation correction is enhanced in the case of dicluster projectiles with randomly orientated charge centers. Although we consider here the hydrogen plasmas to make the effect physically more clear, the generalization to multispecies plasmas is straightforward.
We have studied the exchange corrections to linear electrostatic wave propagation in a plasma using a quantum kinetic formalism. Specifically we have considered the zero temperature limit. In order to simplify the calculations we have focused on the long wavelength limit, i.e. wavelengths much longer than the de Broglie wavelength. For the case of ion-acoustic waves we have calculated the exchange correction both to the damping rate and the real part of the frequency. For Langmuir waves the frequency shift due to exchange effects is found. Our results are compared with the frequency shifts deduced from commonly used exchange potentials which are computed from density functional theory.
A comprehensive description of methods, suitable for solving the kinetic equation for fast ions and impurity species in tokamak plasmas using Monte Carlo approach, is presented. The described methods include Hamiltonian orbit-following in particle and guiding center phase space, test particle or guiding center solution of the kinetic equation applying stochastic differential equations in the presence of Coulomb collisions, neoclassical tearing modes and Alfv\\ en eigenmodes as electromagnetic perturbations relevant to fast ions, together with plasma flow and atomic reactions relevant to impurity studies. Applying the methods, a complete reimplementation of the well-established minority species code ASCOT is carried out as a response both to the increase in computing power during the last twenty years and to the weakly structured growth of the code, which has made implementation of additional models impractical. Also, a benchmark between the previous code and the reimplementation is accomplished, showing good agreement between the codes.
A nonlinear beatwave regime of plasma wave excitation is considered. Two beatwave drivers are considered: intensity-modulated laser pulse and density-modulated (microbunched) electron beam. It is shown that a long beatwave pulse can excite strong plasma waves in its wake even when the beatwave frequency is detuned from the electron plasma frequency. The wake is caused by the dynamic bi-stability of the nonlinear plasma wave if the beatwave amplitude exceeds the analytically calculated threshold. In the context of a microbunched beam driven plasma wakefield accelerator, this excitation regime can be applied to developing a femtosecond electron injector.
The ion drag force arising from plasma flow past an embedded spherical grain is calculated self-consistently and non-linearly using particle in cell codes, accounting for ion-neutral collisions. Using ion velocity distribution appropriate for ion drift driven by a force field gives wake potential and force greatly different from a shifted Maxwellian distribution, regardless of collisionality. The low-collisionality forces are shown to be consistent with estimates based upon cross-sections for scattering in a Yukawa (shielded) grain field, but only if non-linear shielding length is used. Finite collisionality initially enhances the drag force, but only by up to a factor of 2. Larger collisionality eventually reduces the drag force. In the collisional regime, the drift distribution gives larger drag than the shift distribution even at velocities where their collisionless drags are equal. Comprehensive practical analytic formulas for force that fit the calculations are provided.
Selective enhancement (>10^3) of harmonics extending to the water window (~4nm) generated in an argon gas filled straight bore capillary waveguide is demonstrated. This enhancement is in good agreement with modeling which indicates that multimode quasi-phasematching (MMQPM) is achieved by rapid axial intensity modulations caused by beating between the fundamental and higher order capillary modes. Substantial pulse-energies (>10nJ per pulse per harmonic order) at wavelengths beyond the carbon K-edge (~4.37nm, ~284eV) up to ~360eV are observed from argon ions for the first time.
A general formalism for the treatment of density fluctuations in Coulomb plasmas is presented and applied to the treatment of temperature relaxation in multi-component quantum plasmas when the separate components (electrons and ions) relax to LTE much faster than the mutual equilibration rate. The underlying theory is based upon the Random Phase Approximation with static local field corrections (LFCs) to account for short-range correlations between the particles. A general formula for the electron-ion equilibration rate, similar to the one given by Daligault and Dimonte, is derived. However a different approach is advocated for the determination of the LFCs , one that allows a detailed quantal treatment of the electrons and with allowance for the possible presence of bound states. The theory presented here accommodates any number of plasma components and provides a basis for an approximate self-consistent solution of the general Coulomb many-body problem that incorporates static short-range correlations into the RPA. This has implications for improved modelling of the static and low frequency transport and equation-of-state properties of dense plasma. Limitations of the model are also discussed.
The interaction of ultra-intense lasers with solid foils can be used to accelerate ions to high energies well exceeding 60 MeV. The non-linear relativistic motion of electrons in the intense laser radiation leads to their acceleration and later to the acceleration of ions. Ions can be accelerated from the front surface, the foil interior region, and the foil rear surface (TNSA, most widely used), or the foil may be accelerated as a whole if sufficiently thin (RPA). Here, we focus on the most widely used mechanism for laser ion-acceleration of TNSA. Starting from perfectly flat foils we show by simulations how electron filamentation at or inside the solid leads to a spatial modulations in the ions. The exact dynamics depend very sensitively on the chosen initial parameters which has a tremendous effect on electron dynamics. In the case of step-like density gradients we find evidence that suggests a two-surface-plasmon decay of plasma oscillations triggering a Raileigh-Taylor-like instability.
Analysis using new calculations with 3 times the resolution of the earlier linked magnetic flux tubes confirms the transition from singular to saturated growth rate reported by Grauer and Marliani \\cite{GrauerMar99} for the incompressible cases is confirmed. However, all of the secondary tests point to a transition back to stronger growth rate at a different location at late times. Similar problems in ideal hydrodynamics are discussed, pointing out that initial negative results eventually led to better initial conditions that did show evidence for a singularity of Euler. Whether singular or near-singular growth in ideal MHD is eventually shown, this study could have bearing on fast magnetic reconnection, high energy particle production and coronal heating.
In the present study, turbulent impurity transport in Deuterium tokamak plasmas, driven by Ion Temperature Gradient (ITG) and Trapped Electron (TE) modes, has been investigated using fluid and gyrokinetic models. The impurity diffusivity ($D_Z$) and convective velocity ($V_Z$) are calculated, and from these the zero-flux peaking factor ($PF_0$) is derived. This quantity expresses the impurity density gradient at which the convective and diffusive transport of impurities are exactly balanced. The sign of $PF_0$ is of special interest, as it determines whether the impurities are subject to an inward ($PF_0 > 0$) or outward ($PF_0 < 0$) pinch.
Achieving impurity and helium ash control is a crucial issue in the path towards fusion-grade magnetic confinement devices, and this is particularly the case of helical reactors, whose low-collisionality ion-root operation scenarios usually display a negative radial electric field which is expected to cause inwards impurity pinch. In these work we discuss, based on experimental measurements and standard predictions of neoclassical theory, how plasmas of very low ion collisionality, similar to those observed in the impurity hole of the Large Helical Device, can be an exception to this general rule, and how a negative radial electric field can coexist with an outward impurity flux. This interpretation is supported by comparison with documented discharges available in the International Stellarator-Heliotron Profile Database, and it can be extrapolated to show that achievement of high ion temperature in the core of helical devices is not fundamentally incompatible with low core impurity content.
The charging of spinning insulating objects by plasma and photoemission is studied with the particle-in-cell method. Unidirectional photon flux, different angular velocities of the object, and different plasma flow speeds are considered. Photoemission can lead to a positive total charge and electric dipole moment on the object. The spinning of the object redistributes the surface charge. The total object charge oscillates in time with the period matching the period of the object rotation. Plasma potential and density in the vicinity of the object oscillate with the same frequency. The plasma is rarefied close to a positively charged object, and the density wake diminishes when the object is charged negatively. The time averaged charge depends on the angular velocity of the object.
The knowledge of absolute fluxes of reactive species such as radicals or energetic ions to the surface is crucial for understanding the growth or etching of thin films. These species have due to their high reactivity very low densities and their detection is therefore a challenging task. Mass spectrometry is a very sensitive technique and it will be demonstrated that it is a good choice for the study of plasma chemistry. Mass spectrometry measures the plasma composition directly at the surface and is not limited by existence of accessible optical transitions. When properly designed and carefully calibrated mass spectrometry provides absolute densities of the measured species. It can even measure internally excited metastable species. Here, measurement of neutral species and positive ions generated in an atmospheric pressure plasmas jet operated with He, hexamethyldisiloxane and O2 will be presented.
An analysis of the structural properties of three-dimensional Coulomb clusters confined in a spherical parabolic trap is presented. Based on extensive high accuracy computer simulations the shell configurations and energies for particle numbers in the range $60 \\le N\\le 160$ are reported. Further, the intrashell symmetry and the lowest metastable configurations are analyzed for small clusters and a novel type of excited state which does not involve a change of shell configuration is identified.
Over the last few years there has been much interest in the production of hard X-rays from various targets using a kHz short pulse laser at intensities above 1014Wcm-2 (A). Most of these studies have been carried out in vacuum and very many fewer studies have been carried out in air. Recently this lack has been partially addressed with the development of femtosecond laser micromachining. Another similar although apparently unconnected field (B) deals with the channelling of high power laser beam in filaments after passage through long distances in air. This has been largely driven by the construction of a mobile terawatt laser beam (Teramobile) for atmospheric studies. The laser beams in these two cases (A and B) have very different pulse energies (mJ against J) although the filaments in (B) have similar energies to (A) and are clamped at intensities less than 1014 Wcm-2. This paper has been written to compare the production of hard X-rays in these two cases. The conclusion is interesting that a focused sub TW laser pulse in air reaches intensities sufficiently high that characteristic K and L X-rays are generated from a number of metal and non metal targets as well as a continuous bremsstrahlung spectrum. On the other hand the clamping of the multi-filaments in a 100 TW laser beam in air cannot generate hard Xrays especially when propagated over long distances.
Ion acceleration by using a laser pulse irradiating a disk target which includes hydrogen and carbon is examined using three-dimensional particle-in-cell simulations. It is shown that over $200$ MeV protons can be generated by using a $620$TW, $5\\times10^{21}$ W/cm$^2$ laser pulse. In a polyethylene (CH$_2$) target, protons and carbon ions separate and form two layers by radiation pressure acceleration. A strong Coulomb explosion in this situation and Coulomb repulsion between each layer generates high energy protons. A doped target, low density hydrogen within a carbon disk, becomes a double layer target which is comprised of a thin and low density hydrogen disk on the surface of a high-$Z$ atom layer. This then generates a quasi-monoenergetic proton beam.
In a recent article [P.K. Shukla, B. Eliasson and M. Akbari-Moghanjoughi, Physica Scripta {\\bf 87}, 018202 (2013)] the authors criticized our analysis of the screened proton potential in dense hydrogen that was based on {\\em ab initio} density functional theory (DFT) simulations [M. Bonitz, E. Pehlke, and T. Schoof, Phys. Rev. E {\\bf 87}, 037102 (2013)]. In particular, they attributed the absence of the Shukla-Eliasson attractive force between protons in the DFT simulations to a failure of DFT. Here we discuss in detail their arguments and show that their conclusions are incorrect.
Three dimensional electromagnetic gyrofluid simulations of the ideal ballooning mode blowout scenario for tokamak edge localized modes (ELMs) are presented. Special emphasis is placed on energetic diagnosis, examining changes in the growth rate in the linear, overshoot, and decay phases. The saturation process is energy transfer to self generated edge turbulence which exhibits an ion temperature gradient (ITG) mode structure. Convergence in the decay phase is found only if the spectrum reaches the ion gyroradius. The equilibrium is a self consistent background whose evolution is taken into account. Approximately two thirds of the total energy in the edge layer is liberated in the blowout. Parameter dependence with respect to plasma pressure and the ion gyroradius is studied. Despite the violent nature of the short-lived process, the transition to nonlinearity is very similar to that found in generic tokamak edge turbulence.
Although, for current laser pulse energies, the weakly nonlinear regime of LWFA is known to be the optimal for reaching the highest possible electron energies, the capabilities of upcoming large laser systems will provide the possibility of running highly nonlinear regimes of laser pulse propagation in underdense or near-critical plasmas. Using an extended particle-in-cell (PIC) model that takes into account all the relevant physics, we show that such regimes can be implemented with external guiding for a relatively long distance of propagation and allow for the stable transformation of laser energy into other types of energy, including the kinetic energy of a large number of high energy electrons and their incoherent emission of photons. This is despite the fact that the high intensity of the laser pulse triggers a number of new mechanisms of energy depletion, which we investigate systematically.
A stochastic representation for the solutions of the Poisson-Vlasov equation, with several charged species, is obtained. The representation involves both an exponential and a branching process and it provides an intuitive characterization of the nature of the solutions and its fluctuations. Here, the stochastic representation is also proposed as a tool for the numerical evaluation of the solutions
Ion beam has been used in cancer treatment, and has a unique preferable feature to deposit its main energy inside a human body so that cancer cell could be killed by the ion beam. However, conventional ion accelerator tends to be huge in its size and its cost. In this paper a future intense-laser ion accelerator is proposed to make the ion accelerator compact. An intense femtosecond pulsed laser was employed to accelerate ions. The issues in the laser ion accelerator include the energy efficiency from the laser to the ions, the ion beam collimation, the ion energy spectrum control, the ion beam bunching and the ion particle energy control. In the study particle computer simulations were performed to solve the issues, and each component was designed to control the ion beam quality. When an intense laser illuminates a target, electrons in the target are accelerated and leave from the target; temporarily a strong electric field is formed between the high-energy electrons and the target ions, and the target ions are accelerated. The energy efficiency from the laser to ions was improved by using a solid target with a fine sub-wavelength structure or by a near-critical density gas plasma. The ion beam collimation was realized by holes behind the solid target. The control of the ion energy spectrum and the ion particle energy, and the ion beam bunching were successfully realized by a multi-stage laser-target interaction. The present study proposed a novel concept for a future compact laser ion accelerator, based on each component study required to control the ion beam quality and parameters.
A target composition scheme to optimize the combined proton acceleration regime is presented and verified by two-dimensional particle-in-cell (2D PIC) simulations by using an ultra-intense circularly-polarized (CP) laser pulse irradiating an overdense hydrocarbon (CH) target, instead of a pure hydrogen (H) one. The combined acceleration regime is a two-stage proton acceleration scheme combining the radiation pressure dominated acceleration (RPDA) stage and the laser wakefield acceleration (LWFA) stage sequentially together. With an ultra-intense CP laser pulse irradiating an overdense CH target, followed by an underdense tritium plasma gas, protons with higher energies (from about $20$ GeV up to about $30$ GeV) and lower energy spreads (from about $18\\%$ down to about $5\\%$ in full-width at half-maximum, or FWHM) are generated, as compared to the use of a pure H target. It is because protons can be more stably pre-accelerated in the first RPDA stage when using CH targets. With the increase of the carbon-to-hydrogen density ratio, the energy spread is lower and the maximum proton energy is higher. It also shows that for the same laser intensity around $10^{22}$ $Wcm^{-2}$, using the CH target will lead to a higher proton energy, as compared to the use of a pure H target. Additionally, proton energy can be further increased by employing a longitudinally negative gradient of a background plasma density.
A new constant of motion for helically symmetric equilibria in the vicinity of the magnetic axis is obtained in the framework of Vlasov theory. In view of this constant of motion the Vlasov theory is compared with drift kinetic and gyrokinetic theories near axis. It turns out that as in the case of axisymmetric equilibria [H. Tasso and G. N. Throumoulopoulos, Phys. Plasmas 18, 064507 (2011)] the Vlasov current density thereon can differ appreciably from the drift kinetic and gyrokinetic current densities. This indicates some limitation on the implications of reduced kinetic theories, in particular as concerns the physics of energetic particles in the central region of magnetically confined plasmas.
In this paper we have criticized the so-called Landau damping theory. We have analyzed solutions of the standard dispersion equations for longitudinal (electric) and transversal (electromagnetic and electron) waves in half-infinite slab of the uniform collisionless plasmas with non-Maxwellian and Maxwellian-like electron energy distribution functions. One considered the most typical cases of both the delta-function type distribution function (the plasma stream with monochromatic electrons) and distribution functions, different from Maxwellian ones as with a surplus as well as with a shortage in the Maxwellian distribution function tail. It is shown that there are present for the considered cases both collisionless damping and also non-damping electron waves even in the case of non-Maxwellian distribution function.
A systematic study of pressure ionization is carried out in the chemical picture by the example of fluid helium. By comparing the variants of the chemical model, it is demonstrated that the behavior of pressure ionization depends on the construction of the free energy function. In the chemical model with the Coulomb free energy described by the Pad\\ e interpolation formula, thermodynamical instability induced by pressure ionization is found to be manifested by a discontinuous drop or a continuous fall and rise along the pressure-density curve as well as the pressure-temperature curve, which is very much like the first order liquid-liquid phase transition of fluid hydrogen from the first principles simulations. In contrast, in the variant chemical model with the Coulomb free energy term empirically weakened, no thermodynamical instability is induced when pressure ionization occurs, and the resulting equation of state achieves good agreement with the first principles simulations of fluid helium.
Previously developed method for finding asymptotic solutions of Vlasov equations using two-dimensional (in coordinate x and time t) Laplace transform is applied to low-collision electron-ion plasmas. Taking into account Coulomb collisions in the limit m_e << m_i, \\bar{v_i} << \\bar{v_e}, and T_e m_e << T_i m_i, results in the expression for longitudinal high-frequency plasma-electron oscillation/wave decrement essentially depending on oscillation frequency \\omega. This expression is quite different from the used one for low-frequency plasma sound, which can be derived using expansion in asymptotically divergent series in \\delta/\\omega_0, k v_i/\\omega_0, where \\delta is imaginary part of the frequency \\omega=\\omega_0+i\\delta, and does not reduce to simple expression with some collision frequency \\delta\\sim\\nu^{eff}_{e_i}.
Electrostatic (E) fields associated with the interaction of a well-controlled, high-power, nanosecond laser pulse with an underdense plasma are diagnosed by proton radiography. Using a current 3D wave propagation code equipped with nonlinear and nonlocal hydrodynamics, we can model the measured E-fields that are driven by the laser ponderomotive force in the region where the laser undergoes filamentation. However, strong fields of up to 110 MV/m measured in the first millimeter of propagation cannot be reproduced in the simulations. This could point to the presence of unexpected strong thermal electron pressure gradients possibly linked to ion acoustic turbulence, thus emphasizing the need for the development of full kinetic collisional simulations in order to properly model laser-plasma interaction in these strongly nonlinear conditions.
Spectrally-peaked proton beams ($E_{p}\\approx 8$ MeV, $\\Delta E\\approx 4$ MeV) have been observed from the interaction of an intense laser ($> 10^{19 }$ Wcm$^{-2}$) with ultrathin CH foils, as measured by spectrally-resolved full beam profiles. These beams are reproducibly generated for foil thicknesses (5-100 nm), and exhibit narrowing divergence with decreasing target thickness down to $\\approx 8^\\circ$ for 5 nm. Simulations demonstrate that the narrow energy spread feature is a result of buffered acceleration of protons. Due to their higher charge-to-mass ratio, the protons outrun a carbon plasma driven in the relativistic transparency regime.
The results of experimental investigations of inhomogeneities of gas-discharge nonneutral electron plasma obtained by using the nonperturbing experimental methods [N.A. Kervalishvili, arXiv:1502.02516 [physics.plasm-ph] (2015)] have been presented. Inhomogeneities are the dense solitary vortex structures stretched along the magnetic field, the lifetime of which is much greater than the time of electron-neutral collisions. The processes of formation, evolution and dynamics of vortex structures were studied. The periodic sequence of these processes is described for different geometries of discharge device.
Test modes on turbulent magnetized plasmas are studied taking into account the ion trapping that characterizes the E x B drift in the background turbulence. We show that trappyng provides the physical mechanism for the formation of large scale potential structures (inverse cascade) observed in drift turbulence. Trapping combined with the motion of the potential with the diamagnetic velocity determines ion flows in opposite directions, which reduce the growth rate and eventually damps the drift modes. It also determine transitory zonal flow modes in connection with compressibility effect due to the polarization drift in the background turbulence.
Owing to the rapid progress in laser technology, very high-contrast femtosecond laser pulses of relativistic intensities become available. These pulses allow for interaction with micro-structured solid-density plasma without destroying the structure by parasitic pre-pulses. This opens a new realm of possibilities for laser interaction with micro- and nano-scales photonic materials at the relativistic intensities. Here we demonstrate, for the first time, that when coupling with a readily available 1.8 Joule laser, a micro-plasma-waveguide (MPW) may serve as a novel compact x-ray source. Electrons are extracted from the walls and form a dense self-organized helical bunch inside the channel. These electrons are efficiently accelerated and wiggled by the waveguide modes in the MPW, which results in a bright, well-collimated emission of hard x-rays in the range of 1~100 keV.
A spherical target irradiated by laser beams located at 49o and 131o with respect to the polar axis has been considered. The illumination model has been used to evaluate the irradiation non-uniformity assuming circular and elliptical super-gaussian laser intensity profiles and the irradiation scheme has been optimized by means of the Polar Direct Drive technique. A parametric study has been performed providing the irradiation non-uniformity as a function of the Polar Direct Drive displacement and of the laser intensity profile parameters. Moreover, two-dimensional axis-symmetric hydrodynamic simulations have been performed for a plastic sphere irradiated by laser beams characterized by a constant flat temporal power pulse. In these simulations the front of the inward shock wave has been tracked providing the time-evolution of any non-uniformity. The results provided by the two methods - illumination model and hydrodynamic data - have been compared and it is found that the illumination model reproduces the main behaviour exhibited by the hydrodynamic data. The two models provide compatible values for the optimum Polar Direct Drive parameter and similar optimal super-gaussian profiles.
This paper reviews resent theoretical and experimental research on physical processes in compensated negative-ion beams. A previous review was published by one of the authors in Ref. [1]. The present paper summarizes the new results of numerical calculations of the stationary electric field in negative-ion beams, and the resent results of experimental studies of suppression of ion-ion instability at low gas pressures. As in Ref. [1], the review addresses the following three main issues of the physics of compensated beams: 1) Spatial charge compensation in steady beams; 2) Dynamic decompensation of spatial charge, which occurs as a result of beam current modulation due to plasma instabilities in the ion source; 3) Collective processes. The results presented in this review enable one to determine how non-compensated spatial charge, nonresonant oscillations of the beam current, and collective oscillations of the ion-beam plasma influence the propagation properties of the beam. With this information, one can determine the optimal ion transportation parameters.
The self-consistent spatiotemporal evolution of drift wave (DW) radial envelope and zonal flow (ZF) amplitude is investigated in a slab model [1]. Stationary solution of the coupled partial differential equations in a simple limit yields formation of DW-ZF soliton structures, which propagate at group velocity depending on the envelope peak amplitude. Additional interesting physics, e.g. generation, destruction, collision and reflection of solitons, as well as turbulence bursting can also be observed due to effects of linear growth/damping, dissipation, equilibrium nonuniformities and soliton dynamics. The propagation of soliton causes significant radial spreading of DW turbulence and therefore can affect transport scaling with system size by broadening of the turbulent region. Correspondence of the present analysis with the description of DW-ZF interactions in toroidal geometry [2, 3] is also elucidated.
The nonlinear propagation of dust-acoustic (DA) waves in a magnetized dusty plasma with a pair of trapped ions is investigated. Starting from a set of hydrodynamic equations for massive dust fluids as well as kinetic Vlasov equations for ions, and applying the reductive perturbation technique, a Korteweg-de Vries (KdV)-like equation with a complex coefficient of nonlinearity is derived, which governs the evolution of small-amplitude DA waves in plasmas. The complex coefficient arises due to vortex-like distributions of both positive and negative ions. An analytical as well as numerical solution of the KdV equation are obtained and analyzed with the effects of external magnetic field, the dust pressure as well as different mass and temperatures of positive and negative ions.
In recent experiments of laser pulse interaction at relativistic intensities with a low density plasma, the proton radiography technique showed evidence of long--lived field structures generated after the self-channeling of the laser pulse. We present 2D particle-in-cell simulations of this interaction regime, where the dynamics of similar structures has been resolved with high temporal and spatial resolution. An axially symmetrical field pattern, resembling both soliton-like and vortex structures, has been observed. A study of the physics of such structures and a comparison with experimental data is in progress.
A plasma blob is modeled as consisting of two homogeneous spheres of equal radius and equal but opposite charge densities that can move relative to each other. Relative translational and rotational motion are considered separately. Magnetic effects from the current density caused by the relative motion are included. Magnetic interaction is seen to cause an inductive inertia. In the relative translation case the Coulomb attraction, approximately a linear force for small amplitudes, causes an oscillation. For a large number of particles the corresponding oscillation frequency will not be the Langmuir plasma frequency, because of the large inductive inertia. For rotation an external magnetic field is included and the energy and diamagnetism of the plasma in the model is calculated. Finally it is noted how the neglect of resistivity is motivated by the results.
The calculation of transport profiles from experimental measurements belongs in the category of inverse problems which are known to come with issues of ill-conditioning or singularity. A reformulation of the calculation, the matricial approach, is proposed for periodically modulated experiments, within the context of the standard advection-diffusion model where these issues are related to the vanishing of the determinant of a 2x2 matrix. This sheds light on the accuracy of calculations with transport codes, and provides a path for a more precise assessment of the profiles and of the related uncertainty.
The formation of a thin current sheet in a magnetic quasi-separatrix layer (QSL) is investigated by means of numerical simulation using a simplified ideal, low-$\\beta$, MHD model. The initial configuration and driving boundary conditions are relevant to phenomena observed in the solar corona and were studied earlier by Aulanier et al., A&A 444, 961 (2005). In extension to that work, we use the technique of adaptive mesh refinement (AMR) to significantly enhance the local spatial resolution of the current sheet during its formation, which enables us to follow the evolution into a later stage. Our simulations are in good agreement with the results of Aulanier et al. up to the calculated time in that work. In a later phase, we observe a basically unarrested collapse of the sheet to length scales that are more than one order of magnitude smaller than those reported earlier. The current density attains correspondingly larger maximum values within the sheet. During this thinning process, which is finally limited by lack of resolution even in the AMR studies, the current sheet moves upward, following a global expansion of the magnetic structure during the quasi-static evolution. The sheet is locally one-dimensional and the plasma flow in its vicinity, when transformed into a co-moving frame, qualitatively resembles a stagnation point flow. In conclusion, our simulations support the idea that extremely high current densities are generated in the vicinities of QSLs as a response to external perturbations, with no sign of saturation.
A Flux Coordinate Independent (FCI) approach for anisotropic systems, not based on magnetic flux coordinates has been introduced in [F. Hariri and M. Ottaviani, Comput. Phys. Commun., 184,2419 (2013)]. In this paper, we show that the approach can tackle magnetic configurations including X-points. Using the code FENICIA, an equilibrium with a magnetic island has been used to show the robustness of the FCI approach to cases in which a magnetic separatrix is present in the system, either by design or as a consequence of instabilities. Numerical results are in good agreement with the analytic solutions of the sound-wave propagation problem. Conservation properties are veri?ed. Finally, the critical gain of the FCI approach in situations including the magnetic separatrix with an X-point is demonstrated by a fast convergence of the code with the numerical resolution in the direction of symmetry. The results highlighted in this paper show that the FCI approach should be able to address turbulent transport problems in X-point geometries.
Most existing theoretical studies of momentum transport focus on calculating the Reynolds stress based on quasilinear theory, without considering the \\emph{nonlinear} momentum flux-$<\\tilde{v}_r \\tilde{n} \\tilde{u}_{\\|} >$. However, a recent experiment on TORPEX found that the nonlinear toroidal momentum flux induced by blobs makes a significant contribution as compared to the Reynolds stress [Labit et al., Phys. Plasmas {\\bf 18}, 032308 (2011)]. In this work, the nonlinear parallel momentum flux in strong turbulence is calculated by using three dimensional Hasegawa-Mima equation. It is shown that nonlinear diffusivity is smaller than quasilinear diffusivity from Reynolds stress. However, the leading order nonlinear residual stress can be comparable to the quasilinear residual stress, and so could be important to intrinsic rotation in tokamak edge plasmas. A key difference from the quasilinear residual stress is that parallel fluctuation spectrum asymmetry is not required for nonlinear residual stress.
The statistics of edge-localised plasma instabilities (ELMs) in toroidal magnetically confined fusion plasmas are considered. From first principles, standard experimentally motivated assumptions are shown to determine a specific probability distribution for the waiting times between ELMs: the Weibull distribution. This is confirmed empirically by a statistically rigorous comparison with a large data set from the Joint European Torus (JET). The successful characterisation of ELM waiting times enables future work to progress in various ways. Here we present a quantitative classification of ELM types, complementary to phenomenological approaches. It also informs us about the nature of ELMing processes, such as whether they are random or deterministic.
Electric field is a thermodynamic force that can drive collisional inter-ion-species transport in a multicomponent plasma. In an inertial confinement fusion (ICF) capsule, such transport causes fuel ion separation even with a target initially prepared to have equal number densities for the two fuel ion species. Unlike the baro-diffusion driven by ion pressure gradient and the thermo-diffusion driven by ion and electron temperature gradients, electro-diffusion has a critical dependence on the charge-to-mass ratio of the ion species. Specifically, it is shown here that electro-diffusion vanishes if the ion species have the same charge-to-mass ratio. An explicit expression for the electro-diffusion ratio is obtained and used to investigate the relative importance of electro- and baro-diffusion mechanisms. In particular, it is found that electro-diffusion reinforces baro-diffusion in the deuterium and tritium mix, but tends to cancel it in the deuterium and helium-3 mix.
Poloidal asymmetries in the impurity density can be generated by radio frequency heating in the core and by neoclassical effects in the edge of tokamak plasmas. In a pedestal case study, using global neoclassical simulations we find that finite orbit width effects can generate significant poloidal variation in the electrostatic potential, which varies on a small radial scale. Gyrokinetic modeling shows that these poloidal asymmetries can be strong enough to significantly modify turbulent impurity peaking. In the pedestal the ExB drift in the radial electric field can give a larger contribution to the poloidal motion of impurities than that of their parallel streaming. Under such circumstances we find that up-down asymmetries can also affect impurity peaking.
The aim of the present work is to investigate tokamak equilibria with reversed magnetic shear and sheared flow, which may play a role in the formation of internal transport barriers (ITBs), within the framework of two-fluid model. The study is based on exact self-consistent solutions in cylindrical geometry by means of which the impact of the magnetic shear, s, and the \"toroidal\" (axial) and \"poloidal\" (azimuthal) ion velocity components on the radial electric field, its shear and the shear of the ExB velocity is examined. For a wide parametric regime of experimental concern it turns out that the contributions of the toroidal and poloidal velocity and pressure gradient terms to the electric field, its shear and ExB velocity shear are of the same order of magnitude. The impact of s on ExB velocity shear through the pressure gradient term is stronger than that through the velocity terms. The results indicate that, alike MHD, the magnetic shear and the sheared toroidal and poloidal velocities act synergetically in producing electric fields and therefore ExB velocity shear profiles compatible with ones observed in discharges with ITBs; owing to the pressure gadient term, however, the impact of s on the electic field, its shear and the shear of ExB velocity is stronger than that in MHD.
The role of relativistic surface plasmons (SPs) in high order harmonic emission from laser-irradiated grating targets has been investigated by means of particle-in-cell simulations. SP excitation drives a strong enhancement of the intensity of harmonics, particularly in the direction close to the surface tangent. The SP-driven enhancement overlaps with the angular separation of harmonics generated by the grating, which is beneficial for applications requiring monochromatic XUV pulses.
Experimental results for the reflection coefficient of shock-compressed dense Xenon plasmas at pressures of 1.6 - 17 GPa and temperatures around 30 000 K using a laser beam with \\lambda = 1.06 10^-6 m are compared with calculations based on different theoretical approaches to the dynamical collision frequency. It is found that a reasonable description can be given assuming a spatial electron density profile corresponding to a finite width of the shock wave front of about $2 10^-6 m.
The equilibrium magnetic field inside axisymmetric plasmas with inversions on the toroidal current density is studied. Structurally stable non-nested magnetic surfaces are considered. For any inversion in the internal current density the magnetic families define several positive current channels about a central negative one. A general expression relating the positive and negative currents is derived in terms of a topological anisotropy parameter. Next, an analytical local solution for the poloidal magnetic flux is derived and shown compatible with current hollow magnetic pitch measurements shown in the literature. Finally, the analytical solution exhibits non-nested magnetic families with positive anisotropy, indicating that the current inside the positive channels have at least twice the magnitude of the central one.
A self-consistent relativistic two-fluid model is proposed for one-dimensional electron-ion plasma dynamics. A multiple scales perturbation technique is employed, leading to an evolution equation for the wave envelope, in the form of a nonlinear Schr\\\"odinger type equation (NLSE). The inclusion of relativistic effects is shown to introduce density-dependent factors, not present in the non-relativistic case - in the conditions for modulational instability. The role of relativistic effects on the linear dispersion laws and on envelope soliton solutions of the NLSE is discussed.
We numerically investigate the dust charging in the sheath, by using the usual fluid approximation, it is extended to include self consistently the dust charge variation. The grain charge becomes a new self consistent dynamic variable, it is found that dust grains are first charged negatively at the sheath edge and then begin to be charged positively in the sheath. The numerical results show that the initial velocity of dust charged grains, sized grains and the density ratio of ion to electron at the sheath edge have affected the neutral point of dust charge. Moreover, the neutral point of dust charge affects the spatial distribution of dust density.
The correspondence between gyrofluid and low frequency fluid equations is examined. The lowest order conservative effects in ExB advection, parallel dynamics, and curvature match trivially. The principal concerns are polarisation fluxes, and dissipative parallel viscosity and parallel heat fluxes. The emergence of the polarisation heat flux in the fluid model and its contribution to the energy theorem is reviewed. It is shown that gyroviscosity and the polarisation fluxes are matched by the finite gyroradius corrections to advection in the long wavelength limit, provided that the differences between gyrocenter and particle representations is taken into account. The dissipative parallel viscosity is matched by the residual thermal anisotropy in the gyrofluid model in the collision dominated limit. The dissipative parallel heat flux is matched by the gyrofluid parallel heat flux variables in the collision dominated limit. Hence, the gyrofluid equations are a complete superset of the low frequency fluid equations.
A Monte-Carlo approach to proton stopping in warm dense matter is implemented into an existing particle-in-cell code. The model is based on multiple binary-collisions among electron-electron, electron-ion and ion-ion, taking into account contributions from both free and bound electrons, and allows to calculate particle stopping in much more natural manner. At low temperature limit, when ``all   electron are bounded at the nucleus, the stopping power converges to the predictions of Bethe-Bloch theory, which shows good consistency with data provided by the NIST. With the rising of temperatures, more and more bound electron are ionized, thus giving rise to an increased stopping power to cold matter, which is consistent with the report of a recently experimental measurement [Phys. Rev. Lett. 114, 215002 (2015)]. When temperature is further increased, with ionizations reaching the maximum, lowered stopping power is observed, which is due to the suppression of collision frequency between projected proton beam and hot plasmas in the target.
The cat-eyes steady state solution in the framework of hydrodynamics describing an infinite row of identical vortices is extended to the magnetohydrodynamic equilibrium equation with incompressible flow of arbitrary direction. The extended solution covers a variety of equilibria including one- and two-dimensional generalized force-free and Harris-sheet configurations which are preferable from those usually employed as initial states in reconnection studies. Although the vortex shape is not affected by the magnetic field, the flow in conjunction with the equilibrium nonlinearity has a strong impact on isobaric surfaces by forming pressure islands located within the cat-eyes vortices. More importantly, a magnetic-field-aligned flow of experimental fusion relevance and the flow shear have significant stabilizing effects in the region of pressure islands. The stable region is enhanced by an external axial (\"toroidal\") magnetic field.
Energy coupling during relativistically intense laser-matter interactions is encoded in the attosecond motion of strongly driven electrons at the pre-formed plasma-vacuum boundary. Studying and controlling this motion can reveal details about the microscopic processes that govern a vast array of light-matter interaction physics and applications. These include research areas right at the forefront of extreme laser-plasma science such as laser-driven ion acceleration1, bright attosecond pulse generation2,3 and efficient energy coupling for the generation and study of warm dense matter4. Here we demonstrate attosecond control over the trajectories of relativistic electron bunches formed during such interactions by studying the emission of extreme ultraviolet (XUV) harmonic radiation. We describe how the precise addition of a second laser beam operating at the second harmonic of the driving laser pulse can significantly transform the interaction by modifying the accelerating potential provided by the fundamental frequency to drive strong coherent emission. Numerical particle-in-cell code simulations and experimental observations demonstrate that this modification is extremely sensitive to the relative phase of the two beams and can lead to significant enhancements in the resulting harmonic yield. This work also reveals that the ability to control these extreme interactions with attosecond precision is an essential requirement for generation of ultra-bright, high temporal contrast attosecond radiation for atomic and molecular pump-probe experiments5,6.
The present work intends to compare the propulsion force developed in an asymmetric capacitor, according to the number of positive ion sources used. The ion source is a corona wire, which generates a positive corona discharge in nitrogen gas directed towards the ground electrode. We are going to apply the known theory of electrohydrodynamics (EHD) and electrostatics in order to compute all hydrodynamic and electrostatic forces that act on the considered geometry in an attempt to provide a physical insight on the force mechanism that acts on each asymmetrical capacitor, and also to compare propulsion efficiencies.
Dust acoustic waves in the bulk of a dust cloud in complex plasma of low-pressure gas discharge under microgravity conditions are considered. The complex plasma is assumed to conform to the ionization equation of state (IEOS) developed in our previous study. This equation implies the ionization similarity of plasmas. We find singular points of IEOS that determine the behavior of the sound velocity in different regions of the cloud. The fluid approach is utilized to deduce the wave equation that includes the neutral drag term. It is shown that the sound velocity is fully defined by the particle compressibility, which is calculated on the basis of the used IEOS. The sound velocities and damping rates calculated for different three-dimensional complex plasmas both in ac and dc discharges demonstrate a good correlation with experimental data that are within the limits of validity of the theory. The theory provides interpretation for the observed independence of the sound velocity on the coordinate and for a weak dependence on the particle diameter and gas pressure. Predictive estimates are made for the ongoing PK-4 experiment.
The transition dynamics from the low (L) to the high (H) confinement mode in magnetically confined plasmas is investigated using a first-principles four-field fluid model. Numerical results are in close agreement with measurements from the Experimental Advanced Superconducting Tokamak - EAST. Particularly, the slow transition with an intermediate dithering phase is well reproduced by the numerical solutions. Additionally, the model reproduces the experimentally determined L-H transition power threshold scaling that the ion power threshold increases with increasing particle density. The results hold promise for developing predictive models of the transition, essential for understanding and optimizing future fusion power reactors.
Generation of terahertz electromagnetic radiation due to coalescence of upper-hybrid waves in the long-wavelength region of strong plasma turbulence driven by a high-current relativistic electron beam in a magnetized plasma is investigated. The width of frequency spectrum as well as angular characteristics of this radiation for various values of plasma density and turbulence energy are calculated using the simple theoretical model adequately describing beam-plasma experiments at mirror traps. It is shown that the power density of electromagnetic emission at the second harmonic of plasma frequency in the terahertz range for these laboratory experiments can reach the level of 1 ${MW/cm}^3$ with 1% conversion efficiency of beam energy losses to electromagnetic emission.
Electric propulsion is now a sucessfull method for primary propulsion of deep space long duration missions and for geosyncronous satellite attitude control. Closed Drift Plasma Thruster, so called Hall Thruster or SPT (stationary plasma thruster) were primarily conceived in USSR (the ancient Soviet Union) and now it is been developed by space agencies, space research institutes and industries in several countries such as France, USA, Israel, Russian Federation and Brazil. In this work, we show plasma characteristics and performance of a Hall Thruster designed with an innovative concept which uses an array of permanent magnets, instead of an eletromagnet, to produce a radial magnetic field inside its cylindrical plasma drift channel. Within this new concept, we expect to develop a Hall Thruster within power consuption that will scale up to small and medium size satellites. A plasma density and temperature space profiles inside and outside the thruster channel will be shown. Space plasma potential, ion temperature measurements based on doppler broadenning of spectral lines and ion energy measurements are shown for different plasma production regimes. Experimentaly measured propulsion and power consumption will also be shown and compared with computational simulation models using the same plasma experimental conditions. In both cases the results are showing a thrust range between 40mN to 80mN which is close to the thrust levels obtained with a commercial SPT 100 using 30% less electrical power.
The investigations of powerful discharge in high density hydrogen were carried out on an installation with preliminary adiabatic compression. The experiments were performed under the following conditions: stored energy of the capacitive storage - 140-450 kJ, charging voltage - 8.0-14.0 kV, discharge current amplitude- 200-600 kA, current rise rate - 10^9-10^10 A/s. The maximum particle density nmax, achieved just before the discharge, was about 2.0x10^22 cm-3. It was observed one or several compression of the discharge channel. The moments of contractions corresponds a increase of voltage on discharge gap and feature on a curve of a current. Arc parameters were calculated on the basis of the channel model. It was established that increase of the initial density of particles at increase of a current rate of rise results in reduction of arc diameter with increase of channel temperature.
Doppler reflectometry spatial and wavenumber resolution is analyzed within the framework of the linear Born approximation in slab plasma model. Explicit expression for its signal backscattering spectrum is obtained in terms of wavenumber and frequency spectra of turbulence which is assumed to be radially statistically inhomogeneous. Scattering efficiency for both back and forward scattering (in radial direction) is introduced and shown to be inverse proportional to the square of radial wavenumber of the probing wave at the fluctuation location thus making the spatial resolution of diagnostics sensitive to density profile. It is shown that in case of forward scattering additional localization can be provided by the antenna diagram. It is demonstrated that in case of backscattering the spatial resolution can be better if the turbulence spectrum at high radial wavenumbers is suppressed. The improvement of Doppler reflectometry data localization by probing beam focusing onto the cut-off is proposed and described. The possibility of Doppler reflectometry data interpretation based on the obtained expressions is shown.
In our work, we have proposed the arcade structures as minimum dissipative relaxed states (including both the viscous and resistive channels) pertaining to a two-fluid description of the plasma. The obtained relaxed state is non force-free in nature and appropriate to an open system with external drives. The Euler-Lagrange equations are solved in Cartesian coordinates subject to the existing photospheric boundary conditions. The solutions are seen to support flow-containing arcade like magnetic field configurations with inherent dissipative properties that may play an important role in the coronal heating. An interesting feature observed is the generation of different types of arcades with the variation of a single parameter characterizing the relaxed state. Also, recent observations with the LASCO coronagraph on board the SOHO spacecraft suggest that the helmet streamers originating from the sun may have an internal triple-arcade structure. The two-fluid relaxed state obtained here is also seen to support such structures.
Particle and heat transport in tokamak edge is investigated by guiding center orbit following calculation. The guiding center equation is solved for both electrons and ions in the presence of magnetic perturbation. It is suggested that the remnants of the magnetic islands play a role in characterizing the radial transport. The transport coefficient is estimated which also demonstrate local structure in the vicinity of magnetic islands.
Energy transport and confinement in tokamak fusion plasmas is usually determined by the coupled nonlinear interactions of small-scale drift turbulence and larger scale coherent nonlinear structures, such as zonal flows, together with free energy sources such as temperature gradients. Zero-dimensional models, designed to embody plausible physical narratives for these interactions, can help identify the origin of enhanced energy confinement and of transitions between confinement regimes. A prime zero-dimensional paradigm is predator-prey or Lotka-Volterra. Here we extend a successful three-variable (temperature gradient; microturbulence level; one class of coherent structure) model in this genre [M A Malkov and P H Diamond, Phys. Plasmas 16, 012504 (2009)], by adding a fourth variable representing a second class of coherent structure. This requires a fourth coupled nonlinear ordinary differential equation. We investigate the degree of invariance of the phenomenology generated by the model of Malkov and Diamond, given this additional physics. We study and compare the long-time behaviour of the three-equation and four-equation systems, their evolution towards the final state, and their attractive fixed points and limit cycles. We explore the sensitivity of paths to attractors. It is found that, for example, an attractive fixed point of the three-equation system can become a limit cycle of the four-equation system. Addressing these questions - which we together refer to as \"robustness\" for convenience, is particularly important for models which, as here, generate sharp transitions in the values of system variables which may replicate some key features of confinement transitions. Our results help establish the robustness of the zero-dimensional model approach to capturing observed confinement phenomenology in tokamak fusion plasmas.
A novel ignition hohlraum for indirect-drive inertial confinement fusion is proposed, which is named as three-axis cylindrical hohlraum (TACH). TACH is a kind of 6 laser entrance holes (LEHs) hohlraum, which is made of three cylindrical hohlraums orthogonally jointed. Laser beams are injected through every entrance hole with the same incident angle of 55{\\deg}. The view-factor simulation result shows that the time-varying drive asymmetry of TACH is no more than 1.0% in the whole drive pulse period without any supplementary technology such as beam phasing etc. Its coupling efficiency of TACH is close to that of 6 LEHs spherical hohlraum with corresponding size. Its plasma-filling time is close to typical cylindrical ignition hohlraum. Its laser plasma interaction has as low backscattering as the outer cone of the cylindrical ignition hohlraum. Therefore, the proposed hohlraum provides a competitive candidate for ignition hohlraum.
The wakefield and stopping power of an ion-beam pulse moving in magnetized plasmas are investigated by particle-in-cell (PIC) simulations. The effects of beam velocity and density on the wake and stopping power are discussed. In the presence of magnetic field, it is found that beside the longitudinal conversed V-shaped wakes, the strong whistler wave are observed when low-density and low-velocity pulses moving in plasmas. The corresponding stopping powers are enhanced due to the drag of these whistler waves. As beam velocities increase, the whistler waves disappear, and only are conversed V-shape wakes observed. The corresponding stopping powers are reduced compared with these in isotropic plasmas. When high-density pulses transport in the magnetized plasmas, the whistler waves are greatly inhibited for low-velocity pulses and disappear for high-velocity pulses. Additionally, the magnetic field reduces the stopping powers for all high-density cases.
Scaling laws for ion temperature gradient driven turbulence in magnetized toroidal plasmas are derived and compared with direct numerical simulations. Predicted dependences of turbulence fluctuation amplitudes, spatial scales, and resulting heat fluxes on temperature gradient and magnetic field line pitch are found to agree with numerical results in both the driving and inertial ranges. Evidence is provided to support the critical balance conjecture that parallel streaming and nonlinear perpendicular decorrelation times are comparable at all spatial scales, leading to a scaling relationship between parallel and perpendicular spatial scales. This indicates that even strongly magnetized plasma turbulence is intrinsically three-dimensional.
Stellarator News, an international journal of the stellarator community, is Published by Fusion Energy Division, Oak Ridge National Laboratory, James A. Rome, Editor In the March 1995 issue . . . **** Exerpts from the U.S. Congress Office of Technology Assment report on TPX and Alternate Concepts. **** Edge transport and turbulence studies on U-3M The turbulent-driven particle flow is shown to be comparable with the equilibrium flow at the boundary of the configuration under Alfven-heating conditions in the U-3M torsatron. **** Topological aspects of island divertor studies on W7-AS The structure of the edge plasma in W7-AS, observed with probes, television camera, and H-alpha light agrees at low beta with vacuum field calculations: the low-valued resonances at iotabar=5/m are resolved for m = 8 to 11; external perturbations are not significant at the edge, even for iotabar = 5/10. **** 140-GHz second harmonic O-mode electron cyclotron heating at W7-AS First experimental results are presented of 140-GHz second harmonic O-mode (0.7-MW power) ECRH at a high electron density of 1.8 x 10^20 m^-3 on W7-AS. **** Equilibrium plasma currents in quasi-symmetric stellarators with a helical magnetic axis The plasma currents in quasi-symmetric stellarators are calculated to determe the quasi-symmetric conditions with the help of analytical equations.
Massive runaway positrons are generated by runaway electrons in tokamaks. The fate of these positrons encodes valuable information about the runaway dynamics. The phase space dynamics of a runaway position is investigated using a Lagrangian that incorporates the tokamak geometry, loop voltage, radiation and collisional effects. It is found numerically that runaway positrons will drift out of the plasma to annihilate on the first wall, with an in-plasma annihilation possibility less than 0.1\\%. The dynamics of runaway positrons provides signatures that can be observed as diagnostic tools.
The analytical treatment of nonlinear evolution of the shear-flow-modified current driven ion cyclotron instability and shear-flow-driven ion cyclotron kinetic instabilities of magnetic field--aligned plasma shear flow is presented. Analysis is performed on the base of the nonlinear dispersion equation, which accounts for a new combined effect of plasma turbulence and shear flow. It consists in turbulent scattering of ions across the shear flow with their convection by shear flow and results in enhanced nonlinear broadening of ion cyclotron resonances. This effect is found to lead to the saturation of ion cyclotron instabilities as well as to the development of nonlinear shear flow driven ion cyclotron instability. 52.35.Ra
Nonrelativistic electrostatic unmagnetized shocks are frequently observed in laboratory plasmas and they are likely to exist in astrophysical plasmas. Their maximum speed, expressed in units of the ion acoustic speed far upstream of the shock, depends only on the electron-to-ion temperature ratio if binary collisions are absent. The formation and evolution of such shocks is examined here for a wide range of shock speeds with particle-in-cell (PIC) simulations. The initial temperatures of the electrons and the 400 times heavier ions are equal. Shocks form on electron time scales at Mach numbers between 1.7 and 2.2. Shocks with Mach numbers up to 2.5 form after tens of inverse ion plasma frequencies. The density of the shock-reflected ion beam increases and the number of ions crossing the shock thus decreases with an increasing Mach number, causing a slower expansion of the downstream region in its rest frame. The interval occupied by this ion beam is on a positive potential relative to the far upstream. This potential pre-heats the electrons ahead of the shock even in the absence of beam instabilities and decouples the electron temperature in the foreshock ahead of the shock from the one in the far upstream plasma. The effective Mach number of the shock is reduced by this electron heating. This effect can potentially stabilize nonrelativistic electrostatic shocks moving as fast as supernova remnant (SNR) shocks.
Water window emission spectra of two laboratory nitrogen plasma sources were examined with a free standing grating spectrometer (FSGS). The highest line intensities at the wavelength 2.88 nm achievable with the sources were compared. Pulse energies for this line were judged as 0.02 mJ/srad and 0.16 mJ/srad with laser produced plasma system and pinching discharge plasma, respectively. The spectral resolution was found about 0.01 nm at 3rd order of spectral lines around wavelength 2.5 nm.
A general equation for the centroid motion of free, continuous, intense beams propagating off-axis in solenoidal periodic focusing fields is derived. The centroid equation is found to be independent of the specific beam distribution and may exhibit unstable solutions. A new Vlasov equilibrium for off-axis beam propagation is also obtained. Properties of the equilibrium and the relevance of centroid motion to beam confinement are discussed.
This study is designed to explore the two dimensional temperature maps of the atmospheric argon discharge consisting of pin-to-plane electrodes supplied by a high voltage DC source. After checking the stability of the micro discharge, the two dimensional image plane focused by a quartz lens was scanned by the fiber probe driven by a 3D Mobile Platform. The rotational and vibrational temperatures are calculated using nitrogen emissions collected by the high resolution spectrometer and high sensitive intensified charge coupled device (ICCD). The rotational temperature varies from 1558.15 K to 2621.14 K and vibrational temperature varies from 3010.38 K to 3774.69 K, indicating a great temperature gradient due to small discharge size. The temperature maps show a lateral expansion and a sharp truncation in the radial direction. A double layers discharge is identified, where an arc discharge coats the glow discharge.
Wave-wave interaction in plasmas is a topic of important research since the 16th century. The formation of Langmuir solitons through the coupling of high-frequency (hf) Langmuir and low-frequency (lf) ion-acoustic waves, is one of the most interesting features in the context of turbulence in modern plasma physics. Moreover, quantum plasmas, which are ubiquitous in ultrasmall electronic devices, micromechanical systems as well as in dense astrophysical environments are a topic of current research. In the light of notable interests in such quantum plasmas, we present here a theoretical investigation on the nonlinear interaction of quantum Langmuir waves (QLWs) and quantum ion-acoustic waves (QIAWs), which are governed by the one-dimensional quantum Zakharov equations (QZEs). It is shown that a transition to spatiotemporal chaos (STC) occurs when the length scale of excitation of linear modes is larger than that of the most unstable ones. Such length scale is, however, to be larger (compared to the classical one) in presence of the quantum tunneling effect. The latter induces strong QIAW emission leading to the occurrence of collision and fusion among the patterns at an earlier time than the classical case. Moreover, numerical simulation of the QZEs reveals that many solitary patterns can be excited and saturated through the modulational instability (MI) of unstable harmonic modes. In a longer time, these solitons are seen to appear in the state of STC due to strong QIAW emission as well as by the collision and fusion in stochastic motion. The energy in the system is thus strongly redistributed, which may switch on the onset of Langmuir turbulence in quantum plasmas.
Toroidal Alfven eigenmodes (TAEs) excited in purely ohmically heated plasmas without any auxiliary heating have been identified for the first time in the SUNIST spherical tokamak. The TAE modes are observed during minor disruptions and have a frequency range of 150-500 kHz. The mode structure analysis indicates the existence of both m/n=-3/-1 and -4/-1 harmonics, propagating in the electron diamagnetic direction in the laboratory frame of reference. These TAEs appear simultaneously with the generation of runaway electrons in the current quench phase, accompanying with the density sweeping during the minor disruption. Possible driving mechanisms and potential applications of these TAEs are discussed.
For effectively neutralization of the powerful negative ions beams of hydrogen and deuterium the photon target is considered in long time. The attractiveness of the traditional approach (Fabry-Perot resonators) to their creation is limited to a number of stringent technical requirements and large economic costs. In this paper we propose a new concept of non-resonant photon trap (storage) for creation more technologically simple optical neutralizers.
It is shown that electrons with momenta exceeding the `free electron  limit of $m_eca_0^2/2$ can be produced when a laser pulse and a longitudinal electric field interact with an electron via a non-wakefield mechanism. The mechanism consists of two stages: the reduction of the electron dephasing rate $\\gamma-p_x/m_ec$ by an accelerating region of electric field and electron acceleration by the laser via the Lorentz force. This mechanism can, in principle, produce electrons that have longtudinal momenta that is a significant multiple of $m_eca_0^2/2$. 2D PIC simulations of a relatively simple laser-plasma interaction indicate that the generation of super-ponderomotive electrons is strongly affected by this `anti-dephasing  mechanism.
Recently the interest in relativistic quantum plasma is increasing primarily to understand the fundamentals of the plasma behaviour and its properties. Mathematical models used to investigate these plasma are still need to be matured. Especially, the relativistic quantum electron-ion plasma are modeled using the Klein-Gordon equation and the Dirac equation for relativistic electrons. However, different properties of these plasma are investigated without anti-particles. We note that in order to preserve causality relativistic quantum plasma must contain anti-particles for relativistically dynamical components of the plasma.
First experimental measurements are presented for the kink instability in a linear plasma column which is insulated from an axial boundary by finite sheath resistivity. Instability threshold below the classical Kruskal-Shafranov threshold, axially asymmetric mode structure and rotation are observed. These are accurately reproduced by a recent kink theory, which includes axial plasma flow and one end of the plasma column that is free to move due to a non-line-tied boundary condition.
The shear viscosity coefficient of the one-component plasma is calculated with unprecedented accuracy using equilibrium molecular dynamics simulations and the Green-Kubo relation. Numerical and statistical uncertainties and their mitigation for improving accuracy are analyzed. In the weakly coupled regime, our the results agree with the Landau-Spitzer prediction. In the moderately and strongly coupled regimes, our results are found in good agreement with recent results obtained for the Yukawa one-component plasma using non-equilibrium molecular dynamics. A practical formula is provided for evaluating the viscosity coefficient across coupling regimes, from the weakly-coupled regime up to solidification threshold. The results are used to test theoretical predictions of the viscosity coefficients found in the literature.
A theory of two-dimensional plasma evolution with Beltrami-like flow and field due to baroclinic effect has been presented. Particular solution of the nonlinear two-fluid equations is obtained. This simple model can explain the generation of magnetic field without assuming the presence of a seed in the system. Coupled field and flow naturally grow together. The theory has been applied to estimate B-field in laser-induced plasmas and the result is in good agreement with experimental values.
The richness of natural images makes the quest for optimal representations in image processing and computer vision challenging. The latter observation has not prevented the design of image representations, which trade off between efficiency and complexity, while achieving accurate rendering of smooth regions as well as reproducing faithful contours and textures. The most recent ones, proposed in the past decade, share an hybrid heritage highlighting the multiscale and oriented nature of edges and patterns in images. This paper presents a panorama of the aforementioned literature on decompositions in multiscale, multi-orientation bases or dictionaries. They typically exhibit redundancy to improve sparsity in the transformed domain and sometimes its invariance with respect to simple geometric deformations (translation, rotation). Oriented multiscale dictionaries extend traditional wavelet processing and may offer rotation invariance. Highly redundant dictionaries require specific algorithms to simplify the search for an efficient (sparse) representation. We also discuss the extension of multiscale geometric decompositions to non-Euclidean domains such as the sphere or arbitrary meshed surfaces. The etymology of panorama suggests an overview, based on a choice of partially overlapping \"pictures\". We hope that this paper will contribute to the appreciation and apprehension of a stream of current research directions in image understanding.
This letter proposes a simple method of transferring rain structures of a given exemplar rain image into a target image. Given the exemplar rain image and its corresponding masked rain image, rain patches including rain structures are extracted randomly, and then residual rain patches are obtained by subtracting those rain patches from their mean patches. Next, residual rain patches are selected randomly, and then added to the given target image along a raster scanning direction. To decrease boundary artifacts around the added patches on the target image, minimum error boundary cuts are found using dynamic programming, and then blending is conducted between overlapping patches. Our experiment shows that the proposed method can generate realistic rain images that have similar rain structures in the exemplar images. Moreover, it is expected that the proposed method can be used for rain removal. More specifically, natural images and synthetic rain images generated via the proposed method can be used to learn classifiers, for example, deep neural networks, in a supervised manner.
Blind image restoration is a non-convex problem which involves restoration of images from an unknown blur kernel. The factors affecting the performance of this restoration are how much prior information about an image and a blur kernel are provided and what algorithm is used to perform the restoration task. Prior information on images is often employed to restore the sharpness of the edges of an image. By contrast, no consensus is still present regarding what prior information to use in restoring from a blur kernel due to complex image blurring processes. In this paper, we propose modelling of a blur kernel as a sparse linear combinations of basic 2-D patterns. Our approach has a competitive edge over the existing blur kernel modelling methods because our method has the flexibility to customize the dictionary design, which makes it well-adaptive to a variety of applications. As a demonstration, we construct a dictionary formed by basic patterns derived from the Kronecker product of Gaussian sequences. We also compare our results with those derived by other state-of-the-art methods, in terms of peak signal to noise ratio (PSNR).
Over the years, hand gesture recognition has been mostly addressed considering hand trajectories in isolation. However, in most sign languages, hand gestures are defined on a particular context (body region). We propose a pipeline to perform sign language recognition which models hand movements in the context of other parts of the body captured in the 3D space using the MS Kinect sensor. In addition, we perform sign recognition based on the different hand postures that occur during a sign. Our experiments show that considering different body parts brings improved performance when compared to other methods which only consider global hand trajectories. Finally, we demonstrate that the combination of hand postures features with hand gestures features helps to improve the prediction of a given sign.
Convolutional Neural Networks (ConvNets) have successfully contributed to improve the accuracy of regression-based methods for computer vision tasks such as human pose estimation, landmark localization, and object detection. The network optimization has been usually performed with L2 loss and without considering the impact of outliers on the training process, where an outlier in this context is defined by a sample estimation that lies at an abnormal distance from the other training sample estimations in the objective space. In this work, we propose a regression model with ConvNets that achieves robustness to such outliers by minimizing Tukey s biweight function, an M-estimator robust to outliers, as the loss function for the ConvNet. In addition to the robust loss, we introduce a coarse-to-fine model, which processes input images of progressively higher resolutions for improving the accuracy of the regressed values. In our experiments, we demonstrate faster convergence and better generalization of our robust loss function for the tasks of human pose estimation and age estimation from face images. We also show that the combination of the robust loss function with the coarse-to-fine model produces comparable or better results than current state-of-the-art approaches in four publicly available human pose estimation datasets.
Recently, convolutional networks (convnets) have proven useful for predicting optical flow. Much of this success is predicated on the availability of large datasets that require expensive and involved data acquisition and laborious la- beling. To bypass these challenges, we propose an unsuper- vised approach (i.e., without leveraging groundtruth flow) to train a convnet end-to-end for predicting optical flow be- tween two images. We use a loss function that combines a data term that measures photometric constancy over time with a spatial term that models the expected variation of flow across the image. Together these losses form a proxy measure for losses based on the groundtruth flow. Empiri- cally, we show that a strong convnet baseline trained with the proposed unsupervised approach outperforms the same network trained with supervision on the KITTI dataset.
Sparsity driven signal processing has gained tremendous popularity in the last decade. At its core, the assumption is that the signal of interest is sparse with respect to either a fixed transformation or a signal dependent dictionary. To better capture the data characteristics, various dictionary learning methods have been proposed for both reconstruction and classification tasks. For classification particularly, most approaches proposed so far have focused on designing explicit constraints on the sparse code to improve classification accuracy while simply adopting $l_0$-norm or $l_1$-norm for sparsity regularization. Motivated by the success of structured sparsity in the area of Compressed Sensing, we propose a structured dictionary learning framework (StructDL) that incorporates the structure information on both group and task levels in the learning process. Its benefits are two-fold: (i) the label consistency between dictionary atoms and training data are implicitly enforced; and (ii) the classification performance is more robust in the cases of a small dictionary size or limited training data than other techniques. Using the subspace model, we derive the conditions for StructDL to guarantee the performance and show theoretically that StructDL is superior to $l_0$-norm or $l_1$-norm regularized dictionary learning for classification. Extensive experiments have been performed on both synthetic simulations and real world applications, such as face recognition and object classification, to demonstrate the validity of the proposed DL framework.
Online feature selection with dynamic features has become an active research area in recent years. However, in some real-world applications such as image analysis and email spam filtering, features may arrive by groups. Existing online feature selection methods evaluate features individually, while existing group feature selection methods cannot handle online processing. Motivated by this, we formulate the online group feature selection problem, and propose a novel selection approach for this problem. Our proposed approach consists of two stages: online intra-group selection and online inter-group selection. In the intra-group selection, we use spectral analysis to select discriminative features in each group when it arrives. In the inter-group selection, we use Lasso to select a globally optimal subset of features. This 2-stage procedure continues until there are no more features to come or some predefined stopping conditions are met. Extensive experiments conducted on benchmark and real-world data sets demonstrate that our proposed approach outperforms other state-of-the-art online feature selection methods.
In this paper we propose a framework for predicting kernelized classifiers in the visual domain for categories with no training images where the knowledge comes from textual description about these categories. Through our optimization framework, the proposed approach is capable of embedding the class-level knowledge from the text domain as kernel classifiers in the visual domain. We also proposed a distributional semantic kernel between text descriptions which is shown to be effective in our setting. The proposed framework is not restricted to textual descriptions, and can also be applied to other forms knowledge representations. Our approach was applied for the challenging task of zero-shot learning of fine-grained categories from text descriptions of these categories.
Face Recognition has been studied for many decades. As opposed to traditional hand-crafted features such as LBP and HOG, much more sophisticated features can be learned automatically by deep learning methods in a data-driven way. In this paper, we propose a two-stage approach that combines a multi-patch deep CNN and deep metric learning, which extracts low dimensional but very discriminative features for face verification and recognition. Experiments show that this method outperforms other state-of-the-art methods on LFW dataset, achieving 99.77% pair-wise verification accuracy and significantly better accuracy under other two more practical protocols. This paper also discusses the importance of data size and the number of patches, showing a clear path to practical high-performance face recognition systems in real world.
For an image pixel information can be converted to the moments of some basis $Q_k$, e.g. Fourier-Mellin, Zernike, monomials, etc. Given sufficient number of moments pixel information can be completely recovered, for insufficient number of moments only partial information can be recovered and the image reconstruction is, at best, of interpolatory type. Standard approach is to present interpolated value as a linear combination of basis functions, what is equivalent to least squares expansion. However, recent progress in numerical stability of moments estimation allows image information to be recovered from moments in a completely different manner, applying Radon-Nikodym type of expansion, what gives the result as a ratio of two quadratic forms of basis functions. In contrast with least squares the Radon-Nikodym approach has oscillation near the boundaries very much suppressed and does not diverge outside of basis support. While least squares theory operate with vectors $<fQ_k>$, Radon-Nikodym theory operates with matrices $<fQ_jQ_k>$, what make the approach much more suitable to image transforms and statistical property estimation.
This paper addresses the problem of learning word image representations: given the cropped image of a word, we are interested in finding a descriptive, robust, and compact fixed-length representation. Machine learning techniques can then be supplied with these representations to produce models useful for word retrieval or recognition tasks. Although many works have focused on the machine learning aspect once a global representation has been produced, little work has been devoted to the construction of those base image representations: most works use standard coding and aggregation techniques directly on top of standard computer vision features such as SIFT or HOG. We propose to learn local mid-level features suitable for building word image representations. These features are learnt by leveraging character bounding box annotations on a small set of training images. However, contrary to other approaches that use character bounding box information, our approach does not rely on detecting the individual characters explicitly at testing time. Our local mid-level features can then be aggregated to produce a global word image signature. When pairing these features with the recent word attributes framework of Almaz\\ an et al., we obtain results comparable with or better than the state-of-the-art on matching and recognition tasks using global descriptors of only 96 dimensions.
Artificial neural networks have already shown their success in face recognition and similar complex pattern recognition tasks. However, a major disadvantage of the technique is that it is extremely slow during training for larger classes and hence not suitable for real-time complex problems such as pattern recognition. This is an attempt to develop a parallel framework for the training algorithm of a perceptron. In this paper, two general architectures for a Multilayer Perceptron (MLP) have been demonstrated. The first architecture is All-Class-in-One-Network (ACON) where all the classes are placed in a single network and the second one is One-Class-in-One-Network (OCON) where an individual single network is responsible for each and every class. Capabilities of these two architectures were compared and verified in solving human face recognition, which is a complex pattern recognition task where several factors affect the recognition performance like pose variations, facial expression changes, occlusions, and most importantly illumination changes. Both the structures were implemented and tested for face recognition purpose and experimental results show that the OCON structure performs better than the generally used ACON ones in term of training convergence speed of the network. Unlike the conventional sequential approach of training the neural networks, the OCON technique may be implemented by training all the classes of the face images simultaneously.
Active Appearance Model (AAM) is a commonly used method for facial image analysis with applications in face identification and facial expression recognition. This paper proposes a new approach based on image alignment for AAM fitting called bidirectional warping. Previous approaches warp either the input image or the appearance template. We propose to warp both the input image, using incremental update by an affine transformation, and the appearance template, using an inverse compositional approach. Our experimental results on Multi-PIE face database show that the bidirectional approach outperforms state-of-the-art inverse compositional fitting approaches in extracting landmark points of faces with shape and pose variations.
Barten s model of spatio-temporal contrast sensitivity function of human visual system is embedded in a multi-slice channelized Hotelling observer. This is done by 3D filtering of the stack of images with the spatio-temporal contrast sensitivity function and feeding the result (i.e., the perceived image stack) to the multi-slice channelized Hotelling observer. The proposed procedure of considering spatio-temporal contrast sensitivity function is generic in the sense that it can be used with observers other than multi-slice channelized Hotelling observer. Detection performance of the new observer in digital breast tomosynthesis is measured in a variety of browsing speeds, at two spatial sampling rates, using computer simulations. Our results show a peak in detection performance in mid browsing speeds. We compare our results to those of a human observer study reported earlier (I. Diaz et al. SPIE MI 2011). The effects of display luminance, contrast and spatial sampling rate, with and without considering foveal vision, are also studied. Reported simulations are conducted with real digital breast tomosynthesis image stacks, as well as stacks from an anthropomorphic software breast phantom (P. Bakic et al. Med Phys. 2011). Lesion cases are simulated by inserting single micro-calcifications or masses. Limitations of our methods and ways to improve them are discussed.
Precise destination prediction of taxi trajectories can benefit efficient scheduling of taxies and accurate advertisement. Traditional prediction algorithms treat trajectories as sequences of spatial points and process them in one single predefined spatial scale. In this paper, we show that taxi trajectories can exhibit different patterns in different spatial scales, and the combination of multi-scale patterns can improve the accuracy of prediction. Based on this, we propose T-CONV to achieve higher accuracy, which models trajectories as images and adopts multi-layer convolutional neural networks to combine multi-scale trajectory patterns. Furthermore, in order to solve the sparsity problem of trajectories, we integrate multiple local convolutional fields in T-CONV to capture important specific areas of trajectories. Comprehensive experiments based on real trajectory data show that T-CONV can achieve much better results than state-of-the-art methods.
The segmentation of transparent objects can be very useful in computer vision applications. However, because they borrow texture from their background and have a similar appearance to their surroundings, transparent objects are not handled well by regular image segmentation methods. We propose a method that overcomes these problems using the consistency and distortion properties of a light-field image. Graph-cut optimization is applied for the pixel labeling problem. The light-field linearity is used to estimate the likelihood of a pixel belonging to the transparent object or Lambertian background, and the occlusion detector is used to find the occlusion boundary. We acquire a light field dataset for the transparent object, and use this dataset to evaluate our method. The results demonstrate that the proposed method successfully segments transparent objects from the background.
The Fields of Experts (FoE) image prior model, a filter-based higher-order Markov Random Fields (MRF) model, has been shown to be effective for many image restoration problems. Motivated by the successes of FoE-based approaches, in this letter, we propose a novel variational model for multiplicative noise reduction based on the FoE image prior model. The resulted model corresponds to a non-convex minimization problem, which can be solved by a recently published non-convex optimization algorithm. Experimental results based on synthetic speckle noise and real synthetic aperture radar (SAR) images suggest that the performance of our proposed method is on par with the best published despeckling algorithm. Besides, our proposed model comes along with an additional advantage, that the inference is extremely efficient. {Our GPU based implementation takes less than 1s to produce state-of-the-art despeckling performance.}
Second layer scattering descriptors are known to provide good classification performance on natural quasi-stationary processes such as visual textures due to their sensitivity to higher order moments and continuity with respect to small deformations. In a functional Magnetic Resonance Imaging (fMRI) experiment we present visual textures to subjects and evaluate the predictive power of these descriptors with respect to the predictive power of simple contour energy - the first scattering layer. We are able to conclude not only that invariant second layer scattering coefficients better encode voxel activity, but also that well predicted voxels need not necessarily lie in known retinotopic regions.
Co-segmentation is the automatic extraction of the common semantic regions given a set of images. Different from previous approaches mainly based on object visuals, in this paper, we propose a human centred object co-segmentation approach, which uses the human as another strong evidence. In order to discover the rich internal structure of the objects reflecting their human-object interactions and visual similarities, we propose an unsupervised fully connected CRF auto-encoder incorporating the rich object features and a novel human-object interaction representation. We propose an efficient learning and inference algorithm to allow the full connectivity of the CRF with the auto-encoder, that establishes pairwise relations on all pairs of the object proposals in the dataset. Moreover, the auto-encoder learns the parameters from the data itself rather than supervised learning or manually assigned parameters in the conventional CRF. In the extensive experiments on four datasets, we show that our approach is able to extract the common objects more accurately than the state-of-the-art co-segmentation algorithms.
This paper introduces a class of mixed-effects models for joint modeling of spatially correlated intensity variation and warping variation in 2D images. Spatially correlated intensity variation and warp variation are modeled as random effects, resulting in a nonlinear mixed-effects model that enables simultaneous estimation of template and model parameters by optimization of the likelihood function. We propose an algorithm for fitting the model which alternates estimation of variance parameters and image registration, thus avoiding potential estimation bias resulting from treating registration as a preprocessing step. We apply the model to datasets of facial images and 2D brain magnetic resonance images to illustrate the simultaneous estimation and prediction of intensity and warp effects.
The principal component analysis network (PCANet), which is one of the recently proposed deep learning architectures, achieves the state-of-the-art classification accuracy in various databases. However, the explanation of the PCANet is lacked. In this paper, we try to explain why PCANet works well from energy perspective point of view based on a set of experiments. The impact of various parameters on the error rate of PCANet is analyzed in depth. It was found that this error rate is correlated with the logarithm of energy of image. The proposed energy explanation approach can be used as a testing method for checking if every step of the constructed networks is necessary.
The trend towards higher resolution remote sensing imagery facilitates a transition from land-use classification to object-level scene understanding. Rather than relying purely on spectral content, appearance-based image features come into play. In this work, deep convolutional neural networks (CNNs) are applied to semantic labelling of high-resolution remote sensing data. Recent advances in fully convolutional networks (FCNs) are adapted to overhead data and shown to be as effective as in other domains. A full-resolution labelling is inferred using a deep FCN with no downsampling, obviating the need for deconvolution or interpolation. To make better use of image features, a pre-trained CNN is fine-tuned on remote sensing data in a hybrid network context, resulting in superior results compared to a network trained from scratch. The proposed approach is applied to the problem of labelling high-resolution aerial imagery, where fine boundary detail is important. The dense labelling yields state-of-the-art accuracy for the ISPRS Vaihingen and Potsdam benchmark data sets.
This paper employs case-based reasoning (CBR) to capture the personal styles of individual artists and generate the human facial portraits from photos accordingly. For each human artist to be mimicked, a series of cases are firstly built-up from her/his exemplars of source facial photo and hand-drawn sketch, and then its stylization for facial photo is transformed as a style-transferring process of iterative refinement by looking-for and applying best-fit cases in a sense of style optimization. Two models, fitness evaluation model and parameter estimation model, are learned for case retrieval and adaptation respectively from these cases. The fitness evaluation model is to decide which case is best-fitted to the sketching of current interest, and the parameter estimation model is to automate case adaptation. The resultant sketch is synthesized progressively with an iterative loop of retrieval and adaptation of candidate cases until the desired aesthetic style is achieved. To explore the effectiveness and advantages of the novel approach, we experimentally compare the sketch portraits generated by the proposed method with that of a state-of-the-art example-based facial sketch generation algorithm as well as a couple commercial software packages. The comparisons reveal that our CBR based synthesis method for facial portraits is superior both in capturing and reproducing artists  personal illustration styles to the peer methods.
This paper presents a survey of human action recognition approaches based on visual data recorded from a single video camera. We propose an organizing framework which puts in evidence the evolution of the area, with techniques moving from heavily constrained motion capture scenarios towards more challenging, realistic, \"in the wild\" videos. The proposed organization is based on the representation used as input for the recognition task, emphasizing the hypothesis assumed and thus, the constraints imposed on the type of video that each technique is able to address. Expliciting the hypothesis and constraints makes the framework particularly useful to select a method, given an application. Another advantage of the proposed organization is that it allows categorizing newest approaches seamlessly with traditional ones, while providing an insightful perspective of the evolution of the action recognition task up to now. That perspective is the basis for the discussion in the end of the paper, where we also present the main open issues in the area.
In this paper, we propose a stand-alone mobile visual search system based on binary features and the bag-of-visual words framework. The contribution of this study is three-fold: (1) We propose an adaptive substring extraction method that adaptively extracts informative bits from the original binary vector and stores them in the inverted index. These substrings are used to refine visual word-based matching. (2) A modified local NBNN scoring method is proposed in the context of image retrieval, which considers the density of binary features in scoring each feature matching. (3) In order to suppress false positives, we introduce a convexity check step that imposes a convexity constraint on the configuration of a transformed reference image. The proposed system improves retrieval accuracy by 11% compared with a conventional method without increasing the database size. Furthermore, our system with the convexity check does not lead to false positive results.
We consider the very challenging task of restoring images (i) which have a large number of missing pixels, (ii) whose existing pixels are corrupted by noise and (iii) the ideal image to be restored contains both cartoon and texture elements. The combination of these three properties makes this inverse problem a very difficult one. The solution proposed in this manuscript is based on directional global three-part decomposition (DG3PD) [ThaiGottschlich2016] with directional total variation norm, directional G-norm and $\\ell_\\infty$-norm in curvelet domain as key ingredients of the model. Image decomposition by DG3PD enables a decoupled inpainting and denoising of the cartoon and texture components. A comparison to existing approaches for inpainting and denoising shows the advantages of the proposed method. Moreover, we regard the image restoration problem from the viewpoint of a Bayesian framework and we discuss the connections between the proposed solution by function space and related image representation by harmonic analysis and pyramid decomposition.
Color distortion can introduce a significant damage in visual quality perception, however, most of existing reduced-reference quality measures are designed for grayscale images. In this paper, we consider a basic extension of well-known image-statistics based quality assessment measures to color images. In order to evaluate the impact of color information on the measures efficiency, two color spaces are investigated: RGB and CIELAB. Results of an extensive evaluation using TID 2013 benchmark demonstrates that significant improvement can be achieved for a great number of distortion type when the CIELAB color representation is used.
This paper addresses the task of separating ground points from airborne LiDAR point cloud data in urban areas. A novel ground filtering method using scan line segmentation is proposed here, which we call SLSGF. It utilizes the scan line information in LiDAR data to segment the LiDAR data. The similarity measurements are designed to make it possible to segment complex roof structures into a single segment as much as possible so the topological relationships between the roof and the ground are simpler, which will benefit the labeling process. In the labeling process, the initial ground segments are detected and a coarse to fine labeling scheme is applied. Data from ISPRS 2011 are used to test the accuracy of SLSGF; and our analytical and experimental results show that this method is computationally-efficient and noise-insensitive, thereby making a denoising process unnecessary before filtering.
Context in image is crucial for scene labeling while existing methods only exploit local context generated from a small surrounding area of an image patch or a pixel, by contrast long-range and global contextual information is ignored. To handle this issue, we in this work propose a novel approach for scene labeling by exploring multi-level contextual recurrent neural networks (ML-CRNNs). Specifically, we encode three kinds of contextual cues, i.e., local context, global context and image topic context in structural recurrent neural networks (RNNs) to model long-range local and global dependencies in image. In this way, our method is able to `see  the image in terms of both long-range local and holistic views, and make a more reliable inference for image labeling. Besides, we integrate the proposed contextual RNNs into hierarchical convolutional neural networks (CNNs), and exploit dependence relationships in multiple levels to provide rich spatial and semantic information. Moreover, we novelly adopt an attention model to effectively merge multiple levels and show that it outperforms average- or max-pooling fusion strategies. Extensive experiments demonstrate that the proposed approach achieves new state-of-the-art results on the CamVid, SiftFlow and Stanford-background datasets.
Convolutional neural network (CNN) is one of the most prominent architectures and algorithm in Deep Learning. It shows a remarkable improvement in the recognition and classification of objects. This method has also been proven to be very effective in a variety of computer vision and machine learning problems. As in other deep learning, however, training the CNN is interesting yet challenging. Recently, some metaheuristic algorithms have been used to optimize CNN using Genetic Algorithm, Particle Swarm Optimization, Simulated Annealing and Harmony Search. In this paper, another type of metaheuristic algorithms with different strategy has been proposed, i.e. Microcanonical Annealing to optimize Convolutional Neural Network. The performance of the proposed method is tested using the MNIST and CIFAR-10 datasets. Although experiment results of MNIST dataset indicate the increase in computation time (1.02x - 1.38x), nevertheless this proposed method can considerably enhance the performance of the original CNN (up to 4.60\\%). On the CIFAR10 dataset, currently, state of the art is 96.53\\% using fractional pooling, while this proposed method achieves 99.14\\%.
Irregular pyramids are made of a stack of successively reduced graphs embedded in the plane. Such pyramids are used within the segmentation framework to encode a hierarchy of partitions. The different graph models used within the irregular pyramid framework encode different types of relationships between regions. This paper compares different graph models used within the irregular pyramid framework according to a set of relationships between regions. We also define a new algorithm based on a pyramid of combinatorial maps which allows to determine if one region contains the other using only local calculus.
Pose Machines provide a sequential prediction framework for learning rich implicit spatial models. In this work we show a systematic design for how convolutional networks can be incorporated into the pose machine framework for learning image features and image-dependent spatial models for the task of pose estimation. The contribution of this paper is to implicitly model long-range dependencies between variables in structured prediction tasks such as articulated pose estimation. We achieve this by designing a sequential architecture composed of convolutional networks that directly operate on belief maps from previous stages, producing increasingly refined estimates for part locations, without the need for explicit graphical model-style inference. Our approach addresses the characteristic difficulty of vanishing gradients during training by providing a natural learning objective function that enforces intermediate supervision, thereby replenishing back-propagated gradients and conditioning the learning procedure. We demonstrate state-of-the-art performance and outperform competing methods on standard benchmarks including the MPII, LSP, and FLIC datasets.
Image feature classification is a challenging problem in many computer vision applications, specifically, in the fields of remote sensing, image analysis and pattern recognition. In this paper, a novel Self Organizing Map, termed improved SOM (iSOM), is proposed with the aim of effectively classifying Mammographic images based on their texture feature representation. The main contribution of the iSOM is to introduce a new node structure for the map representation and adopting a learning technique based on Kohonen SOM accordingly. The main idea is to control, in an unsupervised fashion, the weight updating procedure depending on the class reliability of the node, during the weight update time. Experiments held on a real Mammographic images. Results showed high accuracy compared to classical SOM and other state-of-art classifiers.
Tracking Facial Points in unconstrained videos is challenging due to the non-rigid deformation that changes over time. In this paper, we propose to exploit incremental learning for person-specific alignment in wild conditions. Our approach takes advantage of part-based representation and cascade regression for robust and efficient alignment on each frame. Unlike existing methods that usually rely on models trained offline, we incrementally update the representation subspace and the cascade of regressors in a unified framework to achieve personalized modeling on the fly. To alleviate the drifting issue, the fitting results are evaluated using a deep neural network, where well-aligned faces are picked out to incrementally update the representation and fitting models. Both image and video datasets are employed to valid the proposed method. The results demonstrate the superior performance of our approach compared with existing approaches in terms of fitting accuracy and efficiency.
Video object segmentation is a challenging problem due to the presence of deformable, connected, and articulated objects, intra- and inter-object occlusions, object motion, and poor lighting. Some of these challenges call for object models that can locate a desired object and separate it from its surrounding background, even when both share similar colors and textures. In this work, we extend a fuzzy object model, named cloud system model (CSM), to handle video segmentation, and evaluate it for body pose estimation of toddlers at risk of autism. CSM has been successfully used to model the parts of the brain (cerebrum, left and right brain hemispheres, and cerebellum) in order to automatically locate and separate them from each other, the connected brain stem, and the background in 3D MR-images. In our case, the objects are articulated parts (2D projections) of the human body, which can deform, cause self-occlusions, and move along the video. The proposed CSM extension handles articulation by connecting the individual clouds, body parts, of the system using a 2D stickman model. The stickman representation naturally allows us to extract 2D body pose measures of arm asymmetry patterns during unsupported gait of toddlers, a possible behavioral marker of autism. The results show that our method can provide insightful knowledge to assist the specialist s observations during real in-clinic assessments.
Video data is explosively growing. As a result of the \"big video data\", intelligent algorithms for automatic video summarization have re-emerged as a pressing need. We develop a probabilistic model, Sequential and Hierarchical Determinantal Point Process (SH-DPP), for query-focused extractive video summarization. Given a user query and a long video sequence, our algorithm returns a summary by selecting key shots from the video. The decision to include a shot in the summary depends on the shot s relevance to the user query and importance in the context of the video, jointly. We verify our approach on two densely annotated video datasets. The query-focused video summarization is particularly useful for search engines, e.g., to display snippets of videos.
In this paper we propose a global convex approach for image hallucination. Altering the idea of classical multi image super resolution (SU) systems to single image SU, we incorporate aligned images to hallucinate the output. Our work is based on the paper of Tappen et al. where they use a non-convex model for image hallucination. In comparison we formulate a convex primal optimization problem and derive a fast converging primal-dual algorithm with a global optimal solution. We use a database with face images to incorporate high-frequency details to the high-resolution output. We show that we can achieve state-of-the-art results by using a convex approach.
This paper proposes an algorithm that turns a regular video capturing urban scenes into a high-quality endless animation, known as a Cinemagraph. The creation of a Cinemagraph usually requires a static camera in a carefully configured scene. The task becomes challenging for a regular video with a moving camera and objects. Our approach first warps an input video into the viewpoint of a reference camera. Based on the warped video, we propose effective temporal analysis algorithms to detect regions with static geometry and dynamic appearance, where geometric modeling is reliable and visually attractive animations can be created. Lastly, the algorithm applies a sequence of video processing techniques to produce a Cinemagraph movie. We have tested the proposed approach on numerous challenging real scenes. To our knowledge, this work is the first to automatically generate Cinemagraph animations from regular movies in the wild.
Identity of a vehicle is done through the vehicle license plate by traffic police in general. Au- tomatic vehicle license plate recognition has several applications in intelligent traffic management systems. The security situation across the globe and particularly in India demands a need to equip the traffic police with a system that enables them to get instant details of a vehicle. The system should be easy to use, should be mobile, and work 24 x 7. In this paper, we describe a mobile phone based, client-server architected, license plate recognition system. While we use the state of the art image processing and pattern recognition algorithms tuned for Indian conditions to automatically recognize non-uniform license plates, the main contribution is in creating an end to end usable solution. The client application runs on a mobile device and a server application, with access to vehicle information database, is hosted centrally. The solution enables capture of license plate image captured by the phone camera and passes to the server; on the server the license plate number is recognized; the data associated with the number plate is then sent back to the mobile device, instantaneously. We describe the end to end system architecture in detail. A working prototype of the proposed system has been implemented in the lab environment.
It is convenient to calibrate time-of-flight cameras by established methods, using images of a chequerboard pattern. The low resolution of the amplitude image, however, makes it difficult to detect the board reliably. Heuristic detection methods, based on connected image-components, perform very poorly on this data. An alternative, geometrically-principled method is introduced here, based on the Hough transform. The projection of a chequerboard is represented by two pencils of lines, which are identified as oriented clusters in the gradient-data of the image. A projective Hough transform is applied to each of the two clusters, in axis-aligned coordinates. The range of each transform is properly bounded, because the corresponding gradient vectors are approximately parallel. Each of the two transforms contains a series of collinear peaks; one for every line in the given pencil. This pattern is easily detected, by sweeping a dual line through the transform. The proposed Hough-based method is compared to the standard OpenCV detection routine, by application to several hundred time-of-flight images. It is shown that the new method detects significantly more calibration boards, over a greater variety of poses, without any overall loss of accuracy. This conclusion is based on an analysis of both geometric and photometric error.
Trending research on fine-grained recognition gradually shifts from traditional multistage frameworks to an end-to-end fashion with convolutional neural network (CNN). Many previous end-to-end deep approaches typically consist of a recognition network and an auxiliary localization network trained with additional part annotations to detect semantic parts shared across classes. In this paper, without the cost of extra semantic part annotations, we advance by learning class-specific discriminative patches within the CNN framework. We achieve this by designing a novel asymmetric two-stream network architecture with supervision on convolutional filters and a non-random way of layer initialization. Experimental results show that our approach is able to find high-quality discriminative patches as expected and gets comparable results to state-of-the-art on two publicly available fine-grained recognition datasets.
Wireless Capsule Endoscope (WCE) is an innovative imaging device that permits physicians to examine all the areas of the Gastrointestinal (GI) tract. It is especially important for the small intestine, where traditional invasive endoscopies cannot reach. Although WCE represents an extremely important advance in medical imaging, a major drawback that remains unsolved is the WCE precise location in the human body during its operating time. This is mainly due to the complex physiological environment and the inherent capsule effects during its movement. When an abnormality is detected, in the WCE images, medical doctors do not know precisely where this abnormality is located relative to the intestine and therefore they can not proceed efficiently with the appropriate therapy. The primary objective of the present paper is to give a contribution to WCE localization, using image-based methods. The main focus of this work is on the description of a multiscale elastic image registration approach, its experimental application on WCE videos, and comparison with a multiscale affine registration. The proposed approach includes registrations that capture both rigid-like and non-rigid deformations, due respectively to the rigid-like WCE movement and the elastic deformation of the small intestine originated by the GI peristaltic movement. Under this approach a qualitative information about the WCE speed can be obtained, as well as the WCE location and orientation via projective geometry. The results of the experimental tests with real WCE video frames show the good performance of the proposed approach, when elastic deformations of the small intestine are involved in successive frames, and its superiority with respect to a multiscale affine image registration, which accounts for rigid-like deformations only and discards elastic deformations.
We present a content-based retrieval method for long surveillance videos both for wide-area (Airborne) as well as near-field imagery (CCTV). Our goal is to retrieve video segments, with a focus on detecting objects moving on routes, that match user-defined events of interest. The sheer size and remote locations where surveillance videos are acquired, necessitates highly compressed representations that are also meaningful for supporting user-defined queries. To address these challenges we archive long-surveillance video through lightweight processing based on low-level local spatio-temporal extraction of motion and object features. These are then hashed into an inverted index using locality-sensitive hashing (LSH). This local approach allows for query flexibility as well as leads to significant gains in compression. Our second task is to extract partial matches to the user-created query and assembles them into full matches using Dynamic Programming (DP). DP exploits causality to assemble the indexed low level features into a video segment which matches the query route. We examine CCTV and Airborne footage, whose low contrast makes motion extraction more difficult. We generate robust motion estimates for Airborne data using a tracklets generation algorithm while we use Horn and Schunck approach to generate motion estimates for CCTV. Our approach handles long routes, low contrasts and occlusion. We derive bounds on the rate of false positives and demonstrate the effectiveness of the approach for counting, motion pattern recognition and abandoned object applications.
The Deep Boltzmann Machines (DBM) is a state-of-the-art unsupervised learning model, which has been successfully applied to handwritten digit recognition and, as well as object recognition. However, the DBM is limited in scene recognition due to the fact that natural scene images are usually very large. In this paper, an efficient scene recognition approach is proposed based on superpixels and the DBMs. First, a simple linear iterative clustering (SLIC) algorithm is employed to generate superpixels of input images, where each superpixel is regarded as an input of a learning model. Then, a two-layer DBM model is constructed by stacking two restricted Boltzmann machines (RBMs), and a greedy layer-wise algorithm is applied to train the DBM model. Finally, a softmax regression is utilized to categorize scene images. The proposed technique can effectively reduce the computational complexity and enhance the performance for large natural image recognition. The approach is verified and evaluated by extensive experiments, including the fifteen-scene categories dataset the UIUC eight-sports dataset, and the SIFT flow dataset, are used to evaluate the proposed method. The experimental results show that the proposed approach outperforms other state-of-the-art methods in terms of recognition rate.
There are multiple cues in an image which reveal what action a person is performing. For example, a jogger has a pose that is characteristic for jogging, but the scene (e.g. road, trail) and the presence of other joggers can be an additional source of information. In this work, we exploit the simple observation that actions are accompanied by contextual cues to build a strong action recognition system. We adapt RCNN to use more than one region for classification while still maintaining the ability to localize the action. We call our system R*CNN. The action-specific models and the feature maps are trained jointly, allowing for action specific representations to emerge. R*CNN achieves 90.2% mean AP on the PASAL VOC Action dataset, outperforming all other approaches in the field by a significant margin. Last, we show that R*CNN is not limited to action recognition. In particular, R*CNN can also be used to tackle fine-grained tasks such as attribute classification. We validate this claim by reporting state-of-the-art performance on the Berkeley Attributes of People dataset.
The prevalent scene text detection approach follows four sequential steps comprising character candidate detection, false character candidate removal, text line extraction, and text line verification. However, errors occur and accumulate throughout each of these sequential steps which often lead to low detection performance. To address these issues, we propose a unified scene text detection system, namely Text Flow, by utilizing the minimum cost (min-cost) flow network model. With character candidates detected by cascade boosting, the min-cost flow network model integrates the last three sequential steps into a single process which solves the error accumulation problem at both character level and text line level effectively. The proposed technique has been tested on three public datasets, i.e, ICDAR2011 dataset, ICDAR2013 dataset and a multilingual dataset and it outperforms the state-of-the-art methods on all three datasets with much higher recall and F-score. The good performance on the multilingual dataset shows that the proposed technique can be used for the detection of texts in different languages.
In this paper, we propose a novel model, named Stroke Sequence-dependent Deep Convolutional Neural Network (SSDCNN), using the stroke sequence information and eight-directional features for Online Handwritten Chinese Character Recognition (OLHCCR). On one hand, SSDCNN can learn the representation of Online Handwritten Chinese Character (OLHCC) by incorporating the natural sequence information of the strokes. On the other hand, SSDCNN can incorporate eight-directional features in a natural way. In order to train SSDCNN, we divide the process of training into two stages: 1) The training data is used to pre-train the whole architecture until the performance tends to converge. 2) Fully-connected neural network which is used to combine the stroke sequence-dependent representation with eight-directional features and softmax layer are further trained. Experiments were conducted on the OLHCCR competition tasks of ICDAR 2013. Results show that, SSDCNN can reduce the recognition error by 50\\% (5.13\\% vs 2.56\\%) compared to the model which only use eight-directional features. The proposed SSDCNN achieves 97.44\\% accuracy which reduces the recognition error by about 1.9\\% compared with the best submitted system on ICDAR2013 competition. These results indicate that SSDCNN can exploit the stroke sequence information to learn high-quality representation of OLHCC. It also shows that the learnt representation and the classical eight-directional features complement each other within the SSDCNN architecture.
In this paper a number of problems are considered which are related to the modelling of eye guidance under visual attention in a natural setting. From a crude discussion of a variety of available models spelled in probabilistic terms, it appears that current approaches in computational vision are hitherto far from achieving the goal of an active observer relying upon eye guidance to accomplish real-world tasks. We argue that this challenging goal not only requires to embody, in a principled way, the problem of eye guidance within the action/perception loop, but to face the inextricable link tying up visual attention, emotion and executive control, in so far as recent neurobiological findings are weighed up.
We examine in this paper the problem of image registration from the new perspective where images are given by sparse approximations in parametric dictionaries of geometric functions. We propose a registration algorithm that looks for an estimate of the global transformation between sparse images by examining the set of relative geometrical transformations between the respective features. We propose a theoretical analysis of our registration algorithm and we derive performance guarantees based on two novel important properties of redundant dictionaries, namely the robust linear independence and the transformation inconsistency. We propose several illustrations and insights about the importance of these dictionary properties and show that common properties such as coherence or restricted isometry property fail to provide sufficient information in registration problems. We finally show with illustrative experiments on simple visual objects and handwritten digits images that our algorithm outperforms baseline competitor methods in terms of transformation-invariant distance computation and classification.
Accurate information about the location and orientation of a camera in mobile devices is central to the utilization of location-based services (LBS). Most of such mobile devices rely on GPS data but this data is subject to inaccuracy due to imperfections in the quality of the signal provided by satellites. This shortcoming has spurred the research into improving the accuracy of localization. Since mobile devices have camera, a major thrust of this research has been seeks to acquire the local scene and apply image retrieval techniques by querying a GPS-tagged image database to find the best match for the acquired scene.. The techniques are however computationally demanding and unsuitable for real-time applications such as assistive technology for navigation by the blind and visually impaired which motivated out work. To overcome the high complexity of those techniques, we investigated the use of inertial sensors as an aid in image-retrieval-based approach. Armed with information of media other than images, such as data from the GPS module along with orientation sensors such as accelerometer and gyro, we sought to limit the size of the image set to c search for the best match. Specifically, data from the orientation sensors along with Dilution of precision (DOP) from GPS are used to find the angle of view and estimation of position. We present analysis of the reduction in the image set size for the search as well as simulations to demonstrate the effectiveness in a fast implementation with 98% Estimated Position Error.
The goal of precipitation nowcasting is to predict the future rainfall intensity in a local region over a relatively short period of time. Very few previous studies have examined this crucial and challenging weather forecasting problem from the machine learning perspective. In this paper, we formulate precipitation nowcasting as a spatiotemporal sequence forecasting problem in which both the input and the prediction target are spatiotemporal sequences. By extending the fully connected LSTM (FC-LSTM) to have convolutional structures in both the input-to-state and state-to-state transitions, we propose the convolutional LSTM (ConvLSTM) and use it to build an end-to-end trainable model for the precipitation nowcasting problem. Experiments show that our ConvLSTM network captures spatiotemporal correlations better and consistently outperforms FC-LSTM and the state-of-the-art operational ROVER algorithm for precipitation nowcasting.
The vast majority of modern consumer-grade cameras employ a rolling shutter mechanism. In dynamic geometric computer vision applications such as visual SLAM, the so-called rolling shutter effect therefore needs to be properly taken into account. A dedicated relative pose solver appears to be the first problem to solve, as it is of eminent importance to bootstrap any derivation of multi-view geometry. However, despite its significance, it has received inadequate attention to date. This paper presents a detailed investigation of the geometry of the rolling shutter relative pose problem. We introduce the rolling shutter essential matrix, and establish its link to existing models such as the push-broom cameras, summarized in a clean hierarchy of multi-perspective cameras. The generalization of well-established concepts from epipolar geometry is completed by a definition of the Sampson distance in the rolling shutter case. The work is concluded with a careful investigation of the introduced epipolar geometry for rolling shutter cameras on several dedicated benchmarks.
In this paper we give a brief review on the present status of automated detection systems describe for the screening of diabetic retinopathy. We further detail an enhanced detection procedure that consists of two steps. First, a pre-screening algorithm is considered to classify the input digital fundus images based on the severity of abnormalities. If an image is found to be seriously abnormal, it will not be analysed further with robust lesion detector algorithms. As a further improvement, we introduce a novel feature extraction approach based on clinical observations. The second step of the proposed method detects regions of interest with possible lesions on the images that previously passed the pre-screening step. These regions will serve as input to the specific lesion detectors for detailed analysis. This procedure can increase the computational performance of a screening system. Experimental results show that both two steps of the proposed approach are capable to efficiently exclude a large amount of data from further processing, thus, to decrease the computational burden of the automatic screening system.
Brute force matching of binary image feature descriptors is conventionally performed using the Hamming distance. This paper assesses the use of alternative metrics in order to see whether they can produce feature correspondences that yield more accurate homography matrices. Two statistical tests, namely ANOVA (Analysis of Variance) and McNemar s test were employed for evaluation. Results show that Jackard-Needham and Dice metrics can display better performance for some descriptors. Yet, these performance differences were not found to be statistically significant.
Inverse problems in image and audio, and super-resolution in particular, can be seen as high-dimensional structured prediction problems, where the goal is to characterize the conditional distribution of a high-resolution output given its low-resolution corrupted observation. When the scaling ratio is small, point estimates achieve impressive performance, but soon they suffer from the regression-to-the-mean problem, result of their inability to capture the multi-modality of this conditional distribution. Modeling high-dimensional image and audio distributions is a hard task, requiring both the ability to model complex geometrical structures and textured regions. In this paper, we propose to use as conditional model a Gibbs distribution, where its sufficient statistics are given by deep convolutional neural networks. The features computed by the network are stable to local deformation, and have reduced variance when the input is a stationary texture. These properties imply that the resulting sufficient statistics minimize the uncertainty of the target signals given the degraded observations, while being highly informative. The filters of the CNN are initialized by multiscale complex wavelets, and then we propose an algorithm to fine-tune them by estimating the gradient of the conditional log-likelihood, which bears some similarities with Generative Adversarial Networks. We evaluate experimentally the proposed approach in the image super-resolution task, but the approach is general and could be used in other challenging ill-posed problems such as audio bandwidth extension.
The interest of compressive sampling in ultrasound imaging has been recently extensively evaluated by several research teams. Following the different application setups, it has been shown that the RF data may be reconstructed from a small number of measurements and/or using a reduced number of ultrasound pulse emissions. Nevertheless, RF image spatial resolution, contrast and signal to noise ratio are affected by the limited bandwidth of the imaging transducer and the physical phenomenon related to US wave propagation. To overcome these limitations, several deconvolution-based image processing techniques have been proposed to enhance the ultrasound images. In this paper, we propose a novel framework, named compressive deconvolution, that reconstructs enhanced RF images from compressed measurements. Exploiting an unified formulation of the direct acquisition model, combining random projections and 2D convolution with a spatially invariant point spread function, the benefit of our approach is the joint data volume reduction and image quality improvement. The proposed optimization method, based on the Alternating Direction Method of Multipliers, is evaluated on both simulated and in vivo data.
Recent imaging technologies are rapidly evolving for sampling richer and more immersive representations of the 3D world. And one of the emerging technologies are light field (LF) cameras based on micro-lens arrays. To record the directional information of the light rays, a much larger storage space and transmission bandwidth are required by a LF image as compared to a conventional 2D image of similar spatial dimension, and the compression of LF data becomes a vital part of its application. In this paper, we propose a LF codec that fully exploit the intrinsic geometry between the LF sub-views by first approximating the LF with disparity guided sparse coding over a perspective shifted light field dictionary. The sparse coding is only based on several optimized Structural Key Views (SKV), however the entire LF can be recovered from the coding coefficients. By keeping the approximation identical between encoder and decoder, only the sparse coding residual and the SKVs needs to be transmitted. An optimized SKV selection method is proposed such that most LF spatial information could be preserved. And to achieve optimum dictionary efficiency, the LF is divided into several Coding Regions (CR), over which the reconstruction works individually. Experiments and comparisons have been carried out over benchmark LF dataset which show that the proposed SC-SKV codec produces state-of-the-art compression results in terms of rate-distortion performance and visual quality compared with High Efficiency Video Coding (HEVC): with 37.79% BD rate reduction and 0.92 dB BD-PSNR improvement achieved on average, especially with up to 4 dB improvement for low bit rate scenarios.
In object tracking, outlier is one of primary factors which degrade performance of image-based tracking algorithms. In this respect, therefore, most of the existing methods simply discard detected outliers and pay little or no attention to employing them as an important source of information for motion estimation. We consider outliers as important as inliers for object tracking and propose a motion estimation algorithm based on concurrent tracking of inliers and outliers. Our tracker makes use of pyramidal implementation of the Lucas-Kanade tracker to estimate motion flows of inliers and outliers and final target motion is estimated robustly based on both of these information. Experimental results from challenging benchmark video sequences confirm enhanced tracking performance, showing highly stable target tracking under severe occlusion compared with state-of-the-art algorithms. The proposed algorithm runs at more than 100 frames per second even without using a hardware accelerator, which makes the proposed method more practical and portable.
Systems based on bag-of-words models from image features collected at maxima of sparse interest point operators have been used successfully for both computer visual object and action recognition tasks. While the sparse, interest-point based approach to recognition is not inconsistent with visual processing in biological systems that operate in `saccade and fixate  regimes, the methodology and emphasis in the human and the computer vision communities remains sharply distinct. Here, we make three contributions aiming to bridge this gap. First, we complement existing state-of-the art large scale dynamic computer vision annotated datasets like Hollywood-2 and UCF Sports with human eye movements collected under the ecological constraints of the visual action recognition task. To our knowledge these are the first large human eye tracking datasets to be collected and made publicly available for video, vision.imar.ro/eyetracking (497,107 frames, each viewed by 16 subjects), unique in terms of their (a) large scale and computer vision relevance, (b) dynamic, video stimuli, (c) task control, as opposed to free-viewing. Second, we introduce novel sequential consistency and alignment measures, which underline the remarkable stability of patterns of visual search among subjects. Third, we leverage the significant amount of collected data in order to pursue studies and build automatic, end-to-end trainable computer vision systems based on human eye movements. Our studies not only shed light on the differences between computer vision spatio-temporal interest point image sampling strategies and the human fixations, as well as their impact for visual recognition performance, but also demonstrate that human fixations can be accurately predicted, and when used in an end-to-end automatic system, leveraging some of the advanced computer vision practice, can lead to state of the art results.
In this paper we present a novel approach for automatic recognition of ring worm skin disease based on LBP (Local Binary Pattern) feature extracted from the affected skin images. The proposed method is evaluated by extensive experiments on the skin images collected from internet. The dataset is tested using three different classifiers i.e. Bayesian, MLP and SVM. Experimental results show that the proposed methodology efficiently discriminates between a ring worm skin and a normal skin. It is a low cost technique and does not require any special imaging devices.
This paper deals with the rotation synchronization problem, which arises in global registration of 3D point-sets and in structure from motion. The problem is formulated in an unprecedented way as a \"low-rank and sparse\" matrix decomposition that handles both outliers and missing data. A minimization strategy, dubbed R-GoDec, is also proposed and evaluated experimentally against state-of-the-art algorithms on simulated and real data. The results show that R-GoDec is the fastest among the robust algorithms.
Imaging has occupied a huge role in the management of patients, whether hospitalized or not. Depending on the patients clinical problem, a variety of imaging modalities were available for use. This gave birth of the annotation of medical image process. The annotation is intended to image analysis and solve the problem of semantic gap. The reason for image annotation is due to increase in acquisition of images. Physicians and radiologists feel better while using annotation techniques for faster remedy in surgery and medicine due to the following reasons: giving details to the patients, searching the present and past records from the larger databases, and giving solutions to them in a faster and more accurate way. However, classical conceptual modeling does not incorporate the specificity of medical domain specially the annotation of medical image. The design phase is the most important activity in the successful building of annotation process. For this reason, we focus in this paper on presenting the conceptual modeling of the annotation of medical image by defining a new profile using the StarUML extensibility mechanism.
Image segmentation in the medical domain is a challenging field owing to poor resolution and limited contrast. The predominantly used conventional segmentation techniques and the thresholding methods suffer from limitations because of heavy dependence on user interactions. Uncertainties prevalent in an image cannot be captured by these techniques. The performance further deteriorates when the images are corrupted by noise, outliers and other artifacts. The objective of this paper is to develop an effective robust fuzzy C- means clustering for segmenting vertebral body from magnetic resonance image owing to its unsupervised form of learning. The motivation for this work is detection of spine geometry and proper localisation and labelling will enhance the diagnostic output of a physician. The method is compared with Otsu thresholding and K-means clustering to illustrate the robustness.The reference standard for validation was the annotated images from the radiologist, and the Dice coefficient and Hausdorff distance measures were used to evaluate the segmentation.
High resolution depth-maps, obtained by upsampling sparse range data from a 3D-LIDAR, find applications in many fields ranging from sensory perception to semantic segmentation and object detection. Upsampling is often based on combining data from a monocular camera to compensate the low-resolution of a LIDAR. This paper, on the other hand, introduces a novel framework to obtain dense depth-map solely from a single LIDAR point cloud; which is a research direction that has been barely explored. The formulation behind the proposed depth-mapping process relies on local spatial interpolation, using sliding-window (mask) technique, and on the Bilateral Filter (BF) where the variable of interest, the distance from the sensor, is considered in the interpolation problem. In particular, the BF is conveniently modified to perform depth-map upsampling such that the edges (foreground-background discontinuities) are better preserved by means of a proposed method which influences the range-based weighting term. Other methods for spatial upsampling are discussed, evaluated and compared in terms of different error measures. This paper also researches the role of the mask s size in the performance of the implemented methods. Quantitative and qualitative results from experiments on the KITTI Database, using LIDAR point clouds only, show very satisfactory performance of the approach introduced in this work.
We focus on the task of everyday hand pose estimation from egocentric viewpoints. For this task, we show that depth sensors are particularly informative for extracting near-field interactions of the camera wearer with his/her environment. Despite the recent advances in full-body pose estimation using Kinect-like sensors, reliable monocular hand pose estimation in RGB-D images is still an unsolved problem. The problem is considerably exacerbated when analyzing hands performing daily activities from a first-person viewpoint, due to severe occlusions arising from object manipulations and a limited field-of-view. Our system addresses these difficulties by exploiting strong priors over viewpoint and pose in a discriminative tracking-by-detection framework. Our priors are operationalized through a photorealistic synthetic model of egocentric scenes, which is used to generate training data for learning depth-based pose classifiers. We evaluate our approach on an annotated dataset of real egocentric object manipulation scenes and compare to both commercial and academic approaches. Our method provides state-of-the-art performance for both hand detection and pose estimation in egocentric RGB-D images.
In this paper, we introduce a novel algorithm for segmentation of imperfect boundary probability maps (BPM) in connectomics. Our algorithm can be a considered as an extension of spectral clustering. Instead of clustering the diffusion maps with traditional clustering algorithms, we learn the manifold and compute an estimate of the minimum normalized cut. We proceed by divide and conquer. We also introduce a novel criterion for determining if further splits are necessary in a component based on it s topological properties. Our algorithm complements the currently popular agglomeration approaches in connectomics, which overlook the geometrical aspects of this segmentation problem.
Correlation filters take advantage of specific properties in the Fourier domain allowing them to be estimated efficiently: O(NDlogD) in the frequency domain, versus O(D^3 + ND^2) spatially where D is signal length, and N is the number of signals. Recent extensions to correlation filters, such as MOSSE, have reignited interest of their use in the vision community due to their robustness and attractive computational properties. In this paper we demonstrate, however, that this computational efficiency comes at a cost. Specifically, we demonstrate that only 1/D proportion of shifted examples are unaffected by boundary effects which has a dramatic effect on detection/tracking performance. In this paper, we propose a novel approach to correlation filter estimation that: (i) takes advantage of inherent computational redundancies in the frequency domain, and (ii) dramatically reduces boundary effects. Impressive object tracking and detection results are presented in terms of both accuracy and computational efficiency.
We investigate the problem of estimating the 3D shape of an object, given a set of 2D landmarks in a single image. To alleviate the reconstruction ambiguity, a widely-used approach is to confine the unknown 3D shape within a shape space built upon existing shapes. While this approach has proven to be successful in various applications, a challenging issue remains, i.e., the joint estimation of shape parameters and camera-pose parameters requires to solve a nonconvex optimization problem. The existing methods often adopt an alternating minimization scheme to locally update the parameters, and consequently the solution is sensitive to initialization. In this paper, we propose a convex formulation to address this problem and develop an efficient algorithm to solve the proposed convex program. We demonstrate the exact recovery property of the proposed method, its merits compared to alternative methods, and the applicability in human pose and car shape estimation.
The morphology of glands has been used routinely by pathologists to assess the malignancy degree of adenocarcinomas. Accurate segmentation of glands from histology images is a crucial step to obtain reliable morphological statistics for quantitative diagnosis. In this paper, we proposed an efficient deep contour-aware network (DCAN) to solve this challenging problem under a unified multi-task learning framework. In the proposed network, multi-level contextual features from the hierarchical architecture are explored with auxiliary supervision for accurate gland segmentation. When incorporated with multi-task regularization during the training, the discriminative capability of intermediate features can be further improved. Moreover, our network can not only output accurate probability maps of glands, but also depict clear contours simultaneously for separating clustered objects, which further boosts the gland segmentation performance. This unified framework can be efficient when applied to large-scale histopathological data without resorting to additional steps to generate contours based on low-level cues for post-separating. Our method won the 2015 MICCAI Gland Segmentation Challenge out of 13 competitive teams, surpassing all the other methods by a significant margin.
This work presents an automatic human gender and age group recognition system based on human facial images. It makes an extensive experiment with row pixel intensity valued features and Discrete Cosine Transform (DCT) coefficient features with Principal Component Analysis and k-Nearest Neighbor classification to identify the best recognition approach. The final results show approaches using DCT coefficient outperform their counter parts resulting in a 99% correct gender recognition rate and 68% correct age group recognition rate (considering four distinct age groups) in unseen test images. Detailed experimental settings and obtained results are clearly presented and explained in this report.
Adams and Bishop have proposed in 1994 a novel region growing algorithm called seeded region growing by pixels aggregation (SRGPA). This paper introduces a framework to implement an algorithm using SRGPA. This framework is built around two concepts: localization and organization of applied action. This conceptualization gives a quick implementation of algorithms, a direct translation between the mathematical idea and the numerical implementation, and an improvement of algorithms efficiency.
This paper investigates, using prior shape models and the concept of ball scale (b-scale), ways of automatically recognizing objects in 3D images without performing elaborate searches or optimization. That is, the goal is to place the model in a single shot close to the right pose (position, orientation, and scale) in a given image so that the model boundaries fall in the close vicinity of object boundaries in the image. This is achieved via the following set of key ideas: (a) A semi-automatic way of constructing a multi-object shape model assembly. (b) A novel strategy of encoding, via b-scale, the pose relationship between objects in the training images and their intensity patterns captured in b-scale images. (c) A hierarchical mechanism of positioning the model, in a one-shot way, in a given image from a knowledge of the learnt pose relationship and the b-scale image of the given image to be segmented. The evaluation results on a set of 20 routine clinical abdominal female and male CT data sets indicate the following: (1) Incorporating a large number of objects improves the recognition accuracy dramatically. (2) The recognition algorithm can be thought as a hierarchical framework such that quick replacement of the model assembly is defined as coarse recognition and delineation itself is known as finest recognition. (3) Scale yields useful information about the relationship between the model assembly and any given image such that the recognition results in a placement of the model close to the actual pose without doing any elaborate searches or optimization. (4) Effective object recognition can make delineation most accurate.
There are a large number of methods for solving under-determined linear inverse problem. Many of them have very high time complexity for large datasets. We propose a new method called Two-Stage Sparse Representation (TSSR) to tackle this problem. We decompose the representing space of signals into two parts, the measurement dictionary and the sparsifying basis. The dictionary is designed to approximate a sub-Gaussian distribution to exploit its concentration property. We apply sparse coding to the signals on the dictionary in the first stage, and obtain the training and testing coefficients respectively. Then we design the basis to approach an identity matrix in the second stage, to acquire the Restricted Isometry Property (RIP) and universality property. The testing coefficients are encoded over the basis and the final representing coefficients are obtained. We verify that the projection of testing coefficients onto the basis is a good approximation of the signal onto the representing space. Since the projection is conducted on a much sparser space, the runtime is greatly reduced. For concrete realization, we provide an instance for the proposed TSSR. Experiments on four biometrics databases show that TSSR is effective and efficient, comparing with several classical methods for solving linear inverse problem.
The main focus of this paper is document image classification and retrieval, where we analyze and compare different parameters for the RunLeght Histogram (RL) and Fisher Vector (FV) based image representations. We do an exhaustive experimental study using different document image datasets, including the MARG benchmarks, two datasets built on customer data and the images from the Patent Image Classification task of the Clef-IP 2011. The aim of the study is to give guidelines on how to best choose the parameters such that the same features perform well on different tasks. As an example of such need, we describe the Image-based Patent Retrieval task s of Clef-IP 2011, where we used the same image representation to predict the image type and retrieve relevant patents.
Face recognition performance improves rapidly with the recent deep learning technique developing and underlying large training dataset accumulating. In this paper, we report our observations on how big data impacts the recognition performance. According to these observations, we build our Megvii Face Recognition System, which achieves 99.50% accuracy on the LFW benchmark, outperforming the previous state-of-the-art. Furthermore, we report the performance in a real-world security certification scenario. There still exists a clear gap between machine recognition and human performance. We summarize our experiments and present three challenges lying ahead in recent face recognition. And we indicate several possible solutions towards these challenges. We hope our work will stimulate the community s discussion of the difference between research benchmark and real-world applications.
Within the domain of texture classification, a lot of effort has been spent on local descriptors, leading to many powerful algorithms. However, preprocessing techniques have received much less attention despite their important potential for improving the overall classification performance. We address this question by proposing a novel, simple, yet very powerful biologically-inspired filtering (BF) which simulates the performance of human retina. In the proposed approach, given a texture image, after applying a DoG filter to detect the \"edges\", we first split the filtered image into two \"maps\" alongside the sides of its edges. The feature extraction step is then carried out on the two \"maps\" instead of the input image. Our algorithm has several advantages such as simplicity, robustness to illumination and noise, and discriminative power. Experimental results on three large texture databases show that with an extremely low computational cost, the proposed method improves significantly the performance of many texture classification systems, notably in noisy environments. The source codes of the proposed algorithm can be downloaded from this https URL
This paper proposes a robust ear identification system which is developed by fusing SIFT features of color segmented slice regions of an ear. The proposed ear identification method makes use of Gaussian mixture model (GMM) to build ear model with mixture of Gaussian using vector quantization algorithm and K-L divergence is applied to the GMM framework for recording the color similarity in the specified ranges by comparing color similarity between a pair of reference ear and probe ear. SIFT features are then detected and extracted from each color slice region as a part of invariant feature extraction. The extracted keypoints are then fused separately by the two fusion approaches, namely concatenation and the Dempster-Shafer theory. Finally, the fusion approaches generate two independent augmented feature vectors which are used for identification of individuals separately. The proposed identification technique is tested on IIT Kanpur ear database of 400 individuals and is found to achieve 98.25% accuracy for identification while top 5 matched criteria is set for each subject.
We treat an image restoration problem with a Poisson noise chan- nel using a Bayesian framework. The Poisson randomness might be appeared in observation of low contrast object in the field of imaging. The noise observation is often hard to treat in a theo- retical analysis. In our formulation, we interpret the observation through the Poisson noise channel as a likelihood, and evaluate the bound of it with a Gaussian function using a latent variable method. We then introduce a Gaussian Markov random field (GMRF) as the prior for the Bayesian approach, and derive the posterior as a Gaussian distribution. The latent parameters in the likelihood and the hyperparameter in the GMRF prior could be treated as hid- den parameters, so that, we propose an algorithm to infer them in the expectation maximization (EM) framework using loopy belief propagation(LBP). We confirm the ability of our algorithm in the computer simulation, and compare it with the results of other im- age restoration frameworks.
In this article we develop an image based rendering technique based on light field reconstruction from a limited set of perspective views acquired by cameras. Our approach utilizes sparse representation of epipolar-plane images in a directionally sensitive transform domain, obtained by an adapted discrete shearlet transform. The used iterative thresholding algorithm provides high-quality reconstruction results for relatively big disparities between neighboring views. The generated densely sampled light field of a given 3D scene is thus suitable for all applications which requires light field reconstruction. The proposed algorithm is compared favorably against state of the art depth image based rendering techniques.
Tumor segmentation from magnetic resonance imaging (MRI) data is an important but time consuming manual task performed by medical experts. Automating this process is a challenging task because of the high diversity in the appearance of tumor tissues among different patients and in many cases similarity with the normal tissues. MRI is an advanced medical imaging technique providing rich information about the human soft-tissue anatomy. There are different brain tumor detection and segmentation methods to detect and segment a brain tumor from MRI images. These detection and segmentation approaches are reviewed with an importance placed on enlightening the advantages and drawbacks of these methods for brain tumor detection and segmentation. The use of MRI image detection and segmentation in different procedures are also described. Here a brief review of different segmentation for detection of brain tumor from MRI of brain has been discussed.
This paper presents a novel approach for weakly-supervised action localization, i.e., that does not require per-frame spatial annotations for training. We first introduce an effective method for extracting human tubes by combining a state-of-the-art human detector with a tracking-by-detection approach. Our tube extraction leverages the large amount of annotated humans available today and outperforms the state of the art by an order of magnitude: with less than 5 tubes per video, we obtain a recall of 95% on the UCF-Sports and J-HMDB datasets. Given these human tubes, we perform weakly-supervised selection based on multi-fold Multiple Instance Learning (MIL) with improved dense trajectories and achieve excellent results. We obtain a mAP of 84% on UCF-Sports, 54% on J-HMDB and 45% on UCF-101, which outperforms the state of the art for weakly-supervised action localization and is close to the performance of the best fully-supervised approaches. The second contribution of this paper is a new realistic dataset for action localization, named DALY (Daily Action Localization in YouTube). It contains high quality temporal and spatial annotations for 10 actions in 31 hours of videos (3.3M frames), which is an order of magnitude larger than standard action localization datasets. On the DALY dataset, our tubes have a spatial recall of 82%, but the detection task is extremely challenging, we obtain 10.8% mAP.
The goal of this paper is the development of a novel approach for the problem of Noise Removal, based on the theory of Reproducing Kernels Hilbert Spaces (RKHS). The problem is cast as an optimization task in a RKHS, by taking advantage of the celebrated semiparametric Representer Theorem. Examples verify that in the presence of gaussian noise the proposed method performs relatively well compared to wavelet based technics and outperforms them significantly in the presence of impulse or mixed noise. A more detailed version of this work has been published in the IEEE Trans. Im. Proc. : P. Bouboulis, K. Slavakis and S. Theodoridis, Adaptive Kernel-based Image Denoising employing Semi-Parametric Regularization, IEEE Transactions on Image Processing, vol 19(6), 2010, 1465 - 1479.
In this paper, we focus on how to locate the relevant or discriminative brain regions related with external stimulus or certain mental decease, which is also called support identification, based on the neuroimaging data. The main difficulty lies in the extremely high dimensional voxel space and relatively few training samples, easily resulting in an unstable brain region discovery (or called feature selection in context of pattern recognition). When the training samples are from different centers and have betweencenter variations, it will be even harder to obtain a reliable and consistent result. Corresponding, we revisit our recently proposed algorithm based on stability selection and structural sparsity. It is applied to the multi-center MRI data analysis for the first time. A consistent and stable result is achieved across different centers despite the between-center data variation while many other state-of-the-art methods such as two sample t-test fail. Moreover, we have empirically showed that the performance of this algorithm is robust and insensitive to several of its key parameters. In addition, the support identification results on both functional MRI and structural MRI are interpretable and can be the potential biomarkers.
A framework for adaptive and non-adaptive statistical compressive sensing is developed, where a statistical model replaces the standard sparsity model of classical compressive sensing. We propose within this framework optimal task-specific sensing protocols specifically and jointly designed for classification and reconstruction. A two-step adaptive sensing paradigm is developed, where online sensing is applied to detect the signal class in the first step, followed by a reconstruction step adapted to the detected class and the observed samples. The approach is based on information theory, here tailored for Gaussian mixture models (GMMs), where an information-theoretic objective relationship between the sensed signals and a representation of the specific task of interest is maximized. Experimental results using synthetic signals, Landsat satellite attributes, and natural images of different sizes and with different noise levels show the improvements achieved using the proposed framework when compared to more standard sensing protocols. The underlying formulation can be applied beyond GMMs, at the price of higher mathematical and computational complexity.
Perception research provides strong evidence in favor of part based representation of shapes in human visual system. Despite considerable differences among different theories in terms of how part boundaries are found, there is substantial agreement on that the process depends on many local and global geometric factors. This poses an important challenge from the computational point of view. In the first part of the chapter, I present a novel decomposition method by taking both local and global interactions within the shape domain into account. At the top of the partitioning hierarchy, the shape gets split into two parts capturing, respectively, the gross structure and the peripheral structure. The gross structure may be conceived as the least deformable part of the shape which remains stable under visual transformations. The peripheral structure includes limbs, protrusions, and boundary texture. Such a separation is in accord with the behavior of the artists who start with a gross shape and enrich it with details. The method is particularly interesting from the computational point of view as it does not resort to any geometric notions (e.g. curvature, convexity) explicitly. In the second part of the chapter, I relate the new method to PDE based shape representation schemes.
The appearance and structure of blood vessels in retinal images have an important role in diagnosis of diseases. This paper proposes a method for automatic retinal vessel segmentation. In this work, a novel preprocessing based on local histogram equalization is used to enhance the original image then pixels are classified as vessel and non-vessel using a classifier. For this classification, special feature vectors are organized based on responses to Morlet wavelet. Morlet wavelet is a continues transform which has the ability to filter existing noises after preprocessing. Bayesian classifier is used and Gaussian mixture model (GMM) is its likelihood function. The probability distributions are approximated according to training set of manual that has been segmented by a specialist. After this, morphological transforms are used in different directions to make the existing discontinuities uniform on the DRIVE database, it achieves the accuracy about 0.9571 which shows that it is an accurate method among the available ones for retinal vessel segmentation.
Commonly used human motion capture systems require intrusive attachment of markers that are visually tracked with multiple cameras. In this work we present an efficient and inexpensive solution to markerless motion capture using only a few Kinect sensors. Unlike the previous work on 3d pose estimation using a single depth camera, we relax constraints on the camera location and do not assume a co-operative user. We apply recent image segmentation techniques to depth images and use curriculum learning to train our system on purely synthetic data. Our method accurately localizes body parts without requiring an explicit shape model. The body joint locations are then recovered by combining evidence from multiple views in real-time. We also introduce a dataset of ~6 million synthetic depth frames for pose estimation from multiple cameras and exceed state-of-the-art results on the Berkeley MHAD dataset.
The aim of the paper is to separate handwritten and printed text from a real document embedded with noise, graphics including annotations. Relying on run-length smoothing algorithm (RLSA), the extracted pseudo-lines and pseudo-words are used as basic blocks for classification. To handle this, a multi-class support vector machine (SVM) with Gaussian kernel performs a first labelling of each pseudo-word including the study of local neighbourhood. It then propagates the context between neighbours so that we can correct possible labelling errors. Considering running time complexity issue, we propose linear complexity methods where we use k-NN with constraint. When using a kd-tree, it is almost linearly proportional to the number of pseudo-words. The performance of our system is close to 90%, even when very small learning dataset where samples are basically composed of complex administrative documents.
This manuscript is about further elucidating the concept of noising. The concept of noising first appeared in \\cite{CVPR14}, in the context of curvature estimation and vertex localization on planar shapes. There are indications that noising can play for global methods the role smoothing plays for local methods in this task. This manuscript is about investigating this claim by introducing incremental noising, in a recursive deterministic manner, analogous to how smoothing is extended to progressive smoothing in similar tasks. As investigating the properties and behavior of incremental noising is the purpose of this manuscript, a surprising connection between incremental noising and progressive smoothing is revealed by the experiments. To explain this phenomenon, the fractal and the space filling properties of the two methods respectively, are considered in a unifying context.
Dimensionality reduction (DR) methods have been commonly used as a principled way to understand the high-dimensional data such as facial images. In this paper, we propose a new supervised DR method called Optimized Projection for Sparse Representation based Classification (OP-SRC), which is based on the recent face recognition method, Sparse Representation based Classification (SRC). SRC seeks a sparse linear combination on all the training data for a given query image, and make the decision by the minimal reconstruction residual. OP-SRC is designed on the decision rule of SRC, it aims to reduce the within-class reconstruction residual and simultaneously increase the between-class reconstruction residual on the training data. The projections are optimized and match well with the mechanism of SRC. Therefore, SRC performs well in the OP-SRC transformed space. The feasibility and effectiveness of the proposed method is verified on the Yale, ORL and UMIST databases with promising results.
Learning the spatial-temporal representation of motion information is crucial to human action recognition. Nevertheless, most of the existing features or descriptors cannot capture motion information effectively, especially for long-term motion. To address this problem, this paper proposes a long-term motion descriptor called sequential Deep Trajectory Descriptor (sDTD). Specifically, we project dense trajectories into two-dimensional planes, and subsequently a CNN-RNN network is employed to learn an effective representation for long-term motion. Unlike the popular two-stream ConvNets, the sDTD stream is introduced into a three-stream framework so as to identify actions from a video sequence. Consequently, this three-stream framework can simultaneously capture static spatial features, short-term motion and long-term motion in that video. Extensive experiments were conducted on three challenging datasets: KTH, HMDB51 and UCF101. Experimental results show that our method achieves state-of-the-art performance on the KTH and UCF101 datasets, and is comparable to the state-of-the-art methods on the HMDB51 dataset.
Gabor filters play an important role in many application areas for the enhancement of various types of images and the extraction of Gabor features. For the purpose of enhancing curved structures in noisy images, we introduce curved Gabor filters which locally adapt their shape to the direction of flow. These curved Gabor filters enable the choice of filter parameters which increase the smoothing power without creating artifacts in the enhanced image. In this paper, curved Gabor filters are applied to the curved ridge and valley structure of low-quality fingerprint images. First, we combine two orientation field estimation methods in order to obtain a more robust estimation for very noisy images. Next, curved regions are constructed by following the respective local orientation and they are used for estimating the local ridge frequency. Lastly, curved Gabor filters are defined based on curved regions and they are applied for the enhancement of low-quality fingerprint images. Experimental results on the FVC2004 databases show improvements of this approach in comparison to state-of-the-art enhancement methods.
Human face recognition is, indeed, a challenging task, especially under the illumination and pose variations. We examine in the present paper effectiveness of two simple algorithms using coiflet packet and Radon transforms to recognize human faces from some databases of still gray level images, under the environment of illumination and pose variations. Both the algorithms convert 2-D gray level training face images into their respective depth maps or physical shape which are subsequently transformed by Coiflet packet and Radon transforms to compute energy for feature extraction. Experiments show that such transformed shape features are robust to illumination and pose variations. With the features extracted, training classes are optimally separated through linear discriminant analysis (LDA), while classification for test face images is made through a k-NN classifier, based on L1 norm and Mahalanobis distance measures. Proposed algorithms are then tested on face images that differ in illumination,expression or pose separately, obtained from three databases,namely, ORL, Yale and Essex-Grimace databases. Results, so obtained, are compared with two different existing algorithms.Performance using Daubechies wavelets is also examined. It is seen that the proposed Coiflet packet and Radon transform based algorithms have significant performance, especially under different illumination conditions and pose variation. Comparison shows the proposed algorithms are superior.
Current top performing object detectors employ detection proposals to guide the search for objects, thereby avoiding exhaustive sliding window search across images. Despite the popularity and widespread use of detection proposals, it is unclear which trade-offs are made when using them during object detection. We provide an in-depth analysis of twelve proposal methods along with four baselines regarding proposal repeatability, ground truth annotation recall on PASCAL, ImageNet, and MS COCO, and their impact on DPM, R-CNN, and Fast R-CNN detection performance. Our analysis shows that for object detection improving proposal localisation accuracy is as important as improving recall. We introduce a novel metric, the average recall (AR), which rewards both high recall and good localisation and correlates surprisingly well with detection performance. Our findings show common strengths and weaknesses of existing methods, and provide insights and metrics for selecting and tuning proposal methods.
Principle Component Analysis PCA is a classical feature extraction and data representation technique widely used in pattern recognition. It is one of the most successful techniques in face recognition. But it has drawback of high computational especially for big size database. This paper conducts a study to optimize the time complexity of PCA (eigenfaces) that does not affects the recognition performance. The authors minimize the participated eigenvectors which consequently decreases the computational time. A comparison is done to compare the differences between the recognition time in the original algorithm and in the enhanced algorithm. The performance of the original and the enhanced proposed algorithm is tested on face94 face database. Experimental results show that the recognition time is reduced by 35% by applying our proposed enhanced algorithm. DET Curves are used to illustrate the experimental results.
Deep neural networks usually benefit from unsupervised pre-training, e.g. auto-encoders. However, the classifier further needs supervised fine-tuning methods for good discrimination. Besides, due to the limits of full-connection, the application of auto-encoders is usually limited to small, well aligned images. In this paper, we incorporate the supervised information to propose a novel formulation, namely class-encoder, whose training objective is to reconstruct a sample from another one of which the labels are identical. Class-encoder aims to minimize the intra-class variations in the feature space, and to learn a good discriminative manifolds on a class scale. We impose the class-encoder as a constraint into the softmax for better supervised training, and extend the reconstruction on feature-level to tackle the parameter size issue and translation issue. The experiments show that the class-encoder helps to improve the performance on benchmarks of classification and face recognition. This could also be a promising direction for fast training of face recognition models.
Spectral unmixing is an important tool in hyperspectral data analysis for estimating endmembers and abundance fractions in a mixed pixel. This paper examines the applicability of a recently developed algorithm called graph regularized nonnegative matrix factorization (GNMF) for this aim. The proposed approach exploits the intrinsic geometrical structure of the data besides considering positivity and full additivity constraints. Simulated data based on the measured spectral signatures, is used for evaluating the proposed algorithm. Results in terms of abundance angle distance (AAD) and spectral angle distance (SAD) show that this method can effectively unmix hyperspectral data.
In this article, we tackle the problem of depth estimation from single monocular images. Compared with depth estimation using multiple images such as stereo depth perception, depth from monocular images is much more challenging. Prior work typically focuses on exploiting geometric priors or additional sources of information, most using hand-crafted features. Recently, there is mounting evidence that features from deep convolutional neural networks (CNN) set new records for various vision applications. On the other hand, considering the continuous characteristic of the depth values, depth estimations can be naturally formulated as a continuous conditional random field (CRF) learning problem. Therefore, here we present a deep convolutional neural field model for estimating depths from single monocular images, aiming to jointly explore the capacity of deep CNN and continuous CRF. In particular, we propose a deep structured learning scheme which learns the unary and pairwise potentials of continuous CRF in a unified deep CNN framework. We then further propose an equally effective model based on fully convolutional networks and a novel superpixel pooling method, which is $\\sim 10$ times faster, to speedup the patch-wise convolutions in the deep model. With this more efficient model, we are able to design deeper networks to pursue better performance. Experiments on both indoor and outdoor scene datasets demonstrate that the proposed method outperforms state-of-the-art depth estimation approaches.
The paper concentrates on improvement of segmentation accuracy by addressing some of the key challenges of handwritten Devanagari word image segmentation technique. In the present work, we have developed a new feature based approach for identification of Matra pixels from a word image, design of a non-linear fuzzy membership functions for headline estimation and finally design of a non-linear fuzzy functions for identifying segmentation points on the Matra. The segmentation accuracy achieved by the current technique is 94.8%. This shows an improvement of performance by 1.8% over the previous technique [1] on a 300-word dataset, used for the current experiment.
We present in this paper a $C^1$-metric on an open neighbourhood of the origin in $\\RR^{5}$. The metric is of Lorentzian signature $(1,4)$ and admits a solution to the twistor equation for spinors with a unique isolated zero at the origin. The metric is not conformally flat in any neighbourhood of the origin. The construction is based on the Eguchi-Hanson metric with parallel spinors on Riemannian 4-space.
We study the conditions under which an almost Hermitian structure $(G,J)$ of general natural lift type on the cotangent bundle $T^*M$ of a Riemannian manifold $(M,g)$ is K\\\" ahlerian. First, we obtain the algebraic conditions under which the manifold $(T^*M,G,J)$ is almost Hermitian. Next we get the integrability conditions for the almost complex structure $J$, then the conditions under which the associated 2-form is closed. The manifold $(T^*M,G,J)$ is K\\\" ahlerian iff it is almost Kahlerian and the almost complex structure $J$ is integrable. It follows that the family of Kahlerian structures of above type on $T^*M$ depends on three essential parameters (one is a certain proportionality factor, the other two are parameters involved in the definition of $J$).
The holonomy group of an (n+2)-dimensional simply-connected, indecomposable but non-irreducible Lorentzian manifold (M,h) is contained in the parabolic group $(\\mathbb{R} \\times SO(n))\\ltimes \\mathbb{R}^n$. The main ingredient of such a holonomy group is the SO(n)--projection $G:=pr_{SO(n)}(Hol_p(M,h))$ and one may ask whether it has to be a Riemannian holonomy group. In this paper we show that this is always the case, completing our results of the first part math.DG/0305139. We draw consequences for the existence of parallel spinors on Lorentzian manifolds.
We investigate the minimal and isoperimetric surface problems in a large class of sub-Riemannian manifolds, the so-called Vertically Rigid spaces. We construct an adapted connection for such spaces and, using the variational tools of Bryant, Griffiths and Grossman, derive succinct forms of the Euler-Lagrange equations for critical points for the associated variational problems. Using the Euler-Lagrange equations, we show that minimal and isoperimetric surfaces satisfy a constant horizontal mean curvature conditions away from characteristic points. Moreover, we use the formalism to construct a horizontal second fundamental form, $II_0$, for vertically rigid spaces and, as a first application, use $II_0$ to show that minimal surfaces cannot have points of horizontal positive curvature and, that minimal surfaces in Carnot groups cannot be locally horizontally geometrically convex. We note that the convexity condition is distinct from others currently in the literature.
We give the first rigorous construction of complete, embedded self-shrinking hypersurfaces under mean curvature flow, since Angenent s torus in 1989. The surfaces exist for any sufficiently large prescribed genus $g$, and are non-compact with one end. Each has $4g+4$ symmetries and comes from desingularizing the intersection of the plane and sphere through a great circle, a configuration with very high symmetry. Each is at infinity asymptotic to the cone in $\\mathbb{R}^3$ over a $2\\pi/(g+1)$-periodic graph on an equator of the unit sphere $\\mathbb{S}^2\\subseteq\\mathbb{R}^3$, with the shape of a periodically \"wobbling sheet\". This is a dramatic instability phenomenon, with changes of asymptotics that break much more symmetry than seen in minimal surface constructions. The core of the proof is a detailed understanding of the linearized problem in a setting with severely unbounded geometry, leading to special PDEs of Ornstein-Uhlenbeck type with fast growth on coefficients of the gradient terms. This involves identifying new, adequate weighted H\\\"older spaces of asymptotically conical functions in which the operators invert, via a Liouville-type result with precise asymptotics.
Our principal goal is to study the Prescribed Curvature Tensor problem in locally conformally flat manifolds. The solution to this problem is given explicitly for the special cases of the tensor R, including a case where the metric g is complete on Rn. Similar problems are considered for locally conformally flat manifolds. As applications of these results we exhibit explicit examples of metrics g, conformal to g they are solutions for this problem.
A Riemann-Cartan manifold is a Riemannian manifold endowed with an affine connection which is compatible with the metric tensor. This affine connection is not necessarily torsion free. Under the assumption that the manifold is a homogeneous space, the notion of homogeneous Riemann-Cartan space is introduced in a natural way. For the case of the odd dimensional spheres $\\mathbb{S}^{2n+1}$ viewed as homogeneous spaces of the special unitary groups, the classical Nomizu s Theorem on invariant connections has permitted to obtain an algebraical description of all the connections which turn the spheres $\\mathbb{S}^{2n+1}$ into homogeneous Riemann-Cartan spaces. The expressions of such connections as covariant derivatives are given by means of several invariant tensors: the ones of the usual Sasakian structure of the sphere; an invariant 3-differential form coming from a $3$-Sasakian structure on $\\mathbb{S}^7$; and the involved ones in the almost contact metric structure of $\\mathbb{S}^5$ provided by its natural embedding into the nearly K\\\"ahler manifold $\\mathbb{S}^6$. Furthermore, the invariant connections sharing geodesics with the Levi-Civita one have also been completely described. Finally, $\\mathbb{S}^3$ and $\\mathbb{S}^7$ are characterized as the unique odd-dimensional spheres which admit nontrivial invariant connections satisfying an Einstein-type equation.
We define Dorfman connections, which are to Courant algebroids what connections are to Lie algebroids. Several examples illustrate this analogy. A linear connection $\\nabla\\colon \\mathfrak{X}(M)\\times\\Gamma(E)\\to\\Gamma(E)$ on a vector bundle $E$ over a smooth manifold $M$ is tantamount to a linear splitting $TE\\simeq T^{q_E}E\\oplus H_\\nabla$, where $T^{q_E}E$ is the set of vectors tangent to the fibres of $E$. Furthermore, the curvature of the connection measures the failure of the horizontal space $H_\\nabla$ to be integrable. We show that linear horizontal complements to $T^{q_E}E\\oplus (T^{q_E}E)^\\circ$ in the Pontryagin bundle over the vector bundle $E$ can be described in the same manner via a certain class of Dorfman connections $\\Delta\\colon \\Gamma(TM\\oplus E^*)\\times\\Gamma(E\\oplus T^*M)\\to\\Gamma(E\\oplus T^*M)$. Similarly to the tangent bundle case, we find that, after the choice of a linear splitting, the standard Courant algebroid structure of $TE\\oplus T^*E\\to E$ can be completely described by properties of the Dorfman connection. As an application, we study splittings of $TA\\oplus T^*A$ over a Lie algebroid $A$ and, following Gracia-Saz and Mehta, we compute the representations up to homotopy defined by any linear splitting of $TA\\oplus T^*A$ and the linear Lie algebroid $TA\\oplus T^*A\\to TM\\oplus A^*$. Further, we characterise VB- and LA-Dirac structures in $TA\\oplus T^*A$ via Dorfman connections.
We produce longtime solutions to the K\\\"ahler-Ricci flow for complete K\\\"ahler metrics on $\\Bbb C ^n$ without assuming the initial metric has bounded curvature, thus extending results in [3]. We prove the existence of a longtime bounded curvature solution emerging from any complete $U(n)$-invariant K\\\"ahler metric with non-negative holomorphic bisectional curvature, and that the solution converges as $t\\to \\infty$ to the standard Euclidean metric after rescaling. We also prove longtime existence results for more general K\\\"ahler metrics on $\\Bbb C ^n$ which are not necessarily $U(n)$-invariant.
A result of Jost and Zuo is used to show that for a large class of finite-dimensional hyperk\\\"ahler quotients, the only L2 harmonic forms lie in the middle dimension, and are of type (k,k) with respect to all complex structures. The argument is extended to some moduli spaces which appear as infinite-dimensional quotients such as Higgs bundle and SU(2) monopole moduli spaces. In the latter case we recover some of the S-duality predictions of Sen.
We investigate the structure of a Finsler manifold of nonnegative weighted Ricci curvature including a straight line, and extend the classical Cheeger-Gromoll-Lichnerowicz splitting theorem. Such a space admits a diffeomorphic, measure-preserving splitting in general. As for a special class of Berwald spaces, we can perform the isometric splitting in the sense that there is a one-parameter family of isometries generated from the gradient vector field of the Busemann function. A Betti number estimate is also given for Berwald spaces.
Let F_0=B,...,F_n be a sequence of differentiable manifolds, G_i a Lie subgroup of diffeomorphisms of F_i, and H_i a subgroup of G_i central in G_i. We suppose also given a locally trivial bundle p_{K_i} over F_{i-1} which typical fiber is K_i the quotient of G_i by H_i. The aim of this paper is to study the differential geometry of the following problem: classify sequences M_n\\to...M_1, where each map from M_i to M_{i-1} is a locally trivial fibration which typical fiber is F_i and which transition functions image are elements of G_i. We associate to this problem a tower of gerbes and define for it the notion of connective structure, curvature and holonomy using the notion of free transitive distribution (free TD)
We give a presentation for the Floer cohomology ring $HF^*(\\Sigma \\times S^1)$, where $\\Sigma$ is a Riemann surface of genus bigger than one, which coincides with the conjectural presentation for the quantum cohomology ring of the moduli space of flat SO(3)-connections of odd degree over $\\Sigma$. We study the spectrum of the action of the homology of $\\Sigma$ on the Floer cohomology and prove a physical assumption made by Vafa et al.
Let $M$ be an odd-dimensional Euclidean space endowed with a contact 1-form $\\alpha$. We investigate the space of symmetric contravariant tensor fields on $M$ as a module over the Lie algebra of contact vector fields, i.e. over the Lie subalgebra made up by those vector fields that preserve the contact structure. If we consider symmetric tensor fields with coefficients in tensor densities, the vertical cotangent lift of contact form $\\alpha$ is a contact invariant operator. We also extend the classical contact Hamiltonian to the space of symmetric density valued tensor fields. This generalized Hamiltonian operator on the symbol space is invariant with respect to the action of the projective contact algebra $sp(2n+2)$. The preceding invariant operators lead to a decomposition of the symbol space (expect for some critical density weights), which generalizes a splitting proposed by V. Ovsienko.
In this work, we study a class of rotational surfaces in the pseudo-Euclidean space $\\mathbb{E}_2^4$ whose profile curves lie in two-dimensional planes. We solve the differential equation that characterizes the rotational surfaces with zero mean curvature to determine the profile curves of such rotational surfaces. Then, we give some explicit parametrization of maximal rotational surfaces and the timelike surfaces with zero mean curvature in $\\mathbb{E}_2^4$.
We study Cheeger-Simons differential characters and provide geometric descriptions of the ring structure and of the fiber integration map. The uniqueness of differential cohomology (up to unique natural transformation) is proved by deriving an explicit formula for any natural transformation between a differential cohomology theory and the model given by differential characters. Fiber integration for fibers with boundary is treated in the context of relative differential characters. As applications we treat higher-dimensional holonomy, parallel transport, and transgression.
We consider some natural infinitesimal Einstein deformations on Sasakian and 3-Sasakian manifolds. Some of these are infinitesimal deformations of Killing spinors and further some integrate to actual Killing spinor deformations. In particular, on 3-Sasakian 7 manifolds these yield infinitesimal Einstein deformations preserving 2, 1, or none of the 3 independent Killing spinors. Toric 3-Sasakian manifolds provide non-trivial examples with integrable deformation preserving precisely 2 Killing spinors. Thus the dimension of Killing spinors is not preserved under Einstein deformations but is only upper semi-continuous.
We consider the basic heat operator on functions on a Riemannian foliation of a compact, Riemannian manifold, and we show that the trace of this operator has a particular short time asymptotic expansion. The coefficients in this expansion are obtainable from local transverse geometric invariants - functions computable by analyzing the manifold in an arbitrarily small neighborhood of a leaf closure. Using this expansion, we prove some results about the spectrum of the basic Laplacian, such as the analogue of Weyl s asymptotic formula. Also, we explicitly calculate the first two nontrivial coefficients of the expansion for special cases such as codimension two foliations and foliations with regular closure.
We consider an instanton,$\\textbf{A}$,with $L^{2}$-curvature $F_{\\textbf{A}}$ on the cylindrical manifold $Z=\\mathbf{R}\\times M$,where $M$ is a closed Riemannian $n$-manifold, $n\\geq 4$.We assume $M$ admits a $3$-form $P$ and a $4$-form $Q$ satisfy $dP=4Q$ and $d\\ast{Q}=(n-3)\\ast P$.Manifolds with these forms include nearly K\\\"{a}hler 6-manifolds and nearly parallel $G_{2}$-manifolds in dimension 7.Then we can prove that the instanton must be a flat connection.
We consider the orthonormal frame bundle F(M) of a Riemannian manifold M. A construction of Sasaki defines a canonical Riemannian metric on F(M). We prove that for two closed Riemannian n-manifolds M and N, the frame bundles F(M) and F(N) are isometric if and only if M and N are isometric, except possibly in dimensions 3, 4, and 8. This answers a question of Benson Farb except in dimensions 3, 4, and 8.
The problem of pursuing a moving target is always one of the main topics in navigation. In the literatures, there are two well-known algorithms called Pure Pursuit and Pure Rendezvous navigation in the 3-dimensional space $\\mathbb{R}^3$. In this paper, these two methods are combined to introduce a novel family of pursuing algorithms called Composed Pursuit Navigation. The Kinematic and geometric properties of this navigation is studied. The trajectories of this new family of algorithms benefit the advantages of two known methods and its prominence is demonstrated in two real examples. Moreover, it is shown that the metric related to the algorithms are given by Matsumoto metrics.
In this paper we study a homological version of the higher-dimensional divergence invariants defined by Brady and Farb. We show that they are quasi-isometry invariants in the class of proper cocompact Hadamard spaces in the sense of Alexandrov and that they can moreover be used to detect the Euclidean rank of such spaces. We thereby extend results of Brady-Farb, Leuzinger, and Hindawi from the setting of symmetric spaces of non-compact type to that of singular Hadamard spaces. Finally, we exhibit the optimal power for the growth of the divergence above the rank for symmetric spaces of non-compact type and for Hadamard spaces with strictly negative upper curvature bound.
The detailed analysis of the generalised Weierstrass representation of surfaces of revolution and their deformations induced by the modified Korteweg--de Vries (mKdV) equations is done. In particular, it is shown that these deformations preserve tori. The geometric meaning of the potential of surface is discussed and the deformations of potentials induced by geometric deformations (the Moebius inversion and a passing to a dual surface) are described. The conjecture of invariance of first integrals of the mKdV hierarchy, considering as invariants of surfaces, with respect to confomal changes of the metric of the ambient space is introduced. Some numeric computations confirming it are also presented. This paper is the sequel to the previous author s paper \"Modified Novikov-Veselov equation and differential geometry of surfaces\" (dg-ga/9511005) where generic surfaces are considered. Here the surfaces of revolution are regarded as a toy model for the general case.
In this paper we consider the polyharmonic heat flow of a closed curve in the plane. Our main result is that closed initial data with initially small normalised oscillation of curvature and isoperimetric defect flows exponentially fast in the C^infty-topology to a simple circle. Our results yield a characterisation of the total amount of time during which the flow is not strictly convex, quantifying in a sense the failure of the maximum principle.
This survey article is about discrete constant mean curvature surfaces defined by an approach related to integrable systems techniques. We introduce the notion of discrete constant mean curvature surfaces by first introducing properties of smooth constant mean curvature surfaces. We describe the mathematical structure of the smooth surfaces using conserved quantities, which can be converted into a discrete theory in a natural way.
This paper is motivated by a relatively recent work by Joyce in special Lagrangian geometry, but the basic idea of the present paper goes back to an earlier pioneering work of Donaldson in Yang--Mills gauge theory; Donaldson discovered a global structure of a (compactified) moduli space of Yang--Mills instantons, and a key step to that result was the proof of surjectivity of Taubes  gluing construction. In special Lagrangian geometry we have currently no such a global understanding of (compactified) moduli spaces, but in the present paper we determine a neighbourhood of a `boundary  point. It is locally similar to Donaldson s result, and in particular as Donaldson s result implies the surjectivity of Taubes  gluing construction so our result implies the surjectivity of Joyce s gluing construction in a certain simple case.
We study the behaviour of analytic torsion under smooth fibrations. Namely, let F \\to E \\to^{f} B be a smooth fiber bundle of connected closed oriented smooth manifolds and let $V$ be a flat vector bundle over $E$. Assume that $E$ and $B$ come with Riemannian metrics and $V$ comes with a unimodular (not necessarily flat) Riemannian metric. Let $\\rho_{an}(E;V)$ be the analytic torsion of $E$ with coefficients in $V$ and let $\\Pf_B$ be the Pfaffian $\\dim(B)$-form. Let $H^q_{dR}(F;V)$ be the flat vector bundle over $B$ whose fiber over $b \\in B$ is $H^q_{dR}(F_b;V)$ with the Riemannian metric which comes from the Hilbert space structure on the space of harmonic forms induced by the Riemannian metrics. Let $\\rho_{an}(B;H^q_{dR}(F;V))$ be the analytic torsion of $B$ with coefficients in this bundle. The Leray-Serre spectral sequence for deRham cohomology determines a certain correction term $\\rho^{Serre}_{dR}(f)$. We prove $\\rho_{an}(E;V) = \\int_B \\rho_{an}(F_b;V) \\cdot \\Pf_B + \\sum_{q} (-1)^q \\cdot \\rho_{an}(B;H^q_{dR}(F;V)) + \\rho^{Serre}_{dR}(f)$.
This paper focuses on curves and surfaces of constant width, with some additional results about general ovals. We emphasize the use of Fourier series to derive properties, some of which are known. Amongst other results, we show that the perimeter of an oval is $\\pi$ times its average width, and provide a bound for the radius of curvature of an oval that depends on the structure of the harmonics in its Fourier series. We prove that the density of a certain packing of Reuleaux curved triangles in the plane is $$\\frac{2 (\\pi - \\sqrt{3})}{\\sqrt{15} + \\sqrt{7} - 2 \\sqrt{3}} \\simeq 0.92288$$ which exceeds the maximum density for circles ($\\simeq 0.9060$), and conjecture this is the maximum for any curve of constant width. For surfaces of constant width we show that $ \\rho_0(P)+ \\rho_1(Q)=w$ where the $\\rho_i$ are the principal curvatures, $P$ and $Q$ are opposite points, and $w>0$ is the width. Moreover, an ovoid is a surface of constant width $w>0$ if and only if $\\rho_{{\\rm mean}}(P)+\\rho_{{\\rm mean}}(Q) = w$ where $\\rho_{{\\rm mean}}(P)$ is the average radius of curvature at point $P$. Finally, we provide a Fourier series-based construction that produces arbitrarily many new surfaces of constant width.
In 1990, Hitchin s proved a component of the space of representations of a surface group in SL(n,R) is homeomorphic to a ball. For n=2,3 this component has been identified with the holonomies of geometric structures (hyperbolic for n=2, or real projective for n=3). In the preprint \"Anosov flows, Surface groups and Curves in Projective Space\", we extend this interpretation to higher dimension and show every representation in Hitchin s component is attached to a (special) curve in projective space, thus giving a geometric interpretation of these representations. We also prove these representations are faithful, discrete and purely loxodromic (or hyperbolic)
We give a bound on the extinction time for a compact, strictly convex hypersurface in R^{n+1} evolving by a geometric flow where the velocity is given in terms of the curvature. This result generalizes a theorem of Colding and Minicozzi for mean curvature flow solutions to a wider class of flows studied by Ben Andrews. In the proof, we use the concept of the width of a hypersurface, introduced by Colding and Minicozzi. We also extend the result to 2-convex hypersurfaces, using the 2-width.
We consider a generalization of Einstein-Sasaki manifolds, which we characterize in terms both of spinors and differential forms, that in the real analytic case corresponds to contact manifolds whose symplectic cone is Calabi-Yau. We construct solvable examples in seven dimensions. Then, we consider circle actions that preserve the structure, and determine conditions for the contact reduction to carry an induced structure of the same type. We apply this construction to obtain a new hypo-contact structure on S^2\\times T^3.
For a compact manifold with boundary $X$ we introduce the $n$-fold scattering stretched product $X^n_{\\text{sc}}$ which is a compact manifold with corners for each $n,$ coinciding with the previously known cases for $n=2,3.$ It is constructed by iterated blow up of boundary faces and boundary faces of multi-diagonals in $X^n.$ The resulting space is shown to map smoothly, by a b-fibration, covering the usual projection, to the lower stretched products. It is anticipated that this manifold with corners, or at least its combinatorial structure, is a universal model for phenomena on asymptotically flat manifolds in which particle clusters emerge at infinity. In particular this is the case for magnetic monopoles on $\\mathbb{R}^3$ in which case these spaces are closely related to compactifications of the moduli spaces with the boundary faces mapping to lower charge idealized moduli spaces.
In this paper we study some problems related to a vertical Liouville distribution (called vertical Liouville-Hamilton distribution) on the cotangent bundle of a Cartan space. We study the existence of some linear connections of Vr\\u{a}nceanu type on Cartan spaces related to some foliated structures. Also, we identify a certain $(n,2n-1)$--codimensional subfoliation $(\\mathcal{F}_V,\\mathcal{F}_{C^*})$ on $T^*M_0$ given by vertical foliation $\\mathcal{F}_V$ and the line foliation $\\mathcal{F}_{C^*}$ spanned by the vertical Liouville-Hamilton vector field $C^*$ and we give a triplet of basic connections adapted to this subfoliation. Finally, using the vertical Liouville foliation $\\mathcal{F}_{V_{C^*}}$ and the natural almost complex structure on $T^*M_0$ we study some aspects concerning the cohomology of $c$--indicatrix cotangent bundle.
The aim of this work is to lay the foundations of differential geometry and Lie theory over the general class of topological base fields and -rings for which a differential calculus has been developed in recent work (collaboration with H. Gloeckner and K.-H. Neeb), without any restriction on the dimension or on the characteristic. Two basic features distinguish our approach from the classical real (finite or infinite dimensional) theory, namely the interpretation of tangent- and jet functors as functors of scalar extensions and the introduction of multilinear bundles and multilinear connections which generalize the concept of vector bundles and linear connections.
We use the natural lifts of the fundamental tensor field g to the cotangent bundle T*M of a Riemannian manifold (M,g), in order to construct an almost Hermitian structure (G,J) of diagonal type on T*M. The obtained almost complex structure J on T*M is integrable if and only if the base manifold has constant sectional curvature and the second coefficient, involved in its definition is expressed as a rational function of the first coefficient and its first order derivative. Next one shows that the obtained almost Hermitian structure is almost Kaehlerian. Combining the obtained results we get a family of Kaehlerian structures on T*M, depending on one essential parameter. Next we study the conditions under which the considered Kaehlerian structure is Einstein. In this case (T*M,G,J) has constant holomorphic curvature.
We study the convergence of an axially symmetric hypersurface evolving by volume preserving mean curvature flow. Assuming the surface is not pinching off along the axis at any time during the flow, and without any additional conditions, as for example on the curvature, we prove that it converges to a hemisphere, when the hypersurface has a free boundary and satisfies Neumann boundary data, and to a sphere when it is compact without boundary.
In this paper we investigate the existence of ``partially   isometric immersions. These are maps f:M->R^q which, for a given Riemannian manifold M, are isometries on some sub-bundle H of TM. The concept of free maps, which is essential in the Nash--Gromov theory of isometric immersions, is replaced here by that of H-free maps, i.e. maps whose restriction to H is free. We prove, under suitable conditions on the dimension q of the Euclidean space, that H-free maps are generic and we provide, for the smallest possible value of q, explicit expressions for H-free maps in the following three settings: 1-dimensional distributions in R^2, Lagrangian distributions of completely integrable systems, Hamiltonian distributions of a particular kind of Poisson Bracket.
We initiate the study of an analogue of the Yamabe problem for complex manifolds. More precisely, fixed a conformal Hermitian structure on a compact complex manifold, we are concerned in the existence of metrics with constant Chern scalar curvature. In this note, we set the problem and we provide a positive answer when the expected constant Chern scalar curvature is non-positive. In particular, this includes the case when the Kodaira dimension of the manifold is non-negative. Finally, we give some remarks on the positive curvature case, showing existence in some special cases and the failure, in general, of uniqueness of the solution.
For $(M,[g])$ a conformal manifold of signature $(p,q)$ and dimension at least three, the conformal holonomy group $\\mathrm{Hol}(M,[g]) \\subset O(p+1,q+1)$ is an invariant induced by the canonical Cartan geometry of $(M,[g])$. We give a description of all possible connected conformal holonomy groups which act transitively on the M\\\"obius sphere $S^{p,q}$, the homogeneous model space for conformal structures of signature $(p,q)$. The main part of this description is a list of all such groups which also act irreducibly on $\\R^{p+1,q+1}$. For the rest, we show that they must be compact and act decomposably on $\\R^{p+1,q+1}$, in particular, by known facts about conformal holonomy the conformal class $[g]$ must contain a metric which is locally isometric to a so-called special Einstein product.
For a hypersurface V of a conformal space, we introduce a conformal differential invariant I = h^2/g, where g and h are the first and the second fundamental forms of V connected by the apolarity condition. This invariant is called the conformal quadratic element of V. The solution of the problem of conformal rigidity is presented in the framework of conformal differential geometry and connected with the conformal quadratic element of V. The main theorem states: Let n \\geq 4 and V and V  be two nonisotropic hypersurfaces without umbilical points in a conformal space C^n or a pseudoconformal space C^n_q of signature (p, q), p = n - q. Suppose that there is a one-to-one correspondence f: V ---> V  between points of these hypersurfaces, and in the corresponding points of V and V  the following condition holds: I  = f_* I, where f_*: T (V) ---> T (V) is a mapping induced by the correspondence f. Then the hypersurfaces V and V  are conformally equivalent.
This paper introduces a geometrically constrained variational problem for the area functional. We consider the area restricted to the langrangian surfaces of a Kaehler surface, or, more generally, a symplectic 4-manifold with suitable metric, and study its critical points and in particular its minimizers. We apply this study to the problem of finding canonical representatives of the lagrangian homology (that part of the homology generated by lagrangian cycles).
First I will explain my motivation to introduce the $\\delta$-invariants for Riemannian manifolds. I will also recall the notions of ideal immersions and best ways of living. Then I will present a few of the many applications of $\\delta$-invariants to several areas in mathematics. Finally, I will present two optimal inequalities involving $\\delta$-invariants for Lagrangian submanifolds obtained very recently in joint papers with F. Dillen, J. Van der Veken and L. Vrancken.
An associated Nijenhuis tensor of endomorphisms in the tangent bundle is introduced. Special attention is paid to such tensors for an almost hypercomplex structure and the metric of Hermitian-Norden type. There are studied relations between the six associated Nijenhuis tensors as well as their vanishing. It is given a geometric interpretation of the vanishing of these tensors as a necessary and sufficient condition for the existence of a unique connection with totally skew-symmetric torsion tensor. Similar idea is used in the paper of T. Friedrich and S. Ivanov in Asian J. Math. (2002) for some other structures. Finally, an example of a 4-dimensional manifold of the considered type with vanishing associated Nijenhuis tensors is given.
We present an explicit description of all harmonic maps of finite uniton number from a Riemann surface into a complex Grassmannian. Namely, starting from a constant map $Q$ and a collection of meromorphic functions and their derivatives, we show how to algebraically construct all harmonic maps from the two-sphere into a given Grassmannian $G_p(\\mathbb C^n)$. In this setting the uniton number depends on $Q$ and $p$ and we obtain a sharp estimate for it.
We propose the Legendrian web in a contact three manifold as a second order generalization of the planar web. An Abelian relation for a Legendrian web is analogously defined as an additive equation among the first integrals of its foliations. For a class of Legendrian $, d$-webs defined by simple second order ODE s, we give an algebraic construction of $$ \\rho_d = \\frac{(d-1)(d-2)(2d+3)}{6}$$ linearly independent Abelian relations. We then employ the method of local differential analysis and the theory of linear differential systems to show that $, \\rho_d$ is the maximum rank of a Legendrian $, d$-web. In the complex analytic category, we give a possible projective geometric interpretation of $\\rho_d$ as an analogue of Castelnuovo bound for degree 2d surfaces in the 3-quadric $\\mathbb{Q}^3\\subset\\mathbb{P}^4$ via the duality between $\\mathbb{P}^3$ and $\\mathbb{Q}^3$ associated with the rank two complex simple Lie group Sp$(2,\\mathbb{C})$. The Legendrian 3-webs of maximum rank three are analytically characterized, and their explicit local normal forms are found. For an application, we give an alternative characterization of a Darboux super-integrable metric as a two dimensional Riemannian metric $,g_+$ which admits a mate metric $, g_-$ such that a Legendrian 3-web naturally associated with the geodesic foliations of the pair $, g_{\\pm}$ has maximum rank.
Applying the DPW version of the theory developed by Burstall and Guest for harmonic maps of finite uniton type, we derive a coarse classification of Willmore two-spheres in $S^{n+2}$ in terms of the normalized potential of their (harmonic) conformal Gauss maps. Moreover, for the case of $S^6$, some geometric properties of the corresponding Willmore two-spheres are discussed. The classical classification of Willmore two-spheres in $S^4$ are also derived as a corollary.
We study the deformations of an asymptotically cylindrical Cayley submanifold inside an asymptotically cylindrical Spin(7)-manifold. We prove an index formula for the operator of Dirac type that arises as the linearisation of the deformation map and show that if the Spin(7)-structure is generic, then there are no obstructions, and hence the moduli space is a smooth finite-dimensional manifold whose dimension is equal to the index of the operator of Dirac type. We further construct examples of asymptotically cylindrical Cayley submanifolds inside the asymptotically cylindrical Riemannian 8-manifolds with holonomy Spin(7) constructed by Kovalev.
It has been shown in [Pa1] that on a simple, compact Riemannian 2-manifold the attenuated geodesic ray transform, with attenuation given by a connection and Higgs field, is injective on functions and 1-forms modulo the natural obstruction. Furthermore, the scattering relation determines the connection and Higgs field modulo a gauge transformation. We extend the results obtained therein to the case of magnetic geodesics. In addition, we provide an application to tensor tomography in the magnetic setting, along the lines of [Pa2].
The paper is constructed in two parts.In the first part we introduce the concept of the algebra of Q-meromorphic functions on the quantum plane.The A (q)-algebra of Q-analytic functions considered in[6]is seen as a proper subalgebra. In the second part we find a formula for the curvature tensor on this algebra. It is seen that when the quantization parameter tendsto 1,then this formula gives the flatness of the usual R^2 .
In this paper we introduce two new notions of sectional curvature for Riemannian manifolds with density. Under both notions of curvature we classify the constant curvature manifolds. We also prove generalizations of the theorems of Cartan-Hadamard, Synge, and Bonnet-Myers as well as a generalization of the (non-smooth) 1/4-pinched sphere theorem. The main idea is to modify the radial curvature equation and second variation formula and then apply the techniques of classical Riemannian geometry to these new equations.
Let X be a quasiprojective manifold given by the complement of a divisor $\\bD$ with normal crossings in a smooth projective manifold $\\bX$. Using a natural compactification of $X$ by a manifold with corners $\\tX$, we describe the full asymptotic behavior at infinity of certain complete Kahler metrics of finite volume on X. When these metrics evolve according to the Ricci flow, we prove that such asymptotic behaviors persist at later time by showing the associated potential function is smooth up to the boundary on the compactification $\\tX$. However, when the divisor $\\bD$ is smooth with $K_{\\bX}+[\\bD]>0$ and the Ricci flow converges to a Kahler-Einstein metric, we show that this Kahler-Einstein metric has a rather different asymptotic behavior at infinity, since its associated potential function is polyhomogeneous with in general some logarithmic terms occurring in its expansion at the boundary.
We derive some elliptic differential inequalities from the Weitzenb\\\"ock formulas for the traceless Ricci tensor of a K\\\"ahler manifold with constant scalar curvature and the Bochner tensor of a K\\\"ahler-Einstein manifold respectively. Using elliptic estimates and maximum principle, some $L^p$ and $L^\\infty $ pinching results are established to characterize K\\\"ahler-Einstein manifolds among K\\\"ahler manifolds with constant scalar curvature, and others are given to characterize complex space forms among K\\\"ahler-Einstein manifolds. Finally, these pinching results may be combined to characterize complex space forms among K\\\"ahler manifolds with constant scalar curvature.
Using generalized Tanaka-Webster connection, we considered a real hypersurface $M$ in a complex two-plane Grassmannian $G_2({\\mathbb C}^{m+2})$ when the GTW Reeb Lie derivative of the structure Jacobi operator coincides with the Reeb Lie derivative. Next using the method of simultaneous diagonalization, we prove a complete classification for a real hypersurface in $G_2({\\mathbb C}^{m+2})$ satisfying such a condition. In this case, we have proved that $M$ is an open part of a tube around a totally geodesic $G_2({\\mathbb C}^{m+1})$ in $G_2({\\mathbb C}^{m+2})$.
We present a general numerical method for investigating prescribed Ricci curvature problems on toric K\\\"ahler manifolds. This method is applied to two generalisations of Einstein metrics, namely Ricci solitons and quasi-Einstein metrics. We begin by recovering the Koiso--Cao soliton and the L\\\"u--Page--Pope quasi-Einstein metrics on $\\mathbb{CP}^{2}\\sharp\\overline{\\mathbb{CP}}^{2}$ (in both cases the metrics are known explicitly). We also find numerical approximations to the Wang--Zhu soliton on $\\mathbb{CP}^{2}\\sharp 2\\overline{\\mathbb{CP}}^{2}$ (here the metric is not known explicitly). Finally, a substantial numerical investigation of the quasi-Einstein equation on $\\mathbb{CP}^{2}\\sharp 2\\overline{\\mathbb{CP}}^{2}$ is conducted. In this case it is an open problem as to whether such metrics exist on this manifold. We find metrics that solve the quasi-Einstein equation to the same degree of accuracy as the approximations to the Wang--Zhu soliton solve the Ricci soliton equation.
This paper is devoted to the complete classification of space curves under affine transformations in the view of Cartan s theorem. Spivak has introduced the method but has not found the invariants. Furthermore, for the first time, we propound a necessary and sufficient condition for the invariants. Then, we study the shapes of space curves with constant curvatures in detail and suggest their applications in physics, computer vision and image processing.
I point out some very elementary examples of special Lagrangian tori in certain Calabi-Yau manifolds that occur as hypersurfaces in complex projective space. All of these are constructed as real slices of smooth hypersurfaces defined over the reals. This method of constructing special Lagrangian submanifolds is well known. What does not appear to be in the current literature is an explicit description of such examples in which the special Lagrangian submanifold is a 3-torus.
We introduce a new geometric evolution equation for hypersurfaces in asymptotically flat spacetime initial data sets, that unites the theory of marginally outer trapped surfaces (MOTS) with the study of inverse mean curvature flow in asymptotically flat Riemannian manifolds. A theory of weak solutions is developed using level-set methods and an appropriate variational principle. This new flow has a natural application as a variational-type approach to constructing MOTS, and this work also gives new insights into the theory of weak solutions of inverse mean curvature flow.
Generalized Robertson-Walker (GRW) spaces constitute a quite important family in Lorentzian geometry, and it is an interesting question to know whether a Lorentzian manifold can be decomposed in such a way. It is well known that the existence of a suitable vector field guaranties the local decomposition of the manifold. In this paper, we give conditions on the curvature which ensure a global decomposition and apply them to several situations where local decomposition appears naturally. We also study the uniqueness question, obtaining that the de Sitter spaces are the only non trivial complete Lorentzian manifolds with more than one GRW decomposition. Moreover, we show that the Friedmann Cosmological Models admit an unique GRW decomposition, even locally.
For an arbitrary subalgebra $\\mathfrak{h}\\subset\\mathfrak{so}(r,s)$, a polynomial pseudo-Riemannian metric of signature $(r+2,s+2)$ is constructed, the holonomy algebra of this metric contains $\\mathfrak{h}$ as a subalgebra. This result shows the essential distinction of the holonomy algebras of pseudo-Riemannian manifolds of index bigger or equal to 2 from the holonomy algebras of Riemannian and Lorentzian manifolds.
We introduce a class of maps from an affine flat into a Riemannian manifold that solve an elliptic system defined by the natural second order elliptic operator of the affine structure and the nonlinear Riemann geometry of the target. These maps are called affine harmonic. We show an existence result for affine harmonic maps in a given homotopy class when the target has non positive sectional curvature and some global non triviality condition is met. An example shows that such a condition is necessary. The analytical part is made difficult by the absence of a variational structure underlying affine harmonic maps. We therefore need to combine estimation techniques from geometric analysis and PDE theory with global geometric considerations.
In 1970, Samuel I. Goldberg and Kentaro Yano defined the notion of noninvariant hypersurface of a Sasakian manifold [1]. In this paper we have studied the properties of parallel vector fields with respect to induced connection on the noninvariant hypersurface $M$ of a Sasakian manifold $\\tilde M$ with $(\\phi, g, u, v, \\lambda)-$ structure and proved that if the vector field $V$ is parallel with respect to induced connection on $M$ then $M$ is totally geodesic.
We give an explicit estimate of the distance of a closed, connected, oriented and immersed hypersurface of a space form to a geodesic sphere and show that the spherical closeness can be controlled by a power of an integral norm of the traceless second fundamental form, whenever the latter is sufficiently small. Furthermore we use the inverse mean curvature flow in the hyperbolic space to deduce the best possible order of decay in the class of $C^{\\infty}$-bounded hypersurfaces of the Euclidean space.
Let $M$ be a real hypersurface of a complex space form with almost contact metric structure $(\\phi, \\xi, \\eta, g)$. In this paper, we study real hypersurfaces in a complex space form whose structure Jacobi operator $R_\\xi=R(\\cdot,\\xi)\\xi$ is $\\xi$-parallel. In particular, we prove that the condition $\\nabla_{\\xi} R_{\\xi}=0$ characterizes the homogeneous real hypersurfaces of type $A$ in a complex projective space or a complex hyperbolic space when $R_{\\xi} \\phi S=S \\phi R_{\\xi}$ holds on $M$, where $S$ denotes the Ricci tensor of type (1,1) on $M$.
We will prove that \\emph{there are no stable complete hypersurfaces of $\\mathbb{R}^4$ with zero scalar curvature, polynomial volume growth and such that $\\dfrac{(-K)}{H^3}\\geq c>0$ everywhere, for some constant $c>0$}, where $K$ denotes the Gauss-Kronecker curvature and $H$ denotes the mean curvature of the immersion. Our second result is the Bernstein type one \\emph{there is no entire graphs of $\\mathbb{R}^4$ with zero scalar curvature such that $\\dfrac{(-K)}{H^3}\\geq c>0$ everywhere}. At last, it will be proved that, if there exists a stable hypersurface with zero scalar curvature and $\\dfrac{(-K)}{H^3}\\geq c>0$ everywhere, that is, with volume growth greater than polynomial, then its tubular neighborhood is not embedded for suitable radius.
This paper gives a new proof that maximal, globally hyperbolic, flat spacetimes of dimension $n\\geq 3$ with compact Cauchy hypersurfaces are globally foliated by Cauchy hypersurfaces of constant mean curvature, and that such spacetimes admit a globally defined constant mean curvature time function precisely when they are causally incomplete. The proof, which is based on using the level sets of the cosmological time function as barriers, is conceptually simple and will provide the basis for future work on constant mean curvature time functions in general constant curvature spacetimes, as well for an analysis of the asymptotics of constant mean foliations.
Given a compact constant scalar curvature Kaehler orbifold, with nontrivial holomorphic vector fields, whose singularities admit a local ALE Kaehler Ricci-flat resolution, we find sufficient conditions on the position of the singular points to ensure the existence of a global constant scalar curvature Kaehler desingularization. This generalizes the results previously obtained by the first author with F. Pacard. A series of explicit examples is discussed.
We consider non-Kaehler compact complex manifolds which are homogeneous under the action of a compact Lie group of biholomorphisms and we investigate the existence of special (invariant) Hermitian metrics on these spaces. We focus on a particular class of such manifolds comprising the case of Calabi-Eckmann manifolds and we prove the existence of an invariant Hermitian metric which is Chern-Einstein, namely whose second Ricci tensor of the associated Chern connection is a positive multiple of the metric itself. The uniqueness is also discussed.
Supplementary comments about generalized Lie algebroids are presented and a new point of view over the construction of the Lie algebroid generalized tangent bundle of a (dual) vector bundle is introduced. Using the general theory of exterior differential calculus for generalized Lie algebroids, a covariant derivative for exterior forms of a (dual) vector bundle is introduced. Using this covariant derivative, the complete lift of an arbitrary section of a (dual) vector bundle is discovered. A theory of Legendre type and Legendre duality between vertical and complete lifts is presented. Finally, a duality between Lie algebroids structures is developed.
The set of Clifford bundles of bounded geometry over open manifolds can be endowed with a metrizable uniform structure. For one fixed bundle $E$ we define the generalized component $\\gencomp (E)$ as the set of Clifford bundles $E $ which have finite distance to $E$. If $D$, $D $ are the associated generalized Dirac operators, we prove for the pair $(D,D )$ relative index theorems, define relative $\\zeta$-- and $\\eta$--functions, relative determinants and in the case of $D=\\Delta$ relative analytic torsion. To define relative $\\zeta$-- and $\\eta$--functions, we assume additionally that the essential spectrum of $D^2$ has a gap above zero.
A smooth end of a Bryant surface is a conformally immersed punctured disc of mean curvature 1 in hyperbolic space that extends smoothly through the ideal boundary. The Bryant representation of a smooth end is well defined on the punctured disc and has a pole at the puncture. The Willmore energy of compact Bryant surfaces with smooth ends is quantized. It equals 4Pi times the total pole order of its Bryant representation. The possible Willmore energies of Bryant spheres with smooth ends are 4Pi*d where d is a positive integer different from 2,3,5,7. Bryant spheres with smooth ends are examples of soliton spheres, a class of rational conformal immersions of the sphere which also includes Willmore spheres in the conformal 3-sphere. We give explicit examples of Bryant spheres with an arbitrary number of smooth ends. We conclude the paper by showing that Bryant s quartic differential Q vanishes identically for a compact surface in the 3-sphere if and only if it is the compactification of either a complete finite total curvature Euclidean minimal surface with planar ends or a compact Bryant surface with smooth ends.
It is commonly known that in Riemannian and sub-Riemannian Geometry, the metric tensor on a manifold defines a distance function. In Lorentzian Geometry, instead of a distance function it provides causal relations and the Lorentzian time-separation function. Both lead to the definition of the Alexandrov topology, which is linked to the property of strong causality of a space-time. We studied three possible ways to define the Alexandrov topology on sub-Lorentzian manifolds, which usually give different topologies, but agree in the Lorentzian case. We investigated their relationships to each other and the manifold s original topology and their link to causality.
Let $G_{2(2)}$ be the non-compact connected simple Lie group of type $G_2$ over $\\mathbb{R}$, and let $M$ be a connected analytic complete pseudo-Riemannian manifold that admits an isometric $G_{2(2)}$-action with a dense orbit. For the case $\\dim(M) \\leq 21$, we provide a full description of the manifold $M$, its geometry and its $G_{2(2)}$-action. The latter are always given in terms of a Lie group geometry related to $G_{2(2)}$, and in one case $M$ is essentially the quotient of $\\widetilde{\\mathrm{S0}}_0(3,4)$ by a lattice.
We compute eta invariants of various Dirac type operators on circle bundles over Riemann surfaces via two approaches: an adiabatic approach based on the results of Bismut-Cheeger-Dai and a direct elementary one. These results, coupled with some delicate spectral flow computations are then used to determine the virtual dimensions of Seiberg-Witten finite energy moduli spaces on any 4-manifold bounding unions of circle bundles. This belated paper should be regarded as the analytical backbone of dg-ga/9711006. There, we indicated only what changes are needed to extend the methods of the present paper to Seifert fibrations and we focused only to topological and number theoretic aspects related to Froyshov invariants
This paper consists of two parts. First, motivated by classic results, we determine the subsets of a given nilpotent Lie algebra $\\mathfrak{g}$ (respectively, of the Grassmannian of two-planes of $\\mathfrak{g}$) whose sign of Ricci (respectively, sectional) curvature remains unchanged for an arbitrary choice of a positive definite inner product on $\\mathfrak{g}$. In the second part we study the subsets of $\\mathfrak{g}$ which are, for some inner product, the eigenvectors of the Ricci operator with the maximal and with the minimal eigenvalue, respectively. We show that the closures of these subsets is the whole algebra $\\mathfrak{g}$, apart from two exceptional cases: when $\\mathfrak{g}$ is two-step nilpotent and when $\\mathfrak{g}$ contains a codimension one abelian ideal.
We define an integer graded symplectic Floer cohomology and a spectral sequence which are new invariants for monotone Lagrangian sub-manifolds and exact isotopies. Such an integer graded Floer cohomology is an integral lifting of the usual Floer-Oh cohomology with $Z_{\\Si (L)}$ grading. As one of applications of the spectral sequence, we offer an affirmative answer to an Audin s question for oriented, embedded, monotone Lagrangian tori, i.e. $\\Si (L) = 2$.
We study the $G_2$ analogue of the Goldberg conjecture on non-compact solvmanifolds. In contrast to the almost-K\\\"ahler case we prove that a 7-dimensional solvmanifold cannot admit any left-invariant calibrated $G_2$-structure $\\varphi$ such that the induced metric $g_{\\varphi}$ is Einstein, unless $g_{\\varphi}$ is flat. We give an example of 7-dimensional solvmanifold admitting a left-invariant calibrated $G_2$-structure $\\varphi$ such that $g_{\\varphi}$ is Ricci-soliton. Moreover, we show that a 7-dimensional (non-flat) Einstein solvmanifold $(S,g)$ cannot admit any left-invariant cocalibrated $G_2$-structure $\\varphi$ such that the induced metric $g_{\\varphi} = g$.
Douglas metrics are metrics with vanishing Douglas curvature which is an important projective invariant in Finsler geometry. To find more Douglas metrics, in this paper we consider a class of Finsler metrics called general $(\\alpha,\\beta)$-metrics, which are defined by a Riemannian metric $\\alpha=\\sqrt{a_{ij}(x)y^iy^j}$ and a $1$-form $\\beta=b_i(x)y^i$. We obtain the differential equations that characterizes these metrics with vanishing Douglas curvature. By solving the equivalent PDEs, the metrics in this class are totally determined. Then many new Douglas metrics are constructed.
An upper bound on the first S^1 invariant eigenvalue of the Laplacian for invariant metrics on the 2-sphere is used to find obstructions to the existence of isometric embeddings of such metrics in (R^3,can). As a corollary we prove: If the first four distinct eigenvalues have even multiplicities then the surface of revolution cannot be isometrically embedded in (R^3,can). This leads to a generalization of a classical result in the theory of surfaces.
As a generalization of slant submanifolds and semi-slant submanifolds, we introduce the notions of pointwise slant submanifolds and pointwise semi-slant sunmanifolds of an almost contact metric manifold. We obtain a characterization at each notion, investigate the topological properties of pointwise slant submanifolds, and give some examples of them. We also consider some distributions on cosymplectic, Sasakian, Kenmotsu manifolds and deal with some properties of warped product pointwise semi-slant submanifolds. Finally, we give some inequalities for the squared norm of the second fundamental form in terms of a warping function and a semi-slant function for warped product submanifolds of cosymplectic, Sasakian, Kenmotsu manifolds.
A hypercomplex structure on a differentiable manifold consists of three integrable almost complex structures that satisfy quaternionic relations. If, in addition, there exists a metric on the manifold which is Hermitian with respect to the three structures, and such that the corresponding Hermitian forms are closed, the manifold is said to be hyperkaehler. In the paper \"Non-Hermitian Yang-Mills connections\", Kaledin and Verbitsky proved that the twistor space of a hyperkaehler manifold satisfies the geometric condition of being a balanced manifold, in the sense of Michelsohn. In the present article, we review the proof of this result and then generalize it and show that twistor spaces of general compact hypercomplex manifolds are balanced.
A class of metrizable vector bundles in the general framework of generalized Lie algebroids have been presented in the eight reference. Using a generalized Lie algebroid we obtain the Lie algebroid generalized tangent bundle of a vector bundle. This Lie algebroid is a new example of metrizable vector bundle. A new class of Lagrange spaces, called by use, generalized Lagrange (\\rho?;\\eta?)-space, Lagrange (\\rho?;\\eta?)-space and Finsler (\\rho?;\\eta?)-space are presented. In the particular case of Lie algebroids, new and important results are presented. In particular, if all morphisms are identities morphisms, then the classical results are obtained.
Let $(M, g)$ be an dimensional complete Riemannian manifold. In this paper we prove local Li-Yau type gradient estimates for all positive solutions to the following nonlinear parabolic equation \\begin{equation*} (\\partial_t - \\Delta_g + \\mathcal{R}) u(x, t) = - a u(x, t) \\log u(x, t) \\end{equation*} along the generalised geometric flow. Here $ \\mathcal{R} = \\mathcal{R} (x, t)$ is a smooth potential function and $a$ is a constant. As an application we derived a global estimate and a space-time Harnack inequality.
We will obtain the warped product decompositions of spaces of constant curvature (with arbitrary signature) in their natural models as subsets of pseudo-Euclidean space. This generalizes the corresponding result by S. Nolker to arbitrary signatures, and has a similar level of detail. Although our derivation is complete in some sense, none is proven. Motivated by applications, we will give more information for the spaces with Euclidean and Lorentzian signatures. This is an expository article which is intended to be used as a reference. So we also give a review of the theory of circles and spheres in pseudo-Riemannian manifolds.
We show that which that for a Berwald structure, any Riemannian structure that is preserved by the Berwald connection leaves the indicatrix invariant under horizontal parallel transport. We also obtain the converse result: if $({\\bf M},F)$ is a Finsler structure such that there exists a Riemannian structure that leaves invariant the indicatrix under parallel transport of the associated Levi-Civita connection, then the structure $({\\bf M},F)$ is Berwald. As application, a necessary condition for pure Landsberg spaces is formulated. Using this criterion we provide an strategy to solve the existence or not of pure Landsberg surfaces
A non-linear generalization of the Dirac operator in 4-dimensions, obtained by replacing the spinor representation with a hyperKahler manifold admitting certain symmetries, is considered. We show that the existence of a covariantly constant, generalized spinor defines a Kahler structure on the base 4-dimensional manifold. For a class of hyperKahler manifolds obtained via hyperKahler reduction, we also show that a harmonic spinor, under mild conditions, defines a symplectic structure. Finally, we show that if a covariantly constant, generalized spinor satisfies generalized Seiberg-Witten equations, the metric on the base manifold has a constant scalar curvature.
Let $(M, g)$ be a closed Riemannian manifold of dimension $5$. Assume that $(M, g)$ is not conformally equivalent to the round sphere. If the scalar curvature $R_g\\geq 0$ and the $Q$-curvature $Q_g\\geq 0$ on $M$ with $Q_g(p)>0$ for some point $p\\in M$, we prove that the set of metrics in the conformal class of $g$ with prescribed constant positive $Q$-curvature is compact in $C^{4, \\alpha}$ for any $0 <\\alpha < 1$. We also give some estimates for dimension $6$ and $7$.
The orthogonal trajectories of the first tangents of the curve are called the involutes of $x$. The hyperspheres which have higher order contact with a curve $x$ are known osculating hyperspheres of $x$. The centers of osculating hyperspheres form a curve which is called generalized evolute of the given curve $x$ in $n$-dimensional Euclidean space $\\mathbb{E}^{n}$. In the present study, we give a characterization of involute curves of order $k$ (resp. evolute curves) of the given curve $x$ in $n$-dimensional Euclidean space $\\mathbb{E}^{n}$. Further, we obtain some results on these type of curves in $\\mathbb{E}^{3}$ and $\\mathbb{E}^{4}$, respectively.
This article deals with fat bundles. Berard-Bergery classified all homogeneous bundles of that type. We ask a question of a possibility to generalize his description in the case of arbitrary G-structures over homogeneous spaces. We obtain necessary conditions for the existence of such bundles. These conditions yield a kind of classification of fat bundles associated with G-structures over compact homogeneous spaces provided that the connection in a G-structure is canonical.
For a Morse map $f:M\\to S^1$ Novikov [11] has introduced an analog of Morse complex, defined over the ring $\\ZZZ[[t]][t^{-1}]$ of integer Laurent power series. Novikov conjectured, that generically the matrix entries of the differentials in this complex are of the form $\\sum_ia_it^i$, where $a_i$ grow at most exponentially in $i$. We prove that for any given $f$ for a $C^0$ generic gradient-like vector field all the incidence coefficients above are rational functions in $t$ (which implies obviously the exponential growth rate estimate).
We go further on the study of harmonicity for almost contact metric structures already initiated by Vergara-Diaz and Wood. By using the intrinsic torsion, we characterise harmonic almost contact metric structures in several equivalent ways and show conditions relating harmonicity and classes of almost contact metric structures. Additionally, we study the harmonicity of such structures as a map into the quotient bundle of the oriented orthonormal frames by the action of the structural group U(n)x1. Finally, by using a Bochner type formula proved by Bor and Hernandez Lamoneda, we display some examples which give the absolute minimum for the energy.
We give a detailed exposition of the Jet Isomorphism Theorem of pseudo-Riemannian geometry. In its weak form this theorem states that the Taylor expansion up to order k+2 of a pseudo-Riemannian metric in normal coordinates can be reconstructed in a universal way from suitable symmetrizations of the covariant derivatives of the curvature tensor up to order k. In its full generality it states the equivalence of Taylor expansions of metrics in normal coordinates up to order k+2, abstract curvature k-jets and their symmetrizations as affine vector bundles. This theorem seems to be a cornerstone of local pseudo-Riemannian geometry which is hardly mentioned in the present literature anymore.
Associative submanifolds of the 7-sphere S^7 are 3-dimensional minimal submanifolds which are the links of calibrated 4-dimensional cones in R^8 called Cayley cones. Examples of associative 3-folds are thus given by the links of complex and special Lagrangian cones in C^4, as well as Lagrangian submanifolds of the nearly K\\\"ahler 6-sphere. By classifying the associative group orbits, we exhibit the first known explicit example of an associative 3-fold in S^7 which does not arise from other geometries. We then study associative 3-folds satisfying the curvature constraint known as Chen s equality, which is equivalent to a natural pointwise condition on the second fundamental form, and describe them using a new family of pseudoholomorphic curves in the Grassmannian of 2-planes in R^8 and isotropic minimal surfaces in S^6. We also prove that associative 3-folds which are ruled by geodesic circles, like minimal surfaces in space forms, admit families of local isometric deformations. Finally, we construct associative 3-folds satisfying Chen s equality which have an S^1-family of global isometric deformations using harmonic 2-spheres in S^6.
We first generalize the operation of formal exterior differential in the case of finite dimensional fibered manifolds and then we extend it to certain bundles of smooth maps. In order to characterize the operator order of some morphisms between our bundles of smooth maps, we introduce the concept of fiberwise $(k,r)$-jet. The relations to the Euler-Lagrange morphism of the variational calculus are described.
We show that Lagrangian submanifolds in six-dimensional nearly K\\\"ahler (non K\\\"ahler) manifolds and in twistor spaces $Z\\sp{4n+2}$ over quaternionic K\\\"ahler manifolds $Q\\sp{4n}$ are minimal. Moreover, we will prove that any Lagrangian submanifold $L$ in a nearly K\\\"ahler manifold $M$ splits into a product of two Lagrangian submanifolds for which one factor is Lagrangian in the strict nearly K\\\"ahler part of $M$ and the second factor is Lagrangian in the K\\\"ahler part of $M$. Using this splitting theorem we then describe Lagrangian submanifolds in nearly K\\\"ahler manifolds of dimensions six, eight and ten.
Associative submanifolds $A$ in nearly parallel $G_2$-manifolds $Y$ are minimal 3-submanifolds in spin 7-manifolds with a real Killing spinor. The Riemannian cone over $Y$ has the holonomy group contained in ${\\rm Spin(7)}$ and the Riemannian cone over $A$ is a Cayley submanifold. Infinitesimal deformations of associative submanifolds were considered by the author. This paper is a continuation of the work. We give a necessary and sufficient condition for an infinitesimal associative deformation to be integrable (unobstructed) to second order explicitly. As an application, we show that the infinitesimal deformations of a homogeneous associative submanifold in the 7-sphere given by Lotay, which he called $A_3$, are unobstructed to second order.
The Einstein equations (EE) are certain conditions on the Riemann tensor on the real Minkowski space M. In the twistor picture, after complexification and compactification M becomes the Grassmannian $Gr_{2}^{4}$ of 2-dimensional subspaces in the 4-dimensional complex one. Here we answer for which of the classical domains considered as manifolds with G-structure it is possible to impose conditions similar in some sense to EE. The above investigation has its counterpart on superdomains: an analog of the Riemann tensor is defined for any supermanifold with G-structure with any Lie supergroup G. We also derive similar analogues of EE on supermanifolds. Our analogs of EE are not what physicists consider as SUGRA (supergravity), for SUGRA see \\cite{GL4,LP2}.
We study two aspects of the loop group formulation for isometric immersions with flat normal bundle of space forms. The first aspect is to examine the loop group maps along different ranges of the loop parameter. This leads to various equivalences between global isometric immersion problems among different space forms and pseudo-Riemannian space forms. As a corollary, we obtain a non-immersibility theorem for spheres into certain pseudo-Riemannian spheres and hyperbolic spaces. The second aspect pursued is to clarify the relationship between the loop group formulation of isometric immersions of space forms and that of pluriharmonic maps into symmetric spaces. We show that the objects in the first class are, in the real analytic case, extended pluriharmonic maps into certain symmetric spaces which satisfy an extra reality condition along a totally real submanifold. We show how to construct such pluriharmonic maps for general symmetric spaces from curved flats, using a generalised DPW method.
The theory of the vortex filament in three-dimensional fluid dynamics, consisting mainly of the models up to the third-order approximation, is an attractive subject in both physics and mathematics. Many efforts have been devoted to the extension of the theory to higher-dimensional symmetric Lie algebras. However, such a generalization known in literature is strongly restricted by the integrable method. In this article, we endeavor to establish the third-order models of the vortex filament on symmetric Lie algebras in a purely geometric way by generalized bi-Schr\\\"odinger flows. Our generalization overcomes the limitation of integrability and creates successfully the desired models on Hermitian or para-Hermitian symmetric Lie algebras. Combining the result in this article with what have been known in literature for the leading-order and the second-order models, we actually exhibit the basic models and the related theory of the vortex filament on symmetric Lie algebras up to the third-order approximation.
We consider biharmonic maps $\\phi:(M,g)\\rightarrow (N,h)$ from a complete Riemannian manifold into a Riemannian manifold with non-positive sectional curvature. Assume that $\\alpha$ satisfies $1<\\alpha<\\infty$. If for such an $\\alpha$, $\\int_M|\\tau(\\phi)|^{\\alpha}dv_g<\\infty$ and $\\int_M|d\\phi|^2dv_g<\\infty,$ where $\\tau(\\phi)$ is the tension field of $\\phi$, then we show that $\\phi$ is harmonic. For a biharmonic submanifold, we obtain that the above assumption $\\int_M|d\\phi|^2dv_g<\\infty$ is not necessary. These results give affirmative partial answers to the global version of generalized Chen s conjecture.
We bring new insights into the long-standing Alekseevskii conjecture, namely that any connected homogeneous Einstein manifold of negative scalar curvature is diffeomorphic to a Euclidean space, by proving structural results which are actually valid for any homogeneous expanding Ricci soliton, and generalize many well-known results on Einstein solvmanifolds, solvsolitons and nilsolitons. We obtain that any homogeneous expanding Ricci soliton M=G/K is diffeomorphic to a product U/K x N, where U is a maximal reductive Lie subgroup of G and N is the maximal nilpotent normal subgroup of G, such that the metric restricted to N is a nilsoliton. Moreover, strong compatibility conditions between the metric and the action of U on N by conjugation must hold, including a nice formula for the Ricci operator of the metric restricted to U/K. Our main tools come from geometric invariant theory. As an application, we give many Lie theoretical characterizations of algebraic solitons, as well as a proof of the fact that the following a priori much stronger result is actually equivalent to Alekseevskii s conjecture: Any expanding algebraic soliton is diffeomorphic to a Euclidean space.
Dynamic networks are structured interconnections of dynamical systems (modules) driven by external excitation and disturbance signals. In order to identify their dynamical properties and/or their topology consistently from measured data, we need to make sure that the network model set is identifiable. We introduce the notion of network identifiability, as a property of a parameterized model set, that ensures that module dynamics are uniquely related to the objects that can be uniquely estimated from data. In the classical prediction error framework, these objects are the predictor filters that constitute the one-step ahead output predictors. We generalize this situation to include the option of having noise-free node signals. The results can be used to specify which presence of excitation signals will result in a unique representation of the network dynamics in a particular network model parametrization. This uniqueness is necessary for detecting the topology of the network from measured data, and for consistently estimating the network dynamics. We combine aspects of the classical notion of system identifiability with a uniqueness-oriented parametrization concept, and extend this to the situation of highly structured model sets. All node signals in the network are treated in a symmetric way as both inputs and outputs. The presented concepts and theory allow for the incorporation of particular structural prior knowledge of the network structure.
This paper considers the leader-follower tracking control problem for linear interconnected systems with undirected topology and linear dynamic coupling. Interactions between the systems are treated as linear dynamic uncertainty and are described in terms of integral quadratic constraints (IQCs). A consensus-type tracking control protocol is proposed for each system based on its state relative its neighbors. In addition a selected set of subsystems uses for control their relative states with respect to the leader. Two methods are proposed for the design of this control protocol. One method uses a coordinate transformation to recast the protocol design problem as a decentralized robust control problem for an auxiliary interconnected large scale system. Another method is direct, it does not employ coordinate transformation; it also allows for more general linear uncertain interactions. Using these methods, sufficient conditions are obtained which guarantee that the system tracks the leader. These conditions guarantee a suboptimal bound on the system consensus and tracking performance. The proposed methods are compared using a simulation example, and their effectiveness is discussed. Also, algorithms are proposed for computing suboptimal controllers.
For a wireless sensor network (WSN) with a large number of low-cost, battery-driven, multiple transmission power leveled sensor nodes of limited transmission bandwidth, then conservation of transmission resources (power and bandwidth) is of paramount importance. Towards this end, this paper considers the problem of power scheduling of Kalman filtering for general linear stochastic systems subject to data packet drops (over a packet-dropping wireless network). The transmission of the acquired measurement from the sensor to the remote estimator is realized by sequentially transmitting every single component of the measurement to the remote estimator in one time period. The sensor node decides separately whether to use a high or low transmission power to communicate every component to the estimator across a packet-dropping wireless network based on the rule that promotes the power scheduling with the least impact on the estimator mean squared error. Under the customary assumption that the predicted density is (approximately) Gaussian, leveraging the statistical distribution of sensor data, the mechanism of power scheduling, the wireless network effect and the received data, the minimum mean squared error estimator is derived. By investigating the statistical convergence properties of the estimation error covariance, we establish, for general linear systems, both the sufficient condition and the necessary condition guaranteeing the stability of the estimator.
In this correspondence, we introduce a minimax regret criteria to the least squares problems with bounded data uncertainties and solve it using semi-definite programming. We investigate a robust minimax least squares approach that minimizes a worst case difference regret. The regret is defined as the difference between a squared data error and the smallest attainable squared data error of a least squares estimator. We then propose a robust regularized least squares approach to the regularized least squares problem under data uncertainties by using a similar framework. We show that both unstructured and structured robust least squares problems and robust regularized least squares problem can be put in certain semi-definite programming forms. Through several simulations, we demonstrate the merits of the proposed algorithms with respect to the the well-known alternatives in the literature.
We present a novel algorithm for reducing the state dimension, i.e. order, of linear parameter varying (LPV) discrete-time state-space (SS) models with affine dependence on the scheduling variable. The input-output behavior of the reduced order model approximates that of the original model. In fact, for input and scheduling sequences of a certain length, the input-output behaviors of the reduced and original model coincide. The proposed method can also be interpreted as a reachability and observability reduction (minimization) procedure for LPV-SS representations with affine dependence.
Since the complexity of the practical environment, many distributed networked systems can not be illustrated with the integer-order dynamics and only be described as the fractional-order dynamics. Suppose multi-agent systems will show the individual diversity with difference agents, where the heterogeneous (integer-order and fractional-order) dynamics are used to illustrate the agent systems and compose integer-fractional compounded-order systems. Applying Laplace transform and frequency domain theory of the fractional-order operator, consensus of delayed multi-agent systems with directed weighted topologies is studied. Since integer-order model is the special case of fractional-order model, the results in this paper can be extend to the systems with integer-order models. Finally, numerical examples are used to verify our results.
This paper proposes an energy management scheme to maximize the use of solar energy in the smart grid. In this context, a shared facility controller (SFC) with a number of solar photovoltaic (PV) panels in a smart community is considered that has the capability to schedule the generated energy for consumption and trade to other entities. Particularly, a mechanism is designed for the SFC to decide on the energy surplus, if there is any, that it can use to charge its battery and sell to the households and the grid based on the offered prices. In this regard, a hierarchical energy management scheme is proposed with a view to reduce the total operational cost to the SFC. The concept of a virtual cost (VC) is introduced that aids the SFC to estimate its future operational cost based on some available current information. The energy management is conducted for three different cases and the optimal cost to the SFC is determined for each case via the theory of maxima and minima. A real-time algorithm is proposed to reach the optimal cost for all cases and some numerical examples are provided to demonstrate the beneficial properties of the proposed scheme.
This paper studies distributed strategies for average-consensus of arbitrary vectors in the presence of network interference. We assume that the underlying communication on any \\emph{link} suffers from \\emph{additive interference} caused due to the communication by other agents following their own consensus protocol. Additionally, no agent knows how many or which agents are interfering with its communication. Clearly, the standard consensus protocol does not remain applicable in such scenarios. In this paper, we cast an algebraic structure over the interference and show that the standard protocol can be modified such that the average is reachable in a subspace whose dimension is complimentary to the maximal dimension of the interference subspaces (over all of the communication links). To develop the results, we use \\emph{information alignment} to align the intended transmission (over each link) to the null-space of the interference (on that link). We show that this alignment is indeed invertible, i.e. the intended transmission can be recovered over which, subsequently, consensus protocol is implemented. That \\emph{local} protocols exist even when the collection of the interference subspaces span the entire vector space is somewhat surprising.
Swarm stability is concerned for descriptor compartmental networks with linear time-invariant protocol. Compartmental network is a specific type of dynamical multi-agent system. Necessary and sufficient conditions for both consensus and critical swarm stability are presented, which require a joint matching between the interactive dynamics of nearest neighboring vertices and the Laplacian spectrum of the overall network topology. Three numerical instances are illustrated to verify the theoretical results.
The diffusion least-mean square (dLMS) algorithms have attracted much attention owing to its robustness for distributed estimation problems. However, the performance of such filters may change when they are implemented for suppressing noises from speech signals. To overcome this problem, a diffusion leaky dLMS algorithm is proposed in this work, which is characterized by its numerical stability and small misadjustment for noisy speech signals when the unknown system is a lowpass filter. Finally, two implementations of the leaky dLMS are introduced. It is demonstrated that the leaky dLMS can be effectively introduced into a noise reduction network for speech signals.
Target tracking using observations from multiple sensors can achieve better estimation performance than a single sensor. The most famous estimation tool in target tracking is Kalman filter. There are several mathematical approaches to combine the observations of multiple sensors by use of Kalman filter. An important issue in applying a proper approach is computational complexity. In this paper, four data fusion algorithms based on Kalman filter are considered including three centralized and one decentralized methods. Using MATLAB, computational loads of these methods are compared while number of sensors increases. The results show that inverse covariance method has the best computational performance if the number of sensors is above 20. For a smaller number of sensors, other methods, especially group sensors, are more appropriate..
This paper presents an optimal scheduling model for a microgrid participating in the electricity distribution market in interaction with the Distribution Market Operator (DMO). The DMO is a concept proposed here, which administers the established electricity market in the distribution level, i.e., similar to the role of Independent System Operator (ISO) in the wholesale electricity market, sets electricity prices, determines the amounts of the power exchange between market participators, and interacts with the ISO. Considering a predetermined main grid power transfer to the microgrid, the microgrid scheduling problem will aim at balancing the power supply and demand while taking financial objectives into account. A stochastic programming method is employed to model prevailing uncertainties in the microgrid grid-connected and islanded operations. Numerical simulations exhibit the application and the effectiveness of the proposed market-based microgrid scheduling model.
An online, adaptive method of time delay and magnitude estimation for sinusoidal signals is presented. The method is based on an adaptive gradient descent algorithm that directly determines the time delay and magnitudes of two noisy sinusoidal signals. The new estimator uses a novel quadrature carrier generator to produce the carriers for an adaptive quadrature phase detector, which in turn uses an arc tan function to compute the time delay. The proposed method is quite robust and can adapt to significant variation in input signal characteristics like magnitude and frequency imposing no requirement on the magnitudes of the two signals. It even works effectively when the signals have time-varying magnitudes. The convergence analysis of the proposed technique shows that estimate converges exponentially fast to their nominal values. In addition, if the technique is implemented in the continuous time domain, the delay estimation accuracy will not be constrained by the sampling frequency as observed in some of the classical techniques. Extensive simulations show that the proposed method provides very accurate estimates of the time delay comparable to that of the popular methods like Sinc-based estimator, Lagrange estimator, and the Quadrature estimator, as well the magnitude estimate of the input signals at lower signal to noise ratio at appreciably reduced computational cost.
This paper addresses the distributed consensus problem for a linear multi-agent system with switching directed communication topologies. By appropriately introducing a linear transformation, the consensus problem is equivalently converted to a stabilization problem for a class of switched linear systems. Some sufficient consensus conditions are then derived by using tools from the matrix theory and stability analysis of switched systems. It is proved that consensus in such a multi-agent system can be ensured if each agent is stabilizable and each possible directed topology contains a directed spanning tree. Finally, a numerical simulation is given for illustration.
The paper considers the problem of cooperative estimation for a linear uncertain plant observed by a network of communicating sensors. We take a novel approach by treating the filtering problem from the view point of local sensors while the network interconnections are accounted for via an uncertain signals modelling of estimation performance of other nodes. That is, the information communicated between the nodes is treated as the true plant information subject to perturbations, and each node is endowed with certain believes about these perturbations during the filter design. The proposed distributed filter achieves a suboptimal $H_\\infty$ consensus performance. Furthermore, local performance of each estimator is also assessed given additional constraints on the performance of the other nodes. These conditions are shown to be useful in tuning the desired estimation performance of the sensor network.
This paper proposes a hybrid approach to optimal day-ahead pricing for demand response management. At the customer-side, compared with the existing work, a detailed, comprehensive and complete energy management system, which includes all possible types of appliances, all possible applications, and an effective waiting time cost model is proposed to manage the energy usages in households (lower level problem). At the retailer-side, the best retail prices are determined to maximize the retailer s profit (upper level problem). The interactions between the electricity retailer and its customers can be cast as a bilevel optimization problem. To overcome the weakness and infeasibility of conventional Karush--Kuhn--Tucker (KKT) approach for this particular type of bilevel problem, a hybrid pricing optimization approach, which adopts the multi-population genetic algorithms for the upper level problem and distributed individual optimization algorithms for the lower level problem, is proposed. Numerical results show the applicability and effectiveness of the proposed approach and its benefit to the retailer and its customers by improving the retailer s profit and reducing the customers  bills.
We study the complexity of central controller synthesis problems for finite-state Markov decision processes, where the objective is to optimize both the expected mean-payoff performance of the system and its stability. We argue that the basic theoretical notion of expressing the stability in terms of the variance of the mean-payoff (called global variance in our paper) is not always sufficient, since it ignores possible instabilities on respective runs. For this reason we propose alernative definitions of stability, which we call local and hybrid variance, and which express how rewards on each run deviate from the run s own mean-payoff and from the expected mean-payoff, respectively. We show that a strategy ensuring both the expected mean-payoff and the variance below given bounds requires randomization and memory, under all the above semantics of variance. We then look at the problem of determining whether there is a such a strategy. For the global variance, we show that the problem is in PSPACE, and that the answer can be approximated in pseudo-polynomial time. For the hybrid variance, the analogous decision problem is in NP, and a polynomial-time approximating algorithm also exists. For local variance, we show that the decision problem is in NP. Since the overall performance can be traded for stability (and vice versa), we also present algorithms for approximating the associated Pareto curve in all the three cases. Finally, we study a special case of the decision problems, where we require a given expected mean-payoff together with zero variance. Here we show that the problems can be all solved in polynomial time.
We employ supervisory controllers to safely coordinate high-level discrete(-event) behavior of distributed components of complex systems. Supervisory controllers observe discrete-event system behavior, make a decision on allowed activities, and communicate the control signals to the involved parties. Models of the supervisory controllers can be automatically synthesized based on formal models of the system components and a formalization of the safe coordination (control) requirements. Based on the obtained models, code generation can be used to implement the supervisory controllers in software, on a PLC, or an embedded (micro)processor. In this article, we develop a process theory with data that supports a model-based systems engineering framework for supervisory coordination. We employ communication to distinguish between the different flows of information, i.e., observation and supervision, whereas we employ data to specify the coordination requirements more compactly, and to increase the expressivity of the framework. To illustrate the framework, we remodel an industrial case study involving coordination of maintenance procedures of a printing process of a high-tech Oce printer.
Cyber data attacks are the worst-case interacting bad data to power system state estimation and cannot be detected by existing bad data detectors. In this paper, we for the first time analyze the likelihood of cyber data attacks by characterizing the actions of a malicious intruder. We propose to use Markov decision process to model an intruder s strategy, where the objective is to maximize the cumulative reward across time. Linear programming method is employed to find the optimal attack policy from the intruder s perspective. Numerical experiments are conducted to study the intruder s attack strategy in test power systems.
We consider a network of event-based systems that use a shared wireless medium to communicate with their respective controllers. These systems use a contention resolution mechanism to arbitrate access to the shared network. We identify sufficient conditions for Lyapunov mean square stability of each control system in the network, and design event-based policies that guarantee it. Our stability analysis is based on a Markov model that removes the network-induced correlation between the states of the control systems in the network. Analyzing the stability of this Markov model remains a challenge, as the event-triggering policy renders the estimation error non-Gaussian. Hence, we identify an auxiliary system that furnishes an upper bound for the variance of the system states. Using the stability analysis, we design policies, such as the constant-probability policy, for adapting the event-triggering thresholds to the delay in accessing the network. Realistic wireless networked control examples illustrate the applicability of the presented approach.
This paper considers a combination of intelligent repositioning decisions and dynamic pricing for the improved operation of shared mobility systems. The approach is applied to London s Barclays Cycle Hire scheme, which the authors have simulated based on historical data. Using model-based predictive control principles, dynamically varying rewards are computed and offered to customers carrying out journeys. The aim is to encourage them to park bicycles at nearby under-used stations, thereby reducing the expected cost of repositioning them using dedicated staff. In parallel, the routes that repositioning staff should take are periodically recomputed using a model-based heuristic. It is shown that a trade-off between reward payouts to customers and the cost of hiring repositioning staff could be made, in order to minimize operating costs for a given desired service level.
This thesis focuses on developing advanced control methods for two industrial systems in discrete-time aiming to enhance their performance in delivering the control objectives as well as considering the practical aspects. The first part addresses wind power dispatch into the electricity network using a battery energy storage system (BESS). To manage the amount of energy sold to the electricity market, a novel control scheme is developed based on discrete-time model predictive control (MPC) to ensure the optimal operation of the BESS in the presence of practical constraints. The control scheme follows a decision policy to sell more energy at peak demand times and store it at off-peaks in compliance with the Australian National Electricity Market rules. The performance of the control system is assessed under different scenarios using actual wind farm and electricity price data in simulation environment. The second part considers the control of overhead crane systems for automatic operation. To achieve high-speed load transportation with high-precision and minimum load swings, a new modeling approach is developed based on independent joint control strategy which considers actuators as the main plant. The nonlinearities of overhead crane dynamics are treated as disturbances acting on each actuator. The resulting model enables us to estimate the unknown parameters of the system including coulomb friction constants. A novel load swing control is also designed based on passivity-based control to suppress load swings. Two discrete-time controllers are then developed based on MPC and state feedback control to track reference trajectories along with a feedforward control to compensate for disturbances using computed torque control and a novel disturbance observer. The practical results on an experimental overhead crane setup demonstrate the high performance of the designed control systems.
Uncoordinated charging of large-scale electric vehicles (EVs) will have a negative impact on the secure and economic operation of the power system, especially at the distribution level. Given that the charging load of EVs can be controlled to some extent, research on the optimal charging control of EVs has been extensively carried out. In this paper, two possible smart charging scenarios in China are studied: centralized optimal charging operated by an aggregator and decentralized optimal charging managed by individual users. Under the assumption that the aggregators and individual users only concern the economic benefits, new load peaks will arise under time of use (TOU) pricing which is extensively employed in China. To solve this problem, a simple incentive mechanism is proposed for centralized optimal charging while a rolling-update pricing scheme is devised for decentralized optimal charging. The original optimal charging models are modified to account for the developed schemes. Simulated tests corroborate the efficacy of optimal scheduling for charging EVs in various scenarios.
From the structural perspective, this paper investigates a new formulation of the concept of input-to-state stability (ISS), and based on this formulation, proposes a new stability analysis approach for a class of interconnected system. The new formulation of ISS is better able to reflect the tendency of the state $x(t)$ tracking the input $u(t)$ and weakens the conservative of the original form. The stability analysis method which transforms the interconnected system into the equivalent cascade form, does not depend on the Lyapunov function, breaks through the limitation of the small-gain theorem and extends the application of ISS. As its applications in three typical kinds of interconnected systems, this method is used to prove the small-gain theorem again and analyzes the stability of a class of interconnected system and the consensus of the multi-agent system (MAS).
This paper considers two problems -- a dynamic team problem and a decentralized control problem. The problems we consider do not belong to the known classes of \"simpler\" dynamic team/decentralized control problems such as partially nested or quadratically invariant problems. However, we show that our problems admit simple solutions under an assumption referred to as the substitutability assumption. Intuitively, substitutability in a team (resp. decentralized control) problem means that the effects of one team member s (resp. controller s) action on the cost function and the information (resp. state dynamics) can be achieved by an action of another member (resp. controller). For the non-partially-nested LQG dynamic team problem, it is shown that under certain conditions linear strategies are optimal. For the non-partially-nested decentralized LQG control problem, the state structure can be exploited to obtain optimal control strategies with recursively update-able sufficient statistics. These results suggest that substitutability can work as a counterpart of the information structure requirements that enable simplification of dynamic teams and decentralized control problems.
This paper proposes a robust control of doublefed induction generator of wind turbine to optimize its production: that means the energy quality and efficiency. The proposed control reposes in the sliding mode control using a multimodel approach which contributes on the minimization of the static error and the chattering phenomenon. This new approach is called sliding mode multimodel control (SMMC). Simulation results show good performances of this control.
The guidance of a torpedo represents a hard task because of the smooth nonlinear aspect of this system and because of the extreme external disturbances. The torpedo guidance reposes on the speed and the position control. In fact, the control approach which is very solicited for the electromechanical systems is the sliding mode control (SMC) which proved its effectiveness through the different studies. The SMC is robust versus disturbances and model uncertainties; however, a sharp discontinuous control is needed which induces the chattering phenomenon. The angular velocity measurement is a hard task because of the high level of disturbances. In this way, the sliding mode observer could be a solution for the velocity estimation instead of a sensor. This article deals with torpedo guidance by SMC to reach the desired path in a short time and with high precision quality. Simulation results show that this control strategy and observer can attain excellent control performances with no chattering problem.
Blind system identification is known to be an ill-posed problem and without further assumptions, no unique solution is at hand. In this contribution, we are concerned with the task of identifying an ARX model from only output measurements. We phrase this as a constrained rank minimization problem and present a relaxed convex formulation to approximate its solution. To make the problem well posed we assume that the sought input lies in some known linear subspace.
Natural gas transmission pipelines are complex systems whose flow characteristics are governed by challenging non-linear physical behavior. These pipelines extend over hundreds and even thousands of miles. Gas is typically injected into the system at a constant rate, and a series of compressors are distributed along the pipeline to boost the gas pressure to maintain system pressure and throughput. These compressors consume a portion of the gas, and one goal of the operator is to control the compressor operation to minimize this consumption while satisfying pressure constraints at the gas load points. The optimization of these operations is computationally challenging. Many pipelines simply rely on the intuition and prior experience of operators to make these decisions. Here, we present a new geometric programming approach for optimizing compressor operation in natural gas pipelines. Using models of real natural gas pipelines, we show that the geometric programming algorithm consistently outperforms approaches that mimic existing state of practice.
This paper introduces a new behavioral system model with distinct external and internal signals possibly evolving on different time scales. This allows to capture abstraction processes or signal aggregation in the context of control and verification of large scale systems. For this new system model different notions of simulation and bisimulation are derived, ensuring that they are, respectively, preorders and equivalence relations for the system class under consideration. These relations can capture a wide selection of similarity notions available in the literature. This paper therefore provides a suitable framework for their comparison
In this paper we propose an output-feedback Model Predictive Control (MPC) algorithm for linear discrete-time systems affected by a possibly unbounded additive noise and subject to probabilistic constraints. In case the noise distribution is unknown, the chance constraints on the input and state variables are reformulated by means of the Chebyshev - Cantelli inequality. The recursive feasibility of the proposed algorithm is guaranteed and the convergence of the state to a suitable neighbor of the origin is proved under mild assumptions. The implementation issues are thoroughly addressed showing that, with a proper choice of the design parameters, its computational load can be made similar to the one of a standard stabilizing MPC algorithm. Two examples are discussed in details, with the aim of providing an insight on the performance achievable by the proposed control scheme.
In chemical process applications, model predictive control effectively deals with input and state constraints during transient operations. However, industrial PID controllers directly manipulates the actuators, so they play the key role in small perturbation robustness. This paper considers the problem of augmenting the commonplace PID with the constraint handling and optimization functionalities of MPC. First, we review the MPC framework, which employs a linear feedback gain in its unconstrained region. This linear gain can be any preexisting multiloop PID design, or based on the two stabilizing PI or PID designs for multivariable systems proposed in the paper. The resulting controller is a feedforward PID mapping, a straightforward form without the need of tuning PID to fit an optimal input. The parametrized solution of MPC under constraints further leverages a familiar PID gain scheduling structure. Steady state robustness is achieved along with the PID design so that additional robustness analysis is avoided.
A controllable network can be driven from any initial state to any desired state using driver nodes. A set of driver nodes to control a network is not unique. It is important to characterize these driver nodes and select the right driver nodes. The work discusses theory and algorithms to select driver node such that largest region of attraction can be obtained considering limited capacity of driver node and with unstable eigenvalues of adjacency matrix. A network which can be controllable using one driver node is considered. Nonuniqueness of driver node poses a challenge to select right driver node when multiple possibilities exist. The work addresses this issue.
This article addresses the residential energy cost optimization problem in smart grid. To date, most of the previous research only consider a partial aspect of the cost optimization problem. As a result, they fail to analyze scenarios when the interconnected components along with their properties have to be considered simultaneously. The proposed model combines these partial models into a single unified cost optimization model. Therefore, it is able to analyze scenarios which are closer to practical implementation. Furthermore, it is useful to analyze the behavior of a population (e.g., smart buildings, smart cities, etc.) and properties of the components for specific scenarios (e.g., the impact of aggregate storage capacity, etc.). It allows energy trading in microgrid which introduces a cost fairness problem. It ensures Pareto optimality among the households which guarantees that no household will be worse off to improve the cost of others. Results show that it can maintain the user preferences and can react to a demand response program by rescheduling the household loads and sources. Finally, the paper addresses the challenge of the computational complexity of the proposed model, showing that solution time increases exponentially with the problem size and proposes possible approaches to solve this.
Designing and implementing systems as an interconnection of smaller subsystems is a common practice for modularity and standardization of components and design algorithms. Although not typically cast in this framework, many of these approaches can be viewed within the mathematical context of functional composition. This paper re-interprets and generalizes within the functional composition framework one such approach known as filter sharpening, i.e. interconnecting filter modules which have significant approximation error in order to obtain improved filter characteristics. More specifically, filter sharpening is approached by determining the composing polynomial to minimize the infinity-norm of the approximation error, utilizing the First Algorithm of Remez. This is applied both to sharpening for FIR, even-symmetric filters and for the more general case of subfilters that have complex-valued frequency responses including causal IIR filters and for continuous-time filters. Within the framework of functional composition, this paper also explores the use of functional decomposition to approximate a desired system as a composition of simpler functions based on a two-norm on the approximation error. Among the potential advantages of this decomposition is the ability for modular implementation in which the inner component of the functional decomposition represents the subfilters and the outer the interconnection.
Converter-interfaced power sources (CIPSs), like wind turbine and energy storage, can be switched to the inertia emulation mode when the detected frequency deviation exceeds a pre-designed threshold, i.e. dead band, to support the frequency response of a power grid. This letter proposes an approach to derive the emulated inertia and damping from a CIPS based on the linearized model of the CIPS and the power grid, where the grid is represented by an equivalent single machine. The emulated inertia and damping can be explicitly expressed in time and turn out to be time-dependent.
Vehicular energy network (VEN) is a vehicular network which can transport energy over a large geographical area by means of electric vehicles (EVs). In the near future, an abundance of EVs, plentiful generation of the renewables, and mature wireless energy transfer and vehicular communication technologies will expedite the realization of VEN. To transmit energy from a source to a destination, we need to establish energy paths, which are composed of segments of vehicular routes, while satisfying various design objectives. In this paper, we develop a method to construct all energy paths for a particular energy source-destination pair, followed by some analytical results of the method. We describe how to utilize the energy paths to develop optimization models for different design goals and propose two solutions. We also develop a heuristic for the power loss minimization problem. We compare the performance of the three solution methods with artificial and real-world traffic networks and provide a comprehensive comparison in terms of solution quality, computation time, solvable problem size, and applicability. This paper lays the foundations of VEN routing.
It is known that polynomial filtering can accelerate the convergence towards average consensus on an undirected network. In this paper the gain of a second-order filtering is investigated. A set of graphs is determined for which consensus can be attained in finite time, and a preconditioner is proposed to adapt the undirected weights of any given graph to achieve fastest convergence with the polynomial filter. The corresponding cost function differs from the traditional spectral gap, as it favors grouping the eigenvalues in two clusters. A possible loss of robustness of the polynomial filter is also highlighted.
A new optimization method for the design of nearly linear-phase IIR digital filters that satisfy prescribed specifications is proposed. The group-delay deviation is minimized under the constraint that the passband ripple and stopband attenuation are within the prescribed specifications and either a prescribed or an optimized group delay can be achieved. By representing the filter in terms of a cascade of second-order sections, a non-restrictive stability constraint characterized by a set of linear inequality constraints can be incorporated in the optimization algorithm. An additional feature of the method, which is very useful in certain applications, is that it provides the capability of constraining the maximum gain in transition bands to be below a prescribed level. Experimental results show that filters designed using the proposed method have much lower group-delay deviation for the same passband ripple and stopband attenuation when compared with corresponding filters designed with several state-of-the-art competing methods.
In this paper, a dual estimation methodology is developed for both time-varying parameters and states of a nonlinear stochastic system based on the Particle Filtering (PF) scheme. Our developed methodology is based on a concurrent implementation of state and parameter estimation filters as opposed to using a single filter for simultaneously estimating the augmented states and parameters. The convergence and stability of our proposed dual estimation strategy are shown formally to be guaranteed under certain conditions. The ability of our developed dual estimation method is testified to handle simultaneously and efficiently the states and time-varying parameters of a nonlinear system in a context of health monitoring which employs a unified approach to fault detection, isolation and identification is a single algorithm. The performance capabilities of our proposed fault diagnosis methodology is demonstrated and evaluated by its application to a gas turbine engine through accomplishing state and parameter estimation under simultaneous and concurrent component fault scenarios. Extensive simulation results are provided to substantiate and justify the superiority of our proposed fault diagnosis methodology when compared with another well-known alternative diagnostic technique that is available in the literature.
Repetitive Scenario Design (RSD) is a randomized approach to robust design based on iterating two phases: a standard scenario design phase that uses $N$ scenarios (design samples), followed by randomized feasibility phase that uses $N_o$ test samples on the scenario solution. We give a full and exact probabilistic characterization of the number of iterations required by the RSD approach for returning a solution, as a function of $N$, $N_o$, and of the desired levels of probabilistic robustness in the solution. This novel approach broadens the applicability of the scenario technology, since the user is now presented with a clear tradeoff between the number $N$ of design samples and the ensuing expected number of repetitions required by the RSD algorithm. The plain (one-shot) scenario design becomes just one of the possibilities, sitting at one extreme of the tradeoff curve, in which one insists in finding a solution in a single repetition: this comes at the cost of possibly high $N$. Other possibilities along the tradeoff curve use lower $N$ values, but possibly require more than one repetition.
This paper addresses identification of sparse linear and noise-driven continuous-time state-space systems, i.e., the right-hand sides in the dynamical equations depend only on a subset of the states. The key assumption in this study, is that the sample rate is not high enough to directly infer the continuous time system from the data. This assumption is relevant in applications where sampling is expensive or requires human intervention (e.g., biomedicine applications). We propose an iterative optimization scheme with $l_1$-regularization, where the search directions are restricted those that decrease prediction error in each iteration. We provide numerical examples illustrating the proposed method; the method outperforms the least squares estimation for large noise.
The electricity market is threatened by supply scarcity, which may lead to very sharp price spikes in the spot market. On the other hand, demand-side s activities could effectively mitigate the supply scarcity and absorb most of these shocks and therefore smooth out the price volatility. In this paper, the positive effects of employing demand response programs on the spot market price are investigated. A demand-price elasticity based model is used to simulate the customer reaction function in the presence of a real time pricing. The demand achieve by DR program is used to adjust the spot market price by using a price regression model. SAS software is used to run the multiple linear regression model and MATLAB is used to simulate the demand response model. The approach is applied on one week data in summer 2014 of Connecticut in New England ISO. It could be concluded from the results of this study that applying DR program smooths out most of the price spikes in the electricity spot market and considerably reduces the customers  electricity cost.
In this note, analysis of time delay systems using Lambert W function approach is reassessed. A common canonical form of time delay systems is defined. We extended the recent results of [6] for second order into nth order system. The eigenvalues of a time delay system are either real or complex conjugate pairs and therefore, the whole eigenspectrum can be associated with only two real branches of the Lambert W function. A new class of time delay systems is characterized to extend the applicability of the above said method. A state variable transformation is used to transform the proposed class of systems into the common canonical form. Moreover, this approach has been exploited to design a controller which places a subset of eigenvalues at desired locations. Stability is analyesed by the help of Nyquist plot. The approach is validated through an example.
In this paper, a new nonlinear identification framework is proposed to address the issue of off-line computation of moving-horizon observer estimate. The proposed structure merges the advantages of nonlinear approximators with the efficient computation of constrained quadratic programming problems. A bound on the estimation error is proposed and the efficiency of the resulting scheme is illustrated using two state estimation examples.
This paper presents a UAV-based optimal crop-dusting method to control anomalously diffusing infestation of crops. Two anomalous diffusion models are considered, which are, respectively, time-fractional order diffusion equation and space-fractional order diffusion equation. Our problem formulation is motivated by real-time pest management by using networked unmanned cropdusters where the pest spreading is modeled as a fractional diffusion equation. We attempt to solve the optimal dynamic location of actuators by using Centroidal Voronoi Tessellations. A new simulation platform (FO-DiffMAS-2D) for measurement scheduling and controls in fractional order distributed parameter systems is also introduced in this paper. Simulation results are presented to show the effectiveness of the proposed method as well as the role of fractional order in the overall control performance.
We consider a transportation system of heterogeneously connected vehicles, where not all vehicles are able to communicate. Heterogeneous connectivity in transportation systems is coupled to practical constraints such that (i) not all vehicles may be equipped with devices having communication interfaces, (ii) some vehicles may not prefer to communicate due to privacy and security reasons, and (iii) communication links are not perfect and packet losses and delay occur in practice. In this context, it is crucial to develop control algorithms by taking into account the heterogeneity. In this paper, we particularly focus on making traffic phase scheduling decisions. We develop a connectivity-aware traffic phase scheduling algorithm for heterogeneously connected vehicles that increases the intersection efficiency (in terms of the average number of vehicles that are allowed to pass the intersection) by taking into account the heterogeneity. The simulation results show that our algorithm significantly improves the efficiency of intersections as compared to the baselines.
This work develops a measurement-driven and model-based formal verification approach, applicable to systems with partly unknown dynamics. We provide a principled method, grounded on reachability analysis and on Bayesian inference, to compute the confidence that a physical system driven by external inputs and accessed under noisy measurements, verifies a temporal logic property. A case study is discussed, where we investigate the bounded- and unbounded-time safety of a partly unknown linear time invariant system.
In this contribution, we derive ILEG, an iterative algorithm to find risk sensitive solutions to nonlinear, stochastic optimal control problems. The algorithm is based on a linear quadratic approximation of an exponential risk sensitive nonlinear control problem. ILEG allows to find risk sensitive policies and thus generalizes previous algorithms to solve nonlinear optimal control based on iterative linear-quadratic methods. Depending on the setting of the parameter controlling the risk sensitivity, two different strategies on how to cope with the risk emerge. For positive-value parameters, the control policy uses high feedback gains whereas for negative-value parameters, it uses a robust feedforward control strategy (a robust plan) with low gains. These results are illustrated with a simple example. This note should be considered as a preliminary report.
This paper proposes a new approach to multisensor data fusion, suggesting by considering information about the sensors  different characteristics, aggregation of data acquired by individual sensors can be done more efficient. Same as the most effective sensors  characteristics, especially in control systems, our focus is on sensors  accuracy and frequency response. A rule-based fuzzy system is presented for fusion of raw data obtained from the sensors having complement characteristics in accuracy and bandwidth. Furthermore, a fuzzy predictor system is also suggested aiming to extremely high accuracy for highly sensitive applications. The great advantages of the proposed sensor fusion system are revealed on simulation results of a control system utilizing the fusion system for output estimation.
This paper presents a novel model of large-size tilt-rotor aircraft, which can operate as a helicopter as well as being capable of transition to fixed-wing flight. Aerodynamics of the dynamic large-size tilt-rotors based on blade element method is analyzed during mode transition. For the large-size aircraft with turboshaft engines, the blade pitch angles of the rotors are regulated to vary according to the desired level of thrust, and the following expressions are formulated explicitly: rotor thrust and blade pitch angle, drag torque and blade pitch angle. A finite-time convergent observer based on Lyapunov function is developed to reconstruct the unknown variables and uncertainties during mode transitions. The merits of this design include the modeling of dynamic large-size tilt-rotor, ease of the uncertainties estimation during the tilting and the widely applications. Moreover, a switched logic controller based on the finite-time convergent observer is proposed to drive the aircraft to implement the mode transition with invariant flying height.
Nowadays, asynchronous motors have wide range use in many industrial applications. Field oriented control (FOC) and direct torque control (DTC) are commonly used methods in high performance vector control for asynchronous motors. Therefore, it is very important to identify clearly advantages and disadvantages of both systems in the selection of appropriate control methods for many industrial applications. This paper aims to present a new and different perspective regarding the comparison of the switching behaviours on the FOC and the DTC drivers. For this purpose, the experimental studies have been carried out to compare the inverter switching frequencies and torque responses of the asynchronous motor in the FOC and the DTC systems under different working conditions. The dSPACE 1103 controller board was programmed with Matlab/Simulink software. As expected, the experimental studies showed that the FOC controlled motors has a lessened torque ripple. On the other hand, the FOC controlled motor switching frequency has about 65-75% more than the DTC controlled under both loaded and unloaded working conditions.
Genetic Algorithm (GA) has been used in this paper for a new Nyquist based sub-optimal model reduction and optimal time domain tuning of PID and fractional order (FO) PI{\\lambda}D{\\mu} controllers. Comparative studies show that the new model reduction technique outperforms the conventional H2-norm based reduced order modeling techniques. Optimum tuning rule has been developed next with a test-bench of higher order processes via Genetic Programming (GP) with minimum value of weighted integral error index and control signal. From the Pareto optimal front which is a trade-off between the complexity of the formulae and control performance, an efficient set of tuning rules has been generated for time domain optimal PID and PI{\\lambda}D{\\mu} controllers.
Performing a stability analysis during the design of any electronic circuit is critical to guarantee its correct operation. A closed-loop stability analysis can be performed by analysing the impedance presented by the circuit at a well-chosen node without internal access to the simulator. If any of the poles of this impedance lie in the complex right half-plane, the circuit is unstable. The classic way to detect unstable poles is to fit a rational model on the impedance. This rational approximation has to deal with model order selection, which is difficult in circuits with transmission lines. In this paper, a projection-based method is proposed which splits the impedance into a stable and an unstable part by projecting on an orthogonal basis of stable and unstable functions. Working with a projection instead of a rational approximation greatly simplifies the stability analysis. When the projection is mapped from the complex plane to the unit disc, the projection boils down to calculating a Fourier series. If a significant part of the impedance is projected on the unstable part, a low-order rational approximation is fitted on this unstable part to find the location of the unstable poles.
We consider platoons composed of identical vehicles with an asymmetric nearest-neighbor interaction. We restrict ourselves to intervehicular coupling realized with dynamic arbitrary-order onboard controllers such that the coupling to the immediately preceding vehicle is proportional to the coupling to the immediately following vehicle. Each vehicle is modeled using a transfer function and we impose no restriction on the order of the vehicle. The platoon is described by a transfer function in a convenient product form. We investigate how the H-infinity norm and the steady-state gain of the platoon scale with the number of vehicles. We conclude that if the open-loop transfer function of the vehicle contains two or more integrators and the Fiedler eigenvalue of the graph Laplacian is uniformly bounded from below, the norm scales exponentially with the growing distance in the graph. If there is just one integrator in the open loop, we give a condition under which the norm of the transfer function is bounded by its steady-state gain - the platoon is string-stable. Moreover, we argue that in this case it is always possible to design a controller the predecessor following strategy.
The electrical structure of the power grid is utilized to address the phasor measurement unit (PMU) placement problem. First, we derive the connectivity matrix of the network using the resistance distance metric and employ it in the linear program formulation to obtain the optimal number of PMUs, for complete network observability without zero injection measurements. This approach was developed by the author in an earlier work, but the solution methodology to address the location problem did not fully utilize the electrical properties of the network, resulting in an ambiguity. In this paper, we settle this issue by exploiting the coupling structure of the grid derived using the singular value decomposition (SVD)-based analysis of the resistance distance matrix to solve the location problem. Our study, which is based on recent advances in complex networks that promote the electrical structure of the grid over its topological structure and the SVD analysis which throws light on the electrical coupling of the network, results in a unified framework for the electrical structure-based PMU placement. The proposed method is tested on IEEE bus systems, and the results uncover intriguing connections between the singular vectors and average resistance distance between buses in the network.
The integration of microgrids that depend on the renewable distributed energy resources with the current power systems is a critical issue in the smart grid. In this paper, we propose a non-cooperative game-theoretic framework to study the strategic behavior of distributed microgrids that generate renewable energies and characterize the power generation solutions by using the Nash equilibrium concept. Our framework not only incorporates economic factors but also takes into account the stability and efficiency of the microgrids, including the power flow constraints and voltage angle regulations. We develop two decentralized update schemes for microgrids and show their convergence to a unique Nash equilibrium. Also, we propose a novel fully distributed PMU-enabled algorithm which only needs the information of voltage angle at the bus. To show the resiliency of the distributed algorithm, we introduce two failure models of the smart grid. Case studies based on the IEEE 14-bus system are used to corroborate the effectiveness and resiliency of the proposed algorithms.
In this work a theory is developed for unifying large classes of nonlinear discrete-time dy- namical systems obeying a superposition of a weighted maximum or minimum type. The state vectors and input-output signals evolve on nonlinear spaces which we call complete weighted lat- tices and include as special cases the nonlinear vector spaces of minimax algebra. Their algebraic structure has a polygonal geometry. Some of the special cases unified include max-plus, max- product, and probabilistic dynamical systems. We study problems of representation in state and input-output spaces using lattice monotone operators, state and output responses using non- linear convolutions, solving nonlinear matrix equations using lattice adjunctions, stability and controllability. We outline applications in state-space modeling of nonlinear filtering; dynamic programming (Viterbi algorithm) and shortest paths (distance maps); fuzzy Markov chains; and tracking audio-visual salient events in multimodal information streams using generalized hidden Markov models with control inputs.
The sharing economy has disrupted housing and transportation sectors. Homeowners can rent out their property when they are away on vacation, car owners can offer ride sharing services. These sharing economy business models are based on monetizing under-utilized infrastructure. They are enabled by peer-to-peer platforms that match eager sellers with willing buyers. Are there compelling sharing economy opportunities in the electricity sector? What products or services can be shared in tomorrow s Smart Grid? We begin by exploring sharing economy opportunities in the electricity sector, and discuss regulatory and technical obstacles to these opportunities. We then study the specific problem of a collection of firms sharing their electricity storage. We characterize equilibrium prices for shared storage in a spot market. We formulate storage investment decisions of the firms as a non-convex non-cooperative game. We show that under a mild alignment condition, a Nash equilibrium exists, it is unique, and it supports the social welfare. We discuss technology platforms necessary for the physical exchange of power, and market platforms necessary to trade electricity storage. We close with synthetic examples to illustrate our ideas.
In this paper, we improve iterative greedy search algorithms in which atoms are selected serially over iterations, i.e., one-by-one over iterations. For serial atom selection, we devise two new schemes to select an atom from a set of potential atoms in each iteration. The two new schemes lead to two new algorithms. For both the algorithms, in each iteration, the set of potential atoms is found using a standard matched filter. In case of the first scheme, we propose an orthogonal projection strategy that selects an atom from the set of potential atoms. Then, for the second scheme, we propose a look ahead strategy such that the selection of an atom in the current iteration has an effect on the future iterations. The use of look ahead strategy requires a higher computational resource. To achieve a trade-off between performance and complexity, we use the two new schemes in cascade and develop a third new algorithm. Through experimental evaluations, we compare the proposed algorithms with existing greedy search and convex relaxation algorithms.
We study the problem of finite-horizon probabilistic invariance for discrete-time Markov processes over general (uncountable) state spaces. We compute discrete-time, finite-state Markov chains as formal abstractions of general Markov processes. Our abstraction differs from existing approaches in two ways. First, we exploit the structure of the underlying Markov process to compute the abstraction separately for each dimension. Second, we employ dynamic Bayesian networks (DBN) as compact representations of the abstraction. In contrast, existing approaches represent and store the (exponentially large) Markov chain explicitly, which leads to heavy memory requirements limiting the application to models of dimension less than half, according to our experiments. We show how to construct a DBN abstraction of a Markov process satisfying an independence assumption on the driving process noise. We compute a guaranteed bound on the error in the abstraction w.r.t.\\ the probabilistic invariance property; the dimension-dependent abstraction makes the error bounds more precise than existing approaches. Additionally, we show how factor graphs and the sum-product algorithm for DBNs can be used to solve the finite-horizon probabilistic invariance problem. Together, DBN-based representations and algorithms can be significantly more efficient than explicit representations of Markov chains for abstracting and model checking structured Markov processes.
The blocking problem naturally arises in transportation systems as multiple vehicles with different itineraries share available resources. In this paper, we investigate the impact of the blocking problem to the waiting time at the intersections of transportation systems. We assume that different vehicles, depending on their Internet connection capabilities, may communicate their intentions (e.g., whether they will turn left or right or continue straight) to intersections (specifically to devices attached to traffic lights). We consider that information collected by these devices are transmitted to and processed in a cloud-based traffic control system. Thus, a cloud-based system, based on the intention information, can calculate average waiting times at intersections. We consider this problem as a queuing model, and we characterize average waiting times by taking into account (i) blocking probability, and (ii) vehicles  ability to communicate their intentions. Then, by using average waiting times at intersection, we develop a shortest delay algorithm that calculates the routes with shortest delays between two points in a transportation network. Our simulation results confirm our analysis, and demonstrate that our shortest delay algorithm significantly improves over baselines that are unaware of the blocking problem.
In this paper we study both the value function and $\\mathcal{Q}$-function formulation of the Linear Programming (LP) approach to ADP. The approach selects from a restricted function space to fit an approximate solution to the true optimal Value function and $\\mathcal{Q}$-function. Working in the discrete-time, continuous-space setting, we extend and prove guarantees for the fitting error and online performance of the policy, providing tighter bounds. We provide also a condition that allows the $\\mathcal{Q}$-function approach to be more efficiently formulated in many practical cases.
This paper presents a general form of integral sliding mode manifold, and proposes an algorithmic approach based on Sum of Squares (SOS) programming to design generalized integral sliding mode manifold and controller for nonlinear systems with both matched and unmatched uncertainties. The approach also gives a sufficient condition for successful design of controller and manifold parameters. The result of the paper is then verified by several simulation examples and two practical applications, namely Glucose-insulin regulation problem and the unicycle dynamics steering problem are considered.
The research area of Networked Control Systems (NCS) has been the topic of intensive study in the last decade. In this paper we give a contribution to this research line by addressing symbolic control design of (possibly unstable) nonlinear NCS with specifications expressed in terms of automata. We first derive symbolic models that are shown to approximate the given NCS in the sense of (alternating) approximate simulation. We then address symbolic control design with specifications expressed in terms of automata. We finally derive efficient algorithms for the synthesis of the proposed symbolic controllers that cope with the inherent computational complexity of the problem at hand.
This paper proposes a strategy to estimate the velocity and position of neighbor agents using distance measurements only. Since with agents executing arbitrary motions, instantaneous distance-only measurements cannot provide enough information for our objectives, we postulate that agents engage in a combination of circular motion and linear motion. The proposed estimator can be used to develop control algorithms where only distance measurements are available to each agent. As an example, we show how this estimation method can be used to control the formation shape and velocity of the agents in a multi agent system. Simulation results are provided to illustrate the performance of the proposed algorithm.
We consider the actuator placement problem for linear systems. Specifically, we aim to identify an actuator which requires the least amount of control energy to drive the system from an arbitrary initial condition to the origin in the worst case. Said otherwise, we investigate the minimax problem of minimizing the control energy over the worst possible initial conditions. Recall that the least amount of control energy needed to drive a linear controllable system from any initial condition on the unit sphere to the origin is upper-bounded by the inverse of the smallest eigenvalue of the associated controllability Gramian, and moreover, the upper-bound is sharp. The minimax problem can be thus viewed as the optimization problem of minimizing the upper-bound via the placement of an actuator. In spite of its simple and natural formulation, this problem is difficult to solve. In fact, properties such as the stability of the system matrix, which are not related to controllability, now play important roles. We focus in this paper on the special case where the system matrix is positive definite. Under this assumption, we are able to provide a complete solution to the optimal actuator placement problem and highlight the difficulty in solving the general problem.
The concept of integration is generally applicable to automatic control of processes. As shown in this paper, integral controller performs efficient searches in the extensive prime sets, too. An inspiration by the simple analytic rules for PID controller tuning results in integral controller that ensures predictable work regardless of the cardinality of primes. It gives an innovative application of the feedback control which relates to a gradient method.
We show that a sub-homogeneous positive monotone system with bounded heterogeneous time-varying delays is globally asymptotically stable if and only if the corresponding delay-free system is globally asymptotically stable. The proof is based on an extension of a delay-independent stability result for monotone systems under constant delays by Smith to systems with bounded heterogeneous time-varying delays. Under the additional assumption of positivity and sub-homogeneous vector fields, we establish the aforementioned delay insensitivity property and derive a novel test for global asymptotic stability. If the system has a unique equilibrium point in the positive orthant, we prove that our stability test is necessary and sufficient. Specialized to positive linear systems, our results extend and sharpen existing results from the literature.
The aim of the temperature control is to heat the system up todelimitated temperature, afterwardhold it at that temperature in insured manner. Fuzzy Logic Controller (FLC) is best way in which this type of precision control can be accomplished by controller. During past twenty yearssignificant amount of research using fuzzy logichas done in this field of control of non-linear dynamical system. Here we have developed temperature control system using fuzzy logic. Control theory techniques are the root from which convention controllers are deducted. The desired response of the output can be guaranteed by the feedback controller.
The ultra large multi-agent systems are becoming increasingly popular due to quick decay of the individual production costs and the potential of speeding up the solving of complex problems. Examples include nano-robots, or systems of nano-satellites for dangerous meteorite detection, or cultures of stem cells for organ regeneration or nerve repair. The topics associated with these systems are usually dealt within the theories of intelligent swarms or biologically inspired computation systems. Stochastic models play an important role and they are based on various formulations of the mechanical statistics. In these cases, the main assumption is that the swarm elements have a simple behaviour and that some average properties can be deduced for the entire swarm. In contrast, complex systems in areas like aeronautics are formed by elements with sophisticated behaviour, which are even autonomous. In situations like this, a new approach to swarm coordination is necessary. We present a stochastic model where the swarm elements are communicating autonomous systems, the coordination is separated from the component autonomous activity and the entire swarm can be abstracted away as a piecewise deterministic Markov process, which constitutes one of the most popular model in stochastic control. Keywords: ultra large multi-agent systems, system of systems, autonomous systems, stochastic hybrid systems.
This paper proposes a novel direct adaptive control method for rejecting unknown deterministic disturbances and tracking unknown trajectories in systems with uncertain dynamics when the disturbances or trajectories are the summation of multiple sinusoids with known frequencies, such as periodic profiles or disturbances. The proposed algorithm does not require a model of the plant dynamics and does not use batches of measurements in the adaptation process. Moreover, it is applicable to both minimum and non-minimum phase plants. The algorithm is a \"direct\" adaptive method, in the sense that the identification of system parameters and the control design are performed simultaneously. In order to verify the effectiveness of the proposed method, an add-on controller is designed and implemented in the servo system of a hard disk drive to track unknown nano-scale periodic trajectories.
Stochastic unit commitment models typically handle uncertainties in forecast demand by considering a finite number of realizations from a stochastic process model for loads. Accurate evaluations of expectations or higher moments for the quantities of interest require a prohibitively large number of model evaluations. In this paper we propose an alternative approach based on using surrogate models valid over the range of the forecast uncertainty. We consider surrogate models based on Polynomial Chaos expansions, constructed using sparse quadrature methods. Considering expected generation cost, we demonstrate the approach can lead to several orders of magnitude reduction in computational cost relative to using Monte Carlo sampling on the original model, for a given target error threshold.
This paper focusses on the application of fuzzy control techniques (fuzzy type-1 and type-2) and their hybrid forms (Hybrid adaptive fuzzy controller and fuzzy-PID controller) in the area of stabilized platforms. It represents an attempt to cover the basic principles and concepts of fuzzy control in stabilization and position control, with an outline of a number of recent applications used in advanced control of stabilized platform. Overall, in this survey we will make some comparisons with the classical control techniques such us PID control to demonstrate the advantages and disadvantages of the application of fuzzy control techniques.
In this paper we present a new approach towards global passive approximation in order to find a passive transfer function G(s) that is nearest in some well-defined matrix norm sense to a non-passive transfer function H(s). It is based on existing solutions to pertinent matrix nearness problems. It is shown that the key point in constructing the nearest passive transfer function, is to find a good rational approximation of the well-known ramp function over an interval defined by the minimum and maximum dissipation of H(s). The proposed algorithms rely on the stable anti-stable projection of a given transfer function. Pertinent examples are given to show the scope and accuracy of the proposed algorithms.
This paper considers the problem of detecting topology variations in dynamical networks. We consider a network whose behavior can be represented via a linear dynamical system. The problem of interest is then that of finding conditions under which it is possible to detect node or link disconnections from prior knowledge of the nominal network behavior and on-line measurements. The considered approach makes use of analysis tools from switching systems theory. A number of results are presented along with examples.
We study supervisor localization for timed discrete-event systems under partial observation and communication delay in the Brandin-Wonham framework. First, we employ timed relative observability to synthesize a partial-observation monolithic supervisor; the control actions of this supervisor include not only disabling action of prohibitible events (as that of controllable events in the untimed case) but also \"clock-preempting\" action of forcible events. Accordingly we decompose the supervisor into a set of partial-observation local controllers one for each prohibitible event, as well as a set of partial-observation local preemptors one for each forcible event. We prove that these local controllers and preemptors collectively achieve the same controlled behavior as the partial-observation monolithic supervisor does. Moreover, we propose channel models for inter-agent event communication and impose bounded and unbounded delay as temporal specifications. In this formulation, there exist multiple distinct observable event sets; thus we employ timed relative coobservability to synthesize partial-observation decentralized supervisors, and then localize these supervisors into local controllers and preemptors. The above results are illustrated by a timed workcell example.
Recent work on complex networks compared the topological and electrical structures of the power grid, taking into account the underlying physical laws that govern the electrical connectivity between various components in the network. A distance metric, namely, resistance distance was introduced to provide a more comprehensive description of interconnections in power systems compared with the topological structure, which is based only on geographic connections between network components. Motivated by these studies, in this paper we revisit the phasor measurement unit (PMU) placement problem by deriving the connectivity matrix of the network using resistance distances between buses in the grid, and use it in the integer program formulations for several standard IEEE bus systems. The main result of this paper is rather discouraging: more number of PMUs are required, compared with those obtained using the topological structure, to meet the desired objective of complete network observability without zero injection measurements. However, in light of recent advances in the electrical structure of the grid, our study provides a more realistic perspective of PMU placement in power systems. By further exploring the connectivity matrix derived using the electrical structure, we devise a procedure to solve the placement problem without resorting to linear programming.
We propose a distributed algorithm for time synchronization in mobile wireless sensor networks. Each node can employ the algorithm to estimate the global time based on its local clock time. The problem of time synchronization is formulated as nodes estimating their skews and offsets from noisy difference measurements of offsets and logarithm of skews; the measurements acquired by time-stamped message exchanges between neighbors. A distributed stochastic approximation based algorithm is proposed to ensure that the estimation error is mean square convergent (variance converging to 0) under certain conditions. A sequence of scheduled update instants is used to meet the requirement of decreasing time-varying gains that need to be synchronized across nodes with unsynchronized clocks. Moreover, a modification on the algorithm is also presented to improve the initial convergence speed. Simulations indicate that highly accurate global time estimates can be achieved with the proposed algorithm for long time durations, while the errors in competing algorithms increase over time.
A general framework is presented for analyzing the stability and performance of nonlinear and linear parameter varying (LPV) time delayed systems. First, the input/output behavior of the time delay operator is bounded in the frequency domain by integral quadratic constraints (IQCs). A constant delay is a linear, time-invariant system and this leads to a simple, intuitive interpretation for these frequency domain constraints. This simple interpretation is used to derive new IQCs for both constant and varying delays. Second, the performance of nonlinear and LPV delayed systems is bounded using dissipation inequalities that incorporate IQCs. This step makes use of recent results that show, under mild technical conditions, that an IQC has an equivalent representation as a finite-horizon time-domain constraint. Numerical examples are provided to demonstrate the effectiveness of the method for both class of systems.
This paper presents a systematic approach to exponentially stabilize the periodic orbits of multi-domain hybrid systems arising from 3D bipedal walking. Firstly, the method of Poincare sections is extended to the hybrid systems with multiple domains. Then, based on the properties of the Poincare maps, a continuous piecewise feedback control strategy is presented, and three methods are furthermore given to design the controller parameters based on the developed theorems. By those design methods, the controller parameters in each continuous phase can be designed independently, which allows the strategy to be applied to hybrid systems with multiple domains. Finally, the proposed strategy is illustrated by a simulation example. To show that the proposed strategy is not limited to bipedal robots with left-right symmetry property which is assumed in some previous works, an underactuated 3D bipedal robot with asymmetric walking gait is considered.
This paper analyzes a nuclear reactor power signal that suffers from network induced random delays in the shared data network while being fed-back to the Reactor Regulating System (RRS). A detailed study is carried out to investigate the self similarity of random delay dynamics due to the network traffic in shared medium. The fractionality or selfsimilarity in the network induced delay that corrupts the measured power signal coming from Self Powered Neutron Detectors (SPND) is estimated and analyzed. As any fractional order randomness is intrinsically different from conventional Gaussian kind of randomness, these delay dynamics need to be handled efficiently, before reaching the controller within the RRS. An attempt has been made to minimize the effect of the randomness in the reactor power transient data with few classes of smoothing filters. The performance measure of the smoothers with fractional order noise consideration is also investigated into.
The recent years have witnessed increased development of small, autonomous fixed-wing Unmanned Aerial Vehicles (UAVs). In order to unlock widespread applicability of these platforms, they need to be capable of operating under a variety of environmental conditions. Due to their small size, low weight, and low speeds, they require the capability of coping with wind speeds that are approaching or even faster than the nominal airspeed. In this paper we present a principled nonlinear guidance strategy, addressing this problem. More broadly, we propose a methodology for the high-level control of non-holonomic unicycle-like vehicles in the presence of strong flowfields (e.g. winds, underwater currents) which may outreach the maximum vehicle speed. The proposed strategy guarantees convergence to a safe and stable vehicle configuration with respect to the flowfield, while preserving some tracking performance with respect to the target path. Evaluations in simulations and a challenging real-world flight experiment in very windy conditions confirm the feasibility of the proposed guidance approach.
There has been much research on network flows over time due to their important role in real world applications. This has led to many results, but the more challenging continuous time model still lacks some of the key concepts and techniques that are the cornerstones of static network flows. The aim of this paper is to advance the state of the art for dynamic network flows by developing the continuous time analogues of the theory for static network flows. Specifically, we make use of ideas from the static case to establish a reduced cost optimality condition, a negative cycle optimality condition, and a strong duality result for a very general class of network flows over time.
In this paper, the problem of false information injection attack and defense on state estimation in dynamic multi-sensor systems is investigated from a game theoretic perspective. The relationship between the Kalman filter and the adversary can be regarded as a two-person zero-sum game. Under which condition both sides of the game will reach the Nash equilibrium is investigated in the paper. The multi-sensor Kalman filter system and the adversary are supposed to be rational players. The Kalman filter and the adversary have to choose their respective subsets of sensors to perform system state estimation and false information injection. It is shown how both sides pick their strategies in order to gain more and lose less. The optimal solutions are achieved by solving the minimax problem. Numerical results are also provided in order to illustrate the effectiveness of the derived optimal strategies.
In this paper, we consider the consensus problem of hybrid multi-agent system. First, the hybrid multi-agent system is proposed which is composed of continuous-time and discrete-time dynamic agents. Then, three kinds of consensus protocols are presented for hybrid multi-agent system. The analysis tool developed in this paper is based on the matrix theory and graph theory. With different restrictions of the sampling period, some necessary and sufficient conditions are established for solving the consensus of hybrid multi-agent system. The consensus states are also obtained under different protocols. Finally, simulation examples are provided to demonstrate the effectiveness of our theoretical results.
Linear Time Invariant (LTI) systems are ubiquitous in control applications. Unbounded-time reachability analysis that can cope with industrial-scale models with thousands of variables is needed. To tackle this problem, we use abstract acceleration, a method for unbounded-time polyhedral reachability analysis for linear systems. Existing variants of the method are restricted to closed systems, i.e., dynamical models without inputs or non-determinism. In this paper, we present an extension of abstract acceleration to linear loops with inputs, which correspond to discrete-time LTI control systems under guard conditions. The new method relies on a relaxation of the solution of the linear dynamical equation that leads to a precise over-approximation of the set of reachable states, which are evaluated using support functions. In order to increase scalability, we use floating-point computations and ensure soundness by interval arithmetic. Our experiments show that performance increases by several orders of magnitude over alternative approaches in the literature. In turn, this tremendous gain allows us to improve on precision by computing more expensive abstractions. We outperform state-of-the-art tools for unbounded-time analysis of LTI system with inputs in speed as well as in precision.
We consider the joint estimation of multipath channels obtained with a set of receiving antennas and uniformly probed in the frequency domain. This scenario fits most of the modern outdoor communication protocols for mobile access or digital broadcasting among others. Such channels verify a Sparse Common Support property (SCS) which was used in a previous paper to propose a Finite Rate of Innovation (FRI) based sampling and estimation algorithm. In this contribution we improve the robustness and computational complexity aspects of this algorithm. The method is based on projection in Krylov subspaces to improve complexity and a new criterion called the Partial Effective Rank (PER) to estimate the level of sparsity to gain robustness. If P antennas measure a K-multipath channel with N uniformly sampled measurements per channel, the algorithm possesses an O(KPNlogN) complexity and an O(KPN) memory footprint instead of O(PN^3) and O(PN^2) for the direct implementation, making it suitable for K << N. The sparsity is estimated online based on the PER, and the algorithm therefore has a sense of introspection being able to relinquish sparsity if it is lacking. The estimation performances are tested on field measurements with synthetic AWGN, and the proposed algorithm outperforms non-sparse reconstruction in the medium to low SNR range (< 0dB), increasing the rate of successful symbol decodings by 1/10th in average, and 1/3rd in the best case. The experiments also show that the algorithm does not perform worse than a non-sparse estimation algorithm in non-sparse operating conditions, since it may fall-back to it if the PER criterion does not detect a sufficient level of sparsity. The algorithm is also tested against a method assuming a \"discrete\" sparsity model as in Compressed Sensing (CS). The conducted test indicates a trade-off between speed and accuracy.
The paper deals with the new control method developed for the pressure sewer systems. This method eliminates the disadvantages of currently common used on-off regulation. The major disadvantage is a transition of inconstancies of the effluent production into the sewage system. The propose method is primarily based on the principle of an allocation of the drawing off into the given time slots. This control method is further improved by the extended modules provide higher level of the optimization (learning mode and emergent drawing off). Proposed method is able to decrease of the standard deviation of pumping even by 80%.
Estimating the temperature distribution within Li-ion batteries during operation is critical for safety and control purposes. Although existing control-oriented thermal models - such as thermal equivalent circuits (TEC) - are computationally efficient, they only predict average temperatures, and are unable to predict the spatially resolved temperature distribution throughout the cell. We present a low-order 2D thermal model of a cylindrical battery based on a Chebyshev spectral-Galerkin (SG) method, capable of predicting the full temperature distribution with a similar efficiency to a TEC. The model accounts for transient heat generation, anisotropic heat conduction, and non-homogeneous convection boundary conditions. The accuracy of the model is validated through comparison with finite element simulations, which show that the 2-D temperature field (r, z) of a large format (64 mm diameter) cell can be accurately modelled with as few as 4 states. Furthermore, the performance of the model for a range of Biot numbers is investigated via frequency analysis. For larger cells or highly transient thermal dynamics, the model order can be increased for improved accuracy. The incorporation of this model in a state estimation scheme with experimental validation against thermocouple measurements is presented in the companion contribution (Part II).
We address a particular problem of output regulation for multi-input multi-output nonlinear systems. Specifically, we are interested in making the stability of an equilibrium point and the regulation to zero of an output, robust to (small) unmodelled discrepancies between design model and actual system in particular those introducing an offset. We propose a novel procedure which is intended to be relevant to real life systems, as illustrated by a (non academic) example.
We introduce a novel distributed control architecture for heterogeneous platoons of linear time--invariant autonomous vehicles. Our approach is based on a generalization of the concept of {\\em leader--follower} controllers for which we provide a Youla--like parameterization while the sparsity constraints are imposed on the controller s left coprime factors, outlying a new concept of structural constraints in distributed control. The proposed scheme is amenable to optimal controller design via norm based costs, it guarantees string stability and eliminates the accordion effect from the behavior of the platoon. We also introduce a synchronization mechanism for the exact compensation of the time delays induced by the wireless broadcasting of information.
This brief memo reviews the theory of Unknown Input Observers (UIO) for state estimation in systems subject to disturbance inputs that are not known a priori. One main advantage of the UIO is that the observer structure naturally decouples the plant inputs from the state estimation process. This advantage is highlighted in three example dynamic systems commonly found in control theory. It is shown that the estimation error for all three systems asymptotically approaches zero by application of the UIO under the influence of dynamic disturbances.
Power systems are usually large non-linear systems, which are often subjected to low frequency electromechanical oscillations. Power System Stabilizers are often used as effective and economic means for damping the generator s electromechanical oscillations and enhance the overall stability of power systems. Power system stabilizers have been applied for several decades in utilities and they can extend power transfer stability limits by adding modulation signal through excitation control system. Sliding mode control is one of the main methods employed to overcome the uncertainty of the system. This controller can be applied very well in presence of both parameter uncertainties and unknown nonlinear function such as disturbance. To enhance stability and improve dynamic response of the system operating in faulty conditions a Fuzzy based Sliding Mode Control Power System Stabiliser is developed for a multimachine system with two generators and it is compared with the Conventional Power System Stabiliser, Fuzzy based Power System Stabiliser, Sliding Mode based Power System Stabiliser.
This paper investigates vision-based cooperative estimation of a 3D target object pose for visual sensor networks. In our previous works, we presented an estimation mechanism called networked visual motion observer achieving averaging of local pose estimates in real time. This paper extends the mechanism so that it works even in the presence of cameras not viewing the target due to the limited view angles and obstructions in order to fully take advantage of the networked vision system. Then, we analyze the averaging performance attained by the proposed mechanism and clarify a relation between the feedback gains in the algorithm and the performance. Finally, we demonstrate the effectiveness of the algorithm through simulation.
We consider a smart-grid connecting several agents, modeled as stochastic dynamical systems, who may be electricity consumers/producers. At each discrete time instant, which may represent a 15 minute interval, each agent may consume/generate some quantity of electrical energy. The Independent System Operator (ISO) is given the task of assigning consumptions/generations to the agents so as to maximize the sum of the utilities accrued to the agents, subject to the constraint that energy generation equals consumption at each time. This task of coordinating generation and demand has to be accomplished by the ISO without the agents revealing their system states, dynamics, or utility/cost functions. We show how and when a simple iterative procedure converges to the optimal solution. The ISO iteratively obtains electricity bids by the agents, and declares the tentative market clearing prices. In response to these prices, the agents submit new bids. On the demand side, the solution yields an optimal demand response for dynamic and stochastic loads. On the generation side, it provides the optimal utilization of stochastically varying renewables such as solar/wind, and generation with fossil fuel based generation with dynamic constraints such as ramping rates. Thereby we solve a decentralized stochastic control problem, without agents sharing any information about their system models, states or utility functions.
In this paper, we provide a Dynamic Programming algorithm for on-line monitoring of the state robustness of Metric Temporal Logic specifications with past time operators. We compute the robustness of MTL with unbounded past and bounded future temporal operators MTL over sampled traces of Cyber-Physical Systems. We implemented our tool in Matlab as a Simulink block that can be used in any Simulink model. We experimentally demonstrate that the overhead of the MTL robustness monitoring is acceptable for certain classes of practical specifications.
In a leader-follower multi-agent system (MAS), the leader agents act as control inputs and influence the states of the remaining follower agents. The rate at which the follower agents converge to their desired states, as well as the errors in the follower agent states prior to convergence, are determined by the choice of leader agents. In this paper, we study leader selection in order to minimize convergence errors experienced by the follower agents, which we define as a norm of the distance between the follower agents  intermediate states and the convex hull of the leader agent states. By introducing a novel connection to random walks on the network graph, we show that the convergence error has an inherent supermodular structure as a function of the leader set. Supermodularity enables development of efficient discrete optimization algorithms that directly approximate the optimal leader set, provide provable performance guarantees, and do not rely on continuous relaxations. We formulate two leader selection problems within the supermodular optimization framework, namely, the problem of selecting a fixed number of leader agents in order to minimize the convergence error, as well as the problem of selecting the minimum-size set of leader agents to achieve a given bound on the convergence error. We introduce algorithms for approximating the optimal solution to both problems in static networks, dynamic networks with known topology distributions, and dynamic networks with unknown and unpredictable topology distributions. Our approach is shown to provide significantly lower convergence errors than existing random and degree-based leader selection methods in a numerical study.
The process industry implements many techniques with certain parameters in its operations to control the working of several actuators on field. Amongst these actuators, DC motor is a very common machine. The angular position of DC motor can be controlled to drive many processes such as the arm of a robot. The most famous and well known controller for such applications is PID controller. It uses proportional, integral and derivative functions to control the input signal before sending it to the plant unit. In this paper, another controller based on Artificial Neural Network (ANN) control is examined to replace the PID controller for controlling the angular position of a DC motor to drive a robot arm. Simulation is performed in MATLAB after training the neural network (supervised learning) and it is shown that results are acceptable and applicable in process industry for reference control applications. The paper also indicates that the ANN controller can be less complicated and less costly to implement in industrial control applications as compared to some other proposed schemes.
This paper proposes a data-driven approach to detect the switching actions and topology transitions in distribution networks. It is based on the real time analysis of time-series voltages measurements. The analysis approach draws on data from high-precision phasor measurement units ($\\mu$PMUs or synchrophasors) for distribution networks. The key fact is that time-series measurement data taken from the distribution network has specific patterns representing state transitions such as topology changes. The proposed algorithm is based on comparison of actual voltage measurements with a library of signatures derived from the possible topologies simulation. The IEEE 33-bus model is used for the algorithm validation.
Muon tomography is developing as a promising system to detect high-Z (atomic number) material for ensuring homeland security. In the present work, three kinds of spatial locations of materials which are made of aluminum, iron, lead and uranium are simulated with GEANT4 codes, which are horizontal, diagonal and vertical objects, respectively. Two statistical algorithms are used with MATLAB software to reconstruct the image of detected objects, which are the Point of Closet Approach (PoCA) and Maximum Likelihood Scattering-Expectation Maximization iterative algorithm (MLS-EM), respectively. Two analysis methods are used to evaluate the quality of reconstruction image, which are the Receiver Operating Characteristic (ROC) and the localization ROC (LROC) curves, respectively. The reconstructed results show that, compared with PoCA algorithm, MLS-EM can achieve a better image quality in both edge preserving and noise reduction. And according to the analysis of ROC (LROC) curves, it shows that MLS-EM algorithm can discriminate and exclude the presence and location of high-Z object with a high efficiency, which is more flexible with an different EM algorithm employed than prior work. Furthermore the MLS-EM iterative algorithm will be modified and ran in parallel executive way for improving the reconstruction speed.
FASPAX (Fermi-Argonne Semiconducting Pixel Array X-ray detector) is being developed as a fast integrating area detector with wide dynamic range for time resolved applications at the upgraded Advanced Photon Source (APS.) A burst mode detector with intended $\\mbox{13 $MHz$}$ image rate, FASPAX will also incorporate a novel integration circuit to achieve wide dynamic range, from single photon sensitivity to $10^{\\text{5}}$ x-rays/pixel/pulse. To achieve these ambitious goals, a novel silicon sensor design is required. This paper will detail early design of the FASPAX sensor. Results from TCAD optimization studies, and characterization of prototype sensors will be presented.
In view of the trend towards smaller samples and experiments under extreme conditions it is important to deliver small and homogeneous neutron beams to the sample area. For this purpose, elliptic and/or Montel mirrors are ideally suited as the phase space of the neutrons can be defined far away from the sample. Therefore, only the useful neutrons will arrive at the sample position leading to a very low background. We demonstrate the ease of designing neutron transport systems using simple numeric tools, which are verified using Monte-Carlo simulations that allow to take into account effects of gravity and finite beam size. It is shown that a significant part of the brilliance can be transferred from the moderator to the sample. Our results may have a serious impact on the design of instruments at spallation sources such as the European Spallation Source (ESS) in Lund, Sweden.
\"Light Shining Through the Wall\" experiments can probe the existence of \"axion like particles\" through their weak coupling to photons. We have adapted such an experiment to the microwave regime and constructed the table top apparatus. This work presents an overview of the experimental setup and then focuses on our latest measurement run and its results. By operating the apparatus within a superconducting MRI magnet, competitive exclusion limits for axion like particles to the first generation optical light shining through the wall experiments have been achieved.
We measure the current noise of several cryogenic cables in a pulse tube based dilution refrigerator at frequencies between about 1~mHz and 50~kHz. We show that vibration-induced noise can be efficiently suppressed by using vacuum-insulated cables between room temperature and the 2nd pulse tube stage. A noise peak below 4 fA at the 1.4~Hz operation frequency of the pulse tube, and a white noise density of 0.44 fA/\\sqrt{Hz} in the millihertz range are obtained.
State of the art detector readout electronics require high-throughput data acquisition (DAQ) systems. In many applications, e. g. for medical imaging, the front-end electronics are set up as separate modules in a distributed DAQ. A standardized interface between the modules and a central data unit is essential. The requirements on such an interface are varied, but demand almost always a high throughput of data. Beyond this challenge, a Gigabit Ethernet interface is predestined for the broad requirements of Systems-on-a-Chip (SoC) up to large-scale DAQ systems. We have implemented an embedded protocol stack for a Field Programmable Gate Array (FPGA) capable of high-throughput data transmission and clock synchronization. A versatile stack architecture for the User Datagram Protocol (UDP) and Internet Control Message Protocol (ICMP) over Internet Protocol (IP) such as Address Resolution Protocol (ARP) as well as Precision Time Protocol (PTP) is presented. With a point-to-point connection to a host in a MicroTCA system we achieved the theoretical maximum data throughput limited by UDP both for 1000BASE-T and 1000BASE-KX links. Furthermore, we show that the random jitter of a synchronous clock over a 1000BASE-T link for a PTP application is below 60 ps.
This note summarises the workshop LCTW09 held between the 3.11.2009 and 5.11.2009 at LAL Orsay. The workshop was dedicated to discuss the beam tests in the years 2010 up to 2013 for detectors to be operated at a future linear electron positron collider. The document underlines the rich R&D program on these detectors in the coming years. Large synergies were identified in the DAQ and software systems. Considerable consolidation of resources are expected from the establishment of semi-permanent beam lines for linear collider detector R&D at major centres like CERN and FNAL. Reproducing a beam structure as foreseen for the International Linear Collider (ILC) would clearly enhance the value of the obtained beam test results. Although not ultimately needed for every research program, all groups would exploit such a feature if it is available.
The XENON1T experiment aims for the direct detection of dark matter in a cryostat filled with 3.3 tons of liquid xenon. In order to achieve the desired sensitivity, the background induced by radioactive decays inside the detector has to be sufficiently low. One major contributor is the $\\beta$-emitter $^{85}$Kr which is an intrinsic contamination of the xenon. For the XENON1T experiment a concentration of natural krypton in xenon $\\rm{^{nat}}$Kr/Xe < 200 ppq (parts per quadrillion, 1 ppq = 10$^{-15}$ mol/mol) is required. In this work, the design of a novel cryogenic distillation column using the common McCabe-Thiele approach is described. The system demonstrated a krypton reduction factor of 6.4$\\cdot$10$^5$ with thermodynamic stability at process speeds above 3 kg/h. The resulting concentration of $\\rm{^{nat}}$Kr/Xe < 26 ppq is the lowest ever achieved, almost one order of magnitude below the requirements for XENON1T and even sufficient for future dark matter experiments using liquid xenon, such as XENONnT and DARWIN.
It is proposed a novel design of an X-ray monochromator which uses three crystals. The exit beam turns in horizontal plane on the angle $2\\alpha$ with respect to the incoming beam. So, this kind of monochromator is suitable for side beam-lines; several tunable beam-lines can be built for a one fan beam of synchrotron radiation (from wiggler or bending magnet). In contrast to the double-crystal scheme of general position considered previously (which also suitable for side beam-lines), the new variant does not lead to a tilt of exit beam profile.
The instrumental concept of HERITAGE - a reflectometer with a horizontal sample geometry - fitted to the long pulse structure of a neutron source is presented. It is dedicated on creating a new class of reflectometers achieving the unprecedentedly high flux for classical specular reflectometry combined with off-specular reflectometry and grazing incidence small-angle scattering (GISANS), thus resulting in a complete 3-d exploration for lateral structures in thin films. This is achieved by specially designed neutron guides: in the horizontal direction (perpendicular to the scattering plane) it has an elliptic shape and focusses neutrons onto the sample. In the vertical direction it has a multichannel geometry providing a smooth divergence distribution at the sample while accepting the whole beam from a compact high-brilliance flat moderator. The modular collimation setup of HERITAGE provides an extremely high flexibility in respect to sample geometries and environments, including the possibility to study all types of solid and liquid interfaces statically or kinetically. Moreover, the use of multiple beam illumination allows for reflectivity and GISANS measurements at liquid interfaces both from above and below without any movement of the sample. This concept assures that reflectivity and GISANS measurements can be performed in its best way as the maximum possible and usable flux is delivered to the sample, outperforming all present-day or already planned for the ESS reflectometers and GISANS setups in flux and in measuring time for standard samples.
We review the theory of FEL oscillators operating with tapered undulators. We consider the case of a uniform tapering and introduce a parameter which characterizes the effect of the tapering on the gain and on the saturation intensity. We analyze the effect of the tapering on the FEL dynamics by including the pulse propagation effects too. We analyze the importance of tapering as a tool to model the optical pulse shapes and to control the higher harmonic intensities.
Stainless steel is the material used for the storage vessels and piping systems of LAB-based liquid scintillator in JUNO experiment. Aging is recognized as one of the main degradation mechanisms affecting the properties of liquid scintillator. LAB-based liquid scintillator aging experiments were carried out in different material of containers (type 316 and 304 stainless steel and glass) at two different temperature (40 and 25 degrees Celsius). For the continuous liquid scintillator properties tests, the light yield and the absorption spectrum are nearly the same as that of the unaged one. The attenuation length of the aged samples is 6%~12% shorter than that of the unaged one. But the concentration of element Fe in the LAB-based liquid scintillator does not show a clear change. So the self aging has small effect on liquid scintillator, as well as the stainless steel impurity quenching. Type 316 and 304 stainless steel can be used as LAB-based liquid scintillator vessel, transportation pipeline material.
Embedded RF contacts are integrated within the ITER ICRH launcher to allow assembling, sliding and to lower the thermo-mechanical stress. They have to withstand a peak RF current up to 2.5 kA at 55 MHz in steady-state conditions, in the vacuum environment of themachine.The contacts have to sustain a temperature up to 250{\\textdegree}Cduring several days in baking operations and have to be reliable during the whole life of the launcher without degradation. The RF contacts are critical components for the launcher performance and intensive R&D is therefore required, since no RF contactshave so far been qualified at these specifications. In order to test and validate the anticipated RF contacts in operational conditions, CEA has prepared a test platform consisting of a steady-state vacuum pumped RF resonator. In collaboration with ITER Organization and the CYCLE consortium (CYclotronCLuster for Europe), an R&D program has been conducted to develop RF contacts that meet the ITER ICRH launcher specifications. A design proposed by CYCLE consortium, using brazed lamellas supported by a spring to improve thermal exchange efficiency while guaranteeing high contact force, was tested successfully in the T-resonator up to 1.7 kA during 1200 s, but failed for larger current values due to a degradation of the contacts. Details concerning the manufacturing of the brazed contacts on its titanium holder, the RF tests results performed on the resonator and the non-destructive tests analysis of the contacts are given in this paper.
A procedure to measure the residual tilt angle $\\tau$ between a flat surface and the azimuthal rotation axis of the sample holder is described. When the incidence angle $\\theta$ and readout of the azimuthal angle $\\phi$ are controlled by motors, an active compensation mechanism can be implemented to reduce the effect of the tilt angle during azimuthal motion. After this correction, the effective angle of incidence is kept fixed, and only the small residual oscillation of the scattering plane remains.
The resolution and the linearity of time measurements made with the CMS electromagnetic calorimeter are studied with samples of data from test beam electrons, cosmic rays, and beam-produced muons. The resulting time resolution measured by lead tungstate crystals is better than 100 ps for energy deposits larger than 10 GeV. Crystal-to-crystal synchronization with a precision of 500 ps is performed using muons produced with the first LHC beams in 2008.
We propose a method for in-situ measurement of the length of kilometer size Fabry-Perot cavities in laser gravitational wave detectors. The method is based on the vernier, which occurs naturally when the laser incident on the cavity has a sideband. By changing the length of the cavity over several wavelengths we obtain a set of carrier resonances alternating with sideband resonances. From the measurement of the separation between the carrier and a sideband resonance we determine the length of the cavity. We apply the technique to the measurement of the length of a Fabry-Perot cavity in the Caltech 40m Interferometer and discuss the accuracy of the technique.
Recently we have shown a system developed to precisely control the laser pulse timing of excimer lasers [1]. The electronic circuit based on an embedded microcontroller and utilized the natural jitter noise of the laser pulse generation to improve the long term regulation of the delay of the laser related to an external trigger pulse. Based on our results we have developed an improved system that uses additional, programmable time delay units to tune the noise source to further enhance performance and allows reduction of complexity in the same time. A mixed-signal microcontroller generates a randomly dithered delay of the pulse generation moment to enhance the resolution and also runs a dedicated algorithm to optimize regulation. The compact, flexible hardware supports further enhancements; the signal processing algorithm can be replaced even by in-system reprogramming. Optimized processing and the relaxed hardware requirements may also support low-power operation, wireless communication, therefore the application possibilities may be extended to many other disciplines.
We developed a highly integrated and versatile electronic module to equip small nuclear physics experiments and lab teaching classes: the User friendly Configurable Trigger, scaler and delay Module for nuclear and particle physics (UCTM). It is configurable through a Graphical User Interface (GUI) and provides a large number of possible trigger conditions without any Hardware Description Language (HDL) required knowledge. This new version significantly enhances the previous capabilities by providing two additional features: signal digitization and time measurements. The design, performances and a typical application are presented.
The pixel detector is the innermost tracking device of the CMS experiment at the LHC. It is built from two independent sub devices, the pixel barrel and the end disks. The barrel consists of three concentric layers around the beam pipe with mean radii of 4.4, 7.3 and 10.2 cm. There are two end disks on each side of the interaction point at 34.5 cm and 46.5 cm. This article gives an overview of the pixel barrel detector, its mechanical support structure, electronics components, services and its expected performance.
We have developed a new detector of photons and charged particles- a hole-type structure with electrodes made of a double layered resistive material: a thin low resistive layer coated with a layer having a much higher resistivity. One of the unique features of this detector is its capability to operate at high gas gains (up to 10E4) in air or in gas mixtures with air. They can also operate in a cascaded mode or be combined with other detectors, for example with GEM. This opens new avenues in their applications. Several prototypes of these devices based on new detectors and oriented on practical applications were developed and successfully tested: a detector of soft X-rays and alpha particles, a flame sensor, a detector of dangerous gases. All of these detectors could operate stably even in humid air and/or in dusty conditions. The main advantages of these detectors are their simplicity, low cost and high sensitivity. For example, due to the avalanche multiplication, the detectors of flames and dangerous gases have a sensitivity of 10-100 times higher than commercial devices. We therefore believe that new detectors will have a great future.
The supercritical, reactor core melting and nuclear fuel leaking accidents have troubled fission reactors for decades, and greatly limit their extensive applications. Now these troubles are still open. Here we first show a possible perfect reactor, Molten-Salt Depleted-Uranium Reactor which is no above accident trouble. We found this reactor could be realized in practical applications in terms of all of the scientific principle, principle of operation, technology, and engineering. Our results demonstrate how these reactors can possess and realize extraordinary excellent characteristics, no prompt critical, long-term safe and stable operation with negative feedback, closed uranium-plutonium cycle chain within the vessel, normal operation only with depleted-uranium, and depleted-uranium high burnup in reality, to realize with fission nuclear energy sufficiently satisfying humanity long-term energy resource needs, as well as thoroughly solve the challenges of nuclear criticality safety, uranium resource insufficiency and low-carbon development. They could provide safe, cheap, abundant, and clean energy resource and electric power lasting thousands years for humanity.
We report initial measurements on our firstMoAu Transition Edge Sensors (TESs). The TESs formed from a bilayer of 40 nm of Mo and 106 nm of Au showed transition temperatures of about 320 mK, higher than identical TESs with a MoCu bilayer which is consistent with a reduced electron transmission coefficient between the bilayer films. We report measurements of thermal conductance in the 200 nm thick silicon nitride SiNx support structures at this temperature, TES dynamic behaviour and current noise measurements.
This paper describes the Fermilab Holometer, an instrument for measuring correlations of position variations over a four-dimensional volume of space-time. The apparatus consists of two co-located, but independent and isolated, 40m power-recycled Michelson interferometers, whose outputs are cross-correlated to 25 MHz. The data are sensitive to correlations of differential position across the apparatus over a broad band of frequencies up to and exceeding the inverse light crossing time, 7.6 MHz. A noise model constrained by diagnostic and environmental data distinguishes among physical origins of measured correlations, and is used to verify shot-noise-limited performance. These features allow searches for exotic quantum correlations that depart from classical trajectories at spacelike separations, with a strain noise power spectral density sensitivity smaller than the Planck time. The Holometer in current and future configurations is projected to provide precision tests of a wide class of models of quantum geometry at the Planck scale, beyond those already constrained by currently operating gravitational wave observatories.
This paper describes a THz transmission spectrometer for the spectral range of 2-65 cm^-1 (100 GHz to 2 THz) with a spectral resolution of at least 1.8 cm^-1 (50 GHz) where the source, sample, and detector are all fully contained in a cryogenic environment. Cyclotron emission from a two-dimensional electron gas heated with an electrical current serves as a magnetic field tunable source. The spectrometer is demonstrated at 4.2 K by measuring the resonant cyclotron absorption of a second two dimensional electron gas. Unique aspects of the spectrometer are that 1) an ultra-broadband detector is used and 2) the emitter is run quasi-continuously with a chopping frequency of only 1 Hz. Since optical coupling to room temperature components is not necessary, this technique is compatible with ultra-low temperature (sub 100 mK) operation.
The bulk Micromegas detector is considered to be a promising candidate for building TPCs for several future experiments including the projected linear collider. The standard bulk with a spacing of 128 micron has already established itself as a good choice for its performances in terms of gas gain uniformity, energy and space point resolution, and its capability to efficiently pave large readout surfaces with minimum dead zone. The present work involves the comparison of this standard bulk with a relatively less used bulk Micromegas detector having a larger amplification gap of 192 micron. Detector gain, energy resolution and electron transparency of these Micromegas have been measured under different conditions in various argon based gas mixtures to evaluate their performance. These measured characteristics have also been compared in detail to numerical simulations using the Garfield framework that combines packages such as neBEM, Magboltz and Heed. Further, we have carried out another numerical study to determine the effect of dielectric spacers on different detector features. A comprehensive comparison of the two detectors has been presented and analyzed in this work.
High-stability quartz oscillators are needed in a number of space applications. A short-term stability of parts in 10^{-14} [Allan deviation \\sigma y(\\tau) ] is sometimes required, for integration time \\tau of approximately 1-10 s. The Centre National d Etudes Spatiales (CNES) and the FEMTO-ST Institute (formerly LPMO and LCEP), have been collaborating for many years in this domain, aiming at measuring and at understanding the oscillator noise. The highest stability has been observed on 5 MHz and 10 MHz bulk acoustic-wave resonators. Yet this stability is still not sufficient, or the the manufacturing method is not reproducible. Recently, the analysis of a few premium-stability oscillators has demonstrated that the oscillator frequency instability is due to the fluctuation of the resonator natural frequency, rather than to the noise of the sustaining amplifier via the Leeson effect. It is therefore natural to give attention to the measurement of the resonator fluctuations.
We report experimental demonstration of the feasibility of reaching temperatures below 1 mK using cryogen-free technology. Our prototype system comprises an adiabatic nuclear demagnetisation stage, based on hyperfine-enhanced nuclear magnetic cooling, integrated with a commercial cryogen-free dilution refrigerator and 8 T superconducting magnet. Thermometry was provided by a current-sensing noise thermometer. The minimum temperature achieved at the experimental platform was 600 {\\mu}K. The platform remained below 1 mK for over 24 hours, indicating a total residual heat-leak into the experimental stage of 5 nW. We discuss straightforward improvements to the design of the current prototype that are expected to lead to enhanced performance. This opens the way to widening the accessibility of temperatures in the microkelvin regime, of potential importance in the application of strongly correlated electron states in nanodevices to quantum computing.
The CMS experiment will comprise several very large high resolution detectors for physics. Each detector may be constructed of well over a million parts and will be produced and assembled during the next decade by specialised centres distributed world-wide. Each constituent part of each detector must be accurately measured and tested locally prior to its ultimate assembly and integration in the experimental area at CERN. The CRISTAL project (Concurrent Repository and Information System for Tracking Assembly and production Lifecycles) [1] aims to monitor and control the quality of the production and assembly process to aid in optimising the performance of the physics detectors and to reject unacceptable constituent parts as early as possible in the construction lifecycle. During assembly CRISTAL will capture all the information required for subsequent detector calibration. Distributed instances of Object databases linked via CORBA [2] and with WWW/Java-based query processing are the main technology aspects of CRISTAL.
We study the feedback of positive ions in triple and quadruple Gas Electron Multiplier (GEM) detectors. The effects of GEM hole diameter, detector gain, applied voltages, number of GEMs and other parameters on ion feedback are investigated in detail. In particular, it was found that the ion feedback is independent of the gas mixture and the pressure. In the optimized multi-GEM structure, the ion feedback current can be suppressed down to 0.5% of the anode current, at a drift field of 0.1 kV/cm and gain of 10^4. A simple model of ion feedback in multi-GEM structures is suggested. The results obtained are relevant to the performance of time projection chambers and gas photomultipliers.
We present the design of an ${}^{90}$Y calibration source and its manufacturing procedure, that has been implemented in the University of Sussex radioactive laboratory. The radioactive source was first tested at the University of Sussex using a small scintillator cocktail sample. Further measurements were performed at the University of Pennsylvania using a larger volume of the scintillator cocktail. The results of both studies are presented and discussed.
We report the performance of an instrument that employs a torsion balance for probing a non-standard force in the sub-micrometre range. High sensitivity is achieved by using a torsion balance that has a long torsional period, strong magnetic damping of all vibrational motions and a feedback system that employs an optical lever. In torsion balance experiments, the distance fluctuations during measurements and the accuracy to which the absolute distance is determined are crucial for determining the sensitivity of the balance to a macroscopic force in the sub-micrometre range. We have estimated the root mean square amplitude of the distance fluctuation to be 18 nm by considering the effects due to seismic motions, tilt motions, residual angular fluctuations and thermal fluctuations. We have also estimated the error of the absolute distance to be 13 nm and the statistical error of the force to be 3.4$\\times$10$^{-12}$ N by measuring the electrostatic forces. As a result of this systematic study, we have evaluated the sensitivity of the balance to both a non-standard force and to the Casimir force.
In order to carry out research in the field of possible existence of sterile neutrino the laboratory based on SM-3 reactor (Dimitrovgrad, Russia) was created to search for oscillations of reactor antineutrino. The prototype of a multi-section neutrino detector with liquid scintillator volume of 350 l was installed in the middle of 2015. It is a moveable inside the passive shielding detector, which can be set at distance range from 6 to 11 meters from the reactor core. Measurements of antineutrino flux at such small distances from the reactor core carried out with movable detector for the first time. The measurements carried out with detector prototype demonstrated a possibility of measuring a reactor antineutrino flux in difficult conditions of cosmic background at Earth surface.
GaAs devices have relatively high atomic numbers (Z=31, 33) and thus extend the X-ray absorption edge beyond that of Si (Z=14) devices. In this study, radiation detectors were processed on GaAs substrates with 110 $\\mu\\textrm{m}$ - 130 $\\mu\\textrm{m}$ thick epitaxial absorption volume. Thick undoped and heavily doped p$^+$ epitaxial layers were grown using a custom-made horizontal Chloride Vapor Phase Epitaxy (CVPE) reactor, the growth rate of which was about 10 $\\mu\\textrm{m}$/h. The GaAs p$^+$/i/n$^+$ detectors were characterized by Capacitance Voltage ($CV$), Current Voltage ($IV$), Transient Current Technique (TCT) and Deep Level Transient Spectroscopy (DLTS) measurements. The full depletion voltage ($V_{\\textrm{fd}}$) of the detectors with 110 $\\mu\\textrm{m}$ epi-layer thickness is in the range of 8 V - 15 V and the leakage current density is about 10 nA/cm$^2$. The signal transit time determined by TCT is about 5 ns when the bias voltage is well above the value that produces the peak saturation drift velocity of electrons in GaAs at a given thickness. Numerical simulations with an appropriate defect model agree with the experimental results.
We report on preliminary design studies of a pixel detector for CMS at the Super-LHC. The goal of these studies was to investigate the possibility of designing an inner tracker pixel detector whose data could be used for selecting events at the First Level Trigger. The detector considered consists of two layers of 20x50x10 um3 pixels at very close radial proximity from each other so that coincidences of hits between the two layers amount to a track transverse momentum (pT) cut. This cut reduces the large amount of low-momentum data expected at SLHC while keeping the tracking efficiency very high for the high pT tracks. Preliminary results on the performance of such a detector are presented.
A novel instrument has been developed to monitor and record the ambient pa- rameters such as temperature, atmospheric pressure and relative humidity. These parameters are very essential for understanding the characteristics such as gain of gas filled detectors like Gas Electron Multiplier (GEM) and Multi Wire Propor- tional Counter (MWPC). In this article the details of the design, fabrication and operation processes of the device has been presented.
The detection of an electron bunch exiting a strong magnetic field can prove challenging due to the small mass of the electron. If placed too far from a solenoid s entrance, a detector outside the magnetic field will be too small to reliably intersect with the exiting electron beam. The TITAN group at TRIUMF in Vancouver, Canada, has made use of advances in the practice and precision of photochemical machining (PCM) to create a new kind of charge collecting detector called the \"mesh detector.\" The TITAN mesh detector was used to solve the problem of trapped electron detection in the new Cooler PEnning Trap (CPET) currently under development at TITAN.
In this work, we present a new X-band waveguide (WR90) measurement method that permits the broadband characterization of the complex permittivity for low dielectric loss tangent material specimens with improved accuracy. An electrically-long polypropylene specimen that partially fills the cross-section is inserted into the waveguide and the transmitted scattering parameter (S21) is measured. The extraction method relies on computational electromagnetic simulations, coupled with a genetic algorithm, to match the experimental S21 measurement. The sensitivity of the technique to sample length was explored by simulating specimen lengths from 2.54 to 15.24 cm, in 2.54 cm increments. Analysis of our simulated data predicts the technique will have the sensitivity to measure loss tangent values on the order of 10e-3 for materials such as polymers with relatively low real permittivity values. The ability to accurately characterize low-loss dielectric material specimens of polypropylene is demonstrated experimentally. The method was validated by excellent agreement with a free-space focused-beam system measurement of a polypropylene sheet. This technique provides the material measurement community with the ability to accurately extract material properties of low-loss material specimen over the entire X-band range. This technique could easily be extended to other frequency bands.
A low noise and wide dynamic range event driven detector for the detection of X-Ray energy is realized using 0.2 [um] Silicon on insulator (SOI) technology. Pixel circuits are divided into two parts; signal sensing circuit and event detection circuit. Event detection circuit is activated when X-Ray energy falls into the detector. In-pixel gain selection is implemented for the detection of a small signal and wide band of energy particle. Adaptive gain and capability of correlated double sampling (CDS) technique for the kTC noise canceling of charge detector realizes the low noise and high dynamic range event driven detector.
An interpolating two-dimensional X-ray imaging detector based on a single photon counter with gas amplification by GEM (gas electron multiplier) structures is presented. The detector system can be used for time-resolved structure research down to the microsecond-time domain. The prototype detector has been tested at the SAXS beamline at ELETTRA synchrotron light source with a beam energy of 8 keV to test its capabilities in the rough beamline environment. The imaging performance is examined with apertures and standard diffraction targets. Finally, the application in a time-resolved lipid temperature jump experiment is presented.
The goal of the AE$\\mathrm{\\bar{g}}$IS experiment at the Antiproton Decelerator (AD) at CERN, is to measure directly the Earth s gravitational acceleration on antimatter. To achieve this goal, the AE$\\mathrm{\\bar{g}}$IS collaboration will produce a pulsed, cold (100 mK) antihydrogen beam with a velocity of a few 100 m/s and measure the magnitude of the vertical deflection of the beam from a straight path. The final position of the falling antihydrogen will be detected by a position sensitive detector. This detector will consist of an active silicon part, where the annihilations take place, followed by an emulsion part. Together, they allow to achieve 1$%$ precision on the measurement of $\\bar{g}$ with about 600 reconstructed and time tagged annihilations. We present here, to the best of our knowledge, the first direct measurement of antiproton annihilation in a segmented silicon sensor, the first step towards designing a position sensitive silicon detector for the AE$\\mathrm{\\bar{g}}$IS experiment. We also present a first comparison with Monte Carlo simulations (GEANT4) for antiproton energies below 5 MeV
New developments in HPD design are presented, triggered by applications in high energy physics and astrophysics. The presented HPD designs are based on three innovations. (i) In order to achieve the highest possible surface coverage in a RICH detector, we introduced a photoelectron focussing method which is efficient to the periphery of the photocathode. (ii) To prevent positive ion feedback in HPDs, we introduced a permanent potential barrier in front of the anode. (iii) To replace a transmittive by a reflective photocathode, we arrived at a conceptually new HPD design with surprisingly good imaging characteristics, high quantum efficiency and low cost.
A new generation of ultra-low-background scintillator-based detectors aims to study solar neutrinos and search for dark matter and new physics beyond the Standard Model. These optical, non-imaging detectors generally contain a \"fiducial volume\" from which data are accepted, and an \"active buffer region\" where there are higher levels of radioactive contaminants. Events are observed in real time. To distinguish between events occurring in the two regions, it is imperative that event position reconstruction be well-understood. The object of this paper is the study of the reconstruction, in time and space, of scintillation events in detectors of large dimensions. A general, likelihood-based method of position reconstruction for this class of detectors is presented. The potential spatial resolution of the method is then evaluated. It is shown that for a spherical detector with a large number N of photosensitive elements that detect photons, the expected spatial resolution at the center of the detector is given by delta a ~ (c sigma / n) sqrt(3/N), where sigma is the width of the scintillator time response function and n is the index of refraction in the medium. However, if light in the detector has a scattering mean free path much less than the detector radius R, the resolution instead becomes (R/2) sqrt(3/N). Finally, a formalism is introduced to deal with the common case in which only the arrival time of the first photon to arrive at each photosensitive element can be measured.
The careful filtering of microwave electromagnetic radiation is critical for controlling the electromagnetic environment for experiments in solid-state quantum information processing and quantum metrology at millikelvin temperatures. We describe the design and fabrication of a coaxial filter assembly and demonstrate that its performance is in excellent agreement with theoretical modelling. We further perform an indicative test of the operation of the filters by making current-voltage measurements of small, underdamped Josephson junctions at 15 mK.
Phase I of the NEXT-100 $0\\nu\\beta\\beta$ experiment (NEW) is scheduled for data taking in 2015 at Laboratorio Subterr\\ aneo de Canfranc in the Spanish Pyrenees. Thanks to the light proportional technique, NEW anticipates an outstanding energy resolution nearing the Fano factor in Xenon (0.5-1%FWHM@$Q_{\\beta\\beta,^{136}Xe}$), with a TPC-design that allows tracking and identification of the double end-blob feature of the $0\\nu\\beta\\beta$ decay. When properly mastered, the combination of these two assets can suppress the irreducible $2\\nu\\beta\\beta$ and (single-blob) $\\gamma$ backgrounds from natural radioactivity to minute levels, of the order of $5\\times{10^{-4}}$ ckky. Given our knowledge of the available phase-space as obtained from neutrino oscillation experiments, this feat will expectedly allow for a sensitivity to the effective electron neutrino mass of $m_{\\beta\\beta}\\simeq 30$ meV for exposures at the 20 ton $\\times$ year scale. Hence, ultimately, a full survey of the inverse hierarchy of the neutrino mass ordering appears to be within reach for a ton-scale experiment based on this technology. NEW, with 10 kg of Xenon 90%-enriched in $^{136}$Xe, sets an unprecedented scale for gaseous Xenon TPCs and will be an important milestone for its anticipated upgrades (100 kg and 1 ton). I briefly summarize the status of the NEXT experiment, from the main results obtained with $\\sim 1$ kg prototypes that substantiate the concept, to the ongoing works for deploying its first phase.
The COMPASS experiment at the CERN SPS is dedicated to hadron physics with a broad research programme, including the study of the nucleon spin structure using muons as a probe and a variety of issues in meson spectroscopy using hadron beams. The two stage fixed target spectrometer with electromagnetic (em) and hadronic calorimetry in both stages provides photon detection in a wide angular range. As discussed in this paper, the COMPASS em calorimetry plays a crucial r\\^{o}le for the Hadron programme started in 2008 as well as for the planned COMPASS future programme of measuring GPDs via exclusive DVCS photons. We present the photon detection coverage foreseen, and first, preliminary results characterising the present performances of both existing COMPASS electromagnetic calorimeters, based on test beam data taken at CERN T9 facility end of 2007.
A new approach to study the response of portable gamma detector to terrestrial gamma ray is proposed. This approach is based on two-stage Monte Carlo simulation. First, the probability distributions of the phase space coordinates of the events that are most likely to be detected are reconstructed at the phase space shell level. The phase space shell is a closed surface enclosing the detector. The detector response to events originating from the phase space shell is then studied. The full absorption spectra as well as the partial absorption spectra are obtained for natural radionuclides uniformly distributed in the ground. For validation, this method is applied to a HpGe portable detector previously studied. The previous study is based on a semi-empirical model. Good agreement is achieved when we compare the full energy peak efficiencies and the total in-situ spectra obtained by the two methods. As an application, the effective depth of the activity of the 137Cs artificial radionuclide in the soil is determined from the low-energy part of the total in-situ spectrum.
Charge Coupled Devices (CCDs) have been successfully used in several high energy physics experiments over the past two decades. Their high spatial resolution and thin sensitive layers make them an excellent tool for studying short-lived particles. The Linear Collider Flavour Identification (LCFI) collaboration is developing Column-Parallel CCDs (CPCCDs) for the vertex detector of a future Linear Collider. The CPCCDs can be read out many times faster than standard CCDs, significantly increasing their operating speed. A test stand for measuring the charge transfer inefficiency (CTI) of a prototype CPCCD has been set up. Studies of the CTI have been performed at a range of readout frequencies and operating temperatures.
The recent R&D focus on CMOS sensors with charge collection in a depleted zone has opened new perspectives for CMOS sensors as fast and radiation hard pixel devices. These sensors, labelled as depleted CMOS sensors (DMAPS), have already shown promising performance as feasible candidates for the ATLAS Inner Tracker (ITk) upgrade, possibly replacing the current passive sensors. A further step to exploit the potential of DMAPS is to investigate the suitability of equipping the outer layers of the ATLAS ITk upgrade with fully monolithic CMOS sensors. This paper presents the development of a depleted monolithic CMOS pixel sensor designed in the LFoundry 150 nm CMOS technology, with the focus on design details and simulation results.
The Campbell theorem, relating the variance of the current of a fission chamber (a \"filtered Poisson process\") to the intensity of the detection events and to the detector pulse shape, becomes invalid when the neutrons generating the fission chamber current are not independent. Recently a formalism was developed by the present authors [1], by which the variance of the detector current could be calculated for detecting neutrons in a subcritical multiplying system, where the detection events are obviously not independent. In the present paper, the previous formalism, which only accounted for prompt neutrons, is generalised to account also for delayed neutrons. A rigorous probabilistic analysis of the detector current was performed by using the same simple, but realistic detector model as in the previous work. The results of the present analysis made it possible to determine the bias of the traditional Campbelling techniques both qualitatively and quantitatively. The results show that the variance still remains proportional to the detection intensity, and is thus suitable for the monitoring of the mean flux, but the calibration factor between the variance and the detection intensity is an involved function of the detector pulse shape and the subcritical reactivity of the system, which diverges for critical systems.
A method was presented of profiling the magnetic field, with a zero vector of magnetic flux density $B_{r}$ and strong gradient G, enabling conditions for the Stern-Gerlach spectroscopy to be accomplished in condensed matter (the method has been called magnetic field gradient spectroscopy - MGRS), as well the previously proposed magnetic resonance spectroscopy for selected energy states (SSMRS). Magnetic field distribution in a model electromagnet were shown when condition $B_{r}= 0$ for resultant magnetic field was satisfied within the sample
Experiments that measure extremely small gravitational forces are often hampered by the presence of non-gravitational forces that can neither be calculated nor separately measured. Among these spurious forces is electrostatic attraction between a test mass and its surroundings due to the presence of spatially varying surface potential known as the \"patch effect.\" In order to make surfaces with small surface potential variation, it is necessary to be able to measure it. A Kelvin probe (KP) measures contact potential difference (CPD), using the time-varying capacitance between the sample and a vibrating tip that is biased with a backing potential. Assuming that the tip remains constant, this measures the sample s surface potential variation. We examine the operation of the KP from the perspective of parameter estimation in the presence of noise. We show that, when the CPD is estimated from measurements at two separate backing potentials, the standard deviation of the optimal estimate depends on the total observing time. Further, the observing time may be unevenly divided between the two backing potentials, provided the values of those potentials are correspondingly set. We simulate a two-stage KP data analysis, including a sub-optimal estimator with advantages for real-time operation. Based on the real-time version, we present a novel approach to stabilizing the average distance of the tip from the sample. We also present the results of a series of covariance analyses that validate and bound the applicability of the suboptimal estimator, make a comparison with the results of an optimal estimator and guide the user. We discuss the application of the KP to the LISA and to a test of the weak equivalence principle.
The ATLAS detector is one of the experiments at the LHC that will detect high-energy proton collisions at 14 TeV. The commissioning of the detector has started already in 2005 in parallel to the detector installation and is still in progress. The data taken so far corresponds to noise runs, cosmic muon events and beam background events from single beam in September 2008. We present the current status of the detector and performance results obtained during commissioning.
Most of the physics analyses at a hadron collider rely on a precise measurement of the energy of jets in the final state. This requires a precise in situ calibration of the calorimeter with the final detector setup. We present the basic procedure and results of the in situ gain calibration of the D0 HCAL in Run II. The gain calibration works on top of the pulser-based calibration of the readout electronics and is based entirely on collision data.
The Cryogenic Underground Observatory for Rare Events (CUORE) is an experiment to search for neutrinoless double beta decay ($0\\nu\\beta\\beta$) in $^{130}$Te and other rare processes. CUORE is a cryogenic detector composed of 988 TeO$_2$ bolometers for a total mass of about 741 kg. The detector is being constructed at the Laboratori Nazionali del Gran Sasso, Italy, where it will start taking data in 2015. If the target background of 0.01 counts/(keV$\\cdot$kg$\\cdot$y) will be reached, in five years of data taking CUORE will have an half life sensitivity around $1\\times 10^{26}$ y at 90\\% C.L. As a first step towards CUORE a smaller experiment CUORE-0, constructed to test and demonstrate the performances expected for CUORE, has been assembled and is running. The detector is a single tower of 52 CUORE-like bolometers that started taking data in spring 2013. The status and perspectives of CUORE will be discussed, and the first CUORE-0 data will be presented.
Charge Coupled Devices (CCDs) have been successfully used in several high energy physics experiments over the past two decades. Their high spatial resolution and thin sensitive layers make them an excellent tool for studying short-lived particles. The Linear Collider Flavour Identification (LCFI) collaboration is developing Column-Parallel CCDs (CPCCDs) for the vertex detector of the International Linear Collider (ILC). The CPCCDs can be read out many times faster than standard CCDs, significantly increasing their operating speed. The results of detailed simulations of the charge transfer inefficiency (CTI) of a prototype CPCCD are reported and studies of the influence of gate voltage on the CTI described. The effects of bulk radiation damage on the CTI of a CPCCD are studied by simulating the effects of two electron trap levels, 0.17 and 0.44 eV, at different concentrations and operating temperatures. The dependence of the CTI on different occupancy levels (percentage of hit pixels) and readout frequencies is also studied. The optimal operating temperature for the CPCCD, where the effects of the charge trapping are at a minimum, is found to be about 230 K for the range of readout speeds proposed for the ILC. The results of the full simulation have been compared with a simple analytic model.
A compact and fast electromagnetic calorimeter prototype was designed, built, and tested in preparation for a next-generation, high-rate muon g-2 experiment. It uses a simple assembly procedure: alternating layers of 0.5-mm-thick tungsten plates and 0.5-mm-diameter plastic scintillating fiber ribbons. This geometry leads to a detector having a calculated radiation length of 0.69 cm, a Moliere radius of 1.73 cm, and a measured intrinsic sampling resolution term of (11.8\\pm1.1)/\\sqrt{E(GeV)}, in the range 1.5 to 3.5 GeV. The construction procedure, test beam results, and GEANT-4 comparative simulations are described.
We are developing monolithic pixel sensors based on a 0.2 $\\mu$m fully-depleted Silicon-on-Insulator (SOI) technology for HEP experiment applications. The total ionizing dose (TID) effect is the major issue in the applications for hard radiation environments in HEP experiments. To compensate for TID damage, we have introduced a Double SOI structure which has a Middle Silicon layer (SOI2 layer) in addition. We studied the recovery from TID damage induced by $\\mathrm{^{60}Co}~\\gamma$ s and other characteristics of an Integration-type Double SOI sensor. The Double SOI sensor irradiated to 100 kGy showed a response for IR laser similar to of a non-irradiated sensor when we applied a negative voltage to the SOI2 layer. We conclude that the Double SOI sensor is radiation hard enough to be used in HEP experiments in harsh radiation environments such as at Bell II or ILC.
Scaling of multi-pixel cryogenic detectors for imaging becomes increasingly difficult with size due to complexity of readout circuitry and cryogenic constraints (thermal load from wiring). We propose and demonstrate a new readout scheme based on a highly stable RF oscillator composed of a superconducting tunnel junction which exhibits relaxation oscillations. The oscillation frequency is almost linear with the analog bias signal over a wide operation range. The frequency signals from different detectors can be combined into one single readout line. The current noise of an optimized circuit is about 5 pA/sqrt(Hz), which is comparable to standard SQUID amplifiers. We show experimental data from `stand-alone  operation as well as response to microcalorimeter X-ray signals.
The readout electronics of the ATLAS Hadronic Endcap Calorimeter will have to withstand the about ten times larger radiation environment of the future high-luminosity LHC (HL-LHC) compared to their design values. The GaAs ASIC which comprises the heart of the readout electronics has been exposed to neutron and proton radiation with fluences up to ten times the total expected fluences for ten years of running of the HL-LHC. Neutron tests were performed at the NPI in Rez, Czech Republic, where a 36 MeV proton beam is directed on a thick heavy water target to produce neutrons. The proton irradiation was done with 200 MeV protons at the PROSCAN area of the Proton Irradiation Facility at the PSI in Villigen, Switzerland. In-situ measurements of S-parameters in both tests allow the evaluation of frequency dependent performance parameters - like gain and input impedance - as a function of the fluence. The linearity of the ASIC response has been measured directly in the neutron tests with a triangular input pulse of varying amplitude. The performance measurements and expected performance degradations under HL-LHC conditions are presented.
This paper presents a first study of the performance of a novel 2D position-sensitive microstrip detector, where the resistive charge division method was implemented by replacing the metallic electrodes with resistive electrodes made of polycrystalline silicon. A characterization of two proof-of-concept prototypes with different values of the electrode resistivity was carried out using a pulsed Near Infra-Red laser. The experimental data were compared with the electrical simulation of the sensor equivalent circuit coupled to simple electronics readout circuits. The good agreement between experimental and simulation results establishes the soundness of resistive charge division method in silicon microstrip sensors and validates the developed simulation as a tool for the optimization of future sensor prototypes. Spatial resolution in the strip length direction depends on the ionizing event position. The average value obtained from the protype analysis is close to 1.2% of the strip length for a 6 MIP signal.
The CMS Hadron Calorimeter in the barrel, endcap and forward regions is fully commissioned. Cosmic ray data were taken with and without magnetic field at the surface hall and after installation in the experimental hall, hundred meters underground. Various measurements were also performed during the few days of beam in the LHC in September 2008. Calibration parameters were extracted, and the energy response of the HCAL determined from test beam data has been checked.
Two single channel detection units for thermal neutron detection are investigated in a neutron beam. They consist of two ZnS/${}^6$LiF scintillating layers sandwiching an array of WLS fibers. The pattern of this units can be repeated laterally and vertically in order to build up a one dimensional position sensitive multi-channel detector with the needed sensitive surface and with the required neutron absorption probability. The originality of this work arises from the fact that the WLS fibers are read out with SiPMs instead of the traditionally used PMTs or MaPMTs. The signal processing system is based on a photon counting approach. For SiPMs with a dark count rate as high as 0.7 MHz, a trigger efficiency of 80% is achieved together with a system background rate lower than ${10}^{-3}$ Hz and a dead time of 30 $\\mu$s. No change of performance is observed for neutron count rates of up to 3.6 kHz.
The performance of pixel modules built from 75 micrometer thin silicon sensors and ATLAS read-out chips employing the Solid Liquid InterDiffusion (SLID) interconnection technology is presented. This technology, developed by the Fraunhofer EMFT, is a possible alternative to the standard bump-bonding. It allows for stacking of different interconnected chip and sensor layers without destroying the already formed bonds. In combination with Inter-Chip-Vias (ICVs) this paves the way for vertical integration. Both technologies are combined in a pixel module concept which is the basis for the modules discussed in this paper. Mechanical and electrical parameters of pixel modules employing both SLID interconnections and sensors of 75 micrometer thickness are covered. The mechanical features discussed include the interconnection efficiency, alignment precision and mechanical strength. The electrical properties comprise the leakage currents, tuning characteristics, charge collection, cluster sizes and hit efficiencies. Targeting at a usage at the high luminosity upgrade of the LHC accelerator called HL-LHC, the results were obtained before and after irradiation up to fluences of $10^{16}$ $\\mathrm{n}_{\\mathrm{eq}}/\\mathrm{cm}^2$ (1 MeV neutrons).
The offline processing of the data collected by the Belle detector has been recently upgraded to cope with the excellent performance of the KEKB accelerator. The 127/fb of data (120 TB on tape) collected between autumn 2003 and summer 2004 has been processed in 2 months, thanks to the high speed and stability of the new, distributed processing scheme. We present here this new processing scheme and its performance.
The Gas Electron Multiplier detectors with wire and metallic electrodes, with a gas filling in the gap between them were proposed and tested. The main advantage of these Gas Electron Multipliers compared to standard ones consists in their increased stability and reliability. The experimental results on testing of such detectors with gaps between the electrodes of 1 and 3 mm are reported. It is demonstrated, that the best gas filling for the gas electron multipliers is neon with small admixture of quenching gases (for example, (N2+H2O) at ~100ppm). This filling offers the greatest coefficient of proportional multiplication as compared with other gases, at small electric potential difference between the GEM electrodes, in absence of streamer discharges in the proportional region. The results on operation of the multi-channel gas electron multiplier with wire cathode and continuous anode filled with Ne, Ar, Ar+CH4 and Ar+1%Xe are presented also. Based on the experimental observations, the explanation of the mechanism of formation of streamers is given.
A performance evaluation of superconducting transition-edge sensors (TESs) in the environment of a pion beam line at a particle accelerator is presented. Averaged across the 209 functioning sensors in the array, the achieved energy resolution is 5.2 eV FWHM at Co $K_{\\alpha}$ (6.9 keV) when the pion beam is off and 7.3 eV at a beam rate of 1.45 MHz. Absolute energy uncertainty of $\\pm$0.04 eV is demonstrated for Fe $K_{\\alpha}$ (6.4 keV) with in-situ energy calibration obtained from other nearby known x-ray lines. To achieve this small uncertainty, it is essential to consider the non-Gaussian energy response of the TESs and thermal cross-talk pile-up effects due to charged-particle hits in the silicon substrate of the TES array.
LHCb will commence data taking as the first dedicated heavy flavour experiment at a hadron collider in 2008. A very high hit precision from its vertex detector (VELO) is essential to meet the tight requirements of vertex reconstruction in B-physics. The single hit precision of the VELO is better than 10 micron. However, the VELO is operated only 8 mm from the beam and must be retracted and reinserted each LHC fill. Hence, the detector places unique demands on its alignment algorithm. The partially assembled VELO system has already been tested in a beam test. The novel software alignment methods are presented together with their interplay with the metrology measurements. Results from Monte Carlo simulation studies are discussed and recent beam test results are shown that prove the method s precision at the micron level.
We investigated the timing jitter of superconducting nanowire avalanche photodetectors (SNAPs, also referred to as cascade switching superconducting single photon detectors) based on 30-nm-wide nanowires. At bias currents (IB) near the switching current, SNAPs showed sub 35 ps FWHM Gaussian jitter similar to standard 100 nm wide superconducting nanowire single-photon detectors. At lower values of IB, the instrument response function (IRF) of the detectors became wider, more asymmetric, and shifted to longer time delays. We could reproduce the experimentally observed IRF time-shift in simulations based on an electrothermal model, and explain the effect with a simple physical picture.
In the Kaos spectrometer at the Mainz Microtron a high-resolution coordinate detector for high-energy particles is operated. It consists of scintillating fibres with diameters of < 1mm and is read out by > 4000 multi-anode photomultiplier channels. It is one of the most modern focal-plane detectors for magnetic spectrometers world-wide. To correct variations in the detection efficiency, caused by the different gains and the different optical transmittances, a fully automated off-line calibration procedure has been developed. The process includes the positioning of a radioisotope source alongside the detector plane and the automated acquisition and analysis of the detector signals. It was possible to characterise and calibrate each individual fibre channel with a low degree of human interaction.
A temperature controlled 1 {\\Omega}-10 k{\\Omega} standard Resistors transportable setup was developed at National Institute of Metrological Research, (INRIM) for the calibration and adjustment of multifunction electrical instruments. The two Standards consist respectively of two 10 {\\Omega} and 100 k{\\Omega} parallel connected resistors nets inserted in a temperature controlled aluminium box. Novelty of the realization is the oil insertion of the 1 {\\Omega} net with its internal connectors lowering the thermo-electromotive forces (emfs) effects. Short and mid-term stabilities of the setup Standards resulted on the order and in some cases better than other top level 1 {\\Omega} and 10 k{\\Omega} commercial Standards. The transport effect turning off the setup temperature control did not cause appreciable measurement deviations on the two Standards. The Standards uncertainties meet those requested by DMMs and MFCs manufacturers to calibrate and adjust these instruments. A test to adjust a multifunction calibrator gave satisfactory results.
Micro-Pattern Gaseous Detectors (MPGDs) such as Micromegas or GEM are used in particle physics experiments for their capabilities in particle tracking at high rates. Their excellent position resolutions are well known but their energy characteristics have been less studied. The energy resolution is mainly affected by the ionisation processes and detector gain fluctuations. This paper presents a method to separetely measure those two contributions to the energy resolution of a Micromegas detector. The method relies on the injection of a controlled number of electrons. The Micromegas has a 1.6-mm drift zone and a 160-$\\mu$m amplification gap. It is operated in Ne 95%-iC$\\mathrm{_4}$H$\\mathrm{_{10}}$ 5% at atmospheric pressure. The electrons are generated by non-linear photoelectric emission issued from the photons of a pulsed 337-nm wavelength laser coupled to a focusing system. The single electron response has been measured at different gains (3.7 10$\\mathrm{^4}$, 5.0 10$\\mathrm{^4}$ and 7.0 10$\\mathrm{^4}$) and is fitted with a good agreement by a Polya distribution. From those fits, a relative gain variance of 0.31$\\pm$0.02 is deduced. The setup has also been characterised at several voltages by fitting the energy resolution measured as a function of the number of primary electrons, ranging from 5 up to 210. A maximum value of the Fano factor (0.37) has been estimated for a 5.9 keV X-rays interacting in the Ne 95%-iC$\\mathrm{_4}$H$\\mathrm{_{10}}$ 5% gas mixture.
During the test measurements of the PMTs to be used in the future Borexino experiment, the data from 2200 PMT were accumulated. The unique timing characteristics of the apparatus used and the large statistics acquired, permit resololution of the fine structure of the ETL9351 PMT time response. A method to obtain the probability density function of the single photoelectron counting from the experimental data is proposed and applied to derive the PMT average characteristics. For the first time, an analytical model of the single photoelectron PMT time response is proposed, describing all the features of the single photoelectron time arrival. The origin of the small amplitude pulses is explained.
Monte Carlo simulation is used to investigate the fluctuations in the Xe proportional electroluminescence (EL) yield H (also known as secondary scintillation) produced by sub-ionization primary electrons drifting in the gas under appropriate electric fields, comparing pure Xe gas with Xe doped with CH4 or CF4. The work is modeled on gas detectors of the gas proportional-scintillation type, where amplification is achieved through the production of EL under a charge-multiplication free regime. The addition of the molecular gases to Xe reduces electron diffusion, a desirable effect in large size detectors where primary electrons drift across a long absorption/drift region. However, the presence of the molecules reduces H and increases its fluctuations. In the case of CF4, the effects are very strong due to significant electron attachment in the EL field range, ruling out CF4 as an acceptable additive. The addition of CH4 affects H and its fluctuations to a much lower extent, and CH4 concentrations lower than ~1% may be an appropriate choice. In addition, Monte Carlo calculations in pure Xe under cylindrical geometry in a regime below charge multiplication have shown that fluctuations in the EL yield H are an order of magnitude higher than for planar geometry. For both geometries, though, the fluctuations have a negligible effect on the energy resolution, and variations of the anode radius in cylindrical geometry or grid parallelism in planar geometry may be a more significant cause of concern.
A small demonstration spark chamber is to be built at the Cavendish laboratory. A prototype chamber consisting of five 20x22.5cm plates has been built and descriptions of its properties and construction are given, while a second chamber with a somewhat novel design is nearly complete. A discussion of the issues surrounding the final design is presented, and recommendations are made in light of the results of this work.
The operation principle and preliminary results of a novel gas-avalanche patterned hole electron multiplier, the Thick-COBRA (THCOBRA), are presented. This micro-hole structure is derived from the THGEM and MHSP. Sub-millimeter diameter holes are mechanically drilled in a thin G10 plate, Cu-clad on both faces; on one of the faces the Cu is etched to produce additional anode strips winding between circular cathode strips. Primary avalanches occurring within the holes are followed by additional ones at the anode-strips vicinity. Gains in excess of 5*104 were reached with 22.1 x-rays in Ar, Ne and Ar-10%CH4, with 12.2 % FWHM energy resolution in Ar-10%CH4. Higher gains were measured with single photoelectrons. This robust multiplier may have numerous potential applications.
We demonstrate a 10-GHz bandwidth digitizer with 7-effective bits of resolution and 52dB SFDR, using photonic time stretch technique. To the best of our knowledge, this is the highest resolution analog-to-digital converter (ADC) of the same bandwidth, with at least an order of magnitude higher SNR than previously achieved. This is made possible by correction of distortion due to time warps, and non-linearities due to wavelength dependent bias variation in the Mach-Zehnder modulator. We also demonstrate concatenation of 30 wavelength interleaved time segments with high fidelity on the path to achieving continuous time operation.
Thermoacoustic Refrigerators (TARs) use acoustic power to generate cold temperatures. Apart from the operating frequency and the mean temperature of the working medium, the charging pressure and the dynamic pressure in the TAR govern its attainable cold temperature. The effect of charging pressure on the dynamic pressure in a loudspeaker driven gas filled standing wave column has been well understood. The present work aims to investigate the effect of charging pressure on the cold end temperature of a standing wave TAR. The cold end temperature lift and the cooldown for several changing pressures are reported. The effect of vacuum around the cold end on the TAR performance is also presented.
We report on the development and performance of a high-sensitivity purity-analysis technique for gaseous xenon. The gas is sampled at macroscopic pressure from the system of interest using a UHV leak valve. The xenon present in the sample is removed with a liquid-nitrogen cold trap, and the remaining impurities are observed with a standard vacuum mass-spectroscopy device. Using calibrated samples of xenon gas spiked with known levels of impurities, we find that the minimum detectable levels of N2, O2, and methane are 1 ppb, 160 ppt, and 60 ppt respectively. This represents an improvement of about a factor of 10,000 compared to measurements performed without a coldtrap.
This contribution investigates a prototype of a TPC readout with a highly pixelated CMOS ASIC, which is an option for charged particles tracking of the ILC. A triple GEM stack was joined with a TimePix and MediPix2 chip (pixel size of 55$\\times$55 $\\mu m^2$) and its readout properties were investigated with 5 GeV electrons. The spatial resolution of the cluster center reconstruction was determined as a function of drift distance using different cluster alhoritms and compared with Monte Carlo predictions.
In-vacuum active pixel detectors enable high sensitivity, highly parallel time- and space-resolved detection of ions from complex surfaces. For the first time, a Timepix detector assembly was combined with a Secondary Ion Mass Spectrometer for microscope mode SIMS imaging. Time resolved images from various benchmark samples demonstrate the imaging capabilities of the detector system. The main advantages of the active pixel detector are the higher signal-to-noise ratio and parallel acquisition of arrival time and position. Microscope mode SIMS imaging of biomolecules is demonstrated from tissue sections with the Timepix detector.
We have recently reported the development of a new type of high-pressure Xenon time projection chamber operated with an ultra-low diffusion mixture and that simultaneously displays Penning effect and fluorescence in the near-visible region (300 nm). The concept, dubbed `Penning-Fluorescent  TPC, allows the simultaneous reconstruction of primary charge and scintillation with high topological and calorimetric fidelity.
Recently, a new detector concept, for combined imaging and spectroscopy of fast-neutrons and gamma was presented. It encompasses a liquid-xenon (LXe) converter-scintillator coupled to a UV-sensitive gaseous Thick Gas Electron Multiplier (THGEM)-based imaging photomultiplier (GPM). In this work we present and discuss the results of a systematic computer-simulation study aiming at optimizing the type and performance of LXe converter. We have evaluated the detector spectral response, detection efficiency and spatial resolution for gamma-rays and neutrons in the energy range of 2-15 MeV for 50 mm thick converters consisting of plain LXe volume and LXe-filled capillaries, of Teflon, Polyethylene or hydrogen-containing Teflon (Tefzel). Neutron detection efficiencies for plain LXe, Teflon-capillaries and Tefzel-capillaries converters were about 20% over the entire energy range. In polyethylene capillaries converters the neutron detection efficiency was about 10% at 2 MeV and increased up to about 20% at 14 MeV. Detection efficiencies of gammas in Teflon, Tefzel and polyethylene converters were ~35%. The plain-LXe converter provided the highest gamma-ray detection efficiency, of ~40-50% for 2-15 MeV energy range. Optimization of LXe-filled Tefzel capillary dimensions resulted in spatial resolution of ~1.5mm (FWHM) for neutrons and up to 3.5 mm (FWHM) for gamma-rays. Simulations of radiographic images of various materials using two discrete energy gamma-rays (4.4 MeV and 15.1 MeV) and neutrons in broad energy range (2-10 MeV) were performed in order to evaluate the potential of elemental discrimination.
Nowadays, commonly used Resistive Plate Chambers (RPCs) have counting rate capabilities of ~10E4Hz/cm2 and position resolutions of ~1cm. We have developed small prototypes of RPCs (5x5 and 10x10cm2) having rate capabilities of up to 10E7Hz/cm2 and position resolutions of 50 micron(\"on line\" without application of any treatment method like \"center of gravity\"). The breakthrough in achieving extraordinary rate and position resolutions was only possible after solving several serious problems: RPC cleaning and assembling technology, aging, spurious pulses and afterpulses, discharges in the amplification gap and along the spacers. High-rate, high-position resolution RPCs can find a wide range of applications in many different fields, for example in medical imaging. RPCs with the cathodes coated by CsI photosensitive layer can detect ultraviolet photons with a position resolution that is better than ~30 micron. Such detectors can also be used in many applications, for example in the focal plane of high resolution vacuum spectrographs or as image scanners.
The operation of single-, double- and triple-THGEM UV-detectors with reflective CsI photocathodes (CsI-THGEM) in Ne/CH4 and Ne/CF4 mixtures was investigated in view of their potential applications in RICH. The studies were carried out with UV, x-rays and {\\beta}-electrons and focused on the maximum achievable gain, discharge probability, cathode excitation effects and long-term gain stability. Comparative studies under similar conditions were made in CH4, CF4 and Ne/CF4, with a MWPC coupled to a reflective CsI photocathode (CsI-MWPC). It was found that at counting rates <= 10 Hz/mm^2 the maximum achievable gain of CsI-THGEMs is determined by the Raether limit; at counting rates > 10 Hz/mm^2 it dropped with rate. In all cases investigated the attainable CsI-THGEM gain was significantly higher than that of the CsI-MWPC, under similar conditions. Furthermore, the CsI-THGEM UV-detector suffered fewer cathode-excitation induced effects as compared to CsI-MWPC and had better stability at high counting rates.
A modified conventional three-transducer reciprocity calibration method is used to measure the magnitude and phase responses of the transmitting voltage response and the free-field open-circuit receiving voltage sensitivity of ultrasonic piezoelectric transducers radiating in air at 1 atm. The transducers used in this work are 20 x 2 mm circular piezoelectric ceramic disks with their first and second radial modes at approximately 100 and 250 kHz, respectively. The transducer characterization is supported and aided by finite element simulations of the measurement system and the measured frequency responses. Preliminary results indicate that the magnitude and phase responses of the transmitting voltage response and the free-field open-circuit receiving voltage sensitivity can be measured with fair accuracy in a limited frequency band around the first radial mode of the piezoelectric ceramic disk. Further work is needed to demonstrate and quantify the accuracy actually obtained using the three-transducer reciprocity calibration method, to achieve transducer characterization at a calibration accuracy level, and to achieve calibration above the calibrated frequency range of the B&K 4138 microphone.
The Gaudi architecture and framework are designed to provide a common infrastructure and environment for simulation, filtering, reconstruction and analysis applications. In this context, a Detector Description Service was developed in LHCb in order to also provide easy and coherent access to the description of the experimental apparatus. This service centralizes every information about the detector, including geometry, materials, alignment, calibration, structure and controls. From the proof of concept given by the first functional implementation of this service late 2000, the Detector Description Service has grown and has become one of the major components of the LHCb software, shared among all applications, including simulation, reconstruction, analysis and visualization. We describe here the full and functional implementation of the service. We stress the easiness of customization and extension of the detector description by the user, on the seamless integration with condition databases in order to handle time dependent data and on the choice of XML as a persistency back-end for LHCb Detector data. We show how the detector description can be shared but still contains application specific data and keeps at the same time several levels of granularity. We present several external tools which provide additional value to the Detector Description Service like a dedicated, easy to use XML editor and different geometry checkers. We finally give hints on how this service could evolve to be part of a common effort between all LHC experiments that would aim at defining common Detector description tools at the level of the LCG project.
Non-contact interaction between two parallel flat surfaces is a central paradigm in sciences. This situation is the starting point for a wealth of different models: the capacitor description in electrostatics, hydrodynamic flow, thermal exchange, the Casimir force, direct contact study, third body confinement such as liquids or films of soft condensed matter. The control of parallelism is so demanding that no versatile single force machine in this geometry has been proposed so far. Using a combination of nanopositioning based on inertial motors and microcrystal shaping with Focused Ion Beams (FIB) we propose here an experimental set up that should enable one to measure interactions between movable surfaces separated by gaps in the micrometer and the nanometer ranges.
Micromegas is presently in use by many experiments providing enhanced performance when used in high particle environment. Compared with other solid-state detectors or conventional gas counters Micromegas is robust and radiation hard. Recent improvements in the design and fabrication of low-cost Micromegas have led to a significant step for readout of large volume detectors. A novel Cherenkov counter with Micromegas photodetector readout is proposed for on-line particle identification and trigger at high rates.
Detectors with an electroluminesence readout show an excellence performance in respect of energy resolution making them interesting for various applications as X-ray detection, double beta and dark matter experiments, Compton and gamma cameras, etc. In the following the study of a readout based on avalanche photo diodes to detect directly the VUV photons is presented. Results of measurements with 5 APDs in xenon at pressures between 1 and 1.65 bar are shown indicating that such a readout can provide excellent energy and a moderate position resolution.
TRION is a sub-mm spatial resolution fast neutron imaging detector, which employs an integrative optical time-of-flight technique. The detector was developed for fast neutron resonance radiography, a method capable of detecting a broad range of conventional and improvised explosives. In this study we have analyzed in detail, using Monte-Carlo calculations and experimentally determined parameters, all the processes that influence the signal and noise in the TRION detector. In contrast to event-counting detectors where the signal-to-noise ratio is dependent only on the number of detected events (quantum noise), in an energy-integrating detector additional factors, such as the fluctuations in imparted energy, number of photoelectrons, system gain and other factors will contribute to the noise. The excess noise factor (over the quantum noise) due to these processes was 4.3, 2.7, 2.1, 1.9 and 1.9 for incident neutron energies of 2, 4, 7.5, 10 and 14 MeV, respectively. It is shown that, even under ideal light collection conditions, a fast neutron detection system operating in an integrative mode cannot be quantum-noise-limited due to the relatively large variance in the imparted proton energy and the resulting scintillation light distributions.
We discuss improvements to the short-term performance of tunnel diode oscillator transducers with an emphasis on frequencies from 30 MHz to 1.2 GHz using LC type tank circuits. We specifically consider the TDO in pulsed high magnetic fields with fast digital acquisition. Since overdriven oscillators are necessary in pulsed fields to maintain oscillations, we examine the circuit using SPICE simulation during the design process and to gain insight into its behavior. We also discuss a numerical technique for demodulating the oscillations into frequency and amplitude.
The Daya Bay Reactor Antineutrino Experiment reported the first observation of the non-zero neutrino mixing angle $\\theta_{13}$ using the first 55 days of data. It has also provided the most precise measurement of $\\theta_{13}$ with the extended data to 621 days. Daya Bay will keep running for another 3 years or so. There is about 100 TB raw data produced per year, as well as several copies of reconstruction data with similar volume to the raw data for each copy. The raw data is transferred to Daya Bay onsite and two offsite clusters: IHEP in Beijing and LBNL in California, with a short latency. There is quasi-real-time data processing at both onsite and offsite clusters, for the purpose of data quality monitoring, detector calibration and preliminary data analyses. The physics data production took place a couple of times per year according to the physics analysis plan. This paper will introduce the data movement and storage, data processing and monitoring, and the automation of the calibration.
The CMS experiment uses self-triggering arrays of drift tubes in the barrel muon trigger to perform the identification of the correct bunch crossing. The identification is unique only if the trigger chain is correctly synchronized. In this paper, the synchronization performed during an extended cosmic ray run is described and the results are reported. The random arrival time of cosmic ray muons allowed several synchronization aspects to be studied and a simple method for the fine synchronization of the Drift Tube Local Trigger at LHC to be developed.
The subsystems of the CMS silicon strip tracker were integrated and commissioned at the Tracker Integration Facility (TIF) in the period from November 2006 to July 2007. As part of the commissioning, large samples of cosmic ray data were recorded under various running conditions in the absence of a magnetic field. Cosmic rays detected by scintillation counters were used to trigger the readout of up to 15% of the final silicon strip detector, and over 4.7 million events were recorded. This document describes the cosmic track reconstruction and presents results on the performance of track and hit reconstruction as from dedicated analyses.
The ANTARES neutrino telescope, to be immersed depth in the Mediterranean Sea, will consist of a 3 dimensional matrix of 900 large area photomultiplier tubes housed in pressure resistant glass spheres. The selection of the optimal photomultiplier was a critical step for the project and required an intensive phase of tests and developments carried out in close collaboration with the main manufacturers worldwide. This paper provides an overview of the tests performed by the collaboration and describes in detail the features of the PMT chosen for ANTARES.
The analysis of data from x-ray microcalorimeters requires great care; their excellent intrinsic energy resolution cannot usually be achieved in practice without a statistically near-optimal pulse analysis and corrections for important systematic errors. We describe the essential parts of a pulse-analysis pipeline for data from x-ray microcalorimeters, including steps taken to reduce systematic gain variation and the unwelcome dependence of filtered pulse heights on the exact pulse-arrival time. We find these steps collectively to be essential tools for getting the best results from a microcalorimeter-based x-ray spectrometer.
We perform experimental and theoretical study of the parallel-series arrays of Cold-Electron Bolometers (CEBs) integrated into a cross-slot antenna and composed with an immersion silicon lens. The purpose is to determine the absorption efficiency, the responsivity and the noise equivalent power (NEP) of the bolometers. The absorbed power has been found in two independent ways. The comparison of two approaches gives better understanding of the system and secures from misinterpretations. The first approach is fitting of the bolometer IV curves with solutions of heat-balance equations. The second approach is modeling of electromagnetic properties of the system, including an antenna, lens, optical can, band-pass filters and black body source. The difference between both methods does not exceed $30\\%$. The optimization of experimental setup is proposed to approach the photon limited detection mode.
The very high momentum particle identification detector proposed for the ALICE upgrade is a focusing RICH using a C4F10 gaseous radiator. For the detection of Cherenkov photons, one of the options currently under investigation is to use a CsI coated Triple-Thick-GEM (CsI-TTGEM) with metallic or resistive electrodes. We will present results from the laboratory studies as well as preliminary results of beam tests of a RICH detector prototype consisting of a CaF2 radiator coupled to a 10x10 cm2 CsI-TTGEM equipped with a pad readout and GASSIPLEX-based front-end electronics. With such a prototype the detection of Cherenkov photons simultaneously with minimum ionizing particles has been achieved for the first time in a stable operation mode.
We have studied gain vs. voltage characteristics and position resolutions of multistep capillary plates (two or three capillary plates operating in a cascade), as well as capillary plates operating in a mode when the main amplification occurs between plates or between the capillary plate and the readout plate (parallel plate amplification mode). Results of these studies demonstrated that in the parallel-plate amplification mode one can reach both high gains (>100000) and good position resolutions (~100 micro meter) even with a single step arrangement. It offers a compact amplification structure, which can be used in many applications. For example, in preliminary tests we succeeded to combine it with a photocathode and use it as a position sensitive gaseous photomultiplier. CsI coated capillary plates could also be used as a high position resolution and high rate X-ray converter.
The variety of applications and especially the unique European XFEL time structure will require adequate instrumentation to be developed to exploit the full potential of the light source. Two-dimensional integrating X-ray detectors with ultra-fast read out up to 4.5 MHz for 1024 x 1024 pixel images are under development for a variety of imaging applications. The actual status of the European XFEL detector development projects is presented. Furthermore, an outlook will be given with respect to detector research and development, performance optimization, integration, and commissioning.
If the space $\\mathcal{Q}$ of quadratic forms in $\\mathbb{R}^n$ is splitted in a direct sum $\\mathcal{Q}_1\\oplus...\\oplus \\mathcal{Q}_k$ and if $X$ and $Y$ are independent random variables of $\\mathbb{R}^n$, assume that there exist a real number $a$ such that $E(X|X+Y)=a(X+Y)$ and real distinct numbers $b_1,...,b_k$ such that $E(q(X)|X+Y)=b_iq(X+Y)$ for any $q$ in $\\mathcal{Q}_i.$ We prove that this happens only when $k=2$, when $\\mathbb{R}^n$ can be structured in a Euclidean Jordan algebra and when $X$ and $Y$ have Wishart distributions corresponding to this structure.
For a sample of $n$ independent identically distributed $p$-dimensional centered random vectors with covariance matrix $\\mathbf{\\Sigma}_n$ let $\\tilde{\\mathbf{S}}_n$ denote the usual sample covariance (centered by the mean) and $\\mathbf{S}_n$ the non-centered sample covariance matrix (i.e. the matrix of second moment estimates), where $p> n$. In this paper, we provide the limiting spectral distribution and central limit theorem for linear spectral statistics of the Moore-Penrose inverse of $\\mathbf{S}_n$ and $\\tilde{\\mathbf{S}}_n$. We consider the large dimensional asymptotics when the number of variables $p\\rightarrow\\infty$ and the sample size $n\\rightarrow\\infty$ such that $p/n\\rightarrow c\\in (1, +\\infty)$. We present a Marchenko-Pastur law for both types of matrices, which shows that the limiting spectral distributions for both sample covariance matrices are the same. On the other hand, we demonstrate that the asymptotic distribution of linear spectral statistics of the Moore-Penrose inverse of $\\tilde{\\mathbf{S}}_n$ differs in the mean from that of $\\mathbf{S}_n$.
The purpose of this note is to prove a lower bound for the estimation of the memory parameter of a stationary long memory process. The memory parameter is defined here as the index of regular variation of the spectral density at 0. The rates of convergence obtained in the literature assume second order regular variation of the spectral density at zero. In this note, we do not make this assumption, and show that the rates of convergence in this case can be extremely slow. We prove that the log-periodogram regression (GPH) estimator achieves the optimal rate of convergence for Gaussian long memory processes.
This paper develops goodness of fit statistics that can be used to formally assess Markov random field models for spatial data, when the model distributions are discrete or continuous and potentially parametric. Test statistics are formed from generalized spatial residuals which are collected over groups of nonneighboring spatial observations, called concliques. Under a hypothesized Markov model structure, spatial residuals within each conclique are shown to be independent and identically distributed as uniform variables. The information from a series of concliques can be then pooled into goodness of fit statistics. Under some conditions, large sample distributions of these statistics are explicitly derived for testing both simple and composite hypotheses, where the latter involves additional parametric estimation steps. The distributional results are verified through simulation, and a data example illustrates the method for model assessment.
We revisit and reinterpret Selten s concept of subgame perfectness in the context of single agent normal form sequential decision making, which leads us to the concept of subtree perfectness. Thereby, we extend Hammond s characterization of extensive form consequentialist consistent behaviour norms to the normal form and to arbitrary choice functions under very few assumptions. In particular, we do not need to assume probabilities on any event or utilities on any reward. We show that subtree perfectness is equivalent to normal-extensive form equivalence, and is sufficient, but, perhaps surprisingly, not necessary, for backward induction to work.
We consider a diffusion $(\\xi_t)_{t\\ge 0}$ with some $T$-periodic time dependent input term contained in the drift: under an unknown parameter $\\vth\\in\\Theta$, some discontinuity - an additional periodic signal - occurs at times $kT{+}\\vth$, $k\\in\\bbn$. Assuming positive Harris recurrence of $(\\xi_{kT})_{k\\in\\bbn_0}$ and exploiting the periodicity structure, we prove limit theorems for certain martingales and functionals of the process $(\\xi_t)_{t\\ge 0}$. They allow to consider the statistical model parametrized by $\\vth\\in\\Theta$ locally in small neighbourhoods of some fixed $\\vth$, with radius $1/n$ as $\\nto$. We prove convergence of local models to a limit experiment studied by Ibragimov and Khasminskii [IH 81] and discuss the behaviour of estimators under contiguous alternatives.
We propose a stable version of Principal Component Analysis (PCA) in the general framework of a separable Hilbert space. It consists in interpreting the projection on the first eigenvectors as a step function applied to the spectrum of the covariance operator and in replacing it with a smooth cut-off of the eigenvalues. We study the problem from a statistical point of view, so that we assume that we do not have direct access to the covariance operator but we have to estimate it from an i.i.d. sample. We provide some results on the quality of the approximation of our spectral cut-off in terms of the quality of the approximation of the eigenvalues of the covariance operator.
This article provides an assessment of the causal effect of customer relationship management (CRM) applications on one-to-one marketing effectiveness. We use a potential outcomes based propensity score approach to assess this causal effect. We find that firms using CRM systems have greater levels of one-to-one marketing effectiveness. We discuss the strengths and challenges of using the propensity score approach to design and execute CRM related observational studies. We also discuss the applicability of the framework in this paper to study typical causal questions in business and electronic commerce research at the firm, individual and economy levels, and to clarify the assumptions that researchers must make to infer causality from observational data.
$n$ independent random points drawn from a density $f$ in $R^d$ define a random Voronoi partition. We study the measure of a typical cell of the partition. We prove that the asymptotic distribution of the probability measure of the cell centered at a point $x \\in R^d$ is independent of $x$ and the density $f$. We determine all moments of the asymptotic distribution and show that the distribution becomes more concentrated as $d$ becomes large. In particular, we show that the variance converges to zero exponentially fast in $d$. %We also study the measure of the largest cell of the partition. %{\\red We also obtain a density-free bound for the rate of convergence of the diameter of a typical Voronoi cell.
Limit theorems are proved for quadratic forms of Gaussian random fields in presence of long memory. We obtain a non central limit theorem under a minimal integrability condition, which allows isotropic and anisotropic models. We apply our limit theorems and those of Ginovian (99) to obtain the asymptotic behavior of the empirical covariances of Gaussian fields, which is a particular example of quadratic forms. We show that it is possible to obtain a Gaussian limit when the spectral density is not in $L^2$. Therefore the dichotomy observed in dimension $d=1$ between central and non central limit theorems cannot be stated so easily due to possible anisotropic strong dependence in $d>1$.
We consider the problem of model selection and estimation in situations where the number of parameters diverges with the sample size. When the dimension is high, an ideal method should have the oracle property [J. Amer. Statist. Assoc. 96 (2001) 1348--1360] and [Ann. Statist. 32 (2004) 928--961] which ensures the optimal large sample performance. Furthermore, the high-dimensionality often induces the collinearity problem, which should be properly handled by the ideal method. Many existing variable selection methods fail to achieve both goals simultaneously. In this paper, we propose the adaptive elastic-net that combines the strengths of the quadratic regularization and the adaptively weighted lasso shrinkage. Under weak regularity conditions, we establish the oracle property of the adaptive elastic-net. We show by simulations that the adaptive elastic-net deals with the collinearity problem better than the other oracle-like methods, thus enjoying much improved finite sample performance.
In multiple change-point problems, different data segments often follow different distributions, for which the changes may occur in the mean, scale or the entire distribution from one segment to another. Without the need to know the number of change-points in advance, we propose a nonparametric maximum likelihood approach to detecting multiple change-points. Our method does not impose any parametric assumption on the underlying distributions of the data sequence, which is thus suitable for detection of any changes in the distributions. The number of change-points is determined by the Bayesian information criterion and the locations of the change-points can be estimated via the dynamic programming algorithm and the use of the intrinsic order structure of the likelihood function. Under some mild conditions, we show that the new method provides consistent estimation with an optimal rate. We also suggest a prescreening procedure to exclude most of the irrelevant points prior to the implementation of the nonparametric likelihood method. Simulation studies show that the proposed method has satisfactory performance of identifying multiple change-points in terms of estimation accuracy and computation time.
This paper is concerned with deriving the limit distributions of stopping times devised to sequentially uncover structural breaks in the parameters of an autoregressive moving average, ARMA, time series. The stopping rules are defined as the first time lag for which detectors, based on CUSUMs and Page s CUSUMs for residuals, exceed the value of a prescribed threshold function. It is shown that the limit distributions crucially depend on a drift term induced by the underlying ARMA parameters. The precise form of the asymptotic is determined by an interplay between the location of the break point and the size of the change implied by the drift. The theoretical results are accompanied by a simulation study and applications to electroencephalography, EEG, and IBM data. The empirical results indicate a satisfactory behavior in finite samples.
The \"large p, small n\" paradigm arises in microarray studies, where expression levels of thousands of genes are monitored for a small number of subjects. There has been an increasing demand for study of asymptotics for the various statistical models and methodologies using genomic data. In this article, we focus on one-sample and two-sample microarray experiments, where the goal is to identify significantly differentially expressed genes. We establish uniform consistency of certain estimators of marginal distribution functions, sample means and sample medians under the large p small n assumption. We also establish uniform consistency of marginal p-values based on certain asymptotic approximations which permit inference based on false discovery rate techniques. The affects of the normalization process on these results is also investigated. Simulation studies and data analyses are used to assess finite sample performance.
The paper deals with Hilbert space valued fields over any locally compact Abelian group G, in particular over G = Z^n x R^m, which are periodically correlated (PC) with respect to a closed subgroup of G. PC fields can be regarded as multi-parameter extensions of PC processes. We study structure, covariance function, and an analogue of the spectrum for such fields. As an example a weakly PC field over Z^2 is thoroughly examined.
Higher criticism, or second-level significance testing, is a multiple-comparisons concept mentioned in passing by Tukey. It concerns a situation where there are many independent tests of significance and one is interested in rejecting the joint null hypothesis. Tukey suggested comparing the fraction of observed significances at a given \\alpha-level to the expected fraction under the joint null. In fact, he suggested standardizing the difference of the two quantities and forming a z-score; the resulting z-score tests the significance of the body of significance tests. We consider a generalization, where we maximize this z-score over a range of significance levels 0<\\alpha\\leq\\alpha_0. We are able to show that the resulting higher criticism statistic is effective at resolving a very subtle testing problem: testing whether n normal means are all zero versus the alternative that a small fraction is nonzero. The subtlety of this ``sparse normal means   testing problem can be seen from work of Ingster and Jin, who studied such problems in great detail. In their studies, they identified an interesting range of cases where the small fraction of nonzero means is so small that the alternative hypothesis exhibits little noticeable effect on the distribution of the p-values either for the bulk of the tests or for the few most highly significant tests. In this range, when the amplitude of nonzero means is calibrated with the fraction of nonzero means, the likelihood ratio test for a precisely specified alternative would still succeed in separating the two hypotheses.
This paper introduces a new framework to study the asymptotical behavior of the empirical distribution function (e.d.f.) of Gaussian vector components, whose correlation matrix $\\Gamma^{(m)}$ is dimension-dependent. Hence, by contrast with the existing literature, the vector is not assumed to be stationary. Rather, we make a \"vanishing second order\" assumption ensuring that the covariance matrix $\\Gamma^{(m)}$ is not too far from the identity matrix, while the behavior of the e.d.f. is affected by $\\Gamma^{(m)}$ only through the sequence $\\gamma_m=m^{-2} \\sum_{i\\neq j} \\Gamma_{i,j}^{(m)}$, as $m$ grows to infinity. This result recovers some of the previous results for stationary long-range dependencies while it also applies to various, high-dimensional, non-stationary frameworks, for which the most correlated variables are not necessarily next to each other. Finally, we present an application of this work to the multiple testing problem, which was the initial statistical motivation for developing such a methodology.
Z-scores are often employed in outlier detection in a dataset. For small samples, the presence of multiple outliers forces a finite supremum on the absolute value of possible z-scores that decreases with an increasing number of outliers, creating a \"masking effect\" that hinders identification of true outliers. We give an illustrative case study in which the accurate detection of the number of outliers is critical, and provide a closed form expression of the maximum possible z-score in terms of the sample size and number of outliers. In addition, a corresponding analysis on the $t-$statistic is performed.
We restrict our attention to space-time point pattern data for which we have a single realisation within a finite region. Second-order characteristics are used to analyse the spatio-temporal structure of the underlying point process. In particular, the space-time inhomogeneous pair correlation function and $K$-function measure the spatio-temporal clustering/regularity and the spatio-temporal interaction, and thus help with model choice. Non-parametric estimators of the second-order characteristics require information from outside the study region, resulting to the so-called edge effects which have to be corrected, and depend on first-order characteristics, which have to be estimated in practice. Here, we extend classical edge correction factors to the spatio-temporal setting and compare the performance of the related estimators for stationary/non-stationary and/or isotropic/anisotropic point patterns. Then, we explore the influence of estimated intensity function on these estimators.
In this paper we study the asymptotic behaviour of empirical processes when parameters are estimated, assuming that the underlying sequence of random variables is long-range dependent. We show completely different phenomena compared to i.i.d. situation, as well as compared to ordinary empirical processes of long range dependent sequences. Applications include Kolmogorov-Smirnov and Cramer-Smirnov-von Mises goodness-of-fit statistics.
Let \\[Y_j=f_*(X_j)+\\xi_j,\\qquad j=1,...,n,\\] where $X,X_1,...,X_n$ are i.i.d. random variables in a measurable space $(S,\\mathcal{A})$ with distribution $\\Pi$ and $\\xi,\\xi_1,... ,\\xi_n$ are i.i.d. random variables with ${\\mathbb{E}}\\xi=0$ independent of $(X_1,...,X_n).$ Given a dictionary $h_1,...,h_N:S\\mapsto{\\mathbb{R}},$ let $f_{\\lambda}:=\\sum_{j=1}^N\\lambda_jh_j$, $\\lambda=(\\lambda_1,...,\\lambda_N)\\in{\\mathbb{R}}^N.$ Given $\\varepsilon>0,$ define \\[\\hat{\\Lambda}_{\\varepsilon}:=\\Biggl\\{\\lam bda\\in{\\mathbb{R}}^N:\\max_{1\\leq k\\leq N}\\Biggl|n^{-1}\\sum_{j=1}^n\\big l(f_{\\lambda}(X_j)-Y_j\\bigr)h_k(X_j)\\Biggr|\\leq\\varepsilon \\Biggr\\}\\] and \\[\\hat{\\lambda}:=\\hat{\\lambda}^{\\varepsilon}\\in \\operatorname {Arg min}\\limits_{\\lambda\\in\\hat{\\Lambda}_{\\varepsilon}}\\|\\lambda\\|_{\\ell_1}.\\] In the case where $f_*:=f_{\\lambda^*},\\lambda^*\\in {\\mathbb{R}}^N,$ Candes and Tao [Ann. Statist. 35 (2007) 2313--2351] suggested using $\\hat{\\lambda}$ as an estimator of $\\lambda^*.$ They called this estimator ``the Dantzig selector  . We study the properties of $f_{\\hat{\\lambda}}$ as an estimator of $f_*$ for regression models with random design, extending some of the results of Candes and Tao (and providing alternative proofs of these results).
We propose a new prior for ultra-sparse signal detection that we term the \"horseshoe+ prior.\" The horseshoe+ prior is a natural extension of the horseshoe prior that has achieved success in the estimation and detection of sparse signals and has been shown to possess a number of desirable theoretical properties while enjoying computational feasibility in high dimensions. The horseshoe+ prior builds upon these advantages. Our work proves that the horseshoe+ posterior concentrates at a rate faster than that of the horseshoe in the Kullback-Leibler (K-L) sense. We also establish theoretically that the proposed estimator has lower posterior mean squared error in estimating signals compared to the horseshoe and achieves the optimal Bayes risk in testing up to a constant. For global-local scale mixture priors, we develop a new technique for analyzing the marginal sparse prior densities using the class of Meijer-G functions. In simulations, the horseshoe+ estimator demonstrates superior performance in a standard design setting against competing methods, including the horseshoe and Dirichlet-Laplace estimators. We conclude with an illustration on a prostate cancer data set and by pointing out some directions for future research.
Strong mixing property holds for a broad class of linear and nonlinear time series models such as ARMA and GARCH models. In this article we study correlation structure of strong mixing sequences, and some asymptotic properties are presented. We also present a new method for detecting change point in correlation structure of strong mixing sequences, and present a nonparametric CUSUM test statistic for this. Asymptotic consistency of this test statistics is shown. This method is applied to simulated data of some linear and nonlinear models and power of the test is evaluated. For linear models, it is shown that this method have a better performance in compare to Berkes et al.(2009).
The closure of a discrete exponential family is described by a finite set of equations corresponding to the circuits of an underlying oriented matroid. These equations are similar to the equations used in algebraic statistics, although they need not be polynomial in the general case. This description allows for a combinatorial study of the possible support sets in the closure of an exponential family. If two exponential families induce the same oriented matroid, then their closures have the same support sets. Furthermore, the positive cocircuits give a parameterization of the closure of the exponential family.
A (p-1)-variate integral representation is given for the cumulative distribution function of the general p-variate non-central gamma distribution with a non-centrality matrix of any admissible rank. The real part of products of well known analytical functions is integrated over arguments from (-pi,pi). To facilitate the computation, these formulas are given more detailed for p=2 and p=3. These (p-1)-variate integrals are also derived for the diagonal of a non-central complex Wishart Matrix. Furthermore, some alternative formulas are given for the cases with an associated \"one-factorial\" (pxp)-correlation matrix R, i.e. R differs from a suitable diagonal matrix only by a matrix of rank 1, which holds in particular for all (3x3)-R with no vanishing correlation.
This paper considers the problem of comparing two processes with panel data. A nonparametric test is proposed for detecting a monotone change in the link between the two process distributions. The test statistic is of CUSUM type, based on the empirical distribution functions. The asymptotic distribution of the proposed statistic is derived and its finite sample property is examined by bootstrap procedures through Monte Carlo simulations.
The incorporation of priors in the Optimal Uncertainty Quantification (OUQ) framework \\cite{OSSMO:2011} reveals brittleness in Bayesian inference; a model may share an arbitrarily large number of finite-dimensional marginals with, or be arbitrarily close (in Prokhorov or total variation metrics) to, the data-generating distribution and still make the largest possible prediction error after conditioning on an arbitrarily large number of samples. The initial purpose of this paper is to unwrap this brittleness mechanism by providing (i) a quantitative version of the Brittleness Theorem of \\cite{BayesOUQ} and (ii) a detailed and comprehensive analysis of its application to the revealing example of estimating the mean of a random variable on the unit interval $[0,1]$ using priors that exactly capture the distribution of an arbitrarily large number of Hausdorff moments. However, in doing so, we discovered that the free parameter associated with Markov and Kre\\u{\\i}n s canonical representations of truncated Hausdorff moments generates reproducing kernel identities corresponding to reproducing kernel Hilbert spaces of polynomials. Furthermore, these reproducing identities lead to biorthogonal systems of Selberg integral formulas. This process of discovery appears to be generic: whereas Karlin and Shapley used Selberg s integral formula to first compute the volume of the Hausdorff moment space (the polytope defined by the first $n$ moments of a probability measure on the interval $[0,1]$), we observe that the computation of that volume along with higher order moments of the uniform measure on the moment space, using different finite-dimensional representations of subsets of the infinite-dimensional set of probability measures on $[0,1]$ representing the first $n$ moments, leads to families of equalities corresponding to classical and new Selberg identities.
This paper investigates the (conditional) quasi-likelihood ratio test for the threshold in MA models. Under the hypothesis of no threshold, it is shown that the test statistic converges weakly to a function of the centred Gaussian process. Under local alternatives, it is shown that this test has nontrivial asymptotic power. The results are based on a new weak convergence of a linear marked empirical process, which is independently of interest. This paper also gives an invertible expansion of the threshold MA models.
Let $(X,Y)$ be a bivariate random vector. The estimation of a probability of the form $P(Y\\leq y \\mid X >t) $ is challenging when $t$ is large, and a fruitful approach consists in studying, if it exists, the limiting conditional distribution of the random vector $(X,Y)$, suitably normalized, given that $X$ is large. There already exists a wide literature on bivariate models for which this limiting distribution exists. In this paper, a statistical analysis of this problem is done. Estimators of the limiting distribution (which is assumed to exist) and the normalizing functions are provided, as well as an estimator of the conditional quantile function when the conditioning event is extreme. Consistency of the estimators is proved and a functional central limit theorem for the estimator of the limiting distribution is obtained. The small sample behavior of the estimator of the conditional quantile function is illustrated through simulations.
In the competing risks problem, an important role is played by the cumulative incidence function (CIF), whose value at time $t$ is the probability of failure by time $t$ from a particular type of failure in the presence of other risks. In some cases there are reasons to believe that the CIFs due to various types of failure are linearly ordered. El Barmi et al. [3] studied the estimation and inference procedures under this ordering when there are only two causes of failure. In this paper we extend the results to the case of $k$ CIFs, where $k\\ge3$. Although the analyses are more challenging, we show that most of the results in the 2-sample case carry over to this $k$-sample case.
Recent results in quantization theory show that the mean-squared expected distortion can reach a rate of convergence of $\\mathcal{O}(1/n)$, where $n$ is the sample size [see, e.g., IEEE Trans. Inform. Theory 60 (2014) 7279-7292 or Electron. J. Stat. 7 (2013) 1716-1746]. This rate is attained for the empirical risk minimizer strategy, if the source distribution satisfies some regularity conditions. However, the dependency of the average distortion on other parameters is not known, and these results are only valid for distributions over finite-dimensional Euclidean spaces. This paper deals with the general case of distributions over separable, possibly infinite dimensional, Hilbert spaces. A condition is proposed, which may be thought of as a margin condition [see, e.g., Ann. Statist. 27 (1999) 1808-1829], under which a nonasymptotic upper bound on the expected distortion rate of the empirically optimal quantizer is derived. The dependency of the distortion on other parameters of distributions is then discussed, in particular through a minimax lower bound.
We address the problem of density estimation with $\\mathbb{L}_s$-loss by selection of kernel estimators. We develop a selection procedure and derive corresponding $\\mathbb{L}_s$-risk oracle inequalities. It is shown that the proposed selection rule leads to the estimator being minimax adaptive over a scale of the anisotropic Nikol skii classes. The main technical tools used in our derivations are uniform bounds on the $\\mathbb{L}_s$-norms of empirical processes developed recently by Goldenshluger and Lepski [Ann. Probab. (2011), to appear].
Almost sure convergence rates for linear algorithms $h_{k+1} = h_k +\\frac{1}{k^\\chi} (b_k-A_kh_k)$ are studied, where $\\chi\\in(0,1)$, $\\{A_{k}\\}_{k=1}^\\infty$ are symmetric, positive semidefinite random matrices and $\\{b_{k}\\}_{k=1}^\\infty$ are random vectors. It is shown that $|h_n- A^{-1}b|=o(n^{-\\gamma})$ a.s. for the $\\gamma\\in[0,\\chi)$, positive definite $A$ and vector $b$ such that $\\frac{1}{n^{\\chi-\\gamma}}\\sum\\limits_{k=1}^n (A_{k}- A)\\to 0$ and $\\frac{1}{n^{\\chi-\\gamma}}\\sum\\limits_{k=1}^n (b_k-b)\\to 0$ a.s. When $\\chi-\\gamma\\in\\left(\\frac12,1\\right)$, these assumptions are implied by the Marcinkiewicz strong law of large numbers, which allows the $\\{A_k\\}$ and $\\{b_k\\}$ to have heavy-tails, long-range dependence or both. Finally, corroborating experimental outcomes and decreasing-gain design considerations are provided.
When auxiliary information is available at the design stage, samples may be selected by means of balanced sampling. Deville and Tille proposed in 2004 a general algorithm to perform balanced sampling, named the cube method. In this paper, we are interested in a particular case of the cube method named pivotal sampling, and first described by Deville and Tille in 1998. We show that this sampling algorithm, when applied to units ranked in a fixed order, is equivalent to Deville s systematic sampling, in the sense that both algorithms lead to the same sampling design. This characterization enables the computation of the second-order inclusion probabilities for pivotal sampling. We show that the pivotal sampling enables to take account of an appropriate ordering of the units to achieve a variance reduction, while limiting the loss of efficiency if the ordering is not appropriate.
Stochastic processes are often used to model complex scientific problems in fields ranging from biology and finance to engineering and physical science. This paper investigates rate-optimal estimation of the volatility matrix of a high-dimensional It\\^{o} process observed with measurement errors at discrete time points. The minimax rate of convergence is established for estimating sparse volatility matrices. By combining the multi-scale and threshold approaches we construct a volatility matrix estimator to achieve the optimal convergence rate. The minimax lower bound is derived by considering a subclass of It\\^{o} processes for which the minimax lower bound is obtained through a novel equivalent model of covariance matrix estimation for independent but nonidentically distributed observations and through a delicate construction of the least favorable parameters. In addition, a simulation study was conducted to test the finite sample performance of the optimal estimator, and the simulation results were found to support the established asymptotic theory.
Although unbiasedness is a basic property of a good test, many tests on vector parameters or scalar parameters against two-sided alternatives are not finite-sample unbiased. This was already noticed by Sugiura [Ann. Inst. Statist. Math. 17 (1965) 261--263]; he found an alternative against which the Wilcoxon test is not unbiased. The problem is even more serious in multivariate models. When testing the hypothesis against an alternative which fits well with the experiment, it should be verified whether the power of the test under this alternative cannot be smaller than the significance level. Surprisingly, this serious problem is not frequently considered in the literature. The present paper considers the two-sample multivariate testing problem. We construct several rank tests which are finite-sample unbiased against a broad class of location/scale alternatives and are finite-sample distribution-free under the hypothesis and alternatives. Each of them is locally most powerful against a specific alternative of the Lehmann type. Their powers against some alternatives are numerically compared with each other and with other rank and classical tests. The question of affine invariance of two-sample multivariate tests is also discussed.
In multivariate statistics, acyclic mixed graphs with directed and bidirected edges are widely used for compact representation of dependence structures that can arise in the presence of hidden (i.e., latent or unobserved) variables. Indeed, under multivariate normality, every mixed graph corresponds to a set of covariance matrices that contains as a full-dimensional subset the covariance matrices associated with a causally interpretable acyclic digraph. This digraph generally has some of its nodes corresponding to hidden variables. We seek to clarify for which mixed graphs there exists an acyclic digraph whose hidden variable model coincides with the mixed graph model. Restricting to the tractable setting of chain graphs and multivariate normality, we show that decomposability of the bidirected part of the chain graph is necessary and sufficient for equality between the mixed graph model and some hidden variable model given by an acyclic digraph.
Lack-of-fit testing of a regression model with Berkson measurement error has not been discussed in the literature to date. To fill this void, we propose a class of tests based on minimized integrated square distances between a nonparametric regression function estimator and the parametric model being fitted. We prove asymptotic normality of these test statistics under the null hypothesis and that of the corresponding minimum distance estimators under minimal conditions on the model being fitted. We also prove consistency of the proposed tests against a class of fixed alternatives and obtain their asymptotic power against a class of local alternatives orthogonal to the null hypothesis. These latter results are new even when there is no measurement error. A simulation that is included shows very desirable finite sample behavior of the proposed inference procedures.
A nonuniform version of the Berry-Esseen bound has been proved. The most important feature of the new bound is a monotonically decreasing function C(|t|) instead of the universal constant C=29.1174: C(|t|)<C if |t| > 3.2, and C(|t|) tends to 1+e if |t| is increasing. The function C(|t|) has very complex analytical expression based on indicator functions. A general algorithm was developed in order to estimate values of C(|t|) for an arbitrary t.
In this article, we have proposed a generalized class of estimators, exponential class of estimators based on adaption of Sharma and Singh (2015) and Solanki and Singh (2013) and simple difference estimator for estimating unknown population mean in case of Poisson distributed population in simple random sampling without replacement. The expressions for mean square errors of the proposed classes of estimators are derived to the first order of approximation. It is shown that the adapted version of Solanki and Singh (2013), exponential class of estimator, is always more efficient than usual estimator, ratio, product, exponential ratio and exponential product type estimators and equal efficient to simple difference estimator. Moreover, the adapted version of Sharma and Singh (2015) estimator are always more efficient than all the estimators available in literature. In addition, theoretical findings are supported by an empirical study to show the superiority of the constructed estimators over others with earthquake data of Turkey.
The goal of this paper is to provide theorems on convergence rates of posterior distributions that can be applied to obtain good convergence rates in the context of density estimation as well as regression. We show how to choose priors so that the posterior distributions converge at the optimal rate without prior knowledge of the degree of smoothness of the density function or the regression function to be estimated.
In this paper, we propose a dimension reduction model for spatially dependent variables. Namely, we investigate an extension of the \\emph{inverse regression} method under strong mixing condition. This method is based on estimation of the matrix of covariance of the expectation of the explanatory given the dependent variable, called the \\emph{inverse regression}. Then, we study, under strong mixing condition, the weak and strong consistency of this estimate, using a kernel estimate of the \\emph{inverse regression}. We provide the asymptotic behaviour of this estimate. A spatial predictor based on this dimension reduction approach is also proposed. This latter appears as an alternative to the spatial non-parametric predictor.
I show how one can modify the random-walk Metropolis MCMC method in such a way that a sequence of modified Metropolis updates takes little computation time when the rejection rate is outside a desired interval. This allows one to effectively adapt the scale of the Metropolis proposal distribution, by performing several such \"short-cut\" Metropolis sequences with varying proposal stepsizes. Unlike other adaptive Metropolis schemes, this method converges to the correct distribution in the same fashion as the standard Metropolis method.
Consider an autoregressive model with measurement error: we observe $Z_i=X_i+\\epsilon_i$, where $X_i$ is a stationary solution of the equation $X_i=f_{\\theta^0}(X_{i-1})+\\xi_i$. The regression function $f_{\\theta^0}$ is known up to a finite dimensional parameter $\\theta^0$. The distributions of $X_0$ and $\\xi_1$ are unknown whereas the distribution of $\\epsilon_1$ is completely known. We want to estimate the parameter $\\theta^0$ by using the observations $Z_0,..,Z_n$. We propose an estimation procedure based on a modified least square criterion involving a weight function $w$, to be suitably chosen. We give upper bounds for the risk of the estimator, which depend on the smoothness of the errors density $f_\\epsilon$ and on the smoothness properties of $w f_\\theta$.
In the classical many normal means with different variances, we consider the situation when the observer is allowed to allocate the available measurement budget over the coordinates of the parameter of interest. The benchmark is the minimax linear risk over a set. We solve the problem of optimal allocation of observations under the measurement budget constrain for two types of sets, ellipsoids and hyperrectangles. By elaborating on the two examples of Sobolev ellipsoids and hyperectangles, we demonstrate how re-allocating the measurements in the (sub-)optimal way improves on the standard uniform allocation. In particular, we improve the famous Pinsker (1980) bound.
In a general class of Bayesian nonparametric models, we prove that the posterior distribution can be asymptotically approximated by a Gaussian process. Our results apply to nonparametric exponential family that contains both Gaussian and non-Gaussian regression, no matter the design is fxed or random, and also hold for both efficient (root-n) and inefficient (non root-n) estimation. Our general approximation theorem does not rely on posterior conjugacy, and can be verified in a class of Gaussian process priors that has a smoothing spline interpretation [51, 36]. In particular, the limiting posterior measure becomes prior-free under a Bayesian version of \"undersmoothing\" condition. Finally, we apply our approximation theorem to examine the asymptotic frequentist properties of Bayesian procedures such as credible regions and credible intervals.
In Ruckdeschel[10], we derive an asymptotic expansion of the maximal mean squared error (MSE) of location M-estimators on suitably thinned out, shrinking gross error neighborhoods. In this paper, we compile several consequences of this result: With the same techniques as used for the MSE, we determine higher order expressions for the risk based on over-/undershooting probabilities as in Huber[68] and Rieder[80b], respectively. For the MSE problem, we tackle the problem of second order robust optimality: In the symmetric case, we find the second order optimal scores again of Hampel form, but to an O(n^{-1/2})-smaller clipping height c than in first order asymptotics. This smaller c improves MSE only by LO(1/n). For the case of unknown contamination radius we generalize the minimax inefficiency introduced in Rieder et al. [08] to our second order setup. Among all risk maximizing contaminations we determine a \"most innocent\" one. This way we quantify the \"limits of detectability\" in Huber[97] s definition for the purposes of robustness.
The paper considers a linear regression model with multiple change-points occurring at unknown times. The LASSO technique is very interesting since it allows the parametric estimation, including the change-points, and automatic variable selection simultaneously. The asymptotic properties of the LASSO-type (which has as particular case the LASSO estimator) and of the adaptive LASSO estimators are studied. For this last estimator the oracle properties are proved. In both cases, a model selection criterion is proposed. Numerical examples are provided showing the performances of the adaptive LASSO estimator compared to the LS estimator.
An open problem in graphical Gaussian models is to determine the smallest number of observations needed to guarantee the existence of the maximum likelihood estimator of the covariance matrix with probability one. In this paper we formalize a closely related problem in which the existence of the maximum likelihood estimator is guaranteed for all generic observations. We call the number determined by this problem the Gaussian rank of the graph representing the model. We prove that the Gaussian rank is strictly between the subgraph connectivity number and the graph degeneracy number. These bounds are in general much sharper than the best bounds known in the literature and furthermore computable in polynomial time.
Let $(X,Y)\\in\\mathcal{X}\\times \\mathcal{Y}$ be a random couple with unknown distribution $P$. Let $\\GG$ be a class of measurable functions and $\\ell$ a loss function. The problem of statistical learning deals with the estimation of the Bayes: $$g^*=\\arg\\min_{g\\in\\GG}\\E_P \\ell(g(X),Y). $$ In this paper, we study this problem when we deal with a contaminated sample $(Z_1,Y_1),..., (Z_n,Y_n)$ of i.i.d. indirect observations. Each input $Z_i$, $i=1,...,n$ is distributed from a density $Af$, where $A$ is a known compact linear operator and $f$ is the density of the direct input $X$. We derive fast rates of convergence for empirical risk minimizers based on regularization methods, such as deconvolution kernel density estimators or spectral cut-off. These results are comparable to the existing fast rates in Koltchinskii for the direct case. It gives some insights into the effect of indirect measurements in the presence of fast rates of convergence.
We show that the control of the false discovery rate (FDR) for a multiple testing procedure is implied by two coupled simple sufficient conditions. The first one, which we call ``self-consistency condition  , concerns the algorithm itself, and the second, called ``dependency control condition   is related to the dependency assumptions on the $p$-value family. Many standard multiple testing procedures are self-consistent (e.g. step-up, step-down or step-up-down procedures), and we prove that the dependency control condition can be fulfilled when choosing correspondingly appropriate rejection functions, in three classical types of dependency: independence, positive dependency (PRDS) and unspecified dependency. As a consequence, we recover earlier results through simple and unifying proofs while extending their scope to several regards: weighted FDR, $p$-value reweighting, new family of step-up procedures under unspecified $p$-value dependency and adaptive step-up procedures. We give additional examples of other possible applications. This framework also allows for defining and studying FDR control for multiple testing procedures over a continuous, uncountable space of hypotheses.
We study the problem of estimating a mean pattern from a set of similar curves in the setting where the variability in the data is due to random geometric deformations and additive noise. We propose an estimator based on the notion of Frechet mean that is a generalization of the standard notion of averaging to non-Euclidean spaces. We derive a minimax rate for this estimation problem, and we show that our estimator achieves this optimal rate under the asymptotics where both the number of curves and the number of sampling points go to infinity.
We show that empirical risk minimization procedures and regularized empirical risk minimization procedures satisfy nonexact oracle inequalities in an unbounded framework, under the assumption that the class has a subexponential envelope function. The main novelty, in addition to the boundedness assumption free setup, is that those inequalities can yield fast rates even in situations in which exact oracle inequalities only hold with slower rates. We apply these results to show that procedures based on $\\ell_1$ and nuclear norms regularization functions satisfy oracle inequalities with a residual term that decreases like $1/n$ for every $L_q$-loss functions ($q\\geq2$), while only assuming that the tail behavior of the input and output variables are well behaved. In particular, no RIP type of assumption or \"incoherence condition\" are needed to obtain fast residual terms in those setups. We also apply these results to the problems of convex aggregation and model selection.
We consider the nonparametric estimation problem of time-dependent multivariate functions observed in a presence of additive cylindrical Gaussian white noise of a small intensity. We derive minimax lower bounds for the $L^2$-risk in the proposed spatio-temporal model as the intensity goes to zero, when the underlying unknown response function is assumed to belong to a ball of appropriately constructed inhomogeneous time-dependent multivariate functions, motivated by practical applications. Furthermore, we propose both non-adaptive linear and adaptive non-linear wavelet estimators that are asymptotically optimal (in the minimax sense) in a wide range of the so-constructed balls of inhomogeneous time-dependent multivariate functions. The usefulness of the suggested adaptive nonlinear wavelet estimator is illustrated with the help of simulated and real-data examples.
We define the quantile set of order $\\alpha \\in \\left[ 1/2,1\\right) $ associated to a law $P$ on $\\mathbb{R}^{d}$ to be the collection of its directional quantiles seen from an observer $O\\in \\mathbb{R}^{d}$. Under minimal assumptions these star-shaped sets are closed surfaces, continuous in $(O,\\alpha )$ and the collection of empirical quantile surfaces is uniformly consistent.\\ Under mild assumptions -- no density or symmetry is required for $P$ -- our uniform central limit theorem reveals the correlations between quantile points and a non asymptotic Gaussian approximation provides joint confident enlarged quantile surfaces. Our main result is a dimension free rate $n^{-1/4} (\\log n)^{1/2}(\\log\\log n) ^{1/4} $ of Bahadur-Kiefer embedding by the empirical process indexed by half-spaces. These limit theorems sharply generalize the univariate quantile convergences and fully characterize the joint behavior of Tukey half-spaces.
We consider priors for several nonparametric Bayesian models which use finite random series with a random number of terms. The prior is constructed through distributions on the number of basis functions and the associated coefficients. We derive a general result on the construction of an appropriate sieve and obtain adaptive posterior contraction rates for all smoothness levels of the function in the true model. We apply this general result on several statistical problems such as signal processing, density estimation, nonparametric additive regression, classification, spectral density estimation, functional regression etc. The prior can be viewed as an alternative to commonly used Gaussian process prior, but can be analyzed by relatively simpler techniques and in many cases allows a simpler approach to computation without using Markov chain Monte-Carlo (MCMC) methods. A simulation study was conducted to show that the performance of the random series prior is comparable to that of a Gaussian process prior.
The paper uses functional auto-regression to predict the dynamics of interest rate curve. It estimates the auto-regressive operator by extending methods of the reduced-rank auto-regression to the functional data. Such an estimation technique is better suited for prediction purposes as opposed to the methods based either on principal components or canonical correlations. The consistency of the estimator is proved using methods of operator theory. The estimation method is used to analyze dynamics of Eurodollar futures rates. The results suggest that future movements of interest rates are predictable at 1-year horizons.
Methods based on hypothesis tests (HTs) in the Haar domain are widely used to denoise Poisson count data. Facing large datasets or real-time applications, Haar-based denoisers have to use the decimated transform to meet limited-memory or computation-time constraints. Unfortunately, for regular underlying intensities, decimation yields discontinuous estimates and strong \"staircase\" artifacts. In this paper, we propose to combine the HT framework with the decimated biorthogonal Haar (Bi-Haar) transform instead of the classical Haar. The Bi-Haar filter bank is normalized such that the p-values of Bi-Haar coefficients (pBH) provide good approximation to those of Haar (pH) for high-intensity settings or large scales; for low-intensity settings and small scales, we show that pBH are essentially upper-bounded by pH. Thus, we may apply the Haar-based HTs to Bi-Haar coefficients to control a prefixed false positive rate. By doing so, we benefit from the regular Bi-Haar filter bank to gain a smooth estimate while always maintaining a low computational complexity. A Fisher-approximation-based threshold imple- menting the HTs is also established. The efficiency of this method is illustrated on an example of hyperspectral-source-flux estimation.
Principal components analysis (PCA) is a classical method for the reduction of dimensionality of data in the form of n observations (or cases) of a vector with p variables. For a simple model of factor analysis type, it is proved that ordinary PCA can produce a consistent (for n large) estimate of the principal factor if and only if p(n) is asymptotically of smaller order than n. There may be a basis in which typical signals have sparse representations: most co-ordinates have small signal energies. If such a basis (e.g. wavelets) is used to represent the signals, then the variation in many coordinates is likely to be small. Consequently, we study a simple \"sparse PCA\" algorithm: select a subset of coordinates of largest variance, estimate eigenvectors from PCA on the selected subset, threshold and reexpress in the original basis. We illustrate the algorithm on some exercise ECG data, and prove that in a single factor model, under an appropriate sparsity assumption, it yields consistent estimates of the principal factor.
We address the problem of classification when data are collected from two samples with measurement errors. This problem turns to be an inverse problem and requires a specific treatment. In this context, we investigate the minimax rates of convergence using both a margin assumption, and a smoothness condition on the boundary of the set associated to the Bayes classifier. We establish lower and upper bounds (based on a deconvolution classifier) on these rates.
Identification of the center of a data cloud is one of the basic problems in statistics. One popular choice for such a center is the median, and several versions of median in finite dimensional spaces have been studied in the literature. In particular, medians based on different notions of data depth have been extensively studied by many researchers, who defined median as the point, where the depth function attains its maximum value. In other words, the median is the deepest point in the sample space according to that definition. In this paper, we investigate the deepest point for probability distributions in infinite dimensional spaces. We show that for some well-known depth functions like the band depth and the half-region depth in function spaces, there may not be any meaningful deepest point for many well-known and commonly used probability models. On the other hand, certain modified versions of those depth functions as well as the spatial depth function, which can be defined in any Hilbert space, lead to some useful notions of the deepest point with nice geometric and statistical properties. The empirical versions of those deepest points can be conveniently computed for functional data, and we demonstrate this using some simulated and real data sets.
It is well known that if the power spectral density of a continuous time stationary stochastic process does not have a compact support, data sampled from that process at any uniform sampling rate leads to biased and inconsistent spectrum estimators. In a recent paper, the authors showed that the smoothed periodogram estimator can be consistent, if the sampling interval is allowed to shrink to zero at a suitable rate as the sample size goes to infinity. In this paper, this `shrinking asymptotics  approach is used to obtain the limiting distribution of the smoothed periodogram estimator of spectra and cross-spectra. It is shown that, under suitable conditions, the scaling that ensures weak convergence of the estimator to a limiting normal random vector can range from cube-root of the sample size to square-root of the sample size, depending on the strength of the assumption made. The results are used to construct asymptotic confidence intervals for spectra and cross spectra. It is shown through a Monte-Carlo simulation study that these intervals have appropriate empirical coverage probabilities at moderate sample sizes.
In several interesting applications one is faced with the problem of simultaneous binary hypothesis testing and parameter estimation. Although such joint problems are not infrequent, there exist no systematic analysis in the literature that treats them effectively. Existing approaches consider the detection and the estimation subproblems separately, applying in each case the corresponding optimum strategy. As it turns out the overall scheme is not necessarily optimum since the criteria used for the two parts are usually incompatible. In this article we propose a mathematical setup that considers the two problems jointly. Specifically we propose a meaningful combination of the Neyman-Pearson and the Bayesian criterion and we provide the optimum solution for the joint problem. In the resulting optimum scheme the two parts interact with each other, producing detection/estimation structures that are completely novel. Notable side-product of our work is the proof that the well known GLR test is finite-sample-size optimum under this combined sense.
We discuss the optimal design problem in regression models with long-range dependence error structure. Asymptotic optimal designs are derived and it is demonstrated that these designs depend only indirectly on the correlation function. Several examples are investigated to illustrate the theory. Finally, the optimal designs are compared with asymptotic optimal designs which were derived by Bickel and Herzberg [Ann. Statist. 7 (1979) 77--95] for regression models with short-range dependent error.
This paper investigates multistep prediction errors for non-stationary autoregressive processes with both model order and true parameters unknown. We give asymptotic expressions for the multistep mean squared prediction errors and accumulated prediction errors of two important methods, plug-in and direct prediction. These expressions not only characterize how the prediction errors are influenced by the model orders, prediction methods, values of parameters and unit roots, but also inspire us to construct some new predictor selection criteria that can ultimately choose the best combination of the model order and prediction method with probability 1. Finally, simulation analysis confirms the satisfactory finite sample performance of the newly proposed criteria.
Much research has been carried out on shrinkage methods for real-valued covariance matrices. In spectral analysis of $p$-vector-valued time series there is often a need for good shrinkage methods too, most notably when the complex-valued spectral matrix is singular. The equivalent of the Ledoit-Wolf (LW) covariance matrix estimator for spectral matrices can be improved on using a Rao-Blackwell estimator, and using random matrix theory we derive its form. Such estimators can be used to better estimate inverse spectral (precision) matrices too, and a random matrix method has previously been proposed and implemented via extensive simulations. We describe the method, but carry out computations entirely analytically, and suggest a way of selecting an important parameter using a predictive risk approach. We show that both the Rao-Blackwell estimator and the random matrix estimator of the precision matrix can substantially outperform the inverse of the LW estimator in a time series setting. Our new methodology is applied to EEG-derived time series data where it is seen to work well and deliver substantial improvements for precision matrix estimation.
Kriging-based surrogate models have become very popular during the last decades to approximate a computer code output from few simulations. In practical applications, it is very common to sequentially add new simulations to obtain more accurate approximations. We propose in this paper a method of kriging-based sequential design which combines both the error evaluation providing by the kriging model and the observed errors of a Leave-One-Out cross-validation procedure. This method is proposed in two versions, the first one selects points one at-a-time. The second one allows us to parallelize the simulations and to add several design points at-a-time. Then, we extend these strategies to multi-fidelity co-kriging models which allow us to surrogate a complex code using fast approximations of it. The main advantage of these extensions is that it not only provides the new locations where to perform simulations but also which versions of code have to be simulated (between the complex one or one of its fast approximations). A real multi-fidelity application is used to illustrate the efficiency of the proposed approaches. In this example, the accurate code is a two-dimensional finite element model and the less accurate one is a one-dimensional approximation of the system.
In a previous paper we considered the random polytope defined as the convex hull of $n$ i.i.d. random points uniformly distributed in a convex body and we focused on the Nikodym distance between that convex body and the random polytope. We proved a uniform deviation inequality, yielding tight moment inequalities in a minimax sense. In this paper, we use a different technique in order to prove similar types of inequalities for the Hausdorff distance between the random polytope and the convex body. We no longer restrict ourselves to the case of uniform distributions. However, our results allow to recover and improve some known inequalities for the convex hull of uniform points in a convex body or on its boundary. We also prove moment inequalities for some class of functionals of the random polytope, including mean width as a special case.
We consider the change-point problem for the marginal distribution of subordinated Gaussian processes that exhibit long-range dependence. The asymptotic distributions of Kolmogorov-Smirnov- and Cram\\ er-von Mises type statistics are investigated. A special feature of distributional changes is the fact that the Hermite rank may change, too. We consider local alternatives covering this scenario, and as a result, we may derive the asymptotic power of the change point tests.
In this paper, we show the Wilks type of results for the Bradley-Terry model. Specifically, for some simple and composite null hypotheses of interest, we show that the likelihood ratio test statistic $\\Lambda$ enjoys a chi-square approximation in the sense that $(2p)^{-1/2}(-2\\log \\Lambda -p)\\stackrel{L}{\\rightarrow}N(0,1)$ as $p$ goes to infinity, where $p$ is the corresponding degrees of freedom. Simulation studies and an application to NBA data illustrate the theoretical results.
Many relevant statistical and econometric models for the analysis of longitudinal data include a latent process to account for the unobserved heterogeneity between subjects in a dynamic fashion. Such a process may be continuous (typically an AR(1)) or discrete (typically a Markov chain). In this paper, we propose a model for longitudinal data which is based on a mixture of AR(1) processes with different means and correlation coefficients, but with equal variances. This model belongs to the class of models based on a continuous latent process, and then it has a natural interpretation in many contexts of application, but it is more flexible than other models in this class, reaching a goodness-of-fit similar to that of a discrete latent process model, with a reduced number of parameters. We show how to perform maximum likelihood estimation of the proposed model by the joint use of an Expectation-Maximisation algorithm and a Newton-Raphson algorithm, implemented by means of recursions developed in the hidden Markov literature. We also introduce a simple method to obtain standard errors for the parameter estimates and a criterion to choose the number of mixture components. The proposed approach is illustrated by an application to a longitudinal dataset, coming from the Health and Retirement Study, about self-evaluation of the health status by a sample of subjects. In this application, the response variable is ordinal and time-constant and time-varying individual covariates are available.
In this paper I develop a wild bootstrap procedure for cluster-robust inference in linear quantile regression models. I show that the bootstrap leads to asymptotically valid inference on the entire quantile regression process in a setting with a large number of small, heterogeneous clusters and provides consistent estimates of the asymptotic covariance function of that process. The proposed bootstrap procedure is easy to implement and performs well even when the number of clusters is much smaller than the sample size. An application to Project STAR data is provided.
This paper proposes a novel test for simultaneous jumps in a bivariate It\\^o semimartingale when observation times are asynchronous and irregular. Inference is built on a realized correlation coefficient for the jumps of the two processes which is estimated using bivariate power variations of Hayashi-Yoshida type without an additional synchronization step. An associated central limit theorem is shown whose asymptotic distribution is assessed using a bootstrap procedure. Simulations show that the test works remarkably well in comparison with the much simpler case of regular observations.
We introduce a new approach to financial returns based on an infinite family of statistics called slide statistics. The evidence these statistics provide suggests that certain distributions such as the stable distributions are not good models for the financial returns from various securities and indexes. The slide statistics are derived from a variant of differential entropy called the genial entropy and can be computed for any sample in a metric space. We give explicit formulas for the first two of these statistics that are easily evaluated by a computer and make this theory particularly suitable for applications. In simulations with a normal random variable, the first slide statistic appears to converge to Pi/4 and for certain other random variables it appears to converge to the reciprocal of the Hausdorff dimension.
We study holonomic gradient decent for maximum likelihood estimation of exponential-polynomial distribution, whose density is the exponential function of a polynomial in the random variable. We first consider the case that the support of the distribution is the set of positive reals. We show that the maximum likelihood estimate (MLE) can be easily computed by the holonomic gradient descent, even though the normalizing constant of this family does not have a closed-form expression and discuss determination of the degree of the polynomial based on the score test statistic. Then we present extensions to the whole real line and to the bivariate distribution on the positive orthant.
This paper is concerned with the spectral properties of matrices associated with linear filters for the estimation of the underlying trend of a time series. The interest lies in the fact that the eigenvectors can be interpreted as the latent components of any time series that the filter smooths through the corresponding eigenvalues. A difficulty arises because matrices associated with trend filters are finite approximations of Toeplitz operators and therefore very little is known about their eigenstructure, which also depends on the boundary conditions or, equivalently, on the filters for trend estimation at the end of the sample. Assuming reflecting boundary conditions, we derive a time series decomposition in terms of periodic latent components and corresponding smoothing eigenvalues. This decomposition depends on the local polynomial regression estimator chosen for the interior. Otherwise, the eigenvalue distribution is derived with an approximation measured by the size of the perturbation that different boundary conditions apport to the eigenvalues of matrices belonging to algebras with known spectral properties, such as the Circulant or the Cosine. The analytical form of the eigenvectors is then derived with an approximation that involves the extremes only. A further topic investigated in the paper concerns a strategy for a filter design in the time domain. Based on cut-off eigenvalues, new estimators are derived, that are less variable and almost equally biased as the original estimator, based on all the eigenvalues. Empirical examples illustrate the effectiveness of the method.
In this paper, we consider adaptive estimation of an unknown planar compact, convex set from noisy measurements of its support function on a uniform grid. Both the problem of estimating the support function at a point and that of estimating the convex set are studied. Data-driven adaptive estimators are proposed and their optimality properties are established. For pointwise estimation, it is shown that the estimator optimally adapts to every compact, convex set instead of a collection of large parameter spaces as in the conventional minimax theory of nonparametric estimation. For set estimation, the estimators adaptively achieve the optimal rate of convergence. In both these problems, our analysis makes no smoothness assumptions on the unknown sets.
A Bayesian nonparametric method for unimodal densities on the real line is provided by considering a class of species sampling mixture models containing random densities that are unimodal and not necessarily symmetric. This class of densities generalize the model considered by Brunner (1992, Statist. Probab. Lett.), in which the Dirichlet process is replaced by a more general class of species sampling models. A novel and explicit characterization of the posterior distribution via a finite mixture of two dependent $\\mathbf{S}$-paths is derived. This results in a closed-form and tractable Bayes estimator for any unimodal density in terms of a finite sum over two $\\mathbf{S}$-paths. To approximate this class of estimates, we propose a sequential importance sampling algorithm that exploits the idea of the accelerated path sampler, an efficient path-sampling Markov chain Monte Carlo method. Numerical simulations are given to demonstrate the practicality and the effectiveness of our methodology.
This paper develops and implements a nonparametric test of Random Utility Models. The motivating application is to test the null hypothesis that a sample of cross-sectional demand distributions was generated by a population of rational consumers. We test a necessary and sufficient condition for this that does not rely on any restriction on unobserved heterogeneity or the number of goods. We also propose and implement a control function approach to account for endogenous expenditure. An econometric result of independent interest is a test for linear inequality constraints when these are represented as the vertices of a polyhedron rather than its faces. An empirical application to the U.K. Household Expenditure Survey illustrates computational feasibility of the method in demand problems with 5 goods.
This work is concerned with the estimation of the intensity parameter of a stationary determinantal point process. We consider the standard estimator, corresponding to the number of observed points per unit volume and a recently introduced median-based estimator more robust to outliers. The consistency and asymptotic normality of estimators are obtained under mild assumptions on the determinantal point process. We illustrate the efficiency of the procedures in a simulation study.
The purpose of model selection algorithms such as All Subsets, Forward Selection and Backward Elimination is to choose a linear model on the basis of the same set of data to which the model will be applied. Typically we have available a large collection of possible covariates from which we hope to select a parsimonious set for the efficient prediction of a response variable. Least Angle Regression (LARS), a new model selection algorithm, is a useful and less greedy version of traditional forward selection methods. Three main properties are derived: (1) A simple modification of the LARS algorithm implements the Lasso, an attractive version of ordinary least squares that constrains the sum of the absolute regression coefficients; the LARS modification calculates all possible Lasso estimates for a given problem, using an order of magnitude less computer time than previous methods. (2) A different LARS modification efficiently implements Forward Stagewise linear regression, another promising new model selection method;
Group testing is an active area of current research and has important applications in medicine, biotechnology, genetics, and product testing. There have been recent advances in design and estimation, but the simple Dorfman procedure introduced by R. Dorfman in 1943 is widely used in practice. In many practical situations the exact value of the probability p of being affected is unknown. We present both minimax and Bayesian solutions for the group size problem when p is unknown. For unbounded p we show that the minimax solution for group size is 8, while using a Bayesian strategy with Jeffreys prior results in a group size of 13. We also present solutions when p is bounded from above. For the practitioner we propose strong justification for using a group size of between eight to thirteen when a constraint on p is not incorporated and provide useable code for computing the minimax group size under a constrained p.
We consider the problem of Bayesian density estimation on the positive semiline for possibly unbounded densities. We propose a hierarchical Bayesian estimator based on the gamma mixture prior which can be viewed as a location mixture. We study convergence rates of Bayesian density estimators based on such mixtures. We construct approximations of the local H\\\"older densities, and of their extension to unbounded densities, to be continuous mixtures of gamma distributions, leading to approximations of such densities by finite mixtures. These results are then used to derive posterior concentration rates, with priors based on these mixture models. The rates are minimax (up to a log n term) and since the priors are independent of the smoothness the rates are adaptive to the smoothness.
We propose a general family of algorithms for regression estimation with quadratic loss. Our algorithms are able to select relevant functions into a large dictionary. We prove that a lot of algorithms that have already been studied for this task (LASSO and Group LASSO, Dantzig selector, Iterative Feature Selection, among others) belong to our family, and exhibit another particular member of this family that we call Correlation Selector in this paper. Using general properties of our family of algorithm we prove oracle inequalities for IFS, for the LASSO and for the Correlation Selector, and compare numerical performances of these estimators on a toy example.
We investigate nonparametric estimation of a monotone baseline hazard and a decreasing baseline density within the Cox model. Two estimators of a nondecreasing baseline hazard function are proposed. We derive the nonparametric maximum likelihood estimator and consider a Grenander type estimator, defined as the left-hand slope of the greatest convex minorant of the Breslow estimator. We demonstrate that the two estimators are strong consistent and asymptotically equivalent and derive their common limit distribution at a fixed point. Both estimators of a nonincreasing baseline hazard and their asymptotic properties are acquired in a similar manner. Furthermore, we introduce a Grenander type estimator for a nonincreasing baseline density, defined as the left-hand slope of the least concave majorant of an estimator of the baseline cumulative distribution function, derived from the Breslow estimator. We show that this estimator is strong consistent and derive its asymptotic distribution at a fixed point.
If the log likelihood is approximately quadratic with constant Hessian, then the maximum likelihood estimator (MLE) is approximately normally distributed. No other assumptions are required. We do not need independent and identically distributed data. We do not need the law of large numbers (LLN) or the central limit theorem (CLT). We do not need sample size going to infinity or anything going to infinity. Presented here is a combination of Le Cam style theory involving local asymptotic normality (LAN) and local asymptotic mixed normality (LAMN) and Cram\\ er style theory involving derivatives and Fisher information. The main tool is convergence in law of the log likelihood function and its derivatives considered as random elements of a Polish space of continuous functions with the metric of uniform convergence on compact sets. We obtain results for both one-step-Newton estimators and Newton-iterated-to-convergence estimators.
The paper is concerned with constructing pairwise dependence between $m$ random density functions each of which is modeled as a mixture of Dirichlet process model. The key to this is how to create dependencies between random Dirichlet processes. The present paper adopts a plan previously used for creating pairwise dependence, with the simplification that all random Dirichlet processes share the same atoms. Our contention is that for all dependent Dirichlet process models, common atoms are sufficient. We show that by adopting common atoms, it is possible to compute the $L_p$ distances between all pairs of random probability measures.
In many practical cases, a sensitivity analysis or an optimization of a complex time consuming computer code requires to build a fast running approximation of it - also called surrogate model. We consider in this paper the problem of building a surrogate model of a complex computer code which can be run at different levels of accuracy. The co-kriging based surrogate model is a promising tool to build such an approximation. The idea is to improve the surrogate model by using fast and less accurate versions of the code. We present here a new approach to perform a multi-fidelity co-kriging model which is based on a recursive formulation. The strength of this new method is that the co-kriging model is built through a series of independent kriging models. From them, some properties of classical kriging models can naturally be extended to the presented co-kriging model such as a fast cross-validation procedure. Moreover, based on a Bayes linear formulation, an extension of the universal kriging equations are provided for the co-kriging model. Finally, the proposed model has the advantage to reduce the computational complexity compared to the previous models. The multi-fidelity model is successfully applied to emulate a hydrodynamic simulator. This real example illustrates the efficiency of the recursive model.
On the basis of Nelson-Aalen nonparametric estimator of the cumulative distribution function, we provide a weak approximation to tail product-limit process for randomly right-censored heavy-tailed data. In this context, a new consistent reduced-bias estimator of the extreme value index is introduced and its asymptotic normality is established only by assuming the second-order regular variation of the underlying distribution function. A simulation study shows that the newly proposed estimator performs better than the existing ones.
In this paper, we address the question of comparison between populations of trees. We study an statistical test based on the distance between empirical mean trees, as an analog of the two sample z statistic for comparing two means. Despite its simplicity, we can report that the test is quite powerful to separate distributions with different means but it does not distinguish between different populations with the same mean, a more complicated test should be applied in that setting. The performance of the test is studied via simulations on Galton-Watson branching processes. We also show an application to a real data problem in genomics.
In this article, we merge celebrated results of Kesten and Spitzer [Z. Wahrsch. Verw. Gebiete 50 (1979) 5-25] and Kawazu and Kesten [J. Stat. Phys. 37 (1984) 561-575]. A random walk performs a motion in an i.i.d. environment and observes an i.i.d. scenery along its path. We assume that the scenery is in the domain of attraction of a stable distribution and prove that the resulting observations satisfy a limit theorem. The resulting limit process is a self-similar stochastic process with non-trivial dependencies.
In Bayesian statistics the precise point-null hypothesis $\\theta=\\theta_0$ can be tested by checking whether $\\theta_0$ is contained in a credible set. This permits testing of $\\theta=\\theta_0$ without having to put prior probabilities on the hypotheses. While such inversions of credible sets have a long history in Bayesian inference, they have been criticised for lacking decision-theoretic justification. We argue that these tests have many advantages over the standard Bayesian tests that use point-mass probabilities on the null hypothesis. We present a decision-theoretic justification for the inversion of central credible intervals, and in a special case HPD sets, by studying a three-decision problem with directional conclusions. Interpreting the loss function used in the justification, we discuss when test based on credible sets are applicable. We then give some justifications for using credible sets when testing composite hypotheses, showing that tests based on credible sets coincide with standard tests in this setting.
In decision problems, often, utilities and probabilities are hard to determine. In such cases, one can resort to so-called choice functions. They provide a means to determine which options in a particular set are optimal, and allow incomparability among any number of options. Applying choice functions in sequential decision problems can be highly non-trivial, as the usual properties of maximising expected utility may no longer be satisfied. In this paper, we study one of these properties: we revisit and reinterpret Selten s concept of subgame perfectness in the context of decision trees, leading us to the concept of subtree perfectness, which basically says that the optimal solution of a decision tree should not depend on any larger tree it may be embedded in. In other words, subtree perfectness excludes counterfactual reasoning, and therefore may be desirable from some philosophical points of view. Subtree perfectness is also desirable from a practical point of view, because it admits efficient algorithms for solving decision trees, such as backward induction. The main contribution of this paper is a very simple non-technical criterion for determining whether any given choice function will satisfy subtree perfectness or not. We demonstrate the theorem and illustrate subtree perfectness, or the lack thereof, through numerous examples, for a wide variety of choice functions, where incomparability amongst strategies can be caused by imprecision in either probabilities or utilities. We find that almost no choice function, except for maximising expected utility, satisfies it in general. We also find that choice functions other than maximising expected utility can satisfy it, provided that we restrict either the structure of the tree, or the structure of the choice function.
In this paper we tackle the problem of fast rates in time series forecasting from a statistical learning perspective. In a serie of papers (e.g. Meir 2000, Modha and Masry 1998, Alquier and Wintenberger 2012) it is shown that the main tools used in learning theory with iid observations can be extended to the prediction of time series. The main message of these papers is that, given a family of predictors, we are able to build a new predictor that predicts the series as well as the best predictor in the family, up to a remainder of order $1/\\sqrt{n}$. It is known that this rate cannot be improved in general. In this paper, we show that in the particular case of the least square loss, and under a strong assumption on the time series (phi-mixing) the remainder is actually of order $1/n$. Thus, the optimal rate for iid variables, see e.g. Tsybakov 2003, and individual sequences, see \\cite{lugosi} is, for the first time, achieved for uniformly mixing processes. We also show that our method is optimal for aggregating sparse linear combinations of predictors.
We derive information bounds for the regression parameters in Cox models when data are missing at random. These calculations are of interest for understanding the behavior of efficient estimation in case-cohort designs, a type of two-phase design often used in cohort studies. The derivations make use of key lemmas appearing in Robins, Rotnitzky and Zhao [J. Amer. Statist. Assoc. 89 (1994) 846-866] and Robins, Hsieh and Newey [J. Roy. Statist. Soc. Ser. B 57 (1995) 409-424], but in a form suited for our purposes here. We begin by summarizing the results of Robins, Rotnitzky and Zhao in a form that leads directly to the projection method which will be of use for our model of interest. We then proceed to derive new information bounds for the regression parameters of the Cox model with data Missing At Random (MAR). In the final section we exemplify our calculations with several models of interest in cohort studies, including an i.i.d. version of the classical case-cohort design of Prentice [Biometrika 73 (1986) 1-11]
Random Fisher matrices arise naturally in multivariate statistical analysis and understanding the properties of its eigenvalues is of primary importance for many hypothesis testing problems like testing the equality between two multivariate population covariance matrices, or testing the independence between sub-groups of a multivariate random vector. This paper is concerned with the properties of a large-dimensional Fisher matrix when the dimension of the population is proportionally large compared to the sample size. Most of existing works on Fisher matrices deal with a particular Fisher matrix where populations have i.i.d components so that the population covariance matrices are all identity. In this paper, we consider general Fisher matrices with arbitrary population covariance matrices. The first main result of the paper establishes the limiting distribution of the eigenvalues of a Fisher matrix while in a second main result, we provide a central limit theorem for a wide class of functionals of its eigenvalues. Some applications of these results are also proposed for testing hypotheses on high-dimensional covariance matrices.
Despite a substantial literature on nonparametric two-sample goodness-of-fit testing in arbitrary dimensions, there is no mention there of any curse of dimensionality. In fact, in some publications, a parametric rate is derived. As we discuss below, this is because a directional alternative is considered. Indeed, even in dimension one, Ingster (1987) has shown that the minimax rate is not parametric. In this paper, we extend his results to arbitrary dimension and confirm that the minimax rate is not only nonparametric, but exhibits a prototypical curse of dimensionality. We further extend Ingster s work to show that simple tests based on bin-counting achieve the minimax rate. Moreover, these tests adapt to the intrinsic dimensionality of the data --- when the underlying distributions are supported on a lower-dimensional surface.
We propose a new definition of the chi-square divergence between distributions. Based on convexity properties and duality, this version of the {\\chi}^2 is well suited both for the classical applications of the {\\chi}^2 for the analysis of contingency tables and for the statistical tests for parametric models, for which it has been advocated to be robust against inliers. We present two applications in testing. In the first one we deal with tests for finite and infinite numbers of linear constraints, while, in the second one, we apply {\\chi}^2-methodology for parametric testing against contamination.
Uniformly most powerful tests are statistical hypothesis tests that provide the greatest power against a fixed null hypothesis among all tests of a given size. In this article, the notion of uniformly most powerful tests is extended to the Bayesian setting by defining uniformly most powerful Bayesian tests to be tests that maximize the probability that the Bayes factor, in favor of the alternative hypothesis, exceeds a specified threshold. Like their classical counterpart, uniformly most powerful Bayesian tests are most easily defined in one-parameter exponential family models, although extensions outside of this class are possible. The connection between uniformly most powerful tests and uniformly most powerful Bayesian tests can be used to provide an approximate calibration between p-values and Bayes factors. Finally, issues regarding the strong dependence of resulting Bayes factors and p-values on sample size are discussed.
A practical constraint that comes in the way of spectrum estimation of a continuous time stationary stochastic process is the minimum separation between successively observed samples of the process. When the underlying process is not band-limited, sampling at any uniform rate leads to aliasing, while certain stochastic sampling schemes, including Poisson process sampling, are rendered infeasible by the constraint of minimum separation. It is shown in this paper that, subject to this constraint, no point process sampling scheme is alias-free for the class of all spectra. It turns out that point process sampling under this constraint can be alias-free for band-limited spectra. However, the usual construction of a consistent spectrum estimator does not work in such a case. Simulations indicate that a commonly used estimator, which is consistent in the absence of this constraint, performs poorly when the constraint is present. These results should help practitioners in rationalizing their expectations from point process sampling as far as spectrum estimation is concerned, and motivate researchers to look for appropriate estimators of bandlimited spectra.
In this paper we prove that the complement to the affine complex arrangement of type \\widetilde{B}_n is a K(\\pi, 1) space. We also compute the cohomology of the affine Artin group G of type \\widetilde{B}_n with coefficients over several interesting local systems. In particular, we consider the module Q[q^{\\pm 1}, t^{\\pm 1}], where the first n-standard generators of G act by (-q)-multiplication while the last generator acts by (-t)-multiplication. Such representation generalizes the analog 1-parameter representation related to the bundle structure over the complement to the discriminant hypersurface, endowed with the monodromy action of the associated Milnor fibre. The cohomology of G with trivial coefficients is derived from the previous one.
We propose methods for computing two network features with topological underpinnings: the Rips and Dowker Persistent Homology Diagrams. Our formulations work for general networks, which may be asymmetric and may have any real number as an edge weight. We study the sensitivity of Dowker persistence diagrams to intrinsic asymmetry in the data, and investigate the stability properties of both the Dowker and Rips persistence diagrams. We include detailed experiments run on a variety of simulated and real world datasets using our methods.
Let $ f_1, f_2 \\colon X^m \\longrightarrow Y^n $ be maps between smooth connected manifolds of the indicated dimensions $ \\!m\\! $ and $ \\!n \\!\\!\\!$. Can $ f_1, f_2 $ be deformed by homotopies until they are coincidence free (i.e. $ f_1(x) \\neq f_2(x) $ for all $ x \\in X $)? The main tool for addressing such a problem is tradionally the (primary) Nielsen number $ N(f_1, f_2) $. E.g. when $ m < 2n - 2 $ the question above has a positive answer precisely if $ N(f_1, f_2) = 0 $. However, when $ m = 2n - 2 $ this can be dramatically wrong, e.g. in the fixed point case when $ m = n = 2 $. Also, in a very specific setting the Kervaire invariant appears as a (full) additional obstruction. In this paper we start exploring a fairly general new approach. This leads to secondary Nielsen numbers $ SecN(f_1, f_2) $ which allow us to answer our question e.g. when $ m = 2n - 2,\\ \\; n \\neq 2 $ is even and $ Y $ is simply connected.
Consider a push-out diagram of spaces C <-- A --> B, construct the homotopy push-out, and then the homotopy pull-back of the diagram one gets by forgetting the initial object A. We compare the difference between A and this homotopy pull-back. This difference is measured in terms of the homotopy fibers of the original maps. Restricting our attention to the connectivity of these maps, we recover the classical Blakers-Massey Theorem.
The algebra S of symmetric invariants over the field with two elements is an unstable algebra over the Steenrod algebra A, and is isomorphic to the mod two cohomology of BO, the classifying space for vector bundles. We provide a minimal presentation for S in the category of unstable A-algebras, i.e., minimal generators and minimal relations. From this we produce minimal presentations for various unstable A-algebras associated with the cohomology of related spaces, such as the BO(2^m-1) that classify finite dimensional vector bundles, and the connected covers of BO. The presentations then show that certain of these unstable A-algebras coalesce to produce the Dickson algebras of general linear group invariants, and we speculate about possible related topological realizability. Our methods also produce a related simple minimal A-module presentation of the cohomology of infinite dimensional real projective space, with filtered quotients the unstable modules F(2^p-1)/A bar{A}_{p-2}, as described in an independent appendix.
Sufficient conditions on a space are given which guarantee that the $K$-theory ring and the ordinary cohomology ring with coefficients over a principal ideal domain are invariants of, respectively, the adic genus and the SNT set. An independent proof of Notbohm s theorem on the classification of the adic genus of $BS^3$ by $KO$-theory $\\lambda$-rings is given. An immediate consequence of these results about adic genus is that the power series ring $\\mathbf{Z} \\lbrack \\lbrack x \\rbrack \\rbrack$ admits uncountably many pairwise non-isomorphic $\\lambda$-ring structures.
We study the Hurewicz map h from the homotopy groups of a spectrum X to the R-homology of its 0th space X_0, where R is a connective commutative S-algebra. We prove that the decreasing filtration of the domain of h associated to an R-based Adams resolution is compatible with a filtration of the range associated to the Goodwillie tower for the functor sending X to the suspension spectrum of X_0. One easy-to-state application goes as follows. Localize at a prime p and suppose X is (c-1)-connected for some positive c. If alpha in pi_*(X) has Adams filtration s and |alpha| < cp^s, then h(alpha)=0 in R_*(X_0)$. As an example illustrating the utility of this, we recover the mod 2 Hurewicz map for all connective covers of BO. In the special case when X is a suspension spectrum and R = HZ/2, we recover results announced by Lannes and Zarati in the 1980s. Our methods of proof are very different from the methods outlined by them, and rely on new structure on the Topological Andre-Quillen ideal filtration of commutative R-algebras, applied to the smash product of R with the E-infinity space X_0. Let E be the nth Morava E-theory at a prime p. As another application of our general theory, if X is 0-connected, one gets a natural map of the Adams-Novikov spectral sequence for X to the constant spectral sequence having s-line equal to the primitives in the E-homology of the p^s extended power of X. This hints at the possibility of an algebraic E-theory `Singer transfer .
A product of cochains in a polyhedral complex is constructed. The multiplication algorithm depends on the choice of a parameter. The parameter is a linear functional on the ambient space. Cocycles form a subring of the ring of cochains, cobounds form an ideal of the ring of cocycles, and the quotient ring is a ring of cohomologies. If the complex is simplicial, then the algorithm reduces to the well known algorithm of ${\\rm\\breve{C}}$ech. Similar algorithms are used in geometry of polyhedra for multiplying of cocycles taking values in the exterior algebra of the ambient space. Therefore, we assume the ring of values to be supercommutative. This text contains the basic definitions, the statements of theorems and some of their applications in convex geometry. The full text will be offered to \"Izvestiya: Mathematics\".
In this paper we develop homotopy theoretical methods for studying diagrams. In particular we explain how to construct homotopy colimits and limits in an arbitrary model category. The key concept we introduce is that of a model approximation. Our key result says that if a category admits a model approximation then so does any diagram category with values in this category. From the homotopy theoretical point of view categories with model approximations have similar properties to those of model categories. They admit homotopy categories (localizations with respect to weak equivalences). They also can be used to construct derived functors by taking the analogs of fibrant and cofibrant replacements. A category with weak equivalences can have several useful model approximations. We take advantage of this possibility and in each situation choose one that suits our needs. In this way we prove all the fundamental properties of the homotopy colimit and limit: Fubini Theorem (the homotopy colimit -respectively limit- commutes with itself), Thomason s theorem about diagrams indexed by Grothendieck constructions, and cofinality statements. Since the model approximations we present here consist of certain functors \"indexed by spaces\", the key role in all our arguments is played by the geometric nature of the indexing categories.
Greenlees defined an abelian category A whose derived category is equivalent to the rational S^1-equivariant stable homotopy category whose objects represent rational S^1-equivariant cohomology theories. We show that in fact the model category of differential graded objects in A (dgA) models the whole rational S^1-equivariant stable homotopy theory. That is, we show that there is a Quillen equivalence between dgA and the model category of rational S^1-equivariant spectra, before the quasi-isomorphisms or stable equivalences have been inverted. This implies that all of the higher order structures such as mapping spaces, function spectra and homotopy (co)limits are reflected in the algebraic model. The new ingredients here are certain Massey product calculations and the work on rational stable model categories from \"Classification of stable model categories\" and \"Equivalences of monoidal model categories\" with Schwede. In an appendix we show that Toda brackets, and hence also Massey products, are determined by the triangulated derived category.
This paper is on the Curtis conjecture. We show that the image of the Hurewicz homomorhism $h:\\pi_*Q_0S^0\\to H_*(Q_0S^0;\\mathbb{Z})$, when restricted to product of positive dimensional elements, is determined by $\\mathbb{Z}\\{h(\\eta^2),h(\\nu^2),h(\\sigma^2)\\}$. Localised at $p=2$, this proves a geometric version of a result of Hung and Peterson for the Lannes-Zarati homomorphism. We apply this to show that, for $p=2$ and $G=O(1)$ or any prime $p$ and $G$ any compact Lie group with Lie algebra $\\mathfrak{g}$ so that $\\dim\\mathfrak{g}>0$, the composition $${_p\\pi_*}Q\\Sigma^{n\\dim\\mathfrak{g}}BG_+^{\\wedge n}\\to {_p\\pi_*}Q_0S^0\\stackrel{h}{\\to}H_*(Q_0S^0;\\mathbb{Z}/p)$$ where $\\Sigma^{n\\dim\\mathfrak{g}}BG_+^{\\wedge n}\\to S^0$ is the $n$-fold transfer, is trivial if $n>2$. Moreover, we show that for $n=2$, the image of the above composition vanishes on all elements of Adams filtration at least $1$, i.e. those elements of ${_2\\pi_*^s}\\Sigma^{n\\dim\\mathfrak{g}}BG_+^{\\wedge n}$ represented by a permanent cycle $\\mathrm{Ext}_{A_p}^{s,t}(\\widetilde{H}^*\\Sigma^{n\\dim\\mathfrak{g}}BG_+^{\\wedge n},\\mathbb{Z}/p)$ with $s>0$, map trivially under the above composition. The case of $n>2$ of the above observation proves and generalises a geometric variant of the weak conjecture on spherical classes due to Hung, later on verified by Hung and Nam. We also show that, for a compact Lie group $G$, Curtis conjecture holds if we restrict to the image of the $n$-fold transfer $\\Sigma^{n\\dim\\mathfrak{g}}BG_+^{\\wedge n}\\to S^0$ with $n>1$. Finally, we show that the Kervaire invariant one elements $\\theta_j\\in{_2\\pi_{2^{j+1}-2}^s}$ with $j>3$ do not factorise through the $n$-fold transfer $\\Sigma^{n\\dim\\mathfrak{g}}BG_+^{\\wedge n}\\to S^0$ with $n>1$ for $G=O(1)$ or any compact Lie group as above.
Let $TMF_1(n)$ be the spectrum of topological modular forms equipped with a $\\Gamma_1(n)$-structure. We compute the $K(2)$-local $TMF_1(3)$-cohomology of $B{\\mathit String}$ and $B{\\mathit Spin}$: both are power series rings freely generated by classes that we explicitly construct and which generalize the classical Pontryagin classes. As a first application of this computation, we show how to construct $TMF(3n)$-cohomology classes from stable positive energy representations of the loop groups $L{\\mathit Spin}$.
For a simply connected CW-complex $X$, let $\\mathcal{E}(X)$ denote the group of homotopy classes of self-homotopy equivalence of $X$ and let $\\mathcal{E}_{\\sharp}(X)$ be its subgroup of homotopy classes which induce the identity on homotopy groups. As we know, the quotient group $\\frac{\\mathcal{E}(X)}{\\mathcal{E}_{\\sharp}(X)}$ can be identified with a subgroup of $Aut(\\pi_{*}(X))$. The aim of this work is to determine this subgroup for rational spaces. We construct the Whitehead exact sequence associated with the minimal Sullivan model of $X$ which allows us to define the subgroup $\\mathrm{Coh.Aut}(\\mathrm{Hom}\\big(\\pi_{*}(X),\\Bbb Q)\\big)$ of self-coherent automorphisms of the graded vector space $\\mathrm{Hom}(\\pi_*(X),\\Bbb Q)$. As a consequence we establish that $\\mathcal{E}(X) / \\mathcal{E}_{\\sharp}(X) \\cong \\mathrm{Coh.Aut} (\\mathrm{Hom}(\\pi_*(X),\\Bbb Q))$. In addition, by computing the group $\\mathrm{Coh.Aut}\\big(\\mathrm{Hom}(\\pi_{*}(X),\\Bbb Q)\\big)$, we give examples of rational spaces that have few self-homotopy equivalences.
Let $Y$ be the space obtained by attaching a finite-type wedge of cells to a simply-connected, finite-type CW-complex. We introduce the free and semi-inert conditions on the attaching map which broadly generalize the previously studied inert condition. Under these conditions we determine $H_*(\\Omega Y;R)$ as an $R$-module and as an $R$-algebra respectively. Under a further condition we show that $H_*(\\Omega Y;R)$ is generated by Hurewicz images. As an example we study an infinite family of spaces constructed using only semi-inert cell attachments.
We show that the cube of the Hopf map $\\eta$ maps to zero under the Hurewicz map for all fixed points of all norms to cyclic $2$-groups of the Landweber-Araki Real bordism spectrum. Using that the slice spectral sequence is a spectral sequence of Mackey functors, we compute the relevant portion of the homotopy groups of these fixed points, showing that multiplication by $4$ annihilates $\\pi_{3}$.
Given an $\\infty$-category with a set of weak equivalences which is stable under pullback, we show that the mapping spaces of the corresponding localization can be described as group completions of $\\infty$-categories of spans. Furthermore, we show how these $\\infty$-categories of spans are the mapping objects of an $(\\infty, 2)$-category, which yields a Segal space model for the localization after a Kan fibrant replacement.
In the paper the notion of truncating twisting function from a cubical set to a permutahedral set and the corresponding notion of twisted Cartesian product of these sets are introduced. The latter becomes a permutocubical set that models in particular the path fibration on a loop space. The chain complex of this twisted Cartesian product in fact is a comultiplicative twisted tensor product of cubical chains of base and permutahedral chains of fibre. This construction is formalized as a theory of twisted tensor products for Hirsch algebras.
We consider a topological integral transform of Bessel (concentric isospectral sets) type and Fourier (hyperplane isospectral sets) type, using the Euler characteristic as a measure. These transforms convert constructible $\\zed$-valued functions to continuous $\\real$-valued functions over a vector space. Core contributions include: the definition of the topological Bessel transform; a relationship in terms of the logarithmic blowup of the topological Fourier transform; and a novel Morse index formula for the transforms. We then apply the theory to problems of target reconstruction from enumerative sensor data, including localization and shape discrimination. This last application utilizes an extension of spatially variant apodization (SVA) to mitigate sidelobe phenomena.
This paper is devoted to study some topological properties of the SG subgroup, $\\pi_1^{sg}(X,x)$, of the quasitopological fundamental group of a based space $(X,x)$, $\\pt$, its topological properties as a subgroup of the topological fundamental group $\\pi_1^{\\tau}(X,x)$ and its influence on the existence of universal covering of $X$. First, we introduce small generated spaces which have indiscrete topological fundamental groups and also small generated coverings which are universal coverings in the categorical sense. Second, we give a necessary and sufficient condition for the existence of the small generated coverings. Finally, by introducing the notion of semi-locally small generatedness we show that the quasitopological fundamental groups of semi-locally small generated spaces are topological groups.
Let M be a connected, simply connected, closed and oriented manifold, and G a finite group acting on M by orientation preserving diffeomorphisms. In this paper we show an explicit ring isomorphism between the orbifold string topology of the orbifold [M/G] and the Hochschild cohomology of the dg-ring obtained by performing the smash product between the group G and the singular cochain complex of M.
We extend the structure of string topology from mapping spaces to embedding spaces $Emb(S^n,M)$. This extension comes from an action of the cleavage operad, a coloured $E_{n+1}$-operad. For all values of $n \\in \\mathbb{N}$, this gives an action of certain Thom spectra that provides an action on the level homology. We provide an analysis of the string topology structure derived from the embedding $Emb(S^n,M) \\hookrightarrow Map(S^n,M)$. In the $1$-dimensional case it specializes a morphism of BV-algebras $\\mathbb{H}_*(Emb(S^1,M)) \\to \\mathbb{H}_*(Map(S^1,M)$.
The goal of this paper is to prove a Koszul duality result for E_n-operads in differential graded modules over a ring. The case of an E_1-operad, which is equivalent to the associative operad, is classical. For n>1, the homology of an E_n-operad is identified with the n-Gerstenhaber operad and forms another well known Koszul operad. Our main theorem asserts that an operadic cobar construction on the dual cooperad of an E_n-operad defines a cofibrant model of E_n. This cofibrant model gives a realization at the chain level of the minimal model of the n-Gerstenhaber operad arising from Koszul duality. Most models of E_n-operads in differential graded modules come in nested sequences of operads homotopically equivalent to the sequence of the chain operads of little cubes. In our main theorem, we also define a model of the operad embeddings E_n-1 --> E_n at the level of cobar constructions.
We define and study an equivariant version of Farber s topological complexity for spaces with a given compact group action. This is a special case of the equivariant sectional category of an equivariant map, also defined in this paper. The relationship of these invariants with the equivariant Lusternik-Schnirelmann category is given. Several examples and computations serve to highlight the similarities and differences with the non-equivariant case. We also indicate how the equivariant topological complexity can be used to give estimates of the non-equivariant topological complexity.
The structure space S(M) of a closed topological m-manifold M classifies bundles whose fibers are closed m-manifolds equipped with a homotopy equivalence to M. We construct a highly connected map from S(M) to a concoction of algebraic L-theory and algebraic K-theory spaces associated with M. The construction refines the well-known surgery theoretic analysis of the block structure space of M in terms of L-theory.
Using the theory of resolving classes, we show that if $X$ is a CW complex of finite type such that $\\map_*(X, S^{2n+1})\\sim *$ for all sufficiently large $n$, then $\\map_*(X, K) \\sim *$ for every simply-connected finite-dimensional CW complex $K$; and under mild hypotheses on $\\pi_1(X)$, the same conclusion holds for \\textit{all} finite-dimensional complexes $K$. Since it is comparatively easy to prove the former condition for $X = B\\ZZ/p$ (we give a proof in an appendix), this result can be applied to give a new, more elementary proof of the Sullivan conjecture.
We give rigorous foundations for parametrized homotopy theory in this monograph. After preliminaries on point-set topology, base change functors, and proper actions of non-compact Lie groups, we develop the homotopy theory of equivariant ex-spaces (spaces over and under a given space) and of equivariant parametrized spectra. We emphasize several issues of independent interest and include much new material on the general theory of topologically enriched model categories. The essential point is to resolve problems in parametrized homotopy theory that have no nonparametrized counterparts. In contrast to previously encountered situations, model theoretic techniques are intrinsically insufficient for this. Instead, a rather intricate blend of model theory and classical homotopy theory is required. Stably, we work with equivariant orthogonal spectra, which are simpler for the purpose than alternative kinds of spectra and give highly structured smash products. We then give a fiberwise duality theorem that allows fiberwise recognition of dualizable and invertible parametrized spectra. This allows application of formal duality theory to the construction and analysis of transfer maps. A construction of fiberwise bundles of spectra plays a central role and leads to a simple conceptual proof of a generalized Wirthmuller isomorphism theorem that calculates the right adjoint to base change along an equivariant bundle with manifold fibers in terms of a shift of the left adjoint. Due to the generality of our bundle theoretic context, the Adams isomorphism theorem relating orbit and fixed point spectra is a direct consequence.
As more of topology s tools become popular in analyzing high dimensional data sets, the goal of understanding the underlying probabilistic properties of these tools becomes even more important. While much attention has been given to understanding the probabilistic properties of methods that use homological groups in topological data analysis, the probabilistic properties of methods that employ cohomology operations remain unstudied. In this paper, we investigate the Bockstein operator with randomness in a strictly algebraic setting.
Let G be a profinite group. We define an S[[G]]-module to be a G-spectrum X that satisfies certain conditions, and, given an S[[G]]-module X, we define the homotopy orbit spectrum X_{hG}. When G is countably based and X satisfies a certain finiteness condition, we construct a homotopy orbit spectral sequence whose E_2-term is the continuous homology of G with coefficients in the graded profinite $\\hat{\\mathbb{Z}}[[G]]$-module $\\pi_\\ast(X)$. Let G_n be the extended Morava stabilizer group and let E_n be the Lubin-Tate spectrum. As an application of our theory, we show that the function spectrum F(E_n,L_{K(n)}(S^0)) is an S[[G_n]]-module with an associated homotopy orbit spectral sequence.
We consider genera of polyhedra (finite cell complexes) in the stable homotopy category. Namely, the genus of a polyhedron X is the class of polyhedra Y such that all localizations of Y are stably isomorphic to the corresponding localizations of X. We prove that Y is in the genus of X if and only if the wedge XvB is stably isomorphic to YvB, where B is the wedge of all spheres S^n such that the n-th stable homotopy group of X is not torsion. We also prove that if XvX and XvY are stably isomorphic, so are also X and Y. Several examples of calculations of genera are considered.
In this paper, we compute the $RO(C_{pq})$-graded cohomology of $C_{pq}$-orbits. We deduce that in all the cases the Bredon cohomology groups are a function of the fixed point dimensions of the underlying virtual representations. Further, when thought of as a Mackey functor, the same independence result holds in almost all cases. This generalizes earlier computations of Stong and Lewis for the group $C_p$. The computations of cohomology of orbits are used to prove a freeness theorem. The analogous result for the group $C_p$ was proved by Lewis. We demonstrate that certain complex projective spaces and complex Grassmannians satisfy the freeness theorem.
We determine the L-S category of Sp(3) by showing that the 5-fold reduced diagonal $\\widebar{\\Delta}_5$ is given by $\\nu^2$, using a Toda bracket and a generalised cohomology theory $h^*$ given by $h^*(X,A) = \\{X/A,{\\mathbb S}[0,2]\\}$, where ${\\mathbb S}[0,2]$ is the 3-stage Postnikov piece of the sphere spectrum ${\\mathbb S}$. This method also yields a general result that $\\cat(Sp(n)) \\geq n+2$ for $n \\geq 3$, which improves the result of Singhof.
We prove structural theorems for computing the completion of a G-spectrum at the augmentation ideal of the Burnside ring of a finite group G. First we show that a G-spectrum can be replaced by a spectrum obtained by allowing only isotropy groups of prime power order without changing the homotopy type of the completion. We then show that this completion can be computed as a homotopy colimit of completions of spectra obtained by further restricting isotropy to one prime at a time, and that these completions can be computed in terms of completion at a prime. As an application, we show that the spectrum of stable maps from BG to the classifying space of a compact Lie group K splits non-equivariantly as a wedge sum of p-completed suspension spectra of classifying spaces of certain subquotients of the product of G and K. In particular this describes the dual of BG.
We show that the $\\mathbb{Z}/2$-equivariant Morava K-theories with reality (as defined by Hu) are self-dual with respect to equivariant Anderson duality. In particular, there is a universal coefficients exact sequence in Morava K-theory with reality. As a particular example, we recover the self-duality of the spectrum $KO$. The study of $\\mathbb{Z}/2$-equivariant Anderson duality made in this paper gives a nice interpretation of some symmetries of $RO(\\mathbb{Z}/2)$-graded (i.e. bigraded) equivariant cohomology groups in terms of Mackey functor duality.
We study the hit problem, set up by F. Peterson, of finding a minimal set of generators for the polynomial algebra $P_k := \\mathbb F_2[x_1,x_2,...,x_k]$ as a module over the mod-2 Steenrod algebra, $\\mathcal{A}$. In this paper, we study a minimal set of generators for $\\mathcal A$-module $P_k$ in some so-call generic degrees and apply these results to explicitly determine the hit problem for $k=4$.
An action of A on X is a map F: AxX to X such that F|_X = id: X to X. The restriction F|_A: A to X of an action is called a cyclic map. Special cases of these notions include group actions and the Gottlieb groups of a space, each of which has been studied extensively. We prove some general results about actions and their Eckmann-Hilton duals. For instance, we classify the actions on an H-space that are compatible with the H-structure. As a corollary, we prove that if any two actions F and F  of A on X have cyclic maps f and f  with Omega(f) = Omega(f ), then Omega(F) and Omega(F ) give the same action of Omega(A) on Omega(X). We introduce a new notion of the category of a map g and prove that g is cocyclic if and only if the category is less than or equal to 1. From this we conclude that if g is cocyclic, then the Berstein-Ganea category of g is <= 1. We also briefly discuss the relationship between a map being cyclic and its cocategory being <= 1.
Let H be an arrangement of real hyperplanes in R^n. The complexification of H defines a natural stratification of C^n. We denote by Perv(C^n, H) the category of perverse sheaves on C^n smooth with respect to this stratification. We give a description of Perv(C^n, H) as the category of representations of an explicit quiver with relations, whose vertices correspond to real faces of H (of all dimensions). The relations are of monomial nature: they identify some pairs of paths in the quiver. They can be formulated in terms of the oriented matroid associated to H.
We study the spectral sequence that one obtains by applying mod 2 homology to the Goodwillie tower which sends a spectrum X to the suspension spectrum of its 0th space X_0. This converges strongly to H_*(X_0) when X is 0-connected. The E^1 term is the homology of the extended powers of X, and thus is a well known functor of H_*(X), including structure as a bigraded Hopf algebra, a right module over the mod 2 Steenrod algebra A, and a left module over the Dyer-Lashof operations. Hopf algebra considerations show that all pages of the spectral sequence are primitively generated, with primitives equal to a subquotient of the primitives in E^1. We use an operad structure on the tower and the Z/2 Tate construction to show how Dyer-Lashof operations and differentials interact. These then determine differentials that hold for any spectrum X. These universal differentials then lead us to construct, for every A-module M, an algebraic spectral sequence depending functorially on M. The algebraic spectral sequence for H_*(X) agrees with the topological spectral sequence for X for many spectra, including suspension spectra and almost all generalized Eilenberg-MacLane spectra, and appears to give an upper bound in general. The E^infty term of the algebraic spectral sequence has form and structure similar to E^1, but now the right A-module structure is unstable. Our explicit formula involves the derived functors of destabilization as studied in the 1980 s by W. Singer, J. Lannes and S. Zarati, and P. Goerss.
In \"A Hosse diagram for rational toral tanks,\" we see a CW complex ${\\mathcal T}(X)$, which gives a rational homotopical classification of almost free toral actions on spaces in the rational homotopy type of $X$ associated with rational toral ranks and also presents certain relations in them. We call it the {\\it rational toral rank complex} of $X$. It represents a variety of toral actions. In this note, we will give effective 2-dimensional examples of it when $X$ is a finite product of odd spheres. This is a combinatorial approach in rational homotopy theory.
This paper expands on and refines some known and less well-known results about the finite subset spaces of a simplicial complex $X$ including their connectivity and their top homology groups. It also discusses the inclusion of the singletons into the three fold subset space and shows that this subspace is weakly contractible but generally non-contractible unless $X$ is a co-$H$ group. Some homological calculations are provided.
To the coverage problem of sensor networks, V. de Silva and R. Ghrist (2007) developed several approaches based on (persistent) homology theory. Their criteria for the coverage are formulated on the Rips complexes constructed by the sensors, in which their locations are supposed to be fixed. However, the sensors are in general affected by perturbations (e.g., natural phenomena), and hence the stability of the coverage criteria should be also discussed. In this paper, we present a coverage theorem stable under perturbation. Furthermore, we also introduce a method of eliminating redundant cover after perturbation. The coverage theorem is derived by extending the Rips interleaving theorem studied by F. Chazal, V. de Silva, and S. Oudot (2013) into an appropriate relative version.
This correction article is actually unnecessary. The proof of Theorem 1.2, concerning commutative HQ-algebra spectra and commutative differential graded algebras, in the author s paper [American Journal of Mathematics vol. 129 (2007) 351-379 (arxiv:math/0209215v4)] is correct as originally stated. Neil Strickland carefully proved that D is symmetric monoidal; so Proposition 4.7 and hence also Theorem 1.2 hold as stated. Strickland s proof will appear in joint work with Stefan Schwede; see related work in Strickland s [arxiv:0810.1747]. Note here D is defined as a colimit of chain complexes; in contrast, non-symmetric monoidal functors analogous to D are defined as homotopy colimits of spaces in previous work of the author.
We introduce the category Pstem[n] of n-stems, with a functor P[n] from spaces to Pstem[n]. This can be thought of as the n-th order homotopy groups of a space. We show how to associate to each simplicial n-stem Q an (n+1)-truncated spectral sequence. Moreover, if Q=P[n]X is the Postnikov n-stem of a simplicial space X, the truncated spectral sequence for Q is the truncation of the usual homotopy spectral sequence of X. Similar results are also proven for cosimplicial n-stems. They are helpful for computations, since n-stems in low degrees have good algebraic models.
We prove that if a finite group $G$ acts smoothly on a manifold $M$ so that all the isotropy subgroups are abelian groups with rank $\\leq k$, then $G$ acts freely and smoothly on $M \\times \\bbS^{n_1} \\times...\\times \\bbS^{n_k}$ for some positive integers $n_1,...n_k$. We construct these actions using a recursive method, introduced in an earlier paper, that involves abstract fusion systems on finite groups. As another application of this method, we prove that every finite solvable group acts freely and smoothly on some product of spheres with trivial action on homology.
The classifying space of the embedded cobordism category has been identified in by Galatius, Tillmann, Madsen, and Weiss as the infinite loop space of a certain Thom spectrum. This identifies the set of path components with the classical cobordism group. In this paper, we give a geometric interpretation of the higher homotopy groups as certain cobordism groups where all manifolds are now equipped with a set of orthonormal sections in the tangent bundle. We also give a description of the fundamental group as a free group with a set of geometrically intuitive relations.
We modify a classical construction of Bousfield and Kan to define the Adams tower of a simplicial nonunital commutative algebra over a field k. We relate this construction to Radulescu-Banu s cosimplicial resolution, and prove that all connected simplicial algebras are complete with respect to Andr\\ e-Quillen homology. This is a convergence result for the unstable Adams spectral sequence for commutative algebras over k.
In this paper we describe and continue the study begun by the author, Jones, and Segal, of the homotopy theory that underlies Floer theory. In that paper the authors addressed the question of realizing a Floer complex as the celluar chain complex of a CW -spectrum or pro-spectrum, where the attaching maps are determined by the compactified moduli spaces of connecting orbits. The basic obstructions to the existence of this realization are the smoothness of these moduli spaces, and the existence of compatible collections of framings of their stable tangent bundles. In this note we describe a generalization of this, to show that when these moduli spaces are smooth, and are oriented with respect to a generalized cohomology theory E^*, then a Floer E_* -homology theory can be defined. In doing this we describe a functorial viewpoint on how chain complexes can be realized by E -module spectra, generalizing the stable homotopy realization criteria given earlier by the author, Jones, and Segal. Since these moduli spaces, if smooth, will be manifolds with corners, we give a discussion about the appropriate notion of orientations of manifolds with corners.
We consider discontinuous operations of a group $G$ on a contractible $n$-dimensional manifold $X$. Let $E$ be a finite dimensional representation of $G$ over a field $k$ of characteristics 0. Let $\\mathcal{E}$ be the sheaf on the quotient space $Y=G \\setminus X$ associated to $E$. Let $H^{\\bullet}_{\\textbf{!}}(Y;\\mathcal{E})$ be the image in $H^{\\bullet}(Y;\\mathcal{E})$ of the cohomology with compact support. In the cases where both $H^{\\bullet}_{\\textbf{!}}(Y;\\mathcal{E})$ and $H^{\\bullet}_{\\textbf{!}}(Y;\\mathcal{E}^*)$ ($\\mathcal{E}^*$ being the the sheaf associated to the representation dual to $E$) are finite dimensional, we establish a non-degenerate duality between $H^{m}_{\\textbf{!}}(Y;\\mathcal{E})$ and $H^{n-m}_{\\textbf{!}}(Y;\\mathcal{E}^{\\ast})$. We also show that this duality is compatible with Hecke operators.
Looking at the cartesian product of a topological space with itself, a natural map to be considered on that object is the involution that interchanges the coordinates, i.e. that maps (x,y) to (y,x). The so-called halfsquaring construction, now also called \"symmetric squaring construction\", in Cech homology with Z/2-coefficients was introduced in [arXiv:0709.1774] as a map from the k-th Cech homology group of a space X to the 2k-th Cech homology group of X \\times X divided by the above mentioned involution. It turns out to be a crucial construction in the proof of a Borsuk-Ulam-type theorem. In this thesis, a generalization of this construction, which is here called \"Dachabbildung\", to Cech homology with integer coefficients is given for even dimensions k, which is proven to equally satisfy the useful properties of the original construction. Detailed proofs are provided which could also supersede the somewhat sketchy exposition of [arXiv:0709.1774] for the case of Z/2-coefficients. As a preparation for the presented results, two possibilities of defining Cech homology are closely examined and shown to be ismorphic.
Let $E=E_n$ be Morava $E$-theory of height $n$. In previous work Devinatz and Hopkins introduced the $K(n)$-local $E_n$-Adams spectral sequence and showed that, under certain conditions, the $E_2$-term of this spectral sequence can be identified with continuous group cohomology. We work with the category of $L$-complete $E_*E$-comodules, and show that in a number of cases the $E_2$-term of the above spectral sequence can be computed by a relative Ext group in this category. We give suitable conditions for when we can identify this Ext group with continuous group cohomology.
We show that every homomorphism from a one-dimensional Peano continuum to a planar Peano continuum is induced by a continuous map up to conjugation. We then prove that the topological structure of the space of points at which a planar Peano continuum is not semi-locally simply connected is determined solely by algebraic information contained in its fundamental group. Furthermore, we demonstrate how to reconstruct the topological structure of the space of points at which a planar Peano continuum is not semi-locally simply connected using only the subgroup lattice of its fundamental group.
In this short note, we use Robert Bruner s $\\mathcal{A}(1)$-resolution of $P = \\mathbb{F}_2[t]$ to shed light on the Hit Problem. In particular, the reduced syzygies $P_n$ of $P$ occur as direct summands of $\\widetilde{P}^{\\otimes n}$, where $\\widetilde{P}$ is the augmentation ideal of the map $P \\to \\mathbb{F}_2$. The complement of $P_n$ in $\\widetilde{P}^{\\otimes n}$ is free, and the modules $P_n$ exhibit a type of \"Bott Periodicity\" of period $4$: $P_{n+4} = \\Sigma^8P_n$. These facts taken together allow one to analyze the module of indecomposables in $\\widetilde{P}^{\\otimes n}$, that is, to say something about the \"$\\mathcal{A}(1)$-hit Problem.\" Our study is essentially in two parts: First, we expound on the approach to the Hit Problem begun by William Singer, in which we compare images of Steenrod Squares to certain kernels of Squares. Using this approach, the author discovered a nontrivial element in bidegree $(5, 9)$ that is neither $\\mathcal{A}(1)$-hit nor in $\\mathrm{ker} Sq^1 + \\mathrm{ker} Sq^3$. Such an element is extremely rare, but Bruner s result shows clearly why these elements exist and detects them in full generality. Second, we describe the graded $\\mathbb{F}_2$-space of $\\mathcal{A}(1)$-hit elements of $\\widetilde{P}^{\\otimes n}$ by determining its Hilbert series.
In this paper, we determine the connective K-cohomology with reality of elementary abelian $2$-groups as a module over $\\mathbb{Z}[v_1,a]$, where $v_1$ is the equivariant Bott class and $a$ the Euler class of the sign representation. This gives in particular a new approach to the computation of the connective real K-theory of such groups. The originality here is to make all computations in the $\\mathbb{Z}/2$-equivariant stable category, considering only $\\mathbb{Z}/2$-equivariant cohomology theories, and to use relative homological algebra over certain subalgebras of the equivariant Steenrod algebra to perform explicit computations.
We develop an obstruction theory for homotopy of homomorphisms f,g : M -> N between minimal differential graded algebras. We assume that M = Lambda V has an obstruction decomposition given by V = V_0 oplus V_1 and that f and g are homotopic on Lambda V_0. An obstruction is then obtained as a vector space homomorphism V_1 -> H^*(N). We investigate the relationship between the condition that f and g are homotopic and the condition that the obstruction is zero. The obstruction theory is then applied to study the set of homotopy classes [M, N]. This enables us to give a fairly complete answer to a conjecture of Copeland-Shar on the size of the homotopy set [A,B] when A and B are rational spaces. In addition, we give examples of minimal algebras (and hence of rational spaces) that have few homotopy classes of self-maps.
We introduce the notion of a strongly homotopy-comultiplicative resolution of a module coalgebra over a chain Hopf algebra, which we apply to proving a comultiplicative enrichment of a well-known theorem of Moore concerning the homology of quotient spaces of group actions. The importance of our enriched version of Moore s theorem lies in its application to the construction of useful cochain algebra models for computing multiplicative structure in equivariant cohomology. In the special cases of homotopy orbits of circle actions on spaces and of group actions on simplicial sets, we obtain small, explicit cochain algebra models that we describe in detail.
In [Chu12], Church used representation stability to prove that the space of configurations of distinct unordered points in a closed manifold exhibit rational homological stability. A second proof was also given by Randal-Williams in [RW11] using transfer maps. We give a third proof of this fact using localization and rational homotopy theory. This gives new insight into the role that the rationals play in homological stability. Our methods also yield new information about stability for torsion in the homology of configuration spaces of points in a closed manifold.
Let $\\A$ be an affine line arrangement in $\\C^2,$ with complement $\\M(\\A).$ The twisted (co)homology of $\\M(\\A)$ is an interesting object which has been considered by many authors, strictly related to the (co)homology of the Milnor fibre associated to the conified arrangement. In this paper we give a vanishing conjecture of such homology of a different nature with respect to the known results: namely, we conjecture that if the graph of double points of the arrangement is connected then there is no nontrivial monodromy. This conjecture is obviously combinatorial (meaning that it depends only on the lattice of the intersections). We prove it in some cases with stronger hypoteses. We also consider the integral case, relating the property of having trivial monodromy over $\\Z$ with a certain property of \"commutativity\" of the fundamental group up to some subgroup. Actually, we show that amonodromicity is measured by a certain quotient of commutator subgroups. Several examples are given.
In this note, we outline the general development of a theory of symmetric homology of algebras, an analog of cyclic homology where the cyclic groups are replaced by symmetric groups. This theory is developed using the framework of crossed simplicial groups and the homological algebra of module-valued functors. The symmetric homology of group algebras is related to stable homotopy theory. Two spectral sequences for computing symmetric homology are constructed. The relation to cyclic homology is discussed and some conjectures and questions towards further work are discussed.
Using methods originating in the theory of intersection spaces, specifically a de Rham type description of the real cohomology of these spaces by a complex of global differential forms, we show that the Leray-Serre spectral sequence with real coefficients of a flat fiber bundle of smooth manifolds collapses if the fiber is Riemannian and the structure group acts isometrically. The proof is largely topological and does not need a metric on the base or total space. We use this result to show further that if the fundamental group of a smooth aspherical manifold acts isometrically on a Riemannian manifold, then the equivariant real cohomology of the Riemannian manifold can be computed as a direct sum over the cohomology of the group with coefficients in the (generally twisted) cohomology modules of the manifold. Our results have consequences for the Euler class of flat sphere bundles. Several examples are discussed in detail, for instance an action of a free abelian group on a flag manifold.
Modular forms appear in many facets of mathematics, and have played important roles in geometry, mathematical physics, number theory, representation theory, topology, and other areas. Around 1994, motivated by technical issues in homotopy theory, Mark Mahowald, Haynes Miller and I constructed a topological refinement of modular forms, which we call {\\em topological modular forms}. At the Zurich ICM I sketched a program designed to relate topological modular forms to invariants of manifolds, homotopy groups of spheres, and ordinary modular forms. This program has recently been completed and new directions have emerged. In this talk I will describe this recent work and how it informs our understanding of both algebraic topology and modular forms.
We study the first homology group of the Milnor fiber of sharp arrangements in the real projective plane. Our work relies on the minimal Salvetti complex of the deconing arrangement and its boundary map. We describe an algorithm which computes possible eigenvalues of the first monodromy operator. We prove that, if a condition on some intersection points of lines is satisfied, then the only possible non trivial eigenvalues are cubic roots of the unity. Moreover we give sufficient conditions for just eigenvalues of order 3 or 4 to appear in cases in which this condition is not satisfied.
The goal of this paper is to prove that the classifying spaces of categories of algebras governed by a prop can be determined by using function spaces on the category of props. We first consider a function space of props to define the moduli space of algebra structures over this prop on an object of the base category. Then we mainly prove that this moduli space is the homotopy fiber of a forgetful map of classifying spaces, generalizing to the prop setting a theorem of Rezk. The crux of our proof lies in the construction of certain universal diagrams in categories of algebras over a prop. We introduce a general method to carry out such constructions in a functorial way.
We apply our earlier work on the higher-dimensional analogue of the Mumford conjecture to two questions. Inspired by work of Ebert we prove non-triviality of certain characteristic classes of bundles of smooth closed manifolds. Inspired by work of Church-Farb-Thibault and Church-Crossley-Giansiracusa we investigate the dependence of characteristic classes of bundles on characteristic numbers of its fibre, total space and base space.
We study the image of a transfer homomorphism in the stable homotopy groups of spheres. Actually, we show that an element of order 8 in the 18 dimensional stable stem is in the image of a double transfer homomorphism, which reproves a result due to P J Eccles that the element is represented by a framed hypersurface. Also, we determine the image of the transfer homomorphism in the 16 dimensional stable stem.
Let $M$ be a simply connected closed manifold of dimension $n$. We study the rational homotopy type of the configuration space of 2 points in $M$, $F(M,2)$. When $M$ is even dimensional, we prove that the rational homotopy type of $F(M,2)$ depends only on the rational homotopy type of $M$. When the dimension of $M$ is odd, for every $x\\in H^{n-2} (M, \\mathbb{Q})$, we construct a commutative differential graded algebra $C(x)$. We prove that for some $x \\in H^{n-2} (M; \\mathbb{Q})$, $C(x)$ encodes completely the rational homotopy type of $F(M,2)$. For some class of manifolds, we show that we can take $x=0$.
We introduce the notion of a matrad M = {M_{n,m}} whose submodules M_{*,1} and M_{1,*} are non-Sigma operads. We define the free matrad H_{\\infty} generated by a singleton in each bidegree (m,n) and realize H_{\\infty} as the cellular chains on biassociahedra KK_{n,m} = KK_{m,n}, of which KK_{n,1} = KK_{1,n} is the associahedron K_{n}. We construct the universal enveloping functor from matrads to PROPs and define an A_{\\infty}-bialgebra as an algebra over H_{\\infty}.
This sketch argues that work of Hesselholt [8] on the topological Hochschild homology of $\\Cp$ extends, using work of Scholze [15, 23] on flat descent, to define complex orientations for a version of topological Hochschild homology for rings of integers in a certain class of generalized cyclotomic perfectoid fields; and that the resulting spectra provide geometrically interesting targets for analogs of the Chern character, defined for certain integral lifts [19] of the extraordinary $K$-functors of chromatic homotopy theory.
Let E be a ring spectrum for which the E-Adams spectral sequence converges. We define a variant of Mahowald s root invariant called the `filtered root invariant  which takes values in the E_1 term of the E-Adams spectral sequence. The main theorems of this paper concern when these filtered root invariants detect the actual root invariant, and explain a relationship between filtered root invariants and differentials and compositions in the E-Adams spectral sequence. These theorems are compared to some known computations of root invariants at the prime 2. We use the filtered root invariants to compute some low dimensional root invariants of v_1-periodic elements at the prime 3. We also compute the root invariants of some infinite v_1-periodic families of elements at the prime 3.
We formulate and prove a new variant of the Segal Conjecture describing the group of homotopy classes of stable maps from the p-completed classifying space of a finite group G to the classifying space of a compact Lie group K as the p-adic completion of the Grothendieck group of finite principal (G,K)-bundles whose isotropy groups are p-groups. Collecting the result for different primes p, we get a new and simple description of the group of homotopy classes of stable maps between (uncompleted) classifying spaces of groups. This description allows us to determine the kernel of the map from the Grothendieck group A(G,K) of finite principal (G,K)-bundles to the group of homotopy classes of stable maps from BG to BK.
We compute the $E_2$-term of the Bousfield-Kan spectral sequence converging to the homotopy groups of the semi-cosimplicial $E_{\\infty}$ ring spectrum $Q(2)_{(3)}$. This 3-local spectrum was constructed by M. Behrens using degree 2 isogenies of elliptic curves, and its localization with respect to the 2nd Morava $K$-theory $K(2)$ is \"one half\" of the $K(2)$-local sphere at the prime 3. The computation in this paper uses techniques developed in the author s previous work on the Adams-Novikov spectral sequence for $Q(2)_{(3)}$, and provides another gateway to the homotopy ring $\\pi_*Q(2)_{(3)}$.
Chas and Sullivan introduced string homology, which is the equivariant homology of the loop space with the $S^1$ action on loops by rotation. Craig Westerland computed the string homology for spheres with coefficients in $\\mathbb{Z} /2\\mathbb{Z}$ and Somnath Basu computed the string homology and string bracket for spheres over rational coefficients and found that the bracket is trivial in his dissertation. In this paper, we compute string homology and the string bracket for spheres with integer coefficients, treating the odd- and even-dimensional cases separately. We use the Gysin sequence and Leray-Serre spectral sequence for our computations. We find that over the integers, the string Lie algebra bracket structure is not always zero as Basu found. The string bracket turns out to be non-zero on torsion elements coming from string homology.
Associated to a Coxeter system $(W,S)$ there is a contractible simplicial complex $\\Sigma$ called the Davis complex on which $W$ acts properly and cocompactly by reflections. Given a positive real multiparameter $\\mathbf{q}$, one can define the weighted $L^2$-(co)homology groups of $\\Sigma$ and associate to them a nonnegative real number called the weighted $L^2$-Betti number. Not much is known about the behavior of these groups when $\\mathbf{q}$ lies outside a certain restricted range, and weighted $L^2$-Betti numbers have proven difficult to compute. In this article we propose a program to compute the weighted $L^2$-(co)homology of $\\Sigma$ by considering a thickened version of this complex. The program proves especially successful provided that the weighted $L^2$-(co)homology of certain infinite special subgroups of $W$ vanishes in low dimensions. We then use our complex to perform computations for many examples of Coxeter groups, in most cases providing explicit formulas for the weighted $L^2$-Betti numbers.
In this paper we study cobordism categories consisting of manifolds which are endowed with geometric structure. Examples of such geometric structures include symplectic structures, flat connections on principal bundles, and complex structures along with a holomorphic map to a target complex manifold. A general notion of \"geometric structure\" is defined using sheaf theoretic constructions. Our main theorem is the identification of the homotopy type of such cobordism categories in terms of certain Thom spectra. This extends work of Galatius-Madsen-Tillmann-Weiss who identify the homotopy type of cobordism categories of manifolds with fiberwise structures on their tangent bundles. Interpretations of the main theorem are discussed which have relevance to topological field theories, moduli spaces of geometric structures, and h-principles. Applications of the main theorem to various examples of interest in geometry, particularly holomorphic curves, are elaborated upon.
Let G be a discrete group for which the classifying space for proper G-actions is finite-dimensional. We find a space W such that for any such G, the classifying space PBG for proper G-bundles has the homotopy type of the W-nullification of BG. We use this to deduce some results concerning PBG and in some cases where there is a good model for PBG we obtain information about the BZ/p-nullification of BG.
We use covering space theory and the fundamental group of complements of complexified-real line arrangements to explore the associated Milnor fiber. This work yields a combinatorially determined upper bound on the rank of the first homology group of the Milnor fiber. Under certain combinatorial conditions, we then show that one may determine the exact rank of the group and show that it is torsion free.
Let $A$ be either a simplicial complex $K$ or a small category $\\mathcal C$ with $V(A)$ as its set of vertices or objects. We define a twisted structure on $A$ with coefficients in a simplicial group $G$ as a function $$ \\delta\\colon V(A)\\longrightarrow \\operatorname{End}(G), \\quad v\\mapsto \\delta_v $$ such that $\\delta_v\\circ \\delta_w=\\delta_w\\circ \\delta_v$ if there exists an edge in $A$ joining $v$ with $w$ or an arrow either from $v$ to $w$ or from $w$ to $v$. We give a canonical construction of twisted simplicial group as well as twisted homology for $A$ with a given twisted structure. Also we determine the homotopy type of of this simplicial group as the loop space over certain twisted smash product.
This work solves the problem of elaborating Ganea and Whitehead definitions for the tangential category of a foliated manifold. We develop these two notions in the category $\\Tops$ of stratified spaces, that are topological spaces $X$ endowed with a partition $\\cF$ and compare them to a third invariant defined by using open sets. More precisely, these definitions apply to an element $(X,\\cF)$ of $\\Tops$ together with a class $\\cA$ of subsets of $X$; they are similar to invariants introduced by M. Clapp and D. Puppe. If $(X,\\cF)\\in\\Tops$, we define a transverse subset as a subspace $A$ of $X$ such that the intersection $S\\cap A$ is at most countable for any $S\\in \\cF$. Then we define the Whitehead and Ganea LS-categories of the stratified space by taking the infimum along the transverse subsets. When we have a closed manifold, endowed with a $C^1$-foliation, the three previous definitions, with $\\cA$ the class of transverse subsets, coincide with the tangential category and are homotopical invariants.
E. Sk\\\"oldberg s Morse Theory from an Algebraic Viewpoint and M. J\\\"ollenbeck s Algebraic Discrete Morse Theory and Applications to Commutative Algebra, which is the algebraic generalization of R. Forman s discrete Morse Theory for Cell Complexes, is discussed in the context of general chain complexes of free modules. Using this, we compute the Chevalley-Eilenberg (co)homology of the Lie algebra of all triangular matrices $\\frak{sol}_n$ over $\\mathbb{Q}$ or $\\mathbb{Z}_p$ for large enough prime $p$. We determine the column and row in the table of $H_k(\\frak{sol}_n;\\mathbb{Z})$ where the $p$-torsion first appears. Every $\\mathbb{Z}_{p^k}$ appears as a direct summand of some $H_k(\\frak{sol}_n;\\mathbb{Z})$. Module $H_k(\\frak{sol}_n;\\mathbb{Z}_p)$ is expressed by the homology of a chain subcomplex for the Lie algebra of all strictly triangular matrices $\\frak{nil}_n$, using the K\\\"unneth formula. All conclusions are accompanied by computer experiments. Then we generalize some results to the more general Lie algebras of (strictly) triangular matrices $\\frak{gl}_n^\\prec$ and $\\frak{gl}_n^\\preceq$ with respect to any partial ordering $\\preceq$ on $[n]$. Furthermore, the matchings used can be analogously defined for other Lie algebra families and are useful for theoretical as well as computational purposes.
This note explores the interaction between cohomology operations in a generalized cohomology theory and a string topology loop coproduct dual to the Chas--Sullivan loop product. More precisely, we ask for a description for the failure of a given operation to commute with the loop coproduct, and will obtain a satisfactory answer in the case where the operation preserves both sums and products. Examples of such operations include the total Steenrod square in ordinary mod 2 cohomology and the Adams operations in K-theory.
This paper but section 6 is essentially my lecture at The Eighth Congress of Romanian Mathematicians, June 26 - July 1, 2015, Iasi, Romania. The paper summarizes the definitions and the properties of the invariants associated to a real or an angle valued map in the framework of what we call an Alternative to Morse-Novikov theory. These invariants are configurations of points in the complex plane, configurations of vector spaces or modules indexed by complex numbers and collections of Jordan cells. The first are refinements of Betti numbers, the second of homology and the third of monodromy. Although not discussed in this paper but discussed in works this report is based on, these invariants are computer friendly (i.e. can be calculated by computer implementable algorithms when the source of the map is a simplicial complex and the map is simplicial) and are of relevance for the dynamics of flows which admit Lyapunov real or angle valued map.
This paper investigates if a differential graded algebra can have more than one $A_\\infty$-structure extending the given differential graded algebra structure. We give a sufficient condition for uniqueness of such an $A_\\infty$-structure up to quasi-isomorphism using Hochschild cohomology. We then extend this condition to Sagave s notion of derived $A_\\infty$-algebras after introducing a notion of Hochschild cohomology that applies to this.
Let $t$ be a positive integer. Following work of D. M. Davis, we study the topology of complex-projective product spaces, i.e. quotients of cartesian products of odd dimensional spheres by the diagonal $S^1$-action, and of the $t$-torsion lens product spaces, i.e. the corresponding quotients when the action is restricted to the $t^{\\mathrm{th}}$ roots of unity. For a commutative complex-oriented cohomology theory $h^*$, we determine the $h^*$-cohomology ring of these spaces (in terms of the $t$-series for $h^*$, in the case of $t$-torsion lens product spaces). When $h^*$ is singular cohomology with mod 2 coefficients, we also determine the action of the Steenrod algebra. We show that these spaces break apart after a suspension as a wedge of desuspensions of usual stunted complex projective ($t$-torsion lens) spaces. We estimate the category and topological complexity of complex-projective and lens product spaces, showing in particular that these invariants are usually much lower than predicted by the usual dimensional bounds. We extend Davis  analysis of manifold properties such as immersion dimension, (stable-)span, and (stable-)parallelizability of real projective product spaces to the complex-projective and lens product cases.
We develop a framework for displaying the stable homotopy theory of the sphere, at least after localization at the second Morava K-theory K(2). At the prime 3, we write the spectrum L_{K(2)S^0 as the inverse limit of a tower of fibrations with four layers. The successive fibers are of the form E_2^hF where F is a finite subgroup of the Morava stabilizer group and E_2 is the second Morava or Lubin-Tate homology theory. We give explicit calculation of the homotopy groups of these fibers. The case n=2 at p=3 represents the edge of our current knowledge: n=1 is classical and at n=2, the prime 3 is the largest prime where the Morava stabilizer group has a p-torsion subgroup, so that the homotopy theory is not entirely algebraic.
We say that a simply connected space $X$ is pre-c-symplectic if it is the fibre of a rational fibration $X\\to Y\\to \\C P^{\\infty}$ where $Y$ is cohomologically symplectic in the sense that there is a degree 2 cohomology class which cups to a top class. It is a rational homotopical property but not a cohomological one. By using Sullivan s minimal models, we give the necessary and sufficient condition that the product of odd-spheres $X=S^{k_1}\\times ... \\times S^{k_n}$ is pre-c-symplectic and see some related topics. Also we give a charactarization of the Hasse diagram of rational toral ranks for a space $X$ as a necessary condition to be pre-c-symplectic and see some examples in the cases of finite-oddly generated rational homotopy groups.
Let $X$ be a two-cell complex with attaching map $\\alpha\\colon S^q\\to S^p$, and let $C_X$ be the cofiber of the diagonal inclusion $X\\to X\\times X$. It is shown that the topological complexity (${\\rm TC}$) of $X$ agrees with the Lusternik-Schnirelmann category (${\\rm cat}$) of $C_X$ in the (almost stable) range $q\\leq2p-1$. In addition, the equality ${\\rm TC}(X)={\\rm cat}(C_X)$ is proved in the (strict) metastable range $2p-1<q\\leq3(p-1)$ under fairly mild conditions by making use of the Hopf invariant techniques recently developed by the authors in their study of the sectional category of arbitrary maps.
We present a general homotopical analysis of structured diagram spaces and discuss the relation to symmetric spectra. The main motivating examples are the I-spaces, which are diagrams indexed by finite sets and injections, and J-spaces, which are diagrams indexed by the Grayson-Quillen construction on the category of finite sets and bijections. We show that the category of I-spaces provides a convenient model for the homotopy category of spaces in which every E-infinity space can be rectified to a strictly commutative monoid. Similarly, the commutative monoids in the category of J-spaces model graded E-infinity spaces. Using the theory of J-spaces we introduce the graded units of a symmetric ring spectrum. The graded units detect periodicity phenomena in stable homotopy and we show how this can be applied to the theory of topological logarithmic structures.
In this paper, using the topology on the set of shape morphisms between arbitrary topological spaces $X$, $Y$, $Sh(X,Y)$, defined by Cuchillo-Ibanez et al. in 1999, we consider a topology on the shape homotopy groups of arbitrary topological spaces which make them Hausdorff topological groups. We then exhibit an example in which $\\check{\\pi}_k^{top}$ succeeds in distinguishing the shape type of $X$ and $Y$ while $\\check{\\pi}_k$ fails, for all $k\\in \\Bbb{N}$. Moreover, we present some basic properties of topological shape homotopy groups, among them commutativity of $\\check{\\pi}_k^{top}$ with finite product of compact Hausdorff spaces. Finally, we consider a quotient topology on the $k$th shape group induced by the $k$th shape loop space and show that it coincides with the above topology.
We develop model categories of rational equivariant spectra whose homotopy categories are equivalent to the category of rational equivariant cohomology theories. We prove that given an orthogonal decomposition of the unit in the rational Burnside ring, the model category of rational equivariant spectra decomposes into a product of localisations. We use this result to reprove the classification of rational equivariant cohomology theories for finite groups and to study such cohomology theories for the group O(2). We then concentrate on a split piece of the O(2) case and relate it to rational SO(2) equivariant spectra.
The normalized cochain complex of a simplicial set N^*(Y) is endowed with the structure of an E_{infinity} algebra. More specifically, we prove in a previous article that N^*(Y) is an algebra over the Barratt-Eccles operad. According to M. Mandell, under reasonable completeness assumptions, this algebra structure determines the homotopy type of Y. In this article, we construct a model of the mapping space Map(X,Y). For that purpose, we extend the formalism of Lannes  T functor in the framework of E_{infinity} algebras. Precisely, in the category of algebras over the Barratt-Eccles operad, we have a division functor -oslash N_(X) which is left adjoint to the functor Hom_F(N_*(X),-). We prove that the associated left derived functor -oslash^L N_*(X) is endowed with a quasi-isomorphism N^*(Y) oslash^L N_*(X) --> N^* Map(X,Y).
The primary goal of this paper is to find a homotopy theoretic approximation to moduli spaces of holomorphic maps Riemann surfaces into complex projective space. There is a similar treatment of a partial compactification of these moduli spaces of consisting of irreducible stable maps in the sense of Gromov-Witten theory. The arguments follow those from a paper of G. Segal on the topology of the space of rational functions.
Let $V(0)$ be the mod $2$ Moore spectrum and let $\\mathcal{C}$ be the super-singular elliptic curve over $\\mathbb{F}_4$ defined by the Weierstrass equation $y^2+y=x^3$. Let $F_{\\mathcal{C}}$ be its formal group law and $E_{\\mathcal{C}}$ be the spectrum classifying the deformations of $F_{\\mathcal{C}}$. The group of automorphisms of $F_{\\mathcal{C}}$, which we denote by $\\mathbb{S}_{\\mathcal{C}}$, acts on $E_{\\mathcal{C}}$. Further, $\\mathbb{S}_{\\mathcal{C}}$ admits a norm whose kernel we denote by $\\mathbb{S}_{\\mathcal{C}}^1$. The cohomology of $\\mathbb{S}_{\\mathcal{C}}^1$ with coefficients in $(E_{\\mathcal{C}})_*V(0)$ is the $E_2$-term of a spectral sequence converging to the homotopy groups of $E_{\\mathcal{C}}^{h\\mathbb{S}_{\\mathcal{C}}^1}\\wedge V(0)$, a spectrum closely related to $L_{K(2)}V(0)$. In this paper, we use the algebraic duality resolution spectral sequence to compute an associated graded for $H^*(\\mathbb{S}_{\\mathcal{C}}^1;(E_{\\mathcal{C}})_*V(0))$. These computations rely heavily on the geometry of elliptic curves made available to us at chromatic level $2$.
For X a simply-connected finite H-space, there is a Bousfield-Kan spectral sequence which converges to the homotopy of its K-completion. When X=Spin(2n+1), we expect that these homotopy groups equal the v1-periodic homotopy groups in dimension greater than n^2. In this paper, we accomplish two things. (1) We prove that, for any X, the 1-line of this spectral sequence is determined in an explicit way from K-theory and Adams operations. (2) For X=Spin(2n+1), we make an explicit computation of this 1-line.
In this paper, we consider homology groups induced by the exterior algebra generated by a simplicial compliment of a simplicial complex $K$. These homology groups are isomorphic to the Tor-groups $\\mathrm{Tor}_{i, J}^{\\mathbf{k}[m]}(\\mathbf{k}(K),\\mathbf{k})$ of the face ring $\\mathbf{k}(K)$, which is very useful and much studied in toric topology. By using $\\check{C}ech$ homology theory and Alexander duality theorem, we prove that these homology groups have dualities with the simplicial cohomology groups of the full subcomplexes of $K$. Then we give a new proof of Hochster s theorem.
Let $G$ be a compact connected Lie group and let $P$ be a principal $G$-bundle over $K$. The gauge group of $P$ is the topological group of automorphisms of $P$. For fixed $G$ and $K$, consider all principal $G$-bundles $P$ over $K$. It is proved by Crabb--Sutherland and the second author that the number of $A_n$-types of the gauge groups of $P$ is finite if $n<\\infty$ and $K$ is a finite complex. We show that the number of $A_\\infty$-types of the gauge groups of $P$ is infinite if $K$ is a sphere and there are infinitely many $P$.
We carefully present an elementary proof of the well known theorem that each homotopy group (or, in degree zero, pointed set) of the inverse limit of a tower of fibrations maps naturally onto the inverse limit of the homotopy groups (or, in degree zero, pointed sets) of the spaces in the tower, with kernel naturally isomorphic to $\\lim^{1}$ of the tower of homotopy groups of one dimension higher.
In this paper we consider a class of connected closed $G$-manifolds with a non-empty finite fixed point set, each $M$ of which is totally non-homologous to zero in $M_G$ (or $G$-equivariantly formal), where $G={\\Bbb Z}_2$. With the help of the equivariant index, we give an explicit description of the equivariant cohomology of such a $G$-manifold in terms of algebra, so that we can obtain analytic descriptions of ring isomorphisms among equivariant cohomology rings of such $G$-manifolds, and a necessary and sufficient condition that the equivariant cohomology rings of such two $G$-manifolds are isomorphic. This also leads us to analyze how many there are equivariant cohomology rings up to isomorphism for such $G$-manifolds in 2- and 3-dimensional cases.
We consider simple polytopes $P=vc^{k}(\\Delta^{n_{1}}\\times\\ldots\\times\\Delta^{n_{r}})$, for $n_1\\ge\\ldots\\ge n_r\\ge 1,r\\ge 1,k\\ge 0$, that is, $k$-vertex cuts of a product of simplices, and call them {\\emph{generalized truncation polytopes}}. For these polytopes we describe the cohomology ring of the corresponding moment-angle manifold $\\mathcal Z_P$ and explore some topological consequences of this calculation. We also examine minimal non-Golodness for their Stanley--Reisner rings and relate it to the property of $\\mathcal Z_P$ being a connected sum of sphere products.
We explain a new relationship between formal group laws and ring spectra in stable homotopy theory. We study a ring spectrum denoted DB which depends on a commutative ring B and is closely related to the topological Andre-Quillen homology of B. We present an explicit construction which to every 1-dimensional and commutative formal group law F over B associates a morphism of ring spectra F_*: HZ --> DB from the Eilenberg-MacLane ring spectrum of the integers. We show that formal group laws account for all such ring spectrum maps, and we identify the space of ring spectrum maps between HZ and DB. That description involves formal group law data and the homotopy units of the ring spectrum DB.
The main purpose of this note is to give a proof of the fact that the Toda brackets $<\\bar{\\nu},\\sigma,\\bar{\\nu}>$ and $<\\nu,\\eta, \\bar{\\sigma}>$ are not trivial. This is an affirmative answer of the second author s Conjecture (Determination of the $P$-image by Toda brackets, Geometry and Topology Monographs 13(2008), 355-383). The second purpose is to show the relation $\\bar{\\nu}_7\\omega_{15}=\\nu_7\\sigma_{10}\\kappa_{17}$ in $\\pi^7_{31}$.
We establish a differential $d_2(D_1)=h_0^2h_3g_2$ in the $51$-stem of the Adams spectral sequence at the prime $2$, which gives the first correct calculation of the stable 51 and 52 stems. This differential is remarkable since we know of no way to prove it without recourse to the motivic Adams spectral sequence. It is the last undetermined differential in the range of the first author s detailed calculations of the $n$-stems for $n<60$ [6]. This note advertises the use of the motivic Adams spectral sequence to obtain information about classical stable homotopy groups.
There is an interplay between models, specified by variables and equations, and their connections to one another. This dichotomy should be reflected in the abstract as well. Without referring to the models directly -- only that a model consists of spaces and maps between them -- the most readily apparent feature of a multi-model system is its topology. We propose that this topology should be modeled first, and then the spaces and maps of the individual models be specified in accordance with the topology. Axiomatically, this construction leads to sheaves. Sheaf theory provides a toolbox for constructing predictive models described by systems of equations. Sheaves are mathematical objects that manage the combination of bits of local information into a consistent whole. The power of this approach is that complex models can be assembled from smaller, easier-to-construct models. The models discussed in this chapter span the study of continuous dynamical systems, partial differential equations, probabilistic graphical models, and discrete approximations of these models.
We study the inverse of the divergence operator on a domain $\\Omega \\subset R^3$ perforated by a system of tiny holes. We show that such inverse can be constructed on the Lebesgue space $L^p(\\Omega)$ for any $1< p < 3$, with a norm independent of perforation, provided the holes are suitably small and their mutual distance suitably large. Applications are given to problems arising in homogenization of steady compressible fluid flows.
We prove a version of the negative norm theorem in Orlicz-Sobolev spaces. A study of continuity properties of the Bogovskii -operator between Orlicz spaces is a crucial step, of independent interest, in our approach. Applications to the problem of pressure reconstruction for Non-Newtonian fluids governed by constitutive laws, which are not necessarily power type, are presented. A key inequality for a numerical analysis of the underlying elliptic system is also derived.
Discrete solitons of the discrete nonlinear Schr\\\"odinger (dNLS) equation become compactly supported in the anti-continuum limit of the zero coupling between lattice sites. Eigenvalues of the linearization of the dNLS equation at the discrete soliton determine its spectral and linearized stability. All unstable eigenvalues of the discrete solitons near the anti-continuum limit were characterized earlier for this model. Here we analyze the resolvent operator and prove that it is uniformly bounded in the neighborhood of the continuous spectrum if the discrete soliton is simply connected in the anti-continuum limit. This result rules out existence of internal modes (neutrally stable eigenvalues of the discrete spectrum) of such discrete solitons near the anti-continuum limit.
For $S$ a positive selfadjoint operator on a Hilbert space, \\[ \\frac{d^2u}{dt}(t) + 2 F(S)\\frac{du}{dt}(t) + S^2u(t)=0 \\] describes a class of wave equations with strong friction or damping if $F$ is a positive Borel function. Under suitable hypotheses, it is shown that \\[ u(t)=v(t)+ w(t) \\] where $v$ satisfies \\[ 2F(S)\\frac{dv}{dt}(t)+ S^2v(t)=0 \\] and \\[ \\frac{w(t)}{\\|v(t)\\|} \\rightarrow 0, \\; \\text{as} \\; t \\rightarrow +\\infty. \\] The required initial condition $v(0)$ is given in a canonical way in terms of $u(0)$, $u (0)$.
We consider a nonlinear heat equation with a gradient term. We construct a blow-up solution for this equation with a prescribed blow-up profile. For that, we translate the question in selfsimilar variables and reduce the problem to a finite dimensional one. We then solve the finite dimensional problem using index theory. The interpretation of the finite dimensional parameters allows us to derive the stability of the constructed solution with respect to initial data.
We study a class of design problems in solid mechanics, leading to a variation on the classical question of equi-dimensional embeddability of Riemannian manifolds. In this general new context, we derive a necessary and sufficient existence condition, given through a system of total differential equations, and discuss its integrability. In the classical context, the same approach yields conditions of immersibility of a given metric in terms of the Riemann curvature tensor. In the present situation, the equations do not close in a straightforward manner, and successive differentiation of the compatibility conditions leads to a new algebraic description of integrability. We also recast the problem in a variational setting and analyze the infimum of the appropriate incompatibility energy, resembling the \"non-Euclidean elasticity.\" We then derive a $\\Gamma$-convergence result for the dimension reduction from $3$d to $2$d in the Kirchhoff energy scaling regime.
We consider in 2D the following special case of the Mumford-Shah functional $$ J(u, \\Gamma)=\\int_{B_1\\backslash\\Gamma} |\\nabla u|^2 dx + \\lambda^2 \\frac{\\pi}{2} \\mathcal{H}^1(\\Gamma). $$ It is known that if the minimizer has a crack-tip in the ball $B_1$ (assume at the origin), then $u\\approx \\lambda \\Im \\sqrt{z}$ at this point. We calculate higher order terms in the asymptotic expansion, where the homogeneity orders of those terms appear to be solutions to a certain trigonometric relation.
We consider standing waves with frequency $\\omega$ for 4-superlinear Schr\\\"odinger-Poisson system. For large $\\omega$ the problem reduces to a system of elliptic equations in $\\mathsf{R}^3$ with potential indefinite in sign. The variational functional does not satisfy the mountain pass geometry. The nonlinearity considered here satisfies a condition which is much weaker than the classical (AR) condition and the condition (Je) of Jeanjean. We obtain nontrivial solution and, in case of odd nonlinearity an unbounded sequence of solutions via the local linking theorem and the fountain theorem, respectively.
This paper deals with the Neumann eigenvalue problem for the Hermite operator defined in a convex, possibly unbounded, planar domain $\\Omega$, having one axis of symmetry passing through the origin. We prove a sharp lower bound for the first eigenvalue $\\mu_1^{odd}(\\Omega)$ with an associated eigenfunction odd with respect to the axis of symmetry. Such an estimate involves the first eigenvalue of the corresponding one-dimensional problem. As an immediate consequence, in the class of domains for which $\\mu_1(\\Omega)=\\mu_1^{odd}(\\Omega)$, we get an explicit lower bound for the difference between $\\mu(\\Omega)$ and the first Neumann eigenvalue of any strip.
We consider a class of reaction-diffusion equations with a stochastic perturbation on the boundary. We show that in the limit of fast diffusion, one can rigorously approximate solutions of the system of PDEs with stochastic Neumann boundary conditions by the solution of a suitable stochastic/deterministic differential equation for the average concentration that involves reactions only. An interesting effect occurs, if the noise on the boundary does not change the averaging concentration, but is sufficiently large. Then surprising additional effective reaction terms appear. We focus on systems with polynomial nonlinearities only and give applications to the two dimensional nonlinear heat equation and the cubic auto-catalytic reaction between two chemicals.
We give a regularity criterion for a $Q$-tensor system modeling a nematic Liquid Crystal, under homogeneous Neumann boundary conditions for the tensor $Q$. Starting of a criterion only imposed on the velocity field ${\\bf u}$ two results are proved; the uniqueness of weak solutions and the global in time weak regularity for the time derivative $(\\partial_t {\\bf u},\\partial_t Q)$. This paper extends the work done in [F. Guill\\ en-Gonz\\ alez, M.A. Rodr\\ iguez-Bellido \\& M.A. Rojas-Medar, Sufficient conditions for regularity and uniqueness of a 3D nematic liquid crystal model, Math. Nachr. 282 (2009), no. 6, 846-867] for a nematic Liquid Crystal model formulated in $({\\bf u},{\\bf d})$, where ${\\bf d}$ denotes the orientation vector of the liquid crystal molecules.
This paper concerns the inverse problem of retrieving a stationary potential for the Schr\\\"odinger evolution equation in a bounded domain of RN with Dirichlet data and discontinuous principal coefficient a(x) from a single time-dependent Neumann boundary measurement. We consider that the discontinuity of a is located on a simple closed hyper-surface called the interface, and a is constant in each one of the interior and exterior domains with respect to this interface. We prove uniqueness and lipschitz stability for this inverse problem under certain convexity hypothesis on the geometry of the interior domain and on the sign of the jump of a at the interface. The proof is based on a global Carleman inequality for the Schr\\\"odinger equation with discontinuous coefficients, result also interesting by itself.
This is a simplification of our prior work on the existence theory for the Rosseland-type equations. Inspired by the Rosseland equation in the conduction-radiation coupled heat transfer, we use the locally arbitrary growth conditions instead of the common global restricted growth conditions. In the Lebesgue square integrable space, the solution to the linear elliptic equation depends continuously on the coefficients matrix. This is a simple version of the maximal regularity. There exists a fixed point for the linearized map (compact and continuous) in a closed convex set. We also consider the Galerkin method.
We consider the Cauchy problem for the 2D and 3D Klein-Gordon-Schr\\\"odinger system. In 2D we show local well-posedness for Schr\\\"odinger data in H^s and wave data in H^{\\sigma} x H^{\\sigma -1} for s=-1/4 + and \\sigma = -1/2, whereas ill-posedness holds for s<- 1/4 or \\sigma <-1/2, and global well-posedness for s\\ge 0 and s- 1/2 \\le \\sigma < s+ 3/2. In 3D we show global well-posedness for s \\ge 0, s - 1/2 < \\sigma \\le s+1. Fundamental for our results are the studies by Bejenaru, Herr, Holmer and Tataru, and Bejenaru and Herr for the Zakharov system, and also the global well-posedness results for the Zakharov and Klein-Gordon-Schr\\\"odinger system by Colliander, Holmer and Tzirakis.
In this paper we consider the inverse acoustic scattering (in \\mathbb{R}^3) or electromagnetic scattering (in \\mathbb{R}^2, for the scalar TE-polarization case) problem of reconstructing possibly multiple defective penetrable regions in a known anisotropic material of compact support. We develop the factorization method for a non-absorbing anisotropic background media containing penetrable defects. In particular, under appropriate assumptions on the anisotropic material properties of the media we develop a rigorous characterization for the support of the defective regions from the given far field measurements. Finally we present some numerical examples in the two dimensional case to demonstrate the feasibility of our reconstruction method including examples for the case when the defects are voids (i.e. subregions with refractive index the same as the background outside the inhomogeneous hosting media).
We study a non-local parabolic Lotka-Volterra type equation describing a population structured by a space variable x 2 Rd and a phenotypical trait 2 . Considering diffusion, mutations and space-local competition between the individuals, we analyze the asymptotic (long- time/long-range in the x variable) exponential behavior of the solutions. Using some kind of real phase WKB ansatz, we prove that the propagation of the population in space can be described by a Hamilton-Jacobi equation with obstacle which is independent of . The effective Hamiltonian is derived from an eigenvalue problem. The main difficulties are the lack of regularity estimates in the space variable, and the lack of comparison principle due to the non-local term.
In this paper, we investigate an initial-boundary value problem for a chemotaxis-fluid system in a general bounded regular domain $\\Omega \\subset \\mathbb{R}^N$ ($N\\in\\{2,3\\}$), not necessarily being convex. Thanks to the elementary lemma given by Mizoguchi & Souplet [10], we can derive a new type of entropy-energy estimate, which enables us to prove the following: (1) for $N=2$, there exists a unique global classical solution to the full chemotaxis-Navier-Stokes system, which converges to a constant steady state $(n_\\infty, 0,0)$ as $t\\to+\\infty$, and (2) for $N=3$, the existence of a global weak solution to the simplified chemotaxis-Stokes system. Our results generalize the recent work due to Winkler [15,16], in which the domain $\\Omega$ is essentially assumed to be convex.
We prove the propagation of regularity, uniformly in time, for the scaled solutions of one-dimensional dissipative Maxwell models. This result together with the weak convergence towards the stationary state proven by Pareschi and Toscani in 2006 implies the strong convergence in Sobolev norms and in the L^1 norm towards it depending on the regularity of the initial data. In the case of the one-dimensional inelastic Boltzmann equation, the result does not depend of the degree of inelasticity. This generalizes a recent result of Carlen, Carrillo and Carvalho (arXiv:0805.1051v1), in which, for weak inelasticity, propagation of regularity for the scaled inelastic Boltzmann equation was found by means of a precise control of the growth of the Fisher information.
We consider a nonlocal parabolic model for a micro-electro-mechanical system. Specifically, for a radially symmetric problem with monotonic initial data, it is shown that the solution quenches, so that touchdown occurs in the device, in a situation where there is no steady state. It is also shown that quenching occurs at a single point and a bound on the approach to touchdown is obtained. Numerical simulations illustrating the results are given.
General hyperbolic systems of balance laws with inhomogeneous flux and source are studied. Global existence of entropy weak solutions to the Cauchy problem is established for small $BV$ data under appropriate assumptions on the decay of the flux and the source with respect to space and time. There is neither a hypothesis about equilibrium solution nor about the dependence of the source on the state vector as previous results have assumed.
We study a dissipative nonlinear equation modelling certain features of the Navier-Stokes equations. We prove that the evolution of radially symmetric compactly supported initial data does not lead to singularities in dimensions $n\\leq 4$. For dimensions $n>4$ we present strong numerical evidence supporting existence of blow-up solutions. Moreover, using the same techniques we numerically confirm a conjecture of Lepin regarding existence of self-similar singular solutions to a semi-linear heat equation.
We consider a class of nonautonomous second order parabolic equations with unbounded coefficients defined in $I\\times\\R^d$, where $I$ is a right-halfline. We prove logarithmic Sobolev and Poincar\\ e inequalities with respect to an associated evolution system of measures $\\{\\mu_t: t \\in I\\}$, and we deduce hypercontractivity and asymptotic behaviour results for the evolution operator $G(t,s)$.
Infinite energy solutions to the Navier-Stokes equations in $\\mathbb{R}^2$ may be constructed by decomposing the initial data into a finite energy piece and an infinite energy piece, which are then treated separately. We prove that the finite energy part of such solutions is bounded for all time and decays algebraically in time when the same can be said of heat energy starting from the same data. As a consequence, we describe the asymptotic behavior of the infinite energy solutions. Specifically, we consider the solutions of Gallagher and Planchon [5] as well as solutions constructed from a \"radial energy decomposition\". Our proof uses the Fourier Splitting technique of M. E. Schonbek.
Whether or not the solution to 2D resistive MHD equations is globally smooth remains open. This paper establishes the global regularity of solutions to the 2D almost resistive MHD equations, which require the dissipative operators $\\mathcal{L}$ weaker than any power of the fractional Laplacian. The result is an improvement of the one of Fan et al. (Global Cauchy problem of 2D generalized MHD equations, Monatsh. Math., 175 (2014), pp. 127-131) which ask for $\\alpha>0, \\beta=1$.
In this note we revisit Almgren s theory of Q-valued functions, that are functions taking values in the space of unordered Q-tuples of points in R^n. In particular: 1) we give shorter versions of Almgren s proofs of the existence of Dir-minimizing Q-valued functions, of their Hoelder regularity and of the dimension estimate of their singular set; 2) we propose an alternative intrinsic approach to these results, not relying on Almgren s biLipschitz embedding; 3) we improve upon the estimate of the singular set of planar Dir-minimizing functions by showing that it consists of isolated points.
In this paper we are concerned with a general singular Dirichlet boundary value problem whose model is the following $$ \\begin{cases} -\\Delta u = \\frac{\\mu}{u^{\\gamma}} & \\text{in}\\ \\Omega,\\newline u=0 &\\text{on}\\ \\partial\\Omega,\\newline u>0 &\\text{on}\\ \\Omega,. \\end{cases} $$ Here $\\mu$ is a nonnegative bounded Radon measure on a bounded open set $\\Omega\\subset\\mathbb{R}^N$, and $\\gamma>0$.
The authors of this paper study singular phenomena(vanishing and blowing-up in finite time) of solutions to the homogeneous $\\hbox{Dirichlet}$ boundary value problem of nonlinear diffusion equations involving $p(x)$-\\hbox{Laplacian} operator and a nonlinear source. The authors discuss how the value of the variable exponent $p(x)$ and initial energy(data) affect the properties of solutions. At the same time, we obtain the critical extinction and blow-up exponents of solutions.
Consider the initial-boundary value problem for a strictly hyperbolic, genuinely nonlinear, Temple class system of conservation laws % $$ u_t+f(u)_x=0, \\qquad u(0,x)=\\ov u(x), \\qquad {{array}{ll} &u(t,a)=\\widetilde u_a(t), \\noalign{\\smallskip} &u(t,b)=\\widetilde u_b(t), {array}. \\eqno(1) $$ on the domain $\\Omega =\\{(t,x)\\in\\R^2 : t\\geq 0, a \\le x\\leq b\\}.$ We study the mixed problem (1) from the point of view of control theory, taking the initial data $\\bar u$ fixed, and regarding the boundary data $\\widetilde u_a, \\widetilde u_b$ as control functions that vary in prescribed sets $\\U_a, \\U_b$, of $\\li$ boundary controls. In particular, we consider the family of configurations $$ \\A(T) \\doteq \\big\\{u(T,\\cdot); ~ u {\\rm is a sol. to} (1), \\quad \\widetilde u_a\\in \\U_a, \\widetilde u_b \\in \\U_b \\big\\} $$ that can be attained by the system at a given time $T>0$, and we give a description of the attainable set $\\A(T)$ in terms of suitable Oleinik-type conditions. We also establish closure and compactness of the set $\\A(T)$ in the $lu$ topology.
Under consideration is the damped semilinear wave equation \\[ u_{tt}+u_t-\\Delta u+u+f(u)=0 \\] in a bounded domain $\\Omega$ in $\\mathbb{R}^3$ subject to an acoustic boundary condition with a singular perturbation, which we term \"massless acoustic perturbation,\" \\[ \\ep\\delta_{tt}+\\delta_t+\\delta = -u_t\\quad\\text{for}\\quad \\ep\\in[0,1]. \\] By adapting earlier work by S. Frigeri, we prove the existence of a family of global attractors for each $\\ep\\in[0,1]$. We also establish the optimal regularity for the global attractors, as well as the existence of an exponential attractor, for each $\\ep\\in[0,1].$ The later result insures the global attractors possess finite (fractal) dimension, however, we cannot yet guarantee that this dimension is independent of the perturbation parameter $\\ep.$ The family of global attractors are upper-semicontinuous with respect to the perturbation parameter $\\ep$, a result which follows by an application of a new abstract result also contained in this article. Finally, we show that it is possible to obtain the global attractors using weaker assumptions on the nonlinear term $f$, however, in that case, the optimal regularity, the finite dimensionality, and the upper-semicontinuity of the global attractors does not necessarily hold.
We analyze gradient flows with jumps generated by a finite set of complete vector fields in involution using some Radon measures $u\\in \\mathcal{U}_a$ as admissible perturbations. Both the evolution of a bounded gradient flow $\\{x^u(t,\\l)\\in B(x^*,3\\g)\\subseteq \\mbn: ,t\\in[0,T],,\\l\\in B(x^*,2\\g)\\}$ and the unique solution $\\l=\\psi^u(t,x)\\in B(x^*,2\\g)\\subseteq \\mbn$ of integral equation $x^u(t,\\l)=x\\in B(x^*,\\g), ,t\\in[0,T]$, are described using the corresponding gradient representation associated with flow and Hamilton-jacobi equations.
In this paper we give some estimates for nonlinear harmonic measures on trees. In particular, we estimate in terms of the size of a set $D$ the value at the origin of the solution to $ u(x)=F((x,0),\\dots,(x,m-1))$ for every $x\\in\\mathbb{T}_m, $ a directed tree with $m$ branches with initial datum $f+\\chi_D$. Here $F$ is an averaging operator on $\\mathbb{R}^m$, $x$ is a vertex of a directed tree $\\mathbb{T}_m$ with regular $m$-branching and $(x,i)$ denotes a successor of that vertex for $0\\le i\\le m-1$.
In this remark, we give another approach to the local well-posedness of quadratic Schr\\\"odinger equation with nonlinearity $u\\bar u$ in $H^{-1/4}$, which was already proved by Kishimoto \\cite{kis}. Our resolution space is $l^1$-analogue of $X^{s,b}$ space with low frequency part in a weaker space $L^{\\infty}_{t}L^2_x$. Such type spaces was developed by Guo. \\cite{G} to deal the KdV endpoint $H^{-3/4}$ regularity.
We consider the problem of identifying sharp criteria under which radial $H^1$ (finite energy) solutions to the focusing 3d cubic nonlinear Schr\\\"odinger equation (NLS) $i\\partial_t u + \\Delta u + |u|^2u=0$ scatter, i.e. approach the solution to a linear Schr\\\"odinger equation as $t\\to \\pm \\infty$. The criteria is expressed in terms of the scale-invariant quantities $\\|u_0\\|_{L^2}\\|\\nabla u_0\\|_{L^2}$ and $M[u]E[u]$, where $u_0$ denotes the initial data, and $M[u]$ and $E[u]$ denote the (conserved in time) mass and energy of the corresponding solution $u(t)$. The focusing NLS possesses a soliton solution $e^{it}Q(x)$, where $Q$ is the ground-state solution to a nonlinear elliptic equation, and we prove that if $M[u]E[u]<M[Q]E[Q]$ and $\\|u_0\\|_{L^2}\\|\\nabla u_0\\|_{L^2} < \\|Q\\|_{L^2}\\|\\nabla Q\\|_{L^2}$, then the solution $u(t)$ is globally well-posed and scatters. This condition is sharp in the sense that the soliton solution $e^{it}Q(x)$, for which equality in these conditions is obtained, is global but does not scatter. We further show that if $M[u]E[u]<M[Q]E[Q]$ and $\\|u_0\\|_{L^2}\\|\\nabla u_0\\|_{L^2} > \\|Q\\|_{L^2}\\|\\nabla Q\\|_{L^2}$, then the solution blows-up in finite time. The technique employed is parallel to that employed by Kenig-Merle \\cite{KM06a} in their study of the energy-critical NLS.
The interaction between a viscous fluid and an elastic solid is modeled by a system of parabolic and hyperbolic equations, coupled to one another along the moving material interface through the continuity of the velocity and traction vectors. We prove the existence and uniqueness (locally in time) of strong solutions in Sobolev spaces for quasilinear elastodynamics coupled to the incompressible Navier-Stokes equations along a moving interface. Unlike our approach for the case of linear elastodynamics, we cannot employ a fixed-point argument on the nonlinear system itself, and are instead forced to regularize it by a particular parabolic artificial viscosity term. We proceed to show that with this specific regularization, we obtain a time interval of existence which is independent of the artificial viscosity; together with a priori estimates, we identify the global solution (in both phases), as well as the interface motion, as a weak limit in srong norms of our sequence of regularized problems.
The aim of this contribution is to make a connection between two recent results concerning the dynamics of vortices in incompressible planar flows. The first one is an asymptotic expansion, in the vanishing viscosity limit, of the solution of the two-dimensional Navier-Stokes equation with point vortices as initial data. In such a situation, it is known (Gallay, 2011) that the solution behaves to leading order like a linear superposition of Oseen vortices whose centers evolve according to the point vortex system, but higher order corrections can also be computed which describe the deformation of the vortex cores due to mutual interactions. The second result is the construction by D. Smets and J. van Schaftingen of \"desingularized\" solutions of the two-dimensional Euler equation. These solutions are stationary in a uniformly rotating or translating frame, and converge either to a single vortex or to a vortex pair as the size parameter $\\epsilon$ goes to zero. We consider here the particular case of a pair of identical vortices, and we show that the solution of the weakly viscous Navier-Stokes equation is accurately described at time $t$ by an approximate steady state of the rotating Euler equation which is a desingularized solution in the sense of Smets and van Schaftingen, with Gaussian profile and size $\\epsilon = \\sqrt{\\nu t}$.
In this paper we prove symmetry results for classical solutions of semilinear cooperative elliptic systems in R^N, or in the exterior of a ball. We consider the case of fully coupled systems and nonlinearities which are either convex or have a convex derivative. The solutions are shown to be foliated Schwarz symmetric if a bound on their Morse index holds. As a consequence of the symmetry results we also obtain some nonexistence theorems.
This paper settles the existence question for a rather general class of convex optimal design problems with a volume constraint. In low dimensions, we prove the existence of an optimal configuration for general convex minimization problems ruled by bounded measurable degenerate elliptic operators. Under a mild continuity assumption on the medium, the free boundary is proven to enjoy the appropriate weak geometry and we establish the existence of an optimal design for general convex optimal design problems with volume constraints for all dimensions.
We deal with the existence of quantitative estimates for solutions of mixed problems to an elliptic second order equation in divergence form with discontinuous coefficient. Our concern is to estimate the solutions with explicit constants, for domains in $\\mathbb{R}^n$ ($n\\geq 2$) of class $C^{0,1}$. The existence of $L^\\infty$ and $W^{1,q}$-estimates is assured for $q=2$ and any $q<n/(n-1)$ (depending on the data), whenever the coefficient is only measurable and bounded. The proof method of the quantitative $L^\\infty$-estimates is based on the DeGiorgi technique developed by Stampacchia. By using the potential theory, we derive $W^{1,p}$-estimates for different ranges of the exponent $p$ depending on that the coefficient is either Dini-continuous or only measurable and bounded. In this process, we establish new existences of Green functions on such domains. The last but not least concern is to unify (whenever possible) the proofs of the estimates to the extreme Dirichlet and Neumann cases of the mixed problem.
In this paper, we intend to present some already known results about the internal controllability of the linear and nonlinear Schr\\\"odinger equation. After presenting the basic properties of the equation, we give a self contained proof of the controllability in dimension 1 using some propagation results. We then discuss how to obtain some similar results on a compact manifold where the zone of control satisfies the Geometric Control Condition. We also discuss some known results and open questions when this condition is not satisfied. Then, we present the links between the controllability and some resolvent estimates. Finally, we discuss the new difficulties when we consider the Nonlinear Schr\\\"odinger equation.
The interface problem for the linear Korteweg-de Vries (KdV) equation in one-dimensional piecewise homogeneous domains is examined by constructing an explicit solution in each domain. The location of the interface is known and a number of compatibility conditions at the boundary are imposed. We provide an explicit characterization of sufficient interface conditions for the construction of a solution using Fokas s Unified Transform Method. The problem and the method considered here extend that of earlier papers to problems with more than two spatial derivatives.
We consider the problem of small data global existence for quasilinear wave equations with null condition on a class of Lorentzian manifolds $(\\mathbb{R}^{3+1}, g)$ with \\textbf{time dependent} inhomogeneous metric. We show that sufficiently small data give rise to a unique global solution for metric which is merely $C^1$ close to the Minkowski metric inside some large cylinder $\\{\\left.(t, x)\\right||x|\\leq R\\}$ and approaches the Minkowski metric weakly as $|x|\\rightarrow \\infty$. Based on this result, we give weak but sufficient conditions on a given large solution of quasilinear wave equations such that the solution is globally stable under perturbations of initial data.
In this paper, we study the relaxed energy for biharmonic maps from a $m$-dimensional domain into spheres. By an approximation method, we prove the existence of a minimizer of the relaxed energy of the Hessian energy, and that the minimizer is biharmonic and smooth outside a singular set $\\Sigma$ of finite $(m-4)$-dimensional Hausdorff measure. Moreover, when $m=5$, we prove that the singular set $\\Sigma$ is 1-rectifiable.
We investigate various boundary decay estimates for $p(\\cdot)$-harmonic functions. For domains in $\\mathbb{R}^n, n\\geq 2$ satisfying the ball condition ($C^{1,1}$-domains) we show the boundary Harnack inequality for $p(\\cdot)$-harmonic functions under the assumption that the variable exponent $p$ is a bounded Lipschitz function. The proof involves barrier functions and chaining arguments. Moreover, we prove a Carleson type estimate for $p(\\cdot)$-harmonic functions in NTA domains in $\\mathbb{R}^n$ and provide lower- and upper- growth estimates and a doubling property for a $p(\\cdot)$-harmonic measure.
We give a mathematical analysis of a concept of metastability induced by incompatibility. The physical setting is a single parent phase, just about to undergo transformation to a product phase of lower energy density. Under certain conditions of incompatibility of the energy wells of this energy density, we show that the parent phase is metastable in a strong sense, namely it is a local minimizer of the free energy in an $L^1$ neighbourhood of its deformation. The reason behind this result is that, due to the incompatibility of the energy wells, a small nucleus of the product phase is necessarily accompanied by a stressed transition layer whose energetic cost exceeds the energy lowering capacity of the nucleus. We define and characterize incompatible sets of matrices, in terms of which the transition layer estimate at the heart of the proof of metastability is expressed. Finally we discuss connections with experiment and place this concept of metastability in the wider context of recent theoretical and experimental research on metastability and hysteresis.
For a complex function $F$ on $\\mathbb C$, we study the associated composition operator $T_{F}(f):=F(f)$ on Wiener amalgam spaces $W^{p,q}(\\mathbb R^d).$ We have shown if $T_{F}$ takes $W^{p,1}(\\mathbb R^{d})$ to $W^{p,q}(\\mathbb R^{d}) (1<p \\leq \\infty, 1\\leq q <2),$ then $F$ is real analytic on $\\mathbb R^{2}.$ On the other hand, we show, the converse is partially true: if we restrict the domain of the $T_{F}$ to be a subclass of $W^{p,1}(\\mathbb R^{d}) (1< p <\\infty)$ which preserves the Fourier transform and $q=1.$ The analogous results hold in the case of modulation spaces.
We consider here operators which are sum of (possibly) fractional derivatives, with (possibly different) order. The main constructive assumption is that the operator is of order~$2$ in one variable. By constructing an explicit barrier, we prove a Lipschitz estimate which controls the oscillation of the solutions in such direction with respect to the oscillation of the nonlinearity in the same direction. As a consequence, we obtain a rigidity result that, roughly speaking, states that if the nonlinearity is independent of a coordinate direction, then so is any global solution (provided that the solution does not grow too much at infinity). A Liouville type result then follows as a byproduct.
We consider a size-structured model for cell division and address the question of determining the division (birth) rate from the measured stable size distribution of the population. We formulate such question as an inverse problem for an integro-differential equation posed on the half line. We develop firstly a regular dependency theory for the solution in terms of the coefficients and, secondly, a novel regularization technique for tackling this inverse problem which takes into account the specific nature of the equation. Our results rely also on generalized relative entropy estimates and related Poincar\\ e inequalities.
In this paper, we study the following semilinear Schr\\\"odinger equation $$ -\\epsilon^2\\triangle u+ u+ V(x)u=f(u),\\ u\\in H^{1}(\\mathbb{R}^{N}), $$ where $N\\geq 2$ and $\\epsilon>0$ is a small parameter. The function $V$ is bounded in $\\mathbb{R}^N$, $\\inf_{\\mathbb{R}^N}(1+V(x))>0$ and it has a possibly degenerate isolated critical point. Under some conditions on $f,$ we prove that as $\\epsilon\\rightarrow 0,$ this equation has a solution which concentrates at the critical point of $V$.}
We consider the subcritical SQG equation in the natural scale invariant Sobolev space and prove the existence of a global attractor of optimal regularity. The proof is based on a new energy estimate in Sobolev spaces to bootstrap the regularity to the optimal level, derived by means of nonlinear lower bounds on the fractional laplacian. This estimate appears to be new in the literature, and allows a sharp use of the subcritical nature of the $L^\\infty$ bounds for this problem. As a byproduct, we obtain attractors for weak solutions as well.
We consider the generalized two-dimensional Zakharov-Kuznetsov equation $u_t+\\partial_x \\Delta u+\\partial_x(u^{k+1})=0$, where $k\\geq3$ is an integer number. For $k\\geq8$ we prove local well-posedness in the $L^2$-based Sobolev spaces $H^s(\\mathbb{R}^2)$, where $s$ is greater than the critical scaling index $s_k=1-2/k$. For $k\\geq 3$ we also establish a sharp criteria to obtain global $H^1(\\R^2)$ solutions. A nonlinear scattering result in $H^1(\\R^2)$ is also established assuming the initial data is small and belongs to a suitable Lebesgue space.
This paper is concerned with the following fractional Schr\\\"odinger equation \\begin{equation*} \\left\\{ \\begin{array}{ll} (-\\Delta)^{s} u+u= k(x)f(u)+h(x) \\mbox{ in } \\mathbb{R}^{N} u\\in H^{s}(\\mathbb{R}^{N}), , u>0 \\mbox{ in } \\mathbb{R}^{N}, \\end{array} \\right. \\end{equation*} where $s\\in (0,1)$, $N> 2s$, $(-\\Delta)^{s}$ is the fractional Laplacian, $k$ is a bounded positive function, $h\\in L^{2}(\\mathbb{R}^{N})$, $h\\not \\equiv 0$ is nonnegative and $f$ is either asymptotically linear or superlinear at infinity. By using the $s$-harmonic extension technique and suitable variational methods, we prove the existence of at least two positive solutions for the problem under consideration, provided that $|h|_{2}$ is sufficiently small.
We study a singular one-dimensional parabolic problem with initial data in the $BV$ space, the energy space, for various boundary data. We pay special attention to Dirichlet conditions, which need not satisfied in a pointwise manner. We study the facet creation process and the extinction of solutions caused by the evolution of facets. Our major tool is the comparison principle provided by the theory of viscosity solutions developed in \\cite{miyory}.
In this paper, we consider a contact problem with adhesion between a viscoelastic body and a rigid support, taking thermal effects into account. The PDE system we deal with is derived within the modelling approach proposed by M. Fremond and, in particular, includes the entropy balance equations, describing the evolution of the temperatures of the body and of the adhesive material. Our main result consists in showing the existence of global in time solutions (to a suitable variational formulation) of the related initial and boundary value problem.
We show that the homogeneous viscous Burgers equation $(\\partial_t-\\eta\\Delta) u(t,x)+(u\\cdot\\nabla)u(t,x)=0,\\ (t,x)\\in{\\mathbb{R}}_+\\times{\\mathbb{R}}^d$ $(d\\ge 1, \\eta>0)$ has a globally defined smooth solution if the initial condition $u_0$ is a smooth function growing like $o(|x|)$ at infinity. The proof relies mostly on estimates of the random characteristic flow defined by a Feynman-Kac representation of the solution. Viscosity independent a priori bounds for the solution are derived from these. The regularity of the solution is then proved for fixed $\\eta>0$ using Schauder estimates. The result extends with few modifications to initial conditions growing abnormally large in regions with small relative volume, separated by well-behaved bulk regions, provided these are stable under the characteristic flow with high probability. We provide a large family of examples for which this loose criterion may be verified by hand.
The Euler-Maxwell system describes the evolution of a plasma when the collisions are important enough that each species is in a hydrodynamic equilibrium. In this paper we prove global existence of small solutions to this system set in the whole three-dimensional space, by combining the space-time resonance method, dispersive estimates, localization estimates and energy estimates. An important novelty is that we can prove a very slow growth of high derivatives even with a nonintegrable decay by reiterating the energy estimate.
For a general class of elliptic PDE s in mean field form on compact Riemann surfaces with exponential nonlinearity, we address the question of the existence of solutions with concentrated nonlinear term, which, in view of the applications, are physically of definite interest. In the model, we also include the possible presence of singular sources in the form of Dirac masses, which makes the problem more degenerate and difficult to attack.
We introduce a periodic two-dimensional $\\mu$-$b$-equation and a periodic two-dimensional two-component $(\\mu)$-Camassa-Holm equation which we study as geodesic flows on the diffeomorphism group of the torus and a semidirect product respectively. The paper explains the derivation of these equations within V.I. Arnold s (1966) general framework, some analogies to recently discussed related equations and gives a self-contained presentation of the geometric aspects. As an application, we obtain well-posedness results and some explicit curvature computations.
We review some geometrical properties of models of moment closures of gas-kinetic equations, and consider a transport-projection splitting scheme for construction of solutions of such closures. The scheme, formulated in terms of a dual kinetic density, defines the kinetic density in successive superposition of transport in $x$--direction and projection to a finite dimensional linear space in a weighted $L^2$ space, in the kinetic variable $v.$ Given smooth initial data, we show that the approximate solutions converge to a unique classical solution of a system of moment closure PDEs.
In this note, using the ideas from our recent article \\cite{EM}, we prove strong ill-posedness for the 2D Euler equations in $C^k$ spaces. This note provides a significantly shorter proof of many of the main results in \\cite{BLi2}. In the case $k>1$ we show the existence of initial data for which the $kth$ derivative of the velocity field develops a logarithmic singularity immediately. The strong ill-posedness covers $C^{k-1,1}$ spaces as well. The ill-posedness comes from the pressure term in the Euler equation. We formulate the equation for $D^k u$ as: $$\\partial_t D^k u=D^{k+1} p + l.o.t.$$ and then use the non-locality of the map $u\\rightarrow p$ to get the ill-posedness. The real difficulty comes in how to deal with the \"l.o.t.\" terms which can be handled by special commutator estimates.
We study the long-time asymptotics for the so-called McKendrick-Von Foerster or renewal equation, a simple model frequently considered in structured population dynamics. In contrast to previous works, we can admit a bounded measure as initial data. To this end, we apply techniques from the calculus of variations that have not been employed previously in this context. We demonstrate how the generalized relative entropy method can be refined in the Radon measure framework.
Let $({M},\\textsf{d},\\textsf{m})$ be a metric measure space which satisfies the Lott-Sturm-Villani curvature-dimension condition $\\textsf{CD}(K,n)$ for some $K\\geq 0$ and $n\\geq 2$, and a lower $n-$density assumption at some point of $M$. We prove that if $({M},\\textsf{d},\\textsf{m})$ supports the Gagliardo-Nirenberg inequality or any of its limit cases ($L^p-$logarithmic Sobolev inequality or Faber-Krahn-type inequality), then a global non-collapsing $n-$dimensional volume growth holds, i.e., there exists a universal constant $C_0>0$ such that $\\textsf{m}( B_x(\\rho))\\geq C_0 \\rho^n$ for all $x\\in {M}$ and $\\rho\\geq 0,$ where $B_x(\\rho)=\\{y\\in M:{\\sf d}(x,y)<\\rho\\}$. Due to the quantitative character of the volume growth estimate, we establish several rigidity results on Riemannian manifolds with non-negative Ricci curvature supporting Gagliardo-Nirenberg inequalities by exploring a quantitative Perelman-type homotopy construction developed by Munn (J. Geom. Anal., 2010). Further rigidity results are also presented on some reversible Finsler manifolds.
A chemotaxis system possibly containing rotational components of the cross-diffusive flux is studied under no-flux boundary conditions in a bounded domain $\\Omega\\subset R^n$, $n\\ge 1$, with smooth boundary, where the evolution of the signal is determined by consumption through cells. In contrast to related Keller-Segel-type problems with scalar sensitivities, in presence of such tensor-valued sensitivities this system in general apparently does not possess any useful gradient-like structure. Accordingly, its analysis needs to be based on new types of a priori bounds. Using a spatio-temporal $L^2$ estimate for the gradient of the logarithm of the cell density as a starting point, we derive a series of compactness properties of solutions to suitably regularized versions of the system. Motivated by these, we develop a generalized solution concept which requires solutions to satisfy very mild regularity hypotheses only. On the basis of the above compactness properties, it is finally shown that within this framework, under a mild growth assumption on the sensitivity matrix and for all sufficiently regular nonnegative initial data, the corresponding initial-boundary value problem possesses at least one global generalized solution. This extends known results which in the case of such general matrix-valued sensitivities provide statements on global existence only in the two-dimensional setting and under the additional restriction that the initial signal concentration be suitably small.
This work aims at providing a mathematical and numerical framework for the analysis on the effects of pulsed electric fields on biological media. Biological tissues and cell suspensions are described as having a heteregeneous permittivity and a heteregeneous conductivity. Well-posedness of the model problem and the regularity of its solution are established. A fully discrete finite element scheme is proposed for the numerical approximation of the potential distribution as a function of time and space simultaneously for an arbitrary shaped pulse, and it is demonstrated to enjoy the optimal convergence order in both space and time. The proposed numerical scheme has potential applications in the fields of medicine, food sciences, and biotechnology.
In this article we determine bounds on the maximal order of vanishing for eigenfunctions of a generalized Dirichlet-to-Neumann map (which is associated with fractional Schr\\\"odinger equations) on a compact, smooth Riemannian manifold, $(M,g)$, without boundary. Moreover, with only slight modifications these results generalize to equations with $C^1$ potentials. Here Carleman estimates are a key tool. These yield a quantitative three balls inequality which implies quantitative bulk and boundary doubling estimates and hence leads to the control of the maximal order of vanishing. Using the boundary doubling property, we prove upper bounds on the $\\mathcal{H}^{n-1}$-measure of nodal domains of eigenfunctions of the generalized Dirichlet-to-Neumann map on analytic manifolds.
Considering initial data in $\\dot{H}^s$, with $\\frac{1}{2} \\textless{} s \\textless{} \\frac{3}{2}$, this paper is devoted to the study of possible blowing-up Navier-Stokes solutions such that $(T*(u\\_{0}) -t)^{\\frac{1}{2} (s- \\frac{1}{2})} ,, \\| u \\|\\_{\\dot{H}^s}}$ is bounded. Our result is in the spirit of the tremendous works of L. Escauriaza, G. Seregin, and V. $\\breve{\\mathrm{S}}$ver$\\acute{\\mathrm{a}}$k and I. Gallagher, G. Koch, F. Planchon, where they proved there is no blowing-up solution which remain bounded in $L^3(R^3)$. The main idea is that if such blowing-up solutions exist, they satisfy critical properties.
Several results about positive solutions -in a Lipschitz domain- of a nonlinear elliptic equation in a general form $ \\Delta u(x)-g(x,u(x))=0$ are proved, extending thus some known facts in the case of $ g(x,t)=t^q$, $q>1$, and a smooth domain. Our results include a characterization -in terms of a natural capacity- of a (conditional) removability property, a characterization of moderate solutions and of their boundary trace and a property relating arbitrary positive solutions to moderate solutions. The proofs combine techniques of non-linear p.d.e.\\ with potential theoretic methods with respect to linear Schr\\\"odinger equations. A general result describing the measures that are diffuse with respect to certain capacities is also established and used. The appendix by the first author provides classes of functions $g$ such that the nonnegative solutions of $ \\Delta u-g(.,u)=0$ has some \"good\" properties which appear in the paper.
We consider inverse boundary value problems for the Navier-Stokes equations and the isotropic Lam\\ e system in two dimensions. The uniqueness without any smallness assumptions on unknown coefficients, which is called global uniqueness, was longstanding open problems for the Navier-Stokes equations and the isotropic Lam\\ e system in two dimensions. We prove the global uniqueness for both inverse boundary value problems. Our methodology are common for both systems and the key is the construction of complex geometric optics solutions after decoupling the systems into weakly coupling systems.
A mechanism deriving new well-posed evolutionary equations from given ones is inspected. It turns out that there is one particular spatial operator from which many of the standard evolutionary problems of mathematical physics can be generated by this abstract mechanism using suitable projections. The complexity of the dynamics of the phenomena considered can be described in terms of suitable material laws. The idea is illustrated with a number of concrete examples.
In this paper, we study the multiplicity and concentration of the positive solutions to the following critical Kirchhoff type problem: \\begin{equation*} -\\left(\\varepsilon^2 a+\\varepsilon b\\int_{\\R^3}|\\nabla u|^2\\mathrm{d} x\\right)\\Delta u + V(x) u = f(u)+u^5\\ \\ {\\rm in } \\ \\ \\R^3, \\end{equation*} where $\\varepsilon$ is a small positive parameter, $a$, $b$ are positive constants, $V \\in C(\\mathbb{R}^3)$ is a positive potential, $f \\in C^1(\\R^+, \\R)$ is a subcritical nonlinear term, $u^5$ is a pure critical nonlinearity. When $\\varepsilon>0$ small, we establish the relationship between the number of positive solutions and the profile of the potential $V$. The exponential decay at infinity of the solution is also obtained. In particular, we show that each solution concentrates around a local strict minima of $V$ as $\\varepsilon \\rightarrow 0$.
We prove the nonexistence of local self-similar solutions of the three dimensional incompressible Navier-Stokes equations. The local self-similar solutions we consider here are different from the global self-similar solutions. The self-similar scaling is only valid in an inner core region which shrinks to a point dynamically as the time, $t$, approaches the singularity time, $T$. The solution outside the inner core region is assumed to be regular. Under the assumption that the local self-similar velocity profile converges to a limiting profile as $t \\to T$ in $L^p$ for some $p \\in (3,\\infty)$, we prove that such local self-similar blow-up is not possible for any finite time.
Relying on recent advances in the theory of entropy solutions for nonlinear (strongly) degenerate parabolic equations, we present a direct proof of an L^1 error estimate for viscous approximate solutions of the initial value problem for \\partial_t w+\\mathrm{div} \\bigl(V(x)f(w)\\bigr)= \\Delta A(w) where V=V(x) is a vector field, f=f(u) is a scalar function, and A (.) \\geq 0. The viscous approximate solutions are weak solutions of the initial value problem for the uniformly parabolic equation \\partial_t w^{\\epsilon}+\\mathrm{div} \\bigl(V(x) f(w^{\\epsilon})\\bigr) \\Delta \\bigl(A(w^{\\epsilon})+\\epsilon w^{\\epsilon}\\bigr), \\epsilon>0. The error estimate is of order \\sqrt{\\epsilon}.
The quasi-geostrophic equation or the Euler equation with dissipation studied in the present paper is a simplified form of the atmospheric circulation model introduced by Charney and DeVore [J. Atmos. Sci. 36(1979), 1205-1216] on the existence of multiple steady states to the understanding of the persistence of atmospheric blocking. The fluid motion defined by the equation is driven by a zonal thermal forcing and an Ekman friction forcing measured by $\\kappa>0$. It is proved that the steady-state solution is unique for $\\kappa >1$ while multiple steady-state solutions exist for $\\kappa<\\kappa_{crit}$ with respect to critical value $\\kappa_{crit}<1$. Without involvement of viscosity, the equation has strong nonlinearity as its nonlinear part contains the highest order derivative term. Steady-state bifurcation analysis is essentially based on the compactness, which can be simply obtained for semi-linear equations such as the Navier-Stokes equations but is not available for the quasi-geostrophic equation in the Euler formulation. Therefore the Lagrangian formulation of the equation is employed to gain the required compactness.
Of concern is the motion of two fluids separated by a free interface in a porous medium, where the velocities are given by Darcy s law. We consider the case with and without phase transition. It is shown that the resulting models can be understood as purely geometric evolution laws, where the motion of the separating interface depends in a non-local way on the mean curvature. It turns out that the models are volume preserving and surface area reducing, the latter property giving rise to a Lyapunov function. We show well-posedness of the models, characterize all equilibria, and study the dynamic stability of the equilibria. Lastly, we show that solutions which do not develop singularities exist globally and converge exponentially fast to an equilibrium.
We establish existence and uniqueness of solution for the homogeneous Dirichlet problem associated to a fairly general class of elliptic equations modeled by $$ -\\Delta u= h(u){f} \\ \\ \\text{in},\\ \\Omega, $$ where $f$ is an irregular datum, possibly a measure, and $h$ is a continuous function that may blow up at zero. We also provide regularity results on both the solution and the lower order term depending on the regularity of the data, and we discuss their optimality.
We deal with the first eigenvalue for a system of two $p-$Laplacians with Dirichlet and Neumann boundary conditions. If $\\Delta_{p}w=\\mbox{div}(|\\nabla w|^{p-2}w)$ stands for the $p-$Laplacian and $\\frac{\\alpha}{p}+\\frac{\\beta}{q}=1,$ we consider $$ \\begin{cases} -\\Delta_pu= \\lambda \\alpha |u|^{\\alpha-2} u|v|^{\\beta} &\\text{ in }\\Omega,\\\\ -\\Delta_q v= \\lambda \\beta |u|^{\\alpha}|v|^{\\beta-2}v &\\text{ in }\\Omega,\\\\ \\end{cases} $$ with mixed boundary conditions $$ u=0, \\qquad |\\nabla v|^{q-2}\\dfrac{\\partial v}{\\partial \\nu }=0, \\qquad \\text{on }\\partial \\Omega. $$ We show that there is a first non trivial eigenvalue that can be characterized by the variational minimization problem $$ \\lambda_{p,q}^{\\alpha,\\beta} = \\min \\left\\{\\dfrac{\\displaystyle\\int_{\\Omega}\\dfrac{|\\nabla u|^p}{p}, dx +\\int_{\\Omega}\\dfrac{|\\nabla v|^q}{q}, dx} {\\displaystyle\\int_{\\Omega} |u|^\\alpha|v|^{\\beta}, dx} \\colon (u,v)\\in \\mathcal{A}_{p,q}^{\\alpha,\\beta}\\right\\}, $$ where $$ \\mathcal{A}_{p,q}^{\\alpha,\\beta}=\\left\\{(u,v)\\in W^{1,p}_0(\\Omega)\\times W^{1,q}(\\Omega)\\colon uv\\not\\equiv0\\text{ and }\\int_{\\Omega}|u|^{\\alpha}|v|^{\\beta-2}v , dx=0\\right\\}. $$ We also study the limit of $\\lambda_{p,q}^{\\alpha,\\beta} $ as $p,q\\to \\infty$ assuming that $\\frac{\\alpha}{p} \\to \\Gamma \\in (0,1)$, and $ \\frac{q}{p} \\to Q \\in (0,\\infty)$ as $p,q\\to \\infty.$ We find that this limit problem interpolates between the pure Dirichlet and Neumann cases for a single equation when we take $Q=1$ and the limits $\\Gamma \\to 1$ and $\\Gamma \\to 0$.
We formulate a Stefan problem on an evolving hypersurface and study the well-posedness of weak solutions given $L^1$ data. To do this, we first develop function spaces and results to handle equations on evolving surfaces in order to give a natural treatment of the problem. Then we consider the existence of solutions for $L^\\infty$ data; this is done by regularisation of the nonlinearity. The regularised problem is solved by a fixed point theorem and then uniform estimates are obtained in order to pass to the limit. By using a duality method we show continuous dependence which allows us to extend the results to $L^1$ data.
We prove a weak comparison principle in narrow unbounded domains for solutions to $-\\Delta_p u=f(u)$ in the case $2<p< 3$ and $f(\\cdot)$ is a power-type nonlinearity, or in the case $p>2$ and $f(\\cdot)$ is super-linear. We exploit it to prove the monotonicity of positive solutions to $-\\Delta_p u=f(u)$ in half spaces (with zero Dirichlet assumption) and therefore to prove some Liouville-type theorems.
We consider the Einstein/Yang-Mills equations in $3+1$ space time dimensions with $\\SU(2)$ gauge group and prove rigorously the existence of a globally defined smooth static solution. We show that the associated Einstein metric is asymptotically flat and the total mass is finite. Thus, for non-abelian gauge fields the Yang/Mills repulsive force can balance the gravitational attractive force and prevent the formation of singularities in spacetime.
For smooth domains, Liu et al. (Comm. Pure Appl. Math. 60: 1443-1487, 2007) used optimal estimates for the commutator of the Laplacian and the Leray projection operator to establish well-posedness of an extended Navier-Stokes dynamics. In their work, the pressure is not determined by incompressibility, but rather by a certain formula involving the Laplace-Leray commutator. A key estimate of Liu et al. controls the commutator strictly by the Laplacian in energy norm at leading order. In this paper we show that this strict control fails in a large family of bounded planar domains with corners. However, when the domain is an infinite cone, we find that strict control may be recovered in certain power-law weighted norms.
We investigate the long term behavior for a class of competition-diffusion systems of Lotka-Volterra type for two competing species in the case of low regularity assumptions on the data. Due to the coupling that we consider the system cannot be reduced to a single equation yielding uniform estimates with respect to the inter-specific competition rate parameter. Moreover, in the particular but meaningful case of initial data with disjoint support and Dirichlet boundary data which are time-independent, we prove that as the competition rate goes to infinity the solution converges, along with suitable sequences, to a spatially segregated state satisfying some variational inequalities.
Ultrasound modulated optical tomography, also called acousto-optics tomography, is a hybrid imaging modality that aims to combine the high contrast of optical waves with the high resolution of ultrasound. We follow the model of the influence of ultrasound modulation on the light intensity measurements developed in [Bal Schotland PRL 2010]. We present sufficient conditions ensuring that the absorption and diffusion coefficients modeling light propagation can locally be uniquely and stably reconstructed from the corresponding available information. We present an iterative procedure to solve such a problem based on the analysis of linear elliptic systems of redundant partial differential equations.
We consider the aggregation equation $\\rho_{t}-\\nabla\\cdot(\\rho\\nabla K\\ast\\rho) =0$ in $\\mathbb{R}^{n}$, where the interaction potential $K$ incorporates short-range Newtonian repulsion and long-range power-law attraction. We study the global well-posedness of solutions and investigate analytically and numerically the equilibrium solutions. We show that there exist unique equilibria supported on a ball of $\\mathbb{R}^n$. By using the method of moving planes we prove that such equilibria are radially symmetric and monotone in the radial coordinate. We perform asymptotic studies for the limiting cases when the exponent of the power-law attraction approaches infinity and a Newtonian singularity, respectively. Numerical simulations suggest that equilibria studied here are global attractors for the dynamics of the aggregation model.
We study the following boundary value problem with a concave-convex nonlinearity: \\begin{equation*} \\left\\{ \\begin{array}{r c l l} -\\Delta_p u & = & \\Lambda,u^{q-1}+ u^{r-1} & \\textrm{in }\\Omega, \\\\ u & = & 0 & \\textrm{on }\\partial\\Omega. \\end{array}\\right. \\end{equation*} Here $\\Omega \\subset \\mathbb{R}^n$ is a bounded domain and $1<q<p<r<p^*$. It is well known that there exists a number $\\Lambda_{q,r}>0$ such that the problem admits at least two positive solutions for $0<\\Lambda<\\Lambda_{q,r}$, at least one positive solution for $\\Lambda=\\Lambda_{q,r}$, and no positive solution for $\\Lambda > \\Lambda_{q,r}$. We show that \\[ \\lim_{q \\to p} \\Lambda_{q,r} = \\lambda_1(p), \\] where $\\lambda_1(p)$ is the first eigenvalue of the p-laplacian. It is worth noticing that $\\lambda_1(p)$ is the threshold for existence/nonexistence of positive solutions to the above problem in the limit case $q=p$.
Our research is directed to a quasi-static evolution of the thermo-visco-elastic model. We assume that the material is subject to two kinds of mechanical deformations: elastic and inelastic. Moreover, our analysis captures the influence of the temperature on the visco-elastic properties of the body. The novelty of the paper is the consideration of the thermodynamically complete model to describe this kind of phenomena related with a hardening rule of Norton-Hoff type. We provide the proof of existence of solutions to thermo-visco-elastic model in a simplified setting, namely the thermal expansion effects are neglected. Consequently, the coupling between the temperature and the displacement occurs only in the constitutive function for the evolution of the visco-elastic strain.
In this paper, the semilinear elliptic systems with Dirichlet boundary value are considered \\begin{align} \\left\\{\\begin{array}{ll} -\\Delta v=f(u) & \\mathrm{in}\\ \\Omega, -\\Delta u=g(v) & \\mathrm{in}\\ \\Omega, u=0, \\ v=0 & \\mathrm{on}\\ \\partial\\Omega, \\end{array} \\right. \\end{align} We extend the notion of subcritical growth from polynomial growth to N-function growth. Under N-function growth, nontrivial solutions are obtained via Orlicz-Sobolev spaces and variational methods. It s also noteworthy that the nonlinear term $g(v)$ does not have to satisfy the usual Ambrosetti-Rabinowitz condition. So, in a sense, we enrich recent results of D. ~G. de Figueiredo, J. ~M. do {\\ O} and B. ~Ruf [D. ~G. de Figueiredo, J.M. do {\\ O}, B. ~Ruf, An {O}rlicz-space approach to superlinear elliptic systems, J. Funct. Anal. 224 (2005) 471--496].
We investigate existence and stability of viscoelastic shock profiles for a class of planar models including the incompressible shear case studied by Antman and Malek-Madani. We establish that the resulting equations fall into the class of symmetrizable hyperbolic--parabolic systems, hence spectral stability implies linearized and nonlinear stability with sharp rates of decay. The new contributions are treatment of the compressible case, formulation of a rigorous nonlinear stability theory, including verification of stability of small-amplitude Lax shocks, and the systematic incorporation in our investigations of numerical Evans function computations determining stability of large-amplitude and or nonclassical type shock profiles.
We prove the existence of global solutions to the energy-supercritical wave equation in R^{3+1} u_{tt}-\\Delta u + |u|^N u = 0, u(0) = u_0, u_t(0) = u_1, 4<N<\\infty, for a large class of radially symmetric finite-energy initial data. Functions in this class are characterized as being outgoing under the linear flow --- for a specific meaning of \"outgoing\" defined below. In particular, we construct global solutions for initial data with large (even infinite) critical Sobolev norm and large critical Lebesgue norm.
We study positive solutions of equation (E) $-\\Delta u + u^p|\\nabla u|^q= 0$ ($0<p$, $0\\leq q\\leq 2$, $p+q>1$) and other related equations in a smooth bounded domain $\\Omega \\subset {\\mathbb R}^N$. We show that if $N(p+q-1)<p+1$ then, for every positive, finite Borel measure $\\mu$ on $\\partial \\Omega$, there exists a solution of (E) such that $u=\\mu$ on $\\partial \\Omega$. Furthermore, if $N(p+q-1)\\geq p+1$ then an isolated point singularity on $\\partial \\Omega$ is removable. In particular there is no solution with boundary data $\\delta_y$ (=Dirac measure at a point $y\\in \\partial \\Omega$). Finally we obtain a classification of positive solutions with an isolated boundary singularity.
The two-dimensional anisotropic Kuramoto-Sivashinsky equation is a forth-order nonlinear evolution equation in two spatial dimensions that arises in sputter erosion and epitaxial growth on vicinal surfaces. A generalization of this equation is proposed and studied via group analysis methods. The complete group classification of this generalized Kuramoto-Sivashinsky equation is carried out, it is classified according to the property of the self-adjointness and the corresponding conservation laws are established.
We study the existence, uniqueness and regularity of solutions of the equation $f_t = \\Delta_p f = \\text{div} (|Df|^{p-2} Df)$ under over-determined boundary conditions $f = 0$ and $|Df| = 1$. We show that if the initial data is concave and Lipschitz with a bounded and convex support, then the problem admits a unique solution which exists until it vanishes identically. Furthermore, the free-boundary of the support of $f$ is smooth for all positive time.
The famous Fisher-KPP reaction-diffusion model combines linear diffusion with the typical KPP reaction term, and appears in a number of relevant applications in biology and chemistry. It is remarkable as a mathematical model since it possesses a family of travelling waves that describe the asymptotic behaviour of a large class solutions $0\\le u(x,t)\\le 1$ of the problem posed in the real line. The existence of propagation waves with finite speed has been confirmed in some related models and disproved in others. We investigate here the corresponding theory when the linear diffusion is replaced by the \"slow\" doubly nonlinear diffusion and we find travelling waves that represent the wave propagation of more general solutions even when we extend the study to several space dimensions. A similar study is performed in the critical case that we call \"pseudo-linear\", i.e., when the operator is still nonlinear but has homogeneity one. With respect to the classical model and the \"pseudo-linear\" case, the \"slow\" travelling waves exhibit free boundaries.
Transient Elastography enables detection and characterization of tissue abnormalities. In this paper we assume that the displacements are modeled by linear isotropic elasticity system and the tissue displacement has been obtained by the first step in hybrid methods. Then we reconstruct the Lam\\ e parameters of this system from knowledge of tissue displacement. We show that for a sufficiently large number of solutions of the elasticity system and for an open set of the well-chosen boundary conditions, $(\\lambda,\\mu)$ can be uniquely and stably reconstructed. The set of well-chosen boundary conditions is characterized in terms of appropriate complex geometrical optics solutions.
We study the following convex-concave type problem with sign changing nonlinearity \\begin{equation*} M\\left(\\int_\\Omega|(-\\Delta)^{\\frac{1}{4}}u|^2dx\\right)(-\\Delta)^{\\frac{1}{2}} u= \\lambda f(x)|u|^{q-2}u+|u|^2u\\;, \\text{in}, \\Omega,\\;u=0\\;\\textrm{in}\\;\\mathbb R^2\\setminus \\Omega, \\end{equation*} where $M(t)=a+\\epsilon t$, $a, \\epsilon>0$, $\\Omega\\subset \\mathbb R^2$ is open bounded domain with smooth boundary, $1<q<2$, $f\\in L^\\frac{4}{4-q}(\\Omega)$ is sign changing and $\\lambda$ is a positive parameter. Using the idea of Nehari manifold technique, we prove the existence of atleast two solutions for sufficiently small choice of $\\epsilon$.
This expository article is intended to give an overview about recently achieved results on asymptotic properties of solutions to the Cauchy problem $u_{tt}-\\Delta u+b(t)u_t =0,\\qquad u(0,\\cdot)=u_1,\\quad \\mathrm{D}_tu(0,\\cdot)=u_2$ for a wave equation with time-dependent dissipation term. The results are based on structural properties of the Fourier multipliers representing its solution. The article explains the general philosophy behind the approach.
A novel representation is developed as a measure for multilinear fractional embedding. Corresponding extensions are given for the Bourgain-Brezis-Mironescu theorem and Pitt s inequality. New results are obtained for diagonal trace restriction on submanifolds as an application of the Hardy-Littlewood-Sobolev inequality. Smoothing estimates are used to provide new structural understanding for density functional theory, the Coulomb interaction energy and quantum mechanics of phase space. Intriguing connections are drawn that illustrate interplay among classical inequalities in Fourier analysis.
We consider the semilinear heat equation \\begin{equation}\\label{problemAbstract}\\left\\{\\begin{array}{ll}v_t-\\Delta v= |v|^{p-1}v & \\mbox{in}\\Omega\\times (0,T)\\\\ v=0 & \\mbox{on}\\partial \\Omega\\times (0,T)\\\\ v(0)=v_0 & \\mbox{in}\\Omega \\end{array}\\right.\\tag{$\\mathcal P_p$} \\end{equation} where $p>1$, $\\Omega$ is a smooth bounded domain of $\\mathbb R^2$, $T\\in (0,+\\infty]$ and $v_0$ belongs to a suitable space. We give general conditions for a family $u_p$ of sign-changing stationary solutions of \\eqref{problemAbstract}, under which the solution of \\eqref{problemAbstract} with initial value $v_0=\\lambda u_p$ blows up in finite time if $|\\lambda-1|>0$ is sufficiently small and $p$ is sufficiently large. Since for $\\lambda=1$ the solution is global, this shows that, in general, the set of the initial conditions for which the solution is global is not star-shaped with respect to the origin. In previous paper by Dickstein, Pacella and Sciunzi this phenomenon has already been observed in the case when the domain is a ball and the sign changing stationary solution is radially symmetric. Our conditions are more general and we provide examples of stationary solutions $u_p$ which are not radial and exhibit the same behavior.
Little is known about global existence of large-variation solutions to Cauchy problems for systems of conservation laws in one space dimension. Besides results for $L^\\infty$ data via compensated compactness, the existence of global BV solutions for arbitrary BV data remains an outstanding open problem. In particular, it is not known if isentropic gas dynamics admits an a priori variation bound which applies to all BV data. In a few cases such results are available: scalar equations, Temple class systems, $2\\times 2$-systems satisfying Bakhvalov s condition, and, in particular, isothermal gas dynamics. In each of these cases the equations admit a TVD (Total Variation Diminishing) field: a scalar function defined on state space whose spatial variation along entropic solutions does not increase in time. In this paper we consider strictly hyperbolic $2\\times 2$-systems and derive a representation result for scalar fields that are TVD across all pairwise wave interactions, when the latter are resolved as in the Glimm scheme. We then use this to show that isentropic gas dynamics with a $\\gamma$-law pressure function does not admit any nontrivial TVD field of this type.
In this paper, we study the Cauchy problem for a two-component higher order Camassa-Holm systems with fractional inertia operator $A=(1-\\partial_x^2)^r,r\\geq1$, which was proposed by Escher and Lyons. By the transport equation theory and Littlewood-Paley decomposition, we obtain that the local well-posedness of solutions for the system in nonhomogeneous Besov spaces $B^s_{p,q}\\times B^{s-2r+1}_{p,q}$ with $1\\leq p,q \\leq +\\infty$ and the Besov index $s>\\max\\left\\{2r +\\frac{1}{p},2r+1-\\frac{1}{p}\\right\\}$. Moreover, we construct the local well-posedness in the critical Besov space $B^{2r+\\frac{1}{2}}_{2,1}\\times B^{\\frac{3}{2}}_{2,1}$. On the other hand, the propagation behaviour of compactly supported solutions is examined, namely whether solutions which are initially compactly supported will retain this property throughout their time of evolution. Moreover, we also establish the persistence properties of the solutions to the two-component Camassa-Holm equation with $r=1$ in weighted $L_{\\phi}^p:=L^p(\\mathbb{R},\\phi^p(x)dx)$ spaces for a large class of moderate weights.
In this paper, we consider a complex fluid modeling nematic liquid crystal flows, which is described by a system coupling Navier-Stokes equations with a parabolic Q-tensor system. We first prove the global existence of weak solutions in dimension three. Furthermore, the global well-posedness of strong solutions is studied with sufficiently large viscosity of fluid. Finally, we show a continuous dependence result on the initial data which directly yields the weak-strong uniqueness of solutions.
We present a novel methodology for the numerical solution of problems of diffraction by infinitely thin screens in three dimensional space. Our approach relies on new integral formulations as well as associated high-order quadrature rules. The new integral formulations involve weighted versions of the classical integral operators associated with the thin-screen Dirichlet and Neumann problems as well as a generalization to the open surface problem of the classical Calderon formulae. The high-order quadrature rules we introduce for these operators, in turn, resolve the multiple Green function and edge singularities (which occur at arbitrarily close distances from each other, and which include weakly singular as well as hypersingular kernels) and thus give rise to super-algebraically fast convergence as the discretization sizes are increased. When used in conjunction with Krylov-subspace linear algebra solvers such as GMRES, the resulting solvers produce results of high accuracy in small numbers of iterations for low and high frequencies alike. We demonstrate our methodology with a variety of numerical results for screen and aperture problems at high frequencies---including simulation of classical experiments such as the diffraction by a circular disc (including observation of the famous Poisson spot), interference fringes resulting from diffraction across two nearby circular apertures, as well as more complex geometries consisting of multiple scatterers and cavities.
In this paper, the boundedness properties of commutators generated by $b$ and intrinsic square functions in the endpoint case are discussed, where $b\\in BMO(\\mathbb R^n)$. We first establish the weighted weak $L\\log L$-type estimates for these commutator operators. Furthermore, we will prove endpoint estimates of commutators generated by $BMO(\\mathbb R^n)$functions and intrinsic square functions in the weighted Morrey spaces $L^{1,\\kappa}(w)$ for $0<\\kappa<1$ and $w\\in A_1$, and in the generalized Morrey spaces $L^{1,\\Theta}$, where $\\Theta$ is a growth function on $(0,+\\infty)$ satisfying the doubling condition.
Fractional kinetic equations are investigated in order to describe the various phenomena governed by anomalous reaction in dynamical systems with chaotic motion. Many authors have provided solutions for various families of fractional kinetic equations involving special functions. Here, in this paper, we aim at presenting solutions of certain general families of fractional kinetic equations associated with the generalized modified $k$-Bessel function of the first kind. It is also pointed out that the main results presented here are general enough to be able to be specialized to yield many known and (presumably) new solutions for fractional kinetic equations.
Let $\\mathcal{L}(x,a)$ be defined on $\\left( -1,\\infty \\right) \\times \\left( 4/15,\\infty \\right) $ or $\\left( 0,\\infty \\right) \\times \\left( 1/15,\\infty \\right) $ by the formula% \\begin{equation*} \\mathcal{L}(x,a)=\\tfrac{1}{90a^{2}+2}\\ln \\left( x^{2}+x+\\tfrac{3a+1}{3}% \\right) +\\tfrac{45a^{2}}{90a^{2}+2}\\ln \\left( x^{2}+x+\\allowbreak \\tfrac{% 15a-1}{45a}\\right) . \\end{equation*} We investigate the monotonicity and convexity of the function $x\\rightarrow F_{a}\\left( x\\right) =\\psi \\left( x+1\\right) -\\mathcal{L}(x,a)$, where $\\psi $ denotes the Psi function. And, we determine the best parameter $a$ such that the inequality $\\psi \\left( x+1\\right) <\\left( >\\right) \\mathcal{L}% (x,a) $ holds for $x\\in \\left( -1,\\infty \\right) $ or $\\left( 0,\\infty \\right) $, and then, some new and very high accurate sharp bounds for pis function and harmonic numbers are presented. As applications, we construct a sequence $\\left( l_{n}\\left( a\\right) \\right) $ defined by $l_{n}\\left( a\\right) =H_{n}-\\mathcal{L}\\left( n,a\\right) $, which gives extremely accurate values for $\\gamma $.
We consider the most general class of linear boundary-value problems for ordinary differential systems, of order $r\\geq1$, whose solutions belong to the complex space $C^{(n+r)}$, with $0\\leq n\\in\\mathbb{Z}$. The boundary conditions can contain derivatives of order $l$, with $r\\leq l\\leq n+r$, of the solutions. We obtain a constructive criterion under which the solutions to these problems are continuous with respect to the parameter in the normed space $C^{(n+r)}$. We also obtain a two-sided estimate for the degree of convergence of these solutions.
We study least deviation of logarithmic derivatives of real-valued polynomials with a fixed root from zero on the segment $[-1;1]$ in the uniform norm with the weight $\\sqrt{1-x^2}$ and without it. Basing on results of Komarov and Novak and on a certain determinant identity due to Borchardt, we also establish a criterion for best uniform approximation of continuous real-valued functions by logarithmic derivatives in terms of a Chebyshev alternance.
The paper concerns a class of $n$-dimensional non-autonomous delay differential equations obtained by adding a non-monotone delayed perturbation to a linear homogeneous cooperative system of ordinary differential equations. This family covers a wide set of models used in structured population dynamics. By exploiting the stability and the monotone character of the linear ODE, we establish sufficient conditions for both the extinction of all the populations and the permanence of the system. In the case of DDEs with autonomous coefficients (but possible time-varying delays), sharp results are obtained, even in the case of a reducible community matrix. As a sub-product, our results improve some criteria for autonomous systems published in recent literature. As an important illustration, the extinction, persistence and permanence of a non-autonomous Nicholson system with patch structure and multiple time dependent delays are analysed.
Let f(x) be a differentiable function on the real line R, and let P be a point not on the graph of f(x). Define the illumination index of P to be the number of distinct tangents to the graph of f which pass thru P. We prove that if f    is continuous and nonnegative on R, f    > m >0 outside a closed interval of R, and f    has finitely many zeroes on R, then every point below the graph of f has illumination index 2. This result fails in general if f    is not bounded away from 0 on R. Also, if f    has finitely many zeroes and f    is not nonnnegative on R, then some point below the graph has illumination index not equal to 2. Finally, we generalize our results to illumination by odd order Taylor polynomials.
The bilinear estimtate in proposition 7.15 [J. Bourgain, Fourier restriction phenomena for certain lattice subsets and applications to nonlinear evolution equations, Parts II, Geometric Funct. Anal. 3(3) (1993) 209-262.] plays an essential role in the study of the nonlinear term of KdV equation. In this paper, this estimate is extended to the a more general water-vave equations. We hope this result could shed some light on the estimates of nonlinear terms of water-vave equations.
This work provides a complete characterization of the solutions of a linear interpolation problem for vector polynomials. The interpolation problem consists in finding n scalar polynomials such that an equation involving a linear combination of them is satisfied for each one of the N interpolation nodes. The results of this work generalize previous results on the so-called rational interpolation and have applications to direct and inverse spectral analysis of band matrices.
In this work we extend Lacey s domination theorem to prove the pointwise control of bilinear Calder\\ on--Zygmund operators with Dini--continuous kernel by sparse operators. The precise bounds are carefully tracked following the spirit in a recent work of Hyt\\\"onen, Roncal and Tapiola. We also derive new mixed weighted estimates for a general class of bilinear dyadic positive operators using multiple $A_{\\infty}$ constants inspired in the Fujii-Wilson and Hrus\\v{c}\\v{e}v classical constants. These estimates have many new applications including mixed bounds for multilinear Calder\\ on--Zygmund operators and their commutators with $BMO$ functions, square functions and multilinear Fourier multipliers.
In this paper we study the local zero behavior of orthogonal polynomials around an algebraic singularity, that is, when the measure of orthogonality is supported on $ [-1,1] $ and behaves like $ h(x)|x - x_0|^\\lambda dx $ for some $ x_0 \\in (-1,1) $, where $ h(x) $ is strictly positive and analytic. We shall sharpen the theorem of Yoram Last and Barry Simon and show that the so-called fine zero spacing (which is known for $ \\lambda = 0$) unravels in the general case, and the asymptotic behavior of neighbouring zeros around the singularity can be described with the zeros of the function $ c J_{\\frac{\\lambda - 1}{2}}(x) + d J_{\\frac{\\lambda + 1}{2}}(x) $, where $ J_a(x) $ denotes the Bessel function of the first kind and order $ a $. Moreover, using Sturm-Liouville theory, we study the behavior of this linear combination of Bessel functions, thus providing estimates for the zeros in question.
The aim of this paper is to derive new representations for the Anger--Weber function, exploiting the reformulation of the method of steepest descents by C. J. Howls (Howls, Proc. R. Soc. Lond. A 439 (1992) 373--396). Using these representations, we obtain a number of properties of the large order asymptotic expansions of the Anger--Weber function, including explicit and realistic error bounds, asymptotics for the late coefficients, exponentially improved asymptotic expansions, and the smooth transition of the Stokes discontinuities.
$\\Gamma$-convergence methods are used to prove homogenization results for fractional obstacle problems in periodically perforated domains. The obstacles have random sizes and shapes and their capacity scales according to a stationary ergodic process. We use a trace-like representation of fractional Sobolev norms in terms of weighted Sobolev energies established by Caffarelli and Silvestre, a weighted ergodic theorem and a joining lemma in varying domains following the approach by Ansini and Braides. Our proof is alternative to those contained in the papers by Caffarelli and Mellet.
First, let $K \\subset B(0,1) \\subset \\mathbb{R}^{2}$ be a set with $\\mathcal{H}_{\\infty}^{1}(K) \\sim 1$, and write $\\pi_{e}(K)$ for the orthogonal projection of $K$ into the line spanned by $e \\in S^{1}$. For $1/2 \\leq s < 1$, write $$E_{s} := \\{e : N(\\pi_{e}(K),\\delta) \\leq \\delta^{-s}\\}, $$ where $N(A,r)$ is the $r$-covering number of the set $A$. It is well-known -- and essentially due to R. Kaufman -- that $N(E_{s},\\delta) \\lessapprox \\delta^{-s}$. Using the polynomial method, I prove that $$ N(E_{s},r) \\lessapprox \\min\\left\\{\\delta^{-s}\\left(\\frac{\\delta}{r}\\right)^{1/2},r^{-1}\\right\\}, \\quad \\delta \\leq r \\leq 1.$$ I construct examples showing that the exponents in the bound are sharp for $\\delta \\leq r \\leq \\delta^{s}$. The second theorem concerns projections of $1$-Ahlfors-David regular sets. Let $A \\geq 1$ and $1/2 \\leq s < 1$ be given. I prove that, for $p = p(A,s) \\in \\mathbb{N}$ large enough, the finite set of unit vectors $S_{p} := \\{e^{2\\pi i k/p} : 0 \\leq k < p\\}$ has the following property. If $K \\subset B(0,1)$ is non-empty and $1$-Ahlfors-David regular with regularity constant at most $A$, then $$\\frac{1}{p} \\sum_{e \\in S_{p}} N(\\pi_{e}(K),\\delta) \\geq \\delta^{-s}$$ for all small enough $\\delta > 0$. In particular, $\\overline{\\dim}_{\\text{B}} \\pi_{e}(K) \\geq s$ for some $e \\in S_{p}$.
The aim of this paper is to prove a trace theorem for Besov functions in the metric setting, generalizing a known result from A. Jonsson and H. Wallin in the Euclidean case. We show that the trace of a Besov space defined in a `big set  $X$ is another Besov space defined in the `small set  $F\\subset X$. The proof is divided in three parts. First we see that Besov functions in $F$ are restrictions of functions of the same type (but greater regularity) in $X$, that is we prove an Extension theorem. Next, as an auxiliary result that can also be interesting on its own, we show that the interpolation between certain potential spaces gives a Besov space. Finally, to obtain that Besov functions in $X$ can in fact be restricted to $F$, a Restriction theorem, we first prove that this result holds for functions in the potential space, and then by the interpolation result previously shown, it must hold in the Besov case. For the interpolation and restriction theorems, we make additional assumptions on the spaces $X$ and $F$, and on the order of regularity of the functions involved.
In this note we consider the global convergence properties of the differential equation $\\dot{\\Theta}=(\\Theta^{T}-\\Theta)\\Theta$ with $\\Theta\\in{SO(n)}$, which is a gradient flow of the function $f:SO(n)\\rightarrow\\mathbb{R},\\Theta\\mapsto{2n-2\\tr{\\Theta}}$. Many of the presented results are not new, but scattered throughout literature. The motivation of this note is to summarize and extend the convergence results known from literature. Rather than giving an exhaustive list of references, the results are presented in a self-contained fashion.
Recently, Mursaleen et al applied (p,q)-calculus in approximation theory and introduced (p,q)-analogue of Bernstein operators in [16]. In this paper, we construct and introduce a generalization of the bivariate Bleimann-Butzer-Hahn operators based on (p,q)-integers and obtain Korovkin type approximation theorem of these operators. Furthermore, we compute the rate of convergence of the operators by using the modulus of continuity and Lipschitz type maximalfunctions.
The well-known Kummer s formula evaluates the hypergeometric series 2F1(A,B;C;-1) when the relation B-A+C=1 holds. This paper deals with evaluation of 2F1(-1) series in the case when C-A+B is an integer. Such a series is expressed as a sum of two \\Gamma-terms multiplied by terminating 3F2(1) series. A few such formulas were essentially known to Whipple in 1920 s. Here we give a simpler and more complete overview of this type of evaluations. Additionally, algorithmic aspects of evaluating hypergeometric series are considered. We illustrate Zeilberger s method and discuss its applicability to non-terminating series, and present a couple of similar generalizations of other known formulas.
A vector space over a field $\\mathbb{F}$ is a set $V$ together with two binary operations, called vector addition and scalar multiplication. It is standard practice to think of a Euclidean space $\\mathbb{R}^n$ as an $n$-dimensional real coordinate space i.e. the space of all $n$-tuples of real numbers ($R^n$), with vector operations defined using real addition and multiplication coordinate-wise. A natural question which arises is if it is possible to redefine vector operations on the space in such a way that it acquires some other dimension, say $k$ (over the same field i.e., $\\mathbb{R}$). In this paper, we answer the question in the affirmative, for all $k\\in\\mathbb{N}$. We achieve the required dimension by `dragging  the structure of a standard $k$-dimensional Euclidean space (\\R{k}) on the $n$-tuple of real numbers ($R^n$). At the heart of the argument is Cantor s counterintuitive result that $\\mathbb{R}$ is numerically equivalent to $\\mathbb{R}^n$ for all $n\\in\\mathbb{N}$, which can be proved through an elegant construction. Finally, we generalize the result to all finite dimensional vector spaces.
We study the behavior of the bilinear Hilbert transform $\\mathrm{BHT}$ at the boundary of the known boundedness region $\\mathcal H$. A sample of our results is the estimate $| \\langle\\mathrm{BHT}(f_1,f_2),f_3 \\rangle | \\leq C |F_1|^{\\frac34}|F_2| ^{\\frac34} |F_3|^{-\\frac12} \\log\\log \\Big(\\mathrm{e}^{\\mathrm{e}} + \\frac{|F_3|}{\\min\\{|F_1|,|F_2|\\}} \\Big) $ valid for all tuples of sets $F_j \\subset \\mathbb R $ of finite measure and functions $f_j$ such that $|f_j| \\leq \\mathbf{1}_{F_j}$, $j=1,2,3$, with the additional restriction that $f_3$ be supported on a major subset $F_3 $ of $F_3$ that depends on $\\{F_j:j=1,2,3\\}$. The double logarithmic term improves over the single logarithmic term obtained by Bilyk and Grafakos. Whether the double logarithmic term can be removed entirely, as is the case for the quartile operator discussed by Demeter and the first author, remains open. We employ our endpoint results to describe the blow-up rate of weak-type and strong-type estimates for $\\mathrm{BHT}$ as the tuple $\\vec \\alpha$ approaches the boundary of $\\mathcal H$. We also discuss bounds on Lorentz-Orlicz spaces near $L^{\\frac23}$, improving on results of Carro, Grafakos, Martell and Soria. The main technical novelty in our article is an enhanced version of the multi-frequency Calder\\ on-Zygmund decomposition by Nazarov, Oberlin and the second author.
In this paper, we first give a new definition of almost periodic time scales, two new definitions of almost periodic functions on time scales and investigate some basic properties of them. Then, as an application, by using the fixed point theorem in Banach space and the time scale calculus theory, we obtain some sufficient conditions for the existence and exponential stability of positive almost periodic solutions for a class of Nicholson s blowflies models on time scales. Finally, we present an illustrative example to show the effectiveness of obtained results. Our results show that under a simple condition the continuous-time Nicholson s blowflies models and their discrete-time analogue have the same dynamical behaviors.
Connection coefficients between different orthonormal bases satisfy two discrete orthogonal relations themselves. For classical orthogonal polynomials whose weights are invariant under the action of the symmetric group, connection coefficients between a basis consisting of products of hypergeometric functions and another basis obtained form the first one by applying a permutation are studied. For the Jacobi polynomials on the simplex, it is shown that the connection coefficients can be expressed in terms of Tratnik s multivariable Racah polynomials and their weights. This gives, in particular, a new interpretation of the hidden duality between the variables and the degree indices of the Racah polynomials, which lies at the heart of their bispectral properties. These techniques also lead to explicit formulas for connection coefficients of Hahn and Krawtchouk polynomials of several variables, as well as for orthogonal polynomials on balls and spheres.
Let m_{n} and m_{n-1} be an n mean and an n-1 mean, respectively, n\\geq3. If x=(x_{1},...,x_{n}), let {\\pi}_{\\neqj}x=(x_{1},...,x_{j-1},x_{j+1},...,x_{n}). m_{n-1} and m_{n} are said to form a type 1 invariant pair if m_{n}(m_{n-1}({\\pi}_{\\neq1}x),m_{n-1}({\\pi}_{\\neq2}x),...,m_{n-1}({\\pi}_{\\neqn}x))=m_{n}(x) for all x\\inR^{n}. m_{n-1} and m_{n} are said to form a type 2 invariant pair if m_{n}(x,m_{n-1}(x))=m_{n-1}(x) for all x\\inR_{+}^{n-1}. If x=(x_{1},...,x_{n-1}), let {\\pi}_{=j}x=(x_{1},...,x_{j-1},x_{j},x_{j},x_{j+1},...,x_{n-1})\\inR_{+}^{n}. m_{n-1} and m_{n} are said to form a type 3 invariant pair if m_{n-1}(m_{n}({\\pi}=_{1}x),...,m_{n}({\\pi}_{=n-1}x))=m_{n-1}(x) for all x\\inR_{+}^{n-1}. Let m_{h,w,n}(a_{1},...,a_{n})=h^{-1}(((\\sum_{k=1}^{n}w(a_{k})h(a_{k}))/(\\sum_{k=1}^{n}w(a_{k})))), where h(x) is continuous and monotone, and w(x) is continuous and positive, on (0,\\infty) denote the family of weighted quasi--arithmetic means in n variables. We prove that if m_{h,w,n} and m_{h,w,n-1} form a type 1 or type 3 invariant pair, then m_{h,w,n} and m_{h,w,n-1} are quasi--arithmetic means. The method of proof involves deriving equations for certain partial derivatives of order 3 of m_{h,w,n} on the diagonal of R_{+}^{n}. The proof also requires an equation relating certain partial derivatives of order 3 for type 1 or type 3 invariant pairs of means. We also show that any pair of weighted quasi--arithmetic means m_{h,w,n} and m_{h,w,n-1} form a type 2 invariant pair.
There are several equivalent ways to define continuous harmonic functions $H(K)$ on a compact set $K$ in $\\mathbb R^n$. One may let $H(K)$ be the unform closures of all functions in $C(K)$ which are restrictions of harmonic functions on a neighborhood of $K$, or take $H(K)$ as the subspace of $C(K)$ consisting of functions which are finely harmonic on the fine interior of $K$. In \\cite{DG74} it was shown that these definitions are equivalent. Using a localization result of \\cite{BH78} one sees that a function $h\\in H(K)$ if and only if it is continuous and finely harmonic on on every fine connected component of the fine interior of $K$. Such collection of sets are usually called {\\it restoring}. Another equivalent definition of $H(K)$ was introduced in \\cite{P97} using the notion of Jensen measures which leads another restoring collection of sets. The main goal of this paper is to reconcile the results in \\cite{DG74} and \\cite{P97}. To study these spaces, two notions of Green functions have previously been introduced. One by \\cite{P97} as the limit of Green functions on domains $D_j$ where the domains $D_j$ are decreasing to $K$, and alternatively following \\cite{F72, F75} one has the fine Green function on the fine interior of $K$. Our Theorem \\ref{T:green_equiv} shows that these are equivalent notions. In Section \\ref{S:Jensen} a careful study of the set of Jensen measures on $K$, leads to an interesting extension result (Corollary \\ref{C:extend}) for superharmonic functions. This has a number of applications. In particular we show that the two restoring coverings are the same. We are also able to extend some results of \\cite{GL83} and \\cite{P97} to higher dimensions.
Given a Calder\\ on-Zygmund operator $T$, a classic result of Coifman-Rochberg-Weiss relates the norm of the commutator $[b, T]$ with the BMO norm of $b$. We focus on a weighted version of this result, obtained by Bloom and later generalized by Lacey and the authors, which relates $\\| [b, T] : L^p(\\mathbb{R}^n; \\mu) \\to L^p(\\mathbb{R}^n; \\lambda) \\|$ to the norm of $b$ in a certain weighted BMO space determined by $A_p$ weights $\\mu$ and $\\lambda$. We extend this result to higher iterates of the commutator and recover a one-weight result of Chung-Pereyra-Perez in the process.
In this paper, we introduce Hardy spaces with variable exponents defined on a probability space and develop the martingale theory of variable Hardy spaces. We prove the weak type and strong type inequalities on Doob s maximal operator and get a $(1,p(\\cdot),\\infty)$-atomic decomposition for Hardy martingale spaces associated with conditional square functions. As applications, we obtain a dual theorem and the John-Nirenberg inequalities in the frame of variable exponents. The key ingredient is that we find a condition with probabilistic characterization of $p(\\cdot)$ to replace the so-called log-H\\\"{o}lder continuity condition in $\\mathbb {R}^n.$
In this paper, exact rate of approximation of functions by linear means of Fourier series and Fourier integrals and corresponding $K$-functionals are expressed via special moduli of smoothness. . Introduction is given in $\\S 1$. In $\\S2$ functions on the line $\\mathbb{R}$ are studied. A typical (well-known) result is as follows: for each $2\\pi$-periodic function in $L_p$ on the period, for any $p\\in[1,+\\infty]$ ($L_\\infty=C$) and $r\\in\\mathbb{N}$, there is a trigonometric polynomial $\\tau_{r,n}(f)$ of degree not greater than $n$ such that \\big\\|f-\\tau_{r,n}(f)\\big\\|_p\\asymp\\omega_r\\Big(f;\\frac{1}{n}\\Big)_p\\asymp \\inf\\limits_{g}\\Big\\{\\|f-g\\|_p+\\frac{1}{n^r}\\big\\|g^{(r)}\\big\\|_p\\Big\\}, where the positive constants in these bilateral inequalities depend only on $r$. In $\\S 3$ we deal with functions on $\\mathbb{R}^d$ ($d\\geq2$), while in $\\S 4$ with functions on Banach spaces. The paper is partially of survey nature. The proofs are given only for Theorems 2.2, 3.9 and those in $\\S 4$. Related open problems are formulated in $\\S 5$. The list of references contains 52 items.
We prove well-posedness of global solutions for a class of coagulation equations which exhibit the gelation phase transition. To this end, we solve an associated partial differential equation involving the generating functions before and after the phase transition. Applications include the classical Smoluchowski and Flory equations with multiplicative coagulation rate and the recently introduced symmetric model with limited aggregations. For the latter, we compute the limiting concentrations and we relate them to random graph models.
We discuss properties of certain generalization of Power Means proposed in 1971 by Carlson, Meany and Nelson. For any fixed parameter (k,s,q) and vector (v_1,...,v_n) they take the q-th power means of all possible k-tuples (v_{i_1},...,v_{i_k}), and then calculate the s-th power mean of the resulting vector of length C_n^k. We work towards a complete answer to the question when such means satisfy inequalities resembling the classical Hardy inequality. We give a definitive answer in a large part of the parameter space. An unexpected corollary is that this family behaves much differently than most of other families admitting Hardy-type inequalities. Namely, arbitrarily small perturbations of parameters may lead to the breakdown of such inequalities.
In this paper we study the $L^p-L^r$ boundedness of the extension operators associated with paraboloids in vector spaces over finite fields.In higher even dimensions, we estimate the number of additive quadruples in the subset $E$ of the paraboloids, that is the number of quadruples $(x,y,z,w) \\in E^4$ with $x+y=z+w.$ As a result, in higher even dimensions, we improve upon the standard Tomas-Stein exponents which Mockenhaupt and Tao obtained for the boundedness of extension operators for paraboloids by estimating the decay of the Fourier transform of measures on paraboloids. In particular, we obtain the sharp $L^p-L^4$ bound up to endpoints in higher even dimensions. Moreover, we also study the $L^2-L^r$ estimates.In the case when -1 is not a square number in the underlying finite field, we also study the $L^p-L^r$ bound in higher odd dimensions.The discrete Fourier analytic machinery and Gauss sum estimates make an important role in the proof.
We prove $d$-linear analogues of the classical restriction and Kakeya conjectures in $\\R^d$. Our approach involves obtaining monotonicity formulae pertaining to a certain evolution of families of gaussians, closely related to heat flow. We conclude by giving some applications to the corresponding variable-coefficient problems and the so-called \"joints\" problem, as well as presenting some $n$-linear analogues for $n<d$.
We study an SIR epidemic model with a seasonal contact rate and saturated treatment function. It is shown that the basic reproduction number $(\\mathcal {R}_0)$ cannot be acted as a threshold that predicts the spread of an infection. Based on this finding, we establish a set of sufficient conditions for the existence of multiple positive periodic solutions by using Gaines-Mawhin s continuation theorem. This is very similar to backward bifurcation for an autonomous model. Further, we investigate the stability of positive periodic solution under small seasonal perturbation by means of Floquet theory. Numerical simulations support our theoretical analysis.
Stein conjectured that the Hilbert transform in the direction of a vector field is bounded on, say, $L^2$ whenever $v$ is Lipschitz. We establish a wide range of $L^p$ estimates for this operator when $v$ is a measurable, non-vanishing, one-variable vector field in $\\bbr ^2$. Aside from an $L^2$ estimate following from a simple trick with Carleson s theorem, these estimates were unknown previously. This paper is closely related to a recent paper of the first author (\\cite{B2}).
We give a necessary and sufficient mean condition for the quotient of two Jensen functionals and define a new class $\\Lambda_{f,g}(a, b)$ of mean values where $f, g$ are continuously differentiable convex functions satisfying the relation $f\"(t)=t g\"(t), t\\in \\Bbb R^+$. Then we asked for a characterization of $f, g$ such that the inequalities $H(a, b)\\le \\Lambda_{f, g}(a, b)\\le A(a, b)$ or $L(a, b)\\le \\Lambda_{f, g}(a, b)\\le I(a, b)$ hold for each positive $a, b$, where $H, A, L, I$ are the harmonic, arithmetic, logarithmic and identric means, respectively. For a subclass of $\\Lambda$ with $g\"(t)=t^s, s\\in \\Bbb R$, this problem is thoroughly solved.
In his seminal paper, Schoenberg (1942) characterized the class P(S^d) of continuous functions f:[-1,1] \\to \\R such that f(\\cos \\theta) is positive definite over the product space S^d \\times S^d, with S^d being the unit sphere of \\R^{d+1} and \\theta being the great circle distance. In this paper, we consider the product space S^d \\times G, for G a locally compact group, and define the class P(S^d, G) of continuous functions f:[-1,1]\\times G \\to \\C such that f(\\cos \\theta, u^{-1}\\cdot v) is positive definite on S^d \\times S^d \\times G \\times G. This offers a natural extension of Schoenberg s Theorem. Schoenberg s second theorem corresponding to the Hilbert sphere S^\\infty is also extended to this context. The case G=\\R is of special importance for probability theory and stochastic processes, because it characterizes completely the class of space-time covariance functions where the space is the sphere, being an approximation of Planet Earth.
The second Painlev\\ e equation with a large parameter ($P_{II}$) is analyzed by using the exact WKB analysis. The purpose of this study is to investigate the problem of the degeneration of $P$-Stokes geometry of ($P_{II}$), which relates to a kind of Stokes phenomena for asymptotic (formal) solutions of ($P_{II}$). We call this Stokes phenomenon a \"parametric Stokes phenomenon\". We formulate the connection formula for this Stokes phenomenon, and confirm it in two ways: the first one is by computing the \"Voros coefficient\" of ($P_{II}$), and the second one is by using the isomonodromic deformation theory. Our main claim is that the connection formulas derived by these two completely different methods coincide.
Let $1\\le p_0<p,q <q_0\\le \\infty$. Given a pair of weights $(w,\\sigma)$ and a sparse family $\\mathcal S$, we study the two weight inequality for the following bi-sublinear form \\[ B(f, g)= \\sum_{Q\\in\\mathcal S}\\langle |f|^{p_0}\\rangle_Q^{\\frac 1{p_0}} \\langle|g|^{q_0 }\\rangle_Q^{\\frac 1{q_0 }}\\lambda_Q\\le \\mathcal N\\|f\\|_{L^{p}(w)}\\|g\\|_{L^{q }(\\sigma)}. \\] When $\\lambda_Q=|Q|$ and $p=q$, Bernicot, Frey and Petermichl showed that $B(f,g)$ dominates $\\langle Tf, g\\rangle$ for a large class of singular non-kernel operators. We give a characterization for the above inequality and then obtain the mixed $A_p$-$A_\\infty$ estimates and the corresponding entropy bounds when $\\lambda_Q=|Q|$ and $p=q$. We also proposed a new conjecture which implies both the one supremum conjecture and the separated bump conjecture.
We analyze the one parameter family of tronqu\\ ee solutions of the Painlev\\ e equation \\P1 in the pole-free sectors together with the region of the first array of poles. We find a convergent expansion for these solutions, containing one free parameter multiplying exponentially small corrections to the Borel summed power series. We link the position of the poles in the first array to the free parameter, and find the asymptotic expansion of the pole positions in this first array (in inverse powers of the independent variable). We show that the tritronqu\\ ees are given by the condition that the parameter be zero. We show how this analysis in conjunction with the asymptotic study of the pole sector of the tritronqu\\ ee in \\cite{inprep} leads to a closed form expression for the Stokes multiplier directly from the Painlev\\ e property, not relying on isomonodromic or related type of results.
In this article we study the behavior of strongly singular integrals associated to three different, albeit equivalent, quasi-norms on Heisenberg groups; these quasi-norms give rise to phase functions whose mixed Hessians may or may not drop rank along suitable varieties. In the particular case of the Koranyi norm we improve on previous arguments of the second author and obtain sharp $L^2$ estimates for the associated operators.
Convergence problems occur abundantly in all branches of mathematics or in the mathematical treatment of the sciences. Sequence transformations are principal tools to overcome convergence problems of the kind. They accomplish this by converting a slowly converging or diverging input sequence $\\{s_n \\}_{n=0}^{\\infty}$ into another sequence $\\{s^{\\prime}_n \\}_{n=0}^{\\infty}$ with hopefully better numerical properties. Pad\\ {e} approximants, which convert the partial sums of a power series to a doubly indexed sequence of rational functions, are the best known sequence transformations, but the emphasis of the review will be on alternative sequence transformations which for some problems provide better results than Pad\\ {e} approximants.
A characterization of finitely generated shift-invariant subspaces is given when generators are g-minimal. An algorithm is given for the determination of the coefficients in the well known representation of the Fourier transform of an element of the finitely generated shift-invariant subspace as a linear combination of Fourier transformations of generators. An estimate for the norms of those coefficients is derived. For the proof a sort of orthogonalization procedure for generators is used which reminds the well known Gram-Schmidt orthogonalization process.
The aim of this paper is to study differential properties of orthogonal polynomials with respect to a discrete Jacobi-Sobolev bilinear form with mass point at $-1$ and/or $+1$. In particular, we construct the orthogonal polynomials using certain Casorati determinants. Using this construction, we prove that when the Jacobi parameters $\\alpha$ and $\\beta$ are nonnegative integers the Jacobi-Sobolev orthogonal polynomials are eigenfunctions of a differential operator of finite order (which will be explicitly constructed). Moreover, the order of this differential operator is explicitly computed in terms of the matrices which define the discrete Jacobi-Sobolev bilinear form.
In this paper, we study a class of multilinear fractional integral operators which have correlation kernels $\\prod_{1\\leq i<j \\leq k}|x_i-x_j|^{-\\alpha_{ij}}$. The necessary and sufficient conditions are obtained under which these oprators are bounded from $L^{p_1}\\times \\cdots \\times L^{p_k}$ into $L^q$. As a consequence, we also get the endpoint estimates from $L^{p_1}\\times \\cdots \\times L^{p_k}$ to $BMO$ of these operators.
We study the singularity (multifractal) spectrum of the convex hull of the typical/generic continuous functions defined on $[0,1]^{d}$. We denote by ${\\mathbf E}_ { { \\varphi } }^{h} $ the set of points at which $ \\varphi : [0,1]^d\\to {\\mathbb R}$ has a pointwise H\\\"older exponent equal to $h$. Let $H_{f}$ be the convex hull of the graph of $f$, the concave function on the top of $H_{f}$ is denoted by $ { { \\varphi } }_{1,f}( { { \\mathbf x } })=\\max \\{y:( { { \\mathbf x } },y)\\in H_{f} \\}$ and $ { { \\varphi } }_{2,f}( { { \\mathbf x } })=\\min \\{y:( { { \\mathbf x } },y)\\in H_{f} \\}$ denotes the convex function on the bottom of $H_{f}$. We show that there is a dense $G_\\delta$ subset $ { { \\cal G } } { \\subset } {C[0,1]^d}$ such that for $f\\in { { \\cal G } }$ the following properties are satisfied. For $i=1,2$ the functions $ { { { \\varphi } }_ {i,f}}$ and $f$ coincide only on a set of zero Hausdorff dimension, the functions $ { { { \\varphi } }_ {i,f}}$ are continuously differentiable on $(0,1)^{d}$, ${\\mathbf E}_{ { { \\varphi } }_{i,f}}^{0} $ equals the boundary of $ {[0,1]^d}$, $\\dim_{H}{\\mathbf E}_{ { { \\varphi } }_{i,f}}^{1}=d-1 $, $\\dim_{H}{\\mathbf E}_{ { { \\varphi } }_{i,f}}^{+ { \\infty }}=d $ and ${\\mathbf E}_{ { { \\varphi } }_{i,f}}^{h}= { \\emptyset }$ if $h\\in(0,+ { \\infty }) { \\setminus } \\{1 \\}$.
Let $B_\\theta $ be the family of rectangles in the plane $R^2$, having slope $\\theta $ with the abscissa. We say a set of slopes $\\Theta $ is $D$-set if there exists a function $f\\in L(R^2)$, such that the basis $B_\\theta $ differentiates integral of $f$ if $\\theta\\not\\in\\Theta $ and $\\bar D_\\theta f(x)=\\infty $ almost everywhere if $\\theta\\in\\Theta $. If the condition $\\bar D_\\theta f(x)=\\infty $ holds on a set of positive measure (instead of a.e.) we shall say it is $WD$-set. It is proved, that $\\Theta $ is $D$-set($WD$-set) if and only if it is $G_\\delta $($G_{\\delta\\sigma}$).
Tight framelets on a smooth and compact Riemannian manifold $\\mathcal{M}$ provide a tool of multiresolution analysis for data from geosciences, astrophysics, medical sciences, etc. This work investigates the construction, characterizations, and applications of tight framelets on the manifold $\\mathcal{M}$. Characterizations of the tightness of a sequence of framelet systems for $L_2(\\mathcal{M})$ in both the continuous and discrete settings are provided. Tight framelets on $\\mathcal{M}$ can then be easily designed and fast framelet transforms on $\\mathcal{M}$ are shown to be realizable with nearly linear computational complexity. Explicit construction of tight framelets on the sphere $\\mathbb{S}^{2}$ as well as numerical examples are shown.
The open problem of determining the exact value of the $n$-th linear polarization constant $c_n$ of $\\R^n$ has received considerable attention over the past few years. This paper makes a contribution to the subject by providing a new lower bound on the value of $\\sup_{\\|{\\bf{y}}\\|=1}| {\\bf{x}}_1,{\\bf{y}} ... {\\bf{x}}_n,{\\bf{y}} |$, where ${\\bf{x}}_1, ... ,{\\bf{x}}_n$ are unit vectors in $\\R^n$. The new estimate is given in terms of the eigenvalues of the Gram matrix $[ {\\bf{x}}_i,{\\bf{x}}_j ]$ and improves upon earlier estimates of this kind. However, the intriguing conjecture $c_n=n^{n/2}$ remains open.
It is well-known that several classical results about Calder\\ {o}n-Zygmund singular integral operators can be extended to \\(X\\)-valued functions if and only if the Banach space \\(X\\) has the UMD property. The dependence of the norm of an \\(X\\)-valued Calder\\ {o}n-Zygmund operator on the UMD constant of the space \\(X\\) is conjectured to be linear. We prove that this is indeed the case for sufficiently smooth Calder\\ {o}n-Zygmund operators with cancellation, associated to an even kernel. Our method uses the Bellman function technique to obtain the right estimates for the norm of dyadic Haar shift operators. We then apply the representation theorem of T. Hyt\\\"{o}nen to extend the result to general Calder\\ {o}n-Zygmund operators.
We extend the technique of asymptotic series matching to exponential asymptotics expansions (transseries) and show that the extension provides a method of finding singularities of solutions of nonlinear differential equations, using asymptotic information. This transasymptotic matching method is applied to Painlev\\ e s first equation. The solutions of P1 that are bounded in some direction towards infinity can be expressed as series of functions, obtained by generalized Borel summation of formal transseries solutions; the series converge in a neighborhood of infinity. We prove (under certain restrictions) that the boundary of the region of convergence contains actual poles of the associated solution. As a consequence, the position of these exterior poles is derived from asymptotic data. In particular, we prove that the location of the outermost pole $x_p(C)$ on $\\RR^+$ of a solution is monotonic in a parameter $C$ describing its asymptotics on antistokes lines$^1$, and obtain rigorous bounds for $x_p(C)$. We also derive the behavior of $x_p(C)$ for large $C\\in\\CC$. The appendix gives a detailed classical proof that the only singularities of solutions of P1 are poles.
Hypergeometric equations with a dihedral monodromy group can be solved in terms of elementary functions. This paper gives explicit general expressions for quadratic monodromy invariants for these hypergeometric equations, using a generalization of Clausen s formula and terminating double hypergeometric sums. Besides, pull-back transformations for the dihedral hypergeometric equations are presented, including Klein s pullback transformations for the equations with a finite (dihedral) monodromy group.
A long standing conjecture for the linear Schroedinger equation states that 1/4 of derivative in $L^2$, in the sense of Sobolev spaces, suffices in any dimension for the solution to that equation to converge almost everywhere to the initial datum as the time goes to 0. This is only known to be true in dimension 1 by work of Carleson. In this paper we show that the conjecture is true on spherical averages. To be more precise, we prove the $L^2$ boundedness of the associated maximal square function on the Sobolev class $H^{1/4}(R^n)$ in any dimension n.
We consider Koornwinder s method for constructing orthogonal polynomials in two variables from orthogonal polynomials in one variable. If semiclassical orthogonal polynomials in one variable are used, then Koornwinder s construction generates semiclassical orthogonal polynomials in two variables. We consider two methods for deducing matrix Pearson equations for weight functions associated with these polynomials, and consequently, we deduce the second order linear partial differential operators for classical Koornwinder polynomials.
On the one hand the algebras of linear operators here act on finite-dimensional vector spaces, and on the other hand the point of view is generally an analysts . Also, one might think of algebras as being used to add more data to basic geometry as on a graph, for instance. Of course this is a common theme which is considered in numerous settings. From an analysts  perspective, compact groups, their representations, and more general topological groups and their representations are basic objects of study. Finite groups are like groups which are especially compact, and with some extra structure. As long as one considers finite groups and finite-dimensional vector spaces, one might as well consider general underlying fields k too. This includes p-adic fields, which are quite interesting for analysis.
Just as with the Gauss hypergeometric function, particular cases of the local Heun function can be Liouvillian (that is, \"elementary\") functions. One way to obtain these functions is by pull-back transformations of Gauss hypergeometric equations with Liouvillian solutions. This paper presents the Liouvillian solutions of Heun s equations that are pull-backs of the parametric hypergeometric equations with cyclic or dihedral monodromy groups.
We give an alternative definition of integral at the generality of the Perron integral and propose an exposition of the foundations of integral theory starting from this new definition. Both definition and proofs needed for the development are unexpectedly simple. We show how to adapt the definition to cover the multidimensional and Stieltjes case and prove that our integral is equivalent to the Henstock-Kurzweil(-Stieltjes) integral.
Brent and McMillan introduced in 1980 a new algorithm for the computation of Euler s constant $\\gamma$, based on the use of the Bessel functions I\\_0(x) and K\\_0(x). It is the fastest known algorithm for the computation of $\\gamma$. The time complexity can still be improved by evaluating a certain divergent asymptotic expansion up to its minimal term. Brent-McMillan conjectured in 1980 that the error is of the same magnitude as the last computed term, and Brent-Johansson partially proved it in 2015. They also gave some numerical evidence for a more precise estimate of the error term. We find here an explicit expression of that optimal estimate, along with a complete self-contained formal proof and an even more precise error bound.
New bispectral polynomials orthogonal on a quadratic bi-lattice are obtained from a truncation of Wilson polynomials. Recurrence relation and difference equation are provided. The recurrence coefficients can be encoded in a perturbed persymmetric Jacobi matrix. The orthogonality relation and an explicit expression in terms of hypergeometric functions are also given. Special cases and connections with the para-Krawtchouk polynomials and the dual-Hahn polynomials are also discussed.
We study the boundary regularity of almost minimal and quasiminimal sets that satisfy sliding boundary conditions. The competitors of a set $E$ are defined as $F = \\varphi_1(E)$, where $\\{ \\varphi_t \\}$ is a one parameter family of continuous mappings defined on $E$, and that preserve a given collection of boundary pieces. We generalize known interior regularity results, and in particular we show that the quasiminimal sets are locally Ahlfors-regular, rectifiable, and some times uniformly rectifiable, that our classes are stable under limits, and that for almost minimal sets the density of Hausdorff measure in balls centered on the boundary is almost nondecreasing.
Let $\\Delta_0$ be the Laplace-Beltrami operator on the unit sphere $\\mathbb{S}^{d-1}$ of $\\mathbb{R}^d$. We show that the Hardy-Rellich inequality of the form $$ \\int_{\\mathbb{S}^{d-1}} \\left | f (x)\\right|^2 d\\sigma(x) \\leq c_d \\min_{e\\in \\mathbb{S}^{d-1}} \\int_{\\mathbb{S}^{d-1}} (1- \\langle x, e \\rangle) \\left |(-\\Delta_0)^{\\frac{1}{2}}f(x) \\right |^2 d\\sigma(x) $$ holds for $d =2$ and $d \\ge 4$ but does not hold for $d=3$ with any finite constant, and the optimal constant for the inequality is $c_d = 8/(d-3)^2$ for $d =2, 4, 5$ and, under additional restrictions on the function space, for $d\\ge 6$. This inequality yields an uncertainty principle of the form $$ \\min_{e\\in\\mathbb{S}^{d-1}} \\int_{\\mathbb{S}^{d-1}} (1- \\langle x, e \\rangle) |f(x)|^2 d\\sigma(x) \\int_{\\mathbb{S}^{d-1}}\\left |\\nabla_0 f(x)\\right |^2 d\\sigma(x) \\ge c _d $$ on the sphere for functions with zero mean and unit norm, which can be used to establish another uncertainty principle without zero mean assumption, both of which appear to be new. This paper is published in Constructive Approximation, 40(2014): 141-171. An erratum is now appended.
We show that the multiwavelets, introduced by Alpert in 1993, are related to type I Legendre-Angelesco multiple orthogonal polynomials. We give explicit formulas for these Legendre-Angelesco polynomials and for the Alpert multiwavelets. The multiresolution analysis can be done entirely using Legendre polynomials, and we give an algorithm, using Cholesky factorization, to compute the multiwavelets and a method, using the Jacobi matrix for Legendre polynomials, to compute the matrices in the scaling relation for any size of the multiplicity of the multiwavelets.
We characterize two-weight inequalities for certain maximal truncations of the Hilbert transform in terms of testing conditions on simpler functions. For 1<p<2 and two positive Borel measures u, v on R, we assume that u is doubling, and we consider maximal truncations T_# of the Hilbert transform. The norm estimate || T(f u) ||_{L^p(v)} < C || f ||_{L^p(u)} is characterized in terms of an A_p condition on the weights and two testing conditions. The first is the norm condition above, but the function f varies over bounded functions supported on a cube. The second is a dual weak-type condition, for arbitrary functions. This result should be compared to the result of Nazarov, Treil and Volberg, arXiv:math/0702758. Additional results are obtained for 2<p<\\infty, and for the weak type inequality.
We give a leisurely proof of a result of Ferguson--Lacey (math.CA/0104144) and Lacey--Terwelleger (math.CA/0601192) on a Nehari theorem for \"little\" Hankel operators on a polydisk. If H_b is a little Hankel operator with symbol b on product Hardy space we have || H_b || \\simeq || b ||_{BMO} where BMO is the product BMO space identified by Chang and Fefferman. This article begins with the classical Nehari theorem, and presents the necessary background for the proof of the extension above. The proof of the extension is an induction on parameters, with a bootstrapping argument. Some of the more technical details of the earlier proofs are now seen as consequences of a paraproduct theory.
The level of a function f on an n-dimensional space encloses a region. The volume of a region between two such levels depends on both levels. Fixing one of them the volume becomes a function of the remaining level. We show that if the function f is smooth, the volume function is again smooth for regular values of f. For critical values of f the volume function is only finitely differentiable. The initial motivation for this study comes from Radiotherapy, where such volume functions are used in an optimization process. Thus their differentiability properties become important.
We give an example of a pair of weights (u,v) on the line, and an elliptic convolution singular integral operator H on the line, such that H_u is bounded from L^2(u) to L^2(v), yet the measure pair (u,v) fails to satisfy the backward energy condition. The key to the construction is that the kernel K of H has flat spots where d/dx K(x) = 0. Conversely, we show that if H is gradient elliptic, i.e. d/dx K(x) =< c < 0, then the energy conditions are necessary for boundedness of H, and by our theorem in arXiv:1603.04332v2, the T1 theorem holds for H.
This paper investigates positive harmonic functions on a domain which contains an infinite cylinder, and whose boundary is contained in the union of parallel hyperplanes. (In the plane its boundary consists of two sets of vertical semi-infinite lines.) It characterizes, in terms of the spacing between the hyperplanes, those domains for which there exist minimal harmonic functions with a certain exponential growth.
The purpose of this paper is to establish Picard-Lindel\\\"{o}f theorem for local uniqueness and existence results for first-order systems of nonlinear delay dynamic equations. In the linear case, we extend our results to global existence and uniqueness of solutions on the entire interval (allowed to be unbounded above), and prove the variation of parameters formula for the unique solution in terms of the principal solution. A simple example concerning the ordinary case is also provided.
The purpose of this short paper is to show the invalidity of a Fourier series expansion of fractional order as derived by G. Jumarie in a series of papers. In his work the exponential functions $e^{in\\omega x}$ are replaced by the Mittag-Leffler functions $E_\\alpha \\left (i (n\\omega x)^\\alpha\\right) ,$ over the interval $[0, M_\\alpha/ \\omega]$ where $0< \\omega<\\infty $ and $M_\\alpha$ is the period of the function $E_\\alpha \\left( ix^\\alpha\\right),$ i.e., $E_\\alpha \\left( ix^\\alpha\\right)=E_\\alpha \\left( i(x+M_\\alpha)^\\alpha\\right).$
We study the Yablonskii-Vorob ev polynomials, which are special polynomials used to represent rational solutions of the second Painlev\\ e equation. Divisibility properties of the coefficients of these polynomials, concerning powers of 4, are obtained and we prove that the nonzero roots of the Yablonskii-Vorob ev polynomials are irrational. Furthermore, relations between the roots of these polynomials for consecutive degree are found by considering power series expansions of rational solutions of the second Painlev\\ e equation.
Let L be a linear difference operator with polynomial coefficients. We consider singularities of L that correspond to roots of the trailing (resp. leading) coefficient of L. We prove that one can effectively construct a left multiple with polynomial coefficients L  of L such that every singularity of L  is a singularity of L that is not apparent. As a consequence, if all singularities of L are apparent, then L has a left multiple whose trailing and leading coefficients equal 1.
We obtain asymptotic equalities for least upper bounds of deviations in the uniform metric of de la Vall\\ {e}e Poussin sums on the sets C^{q}_{\\beta}H_\\omega of Poisson integrals of functions from the class H_\\omega generated by convex upwards moduli of continuity \\omega(t) which satisfy the condition \\omega(t)/t\\to\\infty as t\\to 0. As an implication, a solution of the Kolmogorov-Nikol skii problem for de la Vall\\ {e}e Poussin sums on the sets of Poisson integrals of functions belonging to Lipschitz classes H^\\alpha, 0<\\alpha <1, is obtained
Let $L$ be a linear differential operator with constant coefficients of order $n$ and complex eigenvalues $\\lambda_{0},...,\\lambda_{n}$. Assume that the set $U_{n}$ of all solutions of the equation $Lf=0$ is closed under complex conjugation. If the length of the interval $[ a,b] $ is smaller than $\\pi /M_{n}$, where $M_{n}:=\\max \\left\\{| \\text{Im}% \\lambda_{j}| :j=0,...,n\\right\\} $, then there exists a basis $p_{n,k}$%, $k=0,...n$, of the space $U_{n}$ with the property that each $p_{n,k}$ has a zero of order $k$ at $a$ and a zero of order $n-k$ at $b,$ and each $% p_{n,k}$ is positive on the open interval $(a,b) .$ Under the additional assumption that $\\lambda_{0}$ and $\\lambda_{1}$ are real and distinct, our first main result states that there exist points $% a=t_{0}<t_{1}<...<t_{n}=b$ and positive numbers $\\alpha_{0},..,\\alpha_{n}$%, such that the operator \\begin{equation*} B_{n}f:=\\sum_{k=0}^{n}\\alpha_{k}f(t_{k}) p_{n,k}(x) \\end{equation*} satisfies $B_{n}e^{\\lambda_{j}x}=e^{\\lambda_{j}x}$, for $j=0,1.$ The second main result gives a sufficient condition guaranteeing the uniform convergence of $B_{n}f$ to $f$ for each $f\\in C[ a,b] $.
We prove an alternate Toeplitz corona theorem for the algebras of pointwise kernel multipliers of Besov-Sobolev spaces on the unit ball in $\\mathbb{C}^{n}$, and for the algebra of bounded analytic functions on certain strictly pseudoconvex domains and polydiscs in higher dimensions as well. This alternate Toeplitz corona theorem extends to more general Hilbert function spaces where it does not require the complete Pick property. Instead, the kernel functions $k_{x}\\left(y\\right)$ of certain Hilbert function spaces $\\mathcal{H}$ are assumed to be invertible multipliers on $\\mathcal{H}$, and then we continue a research thread begun by Agler and McCarthy in 1999, and continued by Amar in 2003, and most recently by Trent and Wick in 2009. In dimension $n=1$ we prove the corona theorem for the kernel multiplier algebras of Besov-Sobolev Banach spaces in the unit disk, extending the result for Hilbert spaces $H^\\infty\\cap Q_p$ by A. Nicolau and J. Xiao.
In this paper we find new equivalent norms in $L^p(\\mathbb{R}^n,\\mathbb{B})$ by using multivariate Littlewood-Paley functions associated with Poisson semigroup for the Hermite operator, provided that $\\mathbb{B}$ is a UMD Banach space with the property ($\\alpha$). We make use of $\\gamma$-radonifying operators to get new equivalent norms that allow us to obtain $L^p(\\mathbb{R}^n,\\mathbb{B})$-boundedness properties for (vector valued) multivariate spectral multipliers for Hermite operators. As application of this Hermite multiplier theorem we prove that the Banach valued Hermite Sobolev and potential spaces coincide.
In 1907 M.Petrovitch initiated the study of a class of entire functions all whose finite sections are real-rooted polynomials. An explicit description of this class in terms of the coefficients of a series is impossible since it is determined by an infinite number of discriminantal inequalities one for each degree. However, interesting necessary or sufficient conditions can be formulated. In particular, J.I.Hutchinson has shown that an entire function p(x)=a_0+a_1x+...+a_nx^n+... with strictly positive coefficients has the property that any its finite segment a_ix^i+...+a_jx^j has all real roots if and only if for all i=1,2,... one has a_i^2/a_{i-1}a_{i+1} is greater than or equal to 4. In the present paper we give sharp lower bounds on the ratios a_i^2/a_{i-1}a_{i+1} for the class considered by M.Petrovitch. In particular, we show that the limit of these minima when i tends to infinity equals the inverse of the maximal positive value of the parameter for which the classical partial theta function belongs to the Laguerre-Polya class.
This paper is devoted to study the existence of solutions and the monotone method of second-order periodic boundary value problems when the lower and upper solutions $\\alpha$ and $\\beta$ violate the boundary conditions $ \\alpha(0)=\\alpha(2\\pi)$ and $\\beta(0)=\\beta(2\\pi)$. We present several comparison results. We show that the method of lower and upper solutions coupled with the monotone iterative technique is valid to obtain constuctive proof of existence of solutions.
We study L^p-L^r restriction estimates for algebraic varieties in d-dimensional vector spaces over finite fields. Unlike the Euclidean case, if the dimension $d$ is even, then it is conjectured that the L^{(2d+2)/(d+3)}-L^2 Stein-Tomas restriction result can be improved to the L^{(2d+4)/(d+4)}-L^2 estimate for both spheres and paraboloids in finite fields. In this paper we show that the conjectured L^p-L^2 restriction estimate holds in the specific case when test functions under consideration are restricted to d-coordinate functions or homogeneous functions of degree zero. To deduce our result, we use the connection between the restriction phenomena for our varieties in $d$ dimensions and those for homogeneous varieties in (d+1)dimensions.
We consider a coagulation model first introduced by Redner, Ben-Avraham and Krapivsky in [Redner, Ben-Avraham, Kahng: Kinetics of  cluster eating , J. Phys. A: Math. Gen., 20 (1987), 1231-1238], the main feature of which is that the reaction between a j-cluster and a k-cluster results in the creation of a |j-k|-cluster, and not, as in Smoluchowski s model, of a (j+k)-cluster. In this paper we prove existence and uniqueness of solutions under reasonably general conditions on the coagulation coefficients, and we also establish differenciability properties and continuous dependence of solutions. Some interesting invariance properties are also proved. Finally, we study the long-time behaviour of solutions, and also present a preliminary analysis of their scaling behaviour.
We investigate the integral \\[\\int_0^\\infty \\cosh^\\mu\\!t,K_\\nu(z\\cosh t),dt \\qquad \\Re(z)>0,\\] where $K$ denotes the modified Bessel function, for non-negative integer values of the parameters $\\mu$ and $\\nu$. When the integers are of different parity, closed-form expressions are obtained in terms of $z^{-1}e^{-z}$ multiplied by a polynomial in $z^{-1}$ of degree dependent on the sign of $\\mu-\\nu$.
Given a dimension function $h$, and a family of functions $\\mathcal{F}$ that satisfy certain conditions, we construct a closed set $E$ in $\\mathbb{R}^N$, of $h$-Hausdorff measure zero, such that for any finite set $\\{ f_1,\\ldots,f_n\\}\\subseteq \\mathcal{F}$, $E$ satisfies that $\\bigcap_{i=1}^n f_i(E)\\neq\\emptyset$. We obtain an analogous result for the preimages, from which we are able to prove that there exists a closed set in $\\mathbb{R}$, of zero $h$-Hausdorff measure, that contains any polynomial pattern. The set $E$ can - in some cases - chosen to be perfect. Additionally we prove some related result for countable intersections, obtaining, instead of a closed set, an $\\mathcal{F}_{\\sigma}$ set.
This note supplements the work of Gomez-Ullate, Kamran and Milson on the X_(1)-Jacobi polynomials which are orthogonal in a weighted Hilbert function space on the the interval (-1,+1) of the real line. These polynomials are generated by a second-order ordinary linear differential equation with a spectral parameter. Some additional information on the Sturm-Liouville form of this equation is given in this note, together with details of the singular differential operators generated in the weighted Hilbert function space. In particular, structured boundary conditions are given to determine the special self-adjoint operator, whose discrete spectrum and associated eigenvectors yield the X_(1)-Jacobi polynomials.
We introduce a large family of reproducing kernel Hilbert spaces $\\mathcal{H} \\subset \\mbox{Hol}(\\mathbb{D})$, which include the classical Dirichlet-type spaces $\\mathcal{D}_\\alpha$, by requiring normalized monomials to form a Riesz basis for $\\mathcal{H}$. Then, after precisely evaluating the $n$-th optimal norm and the $n$-th approximant of $f(z)=1-z$, we completely characterize the cyclicity of functions in $\\mbox{Hol}(\\overline{\\mathbb{D}})$ with respect to the forward shift.
We say that the polynomial sequence $(Q^{(\\lambda)}_n)$ is a semiclassical Sobolev polynomial sequence when it is orthogonal with respect to the inner product $$ <p, r>_S=<{{\\bf u}} ,{p, r}> +\\lambda <{{\\bf u}}, {{\\mathscr D}p ,{\\mathscr D}r}>, $$ where ${\\bf u}$ is a semiclassical linear functional, ${\\mathscr D}$ is the differential, the difference or the $q$--difference operator, and $\\lambda$ is a positive constant. In this paper we get algebraic and differential/difference properties for such polynomials as well as algebraic relations between them and the polynomial sequence orthogonal with respect to the semiclassical functional $\\bf u$. The main goal of this article is to give a general approach to the study of the polynomials orthogonal with respect to the above nonstandard inner product regardless of the type of operator ${\\mathscr D}$ considered. Finally, we illustrate our results by applying them to some known families of Sobolev orthogonal polynomials as well as to some new ones introduced in this paper for the first time.
Recurrences for positive definite functions in terms of the space dimension have been used in several fields of applications. Such recurrences typically relate to properties of the system of special functions characterizing the geometry of the underlying space. In the case of the sphere ${\\mathbb S}^{d-1} \\subset {\\mathbb R}^d$ the (strict) positive definiteness of the zonal function $f(\\cos \\theta)$ is determined by the signs of the coefficients in the expansion of $f$ in terms of the Gegenbauer polynomials $\\{C^\\lambda_n\\}$, with $\\lambda=(d-2)/2$. Recent results show that classical differentiation and integration applied to $f$ have positive definiteness preserving properties in this context. However, in these results the space dimension changes in steps of two. This paper develops operators for zonal functions on the sphere which preserve (strict) positive definiteness while moving up and down in the ladder of dimensions by steps of one. These fractional operators are constructed to act appropriately on the Gegenbauer polynomials $\\{C^\\lambda_n\\}$.
In the framework of Clifford analysis, a chain of harmonic and monogenic potentials is constructed in the upper half of Euclidean space $\\mR^{m+1}$, including a higher dimensional generalization of the complex logarithmic function. Their distributional limits at the boundary $\\mR^{m}$ turn out to be well-known distributions such as the Dirac distribution, the Hilbert kernel, the fundamental solution of the Laplace and Dirac operators, the square root of the negative Laplace operator, and the like. It is shown how each of those potentials may be recovered from an adjacent kernel in the chain by an appropriate convolution with such a distributional limit.
By means of the Bessel operator a polynomial sequence is constructed to which several properties are given. Among them, its explicit expression, the connection with the Euler numbers, its integral representation via the Kontorovich-Lebedev transform. Despite its non-orthogonality, it is possible to associate to the canonical element of its dual sequence a positive-definite measure as long as certain stronger constraints are imposed.
We utilize the Bellman function technique to prove a bilinear dimension-free inequality for the Hermite operator. The Bellman technique is applied here to a non-local operator, which at first did not seem to be feasible. As a consequence of our bilinear inequality one proves dimension-free boundedness for the Riesz-Hermite transforms on L^p with linear growth in terms of p. A feature of the proof is a theorem establishing L^p(R^n) estimates for a class of spectral multipliers with bounds independent of n and p. Connections with known results on the Heisenberg group as well as with results for the Hilbert transform along the parabola are also explored. We believe our approach is quite universal in the sense that one could apply it to a whole range of Riesz transforms arising from various differential operators. As a first step towards this goal we prove our dimension-free bilinear embedding theorem for quite a general family of Schroedinger semigroups.
We prove pointwise variational Lp bounds for a bilinear Fourier integral operator in a large but not necessarily sharp range of exponents. This result is a joint strengthening of the corresponding bounds for the classical Carleson operator, the bilinear Hilbert transform, the variation norm Carleson operator, and the bi-Carleson operator. Terry Lyon s rough path theory allows for extension of our result to multilinear estimates. We consider our result a proof of concept for a wider array of similar estimates with possible applications to ordinary differential equations.
In this paper we find extremal one-sided approximations of exponential type for a class of truncated and odd functions with a certain exponential subordination. These approximations optimize the $L^1(\\mathbb{R}, |E(x)|^{-2}dx)$-error, where $E$ is an arbitrary Hermite-Biehler entire function of bounded type in the upper half-plane. This extends the work of Holt and Vaaler [Duke Math. Journal 83 (1996), 203-247] for the signum function. We also provide periodic analogues of these results, finding optimal one-sided approximations by trigonometric polynomials of a given degree to a class of periodic functions with exponential subordination. These extremal trigonometric polynomials optimize the $L^1(\\mathbb{R}/\\mathbb{Z}, d\\vartheta)$-error, where $\\vartheta$ is an arbitrary nontrivial measure on $\\mathbb{R}/\\mathbb{Z}$. The periodic results extend the work of Li and Vaaler [Indiana Univ. Math. J. 48, No. 1 (1999), 183-236], who considered this problem for the sawtooth function with respect to Jacobi measures. Our techniques are based on the theory of reproducing kernel Hilbert spaces (of entire functions and of polynomials) and on the construction of suitable interpolations with nodes at the zeros of Laguerre-P\\ {o}lya functions.
Let v be a planar Lipschitz vector field. We prove that the r-th variation-norm Hilbert transform along v, composed with a standard Littlewood-Paley projection operator P_k, is bounded from L^2 to L^{2, \\infty}, and from L^p to itself for all p>2. Here r>2 and the operator norm is independent of k\\in \\Z. This generalises Lacey and Li s result for the case of the Hilbert transform. However, their result only assumes measurability for vector fields. In contrast to that, we need to assume vector fields to be Lipschitz.
We present a general framework for studying harmonic analysis of functions in the settings of various emerging problems in the theory of diffusion geometry. The starting point of the now classical diffusion geometry approach is the construction of a kernel whose discretization leads to an undirected graph structure on an unstructured data set. We study the question of constructing such kernels for directed graph structures, and argue that our construction is essentially the only way to do so using discretizations of kernels. We then use our previous theory to develop harmonic analysis based on the singular value decomposition of the resulting non-self-adjoint operators associated with the directed graph. Next, we consider the question of how functions defined on one space evolves to another space in the paradigm of changing data sets recently introduced by Coifman and Hirn. While the approach of Coifman and Hirn require that the points on one space should be in a known one-to-one correspondence with the points on the other, our approach allows the identification of only a subset of landmark points. We introduce a new definition of distance between points on two spaces, construct localized kernels based on the two spaces and certain interaction parameters, and study the evolution of smoothness of a function on one space to its lifting to the other space via the landmarks. We develop novel mathematical tools that enable us to study these seemingly different problems in a unified manner.
The aim of this paper is to apply an original computation method due to Malesevic and Makragic [5] to the problem of approximating some trigonometric functions. Inequalities of Wilker-Cusa-Huygens are discussed, but the method can be successfully applied to a wide class of problems. In particular, we improve the estimates recently obtained by Mortici [1] and moreover we show that they hold true also on some extended intervals.
Let T be Takagi s continuous but nowhere-differentiable function. Using a representation in terms of Rademacher series due to N. Kono, we give a complete characterization of those points where T has a left-sided, right-sided, or two-sided infinite derivative. This characterization is illustrated by several examples. A consequence of the main result is that the sets of points where T (x) is infinite have Hausdorff dimension one. As a byproduct of the method of proof, some exact results concerning the modulus of continuity of T are also obtained.
In a nutshell, we intend to extend Schoenberg s classical theorem connecting conditionally positive semidefinite functions $F\\colon \\mathbb{R}^n \\to \\mathbb{C}$, $n \\in \\mathbb{N}$, and their positive semidefinite exponentials $\\exp(tF)$, $t > 0$, to the case of matrix-valued functions $F \\colon \\mathbb{R}^n \\to \\mathbb{C}^{m \\times m}$, $m \\in \\mathbb{N}$. Moreover, we study the closely associated property that $\\exp(t F(- i \\nabla))$, $t>0$, is positivity preserving and its failure to extend directly in the matrix-valued context.
In this note we prove the estimate $M^{\\sharp}_{0,s}(Tf)(x) \\le c,M_\\gamma f(x)$ for general fractional type operators $T$, where $M^{\\sharp}_{0,s}$ is the local sharp maximal function and $M_\\gamma$ the fractional maximal function, as well as a local version of this estimate. This allows us to express the local weighted control of $Tf$ by $M_\\gamma f$. Similar estimates hold for $T$ replaced by fractional type operators with kernels satisfying H\\\"{o}rmander-type conditions or integral operators with homogeneous kernels, and $M_\\gamma $ replaced by an appropriate maximal function $M_T$. We also prove two-weight, $L^p_v$-$L^q_w$ estimates for the fractional type operators described above for $1<p< q<\\infty$ and a range of $q$. The local nature of the estimates leads to results involving generalized Orlicz-Campanato and Orlicz-Morrey spaces.
T. Erd\\ {e}lyi, A.P. Magnus and P. Nevai conjectured that for $\\alpha, \\beta \\ge - {1/2} ,$ the orthonormal Jacobi polynomials ${\\bf P}_k^{(\\alpha, \\beta)} (x)$ satisfy the inequality \\begin{equation*} \\max_{x \\in [-1,1]}(1-x)^{\\alpha+{1/2}}(1+x)^{\\beta+{1/2}}({\\bf P}_k^{(\\alpha, \\beta)} (x) )^2 =O (\\max \\left\\{1,(\\alpha^2+\\beta^2)^{1/4} \\right\\}), \\end{equation*} [Erd\\ {e}lyi et al.,Generalized Jacobi weights, Christoffel functions, and Jacobi polynomials, SIAM J. Math. Anal. 25 (1994), 602-614]. Here we will confirm this conjecture in the ultraspherical case $\\alpha = \\beta \\ge \\frac{1+ \\sqrt{2}}{4},$ even in a stronger form by giving very explicit upper bounds. We also show that \\begin{equation*} \\sqrt{\\delta^2-x^2} (1-x^2)^{\\alpha}({\\bf P}_{2k}^{(\\alpha, \\alpha)} (x))^2 < \\frac{2}{\\pi} (1+ \\frac{1}{8(2k+ \\alpha)^2} ) \\end{equation*} for a certain choice of $\\delta,$ such that the interval $(- \\delta, \\delta)$ contains all the zeros of ${\\bf P}_{2k}^{(\\alpha, \\alpha)} (x).$ Slightly weaker bounds are given for polynomials of odd degree.
We obtain order estimates for the best uniform orthogonal trigonometric approximations of $2\\pi$-periodic functions, whose $(\\psi,\\beta)$-derivatives belong to unit balls of spaces $L_{p}, \\ 1\\leq p<\\infty$, in case at consequences $\\psi(k)$ are that product $\\psi(n)n^{\\frac{1}{p}}$ can tend to zero slower than any power function and $\\sum\\limits_{k=1}^{\\infty}\\psi^{p }(k)k^{p -2}<\\infty$ when $1<p<\\infty$, $\\frac{1}{p}+\\frac{1}{p }=1$ and $\\sum\\limits_{k=1}^{\\infty}\\psi(k)<\\infty$ when $p=1$. We also establish the analogical estimates in $L_{s}$-metric, $1< s\\leq \\infty$, for classes of the summable $(\\psi,\\beta)$-differentiable functions, such that $\\parallel f_{\\beta}^{\\psi}\\parallel_{1}\\leq1$.
The Riccati equations reducible to first-order linear equations by an appropriate change the dependent variable are singled out. All these equations are integrable by quadrature. A wide class of linear ordinary differential equations reducible to algebraic equations is found. It depends on two arbitrary functions. The method for solving all these equations is given. The new class contains the constant coefficient equations and Euler s equations as particular cases.
Let $ T_{P } f (x) = \\int e ^{i P (y)} K (y) f (x-y) \\; dy $, where $ K (y)$ is a smooth Calder\\ on-Zygmund kernel on $ \\mathbb R ^{n}$, and $ P$ be a polynomial. We show that there is a sparse bound for the bilinear form $ \\langle T_P f, g \\rangle$. This in turn easily implies $ A_p $ inequalities. The method of proof is applied in a random discrete setting, yielding the first weighted inequalities for operators defined on sparse sets of integers.
In this paper, we will prove several new inequalities of Hardy s types with explicit constants. The main results will be proved by making use of some generalizations of Opial s type inequalities and H\\\"older s inequality. To the best of the author s knowledge this method has not been used before in investigation of this type of inequalities. From these inequalities one can establish some new inequalities of differential forms which are inequalities of Wirtinger s typ
We prove new results on the existence, non-existence, localization and multiplicity of nontrivial solutions for perturbed Hammerstein integral equations. Our approach is topological and relies on the classical fixed point index. Some of the criteria involve a comparison with the spectral radius of some related linear operators. We apply our results to some boundary value problems with local and nonlocal boundary conditions of Neumann type. We illustrate in some examples the methodologies used.
The Fast Aerosol Spectrometer (FASP) is a device for spectral aerosol measurements. Its purpose is to safely monitor the atmosphere inside a reactor containment. First we describe the FASP and explain its basic physical laws. Then we introduce our reconstruction methods for aerosol particle size distributions designed for the FASP. We extend known existence results for constrained Tikhonov regularization by uniqueness criteria and use those to generate reasonable models for the size distributions. We apply a Bayesian model-selection framework on these pre-generated models. We compare our algorithm with classical inversion methods using simulated measurements. We then extend our reconstruction algorithm for two-component aerosols, so that we can simultaneously retrieve their particle-size distributions and unknown volume fractions of their two components. Finally we present the results of a numerical study for the extended algorithm.
We present a Multi-Index Quasi-Monte Carlo method for the solution of elliptic partial differential equations with random coefficients and inputs. By combining the multi-index sampling idea with randomly shifted rank-1 lattice rules, the algorithm constructs an estimator for the expected value of some functional of the solution. The efficiency of this new method is illustrated on a three-dimensional subsurface flow problem with lognormal diffusion coefficient with underlying Mat\\ ern covariance function. This example is particularly challenging because of the small correlation length considered, and thus the large number of uncertainties that must be included. We show strong numerical evidence that it is possible to achieve a cost inversely proportional to the requested tolerance on the root-mean-square error.
We present parallel and sequential dense QR factorization algorithms that are both optimal (up to polylogarithmic factors) in the amount of communication they perform, and just as stable as Householder QR. We prove optimality by extending known lower bounds on communication bandwidth for sequential and parallel matrix multiplication to provide latency lower bounds, and show these bounds apply to the LU and QR decompositions. We not only show that our QR algorithms attain these lower bounds (up to polylogarithmic factors), but that existing LAPACK and ScaLAPACK algorithms perform asymptotically more communication. We also point out recent LU algorithms in the literature that attain at least some of these lower bounds.
We present a computational framework for analysing thin shell structures using the finite element method. The framework is based on a mesh-dependent shell model which we derive from the general laws of three-dimensional elasticity. We apply the framework for the so called Girkmann benchmark problem involving a spherical shell stiffened with a foot ring. In particular, we compare the accuracy of different reduced strain four-node elements in this context. We conclude that the performance of the bilinear shell finite elements depends on the mesh quality but reasonable accuracy of the quantities of interest of the Girkmann problem can be attained in contrast to earlier results obtained with general shell elements for the problem.
We analyze the convergence of compressive sensing based sampling techniques for the efficient evaluation of functionals of solutions for a class of high-dimensional, affine-parametric, linear operator equations which depend on possibly infinitely many parameters. The proposed algorithms are based on so-called \"non-intrusive\" sampling of the high-dimensional parameter space, reminiscent of Monte-Carlo sampling. In contrast to Monte-Carlo, however, a functional of the parametric solution is then computed via compressive sensing methods from samples of functionals of the solution. A key ingredient in our analysis of independent interest consists in a generalization of recent results on the approximate sparsity of generalized polynomial chaos representations (gpc) of the parametric solution families, in terms of the gpc series with respect to tensorized Chebyshev polynomials. In particular, we establish sufficient conditions on the parametric inputs to the parametric operator equation such that the Chebyshev coefficients of the gpc expansion are contained in certain weighted $\\ell_p$-spaces for $0<p\\leq 1$. Based on this we show that reconstructions of the parametric solutions computed from the sampled problems converge, with high probability, at the $L_2$, resp. $L_\\infty$ convergence rates afforded by best $s$-term approximations of the parametric solution up to logarithmic factors.
We analyse the dynamics of expectation values of quantum observables for the time-dependent semiclassical Schr\\\"odinger equation. To benefit from the positivity of Husimi functions, we switch between observables obtained from Weyl and Anti-Wick quantization. We develop and prove a second order Egorov type propagation theorem with Husimi functions by establishing transition and commutator rules for Weyl and Anti-Wick operators. We provide a discretized version of our theorem and present numerical experiments for Schr\\\"odinger equations in dimensions two and six that validate our results.
In this paper we consider the stability and convergence of numerical discretizations of the Black-Scholes partial differential equation (PDE) when complemented with the popular linear boundary condition. This condition states that the second derivative of the option value vanishes when the underlying asset price gets large and is often applied in the actual numerical solution of PDEs in finance. To our knowledge, the only theoretical stability result in the literature up to now pertinent to the linear boundary condition has been obtained by Windcliff, Forsyth and Vetzal (2004) who showed that for a common discretization a necessary eigenvalue condition for stability holds. In this paper, we shall present sufficient conditions for stability and convergence when the linear boundary condition is employed. We deal with finite difference discretizations in the spatial (asset) variable and a subsequent implicit discretization in time. As a main result we prove that even though the maximum norm of exp(tM) ($t\\ge 0$) can grow with the dimension of the semidiscrete matrix M, this generally does not impair the convergence behavior of the numerical discretizations. Our theoretical results are illustrated by ample numerical experiments.
We developed a novel reduced-order multi-scale method for solving large time-domain wavefield simulation problems. Our algorithm consists of two main stages. During the first \"off-line\" stage the fine-grid operator (of the graph Laplacian type} is partitioned on coarse cells (subdomains). Then projection-type multi-scale reduced order models (ROMs) are computed for the coarse cell operators. The off-line stage is embarrassingly parallel as ROM computations for the subdomains are independent of each other. It also does not depend on the number of simulated sources (inputs) and it is performed just once before the entire time-domain simulation. At the second \"on-line\" stage the time-domain simulation is performed within the obtained multi-scale ROM framework. The crucial feature of our formulation is the representation of the ROMs in terms of matrix Stieltjes continued fractions (S-fractions). The layered structure of the S-fraction introduces several hidden layers in the ROM representation, that results in the block-tridiagonal dynamic system within each coarse cell. This allows us to sparsify the obtained multi-scale subdomain operator ROMs and to reduce the communications between the adjacent subdomains which is highly beneficial for a parallel implementation of the on-line stage. Our approach suits perfectly the high performance computing architectures, however in this paper we present rather promising numerical results for a serial computing implementation only. These results include 3D acoustic and multi-phase anisotropic elastic problems.
In this paper we consider the numerical solution of the Hamiltonian wave equation in two spatial dimension. We use the Mimetic Finite Difference (MFD) method to approximate the continuous problem combined with a symplectic integration in time to integrate the semi-discrete Hamiltonian system. The main characteristic of MFD methods, when applied to stationary problems, is to mimic important properties of the continuous system. This approach, associated with a symplectic method for the time integration yields a full numerical procedure suitable to integrate Hamiltonian problems. A complete theoretical analysis of the method and some numerical simulations are developed in the paper.
This paper presents a class of boundary integral equations for the solution of problems of electromagnetic and acoustic scattering by two dimensional homogeneous penetrable scatterers with smooth boundaries. The new integral equations, which, as is established in this paper, are uniquely solvable Fredholm equations of the second kind, result from representations of fields as combinations of single and double layer potentials acting on appropriately chosen regularizing operators. As demonstrated in this text by means of a variety of numerical examples (that resulted from a high-order Nystrom computational implementation of the new equations), these \"regularized combined equations\" can give rise to important reductions in computational costs, for a given accuracy, over those resulting from previous boundary integral formulations for transmission problems.
This paper provides error analyses of the algorithms most commonly used for the evaluation of the Chebyshev polynomial of the first kind $T_N(x)$. Some of these algorithms are shown to be backward stable. This means that the computed value of $T_N(x)$ in floating point arithmetic by these algorithms can be interpreted as a slightly perturbed value of polynomial $T_N$, for slightly perturbed value of $x$.
Geometric integration theory can be employed when numerically solving ODEs or PDEs with constraints. In this paper, we present several one-step algorithms of various orders for ODEs on a collection of spheres. To demonstrate the versatility of these algorithms, we present representative calculations for reduced free rigid body motion (a conservative ODE) and a discretization of micromagnetics (a dissipative PDE). We emphasize the role of isotropy in geometric integration and link numerical integration schemes to modern differential geometry through the use of partial connection forms; this theoretical framework generalizes moving frames and connections on principal bundles to manifolds with nonfree actions.
We give an algorithm to compute $N$ steps of a convolution quadrature approximation to a continuous temporal convolution using only $O(N \\log N)$ multiplications and $O(\\log N)$ active memory. The method does not require evaluations of the convolution kernel, but instead $O(\\log N)$ evaluations of its Laplace transform, which is assumed sectorial. The algorithm can be used for the stable numerical solution with quasi-optimal complexity of linear and nonlinear integral and integro-differential equations of convolution type. In a numerical example we apply it to solve a subdiffusion equation with transparent boundary conditions.
Linear systems with multiple right-hand sides arise in many applications. To solve such systems efficiently, a new deflated block GCROT($m,k$) method is explored in this paper by exploiting a modified block Arnoldi deflation. This deflation strategy has been shown to have the potential to improve the original deflation which indicates an explicit block size reduction. Incorporating this modified block Arnoldi deflation, the new algorithm can address the possible linear dependence at each iteration during the block Arnoldi procedure and avoids expensive computational operations. In addition, we analyze its main mathematical properties and prove that the deflation procedure is based on a non-increasing behavior of the singular values of the true block residual. Moreover, as a block version of GCROT($m,k$), the new method inherits the property of easy operability. Finally, some numerical examples also illustrate the effectiveness of the proposed method.
We focus on the study of multigrid methods with aggressive coarsening and polynomial smoothers for the solution of the linear systems corresponding to finite difference/element discretizations of the Laplace equation. Using local Fourier analysis we determine automatically the optimal values for the parameters involved in defining the polynomial smoothers and achieve fast convergence of cycles with aggressive coarsening. We also present numerical tests supporting the theoretical results and the heuristic ideas. The methods we introduce are highly parallelizable and efficient multigrid algorithms on structured and semi-structured grids in two and three spatial dimensions.
The numerical solution of a nonlinear and space-fractional anti-diffusive equation used to model dune morphodynamics is considered. Spatial discretization is effected using a finite element method whereas the Crank-Nicolson scheme is used for temporal discretization. The fully discrete scheme is analyzed to determine stability condition and also to obtain error estimates for the approximate solution. Numerical examples are presented to illustrate convergence results.
In this article we present robust, efficient and accurate fully implicit time-stepping schemes and nonlinear solvers for systems of reaction-diffusion equations. The applications of reaction-diffusion systems is abundant in the literature, from modelling pattern formation in developmental biology to cancer research, wound healing, tissue and bone regeneration and cell motility. Therefore, it is crucial that modellers, analysts and biologists are able to solve accurately and efficiently systems of highly nonlinear parabolic partial differential equations on complex stationary and sometimes continuously evolving domains and surfaces. The main contribution of our paper is the study of fully implicit schemes by use of the Newton method and the Picard iteration applied to the backward Euler, the Crank-Nicolson (and its modifications) and the fractional-step theta methods. Our results conclude that the fractional-step theta method coupled with a single Newton iteration at each timestep is as accurate as the fully adaptive Newton method; and both outperform the Picard iteration. In particular, the results strongly support the observation that a single Newton iteration is sufficient to yield as accurate results as those obtained by use of an adaptive Newton method. This is particularly advantageous when solving highly complex nonlinear partial differential equations on evolving domains and surfaces. To validate our theoretical results, various appropriate numerical experiments are exhibited on stationary planary domains and in the bulk of stationary surfaces.
We propose a linear finite-element discretization of Dirichlet problems for static Hamilton-Jacobi equations on unstructured triangulations. The discretization is based on simplified localized Dirichlet problems that are solved by a local variational principle. It generalizes several approaches known in the literature and allows for a simple and transparent convergence theory. In this paper the resulting system of nonlinear equations is solved by an adaptive Gauss-Seidel iteration that is easily implemented and quite effective as a couple of numerical experiments show.
We present a loosely-coupled partitioned scheme for a benchmark problem in fluid-composite structure interaction. The benchmark problem proposed here consists of an incompressible, viscous fluid interacting with a composite structure that consists of two layers: a thin elastic layer which is in contact with the fluid, and a thick elastic layer which sits on top of the thin layer. The motivation comes from fluid-structure interaction (FSI) in hemodyam- ics. The equations of linear elasticity are used to model the thick structural layer, while the Koiter member/shell equations are used to model the thin structural layer which serves as fluid-structure interface with mass. An effi- cient, modular, operator-splitting scheme is proposed to simulate solutions to the coupled, nonlinear FSI problem. The operator splitting scheme sepa- rates the elastodynamics structure problem, from a fluid problem in which the thin structure inertia is included as a Robin-type boundary condition to achieve unconditional stability, without requiring any sub-iterations within time-steps. An energy estimate associated with unconditional stability is derived for the fully nonlinear FSI problem defined on moving domains. Two instructive numerical examples are presented to test the performance of the scheme, where it is shown numerically, that the scheme is at least first-order accurate in time. The second example reveals a new phenomenon in FSI problems: the presence of a thin fluid-structure interface with mass regularizes solutions to the full FSI problem.
Variational methods have become an important kind of methods in signal and image restoration - a typical inverse problem. One important minimization model consists of the squared $\\ell_2$ data fidelity (corresponding to Gaussian noise) and a regularization term constructed by a regularization function (potential function) composed of first order difference operators (basic and widely used linear operators in regularization). Various potential functions have been proposed in the literature, among which nonconvex or nonsmooth at zero regularizers have been proven to produce neat edges. As contrasts are also important features in signals and images, we study, in this paper, the possibility of contrast-preserving restoration by variational methods. To describe the contrast preservation more clearly, we take a typical example to discuss our idea, with some results extended to general cases. We show that, in both 1D and 2D, any convex or smooth regularization (satisfying the very basic assumptions in the literature) based variational model is impossible or with low probabilities to preserve edge contrasts. Consequently, we suggest to try nonconvex and nonsmooth regularization functions, especially those flat on $(\\tau,+\\infty)$ for some positive $\\tau$. We present a framework based on truncated regularization (with truncated $\\ell_p$ proposed in the literature previously). Some basic analysis in 1D theoretically demonstrate its better contrast-preserving ability. We also give numerical algorithms in 2D, where global minimizers of each subproblem (either convex or nonconvenx) can be obtained. Experiments numerically show the advantages of the framework.
We propose a semi-discrete finite difference multiscale scheme for a concrete corrosion model consisting of a system of two-scale reaction-diffusion equations coupled with an ode. We prove energy and regularity estimates and use them to get the necessary compactness of the approximation estimates. Finally, we illustrate numerically the behavior of the two-scale finite difference approximation of the weak solution.
We prove a convergence result for a natural discretization of the Dirichlet problem of the elliptic Monge-Ampere equation using finite dimensional spaces of piecewise polynomial C0 or C1 functions. Standard discretizations of the type considered in this paper have been previous analyzed in the case the equation has a smooth solution and numerous numerical evidence of convergence were given in the case of non smooth solutions. Our convergence result is valid for non smooth solutions, is given in the setting of Aleksandrov solutions, and consists in discretizing the equation in a subdomain with the boundary data used as an approximation of the solution in the remaining part of the domain. Our result gives a theoretical validation for the use of a non monotone finite element method for the Monge-Amp\\`ere equation.
Dual Bernstein polynomials of one or two variables have proved to be very useful in obtaining B\\ {e}zier form of the $L^2$-solution of the problem of best polynomial approximation of B\\ {e}zier curve or surface. In this connection, the B\\ {e}zier coefficients of dual Bernstein polynomials are to be evaluated at a reasonable cost. In this paper, a set of recurrence relations satisfied by the B\\ {e}zier coefficients of dual bivariate Bernstein polynomials is derived and an efficient algorithm for evaluation of these coefficients is proposed. Applications of this result to some approximation problems of Computer Aided Geometric Design (CAGD) are discussed.
An iterative scheme for solving ill-posed nonlinear operator equations with monotone operators is introduced and studied in this paper. A Dynamical Systems Method (DSM) algorithm for stable solution of ill-posed operator equations with monotone operators is proposed and its convergence is proved. A new discrepancy principle is proposed and justified. A priori and a posteriori stopping rules for the DSM algorithm are formulated and justified.
We present a regularization strategy that leads to well-conditioned boundary integral equation formulations of Helmholtz equations with impedance boundary conditions in two-dimensional Lipschitz domains. We consider both the case of classical impedance boundary conditions, as well as the case of transmission impedance conditions wherein the impedances are certain coercive operators. The latter type of problems is instrumental in the speed up of the convergence of Domain Decomposition Methods for Helmholtz problems. Our regularized formulations use as unknowns the Dirichlet traces of the solution on the boundary of the domain. Taking advantage of the increased regularity of the unknowns in our formulations, we show through a variety of numerical results that a graded-mesh based Nystr\\\"om discretization of these regularized formulations leads to efficient and accurate solutions of interior and exterior Helmholtz problems with impedance boundary conditions.
The present work is devoted to approximation of the statistical moments of the unknown solution of a class of elliptic transmission problems in $\\mathbb R^3$ with randomly perturbed interfaces. Within this model, the diffusion coefficient has a jump discontinuity across the random transmission interface which models linear diffusion in two different media separated by an uncertain surface. We apply the shape calculus approach to approximate solution s perturbation by the so-called shape derivative, correspondingly statistical moments of the solution s perturbation are approximated by the moments of the shape derivative. We characterize the shape derivative as a solution of a related homogeneous transmission problem with nonzero jump conditions which can be solved with the aid of boundary integral equations. We develop a rigorous theoretical framework for this method, particularly i) extending the method to the case of unbounded domains and ii) closing the gaps and clarifying and adapting results in the existing literature. The theoretical findings are supported by and illustrated in two particular examples.
In this paper, a fully discrete local discontinuous Galerkin (LDG) finite element method is considered for solving the time-fractional KdV-Burgers-Kuramoto (KBK) equation. The scheme is based on a finite difference method in time and local discontinuous Galerkin methods in space. We prove that our scheme is unconditional stable and $L^2$ error estimate for the linear case with the convergence rate $O(h^{k+1}+(\\Delta t)^2+(\\Delta t)^\\frac{\\alpha}{2}h^{k+1/2})$. Numerical examples are presented to show the efficiency and accuracy of our scheme.
An elliptic partial differential equation Lu=f with a zero Dirichlet boundary condition is converted to an equivalent elliptic equation on the unit ball. A spectral Galerkin method is applied to the reformulated problem, using multivariate polynomials as the approximants. For a smooth boundary and smooth problem parameter functions, the method is proven to converge faster than any power of 1/n with n the degree of the approximate Galerkin solution. Examples in two and three variables are given as numerical illustrations. Empirically, the condition number of the associated linear system increases like O(N), with N the order of the linear system.
In the analysis of structures under dynamic loads, selection of a proper time step has a great influence to reach exact results. In this research determination of proper time step in dynamic analysis of railway bridges under high speed moving loads is considered. Dynamic responses of four simple span steel bridges with 10, 15, 20 and 25 meter length to moving trains with speed from 100 to 400 km/h and axle distances from 13 to 23 meter are calculated considering different time steps in analysis. The results indicate that by increase in moving speed of vehicle (increase in loading speed) the length of proper time step for dynamic analysis is reduced. In contrast by increase in span length (increase in bridge vibration period) longer time steps can be used in dynamic analysis. In this research by investigation of dynamic analysis results, an equation is suggested for determination of proper time step for dynamic analysis of bridges under moving loads.
Only a few numerical methods can treat boundary value problems on polygonal and polyhedral meshes. The BEM-based Finite Element Method is one of the new discretization strategies, which make use of and benefits from the flexibility of these general meshes that incorporate hanging nodes naturally. The article in hand addresses quasi-interpolation operators for the approximation space over polygonal meshes. To prove interpolation estimates the Poincar\\ e constant is bounded uniformly for patches of star-shaped elements. These results give rise to the residual based error estimate for high order BEM-based FEM and its reliability as well as its efficiency are proven. Such a posteriori error estimates can be used to gauge the approximation quality and to implement adaptive FEM strategies. Numerical experiments show optimal rates of convergence for meshes with non-convex elements on uniformly as well as on adaptively refined meshes.
We extend backward step control for the globalization of convergence of Newton-type methods for nonlinear root finding problems from the finite dimensional to a Hilbert space setting. We show that the method itself can be transferred as is and that subtle adaptions in the required assumptions lead to an equally powerful convergence theory as in the finite dimensional case. The results include global convergence to a distinctive solution characterized by propagating the initial guess by a generalized Newton flow with guaranteed bounds on the discrete nonlinear residual norm decrease and an (also numerically) easily controllable asymptotic linear residual convergence rate. The convergence theory can be exploited to construct efficient numerical methods, which we demonstrate for the case of a Krylov-Newton method and an approximation-by-discretization framework. Both approaches optimize the asymptotic linear residual convergence rate, either over the Krylov subspace or through adaptive discretization, which in turn yields practical and efficient stopping criteria and refinement strategies that balance the linearization errors with the approximation errors of the linear systems. We apply these methods to the class of nonlinear elliptic boundary value problems and present numerical results for the Carrier equation and the minimum surface equation.
In book II of Newton s \"Principia Mathematica\" of 1687 several applicative problems are introduced and solved. There, we can find the formulation of the first calculus of variations problem that leads to the first free boundary problem of history. The general calculus of variations problem is concerned with the optimal shape design for the motion of projectiles subject to air resistance. Here, for Newton s optimal nose cone free boundary problem, we define a non-iterative initial value method which is referred in literature as transformation method. To define this method we apply invariance properties of Newton s free boundary problem under a scaling group of point transformations. Finally, we compare our non-iterative numerical results with those available in literature and obtained via an iterative shooting method. We emphasize that our non-iterative method is faster than shooting or collocation methods and does not need any preliminary computation to test the target function as the iterative method or even provide any initial iterate. Moreover, applying Buckingham Pi-Theorem we get the functional relation between the unknown free boundary and the nose cone radius and height.
It is well known that Forward Time and Centred in Space (FTCS) scheme for scalar Hyperbolic Conservation Law (HCL) is unconditionally unstable. The main contribution of this work to show that FTCS is conditionally stable for HCL. A new approach is used to give bounds on the initial data profile by transforming FTCS into two point convex combination scheme. Numerical results are given in support of the claim.
Implicit particle filters for data assimilation update the particles by first choosing probabilities and then looking for particle locations that assume them, guiding the particles one by one to the high probability domain. We provide a detailed description of these filters, with illustrative examples, together with new, more general, methods for solving the algebraic equations and with a new algorithm for parameter identification.
In this paper, we show that efficient separated sum-of-exponentials approximations can be constructed for the heat kernel in any dimension. In one space dimension, the heat kernel admits an approximation involving a number of terms that is of the order $O(\\log(\\frac{T}{\\delta}) (\\log(\\frac{1}{\\epsilon})+\\log\\log(\\frac{T}{\\delta})))$ for any $x\\in\\bbR$ and $\\delta \\leq t \\leq T$, where $\\epsilon$ is the desired precision. In all higher dimensions, the corresponding heat kernel admits an approximation involving only $O(\\log^2(\\frac{T}{\\delta}))$ terms for fixed accuracy $\\epsilon$. These approximations can be used to accelerate integral equation-based methods for boundary value problems governed by the heat equation in complex geometry. The resulting algorithms are nearly optimal. For $N_S$ points in the spatial discretization and $N_T$ time steps, the cost is $O(N_S N_T \\log^2 \\frac{T}{\\delta})$ in terms of both memory and CPU time for fixed accuracy $\\epsilon$. The algorithms can be parallelized in a straightforward manner. Several numerical examples are presented to illustrate the accuracy and stability of these approximations.
Weighted essentially non-oscillatory (WENO) and finite volume (FV) methods employ different philosophies in their way to perform limiting. We show that a generalized view on limiter functions, which considers a two-dimensional, rather than a one-dimensional dependence on the slopes in neighboring cells, allows to write WENO3 and $3^\\text{rd}$-order FV schemes in the same fashion. Within this framework, it becomes apparent that the classical approach of FV limiters to only consider ratios of the slopes in neighboring cells, is overly restrictive. The hope of this new perspective is to establish new connections between WENO3 and FV limiter functions, which may give rise to improvements for the limiting behavior in both approaches.
Because of the finiteness of the life span and boundedness of the physical space, the more reasonable or physical choice is the tempered power-law instead of pure power-law for the CTRW model in characterizing the waiting time and jump length of the motion of particles. This paper focuses on providing the variational formulation and efficient implementation for solving the corresponding deterministic/macroscopic models, including the space tempered fractional equation and time tempered fractional equation. The convergence, numerical stability, and a series of variational equalities are theoretically proved. And the theoretical results are confirmed by numerical experiments.
We design consistent discontinuous Galerkin finite element schemes for the approximation of a quasi-incompressible two phase flow model of Allen-Cahn/Cahn-Hilliard/Navier-Stokes-Korteweg type which allows for phase transitions. We show that the scheme is mass conservative and monotonically energy dissipative. In this case the dissipation is isolated to discrete equivalents of those effects already causing dissipation on the continuous level, that is, there is no artificial numerical dissipation added into the scheme. In this sense the methods are consistent with the energy dissipation of the continuous PDE system.
The aim of this paper is to establish convergence, properties and error bounds for the fully discrete solutions of a class of nonlinear systems of reaction-diffusion nonlocal type with moving boundaries, using the finite element method with polynomial approximations of any degree. A coordinate transformation which fixes the boundaries is used. Some numerical tests to compare our Matlab code with a moving finite element method are investigated.
This paper presents a hybridized formulation for the weak Galerkin mixed finite element method (WG-MFEM) which was introduced and analyzed for second order elliptic equations. The WG-MFEM method was designed by using discontinuous piecewise polynomials on finite element partitions consisting of polygonal or polyhedral elements of arbitrary shape. The key to WG-MFEM is the use of a discrete weak divergence operator which is defined and computed by solving inexpensive problems locally on each element. The hybridized formulation of this paper leads to a significantly reduced system of linear equations involving only the unknowns arising from the Lagrange multiplier in hybridization. Optimal-order error estimates are derived for the hybridized WG-MFEM approximations. Some numerical results are reported to confirm the theory and a superconvergence for the Lagrange multiplier.
An entropy-bounded Discontinuous Galerkin (EBDG) scheme is proposed in which the solution is regularized by constraining the entropy. The resulting scheme is able to stabilize the solution in the vicinity of discontinuities and retains the optimal accuracy for smooth solutions. The properties of the limiting operator according to the entropy-minimum principle are proofed analytically, and an optimal CFL-criterion is derived. We provide a rigorous description for locally imposing entropy constraints to capture multiple discontinuities. Significant advantages of the EBDG-scheme are the general applicability to arbitrary high-order elements and its simple implementation for two- and three-dimensional configurations. Numerical tests confirm the properties of the scheme, and particular focus is attributed to the robustness in treating discontinuities on arbitrary meshes.
A fast explicit operator splitting (FEOS) method for the molecular beam epitaxy model has been presented in [Cheng, et al., Fast and stable explicit operator splitting methods for phase-field models, J. Comput. Phys., submitted]. The original problem is split into linear and nonlinear subproblems. For the linear part, the pseudo-spectral method is adopted; for the nonlinear part, a 33-point difference scheme is constructed. Here, we give a compact center-difference scheme involving fewer points for the nonlinear subproblem. Besides, we analyze the convergence rate of the algorithm. The global error order $\\mathcal{O}(\\tau^2+h^4)$ in discrete $L^2$-norm is proved theoretically and verified numerically. Some numerical experiments show the robustness of the algorithm for small coefficients of the fourth-order term for the one-dimensional case. Besides, coarsening dynamics are simulated in large domains and the $1/3$ power laws are observed for the two-dimensional case.
The very weak solution of the Poisson equation with $L^2$ boundary data is defined by the method of transposition. The finite element solution with regularized boundary data converges in the $L^2(\\Omega)$-norm with order $1/2$ in convex domains but has a reduced convergence order in non-convex domains although the solution remains to be contained in $H^{1/2}(\\Omega)$. The reason is a singularity in the dual problem. In this paper we propose and analyze, as a remedy, both a standard finite element method with mesh grading and a dual variant of the singular complement method. The error order 1/2 is retained in both cases also with non-convex domains. Numerical experiments confirm the theoretical results.
Over the last few years there have been dramatic advances in our understanding of mathematical and computational models of complex systems in the presence of uncertainty. This has led to a growth in the area of uncertainty quantification as well as the need to develop efficient, scalable, stable and convergent computational methods for solving differential equations with random inputs. Stochastic Galerkin methods based on polynomial chaos expansions have shown superiority to other non-sampling and many sampling techniques. However, for complicated governing equations numerical implementations of stochastic Galerkin methods can become non-trivial. On the other hand, Monte Carlo and other traditional sampling methods, are straightforward to implement. However, they do not offer as fast convergence rates as stochastic Galerkin. Other numerical approaches are the stochastic collocation (SC) methods, which inherit both, the ease of implementation of Monte Carlo and the robustness of stochastic Galerkin to a great deal. However, stochastic collocation and its powerful extensions, e.g. sparse grid stochastic collocation, can simply fail to handle more levels of complication. The seemingly innocent Burgers equation driven by Brownian motion is such an example. In this work we propose a novel enhancement to stochastic collocation methods using locally improved deterministic model reduction techniques that can handle this pathological example and hopefully other more complicated equations like Stochastic Navier-Stokes. Local improvements to reduced-order models are achieved using sensitivity analysis of the proper orthogonal decomposition. Our numerical results show that the proposed technique is not only reliable and robust but also very efficient.
For trigonometric and modified trigonometric integrators applied to oscillatory Hamiltonian differential equations with one or several constant high frequencies, near-conservation of the total and oscillatory energies are shown over time scales that cover arbitrary negative powers of the step size. This requires non-resonance conditions between the step size and the frequencies, but in contrast to previous results the results do not require any non-resonance conditions among the frequencies. The proof uses modulated Fourier expansions with appropriately modified frequencies.
We propose a new finite element method for the three-field formulation of Biot s consolidation model in poroelasticity and prove a priori error estimates. Uniform-in-time error estimates of all the unknowns are obtained for both semidiscrete solutions and fully discrete solutions with the backward Euler time discretization. The novelty of our method is that the error analysis does not require the assumption that the constrained specific storage coefficient is uniformly positive. Therefore the method is guaranteed to be locking-free without the additional assumption on material parameters.
We consider the computation of stable approximations to the exact solution $x^\\dag$ of nonlinear ill-posed inverse problems $F(x)=y$ with nonlinear operators $F:X\\to Y$ between two Hilbert spaces $X$ and $Y$ by the Newton type methods $$ x_{k+1}^\\delta=x_0-g_{\\alpha_k} (F (x_k^\\delta)^*F (x_k^\\delta)) F (x_k^\\delta)^* (F(x_k^\\delta)-y^\\delta-F (x_k^\\delta)(x_k^\\delta-x_0)) $$ in the case that only available data is a noise $y^\\delta$ of $y$ satisfying $\\|y^\\delta-y\\|\\le \\delta$ with a given small noise level $\\delta>0$. We terminate the iteration by the discrepancy principle in which the stopping index $k_\\delta$ is determined as the first integer such that $$ \\|F(x_{k_\\delta}^\\delta)-y^\\delta\\|\\le \\tau \\delta <\\|F(x_k^\\delta)-y^\\delta\\|, \\qquad 0\\le k<k_\\delta $$ with a given number $\\tau>1$. Under certain conditions on $\\{\\alpha_k\\}$, $\\{g_\\alpha\\}$ and $F$, we prove that $x_{k_\\delta}^\\delta$ converges to $x^\\dag$ as $\\delta\\to 0$ and establish various order optimal convergence rate results. It is remarkable that we even can show the order optimality under merely the Lipschitz condition on the Fr\\ {e}chet derivative $F $ of $F$ if $x_0-x^\\dag$ is smooth enough.
High order strong stability preserving (SSP) time discretizations are advantageous for use with spatial discretizations with nonlinear stability properties for the solution of hyperbolic PDEs. The search for high order strong stability time-stepping methods with large allowable strong stability time-step has been an active area of research over the last two decades. Recently, multiderivative time-stepping methods have been implemented with hyperbolic PDEs. In this work we describe sufficient conditions for a two-derivative multistage method to be SSP, and find some optimal SSP multistage two-derivative methods. While explicit SSP Runge--Kutta methods exist only up to fourth order, we show that this order barrier is broken for explicit multi-stage two-derivative methods by designing a three stage fifth order SSP method. These methods are tested on simple scalar PDEs to verify the order of convergence, and demonstrate the need for the SSP condition and the sharpness of the SSP time-step in many cases.
In this paper numerical methods of computing distances between two Radon measures on R are discussed. Efficient algorithms for Wasserstein-type metrics are provided. In particular, we propose a novel algorithm to compute the flat metric (bounded Lipschitz distance) with a computational cost O(nlogn). The flat distance has recently proven to be adequate for the Escalator Boxcar Train (EBT) method for solving transport equations with growth terms. Therefore, finding efficient numerical algorithms to compute the flat distance between two measures is important for finding the residual error and validating empirical convergence of different methods.
A new class of asynchronous discrete-event simulation schemes for advection-diffusion-reaction equations are introduced, which is based on the principle of allowing quanta of mass to pass through faces of a Cartesian finite volume grid. The timescales of these events are linked to the flux on the the face, and the schemes are self-adaptive, local in time and space. Experiments are performed on realistic physical systems related to porous media flow applications, including a large 3D advection diffusion equation and advection diffusion reaction systems. The results are compared to highly accurate results where the temporal evolution is computed with exponential integrator schemes using the same finite volume discretisation. This allows a reliable estimation of the solution error. Our results indicate a first order convergence of the error as a control parameter is decreased.
We investigate the rate of convergence of linear sampling numbers of the embedding $H^{\\alpha,\\beta} (\\mathbb{T}^d) \\hookrightarrow H^\\gamma (\\mathbb{T}^d)$. Here $\\alpha$ governs the mixed smoothness and $\\beta$ the isotropic smoothness in the space $H^{\\alpha,\\beta}(\\mathbb{T}^d)$ of hybrid smoothness, whereas $H^{\\gamma}(\\mathbb{T}^d)$ denotes the isotropic Sobolev space. If $\\gamma>\\beta$ we obtain sharp polynomial decay rates for the first embedding realized by sampling operators based on \"energy-norm based sparse grids\" for the classical trigonometric interpolation. This complements earlier work by Griebel, Knapek and D\\~ung, Ullrich, where general linear approximations have been considered. In addition, we study the embedding $H^\\alpha_{mix} (\\mathbb{T}^d) \\hookrightarrow H^{\\gamma}_{mix}(\\mathbb{T}^d)$ and achieve optimality for Smolyak s algorithm applied to the classical trigonometric interpolation. This can be applied to investigate the sampling numbers for the embedding $H^\\alpha_{mix} (\\mathbb{T}^d) \\hookrightarrow L_q(\\mathbb{T}^d)$ for $2<q\\leq \\infty$ where again Smolyak s algorithm yields the optimal order. The precise decay rates for the sampling numbers in the mentioned situations always coincide with those for the approximation numbers, except probably in the limiting situation $\\beta = \\gamma$ (including the embedding into $L_2(\\mathbb{T}^d)$). The best what we could prove there is a (probably) non-sharp results with a logarithmic gap between lower and upper bound.
In this paper we present a locally one-dimensional (LOD) splitting method to solve numerically the two-dimensional Black-Scholes equation, arising in the Hull & White model for pricing European options with stochastic volatility, characterized by the presence of a mixed derivative term. The parabolic equation degenerates on the boundary x = 0 and we apply a fitted finite-volume difference scheme, proposed in [23], in order to resolve the degeneration. Discrete maximum principle is proved and therefore our method preserves the non-negativity. Numerical experiments illustrate the efficiency of our difference scheme.
We present superalgebraic compatible Nystr\\\"om discretizations for the four Helmholtz boundary operators of Calder\\ {o}n s calculus on smooth closed curves in 2D. These discretizations are based on appropriate splitting of the kernels combined with very accurate product-quadrature rules for the different singularities that such kernels present. A Fourier based analysis shows that the four discrete operators converge to the continuous ones in appropriate Sobolev norms. This proves that Nystr\\\"om discretizations of many popular integral equation formulations for Helmholtz equations are stable and convergent. The convergence is actually superalgebraic for smooth solutions.
In this contribution we develop a cut finite element method with boundary value correction of the type originally proposed by Bramble, Dupont, and Thomee. The cut finite element method is a fictitious domain method with Nitsche type enforcement of Dirichlet conditions together with stabilization of the elements at the boundary which is stable and enjoy optimal order approximation properties. A computational difficulty is, however, the geometric computations related to quadrature on the cut elements which must be accurate enough to achieve higher order approximation. With boundary value correction we may use only a piecewise linear approximation of the boundary, which is very convenient in a cut finite element method, and still obtain optimal order convergence. The boundary value correction is a modified Nitsche formulation involving a Taylor expansion in the normal direction compensating for the approximation of the boundary. Key to the analysis is a consistent stabilization term which enables us to prove stability of the method and a priori error estimates with explicit dependence on the meshsize and distance between the exact and approximate boundary.
In this paper a new adaptive algorithm for multi-rate circuit simulation encountered in the design of RF circuits based on spline wavelets is presented. The circuit ordinary differential equations are first rewritten by a system of (multi-rate) partial differential equations (MPDEs) in order to decouple the different time scales. Second, a semi-discretization by Rothe s method of the MPDEs results in a system of differential algebraic equations (DAEs) with periodic boundary conditions. These boundary value problems are solved by a Galerkin discretization using spline functions. An adaptive spline grid is generated, using spline wavelets for non-uniform grids. Moreover the instantaneous frequency is chosen adaptively to guarantee a smooth envelope resulting in large time steps and therefore high run time efficiency. Numerical tests on circuits exhibiting multi-rate behavior including mixers and PLL conclude the paper.
In the present paper we are concerned with a numerical algorithm for the approximation of the two-dimensional neural field equation with delay. We consider three numerical examples that have been analysed before by other authors and are directly connected with real world applications. The main purposes are 1) to test the performance of the mentioned algorithm, by comparing the numerical results with those obtained by other authors; 2) to analyse with more detail the properties of the solutions and take conclusions about their physical meaning.
It is known that the 3-node hybrid triangular element MiSP3 and 4-node hybrid quadrilateral element MiSP4 presented by Ayad, Dhatt and Batoz (Int. J. Numer. Meth. Engng 1998, 42: 1149-1179) for Reissner-Mindlin plates behave robustly in numerical benchmark tests. These two elements are based on Hellinger-Reissner variational principle, where continuous piecewise linear/isoparametric bilinear interpolations, as well as the mixed shear interpolation/projection technique of MITC family, are used for the approximations of displacements, and piecewise-independent equilibrium modes are used for the approximation of bending moments/shear stresses. We show that the MiSP3 and MiSP4 elements are uniformly stable with respect to the plate thickness and thus free from shear-locking.
This paper draws on two sources of motivation: (1) The European Union Emission Trading Scheme (EU-ETS) aims at limiting the overall emissions of greenhouse gases. The optimal abatement strategy of companies for the use of emission permits can be described as the viscosity solution of a Hamilton-Jacobi-Bellman (HJB) equation. It is a question of general interest, how regulatory constraints can be set within the EU-ETS in order to reach certain political goals such as a good balance of emission reduction and economical growth. Such regulatory constraints can be modeled as parameters within the HJB equation. (2) The EU-ETS is just one example where one is interested in solving a parameterized HJB equation often for different values of the parameters (e.g.\\ to optimize their values with respect to a given target functional). The Reduced Basis Method (RBM) is by now a well-established numerical method to efficiently solve parameterized partial differential equations. However, to the best of our knowledge, an RBM for the HJB equation is not known so far and of (mathematical) interest by its own, since the HJB equation is of hyperbolic type which is in general a nontrivial task for model reduction. We analyze and realize a RBM for the HJB equation. In particular, we construct an online-efficient error estimator for this nonlinear problem using the Brezzi-Rapaz-Raviart (RBB) theory as well as numerical algorithms for the involved parameter-dependent constants. Numerical experiments are presented.
This paper analyzes a two-level algorithm for the weak Galerkin (WG) finite element methods based on local Raviart-Thomas (RT) and Brezzi-Douglas-Marini (BDM) mixed elements for two- and three-dimensional diffusion problems with Dirichlet condition. We first show the condition numbers of the stiffness matrices arising from the WG methods are of $O(h^{-2})$. We use an extended version of the Xu-Zikatanov (XZ) identity to derive the convergence of the algorithm without any regularity assumption. Finally we provide some numerical results.
We propose a framework for unified analysis of mixed methods for elasticity with weakly symmetric stress. Based on a commuting diagram in the weakly symmetric elasticity complex and extending a previous stability result, stable mixed methods are obtained by combining Stokes stable and elasticity stable finite elements. We show that the framework can be used to analyze most existing mixed methods for the elasticity problem with elementary techniques. We also show that some new stable mixed finite elements are obtained.
This paper deals with a class of macroscopic models for cell migration in a saturated medium for two-species mixtures. Those species tend to achieve some motion according to a desired velocity, and congestion forces them to adapt their velocity. This adaptation is modelled by a correction velocity which is chosen minimal in a least-square sense. We are especially interested in two situations: a single active species moves in a passive matrix (cell migration) with a given desired velocity, and a closed-loop Keller-Segel type model, where the desired velocity is the gradient of a self-emitted chemoattractant. We propose a theoretical framework for the open-loop model (desired velocities are defined as gradients of given functions) based on a formulation in the form of a gradient flow in the Wasserstein space. We propose a numerical strategy to discretize the model, and illustrate its behaviour in the case of a prescribed velocity, and for the saturated Keller-Segel model.
Laplacian matrices of graphs arise in large-scale computational applications such as semi-supervised machine learning; spectral clustering of images, genetic data and web pages; transportation network flows; electrical resistor circuits; and elliptic partial differential equations discretized on unstructured grids with finite elements. A Lean Algebraic Multigrid (LAMG) solver of the symmetric linear system Ax=b is presented, where A is a graph Laplacian. LAMG s run time and storage are empirically demonstrated to scale linearly with the number of edges. LAMG consists of a setup phase during which a sequence of increasingly-coarser Laplacian systems is constructed, and an iterative solve phase using multigrid cycles. General graphs pose algorithmic challenges not encountered in traditional multigrid applications. LAMG combines a lean piecewise-constant interpolation, judicious node aggregation based on a new node proximity measure (the affinity), and an energy correction of coarse-level systems. This results in fast convergence and substantial setup and memory savings. A serial LAMG implementation scaled linearly for a diverse set of 3774 real-world graphs with up to 47 million edges, with no parameter tuning. LAMG was more robust than the UMFPACK direct solver and Combinatorial Multigrid (CMG), although CMG was faster than LAMG on average. Our methodology is extensible to eigenproblems and other graph computations.
This paper deals with the convolution powers of the characteristic function of $[0,1], \\chi_{[0,1]}$ and its function-derivatives. The importance that such convolution products have can be seen, for an instance, at \\cite{DahmenLatour} where there is the need to find the best differentiable splines as regularization tool to be used to expand functions or in the spectral analysis of signals. Another simple application of these convolution powers is in the construction of a partition of the unity of a very high class of differentiability. Here, some properties of these convolution powers have been obtained which easily led to write the algorithm to produce convolution powers of $\\chi_{[0,1]}$ and their function-derivatives. This algorithm was written in {\\tt calc}, the program published under GPL that is free to download.
This work is concerned with the accuracy of Gaussian beam superpositions, which are asymptotically valid high frequency solutions to linear hyperbolic partial differential equations and the Schr\\\"odinger equation. We derive Sobolev and max norms estimates for the difference between an exact solution and the corresponding Gaussian beam approximation, in terms of the short wavelength $\\varepsilon$. The estimates are performed for the scalar wave equation and the Schr\\\"odinger equation. Our result demonstrates that a Gaussian beam superposition with $k$-th order beams converges to the exact solution as $O(\\varepsilon^{k/2-s})$ in order $s$ Sobolev norms. This result is valid in any number of spatial dimensions and it is unaffected by the presence of caustics in the solution. In max norm, we show that away from caustics the convergence rate is $O(\\varepsilon^{\\lceil k/2\\rceil})$ and away from the essential support of the solution, the convergence is spectral in $\\varepsilon$. However, in the neighborhood of a caustic point we are only able to show the slower, and dimensional dependent, rate $O(\\varepsilon^{(k-n)/2})$ in $n$ spatial dimensions.
An efficient and reliable stress computation algorithm is presented, which is based on implicit integration of the local evolution equations of multiplicative finite-strain plasticity/viscoplasticity. The algorithm is illustrated by an example involving a combined nonlinear isotropic/kinematic hardening; numerous backstress tensors are employed for a better description of the material behavior. The considered material model exhibits the so-called weak invariance under arbitrary isochoric changes of the reference configuration, and the presented algorithm retains this useful property. Even more: the weak invariance serves as a guide in constructing this algorithm. The constraint of inelastic incompressibility is exactly preserved as well. The proposed method is first-order accurate. Concerning the accuracy of the stress computation, the new algorithm is comparable to the Euler Backward method with a subsequent correction of incompressibility (EBMSC) and the classical exponential method (EM). Regarding the computational efficiency, the new algorithm is superior to the EBMSC and EM. Some accuracy tests are presented using parameters of the aluminum alloy 5754-O and the 42CrMo4 steel. FEM solutions of two boundary value problems using MSC.MARC are presented to show the correctness of the numerical implementation.
We shall investigate randomized algorithms for solving large-scale linear inverse problems with general regularizations. We first present some techniques to transform inverse problems of general form into the ones of standard form, then apply randomized algorithms to reduce large-scale systems of standard form to much smaller-scale systems and seek their regularized solutions in combination with some popular choice rules for regularization parameters. Then we will propose a second approach to solve large-scale ill-posed systems with general regularizations. This involves a new randomized generalized SVD algorithm that can essentially reduce the size of the original large-scale ill-posed systems. The reduced systems can provide approximate regularized solutions with about the same accuracy as the ones by the classical generalized SVD, and more importantly, the new approach gains obvious robustness, stability and computational time as it needs only to work on problems of much smaller size. Numerical results are given to demonstrated the efficiency of the algorithms.
We present and analyze a new space-time parallel multigrid method for parabolic equations. The method is based on arbitrarily high order discontinuous Galerkin discretizations in time, and a finite element discretization in space. The key ingredient of the new algorithm is a block Jacobi smoother. We present a detailed convergence analysis when the algorithm is applied to the heat equation, and determine asymptotically optimal smoothing parameters, a precise criterion for semi-coarsening in time or full coarsening, and give an asymptotic two grid contraction factor estimate. We then explain how to implement the new multigrid algorithm in parallel, and show with numerical experiments its excellent strong and weak scalability properties.
In this work, a geometric discretization of the Navier-Stokes equations is sought by treating momentum as a covector-valued volume-form. The novelty of this approach is that we treat conservation of momentum as a tensor equation and describe a higher order approximation to this tensor equation. The resulting scheme satisfies mass and momentum conservation laws exactly, and resembles a staggered-mesh finite-volume method. Numerical test-cases to which the discretization scheme is applied are the Kovasznay flow, and lid-driven cavity flow.
In many applications, the information about the number of eigenvalues inside a given region is required. In this paper, we propose a contour-integral based method for this purpose. The new method is motivated by two findings. There exist methods for estimating the number of eigenvalues inside a region in the complex plane. But our method is able to compute the number of eigenvalues inside the given region exactly. An appealing feature of our method is that it can integrate with the recently developed contour-integral based eigensolvers to help them detect whether all desired eigenvalues are found. Numerical experiments are reported to show the viability of our new method.
The shallow water equations provide a useful analogue of the fully compressible Euler equations since they have similar characteristics: conservation laws, inertia-gravity and Rossby waves and a (quasi-) balanced state. In order to obtain realistic simulation results, it is desirable that numerical models have discrete analogues of these properties. Two prototypical examples of such schemes are the 1981 Arakawa and Lamb (AL81) C-grid total energy and potential enstrophy conserving scheme, and the 2007 Salmon (S07) Z-grid total energy and potential enstrophy conserving scheme. Unfortunately, the AL81 scheme is restricted to logically square, orthogonal grids; and the S07 scheme is restricted to uniform square grids. The current work extends the AL81 scheme to arbitrary non-orthogonal polygonal grids and the S07 scheme to arbitrary orthogonal spherical polygonal grids in a manner that allows both total energy and potential enstrophy conservation, by combining Hamiltonian methods (work done by Salmon, Gassmann, Dubos and others) and Discrete Exterior Calculus (Thuburn, Cotter, Dubos, Ringler, Skamarock, Klemp and others). Detailed results of the schemes applied to standard test cases are deferred to Part 2 of this series of papers.
We consider the solution of large linear systems of equations that arise when two-dimensional singularly perturbed reaction-diffusion equations are discretized. Standard methods for these problems, such as central finite differences, lead to system matrices that are positive definite. The direct solvers of choice for such systems are based on Cholesky factorisation. However, as observed by MacLachlan and Madden (SIAM J. Sci. Comput. 35-5 (2013), pp. A2225-A2254), these solvers may exhibit poor performance for singularly perturbed problems. We provide an analysis of the distribution of entries in the factors based on their magnitude that explains this phenomenon, and give bounds on the ranges of the perturbation and discretization parameters where poor performance is to be expected.
While the use of finite element methods for the numerical approximation of eigenvalues is a well-studied problem, the use of serendipity elements for this purpose has received little attention in the literature. We show by numerical experiments that serendipity elements, which are defined on a square reference geometry, can attain the same order of accuracy as their tensor product counterparts while using dramatically fewer degrees of freedom. In some cases, the serendipity method uses only half as many basis functions as the tensor product method while still producing the same numerical approximation of an eigenvalue. To encourage the further use and study of serendipity elements, we provide a table of serendipity basis functions for low order cases and a Mathematica file that can be used to generate the basis functions for higher order cases.
In this paper we investigate numerically the order of convergence of an isogeometric collocation method that builds upon the least-squares collocation method presented in [1] and the variational collocation method presented in [2]. The focus is on smoothest B-splines/NURBS approximations, i.e, having global $C^{p-1}$ continuity for polynomial degree $p$. Within the framework of [2], we select as collocation points a subset of those considered in [1], which are related to the Galerkin superconvergence theory. With our choice, that features local symmetry of the collocation stencil, we improve the convergence behaviour with respect to [2], achieving optimal $L^2$-convergence for odd degree B-splines/NURBS approximations. The same optimal order of convergence is seen in [1], where, however a least-squares formulation is adopted. Further careful study is needed, since the robustness of the method and its mathematical foundation are still unclear.
In this paper, the fractional differential matrices based on the Jacobi-Gauss points are derived with respect to the Caputo and Riemann-Liouville fractional derivative operators. The spectral radii of the fractional differential matrices are investigated numerically. The spectral collocation schemes are illustrated to solve the fractional ordinary differential equations and fractional partial differential equations. Numerical examples are also presented to illustrate the effectiveness of the derived methods, which show better performances over some existing methods.
In this paper we consider Galerkin-finite element methods that approximate the solutions of initial-boundary-value problems in one space dimension for parabolic and Schr\\\"odinger evolution equations with dynamical boundary conditions. Error estimates of optimal rates of convergence in $L^2$ and $H^1$ are proved for the accociated semidiscrete and fully discrete Crank-Nicolson-Galerkin approximations. The problem involving the Schr\\\"odinger equation is motivated by considering the standard `parabolic  (paraxial) approximation to the Helmholtz equation, used in underwater acoustics to model long-range sound propagation in the sea, in the specific case of a domain with a rigid bottom of variable topography. This model is contrasted with alternative ones that avoid the dynamical bottom boundary condition and are shown to yield qualitatively better approximations. In the (real) parabolic case, numerical approximations are considered for dynamical boundary conditions of reactive and dissipative type.
We present a new approach to convexification of the Tikhonov regularization using a continuation method strategy. We embed the original minimization problem into a one-parameter family of minimization problems. Both the penalty term and the minimizer of the Tikhonov functional become dependent on a continuation parameter. In this way we can independently treat two main roles of the regularization term, which are stabilization of the ill-posed problem and introduction of the a priori knowledge. For zero continuation parameter we solve a relaxed regularization problem, which stabilizes the ill-posed problem in a weaker sense. The problem is recast to the original minimization by the continuation method and so the a priori knowledge is enforced. We apply this approach in the context of topology-to-shape geometry identification, where it allows to avoid the convergence of gradient-based methods to a local minima. We present illustrative results for magnetic induction tomography which is an example of PDE constrained inverse problem.
The Grassmannian space $\\mathcal G_{k,d}$ is naturally identified with the set of projectors of rank $k$ in $d$-dimensional Euclidean space. As a symmetric homogeneous space of the orthogonal group $\\mathcal O(d)$, the dimension of the space of polynomials of degree at most $t$ is known. Moreover, the concepts of Grassmannian $t$-designs and cubature points as finite representatives of the entire ensemble have been well-studied. Here, we investigate the harmonic analysis needed for polynomial approximation of functions on unions of Grassmannians $\\mathcal G_{{k_1},d}\\cup\\ldots\\cup \\mathcal G_{{k_r},d}$. We derive the decomposition of polynomial spaces on unions of Grassmannians into components of irreducible orthogonally invariant subspaces, enabling us to determine the dimension of the space of polynomials of degree at most $t$. The concept of cubature points and $t$-designs is then generalized to projectors of varying rank. We derive a characterization as minimizers of a suitable energy potential, so that $t$-designs in unions of Grassmannians can be constructed by numerical optimization procedures. We also present new analytic families of $t$-designs, for $t=1,2,3$.
We describe a general strategy for the verification of variational source condition by formulating two sufficient criteria describing the smoothness of the solution and the degree of ill-posedness of the forward operator in terms of a family of subspaces. For linear deterministic inverse problems we show that variational source conditions are necessary and sufficient for convergence rates slower than the square root of the noise level. A similar result is shown for linear inverse problems with white noise. If the forward operator can be written in terms of the functional calculus of a Laplace-Beltrami operator, variational source conditions can be characterized by Besov spaces. This is discussed for a number of prominent inverse problems.
Partitioning a graph into three pieces, with two of them large and connected, and the third a small ``separator   set, is useful for improving the performance of a number of combinatorial algorithms. This is done using the second eigenvector of a matrix defined solely in terms of the incidence matrix, called the graph Laplacian. For sparse graphs, the eigenvector can be efficiently computed using the Lanczos algorithm. This graph partitioning algorithm is extended to provide a complete hierarchical subdivision of the graph. The method has been implemented and numerical results obtained both for simple test problems and for several grid graphs.
In this paper, we present a method for fast summation of long-range potentials on 3D lattices with multiple defects and having non-rectangular geometries, based on rank-structured tensor representations. This is a significant generalization of our recent technique for the grid-based summation of electrostatic potentials on the rectangular $L\\times L \\times L$ lattices by using the canonical tensor decompositions and yielding the $O(L)$ computational complexity instead of $O(L^3)$ by traditional approaches. The resulting lattice sum is calculated as a Tucker or canonical representation whose directional vectors are assembled by the 1D summation of the generating vectors for the shifted reference tensor, once precomputed on large $N\\times N \\times N$ representation grid in a 3D bounding box. The tensor numerical treatment of defects is performed in an algebraic way by simple summation of tensors in the canonical or Tucker formats. To diminish the considerable increase in the tensor rank of the resulting potential sum the $\\varepsilon$-rank reduction procedure is applied based on the generalized reduced higher-order SVD scheme. For the reduced higher-order SVD approximation to a sum of canonical/Tucker tensors, we prove the stable error bounds in the relative norm in terms of discarded singular values of the side matrices. The required storage scales linearly in the 1D grid-size, $O(N)$, while the numerical cost is estimated by $O(N L)$. Numerical tests confirm the efficiency of the presented tensor summation method: we demonstrate that a sum of millions of Newton kernels on a 3D lattice with defects/impurities can be computed in seconds in Matlab implementation.
In this article, we improve the convergence order of some finite volume solutions approximating some second order elliptic problems. We prove that finite volume approximations of order $O(h^{k+1})$, with $k$ integer, can be obtained after $k$ corrections, starting with finite volume solution of order $O(h)$, by using the same matrix and changing only the second member of the original system. This is done for general smooth second order elliptic problems in one dimension and for second order elliptic problems of the form $-\\Delta u+pu=f$, with Dirichlet conditions. Numerical tests justifying theoretical results and showing the efficiency of the method are presented. The idea used behind these results is the one of Fox s difference correction in the context of finite difference method.
One main issue, when numerically integrating autonomous Hamiltonian systems, is the long-term conservation of some of its invariants, among which the Hamiltonian function itself. Recently, a new class of methods, named \"Hamiltonian Boundary Value Methods (HBVMs)\" has been introduced and analysed, which are able to exactly preserve polynomial Hamiltonians of arbitrarily high degree. We here study a further property of such methods, namely that of having, when cast as Runge-Kutta methods, a matrix of the Butcher tableau with the same spectrum (apart the zero eigenvalues) as that of the corresponding Gauss-Legendre method, independently of the considered abscissae. Consequently, HBVMs are always perfectly A-stable methods. Moreover, this allows their efficient \"blended\" implementation, for solving the generated discrete problems.
In this paper, we study the unconditional convergence and error estimates of a Galerkin-mixed FEM with the linearized semi-implicit Euler time-discrete scheme for the equations of incompressible miscible flow in porous media. We prove that the optimal $L^2$ error estimates hold without any time-step (convergence) condition, while all previous works require certain time-step condition. Our theoretical results provide a new understanding on commonly-used linearized schemes for nonlinear parabolic equations. The proof is based on a splitting of the error function into two parts: the error from the time discretization of the PDEs and the error from the finite element discretization of corresponding time-discrete PDEs. The approach used in this paper is applicable for more general nonlinear parabolic systems and many other linearized (semi)-implicit time discretizations.
In application of the Balancing Domain Decomposition by Constraints (BDDC) to a case with many substructures, solving the coarse problem exactly becomes the bottleneck which spoils scalability of the solver. However, it is straightforward for BDDC to substitute the exact solution of the coarse problem by another step of BDDC method with subdomains playing the role of elements. In this way, the algorithm of three-level BDDC method is obtained. If this approach is applied recursively, multilevel BDDC method is derived. We present a detailed description of a recently developed parallel implementation of this algorithm. The implementation is applied to an engineering problem of linear elasticity and a benchmark problem of Stokes flow in a cavity. Results by the multilevel approach are compared to those by the standard (two-level) BDDC method.
We provide a priori error estimates for variational approximations of the ground state eigenvalue and eigenvector of nonlinear elliptic eigenvalue problems of the form $-{div} (A\\nabla u) + Vu + f(u^2) u = \\lambda u$, $\\|u\\|_{L^2}=1$. We focus in particular on the Fourier spectral approximation (for periodic problems) and on the $\\P_1$ and $\\P_2$ finite-element discretizations. Denoting by $(u_\\delta,\\lambda_\\delta)$ a variational approximation of the ground state eigenpair $(u,\\lambda)$, we are interested in the convergence rates of $\\|u_\\delta-u\\|_{H^1}$, $\\|u_\\delta-u\\|_{L^2}$ and $|\\lambda_\\delta-\\lambda|$, when the discretization parameter $\\delta$ goes to zero. We prove that if $A$, $V$ and $f$ satisfy certain conditions, $|\\lambda_\\delta-\\lambda|$ goes to zero as $\\|u_\\delta-u\\|_{H^1}^2+\\|u_\\delta-u\\|_{L^2}$. We also show that under more restrictive assumptions on $A$, $V$ and $f$, $|\\lambda_\\delta-\\lambda|$ converges to zero as $\\|u_\\delta-u\\|_{H^1}^2$, thus recovering a standard result for {\\em linear} elliptic eigenvalue problems. For the latter analysis, we make use of estimates of the error $u_\\delta-u$ in negative Sobolev norms.
We study Newton type methods for inverse problems described by nonlinear operator equations $F(u)=g$ in Banach spaces where the Newton equations $F (u_n;u_{n+1}-u_n) = g-F(u_n)$ are regularized variationally using a general data misfit functional and a convex regularization term. This generalizes the well-known iteratively regularized Gauss-Newton method (IRGNM). We prove convergence and convergence rates as the noise level tends to 0 both for an a priori stopping rule and for a Lepski{\\u\\i}-type a posteriori stopping rule. Our analysis includes previous order optimal convergence rate results for the IRGNM as special cases. The main focus of this paper is on inverse problems with Poisson data where the natural data misfit functional is given by the Kullback-Leibler divergence. Two examples of such problems are discussed in detail: an inverse obstacle scattering problem with amplitude data of the far-field pattern and a phase retrieval problem. The performence of the proposed method for these problems is illustrated in numerical examples.
We perform the a posteriori error analysis of residual type of a transmission problem with sign changing coefficients. According to [6] if the contrast is large enough, the continuous problem can be transformed into a coercive one. We further show that a similar property holds for the discrete problem for any regular meshes, extending the framework from [6]. The reliability and efficiency of the proposed estimator is confirmed by some numerical tests.
We consider well-balanced schemes for the following 1D scalar conservation law with source term: d_t u + d_x f(u) + z (x) b(u) = 0. More precisely, we are interested in the numerical approximation of the initial boundary value problem for this equation. While our main concern is a convergence result, we also have to extend Otto s notion of entropy solutions to conservation laws with a source term. To obtain uniqueness, we show that a generalization, the so-called entropy process solution, is unique and coincides with the entropy solution. If the initial and boundary data are essentially bounded, we can establish convergence to the entropy solution. Showing that the numerical solutions are bounded we can extract a weak*-convergent subsequence. Identifying its limit as an entropy process solution requires some effort as we cannot use Kruzkov-type entropy pairs here. We restrict ourselves to the Engquist-Osher flux and identify the numerical entropy flux for an arbitrary entropy pair. By the uniqueness result, the scheme then approximates the entropy solution and a result by Vovelle then guarantees that the convergence is strong in L^p for finite p.
We consider the numerical integration of the matrix Hill s equation. Parametric resonances can appear and this property is of great interest in many different physical applications. Usually, the Hill s equations originate from a Hamiltonian function and the fundamental matrix solution is a symplectic matrix. This is a very important property to be preserved by the numerical integrators. In this work we present new sixth-and eighth-order symplectic exponential integrators that are tailored to the Hill s equation. The methods are based on an efficient symplectic approximation to the exponential of high dimensional coupled autonomous harmonic oscillators and yield accurate results for oscillatory problems at a low computational cost. Several numerical examples illustrate the performance of the new methods.
Different variants of approximate inverse iteration like the locally optimal block preconditioned conjugate gradient method became in recent years increasingly popular for the solution of the large matrix eigenvalue problems arising from the discretization of selfadjoint elliptic partial differential equations, in particular for the calculation of the minimum eigenvalue. We extend in this little note the classical convergence theory of D yakonov and Orekhov [Math. Notes 27 (1980)] to the case of operators with an essential spectrum on infinite dimensional Hilbert spaces and allow for arbitrary, sufficiently small perturbations of the solutions of the equation that links the iterates. The note complements the much more elaborate convergence theory of Neymeyr and Knyazev and Neymeyr for the matrix case (see [Knyazev and Neymeyr, SIAM J. Matrix Anal. Appl. 31 (2009)] and the references therein) and is suitable for classroom presentation.
We use the standard multiple shooting method to solve a linear two point boundary-value problem. To ensure that the solution obtained by combining the partial solutions is continuous and satisfies the boundary conditions, we have to solve a system of linear equations. Our idea is to first solve a bidiagonal system related to the original system of linear equations, and then update it with the Sherman-Morrison-Woodbury formula. We study the feasibility, the numerical stability and the running time of this method. The results are: The method described above has the same stability problems like the well known Condensing method. The running time analysis shows that the new method is slower than the Condensing method. Therefore we recommend not to use the method described in this article.
In this paper we deal with the extension of the Fast Kinetic Scheme (FKS) [J. Comput. Phys., Vol. 255, 2013, pp 680-698] originally constructed for solving the BGK equation, to the more challenging case of the Boltzmann equation. The scheme combines a robust and fast method for treating the transport part based on an innovative Lagrangian technique supplemented with fast spectral schemes to treat the collisional operator by means of an operator splitting approach. This approach along with several implementation features related to the parallelization of the algorithm permits to construct an efficient simulation tool which is numerically tested against exact and reference solutions on classical problems arising in rarefied gas dynamic. We present results up to the $3$D$\\times 3$D case for unsteady flows for the Variable Hard Sphere model which may serve as benchmark for future comparisons between different numerical methods for solving the multidimensional Boltzmann equation. For this reason, we also provide for each problem studied details on the computational cost and memory consumption as well as comparisons with the BGK model or the limit model of compressible Euler equations.
An efficient method for finding all real roots of a univariate function in a given bounded domain is formulated. The proposed method uses adaptive mesh refinement to locate bracketing intervals based on bisection criterion for root finding. Each bracketing interval encloses one root. An adaptive form of error is introduced to enclose roots in a desired tolerance based on how much close the roots are. Detecting roots with even multiplicity, which is regarded out of the realm of bracketing methods, becomes possible with the method proposed in this paper. Also, strategies for finding odd-multiple roots with the least number of function evaluations is proposed. Adaptive mesh refinement lead to considerable reduction in function evaluations in comparison to previous global root bracketing methods. The reliability of the proposed method is being illustrated by several examples.
This paper is to give an overview of AMG methods for solving large scale systems of equations such as those from the discretization of partial differential equations. AMG is often understood as the acronym of \"Algebraic Multi-Grid\", but it can also be understood as \"Abstract Muti-Grid\". Indeed, as it demonstrates in this paper, how and why an algebraic multigrid method can be better understood in a more abstract level. In the literature, there are a variety of different algebraic multigrid methods that have been developed from different perspectives. In this paper, we try to develop a unified framework and theory that can be used to derive and analyze different algebraic multigrid methods in a coherent manner. Given a smoother $R$ for a matrix $A$, such as Gauss-Seidel or Jacobi, we prove that the optimal coarse space of dimension $n_c$ is the span of the eigen-vectors corresponding to the first $n_c$ eigenvalues of $\\bar RA$ (with $\\bar R=R+R^T-R^TAR$). We also prove that this optimal coarse space can be obtained by a constrained trace-minimization problem for a matrix associated with $\\bar RA$ and demonstrate that coarse spaces of most of existing AMG methods can be viewed some approximate solution of this trace-minimization problem. Furthermore, we provide a general approach to the construction of a quasi-optimal coarse space and we prove that under appropriate assumptions the resulting two-level AMG method for the underlying linear system converges uniformly with respect to the size of the problem, the coefficient variation, and the anisotropy. Our theory applies to most existing multigrid methods, including the standard geometric multigrid method, the classic AMG, energy-minimization AMG, unsmoothed and smoothed aggregation AMG, and spectral AMGe.
This paper develops and analyzes an efficient numerical method for solving elliptic partial differential equations, where the diffusion coefficients are random perturbations of deterministic diffusion coefficients. The method is based upon a multi-modes representation of the solution as a power series of the perturbation parameter, and the Monte Carlo technique for sampling the probability space. One key feature of the proposed method is that the governing equations for all the expanded mode functions share the same deterministic diffusion coefficients, thus an efficient direct solver by repeated use of the $LU$ decomposition matrices can be employed for solving the finite element discretized linear systems. It is shown that the computational complexity of the whole algorithm is comparable to that of solving a few deterministic elliptic partial differential equations using the $LU$ director solver. Error estimates are derived for the method, and numerical experiments are provided to test the efficiency of the algorithm and validate the theoretical results.
We consider discretizations of the hyper-singular integral operator on closed surfaces and show that the inverses of the corresponding system matrices can be approximated by blockwise low-rank matrices at an exponential rate in the block rank. We cover in particular the data-sparse format of $\\mathcal{H}$-matrices. We show the approximability result for two types of discretizations. The first one is a saddle point formulation, which incorporates the constraint of vanishing mean of the solution. The second discretization is based on a stabilized hyper-singular operator, which leads to symmetric positive definite matrices. In this latter setting, we also show that the hierarchical Cholesky factorization can be approximated at an exponential rate in the block rank.
This paper provides a unified and detailed presentation of root-node style algebraic multigrid (AMG). AMG is a popular and effective iterative method for solving large, sparse linear systems that arise from discretizing partial differential equations. However, while AMG is designed for symmetric positive definite matrices (SPD), certain SPD problems, such as anisotropic diffusion, are still not adequately addressed by existing methods. The focus of this paper is on so-called root-node AMG, which can be viewed as a combination of classical and aggregation-based multigrid. An algorithm for root-node is outlined and theoretical motivation is provided, and a filtering strategy is developed, which is able to control the cost of using root-node AMG, particularly on difficult problems. Numerical results are then presented demonstrating the robust ability of root-node to solve systems-based problems, non-symmetric problems, and difficult SPD problems, including unstructured strongly anisotropic diffusion, in a scalable manner. Detailed estimates of the computational cost of the setup and solve phase are given for each example, providing additional support for root-node AMG over alternative methods.
We analyze a non-symmetric coupling of interior penalty discontinuous Galerkin and boundary element methods in two and three dimensions. Main results are discrete coercivity of the method, and thus unique solvability, and quasi-optimal convergence. The proof of coercivity is based on a localized variant of the variational technique from [F.-J. Sayas, The validity of Johnson-N\\ edel\\ ec s BEM-FEM coupling on polygonal interfaces, {\\em SIAM J. Numer. Anal.}, 47(5):3451--3463, 2009]. This localization gives rise to terms which are carefully analyzed in fractional order Sobolev spaces, and by using scaling arguments for rigid transformations. Numerical evidence of the proven convergence properties has been published previously.
Parameter-dependent models arise in many contexts such as uncertainty quantification, sensitivity analysis, inverse problems or optimization. Parametric or uncertainty analyses usually require the evaluation of an output of a model for many instances of the input parameters, which may be intractable for complex numerical models. A possible remedy consists in replacing the model by an approximate model with reduced complexity (a so called reduced order model) allowing a fast evaluation of output variables of interest. This chapter provides an overview of low-rank methods for the approximation of functions that are identified either with order-two tensors (for vector-valued functions) or higher-order tensors (for multivariate functions). Different approaches are presented for the computation of low-rank approximations, either based on samples of the function or on the equations that are satisfied by the function, the latter approaches including projection-based model order reduction methods. For multivariate functions, different notions of ranks and the corresponding low-rank approximation formats are introduced.
We compare the three main types of high-order one-step initial value solvers: extrapolation, spectral deferred correction, and embedded Runge--Kutta pairs. We consider orders four through twelve, including both serial and parallel implementations. We cast extrapolation and deferred correction methods as fixed-order Runge--Kutta methods, providing a natural framework for the comparison. The stability and accuracy properties of the methods are analyzed by theoretical measures, and these are compared with the results of numerical tests. In serial, the 8th-order pair of Prince and Dormand (DOP8) is most efficient. But other high order methods can be more efficient than DOP8 when implemented in parallel. This is demonstrated by comparing a parallelized version of the well-known ODEX code with the (serial) DOP853 code. For an $N$-body problem with $N=400$, the experimental extrapolation code is as fast as the tuned Runge--Kutta pair at loose tolerances, and is up to two times as fast at tight tolerances.
The epidemic process on a graph is considered for which infectious contacts occur at rate which depends on whether a susceptible is infected for the first time or not. We show that the Vasershtein coupling extends if and only if secondary infections occur at rate which is greater than that of initial ones. Nonetheless, regarding the case of totally asymmetric infection propagation on the integers, we show that the said proviso may be dropped in respect to the probability of occurrence of an infinite epidemic, thus settling in the affirmative a conjecture from [Stacey (2003), {\\em Ann. Appl. Probab.} {\\bf 13}, 669-690].
In this article we continue the study of the quenched distributions of transient, one-dimensional random walks in a random environment. In a previous article we showed that while the quenched distributions of the hitting times do not converge to any deterministic distribution, they do have a weak weak limit in the sense that - viewed as random elements of the space of probability measures - they converge in distribution to a certain random probability measure (we refer to this as a weak weak limit because it is a weak limit in the weak topology). Here, we improve this result to the path-valued process of hitting times. As a consequence, we are able to also prove a weak weak quenched limit theorem for the path of the random walk itself.
By using the Malliavin calculus and finite jump approximations, the Driver-type integration by parts formula is established for the semigroup associated to stochastic (partial) differential equations with noises containing a subordinate Brownian motion. As applications, the shift Harnack inequality and heat kernel estimates are derived. The main results are illustrated by SDEs driven by $\\aa$-stable like processes.
The exponential stability of numerical methods to stochastic differential equations (SDEs) has been widely studied. In contrast, there are relatively few works on polynomial stability of numerical methods. In this letter, we address the question of reproducing the polynomial decay of a class of SDEs using the Euler--Maruyama method and the backward Euler--Maruyama method. The key technical contribution is based on various estimates involving the gamma function.
Let X_1,X_2,... be a sequence of [0,1]-valued i.i.d. random variables, let c\\geq 0 be a sampling cost for each observation and let Y_i=X_i-ic, i=1,2,.... For n=1,2,..., let M(Y_1,...,Y_n)=E(max_{1\\leq i\\leq n}Y_i) and V(Y_1,...,Y_n)=sup_{\\tau \\in C^n}E(Y_{\\tau}), where C^n denotes the set of all stopping rules for Y_1,...,Y_n. Sharp upper bounds for the difference M(Y_1,...,Y_n)-V(Y_1,...,Y_n) are given under various restrictions on c and n.
Coalescents with multiple collisions (also called Lambda-coalescents or simple exchangeable coalescents) are used as models of genealogies. We study a new class of Markovian coalescent processes connected to a population model with immigration. Imagine an infinite population with immigration labelled at each generation by N:={1,2,...}. Some ancestral lineages cannot be followed backwards after some time because their ancestor is outside the population. The individuals with an immigrant ancestor constitute a distinguished family and we define exchangeable distinguished coalescent processes as a model for genealogy with immigration, focussing on simple distinguished coalescents, i.e such that when a coagulation occurs all the blocks involved merge as a single block. These processes are characterized by two finite measures on [0,1] denoted by M=(\\Lambda_{0},\\Lambda_{1}). We call them M-coalescents. We show by martingale arguments that the condition of coming down from infinity for the M-coalescent coincides with that obtained by Schweinsberg for the \\Lambda-coalescent. In the same vein as Bertoin and Le Gall, M-coalescents are associated with some stochastic flows. The superprocess embedded can be viewed as a generalized Fleming-Viot process with immigration. The measures \\Lambda_{0} and \\Lambda_{1} specify respectively the reproduction and the immigration. The coming down from infinity of the M-coalescent will be interpreted as the initial types extinction: after a certain time, all individuals are immigrant children.
Let $X(t), t\\in \\mathcal{T}$ be a centered Gaussian random field with variance function $\\sigma^2(\\cdot)$ that attains its maximum at the unique point $t_0\\in \\mathcal{T}$, and let $M(\\mathcal{T}):=\\sup_{t\\in \\mathcal{T}} X(t)$. For $\\mathcal{T}$ a compact subset of $\\R$, the current literature explains the asymptotic tail behaviour of $M(\\mathcal{T})$ under some regularity conditions including that $1- \\sigma(t)$ has a polynomial decrease to 0 as $t \\to t_0$. In this contribution we consider more general case that $1- \\sigma(t)$ is regularly varying at $t_0$. We extend our analysis to random fields defined on some compact $\\mathcal{T}\\subset \\R^2$, deriving the exact tail asymptotics of $M(\\mathcal{T})$ for the class of Gaussian random fields with variance and correlation functions being regularly varying at $t_0$. A crucial novel element is the analysis of families of Gaussian random fields that do not possess locally additive dependence structures, which leads to qualitatively new types of asymptotics.
We show that if a L\\ evy process creeps then, as a function of $u$, the renewal function $V(t,u)$ of the bivariate ascending ladder process $(L^{-1},H)$ is absolutely continuous on $[0,\\infty)$ and left differentiable on $(0,\\infty)$, and the left derivative at $u$ is proportional to the (improper) distribution function of the time at which the process creeps over level $u$, where the constant of proportionality is $\\rmd_H^{-1}$, the reciprocal of the (positive) drift of $H$. This yields the (missing) term due to creeping in the recent quintuple law of Doney and Kyprianou (2006). As an application, we derive a Laplace transform identity which generalises the second factorization identity. We also relate Doney and Kyprianou s extension of Vigon s \\ equation amicale invers\\ ee to creeping. Some results concerning the ladder process of $X$, including the second factorization identity, continue to hold for a general bivariate subordinator, and are given in this generality.
We discuss asymptotic properties of a family of discrete probability measures which may be used to model particle configurations with a wall on a set of discrete nodes. The correlations are shown to be determinantal and are expressed in terms of discrete orthogonal polynomials. As an application we study random tilings of the half-hexagon or, equivalently, configurations of non-intersecting lattice paths above a wall, so called water melons.
We consider last-passage percolation models in two dimensions, in which the underlying weight distribution has a heavy tail of index alpha<2. We prove scaling laws and asymptotic distributions, both for the passage times and for the shape of optimal paths; these are expressed in terms of a family (indexed by alpha) of \"continuous last-passage percolation\" models in the unit square. In the extreme case alpha=0 (corresponding to a distribution with slowly varying tail) the asymptotic distribution of the optimal path can be represented by a random self-similar measure on [0,1], whose multifractal spectrum we compute. By extending the continuous last-passage percolation model to R^2 we obtain a heavy-tailed analogue of the Airy process, representing the limit of appropriately scaled vectors of passage times to different points in the plane. We give corresponding results for a directed percolation problem based on alpha-stable Levy processes, and indicate extensions of the results to higher dimensions.
This article considers the stochastic partial differential equation \\[ \\left\\{ \\begin{array}{l} u_t = \\frac{1}{2} u_{xx} + u^\\gamma \\xi u(0,.) = u_0 \\end{array}\\right. \\] \\noindent where $\\xi$ is a space / time white noise Gaussian random field, $\\gamma > 1$ and $u_0$ is a non-negative initial condition independent of $\\xi$ satisfying \\[ u_0 \\geq 0, \\qquad \\mathbb{E} \\left [ \\left (\\int_{\\mathbb{S}^1} u_0^{2\\gamma} (x) dx \\right) \\right ] < +\\infty \\qquad \\forall \\alpha \\in (0,1).\\] \\noindent The {\\em space} variable is $x \\in \\mathbb{S}^1 = [0,1]$ with the identification $0 = 1$. The definition of the stochastic term, taken in the sense of Walsh, will be made clear in the article. The result is that there exists a unique non-negative solution $u$ such that for all $\\alpha \\in [0,1)$, \\[\\mathbb{E} \\left [ \\left( \\int_0^\\infty \\int_{\\mathbb{S}^1} u(t,x)^{2\\gamma} dx dt \\right)^{\\alpha / 2 } \\right ] \\leq C( \\alpha) < + \\infty. \\] \\noindent where the constant $C(\\alpha)$ arises in the Burkholder-Davis-Gundy inequality. The solution is also shown to satisfy \\[ \\mathbb{E} \\left [ \\int_0^T \\left(\\int_{\\mathbb{S}^1} u (t,x)^p dx \\right)^{\\alpha / p} dt \\right ] < +\\infty \\qquad \\forall T < +\\infty, \\qquad p < +\\infty, \\qquad \\alpha \\in \\left (0, \\frac{1}{2} \\right ). \\]
Weak drift of an infinitely divisible distribution $\\mu$ on $\\mathbb{R}^d$ is defined by analogy with weak mean; properties and applications of weak drift are given. When $\\mu$ has no Gaussian part, the weak drift of $\\mu$ equals the minus of the weak mean of the inversion $\\mu $ of $\\mu$. Applying the concepts of having weak drift 0 and of having weak drift 0 absolutely, the ranges, the absolute ranges, and the limit of the ranges of iterations are described for some stochastic integral mappings. For L\\ {e}vy processes the concepts of weak mean and weak drift are helpful in giving necessary and sufficient conditions for the weak law of large numbers and for the weak version of Shtatland s theorem on the behavior near $t=0$; those conditions are obtained from each other through inversion.
When we cut an i.i.d. sequence of letters into words according to an independent renewal process, we obtain an i.i.d. sequence of words. In the \\emph{annealed} large deviation principle (LDP) for the empirical process of words, the rate function is the specific relative entropy of the observed law of words w.r.t. the reference law of words. In the present paper we consider the \\emph{quenched} LDP, i.e., we condition on a typical letter sequence. We focus on the case where the renewal process has an \\emph{algebraic} tail. The rate function turns out to be a sum of two terms, one being the annealed rate function, the other being proportional to the specific relative entropy of the observed law of letters w.r.t. the reference law of letters, with the former being obtained by concatenating the words and randomising the location of the origin. The proportionality constant equals the tail exponent of the renewal process. Earlier work by Birkner considered the case where the renewal process has an exponential tail, in which case the rate function turns out to be the first term on the set where the second term vanishes and to be infinite elsewhere. In a companion paper the annealed and the quenched LDP are applied to the collision local time of transient random walks, and the existence of an intermediate phase for a class of interacting stochastic systems is established.
Limit theorems are presented for the rescaled occupation time fluctuation process of a critical finite variance branching particle system in $\\mathbb{R}^{d}$ with symmetric $\\alpha$-stable motion starting off from either a standard Poisson random field or the equilibrium distribution for critical $d=2\\alpha$ and large $d>2\\alpha$ dimensions. The limit processes are generalised Wiener processes. The obtained convergence is in space-time, finite-dimensional distributions sense. With the addtional assumption on the branching law we obtain functional convergence.
This paper proposes another constant that can be associated with Fibonacci sequence. In this work, we look at the probability distributions generated by the linear convolution of Fibonacci sequence with itself, and the linear convolution of symmetrized Fibonacci sequence with itself. We observe that for a distribution generated by the linear convolution of the standard Fibonacci sequence with itself, the variance converges to 8.4721359... . Also, for a distribution generated by the linear convolution of symmetrized Fibonacci sequences, the variance converges in an average sense to 17.1942 ..., which is approximately twice that we get with common Fibonacci sequence.
In this paper we study the diffusion of an SIS-type epidemics on a network under the presence of a random environment, that enters in the definition of the infection rates of the nodes. Accordingly, we model the infection rates in the form of independent stochastic processes. To analyze the problem, we apply a mean field approximation, which allows to get a stochastic differential equations for the probability of infection in each node, and classical tools about stability, which require to find suitable Lyapunov s functions. Here, we find conditions which guarantee, respectively, extinction and stochastic persistence of the epidemics. We show that there exists two regions, given in terms of the coefficients of the model, one where the system goes to extinction almost surely, and the other where it is stochastic permanent. These two regions are, unfortunately, not adjacent, as there is a gap between them, whose extension depends on the specific level of noise. In this last region, we perform numerical analysis to suggest the true behavior of the solution.
The paper is devoted to the study of nonlinear stochastic Schr\\\"{o}dinger equations driven by standard cylindrical Brownian motions (NSSEs) arising from the unraveling of quantum master equations. Under the Born--Markov approximations, this class of stochastic evolutions equations on Hilbert spaces provides characterizations of both continuous quantum measurement processes and the evolution of quantum systems. First, we deal with the existence and uniqueness of regular solutions to NSSEs. Second, we provide two general criteria for the existence of regular invariant measures for NSSEs. We apply our results to a forced and damped quantum oscillator.
Pickands constants play a crucial role in the asymptotic theory of Gaussian processes. They are commonly defined as the limits of a sequence of expectations involving fractional Brownian motions and, as such, their exact value is often unknown. Recently, Dieker and Yakir (2014) derived a novel representation of Pickands constant as a simple expected value that does not involve a limit operation. In this paper we show that the notion of Pickands constants and their corresponding Dieker-Yakir representations can be extended to a large class of stochastic processes, including general Gaussian and L\\ evy processes. We furthermore provide a link to spatial extreme value theory and show that Pickands-type constants coincide with certain constants arising in the study of max-stable processes with mixed moving maxima representations.
We study sufficient conditions for the belonging of random process to certain Besov space and for the Central Limit Theorem (CLT) in these spaces. We investigate also the non-asymptotic tail behavior of normed sums of centered random independent variables (vectors) with values in these spaces. Main apparatus is the theory of mixed (anisotropic) Lebesgue-Riesz spaces, in particular so-called permutation inequality.
We consider the Independent Chip Model (ICM) for expected value in poker tournaments. Our first result is that participating in a fair bet with one other player will always lower one s expected value under this model. Our second result is that the expected value for players not participating in a fair bet between two players always increases. We show that neither result necessarily holds for a fair bet among three or more players.
A new non-conservative stochastic reaction-diffusion system in which two families of random walks in two adjacent domains interact near the interface is introduced and studied in this paper. Such a system can be used to model the transport of positive and negative charges in a solar cell or the population dynamics of two segregated species under competition. We show that in the macroscopic limit, the particle densities converge to the solution of a coupled nonlinear heat equations. For this, we first prove that propagation of chaos holds by establishing the uniqueness of a new BBGKY hierarchy. A local central limit theorem for reflected diffusions in bounded Lipschitz domains is also established as a crucial tool.
This paper deals with symmetric random matrices whose upper diagonal entries are obtained from a linear random field with heavy tailed noise. It is shown that the maximum eigenvalue and the spectral radius of such a random matrix with dependent entries converge to the Frech\\ et distribution after appropriate scaling. This extends a seminal result of Soshnikov(2004) when the tail index is strictly less than one.
This paper gives a definition of g-harmonic functions and shows the relation between the g-harmonic functions and g-martingales. It s direct to construct such relation under smooth case, but for continuous case we need the theory of viscosity solution. The results show that under the nonlinear expectation mechanism, we also can get the similar relation between harmonic functions and martingales. Finally, we will give a result about the strict converse problem of mean value property of g-harmonic functions.
An (upward) skip-free Markov chain with the set of nonnegative integers as state space is a chain for which upward jumps may be only of unit size; there is no restriction on downward jumps. In a 1987 paper, Brown and Shao determined, for an irreducible continuous-time skip-free chain and any d, the passage time distribution from state 0 to state d. When the nonzero eigenvalues nu_j of the generator are all real, their result states that the passage time is distributed as the sum of d independent exponential random variables with rates nu_j. We give another proof of their theorem. In the case of birth-and-death chains, our proof leads to an explicit representation of the passage time as a sum of independent exponential random variables. Diaconis and Miclo recently obtained the first such representation, but our construction is much simpler. We obtain similar (and new) results for a fastest strong stationary time T of an ergodic continuous-time skip-free chain with stochastically monotone time-reversal started in state 0, and we also obtain discrete-time analogs of all our results. In the paper s final section we present extensions of our results to more general chains.
We study the weak convergence (in the high-frequency limit) of the frequency components associated with Gaussian-subordinated, spherical and isotropic random fields. In particular, we provide conditions for asymptotic Gaussianity and we establish a new connection with random walks on the the dual of SO(3), which mirrors analogous results previously established for fields defined on Abelian groups (see Marinucci and Peccati (2007)). Our work is motivated by applications to cosmological data analysis, and specifically by the probabilistic modelling and the statistical analysis of the Cosmic Microwave Background radiation, which is currently at the frontier of physical research. To obtain our main results, we prove several fine estimates involving convolutions of the so-called Clebsch-Gordan coefficients (which are elements of unitary matrices connecting reducible representations of SO(3)); this allows to intepret most of our asymptotic conditions in terms of coupling of angular momenta in a quantum mechanical system. Part of the proofs are based on recently established criteria for the weak convergence of multiple Wiener-It\\^o integrals.
We investigate the windings around the origin of the two-dimensional Markov process (X,L) having the stable L\\ evy process L and its primitive X as coordinates, in the non-trivial case when |L| is not a subordinator. First, we show that these windings have an almost sure limit velocity, extending McKean s result [McK63] in the Brownian case. Second, we evaluate precisely the upper tails of the distribution of the half-winding times, connecting the results of our recent papers [CP14, PS14].
We consider a single-server cyclic polling system with three queues where the server follows an adaptive rule: if it finds one of queues empty in a given cycle, it decides not to visit that queue in the next cycle. In the case of limited service policies, we prove stability and instability results under some conditions which are sufficient but not necessary, in general. Then we discuss open problems with identifying the exact stability region for models with limited service disciplines: we conjecture that a necessary and sufficient condition for the stability may depend on the whole distributions of the primitive sequences, and illustrate that by examples. We conclude the paper with a section on the stability analysis of a polling system with either gated or exhaustive service disciplines.
Conventional recursive filtering approaches, designed for quantifying the state of an evolving uncertain dynamical system with intermittent observations, use a sequence of (i) an uncertainty propagation step followed by (ii) a step where the associated data is assimilated using Bayes  rule. In this paper we switch the order of the steps to: (i) one step ahead data assimilation followed by (ii) uncertainty propagation. This route leads to a class of filtering algorithms named \\emph{smoothing filters}. For a system driven by random noise, our proposed methods require the probability distribution of the driving noise after the assimilation to be biased by a nonzero mean. The system noise, conditioned on future observations, in turn pushes forward the filtering solution in time closer to the true state and indeed helps to find a more accurate approximate solution for the state estimation problem.
Given a domain G, a reflection vector field d(.) on the boundary of G, and drift and dispersion coefficients b(.) and \\sigma(.), let L be the usual second-order elliptic operator associated with b(.) and \\sigma(.). Under suitable assumptions that, in particular, ensure that the associated submartingale problem is well posed, it is shown that a probability measure $\\pi$ on \\bar{G} is a stationary distribution for the corresponding reflected diffusion if and only if $\\pi (\\partial G) = 0$ and $\\int_{\\bar{G}} L f (x) \\pi (dx) \\leq 0$ for every f in a certain class of test functions. Moreover, the assumptions are shown to be satisfied by a large class of reflected diffusions in piecewise smooth multi-dimensional domains with possibly oblique reflection.
We give bounds on the Poincare (inverse spectral gap) constant of a non-negative, integer-valued random variable W, under negative dependence assumptions such as ultra log-concavity and total negative dependence. We show that the bounds obtained compare well to others in the literature. Examples treated include some occupancy and urn models, a random graph model and small spacings on the circumference of a circle. Applications to Poisson convergence theorems are considered.
This article contains both a point process and a sequential description of the greatest convex minorant of Brownian motion on a finite interval. We use these descriptions to provide new analysis of various features of the convex minorant such as the set of times where the Brownian motion meets its minorant. The equivalence of the these descriptions is non-trivial, which leads to many interesting identities between quantities derived from our analysis. The sequential description can be viewed as a Markov chain for which we derive some fundamental properties.
Since the turn of the century, there has been increased interest in the application of heavy-tailed distributions, particularly stable distributions, to problems in physics and finance. Although, the tails of stable distributions provide a better fit to real-world data, they are too fat to describe empirical distributions. To remedy this drawback of stable distributions, so-called tempered variants of stable distributions have been proposed. In this paper, we argue that the tempering should be connected to the model leading to heavy tailed distribution and propose several tempering procedures in connection with corresponding models
We study the positive recurrence of piecewise Ornstein-Uhlenbeck (OU) diffusion processes, which arise from many-server queueing systems with phase-type service requirements. These diffusion processes exhibit different behavior in two regions of the state space, corresponding to \"overload\" (service demand exceeds capacity) and \"underload\" (service capacity exceeds demand). The two regimes cause standard techniques for proving positive recurrence to fail. Using and extending the framework of common quadratic Lyapunov functions from the theory of control, we construct Lyapunov functions for the diffusion approximations corresponding to systems with and without abandonment. With these Lyapunov functions, we prove that piecewise OU processes have a unique stationary distribution.
We show that the `erasing-larger-loops-first  (ELLF) method, which was first introduced for erasing loops from the simple random walk on the Sierpinski gasket, does work also for non-Markov random walks, in particular, self-repelling walks to construct a new family of self-avoiding walks on the Sierpinski gasket. The one-parameter family constructed in this method continuously connects the loop-erased random walk and a self-avoiding walk which has the same asymptotic behavior as the `standard  self-avoiding walk. We prove the existence of the scaling limit and study some path properties: The exponent governing the short-time behavior of the scaling limit varies continuously in the parameter. The limit process is almost surely self-avoiding, while its path Hausdorff dimension is the reciprocal of the exponent above, which is strictly greater than 1.
In this small note we are concerned with the solution of Forward-Backward Stochastic Differential Equations (FBSDE) with drivers that grow quadratically in the control component (quadratic growth FBSDE or qgFBSDE). The main theorem is a comparison result that allows comparing componentwise the signs of the control processes of two different qgFBSDE. As a byproduct one obtains conditions that allow establishing the positivity of the control process.
A mixture with varying concentrations is a modification of a finite mixture model in which the mixing probabilities (concentrations of mixture components) may be different for different observations. In the paper, we assume that the concentrations are known and the distributions of components are completely unknown. Nonparametric technique is proposed for testing hypotheses on functional moments of components.
Let ${\\cal T}$ be a rooted Galton-Watson tree with offspring distribution $\\{p_k\\}$ that has $p_0=0$, mean $m=\\sum kp_k>1$ and exponential tails. Consider the $\\lambda$-biased random walk $\\{X_n\\}_{n\\geq 0}$ on ${\\cal T}$; this is the nearest neighbor random walk which, when at a vertex $v$ with $d_v$ offspring, moves closer to the root with probability $\\lambda/(\\lambda+d_v)$, and moves to each of the offspring with probability $1/(\\lambda+d_v)$. It is known that this walk has an a.s. constant speed $\\v=\\lim_n |X_n|/n$ (where $|X_n|$ is the distance of $X_n$ from the root), with $\\v>0$ for $ 0<\\lambda<m$ and $\\v=0$ for $\\lambda \\ge m$. For all $\\lambda \\le m$, we prove a quenched CLT for $|X_n|-n\\v$. (For $\\lambda>m$ the walk is positive recurrent, and there is no CLT.) The most interesting case by far is $\\lambda=m$, where the CLT has the following form: for almost every ${\\cal T}$, the ratio $|X_{[nt]}|/\\sqrt{n}$ converges in law as $n \\to \\infty$ to a deterministic multiple of the absolute value of a Brownian motion. Our approach to this case is based on an explicit description of an invariant measure for the walk from the point of view of the particle (previously, such a measure was explicitly known only for $\\lambda=1$) and the construction of appropriate harmonic coordinates.
Self-similar processes are useful in modeling diverse phenomena that exhibit scaling properties. Operator scaling allows a different scale factor in each coordinate. This paper develops practical methods for modeling and simulating stochastic processes with operator scaling. A simulation method for operator stable Levy processes is developed, based on a series representation, along with a Gaussian approximation of the small jumps. Several examples are given to illustrate practical applications. A classification of operator stable Levy processes in two dimensions is provided according to their exponents and symmetry groups. We conclude with some remarks and extensions to general operator self-similar processes.
In this paper, we consider two skew Brownian motions, driven by the same Brownian motion, with different starting points and different skewness coefficients. We show that we can describe the evolution of the distance between the two processes with a stochastic differential equation. This S.D.E. possesses a jump component driven by the excursion process of one of the two skew Brownian motions. Using this representation, we show that the local time of two skew Brownian motions at their first hitting time is distributed as a simple function of a Beta random variable. This extends a result by Burdzy and Chen (2001), where the law of coalescence of two skew Brownian motions with the same skewness coefficient is computed.
We develop criteria for recurrence and transience of one-dimensional Markov processes which have jumps and oscillate between $+\\infty$ and $-\\infty$. The conditions are based on a Markov chain which only consists of jumps (overshoots) of the process into complementary parts of the state space. In particular we show that a stable-like process with generator $-(-\\Delta)^{\\alpha(x)/2}$ such that $\\alpha(x)=\\alpha$ for $x<-R$ and $\\alpha(x)=\\beta$ for $x>R$ for some $R>0$ and $\\alpha,\\beta\\in(0,2)$ is transient if and only if $\\alpha+\\beta<2$, otherwise it is recurrent. As a special case this yields a new proof for the recurrence, point recurrence and transience of symmetric $\\alpha$-stable processes.
This continues work started in part I on a general branching-within-branching model for host-parasite co-evolution. Here we focus on asymptotic results for relevant processes in the case when parasites survive. In particular, limit theorems for the processes of contaminated cells and of parasites are established by using martingale theory and the technique of size-biasing. The results for both processes are of Kesten-Stigum type by including equivalent integrability conditions for the martingale limits to be positive with positive probability. The case when these conditions fail is also studied. For the process of contaminated cells, we show that a proper Heyde-Seneta norming exists such that the limit is nondegenerate.
We prove that the weak version of the SPDE problem \\begin{align*} dV_{t}(x) & = [-\\mu V_{t} (x) + \\frac{1}{2} (\\sigma_{M}^{2} + \\sigma_{I}^{2})V_{t}\"(x)]dt - \\sigma_{M} V_{t} (x)dW^{M}_{t}, \\quad x > 0, \\\\ V_{t}(0) &= 0 \\end{align*} with a specified bounded initial density, $V_{0}$, and $W$ a standard Brownian motion, has a unique solution in the class of finite-measure valued processes. The solution has a smooth density process which has a probabilistic representation and shows degeneracy near the absorbing boundary. In the language of weighted Sobolev spaces, we describe the precise order of integrability of the density and its derivatives near the origin, and we relate this behaviour to a two-dimensional Brownian motion in a wedge whose angle is a function of the ratio $\\sigma_{M}/\\sigma_{I}$. Our results are sharp: we demonstrate that better regularity is unattainable.
We introduce the (path-valued) Brownian frame process whose evaluation at time t is the sample path of the underlying Brownian motion run from time t-1 to t. Due to its connections with Gaussian Volterra processes and SDDEs this is an interesting object to study. The first part deals with path-wise properties of the Brownian frame process in the p-variation norm. The second part shows the non-existence of a Levy area random variable in a particular norm, revealing the difficulty in establishing a Rough Path integration theory for the Brownian Frame process.
We introduce a method for studying monotonicity of the speed of excited random walks in high dimensions, based on a formula for the speed obtained via cut-times and Girsanov s transform. While the method gives rise to similar results as have been or can be obtained via the expansion method of van der Hofstad and Holmes, it may be more palatable to a general probabilistic audience. We also revisit the law of large numbers for stationary cookie environments. In particular, we introduce a new notion of $e_1-$exchangeable cookie environment and prove the law of large numbers for this case.
We study nearest neighbor random walks on fixed environments of $\\mathbb{Z}$ composed of two point types : $(1/2,1/2)$ and $(p,1-p)$ for $p>1/2$. We show that for every environment with density of $p$ drifts bounded by $\\lambda$ we have $\\limsup_{n\\rightarrow\\infty}\\frac{X_n}{n}\\leq (2p-1)\\lambda$, where $X_n$ is a random walk on the environment. In addition up to some integer effect the environment which gives the best speed is given by equally spaced drifts.
In this paper a new form of duality for probabilistic cellular automata (PCA) is introduced. Using this duality, an ergodicity result for processes having a dual is proved. Also, conditions on the probabilities defining the evolution of the processes for the existence of a dual are provided. The results are applied to wide classes of PCA which include multi-opinion voter models, competition models and the Domany-Kinzel model.
We consider a stochastic differential equation in a Hilbert space with time-dependent coefficients for which no general existence and uniqueness results are known. We prove, under suitable assumptions, existence and uniqueness of a measure valued solution, for the corresponding Fokker--Planck equation. In particular, we verify the Chapman--Kolmogorov equations and get an evolution system of transition probabilities for the stochastic dynamics informally given by the stochastic differential equation.
A lot is known about the H\\\"older regularity of stochastic processes, in particular in the case of Gaussian processes. Recently, a finer analysis of the local regularity of functions, termed 2-microlocal analysis, has been introduced in a deterministic frame: through the computation of the so-called 2-microlocal frontier, it allows in particular to predict the evolution of regularity under the action of (pseudo-) differential operators. In this work, we develop a 2-microlocal analysis for the study of certain stochastic processes. We show that moments of the increments allow, under fairly general conditions, to obtain almost sure lower bounds for the 2-microlocal frontier. In the case of Gaussian processes, more precise results may be obtained: the incremental covariance yields the almost sure value of the 2-microlocal frontier. As an application, we obtain new and refined regularity properties of fractional Brownian motion, multifractional Brownian motion, stochastic generalized Weierstrass functions, Wiener and stable integrals.
We develop techniques for determining the exact asymptotic speed of convergence in the multidimensional normal approximation of smooth functions of Gaussian fields. As a by-product, our findings yield exact limits and often give rise to one-term generalized Edgeworth expansions increasing the speed of convergence. Our main mathematical tools are Malliavin calculus, Stein s method and the Fourth Moment Theorem. This work can be seen as an extension of the results of arXiv:0803.0458 to the multi-dimensional case, with the notable difference that in our framework covariances are allowed to fluctuate. We apply our findings to exploding functionals of Brownian sheets, vectors of Toeplitz quadratic functionals and the Breuer-Major Theorem.
Exchangeable sequences of random probability measures (partitions of mass) and their corresponding exchangeable bridges play an important role in a variety of areas in probability, statistics and related areas, including Bayesian statistics, physics, finance and machine learning. An area of theoretical as well as practical interest, is the study of coagulation and fragmentation operators on partitions of mass. In this regard, an interesting but formidable question is the identification of operators and distributional families on mass partitions that exhibit interesting duality relations. In this paper we identify duality relations for a large sub-class of mixed Poisson-Kingman models generated by a stable subordinator. Our results are natural generalizations of the duality relations developed in Pitman, Bertoin and Goldschmidt, and Dong, Goldschmidt and Martin for the two-parameter Poisson Dirichlet family. These results are deduced from results for corresponding bridges.
We consider the Skorokhod problem in a time-varying interval. We prove existence and uniqueness for the solution. We also express the solution in terms of an explicit formula. Moving boundaries may generate singularities when they touch. We establish two sets of sufficient conditions on the moving boundaries that guarantee that the variation of the local time of the associated reflected Brownian motion is, respectively, finite and infinite. We also apply these results to study the semimartingale property of a class of two-dimensional reflected Brownian motions.
We determine the rate of decrease of the right tail distribution of the exponential functional of a Levy process with a convolution equivalent Levy measure. Our main result establishes that it decreases as the right tail of the image under the exponential function of the Levy measure of the underlying Levy process. The method of proof relies on fluctuation theory of Levy processes and an explicit path-wise representation of the exponential functional as the exponential functional of a bivariate subordinator. Our techniques allow us to establish rather general estimates of the measure of the excursions out from zero for the underlying Levy process reflected in its past infimum, whose area under the exponential of the excursion path exceed a given value.
In this article we get simple explicit formulas for $\\Exp\\sup_{s\\leq t}X(s)$ where $X$ is a spectrally positive or negative L\\ evy process with infinite variation. As a consequence we derive a generalization of the well-known formula for the supremum distribution of Wiener process that is we obtain $\\Prob(\\sup_{s\\leq t}Z_{\\alpha}(s)\\geq u)=\\alpha \\Prob(Z_{\\alpha}(t)\\geq u)$ for $u\\geq 0$ where $Z_{\\alpha}$ is a spectrally negative L\\ evy process with $1<\\alpha\\leq 2$ which also stems from Kendall s identity for the first crossing time. Our proof uses a formula for the supremum distribution of a spectrally positive L\\ evy process which follows easily from the elementary Seals formula.
Let $p \\in (0, \\infty)$ be a constant and let $\\{\\xi_n\\} \\subset L^p(\\Omega, {\\mathcal F}, \\P)$ be a sequence of random variables. For any integers $m, n \\ge 0$, denote $S_{m, n} = \\sum_{k=m}^{m + n} \\xi_k$. It is proved that, if there exist a nondecreasing function $\\varphi: \\R_+\\to \\R_+$ (which satisfies a mild regularity condition) and an appropriately chosen integer $a\\ge 2$ such that $$ \\sum_{n=0}^\\infty \\sup_{k \\ge 0} \\E\\bigg|\\frac{S_{k, a^n}} {\\varphi(a^n)} \\bigg|^p < \\infty,$$ Then $$ \\lim_{n \\to \\infty} \\frac{S_{0, n}} {\\varphi(n)} = 0\\qquad \\hbox{a.s.} $$ This extends Theorem 1 in Levental, Chobanyan and Salehi \\cite{chobanyan-l-s} and can be applied conveniently to a wide class of self-similar processes with stationary increments including stable processes.
Arrival processes to service systems are prevalently assumed non-homogeneous Poisson. Though mathematically convenient, arrival processes are often more volatile, a phenomenon that is referred to as overdispersion. Motivated by this, we analyze a class of stochastic models for which we develop performance approximations that are scalable in the system size, under a heavy-traffic condition. Subsequently, we show how this leads to novel capacity sizing rules that acknowledge the presence of overdispersion. This, in turn, leads to robust approximations for performance characteristics of systems that are of moderate size and/or may not operate in heavy traffic. To illustrate the value of our approach, we apply it to actual arrival data of an emergency department of a hospital.
We prove that an n by n random matrix G with independent entries is completely delocalized. Suppose the entries of G have zero means, variances uniformly bounded below, and a uniform tail decay of exponential type. Then with high probability all unit eigenvectors of G have all coordinates of magnitude O(n^{-1/2}), modulo logarithmic corrections. This comes a consequence of a new, geometric, approach to delocalization for random matrices.
This paper presents a stochastic approach to theorems concerning the behavior of iterations of the Bernstein operator $B_n$ taking a continuous function $f \\in C[0,1]$ to a degree-$n$ polynomial when the number of iterations $k$ tends to infinity and $n$ is kept fixed or when $n$ tends to infinity as well. In the first instance, the underlying stochastic process is the so-called Wright-Fisher model, whereas, in the second instance, the underlying stochastic process is the Wright-Fisher diffusion. Both processes are probably the most basic ones in mathematical genetics. By using Markov chain theory and stochastic compositions, we explain probabilistically a theorem due to Kelisky and Rivlin, and by using stochastic calculus we compute a formula for the application of $B_n$ a number of times $k=k(n)$ to a polynomial $f$ when $k(n)/n$ tends to a constant.
We study the decay rate of large deviation probabilities of occupation times, up to time $t$, for the voter model $\\eta\\colon\\Z^2\\times[0,\\infty)\\ra\\{0,1\\}$ with simple random walk transition kernel, starting from a Bernoulli product distribution with density $\\rho\\in(0,1)$. Bramson, Cox and Griffeath (1988) showed that the decay rate order lies in $[\\log(t),\\log^2(t)]$. In this paper, we establish the true decay rates depending on the level. We show that the decay rates are $\\log^2(t)$ when the deviation from $\\rho$ is maximal (i.e., $\\eta\\equiv 0$ or 1), and $\\log(t)$ in all other situations.
We prove functional limits theorems for the occupation time process of a system of particles moving independently in $R^d$ according to a symmetric $\\alpha$-stable L\\ evy process, and starting off from an inhomogeneous Poisson point measure with intensity measure $\\mu(dx)=(1+|x|^{\\gamma})^{-1}dx,\\gamma>0$, and other related measures. In contrast to the homogeneous case $(\\gamma=0)$, the system is not in equilibrium and ultimately it vanishes, and there are more different types of occupation time limit processes depending on arrangements of the parameters $\\gamma, d$ and $\\alpha$. The case $\\gamma<d<\\alpha$ leads to an extension of fractional Brownian motion.
Based on Stein s method, we derive upper bounds for Poisson process approximation in the $L_1$-Wasserstein metric $d_2^{(p)}$, which is based on a slightly adapted $L_p$-Wasserstein metric between point measures. For the case $p=1$, this construction yields the metric $d_2$ introduced in [Barbour and Brown Stochastic Process. Appl. 43 (1992) 9--31], for which Poisson process approximation is well studied in the literature. We demonstrate the usefulness of the extension to general $p$ by showing that $d_2^{(p)}$-bounds control differences between expectations of certain $p$th order average statistics of point processes. To illustrate the bounds obtained for Poisson process approximation, we consider the structure of 2-runs and the hard core model as concrete examples.
This is a survey on the intermittent behavior of the parabolic {Anderson} model, which is the Cauchy problem for the heat equation with random potential on the lattice $\\Z^d$. We first introduce the model and give heuristic explanations of the long-time behavior of the solution, both in the annealed and the quenched setting for time-independent potentials. We thereby consider examples of potentials studied in the literature. In the particularly important case of an i.i.d. potential with double-exponential tails we formulate the asymptotic results in detail. Furthermore, we explain that, under mild regularity assumptions, there are only four different universality classes of asymptotic behaviors. Finally, we study the moment Lyapunov exponents for space-time homogeneous catalytic potentials generated by a {Poisson} field of random walks.
In this paper we define and study self-similar ranked fragmentations. We first show that any ranked fragmentation is the image of some partition-valued fragmentation, and that there is in fact a one-to-one correspondence between the laws of these two types of fragmentations. We then give an explicit construction of homogeneous ranked fragmentations in terms of Poisson point processes. Finally we use this construction and classical results on records of Poisson point processes to study the small-time behavior of a ranked fragmentation.
In this article, we continue the discussion of Fang-Wu (2015) to estimate the spectral gap of the Ornstein-Uhlenbeck operator on path space over a Riemannian manifold of pinched Ricci curvature. Along with explicit estimates we study the short-time asymptotics of the spectral gap. The results are then extended to the path space of Riemannian manifolds evolving under a geometric flow. Our paper is strongly motivated by Naber s recent work (2015) on characterizing bounded Ricci curvature through stochastic analysis on path space.
Let $L$ be the operator defined on $C^2$ functions by $$L f(x)=\\int[f(x+h)-f(x)-1_{(|h|\\leq 1)}\\nabla f(x)\\cdot h]\\frac{n(x,h)}{|h|^{d+\\alpha(x)}}dh.$$ This is an operator of variable order and the corresponding process is of pure jump type. We consider the martingale problem associated with $L$. Sufficient conditions for existence and uniqueness are given. Transition density estimates for $\\alpha$-stable processes are also obtained.
We introduce the concept of index for regular Dirichlet forms by means of energy measures, and discuss its properties. In particular, it is proved that the index of strong local regular Dirichlet forms is identical with the martingale dimension of the associated diffusion processes. As an application, a class of self-similar fractals is taken up as an underlying space. We prove that first-order derivatives can be defined for functions in the domain of the Dirichlet forms and their total energies are represented as the square integrals of the derivatives.
We consider two independent symmetric Markov random flights $\\bold Z_1(t)$ and $\\bold Z_2(t)$ performed by the particles that simultaneously start from the origin of the Euclidean plane $\\Bbb R^2$ in random directions distributed uniformly on the unit circumference $S_1$ and move with constant finite velocities $c_1>0, \\; c_2>0$, respectively. The new random directions are taking uniformly on $S_1$ at random time instants that form independent homogeneous Poisson flows of rates $\\lambda_1>0, \\; \\lambda_2>0$. The probability distribution function of the Euclidean distance $$\\rho(t)=\\Vert \\bold Z_1(t) - \\bold Z_2(t) \\Vert, \\qquad t>0,$$ between $\\bold Z_1(t)$ and $\\bold Z_2(t)$ at arbitrary time instant $t>0$, is obtained.
We introduce a class of random graphs with a community structure, which we call the hierarchical configuration model. On the inter-community level, the graph is a configuration model, and on the intra-community level, every vertex in the configuration model is replaced by a community: i.e., a small graph. These communities may have any shape, as long as they are connected. For these hierarchical graphs, we find the size of the largest component, the degree distribution and the clustering coefficient. Furthermore, we determine the conditions under which a giant percolation cluster exists, and find its size.
In this paper, we consider directed polymers in random environment with long range jumps in discrete space and time. We extend to this case some techniques, results and classifications known in the usual short range case. However, some properties are drastically different when the underlying random walk belongs to the domain of attraction of an $\\a$-stable law. For instance, we construct natural examples of directed polymers in random environment which experience weak disorder in low dimension.
In order to study how well a finite group might be generated by repeated random multiplications, P. Diaconis suggested the following urn model. An urn contains some balls labeled by elements which generate a group G. Two are drawn at random with replacement and a ball labeled with the group product (in the order they were picked) is added to the urn. We give a proof of his conjecture that the limiting fraction of balls labeled by each group element almost surely approaches 1/|G|.
We prove exponential concentration in i.i.d. first-passage percolation in $Z^d$ for all $d \\geq 2$ and general edge-weights $(t_e)$. Precisely, under an exponential moment assumption $E e^{\\alpha t_e}< \\infty$ for some $\\alpha>0$) on the edge-weight distribution, we prove the inequality $$ P(|T(0,x)-E T(0,x)| \\geq \\lambda \\sqrt{\\frac{|x|}{log |x|}}) \\leq ce^{-c  \\lambda}, |x|>1 $$ for the point-to-point passage time $T(0,x)$. Under a weaker assumption $E t_e^2(\\log t_e)_+< \\infty$ we show a corresponding inequality for the lower-tail of the distribution of $T(0,x)$. These results extend work of Benaim-Rossignol to general distributions.
In this paper, we construct a new family of random series defined on $\\R^D$, indexed by one scaling parameter and two Hurst-like exponents. The model is close to Takagi-Knopp functions, save for the fact that the underlying partitions of $\\R^D$ are not the usual dyadic meshes but random Voronoi tessellations generated by Poisson point processes. This approach leads us to a continuous function whose random graph is shown to be fractal with explicit and equal box and Hausdorff dimensions. The proof of this main result is based on several new distributional properties of the Poisson-Voronoi tessellation on the one hand, an estimate of the oscillations of the function coupled with an application of a Frostman-type lemma on the other hand. Finally, we introduce two related models and provide in particular a box-dimension calculation for a derived deterministic Takagi-Knopp series with hexagonal bases.
We consider a class of discretionary stopping problems within the $G$-framework. We first establish the well-definedness of the stopping problem under the $G$-expectation, by showing the quasi-continuity of the stopped process. We then prove a verification theorem for $G$-optimal stopping problem. One corollary is a direct proof for the well-known fact that the $G$-optimal stopping problem is the same as the classical optimal stopping problem with appropriate parameters, when the payoff function is concave or convex.
We present a time change construction of affine processes with state-space $\\mathbb{R}_+^m\\times \\mathbb{R}^n$. These processes were systematically studied in (Duffie, Filipovi\\ c and Schachermayer, 2003) since they contain interesting classes of processes such as L\\ evy processes, continuous branching processes with immigration, and of the Ornstein-Uhlenbeck type. The construction is based on a (basically) continuous functional of a multidimensional L\\ evy process which implies that limit theorems for L\\ evy processes (both almost sure and in distribution) can be inherited to affine processes. The construction can be interpreted as a multiparameter time change scheme or as a (random) ordinary differential equation driven by discontinuous functions. In particular, we propose approximation schemes for affine processes based on the Euler method for solving the associated discontinuous ODEs, which are shown to converge.
We consider a large class of nearest neighbor attractive stochastic interacting systems that includes the asymmetric simple exclusion, zero range, bricklayers  and the symmetric K-exclusion processes. We provide exact formulas that connect particle flux (or surface growth) fluctuations to the two-point function of the process and to the motion of the second class particle. Such connections have only been available for simple exclusion where they were of great use in particle current fluctuation investigations.
We attempt to bring some modest unity to three subareas of heavy tail analysis and extreme value theory: limit laws for componentwise maxima of iid random variables;hidden regular variation and asymptotic independence;conditioned limit laws when one component of a random vector is extreme. The common theme is multivariate regular variation on a cone and the three cases cited come from specifying the cones $[0,\\infty]^d\\setminus \\{\\boldsymbol 0\\};(0,\\infty]^d;$ and $[0,\\infty]\\times (0,\\infty]$.
The following class of problems arose out of vain attempts to show that the Pascal s triangle adic transformation has trivial spectrum. Partition a set of size $N$ into sets of size $S \\equiv S(N)$ (ignoring leftovers). What is the likelihood that a set of size $K \\equiv K(N)$ will intersect each set in the partition in at least $R \\equiv R(N)$ members (as $N$ increases)? Via elementary techniques and under reasonable hypotheses, we obtain an easy-to-use formula. Although different from the corresponding minimum problem for balls and bins (with $m = K$ balls and $n = N/S$ bins), under modest constraints, the asymptotic probabilities are the same.
In this paper we define distributions on moment spaces corresponding to measures on the real line with an unbounded support. We identify these distributions as limiting distributions of random moment vectors defined on compact moment spaces and as distributions corresponding to random spectral measures associated with the Jacobi, Laguerre and Hermite ensemble from random matrix theory. For random vectors on the unbounded moment spaces we prove a central limit theorem where the centering vectors correspond to the moments of the Marchenko-Pastur distribution and Wigner s semi-circle law.
We consider Sinai s walk in i.i.d. random scenery and focus our attention on a conjecture of R\\ ev\\ esz \\cite{r05} concerning the upper limits of Sinai s walk in random scenery when the scenery is bounded from above. A close study of the competition between the concentration property for Sinai s walk and negative values for the scenery enables us to prove that the conjecture is true if the scenery has \"thin\" negative tails and is false otherwise.
We present some product representations for random variables with the Linnik, Mittag-Leffler and Weibull distributions and establish the relationship between the mixing distributions in these representations. The main result is the representation of the Linnik distribution as a normal scale mixture with the Mittag-Leffler mixing distribution. As a corollary, we obtain the known representation of the Linnik distribution as a scale mixture of Laplace distributions. Another corollary of the main representation is the theorem establishing that the distributions of random sums of independent identically distributed random variables with finite variances converge to the Linnik distribution under an appropriate normalization if and only if the distribution of the random number of summands under the same normalization converges to the Mittag-Leffler distribution.
\"Quantum trajectories\" are solutions of stochastic differential equations also called Belavkin or Stochastic Schr\\\"odinger Equations. They describe random phenomena in quantum measurement theory. Two types of such equations are usually considered, one is driven by a one-dimensional Brownian motion and the other is driven by a counting process. In this article, we present a way to obtain more advanced models which use jump-diffusion stochastic differential equations. Such models come from solutions of martingale problems for infinitesimal generators. These generators are obtained from the limit of generators of classical Markov chains which describe discrete models of quantum trajectories. Furthermore, stochastic models of jump-diffusion equations are physically justified by proving that their solutions can be obtained as the limit of the discrete trajectories.
Subordinating a multivariate L\\ evy process, the subordinate, with a univariate subordinator gives rise to a pathwise construction of a new L\\ evy process provided the subordinator and the subordinate are independent processes. The Variance Gamma model in finance was generated accordingly from a Brownian motion and a Gamma process. Alternatively, multivariate subordination can be used to create L\\ evy processes, but this requires the subordinate to have independent or indistinguishable components. In this paper, we show that there exists another operation acting on pairs (T,X) of L\\ evy processes which creates a L\\ evy process X \\.o T. Here, T is a subordinator, but X is an arbitrary L\\ evy process with possibly dependent coordinates. We show that this method is an extension of both univariate and multivariate subordination and provide two applications. Firstly, we give a weak formulation of the Variance-alpha-Gamma-process that exhibits a wider range of dependence than using traditional subordination, and fit this model to a S&P500-FTSE100 data set. Secondly, the Variance Generalised Gamma Convolution class of L\\ evy processes formed by subordinating Brownian motion with Thorin subordinators is further extended using weak subordination.
The problem of convergence in law of normed sums of exchangeable random variables is examined. First, the problem is studied w.r.t. arrays of exchangeable random variables, and the special role played by mixtures of products of stable laws - as limits in law of normed sums in different rows of the array - is emphasized. Necessary and sufficient conditions for convergence to a specific form in the above class of measures are then given. Moreover, sufficient conditions for convergence of sums in a single row are proved. Finally, a potentially useful variant of the formulation of the results just summarized is briefly sketched, a more complete study of it being deferred to a future work.
In this paper we prove the stochastic homeomorphism flow property and the strong Feller property for stochastic differential equations with sigular time dependent drifts and Sobolev diffusion coefficients. Moreover, the local well posedness under local assumptions are also obtained. In particular, we extend Krylov and R\\\"ockner s results in \\cite{Kr-Ro} to the case of non-constant diffusion coefficients.
In this book, we introduce a new approach of sublinear expectation to deal with the problem of probability and distribution model uncertainty. We a new type of (robust) normal distributions and the related central limit theorem under sublinear expectation. We also present a new type of Brownian motion under sublinear expectations and the related stochastic calculus of Ito s type. The results provide robust tools for the problem of probability model uncertainty arising from financial risk management, statistics and stochastic controls.
The asymptotic behavior of a stochastic network represented by a birth and death processes of particles on a compact state space is analyzed. Births: Particles are created at rate $\\lambda_+$ and their location is independent of the current configuration. Deaths are due to negative particles arriving at rate $\\lambda_-$. The death of a particle occurs when a negative particle arrives in its neighborhood and kills it. Several killing schemes are considered. The arriving locations of positive and negative particles are assumed to have the same distribution. By using a combination of monotonicity properties and invariance relations it is shown that the configurations of particles converge in distribution for several models. The problems of uniqueness of invariant measures and of the existence of accumulation points for the limiting configurations are also investigated. It is shown for several natural models that if $\\lambda_+<\\lambda_-$ then the asymptotic configuration has a finite number of points with probability 1. Examples with $\\lambda_+<\\lambda_-$ and an infinite number of particles in the limit are also presented.
We introduce regenerative tree growth processes as consistent families of random trees with n labelled leaves, n>=1, with a regenerative property at branch points. This framework includes growth processes for exchangeably labelled Markov branching trees, as well as non-exchangeable models such as the alpha-theta model, the alpha-gamma model and all restricted exchangeable models previously studied. Our main structural result is a representation of the growth rule by a sigma-finite dislocation measure kappa on the set of partitions of the natural numbers extending Bertoin s notion of exchangeable dislocation measures from the setting of homogeneous fragmentations. We use this representation to establish necessary and sufficient conditions on the growth rule under which we can apply results by Haas and Miermont for unlabelled and not necessarily consistent trees to establish self-similar random trees and residual mass processes as scaling limits. While previous studies exploited some form of exchangeability, our scaling limit results here only require a regularity condition on the convergence of asymptotic frequencies under kappa, in addition to a regular variation condition.
Let $G_{n,p}^1$ be a superposition of the random graph $G_{n,p}$ and a one-dimensional lattice: the $n$ vertices are set to be on a ring with fixed edges between the consecutive vertices, and with random independent edges given with probability $p$ between any pair of vertices. Bootstrap percolation on a random graph is a process of spread of \"activation\" on a given realisation of the graph with a given number of initially active nodes. At each step those vertices which have not been active but have at least $r \\geq 2$ active neighbours become active as well. We study the size of the final active set in the limit when $n\\rightarrow \\infty $. The parameters of the model are $n$, the size $A_0=A_0(n)$ of the initially active set and the probability $p=p(n)$ of the edges in the graph. Bootstrap percolation process on $G_{n,p}$ was studied earlier. Here we show that the addition of $n$ local connections to the graph $G_{n,p}$ leads to a more narrow critical window for the phase transition, preserving however, the critical scaling of parameters known for the model on $G_{n,p}$. We discover a range of parameters which yields percolation on $G_{n,p}^1$ but not on $G_{n,p}$.
A particle subject to a white noise external forcing moves like a Langevin process. Consider now that the particle is reflected at a boundary which restores a portion c of the incoming speed at each bounce. For c strictly smaller than the critical value 0.1630, the bounces of the reflected process accumulate in a finite time. We show that nonetheless the particle is not necessarily absorbed after this time. We define a \"resurrected\" reflected process as a recurrent extension of the absorbed process, and study some of its properties. We also prove that this resurrected reflected process is the unique solution to the stochastic partial differential equation describing the model. Our approach consists in defining the process conditioned on never being absorbed, via an h-transform, and then giving the Ito excursion measure of the recurrent extension thanks to a formula fairly similar to Imhof s relation.
In this paper, we study the asymptotic behavior of supremum distribution of some classes of iterated stochastic processes $\\{X(Y(t)) : t \\in [0, \\infty)\\}$, where $\\{X(t) : t \\in \\mathbb{R} \\}$ is a centered Gaussian process and $\\{Y(t): t \\in [0, \\infty)\\}$ is an independent of $\\{X(t)\\}$ stochastic process with a.s. continuous sample paths. In particular, the asymptotic behavior of $\\mathbb{P}\\left(\\sup_{s \\in [0,T]} X(Y(s)) > u\\right)$ as $u \\to \\infty$, where $T > 0$, as well as $\\lim_{u\\to\\infty} \\mathbb{P}\\left(\\sup_{s \\in [0, h(u)]} X(Y(s)) > u\\right)$, for some suitably chosen function $h(u)$ are analyzed. As an illustration, we study the asymptotic behavior of the supremum distribution of iterated fractional Brownian motion process.
We show that various identities from [1] and [3] involving Gould-Hopper polynomials can be deduced from the real but also complex orthogonal invariance of multivariate Gaussian distributions. We also deduce from this principle a useful stochastic representation for the inner product of two non-centered Gaussian vectors and two non-centered Gaussian matrices. [1] J. Daboul, S. S. Mizrahi, O(N) symmetries, sum rules for generalized Hermite polynomials and squeezed state, J. Phys. A: Math. Gen. 38 (2005) 427-448 [3] P. Graczyk, A. Nowak, A composition formula for squares of Hermite polynomials and its generalizations, C. R. Acad. Sci. Paris, Ser 1 338 (2004)
Estimating numerically the spectral radius of a random walk on a nonamenable graph is complicated, since the cardinality of balls grows exponentially fast with the radius. We propose an algorithm to get a bound from below for this spectral radius in Cayley graphs with finitely many cone types (including for instance hyperbolic groups). In the genus $2$ surface group, it improves by an order of magnitude the previous best bound, due to Bartholdi.
We study sample path deviations of the Wiener process from three different representations of its bridge: anticipative version, integral representation and space-time transform. Although these representations of the Wiener bridge are equal in law, their sample path behavior is quite different. Our results nicely demonstrate this fact. We calculate and compare the expected absolute, quadratic and conditional quadratic path deviations of the different representations of the Wiener bridge from the original Wiener process. It is further shown that the presented qualitative behavior of sample path deviations is not restricted only to the Wiener process and its bridges. Sample path deviations of the Ornstein-Uhlenbeck process from its bridge versions are also considered and we give some quantitative answers also in this case.
We characterize recurrence and transience of nonnegative multivariate autoregressive processes of order one with random contractive coefficient matrix, of subcritical multitype Galton-Watson branching processes in random environment with immigration, and of the related max-autoregressive processes and general random exchange processes. Our criterion is given in terms of the maximal Lyapunov exponent of the coefficient matrix and the cumulative distribution function of the innovation/immigration component.
We consider an extension of the standard G/G/1 queue, described by the equation $W\\stackrel{\\mathcal{D}}{=}\\max\\{0, B-A+YW\\}$, where $\\mathbb{P}[Y=1]=p$ and $\\mathbb{P}[Y=-1]=1-p$. For $p=1$ this model reduces to the classical Lindley equation for the waiting time in the G/G/1 queue, whereas for $p=0$ it describes the waiting time of the server in an alternating service model. For all other values of $p$ this model describes a FCFS queue in which the service times and interarrival times depend linearly and randomly on the waiting times. We derive the distribution of $W$ when $A$ is generally distributed and $B$ follows a phase-type distribution, and when $A$ is exponentially distributed and $B$ deterministic.
In this paper we study the hydrodynamic limit for a stochastic process describing the time evolution of the membrane potentials of a system of neurons with spatial dependency. We do not impose on the neurons mean-field type interactions. The values of the membrane potentials evolve under the effect of chemical and electrical synapses and leak currents. The system consists of $\\epsilon^{-2}$ neurons embedded in $[0,1)^2$, each spiking randomly according to a point process with rate depending on both its membrane potential and position. When neuron $i$ spikes, its membrane potential is reset to a resting value while the membrane potential of $j$ is increased by a positive value $\\epsilon^2 a(i,j)$, if $i$ influences $j$. Furthermore, between consecutive spikes, the system follows a deterministic motion due both to electrical synapses and leak currents. The electrical synapses are involved in the synchronization of neurons. For each pair of neurons $(i,j)$, we modulate this synchronizing strength by $\\epsilon^2 b(i,j)$, where $b(i,j)$ is a nonnegative symmetric function. On the other hand, the leak currents inhibit the activity of all neurons, attracting simultaneously their membrane potentials to the resting value. In the main result of this paper is shown that the empirical distribution of the membrane potentials converges, as the parameter $\\epsilon$ goes to zero, to a probability density $\\rho_t(u,r)$ which is proved to obey a non linear PDE of Hyperbolic type.
In this article we study transition probabilities of a class of subordinate Brownian motions. Under mild assumptions on the Laplace exponent of the corresponding subordinator, sharp two sided estimates of the transition probability are established. This approach, in particular, covers subordinators with Laplace exponents that vary regularly at infinity with index one, e.g. \\[ \\phi(\\lambda)=\\frac{\\lambda}{\\log(1+\\lambda)}-1 \\quad \\text{ or }\\quad \\phi(\\lambda)=\\frac{\\lambda}{\\log(1+\\lambda^{\\beta/2})},\\ \\beta\\in (0,2), \\] that correspond to subordinate Brownian motions with scaling order that is not necessarily strictly between 0 and 2. These estimates are applied to estimate Green function (potential) of subordinate Brownian motion. We also prove the equivalence of the lower scaling condition of the Laplace exponent and the near diagonal upper estimate of the transition estimate.
We present an example of a single-server polling system with two queues and an adaptive service policy where the stability region depends on the expected values of all the primitives and also on a certain exponential moment of the service-time distribution in one of the queues. The latter parameter can not be determined, in general, in terms of any finite number of power moments. It follows that the fluid approximation approach may not be an appropriate tool for the stability study of this model.
We want to compute the cumulative distribution function of a one-dimensional Poisson stochastic integral $I(\\krnl) = \\displaystyle \\int_0^T \\krnl(s) N(ds)$, where $N$ is a Poisson random measure with control measure $n$ and $\\krnl$ is a suitable kernel function. We do so by combining a Kolmogorov-Feller equation with a finite-difference scheme. We provide the rate of convergence of our numerical scheme and illustrate our method on a number of examples. The software used to implement the procedure is available on demand and we demonstrate its use in the paper.
Benjamini, Burdzy and Chen (2007) introduced the notion of a shy coupling: a coupling of a Markov process such that, for suitable starting points, there is a positive chance of the two component processes of the coupling staying a positive distance away from each other for all time. Among other results, they showed no shy couplings could exist for reflected Brownian motions in C^2 bounded convex planar domains whose boundaries contain no line segments. Here we use potential-theoretic methods to extend this Benjamini et al. result (a) to all bounded convex domains (whether planar and smooth or not) whose boundaries contain no line segments, (b) to all bounded convex planar domains regardless of further conditions on the boundary.
We study the nonlinear stochastic heat equation in the spatial domain $\\mathbb {R}$, driven by space-time white noise. A central special case is the parabolic Anderson model. The initial condition is taken to be a measure on $\\mathbb {R}$, such as the Dirac delta function, but this measure may also have noncompact support and even be nontempered (e.g., with exponentially growing tails). Existence and uniqueness of a random field solution is proved without appealing to Gronwall s lemma, by keeping tight control over moments in the Picard iteration scheme. Upper bounds on all $p$th moments $(p\\ge2)$ are obtained as well as a lower bound on second moments. These bounds become equalities for the parabolic Anderson model when $p=2$. We determine the growth indices introduced by Conus and Khoshnevisan [Probab. Theory Related Fields 152 (2012) 681-701].
Automatic test data generation (ATG) is a major topic in software engineering. In this paper, we seek to bridge the gap between the coverage criteria supported by symbolic ATG tools and the most advanced coverage criteria found in the literature. We define a new testing criterion, label coverage, and prove it to be both expressive and amenable to efficient automation. We propose several innovative techniques resulting in an effective black-box support for label coverage, while a direct approach induces an exponential blow-up of the search space. Initial experiments show that ATG for label coverage can be achieved at a reasonable cost and that our optimisations yield very significant savings.
Code metrics collected at the method level are often aggregated using summation to capture system properties at higher levels (e.g., file- or package-level). Since defect data is often available at these higher levels, this aggregation allows researchers to build defect prediction models. Recent findings by Landman et al. indicate that aggregation is likely to inflate the correlation between size and complexity metrics. In this paper, we explore the effect of nine aggregation techniques on the correlation between three types of code metrics, namely Lines of Code, McCabe, and Halstead metrics. In addition to summation, we study aggregation techniques that are measures of: (1) central tendency (average and median), (2) dispersion (standard deviation and inter-quartile range), (3) shape (skewness and kurtosis), and (4) income inequality (Theil index and Gini coefficient). Our results show that defect prediction models built using summation outperform those built using other aggregation techniques. We also find that more complex aggregations are no different than much simpler ones and that incorporating all aggregation types in the same model does not provide a significant improvement over using summation alone.
The nature of Systems of Systems (SoSs), large complex systems composed of independent, geographically distributed and continuously evolving constituent systems, means that faults are unavoidable. Previous work on defining contractual specifications of the constituent systems of SoSs does not provide any explicit consideration for faults. In this paper we address that gap by extending an existing pattern for modelling contracts with fault modelling concepts. The proposed extensions are introduced with respect to an Audio Visual SoS case study from Bang and Olufsen, before discussing how they relate to previous work on modelling faults in SoSs.
This paper presents a technique for automatically constructing a fix for buggy concurrent programs: given a concurrent program that does not satisfy user-provided assertions, we infer atomic blocks that fix the program. An atomic block protects a piece of code and ensures that it runs without interruption from other threads. Our technique uses a verification tool as a subroutine to find the smallest atomic regions that remove all bugs in a given program. Keeping the atomic regions small allows for maximum concurrency. We have implemented our approach in a tool called AtomicInf. A user of AtomicInf can choose between strong and weak atomicity semantics for the inferred fix. While the former is simpler to find, the latter provides more information about the bugs that got fixed. We ran AtomicInf on several benchmarks and came up with the smallest and the most precise atomic regions in all of them. We implemented an earlier technique to our setting and observed that AtomicInf is 1.7 times faster on an average as compared to an earlier approach.
Online interpretation and visualization of project data are gaining increasing importance on the long road towards predictable and controllable software project execution. This paper sketches the Sprint I controlling approach for software development projects and gives first evaluation results. The approach is grounded on the usage of context-oriented cluster curves and integrated in the framework of software project control centers.
Industrial automation systems (IASs) are commonly developed using the languages defined by the IEC 61131 standard and are executed on PLCs. In this paper, a system-based approach for the development of IASs is adopted. A framework is described to refine the UML model of the software part, which is extracted from the SysML system model, and get the implementation code. Two implementation alternatives are considered to exploit PLCs but also the recent deluge of embedded boards in the market. For PLC targets, the new version of IEC 61131 that supports Object-Orientation is adopted, while Java is used for embedded boards. The case study was developed as a lab exercise for teaching the various technologies that address challenges in the domain of cyber-physical systems where Internet of Things (IoT) would be the glue regarding their cyber interfaces.
Universities and Institutions these days  deals with issues related to with assessment of large number of students. Various evaluation methods have been adopted by examiners in different institutions to examining the ability of an individual, starting from manual means of using paper and pencil to electronic, from oral to written, practical to theoretical and many others. There is a need to expedite the process of examination in order to meet the increasing enrolment of students at the universities and institutes. Sip Based Mass Mobile Examination System (SiBMMES) expedites the examination process by automating various activities in an examination such as exam paper setting, Scheduling and allocating examination time and evaluation (auto-grading for objective questions) etc. SiBMMES uses the IP Multimedia Subsystem (IMS) that is an IP communications framework providing an environment for the rapid development of innovative and reusable services Session Initial Protocol (SIP) is a signalling (request-response) protocol for this architecture and it is used for establishing sessions in an IP network, making it an ideal candidate for supporting terminal mobility in the IMS to deliver the services, with the extended services available in IMS like open APIs, common network services, Quality of Services (QoS) like multiple sessions per call, Push to Talk etc often requiring multiple types of media (including voice, video, pictures, and text). SiBMMES is an effective solution for mass education evaluation using mobile and web technology. In this paper, a novel hybrid component based development (CBD) model is proposed for SiBMMES. A Component based Hybrid Model is selected to the fact that IMS takes the concept of layered architecture one step further by defining a horizontal architecture where service enablers and common functions can be reused for multiple applications.
Chidamber and Kemerer first defined a cohesion measure for object-oriented software - the Lack of Cohesion in Methods (LCOM) metric. This paper presents a pedagogic evaluation and discussion about the LCOM metric using field data from three industrial systems. System 1 has 34 classes, System 2 has 383 classes and System 3 has 1055 classes. The main objectives of the study were to determine if the LCOM metric was appropriate in the measurement of class cohesion and the determination of properly and improperly designed classes in the studied systems. Chidamber and Kemerer s suite of metric was used as metric tool. Descriptive statistics was used to analyze results. The result of the study showed that in System 1, 78.8% (26 classes) were cohesive; System 2 54% (207 classes) were cohesive; System 3 30% (317 classes) were cohesive. We suggest that the LCOM metric measures class cohesiveness and was appropriate in the determination of properly and improperly designed classes in the studied system.
The era of the PC platform left a legacy of competitive strategies for the future technologies to follow. However, this notion became more complicated, once the future grew out to be a present with huge bundle of innovative technologies, Internet capabilities, communication possibilities, and ease in life. A major step of moving from a product phone to a smart phone, eventually to a mobile device has created a new industry with humongous potential for further developments. The current mobile platform market is witnessing a platforms-war with big players such as Apple, Google, Nokia and Microsoft in a major role. An important aspect of today s mobile platform market is the contributions made through open source initiatives which promote innovation. This paper gives an insight into the open-source software strategies of the leading players and its implications on the market. It first gives a precise overview of the past leading to the current mobile platform market share state. Then it briefs about the open-source software components used and released by Apple, Google and Nokia platforms, leading to their mobile platform strategies with regard to open source. Finally, the paper assesses the situation from the point of view of communities of software developers complementing each platform. The authors identified relevant implications of the open-source phenomenon in the mobile-industry.
This paper gives an overview of SCR3 -- a toolset designed to increase the usability of formal methods for software development. Formal requirements are specified in SCR3 in an easy to use and review format, and then used in checking requirements for correctness and in verifying consistency between annotated code and requirements. In this paper we discuss motivations behind this work, describe several tools which are part of SCR3, and illustrate their operation on an example of a Cruise Control system.
Athena is the ATLAS off-line software framework, based upon the GAUDI architecture from LHCb. As part of ATLAS  continuing efforts to enhance and customise the architecture to meet our needs, we have developed a data object description tool suite and service for Athena. The aim is to provide a set of tools to describe, manage, integrate and use the Event Data Model at a design level according to the concepts of the Athena framework (use of patterns, relationships, ...). Moreover, to ensure stability and reusability this must be fully independent from the implementation details. After an extensive investigation into the many options, we have developed a language grammar based upon a description language (IDL, ODL) to provide support for object integration in Athena. We have then developed a compiler front end based upon this language grammar, JavaCC, and a Java Reflection API-like interface. We have then used these tools to develop several compiler back ends which meet specific needs in ATLAS such as automatic generation of object converters, and data object scripting interfaces. We present here details of our work and experience to date on the Athena Definition Language and Athena Data Dictionary.
The Software Craftsmanship manifesto has defined values and principles that software development teams should follow to deliver quality software that fulfills functional and non-functional requirements without dealing with high amounts of technical debt. Software craftsmanship approach to software development prioritizes technical practices in order to provide a clean code base. This work analyzes a set of practices that can be applied to a Scrum project that aims to incorporate Software Craftsmanship values. The process implementation described may be a useful contribution for software development teams who also intend to implement Software Craftsmanship on their projects.
The work presented in this paper is related to the area of situational method engineering (SME). In this domain, approaches are developed accordingly to specific project specifications. We propose to adapt an existing method construction process, namely the assembly-based one. One of the particular features of assembly-based SME approach is the selection of method chunks. Our proposal is to offer a better guidance in the retrieval of chunks by the introduction of multicriteria techniques. To use them efficiently, we defined a typology of projects characteristics, in order to identify all their critical aspects, which will offer a priorisation to help the method engineer in the choice between similar chunks.
The objective of this research work is to improve the degree of excellence by removing the number of exceptions from the software. The modern age is more concerned with the quality of software. Extensive research is being carried out in this direction. The rate of improvement of quality of software largely depends on the development time. This development time is chiefly calculated in clock hours. However development time does not reflect the effort put in by the developer. A better parameter can be the rate of improvement of quality level or the rate of improvement of the degree of excellence with respect to time. Now this parameter needs the prediction of error level and degree of excellence at a particular stage of development of the software. This paper explores an attempt to develop a system to predict rate of improvement of the software quality at a particular point of time with respect to the number of lines of code present in the software. Having calculated the error level and degree of excellence at two points in time, we can move forward towards the estimation of the rate of improvement of the software quality with respect to time. This parameter can estimate the effort put in while development of the software and can add a new dimension to the understanding of software quality in software engineering domain. In order to obtain the results we have used an indigenous tool for software quality prediction and for graphical representation of data, we have used Microsoft office 2007 graphical chart.
This volume contains the proceedings of the Seventh Workshop on Model-Based Testing (MBT 2012), which was held on 25 March, 2012 in Tallinn, Estonia, as a satellite event of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012. The workshop is devoted to model-based testing of both software and hardware. Model-based testing uses models describing the required behavior of the system under consideration to guide such efforts as test selection and test results evaluation. Testing validates the real system behavior against models and checks that the implementation conforms to them, but is capable also to find errors in the models themselves. The first MBT workshop was held in 2004, in Barcelona. At that time MBT already had become a hot topic, but the MBT workshop was the first event devoted mostly to this topic. Since that time the area has generated enormous scientific interest, and today there are several specialized workshops and more broad conferences on software and hardware design and quality assurance covering model based testing. MBT has become one of the most powerful system analysis tools, one of the latest hot topic related is applying MBT in security analysis and testing. MBT workshop tries to keep up with current trends. In 2012 \"industrial paper\" category was added to the program and two industrial papers were accepted by the program committee.
Behavior Engineering (BE) provides a rigorous way to derive a formal specification of a software system from the requirements written in natural language. Its graphical specification language, Behavior Tree (BT), has been used with success in industry to systematically translate large, complex, and often erroneous requirements into an integrated model of the software system. BE s process, the Behavior Modeling Process (BMP), allows requirements to be translated into individual requirement BTs one at a time, which are then integrated to form a holistic view of the system. The integrated BT then goes through a series of modifications to construct a specification BT, which is used for validation and verification. The BMP also addresses different types of defects in the requirements throughout its process. However, BT itself is a graphical modeling notation, and the types of integration relations, how they correspond to particular issues, how they should be integrated and how to get formal specification have not been clearly defined. As a result, the BMP is informal, and provides guidelines to perform all these tasks on an ad-hoc basis. In this paper, we first introduce a mathematical framework which defines the graphical form of BTs which we use to define the integration relationships of BTs and to formalize the integration strategy of the BMP. We then formulate semi-automated requirements defects detection techniques by utilizing this underlying mathematical framework, which may be extended to formalize the BMP, develop change management framework for it, build techniques for round-trip engineering and so on.
Development and maintenance of Web application is still a complex and error-prone process. We need integrated techniques and tool support for automated generation of Web systems and a ready prescription for easy maintenance. The MDA approach proposes an architecture taking into account the development and maintenance of large and complex software. In this paper, we apply MDA approach for generating PSM from UML design to MVC 2Web implementation. That is why we have developed two meta-models handling UML class diagrams and MVC 2 Web applications, then we have to set up transformation rules. These last are expressed in ATL language. To specify the transformation rules (especially CRUD methods) we used a UML profiles. To clearly illustrate the result generated by this transformation, we converted the XMI file generated in an EMF (Eclipse Modeling Framework) model.
When using object-oriented frameworks it is easy to overlook certain important method calls that are required at particular places in code. In this paper, we provide a comprehensive set of empirical facts on this problem, starting from traces of missing method calls in a bug repository. We propose a new system that searches for missing method calls in software based on the other method calls that are observable. Our key insight is that the voting theory concept of majority rule holds for method calls: a call is likely to be missing if there is a majority of similar pieces of code where this call is present. The evaluation shows that the system predictions go further missing method calls and often reveal different kinds of code smells (e.g. violations of API best practices).
Developing an error-free spreadsheet has been a problem since the beginning of end-user computing. In this paper, we present a methodology that separates the modeling from the implementation. Using proven techniques from Information Systems and Software Engineering, we present strict, but simple, rules governing the implementation from the model. The resulting spreadsheet should be easier to understand, audit and maintain.
With the advent of WWW and outburst in technology and software development, testing the software became a major concern. Due to the importance of the testing phase in a software development life cycle, testing has been divided into graphical user interface (GUI) based testing, logical testing, integration testing, etc.GUI Testing has become very important as it provides more sophisticated way to interact with the software. The complexity of testing GUI increased over time. The testing needs to be performed in a way that it provides effectiveness, efficiency, increased fault detection rate and good path coverage. To cover all use cases and to provide testing for all possible (success/failure) scenarios the length of the test sequence is considered important. Intent of this paper is to study some techniques used for test case generation and process for various GUI based software applications.
The continued existence of any software industry depends on its capability to develop nearly zero-defect product, which is achievable through effective defect management. Inspection has proven to be one of the promising techniques of defect management. Introductions of metrics like, Depth of Inspection (DI, a process metric) and Inspection Performance Metric (IPM, a people metric) enable one to have an appropriate measurement of inspection technique. This article elucidates a mathematical approach to estimate the IPM value without depending on shop floor defect count at every time. By applying multiple linear regression models, a set of characteristic coefficients of the team is evaluated. These coefficients are calculated from the empirical projects that are sampled from the teams of product-based and service-based IT industries. A sample of three verification projects indicates a close match between the IPM values obtained from the defect count (IPMdc) and IPM values obtained using the team coefficients using the mathematical model (IPMtc). The IPM values observed onsite and IPM values produced by our model which are strongly matching, support the predictive capability of IPM through team coefficients. Having finalized the value of IPM that a company should achieve for a project, it can tune the inspection influencing parameters to realize the desired quality level of IPM. Evaluation of team coefficients resolves several defect-associated issues, which are related to the management, stakeholders, outsourcing agents and customers. In addition, the coefficient vector will further aid the strategy of PSP and TSP
In this technical report we describe describe the Domain Specific Language (DSL) of the Workflow Execution Execution (WEE). Instead of interpreting an XML based workflow description language like BPEL, the WEE uses a minimized but expressive set of statements that runs directly on to of a virtual machine that supports the Ruby language.Frameworks/Virtual Machines supporting supporting this language include Java, .NET and there exists also a standalone Virtual Machine. Using a DSL gives us the advantage of maintaining a very compact code base of under 400 lines of code, as the host programming language implements all the concepts like parallelism, threads, checking for syntactic correctness. The implementation just hooks into existing statements to keep track of the workflow and deliver information about current existing context variables and state to the environment that embeds WEE.
In a recent empirical study we found that evaluating abstractions of Model-Driven Engineering (MDE) is not as straight forward as it might seem. In this paper, we report on the challenges that we as researchers faced when we conducted the aforementioned field study. In our study we found that modeling happens within a complex ecosystem of different people working in different roles. An empirical evaluation should thus mind the ecosystem, that is, focus on both technical and human factors. In the following, we present and discuss five lessons learnt from our recent work.
Requirements elicitation and requirements analysis are important practices of Requirements Engineering. Elicitation techniques, such as interviews and questionnaires, rely on formulating interrogative questions and asking these in a proper order to maximize the accuracy of the information being gathered. Information gathered during requirements elicitation then has to be interpreted, analyzed, and validated. Requirements analysis involves analyzing the problem and solutions spaces. In this paper, we describe a method to formulate interrogative questions for effective requirements elicitation based on the lexical and semantic principles of the English language interrogatives, and propose a pattern to organize stakeholder viewpoint concerns for better requirements analysis. This helps requirements engineer thoroughly describe problem and solutions spaces. Most of the previous requirements elicitation studies included six out of the seven English language interrogatives  what ,  where ,  when ,  who ,  why , and  how  (denoted by W5H) and did not propose any order in the interrogatives. We show that extending the set of six interrogatives with  which  (denoted by W6H) improves the generation and formulation of questions for requirements elicitation and facilitates better requirements analysis via arranging stakeholder views. We discuss the interdependencies among interrogatives (for requirements engineer to consider while eliciting the requirements) and suggest an order for the set of W6H interrogatives. The proposed W6H-based reusable pattern also aids requirements engineer in organizing viewpoint concerns of stakeholders, making this pattern an effective tool for requirements analysis.
The increasing popularity of JavaScript (JS) has lead to a variety of JS frameworks (JSF) that aim to help developers to address programming tasks. However, the JSFs number has risen rapidly to thousands and more. It is challenging for practitioners to identify the frameworks that best fit to their needs and to develop new ones fitting such needs. There is a lack of knowledge regarding the processes and reasons that drive developers towards the choice. This paper explores the decision-making rationale that leads to a choice of a JSF. We conducted a qualitative interpretive study, following the grounded theory. We interviewed 18 participants, chosen up to reaching theoretical saturation, who are decision makers in their companies or entrepreneurs regarding the JSF selection. We offer a model of desirable JSF factors. The factors are usability (attractiveness, learnability, understandability), cost, efficiency (performance, size), and functionality (automatization, extensibility, flexibility, isolation, modularity, suitability, updates). A combination of four decision makers, which are customer, developer, team, and team leader, leads to the choice. Our model contributes to the body of knowledge related to the decision-making process when selecting a JSF. As a practical implication, our model is useful for Web and JSF developers.
This research paper designates the importance and usage of the case study approach effectively to educating and training software designers and software engineers both in academic and industry. Subsequently an account of the use of case studies based on software engineering in the education of professionals, there is a conversation of issues in training software designers and how a case teaching method can be used to state these issues. The paper describes a software project titled Online Tower Plotting System (OTPS) to develop a complete and comprehensive case study, along with supporting educational material. The case study is aimed to demonstrate a variety of software areas, modules and courses: from bachelor through masters, doctorates and even for ongoing professional development.
Cloud computing is one of the most exciting IT trends nowadays. It poses several challenges on application integration with respect to, for example, security. In this work we collect and categorize several new integration patterns and pattern solutions with a focus on cloud integration requirements. Their evidence and examples are based on an extensive literature review and a system study of \"well-established\" open source systems.
Regression testing is performed to provide confidence that changes in a part of software do not affect other parts of the software. An execution of all existing test cases is the best way to re-establish this confidence. However, regression testing is an expensive process---there might be insufficient resources (e.g., time, workforce) to allow for the re-execution of all test cases. Regression test prioritization techniques attempt to re-order a regression test suite based on some criteria so that highest priority test cases are executed earlier. In this study, we want to prioritize test cases for regression testing based on the dependency network of faults. In software testing, it is common that some faults are consequences of other faults (leading faults). Moreover, dependent faults can be removed if and only if the leading faults have been removed. Our goal is to prioritize test cases so that test cases that exposed leading faults (the most central faults in the fault dependency network) in the system testing phase, are executed first in regression testing. We present ComReg, a test case prioritization technique based on the dependency network of faults. We model a fault dependency network as a directed graph and identify leading faults to prioritize test cases for regression testing. We use a centrality aggregation technique which considers six network representative centrality metrics to identify leading faults in the fault dependency network. We also discuss the use of fault communities to select an arbitrary percentage of the test cases from a prioritized regression test suite. We conduct a case study that evaluates the effectiveness and applicability of the proposed method.
In dynamic systems that adapt to users  needs and changing environments, dependability needs cannot be avoided. This paper proposes an orthogonal fault tolerance model as a means to manage and reason about multiple fault tolerance mechanisms that co-exist in dynamically adaptive systems. One of the key challenges associated with dynamically evolving fault tolerance needs is the feature interaction problem arising from the integration of fault tolerance features. The proposed approach provides a separation of fault tolerance concerns to study the effects of integrated fault tolerance on the system. This approach uses state machine and operational semantics to reason about these interactions and inconsistencies. The proposed approach is supported by the tool NuSMV to simulate and verify the state machines against logic statements.
The article proposes a model for the configuration management of open systems. The model aims at validation of configurations against given specifications. An extension of decision graphs is proposed to express specifications. The proposed model can be used by software developers to validate their own configurations across different versions of the components, or to validate configurations that include components by third parties. The model can also be used by end-users to validate compatibility among different configurations of the same application. The proposed model is first discussed in some application scenarios and then formally defined. Moreover, a type discipline is given to formally define validation of a configuration against a system specification
Software architecture is receiving increasingly attention as a critical design level for software systems. As software architecture design resources (in the form of architectural specifications) are going to be accumulated, the development of techniques and tools to support architectural understanding, testing, reengineering, maintenance, and reuse will become an important issue. This paper introduces a new form of slicing, named architectural slicing, to aid architectural understanding and reuse. In contrast to traditional slicing, architectural slicing is designed to operate on the architectural specification of a software system, rather than the source code of a program. Architectural slicing provides knowledge about the high-level structure of a software system, rather than the low-level implementation details of a program. In order to compute an architectural slice, we present the architecture information flow graph which can be used to represent information flows in a software architecture. Based on the graph, we give a two-phase algorithm to compute an architectural slice.
System reuse and cost are very important in software product line design area. Developers goal is to increase system reuse and decreasing cost and efforts for building components from scratch for each software configuration. This can be reached by developing Software Product Line (SPL). To handle SPL engineering process, several approaches with several techniques were developed. One of these approaches is called separated approach. It requires separating the commonalities and variability for system components to allow configuration selection based on user defined features. Textual notation-based approaches have been used for their formal syntax and semantics to represent system features and implementations. But these approaches are still weak in mixing features (conceptual level) and classes (physical level) that guarantee smooth and automatic configuration generation for software releases. The absence of methodology supporting the mixing process is a real weakness. In this paper, we enhanced SPL reuse by introducing some meta-features, classified according to their functions. As a first consequence, mixing class and feature concepts is supported in a simple way using class interfaces and inherent features for smooth move from feature model to class model. And as a second consequence, the mixing process is supported by a textual design and implementation methodology, mixing class and feature models by combining their concepts in a single language. The supported configuration generation process is simple, coherent, and complete.
Distributed information systems are needed to be autonomous, heterogeneous and adaptable to the context. This is the reason why they resort Web services based on SOA Based on the advanced technology of SOA. These technologies can evolve in a dynamic environment in a well-defined context and according to events automatically, such as time, temperature, location, authentication, etc... This is what we call self-adaptability to context. In this paper, we are interested in improving the different needs of this criterion and we propose a new approach towards a self-adaptability of SOA to the context based on workflow and showing the feasibility of this approach by integration the workflow under a platform and test this integration by a case study.
Context: Search-based software testing promises to provide users with the ability to generate high-quality test cases, and hence increase product quality, with a minimal increase in the time and effort required. One result that emerged out of a previous study to investigate the application of search-based software testing (SBST) in an industrial setting was the development of the Interactive Search-Based Software Testing (ISBST) system. ISBST allows users to interact with the underlying SBST system, guiding the search and assessing the results. An industrial evaluation indicated that the ISBST system could find test cases that are not created by testers employing manual techniques. The validity of the evaluation was threatened, however, by the low number of participants. Objective: This paper presents a follow-up study, to provide a more rigorous evaluation of the ISBST system. Method: To assess the ISBST system a two-way crossover controlled experiment was conducted with 58 students taking a Verification and Validation course. The NASA Task Load Index (NASA-TLX) is used to assess the workload experienced by the participants in the experiment. Results: The experimental results validated the hypothesis that the ISBST system generates test cases that are not found by the same participants employing manual testing techniques. A follow-up laboratory experiment also investigates the importance of interaction in obtaining the results. In addition to this main result, the subjective workload was assessed for each participant by means of the NASA-TLX tool. The evaluation showed that, while the ISBST system required more effort from the participants, they achieved the same performance. Conclusions: The paper provides evidence that the ISBST system develops test cases that are not found by manual techniques, and that interaction plays an important role in achieving that result.
In enterprise organizations, the Bring-Your-Own-Device (BYOD) requirement has become prevalent as employees use their own mobile devices to process the workflow-oriented tasks. Consequently, it calls for approaches that can quickly develop and integrate mobile user interactions into existing business processes, and adapt to various contexts. However, designing, developing and deploying adaptive and mobile-oriented user interfaces for existing process engines are non-trivial, and require significant systematic efforts. To address this issue, we present a novel middleware-based approach, called MUIT, to developing and deploying the Mobility, User Interactions and Tasks into WS-BPEL engines. MUIT can be seamlessly into WS-BPEL without intrusions of existing process instances. MUIT provides a Domain-Specific Language (DSL) that provides some intuitive APIs to support the declarative development of adaptive, mobile-oriented, and Web-based user interfaces in WS-BPEL. The DSL can significantly improve the development of user interactions by preventing arbitrarily mixed codes, and its runtime supports satisfactory user experiences. We implement a proof- of-concept prototype by integrating MUIT into the commodity WS-BPEL-based Apusic Platform, and evaluate the performance and usability of MUIT platform.
Model Transformations in Practice (MTiP) 2005 was a workshop which provided a forum for the model transformation community to discuss practical model transformation issues. Although many different model transformation approaches have been proposed and explored in recent years, there has been little work on comparing and contrasting various approaches. Without such comparisons, it is hard to assess new model transformation approaches such as the upcoming OMG MOF/QVT recommendation, or to discern sensible future paths for the area. Our aims with the workshop were to create a forum that would help lead to an increased understanding of the relative merits of different model transformation techniques and approaches. A more advanced understanding of such merits is of considerable benefit to both the model transformation and wider modelling communities.
Spreadsheets are widely used within companies and often form the basis for business decisions. Numerous cases are known where incorrect information in spreadsheets has lead to incorrect decisions. Such cases underline the relevance of research on the professional use of spreadsheets. Recently a new dataset became available for research, containing over 15.000 business spreadsheets that were extracted from the Enron E-mail Archive. With this dataset, we 1) aim to obtain a thorough understanding of the characteristics of spreadsheets used within companies, and 2) compare the characteristics of the Enron spreadsheets with the EUSES corpus which is the existing state of the art set of spreadsheets that is frequently used in spreadsheet studies. Our analysis shows that 1) the majority of spreadsheets are not large in terms of worksheets and formulas, do not have a high degree of coupling, and their formulas are relatively simple; 2) the spreadsheets from the EUSES corpus are, with respect to the measured characteristics, quite similar to the Enron spreadsheets.
Nowadays, business enterprises often need to dynamically reconfigure their internal processes in order to improve the efficiency of the business flow. However, modifications of the workflow usually lead to several problems in terms of deadlock freedom, completeness and security. A solid solution to these problems consists in the application of model checking techniques in order to verify if specific properties of the workflow are preserved by the change in configuration. Our goal in this work is to develop a formal verification procedure to deal with these problems. The first step consists in developing a formal definition of a BPMN model of a business workflow. Then, a given BPMN model is translated into a formal model specified in Promela. Finally, by using the SPIN model checker, the correctness of the reconfigured workflow is verified.
Researchers are often on the move, say at conferences or projects meetings, and as workflows are becoming ubiquitous in the scientific process, having access to scientific workflows from a mobile device would be a significant advantage. We therefore have developed Taverna Mobile, an application for Android phones which allows browsing of existing workflows, executing them, and reviewing the results. Taverna Mobile does not aim to reproduce the full experience of building workflows in the Taverna Workbench, rather it focuses on tasks we have deemed relevant to a scientist that is not at her desk. For instance, when visiting a conference she might hear about someone s workflow, which she can quickly locate and mark for later exploration. When in the biology lab, faced with updated scientific data, the scientist can rerun her own workflow with new inputs. While commuting, she can monitor the status of a long-running job.
Testing is a vital part of software development, and spreadsheets are like any other software in this respect. This paper discusses the testing of spreadsheets in the light of one practitioner s experience. It considers the concept of software testing and how it differs from reviewing, and describes when it might take place. Different types of testing are described, and some techniques for performing them presented. Some of the commonly encountered problems are discussed.
An integral use of the model driven development paradigm influences and changes an organization s software development division rather heavily. Such a paradigm reduces some tasks in complexity and costs, but also introduces new tasks and, if introduced seriously, has severe affects on activities and roles in the software development process. As the model becomes the most important development artifact, there are new challenges to the development team, e. g. assessing the model s quality, model partitioning and configuration management for distributed teams, setup of build management, tool chaining and tracing of information through the various artifacts. Organizations coping with model driven development need to successfully introduce new tools and new ways of thinking, they are challenged in adopting their processes and training their staff. This paper presents an ongoing research project on the assessment of the usability of modeling and model driven development at a global industrial organization with its headquarters in Germany. The matter of interest is the analysis of the usability of modeling (especially with the UML) and model driven development by accomplishing an empirical, quantitative survey.
Aspect mining is a reverse engineering process that aims at finding crosscutting concerns in existing systems. This paper proposes an aspect mining approach based on determining methods that are called from many different places, and hence have a high fan-in, which can be seen as a symptom of crosscutting functionality. The approach is semi-automatic, and consists of three steps: metric calculation, method filtering, and call site analysis. Carrying out these steps is an interactive process supported by an Eclipse plug-in called FINT. Fan-in analysis has been applied to three open source Java systems, totaling around 200,000 lines of code. The most interesting concerns identified are discussed in detail, which includes several concerns not previously discussed in the aspect-oriented literature. The results show that a significant number of crosscutting concerns can be recognized using fan-in analysis, and each of the three steps can be supported by tools.
Score-P is a measurement infrastructure originally designed for the analysis and optimization of the performance of HPC codes. Recent extensions of Score-P and its associated tools now also allow the investigation of energy-related properties and support the user in the implementation of corresponding improvements. Since it would be counterproductive to completely ignore performance issues in this connection, the focus should not be laid exclusively on energy. We therefore aim to optimize software with respect to an objective function that takes into account energy and run time.
Despite numerous efforts by various developers, web service composition is still a difficult problem to tackle. Lot of progressive research has been made on the development of suitable standards. These researches help to alleviate and overcome some of the web services composition issues. However, the legacy application wrappers generate nonstandard WSDL which hinder the progress. Indeed, in addition to their lack of semantics, WSDLs have sometimes different shapes because they are adapted to circumvent some technical implementation aspect. In this paper, we propose a method for the semi automatic composition of web services in the context of the NeuroLOG project. In this project the reuse of processing tools relies on a legacy application wrapper called jGASW. The paper describes the extensions to OWL-S in order to introduce and enable the composition of web services generated using the jGASW wrapper and also to implement consistency checks regarding these services.
Software re-modularization is an old preoccupation of reverse engineering research. The advantages of a well structured or modularized system are well known. Yet after so much time and efforts, the field seems unable to come up with solutions that make a clear difference in practice. Recently, some researchers started to question whether some basic assumptions of the field were not overrated. The main one consists in evaluating the high-cohesion/low-coupling dogma with metrics of unknown relevance. In this paper, we study a real structuring case (on the Eclipse platform) to try to better understand if (some) existing metrics would have helped the software engineers in the task. Results show that the cohesion and coupling metrics used in the experiment did not behave as expected and would probably not have helped the maintainers reach there goal. We also measured another possible restructuring which is to decrease the number of cyclic dependencies between modules. Again, the results did not meet expectations.
Large Intelligent Systems are so complex these days that an urgent need for designing such systems in best available way is evolving. Modeling is the useful technique to show a complex real world system into the form of abstraction, so that analysis and implementation of the intelligent system become easy and is useful in gathering the prior knowledge of system that is not possible to experiment with the real world complex systems. This paper discusses a formal approach of agent-based large systems modeling for intelligent systems, which describes design level precautions, challenges and techniques using autonomous agents, as its fundamental modeling abstraction. We are discussing Ad-Hoc Network System as a case study in which we are using mobile agents where nodes are free to relocate, as they form an Intelligent Systems. The designing is very critical in this scenario and it can reduce the whole cost, time duration and risk involved in the project.
Designing and analysis of test cases is a challenging tasks for tester roles especially those who are related to test the structure of program. Recently, Programmers are showing valuable trend towards the implementation of recursive modules in a program structure. In testing phase of software development life cycle, test cases help the tester to test the structure and flow of program. The implementation of well designed test cases for a program leads to reduce the defect rate and efforts needed for corrective maintenance. In this paper, author proposed a strategy to design and analyze the test cases for a program structure of recursive modules. This strategy will definitely leads to validation of program structure besides reducing the defect rate and corrective maintenance efforts.
Actually, software products are increasing in a fast way and are used in almost all activities of human life. Consequently measuring and evaluating the quality of a software product has become a critical task for many companies. Several models have been proposed to help diverse types of users with quality issues. The development of techniques for building software has influenced the creation of models to assess the quality. Since 2000 the construction of software started to depend on generated or manufactured components and gave rise to new challenges for assessing quality. These components introduce new concepts such as configurability, reusability, availability, better quality and lower cost. Consequently the models are classified in basic models which were developed until 2000, and those based on components called tailored quality models. The purpose of this article is to describe the main models with their strengths and point out some deficiencies. In this work, we conclude that in the present age, aspects of communications play an important factor in the quality of software
Nowadays agile software development is used in greater extend but for small organizations only, whereas MDA is suitable for large organizations but yet not standardized. In this paper the pros and cons of Model Driven Architecture (MDA) and Extreme programming have been discussed. As both of them have some limitations and cannot be used in both large scale and small scale organizations a new architecture has been proposed. In this model it is tried to opt the advantages and important values to overcome the limitations of both the software development procedures. In support to the proposed architecture the implementation of it on Online Polling System has been discussed and all the phases of software development have been explained.
Component-oriented and service-oriented approaches have gained a strong enthusiasm in industries and academia with a particular interest for service-oriented approaches. A component is a software entity with given functionalities, made available by a provider, and used to build other application within which it is integrated. The service concept and its use in web-based application development have a huge impact on reuse practices. Accordingly a considerable part of software architectures is influenced; these architectures are moving towards service-oriented architectures. Therefore applications (re)use services that are available elsewhere and many applications interact, without knowing each other, using services available via service servers and their published interfaces and functionalities. Industries propose, through various consortium, languages, technologies and standards. More academic works are also undertaken concerning semantics and formalisation of components and service-based systems. We consider here both streams of works in order to raise research concerns that will help in building quality software. Are there new challenging problems with respect to service-based software construction? Besides, what are the links and the advances compared to distributed systems?
In the SysLab project we develop a software engineering method based on a mathematical foundation. The SysLab system model serves as an abstract mathematical model for information systems and their components. It is used to formalize the semantics of all used description techniques such as object diagrams state automata sequence charts or data-flow diagrams. Based on the requirements for such a reference model, we define the system model including its different views and their relationships.
In black-box testing of GUI applications (a form of system testing), a dynamic analysis of the GUI application is used to infer a black-box model; the black-box model is then used to derive test cases for the test of the GUI application. In this paper, we propose to supplement the test with the verification of the black-box model. We present a method that can give a guarantee of the absence of faults, i.e., the correctness of all test cases of the black-box model. The black-model allows us to formulate a parametrized verification problem. As we will show, it also allows us to circumvent the static analysis of the GUI tool kit. We have implemented our approach; preliminary experiments indicate its practical potential.
The Unified Modeling Language (UML) community has started to define so-called profiles in order to better suit the needs of specific domains or settings. Product lines1 represent a special breed of systems they are extensible semi-finished pieces of software. Completing the semi-finished software leads to various software pieces, typically specific applications, which share the same core. Though product lines have been developed for a wide range of domains, they apply common construction principles. The intention of the UML-F profile (for framework architectures) is the definition of a UML subset, enriched with a few UML-compliant extensions, which allows the annotation of such artifacts. This paper presents aspects of the profile with a focus on patterns and exemplifies the profile s usage.
Sketching is an important means of communication in software engineering practice. Yet, there is little research investigating the use of sketches. We want to contribute a better understanding of sketching, in particular its use during program comprehension. We propose a controlled experiment to investigate the effectiveness and efficiency of program comprehension with the support of sketches as well as what sketches are used in what way.
In this research we use a data stream approach to mining data and construct Decision Tree models that predict software build outcomes in terms of software metrics that are derived from source code used in the software construction process. The rationale for using the data stream approach was to track the evolution of the prediction model over time as builds are incrementally constructed from previous versions either to remedy errors or to enhance functionality. As the volume of data available for mining from the software repository that we used was limited, we synthesized new data instances through the application of the SMOTE oversampling algorithm. The results indicate that a small number of the available metrics have significance for prediction software build outcomes. It is observed that classification accuracy steadily improves after approximately 900 instances of builds have been fed to the classifier. At the end of the data streaming process classification accuracies of 80% were achieved, though some bias arises due to the distribution of data across the two classes over time.
Design patterns being applied more and more to solve the software engineering difficulties in the object oriented software design procedures. So, the design pattern detection is widely used by software industries. Currently, many solutions presented to detect the design pattern in the system design. In this paper, we will propose a new one which first; we will use the graph implementation to implement both the system design UML diagram and the design pattern UML diagram. Second, we will implement the edges for each one of the both two graphs in a set of 4-tuple elements. Then, we will apply a new inexact graph isomorphic algorithm to detect the design pattern in the system design.
Process mining represents an important field in BPM and data mining research. Recently, it has gained importance also for practitioners: more and more companies are creating business process intelligence solutions. The evaluation of process mining algorithms requires, as any other data mining task, the availability of large amount of real-world data. Despite the increasing availability of such datasets, they are affected by many limitations, in primis the absence of a \"gold standard\" (i.e., the reference model). This paper extends an approach, already available in the literature, for the generation of random processes. Novelties have been introduced throughout the work and, in particular, they involve the complete support for multiperspective models and logs (i.e., the control-flow perspective is enriched with time and data information) and for online settings (i.e., generation of multiperspective event streams and concept drifts). The proposed new framework is able to almost entirely cover the spectrum of possible scenarios that can be observed in the real-world. The proposed approach is implemented as a publicly available Java application, with a set of APIs for the programmatic execution of experiments.
Change impact analysis consists in predicting the impact of a code change in a software application. In this paper, we take a learning perspective on change impact analysis and consider the problem formulated as follows. The artifacts that are considered are methods of object-oriented software; the change under study is a change in the code of the method, the impact is the test methods that fail because of the change that has been performed. We propose an algorithm, called LCIP that learns from past impacts to predict future impacts. To evaluate our system, we consider 7 Java software applications totaling 214,000+ lines of code. We simulate 17574 changes and their actual impact through code mutations, as done in mutation testing. We find that LCIP can predict the impact with a precision of 69%, a recall of 79%, corresponding to a F-Score of 55%.
Distributing development tasks in the context of global software development bears both many risks and many opportunities. Nowadays, distributed development is often driven by only a few factors or even just a single factor such as workforce costs. Risks and other relevant factors such as workforce capabilities, the innovation potential of different regions, or cultural factors are often not recognized sufficiently. This could be improved by using empirically-based multi-criteria distribution models. Currently, there is a lack of such decision models for distributing software development work. This article focuses on mechanisms for such decision support. First, requirements for a distribution model are formulated based on needs identified from practice. Then, distribution models from different domains are surveyed, compared, and analyzed in terms of suitability. Finally, research questions and directions for future work are given.
A hierarchical model for multi-level adaptive systems is built on two basic levels: a lower behavioural level B accounting for the actual behaviour of the system and an upper structural level S describing the adaptation dynamics of the system. The behavioural level is modelled as a state machine and the structural level as a higher-order system whose states have associated logical formulas (constraints) over observables of the behavioural level. S is used to capture the global and stable features of B, by a defining set of allowed behaviours. The adaptation semantics is such that the upper S level imposes constraints on the lower B level, which has to adapt whenever it no longer can satisfy them. In this context, we introduce weak and strong adaptabil- ity, i.e. the ability of a system to adapt for some evolution paths or for all possible evolutions, respectively. We provide a relational characterisation for these two notions and we show that adaptability checking, i.e. deciding if a system is weak or strong adaptable, can be reduced to a CTL model checking problem. We apply the model and the theoretical results to the case study of motion control of autonomous transport vehicles.
Agile Software Development (ASD) methodology has become widely used in the industry. Understanding the challenges facing software engineering students is important to designing effective training methods to equip students with proper skills required for effectively using the ASD techniques. Existing empirical research mostly focused on eXtreme Programming (XP) based ASD methodologies. There is a lack of empirical studies about Scrum-based ASD programming which has become the most popular agile methodology among industry practitioners. In this paper, we present empirical findings regarding the aspects of task allocation decision-making, collaboration, and team morale related to the Scrum ASD process which have not yet been well studied by existing research. We draw our findings from a 12 week long course work project in 2014 involving 125 undergraduate software engineering students from a renowned university working in 21 Scrum teams. Instead of the traditional survey or interview based methods, which suffer from limitations in scale and level of details, we obtain fine grained data through logging students  activities in our online agile project management (APM) platform - HASE. During this study, the platform logged over 10,000 ASD activities. Deviating from existing preconceptions, our results suggest negative correlations between collaboration and team performance as well as team morale.
A critical challenge is to enable IoT application development with minimal effort from various stakeholders involved in the development process. Several approaches to tacking this challenge have been proposed in the fields of wireless sensor networks and ubiquitous and pervasive computing, regarded as precursors to the modern day of IoT. However, although existing approaches provide a wide range of features, stakeholders have specific application development requirements and choosing an appropriate approach requires thorough evaluations on different aspects. To date, this aspect has been investigated to a limited extend. In view of this, this paper provides an extensive set of evaluations based on our previous work on IoT application development framework. Specifically, we evaluate our approach in terms of (1) development effort: the effort required to create a new application, (2) reusability: the extend to which software artifacts can be reused during application development, (3) expressiveness: the characteristics of IoT applications that can be modeled using our approach, (4) memory metrics: the amount of memory and storage a device needs to consume in order to run an application under our framework, and (5) comparison of our approach with state of the art in IoT application development on various dimensions, which does not only provide a comprehensive view of state of the art, but also guides developers in selecting an approach given application requirements in hand. We believe that the above different aspects provide the research community with insight into evaluating, selecting, and developing useful IoT frameworks and applications.
For the last two decades, software architecture has been adopted as one of the main viable solutions to address the ever-increasing demands in the design and development of software systems. Nevertheless, the rapidly growing utilization of communication networks and interconnections among software systems have introduced some critical challenges, which need to be handled in order to fully unleash the potential of these systems. In this respect, Ultra-Large-Scale (ULS) systems, generally considered as a system of systems, have gained considerable attention, since their scale is incomparable to the traditional systems. The scale of ULS systems makes drastic changes in various aspects of system development. As a result, it requires that we broaden our understanding of software architectures and the ways we structure them. In this paper, we investigate the lack of an architectural maturity model framework for ULS system interoperability, and propose an architectural maturity model framework to improve ULS system interoperability.
A fundamental unit of work in programming is the code contribution (\"commit\") that a developer makes to the code base of the project in work. We use statistical methods to derive a model of the probabilistic distribution of commit sizes in open source projects and we show that the model is applicable to different project sizes. We use both graphical as well as statistical methods to validate the goodness of fit of our model. By measuring and modeling a fundamental dimension of programming we help improve software development tools and our understanding of software development.
Today, service oriented systems need to be enhanced to sense and react to users context in order to provide a better user experience. To meet this requirement, Context-Aware Services (CAS) have emerged as an underling design and development paradigm for the development of context-aware systems. The fundamental challenges for such systems development are context-awareness management and service adaptation to the users context. To cope with such requirements, we propose a well designed architecture, named ACAS, to support the development of Context-Aware Service Oriented Systems (CASOS). This architecture relies on a set of context-awareness and CAS specifications and metamodels to enhance a core service, in service oriented systems, to be context-aware. This enhancement is fulfilled by the Aspect Adaptations Weaver (A2W) which, based on the Aspect Paradigm (AP) concepts, considers the services adaptations as aspects.
QoS identification for untrustworthy Web services is critical in QoS management in the service computing since the performance of untrustworthy Web services may result in QoS downgrade. The key issue is to intelligently learn the characteristics of trustworthy Web services from different QoS levels, then to identify the untrustworthy ones according to the characteristics of QoS metrics. As one of the intelligent identification approaches, deep neural network has emerged as a powerful technique in recent years. In this paper, we propose a novel two-phase neural network model to identify the untrustworthy Web services. In the first phase, Web services are collected from the published QoS dataset. Then, we design a feedforward neural network model to build the classifier for Web services with different QoS levels. In the second phase, we employ a probabilistic neural network (PNN) model to identify the untrustworthy Web services from each classification. The experimental results show the proposed approach has 90.5% identification ratio far higher than other competing approaches.
Software effort estimation requires high accuracy, but accurate estimations are difficult to achieve. Increasingly, data mining is used to improve an organization s software process quality, e. g. the accuracy of effort estimations . There are a large number of different method combination exists for software effort estimation, selecting the most suitable combination becomes the subject of research in this paper. In this study, three simple preprocessors are taken (none, norm, log) and effort is measured using COCOMO model. Then results obtained from different preprocessors are compared and norm preprocessor proves to be more accurate as compared to other preprocessors.
Product quality level is become a key factor for companies  competitiveness. A lot of time and money are required to ensure and guaranty it. Besides, motivated by the need of traceability, collecting production data is now commonplace in most companies. Our paper aims to show that we can ensure the required quality thanks to an \"on-line quality approch\" and proposes a neural network based process to determine the optimal setting for production machines. We will illustrate this with the Acta-Mobilier case, which is a high quality lacquerer company.
Basic automated refactoring operations can be chained to perform complex structure transformations. This is useful for recovering the initial architecture of a source code which has been degenerated with successive evolutions during its maintenance lifetime. This is also useful for changing the structure of a program so that a maintenance task at hand becomes modular when it would be initially crosscutting. We focus on programs structured according to Composite and Visitor design patterns, which have dual properties with respect to modularity. We consider a refactoring-based round-trip transformation between these two structures and we study how that transformation is impacted by four variations in the implementation of these patterns. We validate that study by computing the smallest preconditions for the resulting transformations. We also automate the transformation and apply it to JHotDraw, where the studied variations occur.
Although web applications evolved to mature solutions providing sophisticated user experience, they also became complex for the same reason. Complexity primarily affects the server-side generation of dynamic pages as they are aggregated from multiple sources and as there are lots of possible processing paths depending on parameters. Browser-based tests are an adequate instrument to detect errors within generated web pages considering the server-side process and path complexity a black box. However, these tests do not detect the cause of an error which has to be located manually instead. This paper proposes to generate metadata on the paths and parts involved during server-side processing to facilitate backtracking origins of detected errors at development time. While there are several possible points of interest to observe for backtracking, this paper focuses user interface components of web frameworks.
In this paper we show by using the example of UML, how a software engineering method can benefit from an integrative mathematical foundation. The mathematical foundation is given by a mathematical system model. This model provides the basis both for integrating the various description techniques of UML and for implementing methodical support. After describing the basic concepts of the system model, we give a short overview of the UML description techniques. Then we show how they fit into the system model framework and sketch an approach to structure the UML development process such that it provides methodological guidance for developers.
Code cloning is an important software engineering aspect. It is a common software reuse principle that consists of duplicating source code within a program or across different systems owned or maintained by the same entity. There are several contradictory claims concerning the impact of cloning on software stability and maintenance effort. Some papers state that cloning is desired since it speeds up the development process and helps stakeholders meet the tight schedule and deliver on time. Other papers argue that code clone leads to code bloat and causes increase software maintenance costs due to copied defects and dead code. In this paper, we are replicating a previous study done on cloning by the original author. We are repeating his work using the same methods and metrics but with different subjects and experimenters. The paper we are addressing evaluates the impact of code cloning on code stability using three different stability-measuring methods. Our team will apply the same stability measurement techniques on a different software system developed in C programming language to determine generalizability, assure that the results are reliable, validate their outcomes, and to inspire new search by combining previous findings from related studies.
In a recent provocative paper, Lamport points out \"the insubstantiality of processes\" by proving the equivalence of two different decompositions of the same intuitive algorithm by means of temporal formulas. We point out that the correct equivalence of algorithms is itself in the eye of the beholder. We discuss a number of related issues and, in particular, whether algorithms can be proved equivalent directly.
Software design in Software Engineering is a critical and dynamic cognitive process. Accurate and flawless system design will lead to fast coding and early completion of a software project. Blooms taxonomy classifies cognitive domain into six dynamic levels such as Knowledge at base level to Comprehension, Application, Analysis, Synthesis and Evaluation at the highest level in the order of increasing complexity. A case study indicated in this paper is a gira system, which is a gprs based Intranet Remote Administration which monitors and controls the intranet from a mobile device. This paper investigates from this case study that the System Design stage in Software Engineering uses all the six levels of Blooms Taxonomy. The application of the highest levels of Blooms Taxonomy such as Synthesis and Evaluation in the design of gira indicates that Software Design in Software Development Life Cycle is a complex and critical cognitive process.
Integrating inspection processes with testing processes promises to deliver several benefits, including reduced effort for quality assurance or higher defect detection rates. Systematic integration of these processes requires knowledge regarding the relationships between these processes, especially regarding the relationship between inspection defects and test defects. Such knowledge is typically context-dependent and needs to be gained analytically or empirically. If such kind of knowledge is not available, assumptions need to be made for a specific context. This article describes the relevance of assumptions and context factors for integrating inspection and testing processes and provides mechanisms for deriving assumptions in a systematic manner.
Agile practices are receiving considerable attention from industry as an alternative to traditional software development approaches. However, there are a number of challenges in combining Agile [2] with Test-driven development (TDD) [10] practices, cloud deployments, continuous integration (CI), non-stop performance, load, security and accessibly testing. From these challenges; Continuous Integration is a relatively an approach widely discussed and practiced in software testing. This paper describes an approach for improved Agile Methodology using Code Quality, Code Bisector and Dynamic Regression in Continuous Integration. The set of tools used for this analysis, design and development are Jenkins, Robot Framework [4], Perforce and Git.
In this short paper we present our solution for the Hello World case study of the Transformation Tool Contest (TTC) 2011 using the QVTR-XSLT tool. The tool supports editing and execution of the graphical notation of QVT Relations language. The case study consists of a set of simple transformation tasks which covers the basic functions required for a transformation language, such as creating, reading/querying, updating and deleting of model elements. We design a transformation for each of the tasks.
Companies that collaborate within the product development processes need to implement an effective management of their collaborative activities. Despite the implementation of a PLM system, the collaborative activities are not efficient as it might be expected. This paper presents an analysis of the problems related to the collaborative work using a PLM system. From this analysis, we propose an approach for improving collaborative processes within a PLM system, based on monitoring indicators. This approach leads to identify and therefore to mitigate the brakes of the collaborative work.
In software-intensive organizations, an organizational management system will not guarantee organizational success unless the business strategy can be translated into a set of operational software goals. The Goal Question Metric (GQM) approach has proven itself useful in a variety of industrial settings to support quantitative software project management. However, it does not address linking software measurement goals to higher-level goals of the organization in which the software is being developed. This linkage is important, as it helps to justify software measurement efforts and allows measurement data to contribute to higher-level decisions. In this paper, we propose a GQM+Strategies(R) measurement approach that builds on the GQM approach to plan and implement software measurement. GQM+Strategies(R) provides mechanisms for explicitly linking software measurement goals to higher-level goals for the software organization, and further to goals and strategies at the level of the entire business. The proposed method is illustrated in the context of an example application of the method.
We present a new unit test generator for C code, CTGEN. It generates test data for C1 structural coverage and functional coverage based on pre-/post-condition specifications or internal assertions. The generator supports automated stub generation, and data to be returned by the stub to the unit under test (UUT) may be specified by means of constraints. The typical application field for CTGEN is embedded systems testing; therefore the tool can cope with the typical aliasing problems present in low-level C, including pointer arithmetics, structures and unions. CTGEN creates complete test procedures which are ready to be compiled and run against the UUT. In this paper we describe the main features of CTGEN, their technical realisation, and we elaborate on its performance in comparison to a list of competing test generation tools. Since 2011, CTGEN is used in industrial scale test campaigns for embedded systems code in the automotive domain.
Web services technology provides a platform on which we can develop distributed services. The interoperability among these services is achieved by various standard protocols. In recent years, several researches suggested that process algebras provide a satisfactory assistance to the whole process of web services development. Business transactions, on the other hand, involve the coordination and interaction between multiple partners. With the emergence of web services, business transactions are conducted using these services. The coordination among the business processes is crucial, so is the handling of faults that can arise at any stage of a transaction. BPEL models the behavior of business process interaction by providing a XML based grammar to describe the control logic required to coordinate the web services participating in a process flow. However BPEL lacks a proper formal description where the composition of business processes cannot be formally verified. Process algebra, on the other hand, facilitates a formal foundation for rigorous verification of the composition. This paper presents a comparison of web service composition between BPEL and process algebra, cCSP.
Modeling the logical architecture is an often underestimated development step to gain an early insight into the fundamental functional properties of an automotive system. An architectural description supports developers in making design decisions for further development steps like the refinement towards a software architecture or the partition of logical functions on ECUs and buses. However, due to the large size and complexity of the system and hence the logical architecture, a good notation, method, and tooling is necessary. In this paper, we show how the logical architectures can be modeled succinctly as function nets using a SysML-based notation. The usefulness for developers is increased by comprehensible views on the complete model to describe automotive features in a self contained way including their variants, modes, and related scenarios.
A well-known approach for identifying defect-prone parts of software in order to focus testing is to use different kinds of product metrics such as size or complexity. Although this approach has been evaluated in many contexts, the question remains if there are further opportunities to improve test focusing. One idea is to identify other types of information that may indicate the location of defect-prone software parts. Data from software inspections, in particular, appear to be promising. This kind of data might already lead to software parts that have inherent difficulties or programming challenges, and in consequence might be defect-prone. This article first explains how inspection and product metrics can be used to focus testing activities. Second, we compare selected product and inspection metrics commonly used to predict defect-prone parts (e.g., size and complexity metrics, inspection defect content metrics, and defect density metrics). Based on initial experience from two case studies performed in different environments, the suitability of different metrics for predicting defect-prone parts is illustrated. The studies revealed that inspection defect data seems to be a suitable predictor, and a combination of certain inspection and product metrics led to the best prioritizations in our contexts. In addition, qualitative experience is presented, which substantiates the expected benefit of using inspection results to optimize testing.
Machine Learning approaches are good in solving problems that have less information. In most cases, the software domain problems characterize as a process of learning that depend on the various circumstances and changes accordingly. A predictive model is constructed by using machine learning approaches and classified them into defective and non-defective modules. Machine learning techniques help developers to retrieve useful information after the classification and enable them to analyse data from different perspectives. Machine learning techniques are proven to be useful in terms of software bug prediction. This study used public available data sets of software modules and provides comparative performance analysis of different machine learning techniques for software bug prediction. Results showed most of the machine learning methods performed well on software bug datasets.
Improvement of industrial performance such as cost, lead-time, adaptability, variety and traceability is the major finality of companies. At this need corresponds the necessity to collaborate and to strengthen their coordination mechanisms. Information exchange becomes then a strategic question: what is the nature of the information that can be shared with customers and suppliers? Which impact on the performance of a company is expectable? What about the performance of the whole supply chain? It is essential for a company to identify the information whose exchange contributes to its performance and to control its information flows. This study aims to release from the literature the main tendencies of collaboration practices and information exchanges leading to the performance and to propose a model of hypothesis gathering these practices.
Distributed collaborative software development tends to make artifacts and decisions inconsistent and uncertain. We try to solve this problem by providing an information repository to reflect the state of works precisely, by managing the states of artifacts/products made through collaborative work, and the states of decisions made through communications. In this paper, we propose models and a tool to construct the artifact-related part of the information repository, and explain the way to use the repository to resolve inconsistencies caused by concurrent changes of artifacts. We first show the model and the tool to generate the dependency relationships among UML model elements as content of the information repository. Next, we present the model and the method to generate change support workflows from the information repository. These workflows give us the way to efficiently modify the change-related artifacts for each change request. Finally, we define inconsistency patterns that enable us to be aware of the possibility of inconsistency occurrences. By combining this mechanism with version control systems, we can make changes safely. Our models and tool are useful in the maintenance phase to perform changes safely and efficiently.
We specify an abstraction layer to be used between an enterprise application and the utilized enterprise framework (like J2EE or .NET). This specification is called the Workshop. It provides an intuitive metaphor supporting the programmer in designing easy understandable code. We present an implementation of this specification. It is based upon the J2EE framework and is called the JWorkshop. As a proof of concept we implement a special certification authority called the Key Authority based upon the JWorkshop. The mentioned certification authority runs very successfully in a variety of different real world projects.
Scrum is a structured framework to support complex product development. However, Scrum methodology faces a challenge of managing large teams. To address this challenge, in this paper we propose a solution called Scrum of Scrums. In Scrum of Scrums, we divide the Scrum team into teams of the right size, and then organize them hierarchically into a Scrum of Scrums. The main goals of the proposed solution are to optimize communication between teams in Scrum of Scrums; to make the system work after integration of all parts; to reduce the dependencies between the parts of system; and to prevent the duplication of parts in the system.
Enterprise Resource Planning ERP systems integrate information across an entire organization that automate core activities such as finance accounting, human resources, manufacturing, production and supply chain management etc. to facilitate an integrated centralized system and rapid decision making resulting in cost reduction, greater planning, and increased control. Many organizations are updating their current management information systems with ERP systems. This is not a trivial task. They have to identify the organizations objectives and satisfy a myriad of stakeholders. They have to understand what business processes they have, how they can be improved, and what particular systems would best suit their needs. They have to understand how an ERP system is built, it involves the modification of an existing system with its own set of business rules. Deciding what to ask for and how to select the best option is a very complex operation and there is limited experience with this type of contracting in organizations. In this paper we discuss a particular experience with contracting out an ERP system, provide some lessons learned, and offer suggestions in how the RFP and bid selection processes could have been improved.
Neutral landscapes and mutational robustness are believed to be important enablers of evolvability in biology. We apply these concepts to software, defining mutational robustness to be the fraction of random mutations that leave a program s behavior unchanged. Test cases are used to measure program behavior and mutation operators are taken from genetic programming. Although software is often viewed as brittle, with small changes leading to catastrophic changes in behavior, our results show surprising robustness in the face of random software mutations. The paper describes empirical studies of the mutational robustness of 22 programs, including 14 production software projects, the Siemens benchmarks, and 4 specially constructed programs. We find that over 30% of random mutations are neutral with respect to their test suite. The results hold across all classes of programs, for mutations at both the source code and assembly instruction levels, across various programming languages, and are only weakly related to test suite coverage. We conclude that mutational robustness is an inherent property of software, and that neutral variants (i.e., those that pass the test suite) often fulfill the program s original purpose or specification. Based on these results, we conjecture that neutral mutations can be leveraged as a mechanism for generating software diversity. We demonstrate this idea by generating a population of neutral program variants and showing that the variants automatically repair unknown bugs with high probability. Neutral landscapes also provide a partial explanation for recent results that use evolutionary computation to automatically repair software bugs.
Most businesses these days use the web services technology as a medium to allow interaction between a service provider and a service requestor. However, both the service provider and the requestor would be unable to achieve their business goals when there are miscommunications between their processes. This research focuses on the process incompatibility between the web services and the way to automatically resolve them by using a process mediator. This paper presents an overview of the behavioral incompatibility between web services and the overview of process mediation in order to resolve the complications faced due to the incompatibility. Several state-of the-art approaches have been selected and analyzed to understand the existing process mediation components. This paper aims to provide a valuable gap analysis that identifies the important research areas in process mediation that have yet to be fully explored.
The purpose of this symposium, held in conjunction with MoDELS 2006, was to present the current state of research of the UML 2 Semantics Project. Equally important to receiving feedback from an audience of experts was the opportunity to invite researchers in the field to discuss their own work related to a formal semantics for the Unified Modeling Language. This symposium is a follow-on to our first workshop, held in conjunction with ECMDA 2005.
Allowing swift release cycles, Continuous Delivery has become popular in application software development and is starting to be applied in safety-critical domains such as the automotive industry. These domains require thorough analysis regarding safety constraints, which can be achieved by formal verification and the execution of safety tests resulting from a safety analysis on the product. With continuous delivery in place, such tests need to be executed with every build to ensure the latest software still fulfills all safety requirements. Even more though, the safety analysis has to be updated with every change to ensure the safety test suite is still up-to-date. We thus propose that a safety analysis should be treated no differently from other deliverables such as source-code and dependencies, formulate guidelines on how to achieve this and advert areas where future research is needed.
The development of critical systems is becoming more and more complex. The overall tendency is that development costs raise. In order to cut cost of development, companies are forced to build systems from proven components and larger new systems from smaller older ones. Respective reuse activities involve good number of people, tools and processes along different stages of the development lifecycle which involve large numbers of tools. Some development is directly planned for reuse. Planned reuse implies excellent knowledge management and firm governance of reusable items. According to the current state of the art, there are still practical problems in the two fields, mainly because the governance and knowledge management is fragmented over the tools of the toolchain. In our experience, the practical effect of this fragmentation is that involved ancestor and derivation relationships are often undocumented or not exploitable. Additionally, useful reuse is almost always dealing with heterogeneous content which must be transferred from older to newer development environments. In this process, interoperability proves either as biggest obstacle or greatest help. In this paper, authors connect the topics interoperability and knowledge management and propose to seek for ubiquitous reuse via advanced interoperability features. A single concept from a larger Technical Interoperability Concept (TIC) with the name bubble is presented. Bubbles are expected to overcome existing barriers to cost-efficient reuse in systems and software development lifecycles. That is why, the present paper introduces and defines bubbles by showing how they simplify application of repairs and changes and hence contribute to expansion of reuse at reduced cost.
In the last decade it became a common practice to formalise software requirements to improve the clarity of users  expectations. In this work we build on the fact that functional requirements can be expressed in temporal logic and we propose new sanity checking techniques that automatically detect flaws and suggest improvements of given requirements. Specifically, we describe and experimentally evaluate approaches to consistency and redundancy checking that identify all inconsistencies and pinpoint their exact source (the smallest inconsistent set). We further report on the experience obtained from employing the consistency and redundancy checking in an industrial environment. To complete the sanity checking we also describe a semi-automatic completeness evaluation that can assess the coverage of user requirements and suggest missing properties the user might have wanted to formulate. The usefulness of our completeness evaluation is demonstrated in a case study of an aeroplane control system.
Combining component & connector architecture descriptionlanguageswithcomponentbehaviormodelinglanguages enables modeling great parts of software architectures platformindependently. Nontrivial systems typically contain components with programming language behavior descriptions to interface with APIs. These components tie the complete software architecture to a specific platform and thus hamper reuse. Previous work on software architecture reuse with multiple platforms either requires platform-specific handcrafting or the effort of explicit platform models. We present an automated approach to transform platform-independent, logical software architectures into architectures with platform-specific components. This approach introduces abstract components to the platform-independent architecture and refines the se with components specific to the target platform prior to code generation. Consequently, a single logical software architecture model can be reused with multiple target platforms, which increases architecture maturity and reduces the maintenance effort of multiple similar software architectures.
Maintenance is a dominant component of software cost, and localizing reported defects is a significant component of maintenance. We propose a scalable approach that leverages the natural language present in both defect reports and source code to identify files that are potentially related to the defect in question. Our technique is language-independent and does not require test cases. The approach represents reports and code as separate structured documents and ranks source files based on a document similarity metric that leverages inter-document relationships. We evaluate the fault-localization accuracy of our method against both lightweight baseline techniques and also reported results from state-of-the-art tools. In an empirical evaluation of 5345 historical defects from programs totaling 6.5 million lines of code, our approach reduced the number of files inspected per defect by over 91%. Additionally, we qualitatively and quantitatively examine the utility of the textual and surface features used by our approach.
This index covers the final course project reports for COMP5541 Winter 2010 at Concordia University, Montreal, Canada, Tools and Techniques for Software Engineering by 4 teams trying to capture the requirements, provide the design specification, configuration management, testing and quality assurance of their partial implementation of the Unified University Inventory System (UUIS) of an Imaginary University of Arctica (IUfA). Their results are posted here for comparative studies and analysis.
This document contains several related specifications, together they describe the document formats related to the solver competition which will be organized by Mancoosi. In particular, this document describes: - DUDF (Distribution Upgradeability Description Format), the document format to be used to submit upgrade problem instances from user machines to a (distribution-specific) database of upgrade problems; - CUDF (Common Upgradeability Description Format), the document format used to encode upgrade problems, abstracting over distribution-specific details. Solvers taking part in the competition will be fed with input in CUDF format.
In Service-Oriented Virtual Organization Breeding Environments (SOVOBEs), services performed by people, organizations and information systems are composed in potentially complex business processes performed by a set of partners. In a SOVOBE, the success of a virtual organization depends largely on the partner and service selection process, which determines the composition of services performed by the VO partners. In this paper requirements for a partner and service selection method for SOVOBEs are defined and a novel Multi-Aspect Partner and Service Selection method, MAPSS, is presented. The MAPSS method allows a VO planner to select appropriate services and partners based on their competences and their relations with other services/partners. The MAPSS method relies on a genetic algorithm to select the most appropriate set of partners and services.
Using the Kaczmarz algorithm, we prove that for any singular Borel probability measure $\\mu$ on $[0,1)$, every $f\\in L^2(\\mu)$ possesses a Fourier series of the form $f(x)=\\sum_{n=0}^{\\infty}c_ne^{2\\pi inx}$. We show that the coefficients $c_{n}$ can be computed in terms of the quantities $\\hat{f}(n) = \\int_{0}^{1} f(x) e^{-2\\pi i n x} d \\mu(x)$. We also demonstrate a Shannon-type sampling theorem for functions that are in a sense $\\mu$-bandlimited.
We study the Bishop-Phelps-Bollob\\ as property for numerical radius (in short, BPBp-nu) and find sufficient conditions for Banach spaces ensuring the BPBp-nu. Among other results, we show that $L_1(\\mu)$-spaces have this property for every measure $\\mu$. On the other hand, we show that every infinite-dimensional separable Banach space can be renormed to fail the BPBp-nu. In particular, this shows that the Radon-Nikod\\ {y}m property (even reflexivity) is not enough to get BPBp-nu.
We study the space of $p$-compact operators $\\mathcal K_p$, using the theory of tensor norms and operator ideals. We prove that $\\mathcal K_p$ is associated to $/d_p$, the left injective associate of the Chevet-Saphar tensor norm $d_p$ (which is equal to $g_{p } $). This allows us to relate the theory of $p$-summing operators with that of $p$-compact operators. With the results known for the former class and appropriate hypothesis on $E$ and $F$ we prove that $\\mathcal K_p(E;F)$ is equal to $\\mathcal K_q(E;F)$ for a wide range of values of $p$ and $q$, and show that our results are sharp. We also exhibit several structural properties of $\\mathcal K_p$. For instance, we obtain that $\\mathcal K_p$ is regular, surjective, totally accessible and characterize its maximal hull $\\mathcal K_p^{max}$ as the dual ideal of the $p$-summing operators, $\\Pi_p^{dual}$. Furthermore, we prove that $\\mathcal K_p$ coincides isometrically with $\\mathcal {QN}_p^{dual}$, the dual ideal of the quasi $p$-nuclear operators.
Brezis-Lieb lemma is a refinement of Fatou lemma providing an evaluation of the gap between the integral for a sequence and the integral for its pointwise limit. This note studies the question if such gap can be evaluated when there is no a.e. convergence. In particular, it gives the same lower bound for the gap in L^p as the gap in the Brezis-Lieb lemma (including the case vector-valued functions) provided that p is greater or equal than 3 and the sequence converges both weakly and weakly in the sense of a duality map. It also shows that the statement is false if p<3. An application is given in form of a Brezis-Lieb lemma for gradients.
The Hardy--Littlewood inequality for $m$-linear forms on $\\ell _{p}$ spaces and $m<p\\leq 2m$ asserts that \\begin{equation*} \\left( \\sum_{j_{1},...,j_{m}=1}^{\\infty }\\left\\vert T\\left( e_{j_{1}},\\ldots ,e_{j_{m}}\\right) \\right\\vert ^{\\frac{p}{p-m}}\\right) ^{\\frac{p-m}{p}}\\leq 2^{\\frac{m-1}{2}}\\left\\Vert T\\right\\Vert \\end{equation*} for all continuous $m$-linear forms $T:\\ell _{p}\\times \\cdots \\times \\ell _{p}\\rightarrow \\mathbb{R}$ or $\\mathbb{C}.$ The case $m=2$ recovers a classical inequality proved by Hardy and Littlewood in 1934. As a consequence of the results of the present paper we show that the same inequality is valid with $2^{\\frac{m-1}{2}}$ replaced by $2^{\\frac{\\left( m-1\\right) \\left( p-m\\right) }{p}}$. In particular, for $m<p\\leq m+1$ the optimal constants of the above inequality are uniformly bounded by $2.$
Nagel and Stein established $L^p$-boundedness for a class of singular integrals of NIS type, that is, non-isotropic smoothing operators of order 0, on spaces $\\widetilde{M}=M_1\\times...\\times M_n,$ where each factor space $M_i, 1\\leq i\\leq n,$ is a smooth manifold on which the basic geometry is given by a control, or Carnot--Carath\\ eodory, metric induced by a collection of vector fields of finite type. In this paper we prove the product $T1$ theorem on $L^2,$ the Hardy space $H^p(\\widetilde{M})$ and the space $CMO^p(\\widetilde{M})$, the dual of $H^p(\\widetilde{M}),$ for a class of product singular integral operators which covers Journ\\ e s class and operators studied by Nagel and Stein.
We establish the Gleason result for finitely generated ideals in the context of Frechet algebras, and, in particular, provide an affirmative answer to the question about the Gleason result in (uniform) commutative Frechet algebras (posed by Carpenter in 1970). As a welcome bonus of our method, we characterize locally Stein algebras, and, as an application of this characterization, we also provide an affirmative answer to the Gleason problem for such algebras, which recaptures all the classical results on the Gleason problem in the theory of several complex variables.
We continue our study of the Johnson-Lindenstrauss lemma and its connection to circulant matrices started in \\cite{HV}. We reduce the bound on $k$ from $k=O(\\epsilon^{-2}\\log^3n)$ proven there to $k=O(\\epsilon^{-2}\\log^2n)$. Our technique differs essentially from the one used in \\cite{HV}. We employ the discrete Fourier transform and singular value decomposition to deal with the dependency caused by the circulant structure.
Spaces of homogeneous polynomials on a Banach space are frequently equipped with quasinorms instead of norms. In this paper we develop a technique to replace the original quasi-norm by a norm in a dual preserving way, in the sense that the dual of the space with the new norm coincides with the dual of the space with the original quasi-norm. Applications to problems on the existence and approximation of solutions of convolution equations and on hypercyclic convolution operators on spaces of entire functions are provided.
In this article we obtain families of frames for the space B_\\omega of functions with band in [-\\omega,\\omega] by using the theory of shift-invariant spaces. Our results are based on the Gramian analysis of A. Ron and Z. Shen and a variant, due to Bownik, of their characterization of families of functions whose shifts form frames or Riesz bases. We give necessary and sufficient conditions for the translates of a finite number of functions (generators) to be a frame or a Riesz basis for B_\\omega. We also give explicit formulas for the dual generators and we apply them to Hilbert transform sampling and derivative sampling. Finally, we provide numerical experiments which support the theory.
Many authors have considered and investigated generalized fractional differential operators. The main object of this present paper is to define a new generalized fractional differential operator $\\mathfrak{T}^{\\beta,\\tau,\\gamma},$ which generalized the Srivastava-Owa operators. Moreover, we investigate of the geometric properties such as univalency, starlikeness, convexity for their normalization. Further, boundedness and compactness in some well known spaces, such as Bloch space for last mention operator also are considered. Our tool is based on the generalized hypergeometric function.
To describe a set of functions, which forms a reflexive subspace B of the classical Banach space L a special function that characterizes their average integral growth is introduced. It is shown that this function essentially depends on the geometry of B. By the way, one question of la Vallee Poussin is answered. Also a short proof of the known result about the existence of an uncomplemented subspace isomorphic to the Hilbert space in every Lebesgue - Riesz space Lp (1<p<2) is obtained.
We study the diameter two properties in the spaces $JH$, $JT_\\infty$ and $JH_\\infty$. We show that the topological dual space of the previous Banach spaces fails every diameter two property. However, we prove that $JH$ and $JH_{\\infty}$ satisfy the strong diameter two property, and so the dual norm of these spaces is octahedral. Also we find a closed hyperplane $M$ of $JH_\\infty$ whose topological dual space enjoys the $w^*$-strong diameter two property and also $M$ and $M^*$ have an octahedral norm.
The relations between solutions of the three types of totally linear partial differential equations of first order are presented. The approach is based on factorization of a non-homogeneous first order differential operator to products consisting of a scalar function, a homogeneous first order differential operator and the reciprocal of the scalar function. The factorization procedure is utilized to show that all totally linear differential equations of first order can be transformed to each other, and in particular to a homogeneous one.
Given a probability measure $\\mu$ on the real line, there exists a semigroup $\\mu_t$ with real parameter $t>1$ which interpolates the discrete semigroup of measures $\\mu_n$ obtained by iterating its free convolution. It was shown in \\cite{[BB2004]} that it is impossible that $\\mu_t$ has no mass in an interval whose endpoints are atoms. We extend this result to semigroups related to multiplicative free convolution. The proofs use subordination results.
Let $\\kappa : \\mathbb D \\times \\mathbb D \\to \\mathbb C$ be a diagonal positive definite kernel and let $\\mathscr H_{\\kappa}$ denote the associated reproducing kernel Hilbert space of holomorphic functions on the open unit disc $\\mathbb D$. Assume that $zf \\in \\mathscr H$ whenever $f \\in \\mathscr H.$ Then $\\mathscr H$ is a Hilbert module over the polynomial ring $\\mathbb C[z]$ with module action $p \\cdot f \\mapsto pf$. We say that $\\mathscr H_{\\kappa}$ is a subnormal Hilbert module if the operator $\\mathscr M_{z}$ of multiplication by the coordinate function $z$ on $\\mathscr H_{\\kappa}$ is subnormal. %If $\\kappa_1$ and $\\kappa_2$ are two diagonal positive definite kernels then so is their pointwise (tensor) product $\\kappa:=\\kappa_1\\kappa_2$. In [Oper. Theory Adv. Appl, 32: 219-241, 1988], N. Salinas asked whether the module tensor product $\\mathscr H_{\\kappa_1} \\otimes_{\\mathbb C[z]} \\mathscr H_{\\kappa_2}$ of subnormal Hilbert modules $\\mathscr H_{\\kappa_1}$ and $\\mathscr H_{\\kappa_2}$ is again subnormal. In this regard, we describe all subnormal module tensor products $L^2_a(\\mathbb D, w_{s_1}) \\otimes_{\\mathbb C[z]} L^2_a(\\mathbb D, w_{s_2})$, where $L^2_a(\\mathbb D, w_s)$ denotes the weighted Bergman Hilbert module with radial weight $$w_s(z)=\\frac{1}{s \\pi}|z|^{\\frac{2(1-s)}{s}}~(z \\in \\mathbb D, ~s > 0).$$ In particular, the module tensor product $L^2_a(\\mathbb D, w_{s}) \\otimes_{\\mathbb C[z]} L^2_a(\\mathbb D, w_{s})$ is never subnormal for any $s \\geq 6$. Thus the answer to this question is no.
Let $X$, $Y$ be two real Banach spaces and $\\varepsilon>0$. A standard $\\varepsilon$-isometry $f:X\\rightarrow Y$ is said to be $(\\alpha,\\gamma)$-stable (with respect to $T:L(f)\\equiv\\overline{{\\rm span}}f(X)\\rightarrow X$ for some $\\alpha, \\gamma>0$) if $T$ is a linear operator with $\\|T\\|\\leq\\alpha$ so that $Tf-Id$ is uniformly bounded by $\\gamma\\varepsilon$ on $X$. The pair $(X,Y)$ is said to be stable if every standard $\\varepsilon$-isometry $f:X\\rightarrow Y$ is $(\\alpha,\\gamma)$-stable for some $\\alpha,\\gamma>0$. $X (Y)$ is said to be universally left (right)-stable, if $(X,Y)$ is always stable for every $Y (X)$. In this paper, we show that universal right-stability spaces are just Hilbert spaces; every injective space is universally left-stable; a Banach space $X$ isomorphic to a subspace of $\\ell_\\infty$ is universally left-stable if and only if it is isomorphic to $\\ell_\\infty$; and that a separable space $X$ satisfies the condition that $(X,Y)$ is left-stable for every separable $Y$ if and only if it is isomorphic to $c_0$.
For an arbitrary infinite-dimensional Banach space $\\X$, we construct examples of strongly-measurable $\\X$-valued Pettis integrable functions whose indefinite Pettis integrals are nowhere weakly differentiable; thus, for these functions the Lebesgue Differentiation Theorem fails rather spectacularly. We also relate the degree of nondifferentiability of the indefinite Pettis integral to the cotype of $\\X$, from which it follows that our examples are reasonably sharp. This is an expanded version of a previously posted paper with the same name.
This paper deals with the famous isoperimetric inequality. In a first part, we give some new functional form of the isoperimetric inequality, and in a second part, we give a quantitative form with a remainder term involving Wasserstein distance of the classical isopemetric inequality. In both parts, we use optimal transportation. Finally, we use our refined isoperimetric inequality in some classical cases arising in convex geometry.
This is a survey of results on the classification of Banach spaces as metric spaces. It is based on a series of lectures I gave at the Functional Analysis Seminar in 1984-1985, and it appeared in the 1984-1985 issue of the Longhorn Notes. I keep receiving requests for copies, because some of the material here does not appear elsewhere and because the Longhorn Notes are not so easy to get. Having it posted on the Bulletin thus seems reasonable despite the fact that it is not updated, and I thank the Editors of the Longhorn Notes for their permission to do so.
As is known, there exists an alternative, \"non-matricial\" way to present basic notions and results of quantum functional analysis (= operator space theory). This approach is based on considering, instead of matrix spaces, a single space, consisting, roughly speaking, of vectors from the initial linear space equipped with coefficients taken from some good operator algebra. It seems that so far there was no systematical exposition of the theory in the framework of the non-matricial approach. We believe, however, that in a number of topics the non-matricial approach gives a more elegant and transparent theory. In this paper we introduce, using only the non-matricial language, both quantum versions of the classical (Grothendieck) projective tensor product of normed spaces. These versions correspond to the \"matricial\" Haagerup and operator-projective tensor products. We define them in terms of the universal property with respect to some classes of bilinear operators, corresponding to \"matricial\" multiplicatively bounded and completely bounded, and then produce their explicit constructions. Among the relevant results, we shall show that both tensor products are actually quotient spaces of some \"genuine\" projective tensor products. Moreover, the Haagerup tensor product is itself a \"genuine\" projective tensor product, however not of just normed spaces but of some normed modules.
We extend the notion of narrow operators to nonlinear maps on vector lattices. The main objects are orthogonally additive operators and, in particular, abstract Uryson operators. Most of the results extend known theorems obtained by O. Maslyuchenko, V. Mykhaylyuk and the second named author published in Positivity 13 (2009), pp. 459--495, for linear operators. For instance, we prove that every orthogonally additive laterally-to-norm continuous C-compact operator from an atomless Dedekind complete vector lattice to a Banach space is narrow. Another result asserts that the set U_{on}^{lc}(E,F) of all order narrow laterally continuous abstract Uryson operators is a band in the vector lattice of all laterally continuous abstract Uryson operators from an atomless vector lattice E with the principal projection property to a Dedekind complete vector lattice F. The band generated by the disjointness preserving laterally continuous abstract Uryson operators is the orthogonal complement to U_{n}^{lc}(E,F).
We give necessary and sufficient conditions for interpolation inequalities of the type considered by Marcinkiewicz and Zygmund to be true in the case of Banach space-valued polynomials and Jacobi weights and nodes. We also study the vector-valued expansion problem of $L_p$-functions in terms of Jacobi polynomials and consider the question of unconditional convergence. The notion of type $p$ with respect to orthonormal systems leads to some characterizations of Hilbert spaces. It is also shown that various vector-valued Jacobi means are equivalent.
Let $E$ be a Banach space that does not contain any copy of $\\ell^1$ and $\\A$ be a non commutative $C^*$-algebra. We prove that every absolutely summing operator from $\\A$ into $E^*$ is compact, thus answering a question of Pe\\l czynski. As application, we show that if $G$ is a compact metrizable abelian group and $\\Lambda$ is a Riesz subset of its dual then every countably additive $\\A^*$-valued measure with bounded variation and whose Fourier transform is supported by $\\Lambda$ has relatively compact range. Extensions of the same result to symmetric spaces of measurable operators are also presented.
We study those Banach spaces $X$ for which $S_X$ does not admit a finite $\\eps$-net consisting of elements of $S_X$ for any $\\eps < 2$. We give characterisations of this class of spaces in terms of $\\ell_1$-type sequences and in terms of the almost Daugavet property. The main result of the paper is: a separable Banach space $X$ is isomorphic to a space from this class if and only if $X$ contains an isomorphic copy of $\\ell_1$.
We give an alternative proof of recent results by the authors on uniform boundedness of dyadic averaging operators in (quasi-)Banach spaces of Hardy-Sobolev and Triebel-Lizorkin type, in the largest possible range of parameters. This result served as the main tool to establish Schauder basis properties of suitable enumerations of the univariate Haar system in the mentioned spaces. The proof here is based on characterizations of the respective spaces in terms of compactly supported Daubechies wavelets.
We develop the machinery of boundary triplets for one-dimensional operators generated by formally self-adjoint quasi-differential expression of arbitrary order on a finite interval. The technique are then used to describe all maximal dissipative, accumulative and self-adjoint extensions of the associated minimal operator and its generalized resolvents in terms of the boundary conditions. Some specific classes are considered in greater detail.
We introduce a weakened version of the Dunford-Pettis property, and give examples of Banach spaces with this property. In particular, we show that every closed subspace of Schreier s space $S$ enjoys it. As an application, we characterize the weak polynomial convergence of sequences, show that every closed subspace of $S$ has the polynomial Dunford-Pettis property of Bistr\\\"om et al. and give other polynomial properties of $S$.
The distribution $g_{cl}$ of a Gibbs cluster point process in $X=\\mathbb{R}^{d}$ (with i.i.d. random clusters attached to points of a Gibbs configuration with distribution $g$) is studied via the projection of an auxiliary Gibbs measure $\\hat{g}$ in the space of configurations $\\hat{gamma}=\\{(x,\\bar{y})\\}\\subset X\\times\\mathfrak{X}$, where $x\\in X$ indicates a cluster \"center\" and $\\bar{y}\\in\\mathfrak{X}:=\\bigsqcup_{n} X^n$ represents a corresponding cluster relative to $x$. We show that the measure $g_{cl}$ is quasi-invariant with respect to the group $\\mathrm{Diff}_{0}(X)$ of compactly supported diffeomorphisms of $X$, and prove an integration-by-parts formula for $g_{cl}$. The associated equilibrium stochastic dynamics is then constructed using the method of Dirichlet forms. These results are quite general; in particular, the uniqueness of the background Gibbs measure $g$ is not required. The paper is an extension of the earlier results for Poisson cluster measures %obtained by the authors [J. Funct. Analysis 256 (2009) 432-478], where a different projection construction was utilized specific to this \"exactly soluble\" case.
Let $\\mathcal{H}$ be a Hilbert space, $L(\\mathcal{H})$ the algebra of bounded linear operators on $\\mathcal{H}$ and $W \\in L(\\mathcal{H})$ a positive operator such that $W^{1/2}$ is in the p-Schatten class, for some $1 \\leq p< \\infty.$ Given $A \\in L(\\mathcal{H})$ with closed range and $B \\in L(\\mathcal{H}),$ we study the following weighted approximation problem: analize the existence of $$\\underset{X \\in L(\\mathcal{H})}{min}\\Vert AX-B \\Vert_{p,W},$$ where $\\Vert X \\Vert_{p,W}=\\Vert W^{1/2}X \\Vert_{p}.$ In this paper we prove that the existence of this minimum is equivalent to a compatibility condition between $R(B)$ and $R(A)$ involving the weight $W,$ and we characterize the operators which minimize this problem as $W$-inverses of $A$ in $R(B).$
Let $X$ be a space of homogeneous type and let $L$ be an injective, non-negative, self-adjoint operator on $L^2(X)$ such that the semigroup generated by $-L$ fulfills Davies-Gaffney estimates of arbitrary order. We prove that the operator $F(L)$, initially defined on $H^1_L(X)\\cap L^2(X)$, acts as a bounded linear operator on the Hardy space $H^1_L(X)$ associated with $L$ whenever $F$ is a bounded, sufficiently smooth function. Based on this result, together with interpolation, we establish H\\\"ormander type spectral multiplier theorems on Lebesgue spaces for non-negative, self-adjoint operators satisfying generalized Gaussian estimates in which the required differentiability order is relaxed compared to all known spectral multiplier results.
The classical theorems of Banach and Stone, Gelfand and Kolmogorov, and Kaplansky show that a compact Hausdorff space $X$ is uniquely determined by the linear isometric structure, the algebraic structure, and the lattice structure, respectively, of the space $C(X)$. In this paper, it is shown that for rather general subspaces $A(X)$ and $A(Y)$ of $C(X)$ and $C(Y)$ respectively, any linear bijection $T: A(X) \\to A(Y)$ such that $f \\geq 0$ if and only if $Tf \\geq 0$ gives rise to a homeomorphism $h: X \\to Y$ with which $T$ can be represented as a weighted composition operator. The three classical results mentioned above can be derived as corollaries. Generalizations to noncompact spaces and other function spaces such as spaces of uniformly continuous functions, Lipschitz functions and differentiable functions are presented.
We define an {\\it $(X_1,\\Theta, X_2)$-frame} with Banach spaces $X_2\\subseteq X_1$, $|\\cdot|_1 \\leq |\\cdot|_2$, and a $BK$-space $(\\Theta, \\snorm[\\cdot])$. Then by the use of decreasing sequences of Banach spaces ${X_s}_{s=0}^\\infty$ and of sequence spaces ${\\Theta_s}_{s=0}^\\infty$, we define a general Fr\\  echet frame on the Fr\\  echet space $X_F=\\bigcap_{s=0}^\\infty X_s$. We give frame expansions of elements of $X_F$ and its dual $X_F^*$, as well of some of the generating spaces of $X_F$ with convergence in appropriate norms. Moreover, we give necessary and sufficient conditions for a general pre-Fr\\  echet frame to be a general Fr\\  echet frame, as well as for the complementedness of the range of the analysis operator $U:X_F\\to\\Theta_F$.
In this paper we investigate the possibility of unconditional convergence and invertibility of multipliers $M_{m,\\Phi,\\Psi}$ depending on the properties of the sequences $\\Psi$,$\\Phi$ and $m$. We characterize a complete set of conditions for the invertibility and the unconditional convergence of multipliers, and collect those results in tables. We either prove that unconditional convergence and invertibility is not possible, that one or both of these conditions are always the case for the given parameters, or we give examples for the feasible combinations. We give a full list of examples for all conditions.
This work creates two categories of \"array-weighted sets\" for the purposes of constructing universal matrix-normed spaces and algebras. These universal objects have the analogous universal property to the free vector space, lifting maps completely bounded on a generation set to a completely bounded linear map of the matrix-normed space. Moreover, the universal matrix-normed algebra is used to prove the existence of a free product for matrix-normed algebras using algebraic methods.
We study octahedral norms in the space of bounded linear operators between Banach spaces. In fact, we prove that $L(X,Y)$ has octahedral norm whenever $X^*$ and $Y$ have octahedral norm. As a consequence the space of operators $L(\\ell_1 ,X)$ has octahedral norm if, and only if, $X$ has octahedral norm. These results also allows us to get the stability of strong diameter 2 property for projective tensor products of Banach spaces, which is an improvement of the known results about the size of nonempty relatively weakly open subsets in the unit ball of the projective tensor product of Banach spaces.
We extend the invertibility principle of J. Bourgain and L. Tzafriri to operators acting on arbitrary decompositions id = \\sum x_j \\otimes x_j, rather than on the coordinate one. The John s decomposition brings this result to the local theory of Banach spaces. As a consequence, we get a new lemma of Dvoretzky-Rogers type, where the contact points of the unit ball with its maximal volume ellipsoid play a crucial role. This is applied to embeddings of l_\\infty^k into finite dimensional spaces.
We obtain a general Marcinkiewicz-type multiplier theorem for mixed systems of strongly commuting operators $L=(L_1,...,L_d);$ where some of the operators in $L$ have only a holomorphic functional calculus, while others have additionally a Marcinkiewicz-type functional calculus. Moreover, we prove that specific Laplace transform type multipliers of the pair $(\\mathcal{L},A)$ are of certain weak type $(1,1).$ Here $\\mathcal{L}$ is the Ornstein-Uhlenbeck operator while $A$ is a non-negative operator having Gaussian bounds for its heat kernel. Our results include the Riesz transforms $A(\\mathcal{L}+A)^{-1}$ and $\\mathcal{L}(\\mathcal{L}+A)^{-1}.$
We study the so-called signed discrete Choquet integral (also called non-monotonic discrete Choquet integral) regarded as the Lov\\ asz extension of a pseudo-Boolean function which vanishes at the origin. We present axiomatizations of this generalized Choquet integral, given in terms of certain functional equations, as well as by necessary and sufficient conditions which reveal desirable properties in aggregation theory.
Steinhaus proved that given a~positive integer $n$, one may find a circle surrounding exactly $n$ points of the integer lattice. This statement has been recently extended to Hilbert spaces by Zwole\\ {n}ski, who replaced the integer lattice by any infinite set that intersects every ball in at most finitely many points. We investigate Banach spaces satisfying this property, which we call (S), and characterise them by means of a new geometric property of the unit sphere which allows us to show, e.g., that all strictly convex norms have (S), nonetheless, there are plenty of non-strictly convex norms satisfying (S). We also study the corresponding renorming problem.
By iterative techniques,we present two fixed point theorems, whose modular formulations are relatively close to the Banach s fixed point theorem in the normed spaces.The first result concerns the fixed point of the strongly contraction mappings.The second result deals with the fixed point of the strict contraction mappings where the modular satisfies the delta-condition. For the nonexpansive mappings,where the modular satisfies the regular growth condition,we present a fixed point theorem of the Shauder s type,without boundedness condition on the domain of theses mappings.
It is of interest to study a wavelet system with a minimum number of generators. It has been showed by X. Dai, D. R. Larson, and D. M. Speegle in [11] that for any $d\\times d$ real-valued expansive matrix M, a homogeneous orthonormal M-wavelet basis can be generated by a single wavelet function. On the other hand, it has been demonstrated in [21] that nonhomogeneous wavelet systems, though much less studied in the literature, play a fundamental role in wavelet analysis and naturally link many aspects of wavelet analysis together. In this paper, we are interested in nonhomogeneous wavelet systems in high dimensions with a minimum number of generators. As we shall see in this paper, a nonhomogeneous wavelet system naturally leads to a homogeneous wavelet system with almost all properties preserved. We also show that a nonredundant nonhomogeneous wavelet system is naturally connected to refinable structures and has a fixed number of wavelet generators. Consequently, it is often impossible for a nonhomogeneous orthonormal wavelet basis to have a single wavelet generator. However, for redundant nonhomogeneous wavelet systems, we show that for any $d\\times d$ real-valued expansive matrix M, we can always construct a nonhomogeneous smooth tight M-wavelet frame in $L_2(R^d)$ with a single wavelet generator whose Fourier transform is a compactly supported $C^\\infty$ function. Moreover, such nonhomogeneous tight wavelet frames are associated with filter banks and can be modified to achieve directionality in high dimensions. Our analysis of nonhomogeneous wavelet systems employs a notion of frequency-based nonhomogeneous wavelet systems in the distribution space. Such a notion allows us to separate the perfect reconstruction property of a wavelet system from its stability in function spaces.
We prove that a sequence $(f_i)_{i=1}^\\infty$ of translates of a fixed $f\\in L_p(R)$ cannot be an unconditional basis of $L_p(R)$ for any $1\\le p<\\infty$. In contrast to this, for every $2<p<\\infty$, $d\\in N$ and unbounded sequence $(\\lambda_n)_{n\\in N}\\subset R^d$ we establish the existence of a function $f\\in L_p(R^d)$ and sequence $(g^*_n)_{n\\in N}\\subset L_p^*(R^d)$ such that $(T_{\\lambda_n} f, g^*_n)_{n\\in N}$ forms an unconditional Schauder frame for $L_p(R^d)$. In particular, there exists a Schauder frame of integer translates for $L_p(R)$ if (and only if) $2<p<\\infty$.
Let $\\|\\cdot\\|_{\\mathbf A}$ be a norm on $\\mathbb C^m$ given by the formula $\\|(z_1,\\ldots,z_m)\\|_{\\mathbf A}=\\|z_1A_1+\\cdots+z_mA_m\\|_{\\rm op}$ for some choice of an $m$-tuple of $n\\times n$ linearly independent matrices $\\mathbf A=(A_1, \\ldots, A_m).$ Let $\\Omega_\\mathbf A\\subset \\mathbb C^m$ be the unit ball with respect to the norm $\\|\\cdot\\|_{\\mathbf A}.$ %For a holomorphic function $f$ on $\\Omega_\\mathbf A,$ let %$\\rho_{V}(f):=\\left ( %\\begin{smallmatrix} %f(w)I_p& \\sum_{i=1}^{m} \\partial_if(w)V_{i} \\\\ %0 & f(w)I_q %\\end{smallmatrix}\\right ),$ where $V_1, \\ldots, V_m$ are $p\\times q$ %matrices. Given $p\\times q$ matrices $V_1, \\ldots, V_m$ and a function $f \\in \\mathcal O(\\Omega_\\mathbf A),$ the algebra of function holomorphic on an open set $U$ containing the closed unit ball $\\bar{\\Omega}_\\mathbf A$ define $$\\rho_{V}(f):=\\left ( \\begin{smallmatrix} f(w)I_p& \\sum_{i=1}^{m} \\partial_if(w)V_{i} \\\\ 0 & f(w)I_q \\end{smallmatrix}\\right ),$$ $w\\in \\Omega_\\mathbf A.$ Clearly, $\\rho_{V}$ defines an algebra homomorphism. We study contractivity (resp. complete contractivity) of such homomorphisms. The characterization of those balls in $\\mathbb C^2$ for which contractive linear maps are always completely contractive remained open. We answer this question for balls of the form $\\Omega_\\mathbf A$ in $\\mathbb C^2.$ The class of homomorphisms of the form $\\rho_V$ arise from localization of operators in the Cowen-Douglas class of $\\Omega.$ The (complete) contractivity of a homomorphism in this class naturally produces inequalities for the curvature of the corresponding Cowen-Douglas bundle. This connection and some of its very interesting consequences are discussed.
This paper has a twofold purpose: to present an overview of the theory of absolutely summing operators and its different generalizations for the multilinear setting, and to sketch the beginning of a research project related to an objective search of \\textquotedblleft perfect\\textquotedblright \\ multilinear extensions of the ideal of absolutely summing operators. The final section contains some open problems that may indicate lines for future investigation.
We investigate which weighted convolution algebras $\\ell^1_\\omega(S)$, where $S$ is a semilattice, are AMNM in the sense of Johnson (JLMS, 1986). We give an explicit example where this is not the case. We show that the unweighted examples are all AMNM, as are all $\\ell^1_\\omega(S)$ where $S$ has either finite width or finite height. Some of these finite-width examples are isomorphic to function algebras studied by Feinstein (IJMMS, 1999). We also investigate when $(\\ell^1_\\omega(S),{\\bf M}_2)$ is an AMNM pair in the sense of Johnson (JLMS, 1988), where ${\\bf M}_2$ denotes the algebra of 2-by-2 complex matrices. In particular, we obtain the following two contrasting results: (i) for many non-trivial weights on the totally ordered semilattice ${\\bf N}_{\\min}$, the pair $(\\ell^1_\\omega({\\bf N}_{\\min}),{\\bf M}_2)$ is not AMNM; (ii) for any semilattice $S$, the pair $(\\ell^1(S),{\\bf M}_2)$ is AMNM. The latter result requires a detailed analysis of approximately commuting, approximately idempotent $2\\times 2$ matrices.
In this paper we prove a noncommutative version of Hardy-Littlewood inequalities relating a function and its Fourier coefficients on the group $SU(2)$. As a consequence, we use it to obtain lower bounds for the $L^p-L^q$ norms of Fourier multipliers on the group $SU(2)$, for $1 < p \\leq 2 \\leq q < 1$. In addition, we give upper bounds of a similar form, analogous to the known results on the torus, but now in the noncommutative setting of $SU(2)$.
Let $K_\\theta$ be a model space generated by an inner function $\\theta$. We study the Schatten class membership of embeddings $I : K_\\theta \\to L^2(\\mu)$, $\\mu$ a positive measure, and of composition operators $C_\\phi:K_\\theta\\to H^2(\\mathbb D)$ with a holomprphic function $\\phi:\\mathbb D\\rightarrow \\mathbb D$. In the case of one-component inner functions $\\theta$ we show that the problem can be reduced to the study of natural extensions of $I$ and $C_\\phi$ to the Hardy-Smirnov space $E^2(D)$ in some domain $D\\supset \\mathbb D$. In particular, we obtain a characterization of Schatten membership of $C_\\phi$ in terms of Nevanlinna counting function. By example this characterization does not hold true for general $\\phi$.
We study the numerical index of absolute sums of Banach spaces, giving general conditions which imply that the numerical index of the sum is less or equal than the infimum of the numerical indices of the summands and we provide some examples where the equality holds covering the already known case of $c_0$-, $\\ell_1$- and $\\ell_\\infty$-sums and giving as a new result the case of $E$-sums where $E$ has the RNP and $n(E)=1$ (in particular for finite-dimensional $E$ with $n(E)=1$). We also show that the numerical index of a Banach space $Z$ which contains a dense increasing union of one-complemented subspaces is greater or equal than the limit superior of the numerical indices of those subspaces. Using these results, we give a detailed short proof of the already known fact that the numerical indices of all infinite-dimensional $L_p(\\mu)$-spaces coincide.
We introduce the concept of theta-antieigenvalue and theta-antieigenvector of a bounded linear operator on complex Hilbert space. We study the relation between theta-antieigenvalue and centre of mass of a bounded linear operator and compute antieigenvalue using the relation. This follows the notion of symmetric antieigenvalues introduced by Hossein et al. in \\cite{19}. We show that the concept of real antieigenvalue, imaginary antieigenvalue and symmetric antieigenvalue follows as a special case of theta-antieigenvalue. We also show how the concept of total antieigenvalue is related to the $\\theta$-antieigenvalue. In fact, we show that all the concepts of antieigenvalues studied so far follows from the concept of theta-antieigenvalue. We illustrate with example how to calculate the $\\theta$-antieigenvalue for an operator acting on a finite dimensional Hilbert space.
Let $E$ be a Frechet-Montel space and $(E_n)_{n \\in \\mathbb{N}}$ be a finite dimensional unconditional decomposition of $E$ with $\\dim(E_n)\\leq k$ for some fixed $k \\in \\mathbb{N}$ and for all $n \\in \\mathbb{N}$. Consider a sequence $(x_n)_{n \\in \\mathbb{N}}$ formed by taking an element $x_n$ from each $E_n$ for all $n \\in \\mathbb{N}$. Then $(x_n)_{n \\in \\mathbb{N}}$ has a subsequence which is complemented in $E$
In this paper we address the question whether in a given Banach space, a Chebyshev center of a nonempty bounded subset can be a farthest point of the set. Our exploration reveals that the answer depends on the convexity properties of the Banach space. We obtain a characterization of two-dimensional real strictly convex spaces in terms of Chebyshev center not contributing to the set of farthest points. We explore the scenario in uniformly convex Banach spaces and further study the roles played by centerability and M-compactness in the scheme of things to obtain a step by step characterization of strictly convex Banach spaces. We also illustrate with examples the optimality of our results.
We show that $\\ell_p$ norms are characterized as the unique norms which are both invariant under coordinate permutation and multiplicative with respect to tensor products. Similarly, the $L_p$ norms are the unique rearrangement-invariant norms on a probability space such that $\\|X Y\\|=\\|X\\|\\cdot\\|Y\\|$ for every pair $X,Y$ of independent random variables. Our proof relies on Cram\\ er s large deviation theorem.
Results on singular products of the distributions $x_{\\pm}^{-p}$ and $x^{-p}$ for natural $p$ are derived when the products are balanced so that their sum exists in the distribution space. These results follow the pattern of a known distributional product published by Jan Mikusi\\ nski in 1966. The results are obtained in Colombeau algebra of generalized functions, which is most relevant algebraic construction for tackling nonlinear problems of Schwartz distributions.
The Bohnenblust--Hille (polynomial and multilinear) inequalities were proved in 1931 in order to solve Bohr s absolute convergence problem on Dirichlet series. Since then these inequalities have found applications in various fields of analysis and analytic number theory. The control of the constants involved is crucial for applications, as it became evident in a recent outstanding paper of Defant, Frerick, Ortega-Cerd\\ {a}, Ouna\\\"{\\i}es and Seip published in 2011. The present work is devoted to obtain lower estimates for the constants appearing in the Bohnenblust--Hille polynomial inequality and some of its variants. The technique that we introduce for this task is a combination of the Krein--Milman Theorem with a description of the geometry of the unit ball of polynomial spaces on $\\ell^2_\\infty$.
We study the algebra $\\mathscr{E} (\\mathbb{R}^d)$ equipped with the multiplication $(T\\star S)(f)=T_x(S_y(f(xy))$ where $xy=(x_1y_1,\\dots,x_dy_d)$. This allows us a very elegant access to the theory of Hadamard type operators on $C^\\infty(\\Omega)$, $\\Omega$ open in $\\mathbb{R}^d$, that is, of operators which admit all monomials as eigenvectors. We obtain a representation of the algebra of such operators as an algebra of holomorphic functions with classical Hadamard multiplication. Finally we study global solvability for such operators on open subsets of $\\mathbb{R}_+^d$.
Using tools from the theory of operator ideals and s-numbers, we develop a general approach to transfer estimates for $L_2$ -approximation of Sobolev functions into estimates for $L_\\infty$-approximation, with precise control of all involved constants. As an illustration, we derive some results for periodic isotropic Sobolev spaces $H^s ({\\mathbb T}^d)$ and Sobolev spaces of dominating mixed smoothness $H^s_{\\rm mix} ({\\mathbb T}^d)$, always equipped with natural norms. Some results for isotropic as well as dominating mixed Besov spaces are also obtained.
We propose a new formalism for signal compression based on the Gabor basis set. By convolving the conventional Gabor functions with Dirichlet functions we obtain a periodic version of the Gabor basis set (pg). The pg basis is exact for functions that are band-limited with finite support, bypassing the Balian-Low theorem. The calculation of the pg coefficients is trivial and numerically stable, but the representation does not allow compression. However, by exchanging the pg basis with its biorthogonal basis and using the localized pg basis to calculate the coefficients, large compression factors are achieved. We illustrate the method on three examples: a rectangular pulse, an audio signal and a benchmark example from image processing.
We consider finitely generated shift-invariant spaces (SIS) with additional invariance in $L^2(\\R^d)$. We prove that if the generators and their translates form a frame, then they must satisfy some stringent restrictions on their behavior at infinity. Part of this work (non-trivially) generalizes recent results obtained in the special case of a principal shift-invariant spaces in $L^2(\\R)$ whose generator and its translates form a Riesz basis.
Piecewise affine functions on subsets of $\\mathbb R^m$ were studied in \\cite{Ovchinnikov:02,Aliprantis:06a,Aliprantis:07a,Aliprantis:07}. In this paper we study a more general concept of a locally piecewise affine function. We characterize locally piecewise affine functions in terms of components and regions. We prove that a positive function is locally piecewise affine iff it is the supremum of a locally finite sequence of piecewise affine functions. We prove that locally piecewise affine functions are uniformly dense in $C(\\mathbb R^m)$, while piecewise affine functions are sequentially order dense in $C(\\mathbb R^m)$. This paper is partially based on \\cite{Adeeb:14}.
Every finite metric tree has generalized roundness strictly greater than one. On the other hand, some countable metric trees have generalized roundness precisely one. The purpose of this paper is to identify some large classes of countable metric trees that have generalized roundness precisely one. At the outset we consider spherically symmetric trees endowed with the usual combinatorial metric (SSTs). Using a simple geometric argument we show how to determine decent upper bounds on the generalized roundness of finite SSTs that depend only on the downward degree sequence of the tree in question. By considering limits it follows that if the downward degree sequence $(d_{0}, d_{1}, d_{2}...)$ of a SST $(T,\\rho)$ satisfies $|\\{j , | , d_{j} > 1 \\}| = \\aleph_{0}$, then $(T,\\rho)$ has generalized roundness one. Included among the trees that satisfy this condition are all complete $n$-ary trees of depth $\\infty$ ($n \\geq 2$), all $k$-regular trees ($k \\geq 3$) and inductive limits of Cantor trees. The remainder of the paper deals with two classes of countable metric trees of generalized roundness one whose members are not, in general, spherically symmetric. The first such class of trees are merely required to spread out at a sufficient rate (with a restriction on the number of leaves) and the second such class of trees resemble infinite combs.
We construct holomorphic loop groups and their associated affine Kac-Moody groups and prove that they are tame Fr\\ echet manifolds. These results form the functional analytic basis for the theory of affine Kac-Moody symmetric spaces, presented first in the authors thesis. Our approach also solves completely the problem of complexification of loop groups; it allows a complete description of complex Kac-Moody groups and their non-compact real forms.
The method of periodic projections consists in iterating projections onto $m$ closed convex subsets of a Hilbert space according to a periodic sweeping strategy. In the presence of $m\\geq 3$ sets, a long-standing question going back to the 1960s is whether the limit cycles obtained by such a process can be characterized as the minimizers of a certain functional. In this paper we answer this question in the negative. Projection algorithms that minimize smooth convex functions over a product of convex sets are also discussed.
Let T be a homomorphism from a Banach algebra B to a Banach algebra A.The Cartesian product space A * B with T-Lau multiplication and l^1-norm becomes a new Banach algebra A *_T B. We investigate the notions such as approximate amenability, pseudo amenability, phi-pseudo amenability,phi-biflatness and phi-biprojectivity for Banach algebra A *_T B. We also present an example to show that approximate amenability of A and B is not stable for A *_T B. Finally we characterize the double centralizer algebra of A *_T B and present an application of this characterization.
We study reducing subspaces for an analytic multiplication operator M_{z^{n}} on the Bergman space L_{a}^{2}(A_{r}) of the annulus A_{r}, and we prove that M_{z^{n}} has exactly 2^n reducing subspaces. Furthermore, in contrast to what happens for the disk, the same is true for the Hardy space on the annulus. Finally, we extend the results to certain bilateral weighted shifts, and interpret the results in the context of complex geometry.
We define the algebra of Colombeau generalized functions on a subset A of the space of d-dimensional generalized points. If the domain A is open, such generalized functions can be identified with pointwise maps from A into the ring of Colombeau generalized numbers. We study analyticity in these algebras, if the domain is an open subset of the complex generalized points. In particular, if the domain is an open ball for the sharp norm, we characterize analyticity and give a unicity theorem involving the values at generalized points.
We extend the recent $L^{1}$ uncertainty inequalities obtained by Dall ara-Trevisan to the metric setting. For this purpose we introduce a new class of weights, named *isoperimetric weights*, for which the growth of the measure of their level sets $\\mu(\\{w\\leq r\\})$ can be controlled by $rI(r),$ where $I$ is the isoperimetric profile of the ambient metric space. We use isoperimetric weights, new *localized Poincar\\ e inequalities*, and interpolation, to prove $L^{p},1\\leq p<\\infty,$ uncertainty inequalities on metric measure spaces. We give an alternate characterization of the class of isoperimetric weights in terms of Marcinkiewicz spaces, which combined with the sharp Sobolev inequalities we had obtained in an earlier paper, and interpolation of weighted norm inequalities, give new uncertainty inequalities in the context of rearrangement invariant spaces.
Time-frequency localization operators are a quantization procedure that maps symbols on $R^{2d}$ to operators and depends on two window functions. We study the range of this quantization and its dependence on the window functions. If the short-time Fourier transform of the windows does not have any zero, then the range is dense in the Schatten $p$-classes. The main tool is new version of the Berezin transform associated to operators on $L^2(R^d)$. Although some results are analogous to results about Toeplitz operators on spaces of holomorphic functions, the absence of a complex structure requires the development of new methods that are based on time-frequency analysis.
Motivated by the need of processing functional-valued data, or more general, operatorvalued data, we introduce the notion of the operator reproducing kernel Hilbert space (ORKHS). This space admits a unique operator reproducing kernel which reproduces a family of continuous linear operators on the space. The theory of ORKHSs and the associated operator reproducing kernels are established. A special class of ORKHSs, known as the perfect ORKHSs, are studied, which reproduce the family of the standard point-evaluation operators and at the same time another di?erent family of continuous linear operators. The perfect ORKHSs are characterized in terms of features, especially for those with respect to integral operators. In particular, several speci?c examples of the perfect ORKHSs are presented. We apply the theory of ORKHSs to sampling and regularized learning, where operator-valued data are considered. Speci?cally, a general complete reconstruction formula from linear operators values is established in the framework of ORKHSs. The average sampling and the reconstruction of vector-valued functions are considered in speci?c ORKHSs. We also investigate in the ORKHSs setting the regularized learning schemes, which learn a target element from operator-valued data. The desired representer theorems of the learning problems are established to demonstrate the key roles played by the ORKHSs and the operator reproducing kernels in machine learning from operator-valued data. We ?nally point out that the continuity of linear operators, used to obtain the operator-valued data, on an ORKHS is necessary for the stability of the numerical reconstruction algorithm using the resulting data.
In this work we propose to study the general Robin boundary value problem involving signed smooth measures on an arbitrary domain $\\Omega$ of $\\mathbb R^d$. A Kato class of measures is defined to insure the closability of the associated form $(\\mem,\\mfm)$. Moreover, the associated operator $\\Delta_{\\mu}$ is a realization of the Laplacian on $L^2(\\Omega)$. In particular, when $|\\mu|$ is locally infinite everywhere on $\\po$, $\\Delta_{\\mu}$ is the laplacian with Dirichlet boundary conditions. On the other hand, we will prove that he semigroup $(\\emu)_{t\\geq 0}$ is sandwitched between $(\\emup)_{t\\geq 0}$ and $(\\emun)_{t\\geq 0}$ and we will see that the converse is also true.
A famous result due to Grothendieck asserts that every continuous linear operator from $\\ell_{1}$ to $\\ell_{2}$ is absolutely $(1,1)$-summing. If $n\\geq2,$ however, it is very simple to prove that every continuous $n$-linear operator from $\\ell_{1}\\times...\\times\\ell_{1}$ to $\\ell_{2}$ is absolutely $(1;1,...,1) $-summing, and even absolutely $(\\frac{2}% {n};1,...,1) $-summing$.$ In this note we deal with the following problem: Given a positive integer $n\\geq2$, what is the best constant $g_{n}>0$ so that every $n$-linear operator from $\\ell_{1}\\times...\\times\\ell_{1}$ to $\\ell_{2}$ is absolutely $(g_{n};1,...,1) $-summing? We prove that $g_{n}\\leq\\frac{2}{n+1}$ and also obtain an optimal improvement of previous recent results (due to Heinz Juenk $\\mathit{et}$ $\\mathit{al}$, Geraldo Botelho $\\mathit{et}$ $\\mathit{al}$ and Dumitru Popa) on inclusion theorems for absolutely summing multilinear operators.
We show in this paper that a certain class of normed modules over the algebra of all bounded operators on a Hilbert space possesses a homological property which is a kind of a functional-analytic version of the standard algebraic property of flatness. We mean the preservation, under projective tensor multiplication of modules, of the property of a given morphism to be isometric. As an application, we obtain several extension theorems for different types of modules, called Arveson-Wittstock type theorems. These, in their turn, have, as a straight corollary, the `genuine  Arveson-Wittstock Theorem in its non-matricial presentation. We recall that the latter theorem plays the role of a `quantum  version of the classical Hahn-Banach theorem on the extension of bounded linear functionals. It was originally proved by Wittstock (1981), and a crucial preparatory step was done by Arveson (1969).
The Hardy--Littlewood inequalities on $\\ell _{p}$ spaces provide optimal exponents for some classes of inequalities for bilinear forms on $\\ell _{p}$ spaces. In this paper we investigate in detail the exponents involved in Hardy--Littlewood type inequalities and provide several optimal results that were not achieved by the previous approaches. Our first main result asserts that for $q_{1},...,q_{m}>0$ and an infinite-dimensional Banach space $Y$ attaining its cotype $\\cot Y$, if \\begin{equation*} \\frac{1}{p_{1}}+...+\\frac{1}{p_{m}}<\\frac{1}{\\cot Y}, \\end{equation*} then the following assertions are equivalent: (a) There is a constant $C_{p_{1},...,p_{m}}^{Y}\\geq 1$ such that \\begin{equation*} \\left( \\sum_{j_{1}=1}^{\\infty }\\left( \\sum_{j_{2}=1}^{\\infty }\\cdots \\left( \\sum_{j_{m}=1}^{\\infty }\\left\\Vert A(e_{j_{1}},...,e_{j_{m}})\\right\\Vert ^{q_{m}}\\right) ^{\\frac{q_{m-1}}{q_{m}}}\\cdots \\right) ^{\\frac{q_{1}}{q_{2}} }\\right) ^{\\frac{1}{q_{1}}}\\leq C_{p_{1},...,p_{m}}^{Y}\\left\\Vert A\\right\\Vert \\end{equation*} for all continuous $m-$linear operators $A:\\ell _{p_{1}}\\times \\cdots \\times \\ell _{p_{m}}\\rightarrow Y.$ (b) The exponents $q_{1},...,q_{m}$ satisfy \\begin{equation*} q_{1}\\geq \\lambda _{m,\\cot Y}^{p_{1},...,p_{m}},q_{2}\\geq \\lambda _{m-1,\\cot Y}^{p_{2},...,p_{m}},...,q_{m}\\geq \\lambda _{1,\\cot Y}^{p_{m}}, \\end{equation*} where, for $k=1,...,m,$ \\begin{equation*} \\lambda _{m-k+1,\\cot Y}^{p_{k},...,p_{m}}:=\\frac{\\cot Y}{1-\\left( \\frac{1}{ p_{k}}+...+\\frac{1}{p_{m}}\\right) \\cot Y}. \\end{equation*} As an application of the above result we generalize to the $m$-linear setting one of the classical Hardy--Littlewood inequalities for bilinear forms. Our result is sharp in a very strong sense: the constants and exponents are optimal, even if we consider mixed sums.
In several variables, we prove the pointwise convergence of multiresolution expansions to the distributional point values of tempered distributions and distributions of superexponential growth. The article extends and improves earlier results by G. G. Walter and B. K. Sohn and D. H. Pahk that were shown in one variable. We also provide characterizations of the quasiasymptotic behavior of distributions at finite points and discuss connections with $\\alpha$-density points of measures.
Two methods of constructing infinitely many isomorphically distinct $\\Cal L_p$-spaces have been published. In this article we show that these constructions yield very different spaces and in the process develop methods for dealing with these spaces from the isomorphic viewpoint. We use these methods to give a complete isomorphic classification of the spaces $R_p^\\alpha$ constructed by Bourgain, Rosenthal, and Schechtman and to show that $X_p\\otimes X_p$ is not isomorphic to a complemented subspace of any $R_p^\\alpha.$
A classification of weakly compact multiplication operators on L(L_p), $1<p<\\infty$, is given. This answers a question raised by Saksman and Tylli in 1992. The classification involves the concept of $\\ell_p$-strictly singular operators, and we also investigate the structure of general $\\ell_p$-strictly singular operators on L_p. The main result is that if an operator T on L_p, 1<p<2, is $\\ell_p$-strictly singular and T_{|X} is an isomorphism for some subspace X of L_p, then X embeds into L_r for all r<2, but X need not be isomorphic to a Hilbert space. It is also shown that if T is convolution by a biased coin on L_p of the Cantor group, $1\\le p <2$, and $T_{|X}$ is an isomorphism for some reflexive subspace X of L_p, then X is isomorphic to a Hilbert space. The case p=1 answers a question asked by Rosenthal in 1976.
Results related to summability of multilinear operators dates back, at least, to the 30 s, with Littlewood s $4/3$ inequality. Since then, several different related results and approaches have appeared, for instance with the Bohnenblust--Hille (\\textit{Annals of Math.}, 1931) and Hardy--Littlewood (\\textit{Quarterly J. Math}, 1934) inequalities and its striking (and very recent) applications in different fields of Mathematics and Physics. In this paper we present a new unifying approach to a series of results on summability of multilinear forms.
If $E$ is an operator space, the non-commutative vector valued $L^p$ spaces $S^p[E]$ have been defined by Pisier for any $1 \\leq p \\leq \\infty$. In this paper a necessary and sufficient condition for a Hankel matrix of the form $(a_{i+j})_{0 \\le i,j}$ with $a_k \\in E$ to be bounded in $S^p[E]$ is established. This extends previous results of Peller where $E=\\C$ or $E=S^p$. The main theorem states that if $1 \\leq p < \\infty$, $(a_{i+j})_{0 \\le i,j}$ is bounded in $S^p[E]$ if and only if there is an analytic function $\\phi$ in the vector valued Besov Space $B_p^{1/p}(E)$ such that $a_n = \\hat \\phi(n)$ for all $n \\in \\N$. In particular this condition only depends on the Banach space structure of $E$. We also show that the norm of the isomorphism $\\phi \\mapsto (\\hat \\phi(i+j))_{i,j}$ grows as $\\sqrt p$ as $p \\to \\infty$, and compute the norm of the natural projection onto the space of Hankel matrices.
Given an Orlicz convex function $\\varphi$ and a positive weight $w$ we present criteria of diameter two property and of Radon-Nikod\\ ym property in the Orlicz-Lorentz function and sequence spaces, $\\Lambda_{\\varphi,w}$ and $\\lambda_{\\varphi,w}$, respectively. We show that in the spaces $\\Lambda_{\\varphi,w}$ or $\\lambda_{\\varphi,w}$ equipped with the Luxemburg norm, the diameter of any relatively weakly subset of the unit ball in these spaces is two if and only if $\\varphi$ does not satisfy the appropriate growth condition $\\Delta_2$, while they do have the Radon-Nikod\\ ym property if and only if $\\varphi$ satisfies the appropriate condition $\\Delta_2$.
A standard Hilbert-space proof of Dirichlet s principle is simplified, using an observation that a certain form of min-problem has unique solution, at a specified point. This solves Dirichlet s problem, after it is recast in the required form (using the Poincare/Friedrichs bound and Riesz representation). The solution s dependence on data is linear and continuous; and the solution is invariant under certain changes of data, away from the border of the region where Dirichlet s problem is given. If that region is regular enough for functions on it to have border-traces, then the problem can be stated and solved in terms of border-data.
Suppose $\\mathcal{H}$ is a weighted Hardy space of analytic functions on the unit ball $\\mathbb{B}_n\\subset\\mathbb{C}^n$ such that the composition operator $C_\\psi$ defined by $C_{\\psi}f=f\\circ\\psi$ is bounded on $\\mathcal{H}$ whenever $\\psi$ is a linear fractional self-map of $\\mathbb{B}_n$. If $\\varphi$ is an involutive Moebius automorphism of $\\mathbb{B}_n$, we find a conjugation operator $\\mathcal{J}$ on $\\mathcal{H}$ such that $C_{\\varphi}=\\mathcal{J} C^*_{\\varphi}\\mathcal{J}$. The case $n=1$ answers a question of Garcia and Hammond.
In a previous paper, the authors introduced the idea of a symmetric pair of operators as a way to compute self-adjoint extensions of symmetric operators. In brief, a symmetric pair consists of two densely defined linear operators $A$ and $B$, with $A \\subseteq B^\\star$ and $B \\subseteq A^\\star$. In this paper, we will show by example that symmetric pairs may be used to deduce closability of operators and sometimes even compute adjoints. In particular, we prove that the Malliavin derivative and Skorokhod integral of stochastic calculus are closable, and the closures are mutually adjoint. We also prove that the basic involutions of Tomita-Takesaki theory are closable and that their closures are mutually adjoint. Applications to functions of finite energy on infinite graphs are also discussed, wherein the Laplace operator and inclusion operator form a symmetric pair.
We introduce the following linear combination interpolation problem (LCI): Given $N$ distinct numbers $w_1,\\ldots w_N$ and $N+1$ complex numbers $a_1,\\ldots, a_N$ and $c$, find all functions $f(z)$ analytic in a simply connected set (depending on $f$) containing the points $w_1,\\ldots,w_N$ such that \\[ \\sum_{u=1}^Na_uf(w_u)=c. \\] To this end we prove a representation theorem for such functions $f$ in terms of an associated polynomial $p(z)$. We first introduce the following two operations, $(i)$ substitution of $p$, and $(ii)$ multiplication by monomials $z^j, 0\\le j < N$. Then let $M$ be the module generated by these two operations, acting on functions analytic near $0$. We prove that every function $f$, analytic in a neighborhood of the roots of $p$, is in $M$. In fact, this representation of $f$ is unique. To solve the above interpolation problem, we employ an adapted systems theoretic realization, as well as an associated representation of the Cuntz relations (from multi-variable operator theory.) We study these operations in reproducing kernel Hilbert space): We give necessary and sufficient condition for existence of realizations of these representation of the Cuntz relations by operators in certain reproducing kernel Hilbert spaces, and offer infinite product factorizations of the corresponding kernels.
Our aim in this paper is to obtain necessary and sufficient conditions for weighted shift operators on the Hilbert spaces $\\ell^{2}(\\mathbb Z)$ and $\\ell^{2}(\\mathbb N)$ to be subspace-transitive, consequently, we show that the Herrero question (D. A. Herrero. Limits of hypercyclic and supercyclic operators, J. Funct. Anal., 99 (1991)179-190) holds true even on a subspace of a Hilbert space, i.e. there exists an operator $T$ such that both $T$ and $T^*$ are subspace-hypercyclic operators for some subspaces. We display the conditions on the direct sum of two invertable bilateral forward weighted shift operators to be subspace-hypercyclic.
In a topological Riesz space there are two types of bounded subsets: order bounded subsets and topologically bounded subsets. It is natural to ask (1) whether an order bounded subset is topologically bounded and (2) whether a topologically bounded subset is order bounded. A classical result gives a partial answer to (1) by saying that an order bounded subset of a locally solid Riesz space is topologically bounded. This paper attempts to further investigate these two questions. In particular, we show that (i) there exists a non-locally solid topological Riesz space in which every order bounded subset is topologically bounded; (ii) if a topological Riesz space is not locally solid, an order bounded subset need not be topologically bounded; (iii) a topologically bounded subset need not be order bounded even in a locally convex-solid Riesz space. Next, we show that (iv) if a locally solid Riesz space has an order bounded topological neighborhood of zero, then every topologically bounded subset is order bounded; (v) however, a locally convex-solid Riesz space may not possess an order bounded topological neighborhood of zero even if every topologically bounded subset is order bounded; (vi) a pseudometrizable locally solid Riesz space need not have an order bounded topological neighborhood of zero. In addition, we give some results about the relationship between order bounded subsets and positive homogeneous operators.
We study continuous wavelet transforms associated to matrix dilation groups giving rise to an irreducible square-integrable quasi-regular representation on ${\\rm L}^2(\\mathbb{R}^d)$. We first prove that these representations are integrable as well, with respect to a wide variety of weights, thus allowing to consistently quantify coefficient decay via coorbit space norms. We then show that these spaces always admit an atomic decomposition in terms of bandlimited Schwartz wavelets. We exhibit spaces of Schwartz functions densely contained in (most of) the coorbit spaces. We also present an example showing that for a consistent definition of coorbit spaces, the irreducibility requirement cannot be easily dispensed with. We then address the question how to predict wavelet coefficient decay from vanishing moment assumptions. To this end, we introduce a new condition on the open dual orbit associated to a dilation group: If the orbit is temperately embedded, it is possible to derive rather general weighted ${\\rm L}^{p,q}$-estimates for the wavelet coefficients from vanishing moment conditions on the wavelet and the analyzed function. These estimates have various applications: They provide very explicit admissibility conditions for wavelets and integrable vectors, as well as sufficient criteria for membership in coorbit spaces. As a further consequence, one obtains a transparent way of identifying elements of coorbit spaces with certain (cosets of) tempered distributions. We then show that, for every dilation group in dimension two, the associated dual orbit is temperately embedded. In particular, the general results derived in this paper apply to the shearlet group and its associated family of coorbit spaces, where they complement and generalize the known results.
A connection is a binary operation for positive operators satisfying the monotonicity, the transformer inequality and the joint-continuity from above. A mean is a normalized connection. In this paper, we show that there is a one-to-one correspondence between connections and finite Borel measures on the unit interval via a suitable integral representation. Every mean can be regarded as an average of weighted harmonic means. Moreover, we investigate decompositions of connections, means, symmetric connections and symmetric means.
We find an optimal upper bound on the values of the weak$^*$-dentability index $Dz(X)$ in terms of the Szlenk index $Sz(X)$ of a Banach space $X$ with separable dual. Namely, if $\\;Sz(X)=\\omega^{\\alpha}$, for some $\\alpha<\\omega_1$, and $p\\in(1,\\infty)$, then $$Sz(X)\\le Dz(X)\\le Sz(L_p(X))\\le {cases} \\omega^{\\alpha+1} &\\text{if $\\alpha$ is a finite ordinal,} \\omega^{\\alpha} &\\text{if $\\alpha$ is an infinite ordinal.} {cases}$$
We introduce the notions of multi-suprema and multi-infima for vector spaces equipped with a collection of wedges, generalizing the notions of suprema and infima in ordered vector spaces. Multi-lattices are vector spaces closed under multi-suprema and multi-infima and are thus an abstraction of vector lattices. The Riesz decomposition property in the multi-wedged setting is also introduced, leading to Riesz-Kantorovich formulas for multi-suprema and multi-infima in certain spaces of operators.
We introduce the symmetric-Radon-Nikod\\ ym property (sRN property) for finitely generated s-tensor norms $\\beta$ of order $n$ and prove a Lewis type theorem for s-tensor norms with this property. As a consequence, if $\\beta$ is a projective s-tensor norm with the sRN property, then for every Asplund space $E$, the canonical map $\\widetilde{\\otimes}_{\\beta}^{n,s} E  \\to \\Big(\\widetilde{\\otimes}_{\\beta }^{n,s} E \\Big) $ is a metric surjection. This can be rephrased as the isometric isomorphism $\\mathcal{Q}^{min}(E) = \\mathcal{Q}(E)$ for certain polynomial ideal $\\Q$. We also relate the sRN property of an s-tensor norm with the Asplund or Radon-Nikod\\ {y}m properties of different tensor products. Similar results for full tensor products are also given. As an application, results concerning the ideal of $n$-homogeneous extendible polynomials are obtained, as well as a new proof of the well known isometric isomorphism between nuclear and integral polynomials on Asplund spaces.
We prove an implicit function theorem for Keller C^k_c-maps from arbitrary real or complex topological vector spaces to Frechet spaces, imposing only a certain metric estimate on the partial differentials. As a tool, we show the C^k-dependence of fixed points on parameters for suitable families of contractions of a Frechet space. The investigations were stimulated by a recent metric approach to differentiability in Frechet spaces by Olaf Mueller. Our results also subsume generalizations of Mueller s Inverse Function Theorem for mappings between Frechet spaces. As an application, we prove existence and uniqueness of solutions to suitable ordinary differential equations in Frechet spaces, and study their dependence on initial conditions and parameters.
We construct an analytic self-map $\\phi$ of the unit disk and an Orlicz function $\\Psi$ for which the composition operator of symbol $\\phi$ is compact on the Hardy-Orlicz space $H^\\Psi$, but not compact on the Bergman-Orlicz space ${\\mathfrak B}^\\Psi$. For that, we first prove a Carleson embedding theorem, and then characterize the compactness of composition operators on Bergman-Orlicz spaces, in terms of Carleson function (of order 2). We show that this Carleson function is equivalent to the Nevanlinna counting function of order 2.
Using his formulation of the potential theoretic notion of balayage and his deep results about this idea, Beurling gave sufficient conditions for Fourier frames in terms of balayage. The analysis makes use of spectral synthesis, due to Wiener and Beurling, as well as properties of strict multiplicity, whose origins go back to Riemann. In this setting and with this technology, we formulate and prove non-uniform sampling formulas in the context of the short time Fourier transform (STFT).
Let (B_0,B_1) be a Banach pair. Stafney showed that one can replace the space F(B_0,B_1) with its subspace G(B_0,B_1) in the definition of the norm in the Calderon complex interpolation method on the strip if the element belongs to the intersection of the spaces B_i. We shall extend this result to a more general setting, which contains well-known interpolation methods: the Calderon complex interpolation method on the annulus, the Lions-Peetre real method (with several different choices of norms), and the Peetre \"plus minus\" method.
There have been a number of generalizations of fixed point results to the so called TVS-cone metric spaces, based on a distance function that takes values in some cone with nonempty interior (solid cone) in some topological vector space. In this paper we prove that the TVS-cone metric space can be equipped with a family of mutually equivalent (usual) metrics such that the convergence (resp. property of being Cauchy sequence, contractivity condition) in TVS sense is equivalent to convergence (resp. property of being Cauchy sequence, contractivity condition) in all of these metrics. As a consequence, we prove that if a topological vector space $E$ and a solid cone $P$ are given, then the category of TVS-cone metric spaces is a proper subcategory of metric spaces with a family of mutually equivalent metrics (Corollary 3.9). Hence, generalization of a result from metric spaces to TVS-cone metric spaces is meaningless. This, also, leads to a formal deriving of fixed point results from metric spaces to TVS-cone metric spaces and makes some earlier results vague. We also give a new common fixed point result in (usual) metric spaces context, and show that it can be reformulated to TVS-cone metric spaces context very easy, despite of the fact that formal (syntactic) generalization is impossible. Apart of main results, we prove that the existence of a solid cone ensures that the initial topology is Hausdorff, as well as it admits a plenty of convex open sets. In fact such topology is stronger then some norm topology.
Ordered locally convex spaces is an important classes of spaces in the theory of ordered topological vector spaces just as locally convex spaces in the theory of topological vector spaces. Some special classes of ordered locally convex spaces such as order infrabarrelled spaces have been studied. The purpose of this paper is to define order bornological spaces and study their fundamental properties. We also define and study order ultrabornological spaces which is an important special class of order bornological spaces.
In this paper, we give a brief review concerning diskcyclic operators and then we provide some further characterizations of diskcyclic operators on separable Hilbert spaces. In particular, we show that if $x\\in {\\mathcal H}$ has a disk orbit under $T$ that is somewhere dense in ${\\mathcal H}$ then the disk orbit of $x$ under $T$ need not be everywhere dense in ${\\mathcal H}$. We also show that the inverse and the adjoint of a diskcyclic operator need not be diskcyclic. Moreover, we establish another diskcyclicity criterion and use it to find a necessary and sufficient condition for unilateral backward shifts that are diskcyclic operators. We show that a diskcyclic operator exists on a Hilbert space ${\\mathcal H}$ over the field of complex numbers if and only if $\\dim({\\mathcal H})=1$ or $\\dim({\\mathcal H})=\\infty$ . Finally we give a sufficient condition for the somewhere density disk orbit to be everywhere dense.
It is known that every complex square matrix with nonnegative determinant is the product of positive semi-definite matrices. There are characterizations of matrices that require two or five positive semi-definite matrices in the product. However, the characterizations of matrices that require three or four positive semi-definite matrices in the product are lacking. In this paper, we give a complete characterization of these two types of matrices. With these results, we give an algorithm to determine whether a square matrix can be expressed as the product of $k$ positive semi-definite matrices but not fewer, for $k = 1,2,3,4,5$.
It is known that the famous, intractible 1959 Kadison-Singer problem in $C^{*}$-algebras is equivalent to fundamental unsolved problems in a dozen areas of research in pure mathematics, applied mathematics and Engineering. The recent surprising solution to this problem by Marcus, Spielman and Srivastava was a significant achievement and a significant advance for all these areas of research. We will look at many of the known equivalent forms of the Kadison-Singer Problem and see what are the best new theorems available in each area of research as a consequence of the work of Marcus, Spielman and Srivastave. In the cases where {\\it constants} are important for the theorem, we will give the best constants available in terms of a {\\it generic constant} taken from \\cite{MSS}. Thus, if better constants eventually become available, it will be simple to adapt these new constants to the theorems.
The aim of this paper is to give a characterization in Hilbert spaces of the generators of $C_0$-semigroups associated with closed, sectorial forms in terms of the convergence of a generalized Trotter s product formula. In the course of the proof of the main result we also present a similarity result which can be of independent interest: for any unbounded generator $A$ of a $C_0$-semigroup $e^{tA}$ it is possible to introduce an equivalent scalar product on the space, such that $e^{tA}$ becomes non-quasi-contractive with respect to the new scalar product.
The difference body operator enjoys different characterization results relying on its basic properties such as continuity, SL(n)-covariance, Minkowski valuation or symmetric image. The Rogers-Shephard and the Brunn-Minkowski inequalities provide upper and lower bounds for the volume of the difference body in terms of the volume of the body itself. In this paper we aim to understand the role of the Rogers-Shephard inequality in characterization results of the difference body and, at the same time, to study the interplay among the different properties. Among others, we prove that the difference body operator is the only continuous and GL(n)-covariant operator from the space of convex bodies to the origin-symmetric ones which satisfies a Rogers-Shephard type inequality while every continuous and GL(n)-covariant operator satisfies a Brunn-Minkowski type inequality.
It is well known that to determine a triangle up to congruence requires three measurements: three sides, two sides and the included angle, or one side and two angles. We consider various generalizations of this fact to two and three dimensions. In particular we consider the following question: given a convex polyhedron $P$, how many measurements are required to determine $P$ up to congruence? We show that in general the answer is that the number of measurements required is equal to the number of edges of the polyhedron. However, for many polyhedra fewer measurements suffice; in the case of the unit cube we show that nine carefully chosen measurements are enough. We also prove a number of analogous results for planar polygons. In particular we describe a variety of quadrilaterals, including all rhombi and all rectangles, that can be determined up to congruence with only four measurements, and we prove the existence of $n$-gons requiring only $n$ measurements. Finally, we show that one cannot do better: for any sequence of $n$ distinct points in the plane one needs at least $n$ measurements to determine it up to congruence.
We prove a conjecture of B. Gr\\\"unbaum stating that the set of affine invariant points of a convex body equals to the set of points invariant under all affine linear symmetries of the convex body. As a consequence we give a short proof on the fact that the affine space of affine linear points is infinite dimensional. In particular, we show that the set of affine invariant points with no dual is of second category. We investigate extremal cases for a class of symmetry measures. We show that the center of the John and L\\\"owner ellipsoid can be far apart and we give the optimal order for the extremal distance of the two centers.
We prove the equivalence of the two important facts about finite metric spaces and universal Urysohn metric spaces $\\Bbb U$, namely theorem A and theorem B below: Theorem A (Approximation): The group of isometry $ISO(\\Bbb U)$ contains everywhere dense locally finite subgroup; Theorem G(Globalization): For each finite metric space $F$ there exists another finite metric space $\\bar F$ and isometric imbedding $j$ of $F$ to $\\bar F$ such that isometry $j$ induces the imbedding of the group monomorphism of the group of isometries of the space $F$ to the group of isometries of space $\\bar F$ and each partial isometry of $F$ can be extended up to global isometry in $\\bar F$. The fact that theorem $G$, is true was announced in 2005 by author without proof, and was proved by S.Solecki in \\cite{Sol} (see also \\cite{P,P1}) based on the previous complicate results of other authors. The theorem is generalization of the Hrushevski s theorem about the globalization of the partial isomorphisms of finite graphs. We intend to give a constructive proof in the same spirit for metric spaces elsewhere. We also give the strengthening of homogeneity of Urysohn space and in the last paragraph we gave a short survey of the various constructions of Urysohn space including the new proof of the construction of shift invariant universal distance matrix from \\cite{CV}.
Extending results of Suss and Hadwiger (proved by them for the case of convex bodies and positive ratios), we show that compact (respectively, closed) convex sets in the Euclidean space of dimension n are homothetic provided for any given integer m between 2 and n - 1 (respectively, between 3 and n - 1), the orthogonal projections of the sets on every m-dimensional plane are homothetic, where homothety ratio and its sign may depend on the projection plane. The proof uses a refined version of Straszewicz s theorem on exposed points of compact convex sets.
The Orlicz-Brunn-Minkowski theory, introduced by Lutwak, Yang, and Zhang, is a new extension of the classical Brunn-Minkowski theory. It represents a generalization of the $L_p$-Brunn-Minkowski theory, analogous to the way that Orlicz spaces generalize $L_p$ spaces. For appropriate convex functions $\\varphi:[0,\\infty)^m\\to [0,\\infty)$, a new way of combining arbitrary sets in $\\R^n$ is introduced. This operation, called Orlicz addition and denoted by $+_{\\varphi}$, has several desirable properties, but is not associative unless it reduces to $L_p$ addition. A general framework is introduced for the Orlicz-Brunn-Minkowski theory that includes both the new addition and previously introduced concepts, and makes clear for the first time the relation to Orlicz spaces and norms. It is also shown that Orlicz addition is intimately related to a natural and fundamental generalization of Minkowski addition called $M$-addition. The results obtained show, roughly speaking, that the Orlicz-Brunn-Minkowski theory is the most general possible based on an addition that retains all the basic geometrical properties enjoyed by the $L_p$-Brunn-Minkowski theory. Inequalities of the Brunn-Minkowski type are obtained, both for $M$-addition and Orlicz addition. The new Orlicz-Brunn-Minkowski inequality implies the $L_p$-Brunn-Minkowski inequality. New Orlicz-Minkowski inequalities are obtained that generalize the $L_p$-Minkowski inequality. One of these has connections with the conjectured log-Brunn-Minkowski inequality of Lutwak, Yang, and Zhang, and in fact these two inequalities together are shown to split the classical Brunn-Minkowski inequality.
For a (compact) subset $K$ of a metric space and $\\varepsilon > 0$, the {\\em covering number} $N(K , \\varepsilon )$ is defined as the smallest number of balls of radius $\\varepsilon$ whose union covers $K$. Knowledge of the {\\em metric entropy}, i.e., the asymptotic behaviour of covering numbers for (families of) metric spaces is important in many areas of mathematics (geometry, functional analysis, probability, coding theory, to name a few). In this paper we give asymptotically correct estimates for covering numbers for a large class of homogeneous spaces of unitary (or orthogonal) groups with respect to some natural metrics, most notably the one induced by the operator norm. This generalizes earlier author s results concerning covering numbers of Grassmann manifolds; the generalization is motivated by applications to noncommutative probability and operator algebras. In the process we give a characterization of geodesics in $U(n)$ (or $SO(m)$) for a class of non-Riemannian metric structures.
In this paper we present the construction of several aggregates of tetrahedra. Each construction is obtained by performing rotations on an initial set of tetrahedra that either (1) contains gaps between adjacent tetrahedra, or (2) exhibits an aperiodic nature. Following this rotation, gaps of the former case are \"closed\" (in the sense that faces of adjacent tetrahedra are brought into contact to form a \"face junction\") while translational and rotational symmetries are obtained in the latter case. In all cases, an angular displacement of {\\beta} = arccos((3{\\phi} - 1)/4) (or a closely related angle), where {\\phi} is the golden ratio, is observed between faces of a junction. Additionally, the overall number of plane classes, defined as the number of distinct facial orientations in the collection of tetrahedra, is reduced following the transformation. Finally, we present several \"curiosities\" involving the structures discussed here with the goal of inspiring the reader s interest in constructions of this nature and their attending, interesting properties.
The Fermat-Steiner problem consists in finding all points in a metric space $Y$ such that the sum of distances from each of them to the points from some fixed finite subset of $Y$ is minimal. This problem is investigated for the metric space $Y=H(X)$ of compact subsets of a metric space $X$, endowed with the Hausdorff distance. For the case of a proper metric space $X$ a description of all compacts $K\\in H(X)$ which the minimum is attained at is obtained. In particular, the Steiner minimal trees for three-element boundaries are described. We also construct an example of a regular triangle in $H(R^2)$, such that all its shortest trees have no \"natural\" symmetry.
In this paper we prove the existence of quasiperiodic rhombic substitution tilings with 2n-fold rotational symmetry, for any n. The tilings are edge-to-edge and use [n/2] rhombic prototiles with unit length sides. We explicitly describe the substitution rule for the edges of the rhombuses, and prove the existence of the corresponding tile substitutions by proving that the interior can be tiled consistently with the given edge substitutions.
We study Finsler PL spaces, that is simplicial complexes glued out of simplices cut off from some normed spaces. We are interested in the class of Finsler PL spaces featuring local uniqueness of geodesics (for complexes made of Euclidean simplices, this property is equivalent to local CAT(0)). Though non-Euclidean normed spaces never satisfy CAT(0), it turns out that they share many common features. In particular, a globalization theorem holds: in a simply-connected Finsler PL space local uniqueness of geodesics implies the global one. However the situation is more delicate here: some basic convexity properties do not extend to the PL Finsler case.
In 1914 Lebesgue defined a \"universal covering\" to be a convex subset of the plane that contains an isometric copy of any subset of diameter 1. His challenge of finding a universal covering with the least possible area has been addressed by various mathematicians: Pal, Sprague and Hansen have each created a smaller universal covering by removing regions from those known before. However, Hansen s last reduction was microsopic: he claimed to remove an area of $6 \\cdot 10^{-18}$, but we show that he actually removed an area of just $8 \\cdot 10^{-21}$. In the following, with the help of Greg Egan, we find a new, smaller universal covering with area less than $0.8441153$. This reduces the area of the previous best universal covering by a whopping $2.2 \\cdot 10^{-5}$.
A d-dimensional framework is an embedding of the vertices and edges of a graph in Euclidean space. A d-dimensional framework is globally rigid if every other d-dimensional framework with the same edge lengths has the same pairwise distances between the vertices. A graph is generically globally rigid in dimension d (d-GGR) if every generic framework is globally rigid. The d-dimensional framework of a d-GGR graph is universally rigid if for d  greater than or equal to d every d -dimensional framework with the same edge lengths has the same pairwise distances between the vertices. We establish a strong connection between global and universal rigidity by showing that all 1 and 2-GGR graphs and an infinite number of higher dimensional d-GGR graphs have a generic universally rigid framework.
Several conditions are given when a packing of equal disks in a torus is locally maximally dense, where the torus is defined as the quotient of the plane by a two-dimensional lattice. Conjectures are presented that claim that the density of any strictly jammed packings, whose graph does not consist of all triangles and the torus lattice is the standard triangular lattice, is at most $\\frac{n}{n+1}\\frac{\\pi}{\\sqrt{12}}$, where $n$ is the number of packing disks. Several classes of collectively jammed packings are presented where the conjecture holds.
For any two configurations of ordered points $p=(p_{1},...,\\p_{N})$ and $q=(q_{1},...,q_{N})$ in Euclidean space $E^d$ such that $q$ is an expansion of $p$, there exists a continuous expansion from $p$ to $q$ in dimension 2d; Bezdek and Connelly used this to prove the Kneser-Poulsen conjecture for the planar case. In this paper, we show that this construction is optimal in the sense that for any $d \\ge 2$ there exists configurations of $(d+1)^2$ points $p$ and $q$ in $E^d$ such that $q$ is an expansion of $p$ but there is no continuous expansion from $p$ to $q$ in dimension less than 2d. The techniques used in our proof are completely elementary.
We give a complete characterization of compact sets with positive reach (=proximally $C^1$ sets) in the plane and of one-dimensional sets with positive reach in ${\\mathbb R}^d$. Further, we prove that if $\\emptyset \\neq A\\subset{\\mathbb R}^d$ is a set of positive reach of topological dimension $0< k \\leq d$, then $A$ has its \"$k$-dimensional regular part\" $\\emptyset \\neq R \\subset A$ which is a $k$-dimensional \"uniform\" $C^{1,1}$ manifold open in $A$ and $A\\setminus R$ can be locally covered by finitely many $(k-1)$-dimensional DC surfaces. We also show that if $A \\subset {\\mathbb R}^d$ has positive reach, then $\\partial A$ can be locally covered by finitely many semiconcave hypersurfaces.
For a complete noncompact connected Riemannian manifold with bounded geometry, we prove a compactness result for sequences of finite perimeter sets with uniformly bounded volume and perimeter in a larger space obtained by adding limit manifolds at infinity. We extends previous results contained in [Nar14a], in such a way that the generalized existence theorem, Theorem 1 of [Nar14a] is actually a generalized compactness theorem. The suitable modifications to the arguments and statements of the results in [Nar14a] are non-trivial. As a consequence we give a multipointed version of Theorem 1.1 of [LW11], and a simple proof of the continuity of the isoperimetric profile function.
The tight span, or injective envelope, is an elegant and useful construction that takes a metric space and returns the smallest hyperconvex space into which it can be embedded. The concept has stimulated a large body of theory and has applications to metric classification and data visualisation. Here we introduce a generalisation of metrics, called diversities, and demonstrate that the rich theory associated to metric tight spans and hyperconvexity extends to a seemingly richer theory of diversity tight spans and hyperconvexity.
We study the high-dimensional limit of (projective) Stiefel and Grassmann manifolds as metric measure spaces in Gromov s topology. The limits are either the infinite-dimensional Gaussian space or its quotient by an mm-isomorphic group action, which are drastically different from the manifolds. As a corollary, we obtain some asymptotic estimates of the observable diameter of (projective) Stiefel and Grassmann manifolds.
Barker and Larman asked the following. Let $K  \\subset {\\Bbb{R}}^d$ be a convex body, whose interior contains a given convex body $K \\subset {\\Bbb{R}}^d$, and let, for all supporting hyperplanes $H$ of $K$, the $(d-1)$-volumes of the intersections $K  \\cap H$ be given. Is $K $ then uniquely determined? Yaskin and Zhang asked the analogous question when, for all supporting hyperplanes $H$ of $K$, the $d$-volumes of the \"caps\" cut off from $K $ by $H$ are given. We give local positive answers to both of these questions, for small $C^2$-perturbations of $K$, provided the boundary of $K$ is $C^2_+$. In both cases, $(d-1)$-volumes or $d$-volumes can be replaced by $k$-dimensional quermassintegrals for $1 \\le k \\le d-1$ or for $1 \\le k \\le d$, respectively. Moreover, in the first case we can admit, rather than hyperplane sections, sections by $l$-dimensional affine planes, where $1 \\le k \\le l \\le d-1$. In fact, here not all $l$-dimensional affine subspaces are needed, but only a small subset of them (actually, a $(d-1)$-manifold), for unique local determination of $K $.
Let $(X, d)$ be a compact metric space and let $\\mathcal{M}(X)$ denote the space of all finite signed Borel measures on $X$. Define $I \\colon \\mathcal{M}(X) \\to \\R$ by \\[ I(\\mu) = \\int_X \\int_X d(x,y) d\\mu(x) d\\mu(y), \\] and set $M(X) = \\sup I(\\mu)$, where $\\mu$ ranges over the collection of signed measures in $\\mathcal{M}(X)$ of total mass 1. This paper, with an earlier and a subsequent paper [Peter Nickolas and Reinhard Wolf, Distance geometry in quasihypermetric spaces. I and III], investigates the geometric constant $M(X)$ and its relationship to the metric properties of $X$ and the functional-analytic properties of a certain subspace of $\\mathcal{M}(X)$ when equipped with a natural semi-inner product. Using the work of the earlier paper, this paper explores measures which attain the supremum defining $M(X)$, sequences of measures which approximate the supremum when the supremum is not attained and conditions implying or equivalent to the finiteness of $M(X)$.
This is the sixth in a series of papers giving a proof of the Kepler conjecture, which asserts that the density of a packing of congruent spheres in three dimensions is never greater than $\\pi/\\sqrt{18}\\approx 0.74048...$. This is the oldest problem in discrete geometry and is an important part of Hilbert s 18th problem. An example of a packing achieving this density is the face-centered cubic packing. This paper completes part of the fourth step of the program outlined in math.MG/9811073: A proof that if some standard region has more than four sides, then the star scores less than $8 \\pt$.
We consider a `contracting boundary  of a proper geodesic metric space consisting of equivalence classes of geodesic rays that behave like geodesics in a hyperbolic space. We topologize this set via the Gromov product, in analogy to the topology of the boundary of a hyperbolic space. We show that when the space is not hyperbolic, quasi-isometries do not necessarily give homeomorphisms of this boundary. Continuity can fail even when the spaces are required to be CAT(0). We show this by constructing an explicit example.
It was shown by Nachbin in 1950 that an $n$-dimensional normed space $X$ is injective or equivalently is an absolute 1-Lipschitz retract if and only if $X$ is linearly isometric to $l_\\infty^n$ (i.e., $\\mathbb{R}^n$ endowed with the $l_{\\infty}$-metric). We give an effective convex geometric characterization of injective convex polyhedra in $l_{\\infty}^n$. As an application, we prove that if the set of solutions to a linear system of inequalities with at most two variables per inequality is non-empty, then it is injective when endowed with the $l_{\\infty}$-metric.
An extension $(V,d)$ of a metric space $(S,\\mu)$ is a metric space with $S \\subseteq V$ and $d|_S = \\mu$, and is said to be tight if there is no other extension $(V,d )$ of $(S,\\mu)$ with $d  \\leq d$. Isbell and Dress independently found that every tight extension is isometrically embedded into a certain metrized polyhedral complex associated with $(S,\\mu)$, called the tight span. This paper develops an analogous theory for directed metrics, which are \"not necessarily symmetric\" distance functions satisfying the triangle inequality. We introduce a directed version of the tight span and show that it has such a universal embedding property for tight extensions. Also we newly introduce another natural class of extensions, called cyclically tight extensions, and show that (a fiber of) the tropical polytope, introduced by Develin and Sturmfels, has a universal embedding property for cyclically tight extensions. As an application, we prove the following directed version of tree metric theorem: directed metric $\\mu$ is a directed tree metric if and only if the tropical rank of $-\\mu$ is at most two. Also we describe how tight spans and tropical polytopes are applied to the study in multicommodity flows in directed networks.
On any convex domain in $\\mathbb{R}^n$ we can define the Hilbert metric. A projective transformation is an example of an isometry of the Hilbert metric. In this thesis we will prove that the group of projective transformations on a convex domain has at most index 2 in the group of isometries of the convex domain with its Hilbert metric. Furthermore we will give criteria for which the set of projective transformations between two convex domains is equal to the set of isometries of the Hilbert metric of these convex domains. Lastly we will show that $2$-dimensional convex domains with their corresponding Hilbert metrics are isometric if and only if they are projectively equivalent.
After classifying 3-dimensional hyperbolic Coxeter pyramids by means of elementary plane geometry, we calculate growth functions of corresponding Coxeter groups by using Steinberg formula and conclude that growth rates of them are always Perron numbers. We also calculate hyperbolic volumes of them and compare volumes with their growth rates. Finally we consider a geometric ordering of Coxeter pyramids comparable with their growth rates.
A convex polyhedron, that is, a compact convex subset of $\\mathbb{R}^3$ which is the intersection of finitely many closed half-spaces, can be rectified by taking the convex hull of the midpoints of the edges of the polyhedron. We derive expressions for the side lengths and areas of rectifications of regular polygons in plane, and use these results to compute surface areas and volumes of various convex polyhedra. We introduce rectification sequences and show that there are exactly two disjoint pure rectification sequences generated by the platonic solids.
Usando la noci\\ on de C-ortocentro se extienden, a planos de Minkowski en general, nociones de la geometr\\ ia cl\\ asica relacionadas con un tri\\ angulo, como por ejemplo: puntos de Euler, tri\\ angulo de Euler, puntos de Poncelet. Se muestran propiedades de estas nociones y sus relaciones con la circunferencia de Feuerbach. Se estudian sistemas C-ortoc\\ entricos formados por puntos presentes en dichas nociones y se establecen relaciones con la ortogonalidad is\\ osceles y cordal. Adem\\ as, se prueba que la imagen homot\\ etica de un sistema C-ortoc\\ entrico es un sistema C-ortoc\\ entrico. -- Using the notion of C-orthocenter, notions of the classic euclidean geometry related with a triangle, as for example: Euler points; Euler s triangle; and Poncelet s points, are extended to Minkowski planes in general. Properties of these notions and their relations with the Feuerbach s circle, are shown. C-orthocentric systems formed by points in the above notions are studied and relations with the isosceles and chordal orthogonality, are established. In addition, there is proved that the homothetic image of a C-orthocentric system is a C-orthocentric system.
Since Gruenbaum and Shephard s investigation of self-intersection-free polyhedra with positive genus and vertex-transitive symmetry in 1984 the question of complete classification of such objects in Euclidean 3-space has been open. Due to a recent article by Gevay, Schulte, and Wills, we now know that the genus range g>=2 can only admit a finite number of vertex-transitive polyhedra, all with rotational Platonic symmetry. In this article, we show that the symmetry group must also act simply transitively on the vertices. Furthermore, the case of rotational tetrahedral symmetry is settled completely - the unique example is already known.
The skewer of a pair of skew lines in space is their common perpendicular. To configuration theorems of plane projective geometry involving points and lines (such as Pappus or Desargues) there correspond configuration theorems in space: points and lines in the plane are replaced by lines is space, the incidence between a line and a point translates as the intersection of two lines at right angle, and the operations of connecting two points by a line or by intersecting two lines at a point translate as taking the skewer of two lines. These configuration theorems hold in elliptic, Euclidean, and hyperbolic geometries. This correspondence principle extends to plane configuration theorems involving polarity. For example, the theorem that the three altitudes of a triangle are concurrent corresponds to the Petersen-Morley theorem that the common normals of the opposite sides of a space right-angled hexagon have a common normal. We define analogs of plane circles (they are 2-parameter families of lines in space) and extend the correspondence principle to plane theorems involving circles. We also discuss the skewer versions of the Sylvester problem: given a finite collection of pairwise skew lines such that the skewer of any pair intersects at least one other line at right angle, do all the line have to share a skewer? The answer is positive in the elliptic and Euclidean geometries, but negative in the hyperbolic one.
The covariogram $g_{K}$ of a convex body $K$ in $\\mathbb{R}^n$ is the function which associates to each $x\\in\\mathbb{R}^n$ the volume of the intersection of $K$ with $K+x$. Determining $K$ from the knowledge of $g_K$ is known as the Covariogram Problem. It is equivalent to determining the characteristic function $1_K$ of $K$ from the modulus of its Fourier transform $\\hat{1_K}$ in $\\mathbb{R}^n$, a particular instance of the Phase Retrieval Problem. We connect the Covariogram Problem to two aspects of the Fourier transform $\\hat{1_K}$ seen as a function in $\\mathbb{C}^n$. The first connection is with the problem of determining $K$ from the knowledge of the zero set of $\\hat{1_K}$ in $\\mathbb{C}^n$. To attack this problem T. Kobayashi studied the asymptotic behavior at infinity of this zero set. We obtain this asymptotic behavior assuming less regularity on $K$ and we use this result as an essential ingredient for proving that when $K$ is sufficiently smooth and in any dimension $n$, $K$ is determined by $g_K$ in the class of sufficiently smooth bodies. The second connection is with the irreducibility of the entire function $\\hat{1_K}$. This connection also shows a link between the Covariogram Problem and the Pompeiu Problem in integral geometry.
A convex body $R$ in $\\mathbb R^d$ is called reduced if the minimal width $\\Delta(R )$ of each convex body $R \\subset R$ different from $R$ is strictly smaller than the minimal width $\\Delta(R)$ of $R$. In this article we construct a reduced polytope in $\\mathbb R^3$, i.e. we answer the following question posed by Lassak: do there exist reduced polytopes in $\\mathbb R^d$, $d\\geqslant3$? Also, we prove some properties of reduced polytopes in $\\mathbb R^3$.
Makeev conjectured that every constant-width body is inscribed in the dual difference body of a regular simplex. We prove that homologically, there are an odd number of such circumscribing bodies in dimension 3, and therefore geometrically there is at least one. We show that the homological answer is zero in higher dimensions, a result which is inconclusive for the geometric question. We also give a partial generalization involving affine circumscription of strictly convex bodies.
Fractal sets, by definition, are non-differentiable, however their dimension can be continuous, differentiable, and arithmetically manipulable as function of their construction parameters. A new arithmetic for fractal dimension of polyadic Cantor sets is introduced by means of properly defining operators for the addition, subtraction, multiplication, and division. The new operators have the usual properties of the corresponding operations with real numbers. The combination of an infinitesimal change of fractal dimension with these arithmetic operators allows the manipulation of fractal dimension with the tools of calculus.
In this paper, we derive uniqueness and stability results for surface tensors. Further, we develop two algorithms that reconstruct shape of $n$-dimensional convex bodies. One algorithm requires knowledge of a finite number of surface tensors, whereas the other algorithm is based on noisy measurements of a finite number of harmonic intrinsic volumes. The derived stability results ensure consistency of the two algorithms. Examples that illustrate the feasibility of the algorithms are presented.
In the present paper, we consider several valid notions of orientability of Alexandov spaces and prove that all such conditions are equivalent. Further, we give topological and geometric applications of the orientability. In particular, a Poincar\\ e-type duality theorem is proved. As a corollary to the duality theorem, we also prove that if a closed Alexandrov space admits a positive curvature bound in a synthetic sense, then its codimension one homology vanishes. Further, we obtain a filling radius inequality for closed orientable Alexandrov spaces.
Diversities have recently been developed as multiway metrics admitting clear and useful notions of hyperconvexity and tight span. In this note we consider the analytic properties of diversities, in particular the generalizations of uniform continuity, uniform convergence, Cauchy sequences and completeness to diversities. We develop conformities, a diversity analogue of uniform spaces, which abstract these concepts in the metric case. We show that much of the theory of uniform spaces admits a natural analogue in this new structure; for example, conformities can be defined either axiomatically or in terms of uniformly continuous pseudodiversities. Just as diversities can be restricted to metrics, conformities can be restricted to uniformities. We find that these two notions of restriction, which are functors in the appropriate categories, are related by a natural transformation.
We show that, for each $n\\ge 3$, there exists a smooth Riemannian metric $g$ on a punctured sphere $\\mathbb{S}^n\\setminus \\{x_0\\}$ for which the associated length metric extends to a length metric $d$ of $\\mathbb{S}^n$ with the following properties: the metric sphere $(\\mathbb{S}^n,d)$ is Ahlfors $n$-regular and linearly locally contractible but there is no quasiconformal homeomorphism between $(\\mathbb{S}^n,d)$ and the standard Euclidean sphere $\\mathbb{S}^n$.
We examine the dimensions of the intersection of a subset $E$ of an $m$-ary Cantor space $\\mathcal{C}^m$ with the image of a subset $F$ under a random isometry with respect to a natural metric. We obtain almost sure upper bounds for the Hausdorff and upper box-counting dimensions of the intersection, and a lower bound for the essential supremum of the Hausdorff dimension. The dimensions of the intersections are typically $\\max\\{\\dim E +\\dim F -\\dim \\mathcal{C}^m, 0\\}$, akin to other codimension theorems. The upper estimates come from the expected sizes of coverings, whilst the lower estimate is more intricate, using martingales to define a random measure on the intersection to facilitate a potential theoretic argument.
We present a new problem on configurations of points, which is a new version of a similar problem by Atiyah and Sutcliffe, except it is related to the Lie group $\\operatorname{Sp}(n)$, instead of the Lie group $\\operatorname{U}(n)$. Denote by $\\mathfrak{h}$ a Cartan algebra of $\\operatorname{Sp}(n)$, and $\\Delta$ the union of the zero sets of the roots of $\\operatorname{Sp}(n)$ tensored with $\\mathbb{R}^3$, each being a map from $\\mathfrak{h} \\otimes \\mathbb{R}^3 \\to \\mathbb{R}^3$. We wish to construct a map $(\\mathfrak{h} \\otimes \\mathbb{R}^3) \\backslash \\Delta \\to \\operatorname{Sp}(n)/T^n$ which is equivariant under the action of the Weyl group $W_n$ of $\\operatorname{Sp}(n)$ (the symplectic Berry-Robbins problem). Here, the target space is the flag manifold of $\\operatorname{Sp}(n)$, and $T^n$ is the diagonal $n$-torus. The existence of such a map was proved by Atiyah and Bielawski in a more general context. We present an explicit smooth candidate for such an equivariant map, which would be a genuine map provided a certain linear independence conjecture holds. We prove the linear independence conjecture for $n=2$.
We study the relationship between the sizes of sets $B,S$ in $\\mathbb{R}^n$ where $B$ contains the $k$-skeleton of an axes-parallel cube around each point in $S$, generalizing the results of Keleti, Nagy, and Shmerkin about such sets in the plane. We find sharp estimates for the possible packing and box-counting dimensions of $B$ and $S$. These estimates follow from related cardinality bounds for sets containing the discrete skeleta of cubes around a finite set of a given size. The Katona-Kruskal theorem from hypergraph theory plays an important role. We also find partial results for the Hausdorff dimension and settle an analogous question for the dual polytope of the cube, the orthoplex.
We give various applications of essential circles (introduced in an earlier paper by the authors) in a compact geodesic space X. Essential circles completely determine the homotopy critical spectrum of X, which we show is precisely 2/3 the covering spectrum of Sormani-Wei. We use finite collections of essential circles to define \"circle covers,\" which extend and contain as special cases the delta-covers of Sormani and Wei (equivalently the epsilon-covers of the authors); the constructions are metric adaptations of those utilized by Berestovskii-Plaut in the construction of entourage covers of uniform spaces. We show that, unlike delta- and epsilon-covers, circle covers are in a sense closed with respect to Gromov-Hausdorff convergence, and we prove a finiteness theorem concerning their deck groups that does not hold for covering maps in general. This allows us to completely understand the structure of Gromov-Hausdorff limits of delta-covers. Also, we use essential circles to strengthen a theorem of E. Cartan by finding a new (even for compact Riemannian manifolds) finite set of generators of the fundamental group of a semilocally simply connected compact geodesic space. We conjecture that there is always a generating set of this sort having minimal cardinality among all generating sets.
We characterize all possible relative positions between a hyperboloid of one sheet and a sphere through the roots of a characteristic polynomial associated to these quadrics. The classification is also suitable for a hyperboloid and a ellipsoid in some situations. As an application, this provides a method to detect contact between the two surfaces by a simple calculation in many real world applications.
An N-tiling of triangle ABC by triangle T (the \"tile\") is a way of writing ABC as a union of N copies of T overlapping only at their boundaries. We continue the work of two previous papers on classifying the possible triangle tilings. The results of all three papers together enable us to make some progress on two problems of Erdos about triangle tilings, one of which asks, \"for which N is there an N-tiling of some triangle by some tile?\". This paper takes up a case that was left unsolved in previous work, which is the following. Let the tile T have angles \\alpha, \\beta, and \\gamma, and suppose 3\\alpha + 2\\beta = \\pi, and \\alpha is not a rational multiple of \\pi. Suppose there is an N-tiling of ABC. Then we classify the triples (ABC), T, N) such that there is an N-tiling of ABC by T. Our solution is as follows: There is an N-tiling of ABC by T if and only if N is a square times a product of distinct primes of the form 8n plus or minus 1, or 2, and the \"tiling equation\" M^2 + N = 2K^2 is solvable in positive integers $ and K with M^2 < N and K divides M^2. In that case the tile can be taken to have sides a, b, and c where a=M and c=K and b=K-M^2/K, so all three sides will be integers. Combining this with the results of a previous paper, we obtain a no-tiling theorem: if N is squarefree and N > 6 and divisible by at least one prime congruent to 3 mod 4, then there are no N-tilings of any triangle by any tile, unless the tile has a 120 degree angle.
We show that a realization of a closed connected PL-manifold of dimension n-1 in Euclidean n-space (n>2) is the boundary of a convex polyhedron if and only if the interior of each (n-3)-face has a point, which has a neighborhood lying on the boundary of a convex n-dimensional body. This result is derived from a generalization of Van Heijenoort s theorem on locally convex manifolds to spherical spaces. We also give a brief analysis of how local convexity and topology of non-compact surfaces are related to global convexity in the hyperbolic space. Our convexity criterion for PL-manifolds imply an easy polynomial-time algorithm for checking convexity of a given closed compact PL-surface in Euclidean of spherical space of dimension n>2.
We show that every packing of congruent regular pentagons in the Euclidean plane has density at most $(5-\\sqrt5)/3$, which is about 0.92. More specifically, this article proves the pentagonal ice-ray conjecture of Henley (1986), and Kuperberg and Kuperberg (1990), which asserts that an optimal packing of congruent regular pentagons in the plane is a double lattice, formed by aligned vertical columns of upward pointing pentagons alternating with aligned vertical columns of downward pointing pentagons. The strategy is based on estimates of the areas of Delaunay triangles. Our strategy reduces the pentagonal ice-ray conjecture to area minimization problems that involve at most four Delaunay triangles. These minimization problems are solved by computer. The computer-assisted portions of the proof use techniques such as interval arithmetic, automatic differentiation, and a meet-in-the-middle algorithm.
A parallelohedron is called reducible, if it can be represented as a direct product of two parallelohedra of lower dimension. In his Ph.D. thesis (2005) the first author proved a criterion of reducibility of a parallelohedron in terms of the Venkov graph. In December 2011 the second author presented a slightly revised version of the original proof at the seminar \"Discrete Geometry and Geometry of Numbers\" (Moscow State University). The present paper follows that talk.
Let $\\mathcal{S}$ be a surface of revolution embedded in the Heisenberg group $\\mathcal{H}$. A revolution ring $R_{a,b}(\\mathcal{S})$, $0<a<b$, is a domain in $\\mathcal{H}$ bounded by two dilated images of $\\mathcal{S}$, with dilation factors $a$ and $b$, respectively. We prove that if $\\mathcal{S}$ is subject to certain geometric conditions, then the modulus of the family $\\Gamma$ of horizontal boundary connecting curves inside $R_{a,b}(\\mathcal{S})$ is $$ {\\rm Mod}(\\Gamma)=\\pi^2(\\log(b/a))^{-3}. $$ Our result applies for many interesting surfaces, e.g., the Kor\\ anyi metric sphere, the Carnot-Carath\\ eodory metric sphere and the bubble set.
A comparison problem for volumes of convex bodies asks whether inequalities $f_K(\\xi)\\le f_L(\\xi)$ for all $\\xi\\in S^{n-1}$ imply that $\\vol_n(K)\\le \\vol_n(L),$ where $K,L$ are convex bodies in $\\R^n,$ and $f_K$ is a certain geometric characteristic of $K.$ By linear stability in comparison problems we mean that there exists a constant $c$ such that for every $\\e>0$, the inequalities $f_K(\\xi)\\le f_L(\\xi)+\\e$ for all $\\xi\\in S^{n-1}$ imply that $(\\vol_n(K))^{\\frac{n-1}n}\\le (\\vol_n(L))^{\\frac{n-1}n}+c\\e.$ We prove such results in the settings of the Busemann-Petty and Shephard problems and their generalizations. We consider the section function $f_K(\\xi)=S_K(\\xi)=\\vol_{n-1}(K\\cap \\xi^\\bot)$ and the projection function $f_K(\\xi)=P_K(\\xi)=\\vol_{n-1}(K|\\xi^\\bot),$ where $\\xi^\\perp$ is the central hyperplane perpendicular to $\\xi,$ and $K|\\xi^\\bot$ is the orthogonal projection of $K$ to $\\xi^\\bot.$ In these two cases we prove linear stability under additional conditions that $K$ is an intersection body or $L$ is a projection body, respectively. Then we consider other functions $f_K,$ which allows to remove the additional conditions on the bodies in higher dimensions.
We introduce combinatorial types of arrangements of convex bodies, extending order types of point sets to arrangements of convex bodies, and study their realization spaces. Our main results witness a trade-off between the combinatorial complexity of the bodies and the topological complexity of their realization space. First, we show that every combinatorial type is realizable and its realization space is contractible under mild assumptions. Second, we prove a universality theorem that says the restriction of the realization space to arrangements polygons with a bounded number of vertices can have the homotopy type of any primary semialgebraic set.
Let $n\\geq C$ for a large universal constant $C>0$, and let $B$ be a convex body in $R^n$ such that for any $(x_1,x_2,\\dots,x_n)\\in B$, any choice of signs $\\varepsilon_1,\\varepsilon_2,\\dots,\\varepsilon_n\\in\\{-1,1\\}$ and for any permutation $\\sigma$ on $n$ elements we have $(\\varepsilon_1x_{\\sigma(1)},\\varepsilon_2x_{\\sigma(2)},\\dots,\\varepsilon_nx_{\\sigma(n)})\\in B$. We show that if $B$ is not a cube then $B$ can be illuminated by strictly less than $2^n$ sources of light. This confirms the Hadwiger--Gohberg--Markus illumination conjecture for unit balls of $1$-symmetric norms in $R^n$ for all sufficiently large $n$.
The problem of classifying the convex pentagons that admit tilings of the plane is a long-standing unsolved problem. Previous to this article, there were 14 known distinct kinds of convex pentagons that admit tilings of the plane. Five of these types admit tile-transitive tilings (i.e. there is a single transitivity class with respect to the symmetry group of the tiling). The remaining 9 types do not admit tile-transitive tilings, but do admit either 2-block transitive tilings or 3-block transitive tilings; these are tilings comprised of clusters of 2 or 3 pentagons such that these clusters form tile-2-transitive or tile-3-transitive tilings. In this article, we present some combinatorial results concerning pentagons that admit $i$-block transitive tilings for $i \\in \\mathbb{N}$. These results form the basis for an automated approach to finding all pentagons that admit $i$-block transitive tilings for each $i \\in \\mathbb{N}$. We will present the methods of this algorithm and the results of the computer searches so far, which includes a complete classification of all pentagons admitting 1-, 2-, and 3-block transitive tilings, among which is a new 15th type of convex pentagon that admits a tile-3-transitive tiling.
Suppose we are given an almost isometry $\\phi:E\\to \\mathbb R^D$ where $E$ is a finite subset of $\\mathbb R^D$. Is it possible to decide if $\\phi$ can be extended to an almost isometry to the whole of $\\mathbb R^D$? In this paper, we study this interesting question. It turns out that this question is also basic to problems of interpolation and matching in theoretical computer science. We study these connections as well.
We give a necessary and sufficient condition for gluings of hyperconvex metric spaces along weakly externally hyperconvex subsets in order that the resulting space be hyperconvex. This leads to a full characterization of gluings of two isometric copies of the same hyperconvex space. Furthermore, we investigate the case of gluings of finite dimensional hyperconvex linear spaces along linear subspaces. For this purpose, we characterize the convex polyhedra in $l_\\infty^n$ which are weakly externally hyperconvex.
We define a volume function on configurations of four points in the 3-sphere which is invariant under the action of PU(2,1), the automorphism group of the CR structure defined on the sphere by its embedding in complex 2-space. We show that the volume function, constructed using appropriate combinations of the dilogathm function of Bloch-Wigner, satisfies a five term relation in a more general context which includes at the same time CR and real hyperbolic geometry.
The Hales program to prove the Kepler conjecture on sphere packings consists of five steps, which if completed, will jointly comprise a proof of the conjecture. We carry out step five of the program [outlined in math.MG/9811073], a proof that the local density of a certain combinatorial arrangement, the pentahedral prism, is less than that of the face-centered cubic lattice packing. We prove various relations on the local density using computer-based interval arithmetic methods. Together, these relations imply the local density bound.
In this paper, we combine separate works on (a) the transfer of infinitesimal rigidity results from an Euclidean space to the next higher dimension by coning, (b) the further transfer of these results to spherical space via associated rigidity matrices, and (c) the prediction of finite motions from symmetric infinitesimal motions at regular points of the symmetry-derived orbit rigidity matrix. Each of these techniques is reworked and simplified to apply across several metrics, including the Minkowskian metric $\\M^{d}$ and the hyperbolic metric $\\H^{d}$. This leads to a set of new results transferring infinitesimal and finite motions associated with corresponding symmetric frameworks among $\\E^{d}$, cones in $E^{d+1}$, $\\SS^{d}$, $\\M^{d}$, and $\\H^{d}$. We also consider the further extensions associated with the other Cayley-Klein geometries overlaid on the shared underlying projective geometry.
In the sub-Riemannian Heisenberg group equipped with its Carnot-Caratheodory metric and with a Haar measure, we consider isodiametric sets, i.e. sets maximizing the measure among all sets with a given diameter. In particular, given an isodiametric set, and up to negligible sets, we prove that its boundary is given by the graphs of two locally Lipschitz functions. Moreover, in the restricted class of rotationally invariant sets, we give a quite complete characterization of any compact (rotationally invariant) isodiametric set. More specifically, its Steiner symmetrization with respect to the Cn-plane is shown to coincide with the Euclidean convex hull of a CC-ball. At the same time, we also prove quite unexpected non-uniqueness results.
To any metric spaces there is an associated metric profile. The rectifiability of the metric profile gives a good notion of curvature of a sub-Riemannian space. We shall say that a curvature class is the rectifiability class of the metric profile. We classify then the curvatures by looking to homogeneous metric spaces. The classification problem is solved for contact 3 manifolds, where we rediscover a 3 dimensional family of homogeneous contact manifolds, with a distinguished 2 dimensional family of contact manifolds which don t have a natural group structure.
The goal of this paper to determine the optimal horoball packing arrangements and their densities for all four fully asymptotic Coxeter tilings (Coxeter honeycombs) in hyperbolic 3-space $\\mathbb{H}^3$. Centers of horoballs are required to lie at vertices of the regular polyhedral cells constituting the tiling. We allow horoballs of different types at the various vertices. Our results are derived through a generalization of the projective methodology for hyperbolic spaces. The main result states that the known B\\\"or\\\"oczky--Florian density upper bound for \"congruent horoball\" packings of $\\mathbb{H}^3$ remains valid for the class of fully asymptotic Coxeter tilings, even if packing conditions are relaxed by allowing for horoballs of different types under prescribed symmetry groups. The consequences of this remarkable result are discussed for various Coxeter tilings.
Let z_0,...,z_n be the (n-1)-dimensional volumes of facets of an n-simplex. Then we have the simplex inequalities: z_p < z_0+...+\\check{z}_p+...+z_n (0 =< p =< n), generalizations of triangle inequalities. Conversely, suppose that numbers z_0,...,z_n > 0 satisfy these inequalities. Does there exist an n-simplex the volumes of whose facets are them? Kakeya solved this problem affirmatively in the case n = 3 and conjectured that the assertion is affirmative also for all n >= 4. We prove that his conjecture is affirmative. To do this, we define three kinds of spaces of loops associated to n-simplices and study relations among them systematically. In particular, we show that the space of edge loops corresponds to the space of facet loops bijectively under a certain condition of positivity.
We study the existence of solutions to general measure-minimization problems over topological classes that are stable under localized Lipschitz homotopy, including the standard Plateau problem without the need for restrictive assumptions such as orientability or even rectifiability of surfaces. In case of problems over an open and bounded domain we establish the existence of a \"minimal candidate\", obtained as the limit for the local Hausdorff convergence of a minimizing sequence for which the measure is lower-semicontinuous. Although we do not give a way to control the topological constraint when taking limit yet -- except for some examples of topological classes preserving local separation or for periodic two-dimensional sets -- we prove that this candidate is an Almgren-minimal set. Thus, using regularity results such as Jean Taylor s theorem, this could be a way to find solutions to the above minimization problems under a generic setup in arbitrary dimension and codimension.
We prove that a self-homeomorphism of the Grushin plane is quasisymmetric if and only if it is metrically quasiconformal and if and only if it is geometrically quasiconformal. As the main step in our argument, we show that a quasisymmetric parametrization of the Grushin plane by the Euclidean plane must also be geometrically quasiconformal. We also discuss some aspects of the Euclidean theory of quasiconformal maps, such as absolute continuity on almost every compact curve, not satisfied in the Grushin case.
We defined several functionals on the set of all triangulations of the finite system of points in d-space achieving global minimum on the Delaunay triangulation (DT). We consider a so called \"parabolic\" functional and prove it attains its minimum on DT in all dimensions. As the second example we treat \"mean radius\" functional (mean of circumcircle radii of triangles) for planar triangulations. As the third example we treat a so called \"harmonic\" functional. For a triangle this functional equals the sum of squares of sides over area. Finally, we consider a discrete analog of the Dirichlet functional. DT is optimal for these functionals only in dimension two.
Any discrete action of a group on a locally compact Hadamard space extends to a topological action on the virtual boundary. Croke and Kleiner introduced a class of so-called admissible actions and associated geometric data which determine the topological conjugacy class of the boundary action. They also posed the question whether their results hold for a wider class of actions. We show that, for the natural generalization, their question has to be answered in the negative: There is an admissible action of higher rank on a pair of Hadamard spaces with equivalent geometric data and an equivariant quasi-isometry which does not extend continuously to the virtual boundaries.
In this paper, we introduce a class of fractals named homogeneous sets based on some measure versions of homogeneity, uniform perfectness and doubling. This fractal class includes all Ahlfors-David regular sets, but most of them are irregular in the sense that they may have different Hausdorff dimensions and packing dimensions. Using Moran sets as main tool, we study the dimensions, bilipschitz embedding and quasi-Lipschitz equivalence of homogeneous fractals.
Let $X$ be a nonempty set and $\\mathcal{F}(X)$ be the set of nonempty finite subsets of $X$. The paper deals with the extended metrics $\\tau:\\mathcal{F}(X)\\to\\mathbb{R}$ recently introduced by Peter Balk. Balk s metrics and their restriction to the family of sets $A$ with $|A|\\leqslant n$ make possible to consider \"distance functions\" with $n$ variables and related them quantities. In particular, we study such type generalized diameters $\\diam_{\\tau^n}$ and find conditions under which $B\\mapsto\\diam_{\\tau^n}B$ is a Balk s metric. We prove the necessary and sufficient conditions under which the restriction $\\tau$ to the set of $A\\in\\mathcal{F}(X)$ with $|A|\\leqslant 3$ is a symmetric $G$-metric. An infinitesimal analog for extended by Balk metrics is constructed.
This article is devoted to the study of classical and new results concerning equidistant sets, both from the topological and metric point of view. We start with a review of the most interesting known facts about these sets in the euclidean space and then we prove that equidistant sets vary continuously with their focal sets. In the second part we propose a viewpoint in which equidistant sets can be thought of as natural generalization for conics. Along these lines, we show that many geometric features of classical conics can be retrieved in more general equidistant sets. In the Appendix we prove a shadowing property of equidistant sets and provide sharp estimates. This result should be of interest for computer simulations.
In this note we examine the volume of the convex hull of two congruent copies of a convex body in Euclidean $n$-space, under some subsets of the isometry group of the space. We prove inequalities for this volume if the two bodies are translates, or reflected copies of each other about a common point or a hyperplane containing it. In particular, we give a proof of a related conjecture of Rogers and Shephard.
In this paper we report on massive computer experiments aimed at finding spherical point configurations that minimize potential energy. We present experimental evidence for two new universal optima (consisting of 40 points in 10 dimensions and 64 points in 14 dimensions), as well as evidence that there are no others with at most 64 points. We also describe several other new polytopes, and we present new geometrical descriptions of some of the known universal optima.
We present an icosahedral quasicrystal as a modification of the icosagrid, a multigrid with 10 plane sets that are arranged with icosahedral symmetry. We use the Fibonacci chain to space the planes, thereby obtaining a quasicrystal with icosahedral symmetry. It has a surprising correlation to the Elser-Sloane quasicrystal, a 4D cut-and-project of the E8 lattice. We call this quasicrystal the Fibonacci modified icosagrid quasicrystal. We found that this structure totally embeds another quasicrystal that is a compound of 20 3D slices of the Elser-Sloane quasicrystal. The slices, which contain only regular tetrahedra, are put together by a certain golden ratio based rotation. Interesting 20-tetrahedron clusters arranged with the golden ratio based rotation appear repetitively in the structure. They are arranged with icosahedral symmetry. It turns out that this rotation is the dihedral angle of the 600-cell (the super-cell of the Elser-Sloane quasicrystal) and the angle between the tetrahedral facets in the E8 polytope known as the Gosset polytope.
Computing modular coincidences can show whether a given substitution system, which is supported on a point lattice in R^d, consists of model sets or not. We prove the computatibility of this problem and determine an upper bound for the number of iterations needed. The main tool is a simple algorithm for computing modular coincidences, which is essentially a generalization of Dekking coincidence to more than one dimension, and the proof of equivalence of this generalized Dekking coincidence and modular coincidence. As a consequence, we also obtain some conditions for the existence of modular coincidences. In a separate section, and throughout the article, a number of examples are given.
This paper is devoted to prove that if an Alexandrov space of curvature not less than $\\kappa$ with a codimension one extremal subset which admits an isometric involution with respect to the induced length metric, then the metric space obtained by gluing the extremal subset along the isometry is an Alexandrov space of curvature not less than $\\kappa$. This is a generalization of Perelman s doubling and Petrunin s gluing theorems.
We call a complement of a union of at least three disjoint (round) open balls in the unit sphere S^n a Schottky set. We prove that every quasisymmetric homeomorphism of a Schottky set of spherical measure zero to another Schottky set is the restriction of a Mobius transformation on S^n. In the other direction we show that every Schottky set in S^2 of positive measure admits non-trivial quasisymmetric maps to other Schottky sets. These results are applied to establish rigidity statements for convex subsets of hyperbolic space that have totally geodesic boundaries.
We consider the geometry of four spatial displacements, arranged in cyclic order, such that the relative motion between neighbouring displacements is a pure rotation. We compute the locus of points whose homologous images lie on a circle, the locus of oriented planes whose homologous images are tangent to a cone of revolution, and the locus of oriented lines whose homologous images form a skew quadrilateral on a hyperboloid of revolution.
We prove two new approximation results of $H$-perimeter minimizing boundaries by means of intrinsic Lipschitz functions in the setting of the Heisenberg group $\\mathbb{H}^n$ with $n\\ge2$. The first one is an improvement of a result of Monti and is the natural reformulation in $\\mathbb{H}^n$ of the classical Lipschitz approximation in $\\mathbb{R}^n$. The second one is an adaptation of the approximation via maximal function developed by De Lellis and Spadaro.
We define and study an extended hyperbolic space which contains the hyperbolic space and de Sitter space as subspaces and which is obtained as an analytic continuation of the hyperbolic space. The construction of the extended space gives rise to a complex valued geometry consistent with both the hyperbolic and de Sitter space. Such a construction shed a light and inspires a new insight for the study of the hyperbolic geometry and Lorentzian geometry. We discuss the advantages of this new geometric model as well as some of its applications.
An N -tiling of triangle ABC by triangle T is a way of writing ABC as a union of N triangles congruent to T, overlapping only at their boundaries. The triangle T is the \"tile \". The tile may or may not be similar to ABC . This paper is the first of several papers, which together seek a complete characterization of the triples (ABC,N,T) such that ABC can be N -tiled by T . In this paper, we consider the case in which the tile is similar to ABC, the case in which the tile is a right triangle, and the case when ABC is equilateral. We use (only) techniques from linear algebra and elementary field theory, as well as elementary geometry and trigonometry. Our results (in this paper) are as follows: When the tile is similar to ABC, we always have \"quadratic tilings \" when N is a square. If the tile is similar to ABC and is not a right triangle, then N is a square. If N is a sum of two squares, N = e^2 + f^2, then a right triangle with legs e and f can be N -tiled by a tile similar to ABC ; these tilings are called \"biquadratic\". If the tile and ABC are 30-60-90 triangles, then N can also be three times a square. If T is similar to ABC, these are all the possible triples (ABC, T, N) . If the tile is a right triangle, of course it can tile a certain isosceles triangle when N is twice a square, and in some cases when N is six times a square. Equilateral triangles can be 3-tiled and 6-tiled and hence they can also be 3n^2 and 6n^2 tiled for any n . We also discovered a family of tilings when N is 3 times a square, which we call the \"hexagonal tilings.\" These tilings exhaust all the possible triples (ABC, T, N) in case T is a right triangle or is similar to ABC . Other cases are treated in subsequent papers.
The vertex corona of a vertex of some tiling is the vertex together with the adjacent tiles. A tiling where all vertex coronae are congruent is called monocoronal. We provide a classification of monocoronal tilings in the Euclidean plane and derive a list of all possible symmetry groups of monocoronal tilings. In particular, any monocoronal tiling with respect to direct congruence is crystallographic, whereas any monocoronal tiling with respect to congruence (reflections allowed) is either crystallographic or it has a one-dimensional translation group. Furthermore, bounds on the number of the dimensions of the translation group of monocoronal tilings in higher dimensional Euclidean space are obtained.
In the paper we investigate the continuity properties of the mapping $\\Phi$ which sends any non-empty compact connected hv-convex planar set $K$ to the associated generalized conic function $f_K$. The function $f_K$ measures the average taxicab distance of the points in the plane from the focal set $K$ by integration. The main area of the applications is the geometric tomography because $f_K$ involves the coordinate X-rays  information as second order partial derivatives \\cite{NV3}. We prove that the Hausdorff-convergence implies the convergence of the conic functions with respect to both the supremum-norm and the $L_1$-norm provided that we restrict the domain to the collection of non-empty compact connected hv-convex planar sets contained in a fixed box (reference set) with parallel sides to the coordinate axes. We also have that $\\Phi^{-1}$ is upper semi-continuous as a set-valued mapping. The upper semi-continuity establishes an approximating process in the sense that if $f_L$ is close to $f_K$ then $L$ must be close to an element $K $ such that $f_{K}=f_{K }$. Therefore $K$ and $K $ have the same coordinate X-rays almost everywhere. Lower semi-continuity is usually related to the existence of continuous selections. If a set-valued mapping is both upper and lower semi-continuous at a point of its domain it is called continuous. The last section of the paper is devoted to the case of non-empty compact convex planar sets. We show that the class of convex bodies that are determined by their coordinate X-rays coincides with the family of convex bodies $K$ for which $f_K$ is a point of lower semi-continuity for $\\Phi^{-1}$.
We consider an Orlicz space based cohomology for metric (measured) spaces with bounded geometry. We prove the quasi-isometry invariance for a general Young function. In the hyperbolic case, we prove that the degree one cohomology can be identified with an Orlicz-Besov function space on the boundary at infinity. We give some applications to the large scale geometry of homogeneous spaces with negative curvature (Heintze groups). As our main result, we prove that if the Heintze group is not of Carnot type, any self quasi-isometry fixes a distinguished point on the boundary and preserves a certain foliation on the complement of that point.
The Falconer conjecture asserts that if E is a planar set with Hausdorff dimension strictly greater than 1, then its Euclidean distance set has positive one-dimensional Lebesgue measure. We discuss the analogous question with the Euclidean distance replaced by non-Euclidean norms in which the unit ball is a polygon with 2K sides. We prove that for any such norm there is a set of Hausdorff dimension K/(K-1) whose distance set has Lebesgue measure 0.
In this paper we prove a theorem that provides an upper bound for the density of packings of congruent copies of a given convex body in $\\mathbb{R}^n$; this theorem is a generalization of the linear programming bound for sphere packings. We illustrate its use by computing an upper bound for the maximum density of packings of regular pentagons in the plane. Our computational approach is numerical and uses a combination of semidefinite programming, sums of squares, and the harmonic analysis of the Euclidean motion group. We show how, with some extra work, the bounds so obtained can be made rigorous.
One constructs new operations of pull-back and push-forward on valuations on manifolds with respect to submersions and immersions. A general Radon type transform on valuations is introduced using these operations and the product on valuations. It is shown that the classical Radon transform on smooth functions, and the well known Radon transform on constructible functions with respect to the Euler characteristic are special cases of this new Radon transform. An inversion formula for the Radon transform on valuations has been proven in a specific case of real projective spaces. Relations of these operations to yet another classical type of integral geometry, Crofton and kinematic formulas, are indicated.
Given two subsets of R^d, when does there exist a projective transformation that maps them to two sets with a common centroid? When is this transformation unique modulo affine transformations? We study these questions for 0- and d-dimensional sets, obtaining several existence and uniqueness results as well as examples of non-existence or non-uniqueness. If both sets have dimension 0, then the problem is related to the analytic center of a polytope and to polarity with respect to an algebraic set. If one set is a single point, and the other is a convex body, then it is equivalent by polar duality to the existence and uniqueness of the Santal\\ o point. For a finite point set versus a ball, it generalizes the M\\\"obius centering of edge-circumscribed convex polytopes and is related to the conformal barycenter of Douady-Earle. If both sets are $d$-dimensional, then we are led to define the Santal\\ o point of a pair of convex bodies. We prove that the Santal\\ o point of a pair exists and is unique, if one of the bodies is contained within the other and has Hilbert diameter less than a dimension-depending constant. The bound is sharp and is obtained by a box inside a cross-polytope.
The groups of similarity and coincidence rotations of an arbitrary lattice L in d-dimensional Euclidean space are considered. It is shown that the group of similarity rotations contains the coincidence rotations as a normal subgroup. Furthermore, the structure of the corresponding factor group is examined. If the dimension d is a prime number, this factor group is an elementary Abelian d-group. Moreover, if L is a rational lattice, the factor group is trivial (d odd) or an elementary Abelian 2-group (d even).
We obtain a new extension of Rogers-Shephard inequality providing an upper bound for the volume of the sum of two convex bodies $K$ and $L$. We also give lower bounds for the volume of the $k$-th limiting convolution body of two convex bodies $K$ and $L$. Special attention is paid to the $(n-1)$-th limiting convolution body, for which a sharp inequality, which is equality only when $K=-L$ is a simplex, is given. Since the $n$-th limiting convolution body of $K$ and $-K$ is the polar projection body of $K$, these inequalities can be viewed as an extension of Zhang s inequality.
It is known that there exists a function interpolating a given data set such that the graph of the function is the attractor of an iterated function system which is called fractal interpolation function. We generalize the notion of fractal interpolation function to the graph-directed case and prove that for a finite number of data sets there exist interpolation functions each of which interpolates corresponding data set in $\\mathbb{R}^2$ such that the graphs of the interpolation functions are attractors of a graph-directed iterated function system.
It is shown that for every $K>0$ and $\\e\\in (0,1/2)$ there exist $N=N(K)\\in \\N$ and $D=D(K,\\e)\\in (1,\\infty)$ with the following properties. For every separable metric space $(X,d)$ with doubling constant at most $K$, the metric space $(X,d^{1-\\e})$ admits a bi-Lipschitz embedding into $\\R^N$ with distortion at most $D$. The classical Assouad embedding theorem makes the same assertion, but with $N\\to \\infty$ as $\\e\\to 0$.
This article is the second part in the series of articles where we are developing theory of valuations on manifolds. Roughly speaking valuations could be thought as finitely additive measures on a class of nice subsets of a manifold which satisfy some additional assumptions. The goal of this article is to introduce a notion of a smooth valuation on an arbitrary smooth manifold and establish some of the basic properties of it.
The distortion of distances between points under maps is studied. We first prove a Schwarz-type lemma for quasiregular maps of the unit disk involving the visual angle metric. Then we investigate conversely the quasiconformality of a bilipschitz map with respect to the visual angle metric on convex domains. For the unit ball or half space, we prove that a bilipschitz map with respect to the visual angle metric is also bilipschitz with respect to the hyperbolic metric. We also obtain various inequalities relating the visual angle metric to other metrics such as the distance ratio metric and the quasihyperbolic metric.
Let F(X) be the set of finite nonempty subsets of a set X. We have found the necessary and sufficient conditions under which for a given function f:F(X)-->R there is an ultrametric on X such that f(A)=diam A for every A\\in F(X). For finite nondegenerate ultrametric spaces (X,d) it is shown that X together with the subset of diametrical pairs of points of X forms a complete k-partite graph, k>= 2, and, conversely, every finite complete k-partite graph with k>=2 can be obtained by this way. We use this result to characterize the finite ultrametric spaces (X,d) having the minimal card{(x,y):d(x,y)=diam X, x,y \\in X} for given card X.
It has been a challenge to make seven straight round cylinders mutually touch before our now 10-year old discovery [Phys. Rev. Lett. 93, 015505 (2004)] of configurations of seven mutually touching infinitely long round cylinders (then coined 7-knots). Because of the current interest in string-like objects and entanglement which occur in many fields of Physics it is useful to find a simple way to treat ensembles of straight infinite cylinders. Here we propose a treatment with a chirality matrix. By comparing 7-knot with variable radii with the one where all cylinders are of equal radii (here 7*-knot, which for the first time appeared in [phys. stat. solidi, b 246, 2098 (2009)]), we show that the reduction of 7-knot with a set of non-equal cylinder radii to 7*-knot of equal radii is possible only for one topologically unique configuration, all other 7-knots being of different topology. We found novel configurations for mutually touching infinitely long round cylinders when their numbers are eight and ultimately nine (here coined 8-knots and 9-knots). Unlike the case of 7-knot, where one angular parameter (for a given set of fixed radii) may change by sweeping a scissor angle between two chosen cylinders, in case of 8- and 9-knots their degrees of freedom are completely exhausted by mutual touching so that their configurations are \"frozen\" for each given set of radii. For 8-knot the radii of any six cylinders may be changeable (for example, all taken equal) while two remaining are uniquely determined by the others. We show that 9-knot makes the ultimate configuration where only three cylinders can have changeable radii and the remaining six are determined by the three. Possible generalizations and connection with Physics are mentioned.
Let k>n be positive integers. We consider mappings from a subset of k-dimensional Euclidean space R^k to the Heisenberg group H^n with a variety of metric properties, each of which imply that the mapping in question satisfies some weak form of the contact equation arising from the sub-Riemannian structure of the Heisenberg group. We illustrate a new geometric technique that shows directly how the weak contact equation greatly restricts the behavior of the mappings. In particular, we provide a new and elementary proof of the fact that the Heisenberg group H^n is purely k-unrectifiable. We also prove that for an open set U in R^k, the rank of the weak derivative of a weakly contact mapping in the Sobolev space W^{1,1}_{loc}(U;R^{2n+1}) is bounded by $n$ almost everywhere, answering a question of Magnani. Finally we prove that if a mapping from U to H^n is s-H\\\"older continuous, s>1/2, and locally Lipschitz when considered as a mapping into R^{2n+1}, then the mapping cannot be injective. This result is related to a conjecture of Gromov.
The problem of detecting auxetic behavior, originating in materials science and mathematical crystallography, refers to the property of a flexible periodic bar-and-joint framework to widen, rather than shrink, when stretched in some direction. The only known algorithmic solution for detecting infinitesimal auxeticity is based on the rather heavy machinery of fixed-dimension semi-definite programming. In this paper we present a new, simpler algorithmic approach which is applicable to a natural family of 3D periodic bar-and-joint frameworks with 3 degrees-of-freedom. This class includes most zeolite structures, which are important for applications in computational materials science. We show that the existence of auxetic deformations is related to properties of an associated elliptic curve. A fast algorithm for recognizing auxetic capabilities is obtained via the classical Aronhold invariants of the cubic form defining the curve.
For locally finite CAT(0) cube complexes it is known that they are injectively metrizable choosing the $l_\\infty$-norm on each cube. In this paper we show that cube complexes which are injective with respect to this metric are always CAT(0). Moreover we give a criterion for finite dimensional CAT(0) cube complexes with finite width to posses an injective metric. As a side result we prove a modification of Bridson s Theorem for cube complexes saying that finite dimensional cube complexes with $l_p$-norms on the cubes are geodesic.
The relationship between $L_p$ affine surface area and curvature measures is investigated. As a result, a new representation of the existing notion of $L_p$ affine surface area depending only on curvature measures is derived. Direct proofs of the equivalence between this new representation and those previously known are provided. The proofs show that the new representation is, in a sense, \"polar\" to that of Lutwak s and \"dual\" to that of Sch\\\"utt & Werner s.
In this paper we study the locally optimal geodesic ball packings with equal balls to the $\\mathbf{S}^2\\!\\times\\!\\mathbf{R}$ space groups having rotation point groups and their generators are screw motions. We determine and visualize the densest simply transitive geodesic ball arrangements for the above space groups, moreover we compute their optimal densities and radii. The densest packing is derived from the $\\mathbf{S}^2\\!\\times\\!\\mathbf{R}$ space group $\\mathbf{3qe.~I.~3}$ with packing density $\\approx 0.7278$. E. Moln\\ ar has shown, that the Thurston geometries have an unified interpretation in the real projective 3-sphere $\\mathcal{PS}^3$. In our work we shall use this projective model of $\\mathbf{S}^2\\!\\times\\!\\mathbf{R}$ geometry.
We introduce a class of metric spaces called $p$-additive combinations and show that for such spaces we may deduce information about their $p$-negative type behaviour by focusing on a relatively small collection of almost disjoint metric subspaces, which we call the components. In particular we deduce a formula for the $p$-negative type gap of the space in terms of the $p$-negative type gaps of the components, independent of how the components are arranged in the ambient space. This generalizes earlier work on metric trees by Doust and Weston. The results hold for semi-metric spaces as well, as the triangle inequality is not used.
We compute the class groups of very general normal surfaces in complex projective three-space containing an arbitrary base locus $Z$, thereby extending the classic Noether-Lefschetz theorem (the case when $Z$ is empty). Our method is an adaptation of Griffiths and Harris  degeneration proof, simplified by a cohomology and base change argument. We give applications to computing Picard groups, which generalize several known results.
We study tautological classes on the moduli space of stable $n$-pointed hyperelliptic curves of genus $g$ with rational tails. Our result gives a complete description of tautological relations. The method is based on the approach of Yin in comparing tautological classes on the moduli of curves and the universal Jacobian. It is proven that all relations come from the Jacobian side. The intersection pairings are shown to be perfect in all degrees. We show that the tautological algebra coincides with its image in cohomology via the cycle class map. The latter is identified with monodromy invariant classes in cohomology. The connection with recent conjectures by Pixton is also discussed.
Let $X$ be a projective scheme over a field. We show that the vanishing cohomology of any sequence of coherent sheaves is closely related to vanishing under pullbacks by the Frobenius morphism. We also compare various definitions of ample locally free sheaf and show that the vanishing given by the Frobenius morphism is, in a certain sense, the strongest possible. Our work can be viewed as various generalizations of the Serre Vanishing Theorem.
We prove that for every compact K\\\"ahler manifold $X$ there exists an $L$-infinity morphism, lifting the usual cup product in cohomology, from the Kodaira-Spencer differential graded Lie algebra to the suspension of the space of linear endomorphisms of the singular cohomology of $X$. As a consequence we get an algebraic proof of the principle ``obstructions to deformations of compact Kaehler manifolds annihilate ambient cohomology  .
A known conjecture of Grinenko in birational geometry asserts that a Mori fibre space with the structure of del Pezzo fibration of low degree is birationally rigid if and only if its anticanonical class is an interior point in the cone of mobile divisors. The conjecture is proved to be true for smooth models (with a generality assumption for degree 3). It is speculated that the conjecture holds for, at least, Gorenstein models in degree 1 and 2. In this article, I present a (Gorenstein) counterexample in degree 2 to this conjecture.
Given a generic curve of genus $g\\geqslant4$ and a smooth point $L\\in W_{g-1}^{1}(C)$, whose linear system is base-point free, we consider the Abel-Jacobi normal function associated to $L^{\\otimes 2}\\otimes \\omega_{C}^{-1}$, when $(C,L)$ varies in moduli. We prove that its infinitesimal invariant reconstruct the couple $(C,L)$. When $g=4$, we obtain the generic Torelli theorem proved by Griffiths.
In 1888, Hilbert proved that every non-negative quartic form f=f(x,y,z) with real coefficients is a sum of three squares of quadratic forms. His proof was ahead of its time and used advanced methods from topology and algebraic geometry. Up to now, no elementary proof is known. Here we present a completely new approach. Although our proof is not easy, it uses only elementary techniques. As a by-product, it gives information on the number of representations f=p_1^2+p_2^2+p_3^2 of f up to orthogonal equivalence. We show that this number is 8 for generically chosen f, and that it is 4 when f is chosen generically with a real zero. Although these facts were known, there was no elementary approach to them so far.
Viro method plays an important role in the study of topology of real algebraic hypersurfaces. The T-primitive hypersurfaces we study here appear as the result of Viro s combinatorial patchworking when one starts with a primitive triangulation. We show that the Euler characteristic of the real part of such a hypersurface of even dimension is equal to the signature of its complex part. We use this result to prove the existence of maximal surfaces in some three-dimensional toric varieties, namely those corresponding Nakajima polytopes. In fact, these results belong to the field of tropical geometry and we explain how they can be understood tropically.
For a simple algebraic group $G$ we study the space $Q$ of Quasimaps from the projective line $C$ to the flag variety of $G$. We prove that the global Intersection Cohomology of $Q$ carries a natural pure Tate Hodge structure, and compute its generating function. We define an action of the Langlands dual Lie algebra $g^L$ on this cohomology. We present a new geometric construction of the universal enveloping algebra $U(n^L_+)$ of the nilpotent subalgebra of $g^L$. It is realized in the Ext-groups of certain perverse sheaves on Quasimaps  spaces, and it is equipped with a canonical basis numbered by the irreducible components of certain algebraic cycles, isomorphic to the intersections of semiinfinite orbits in the affine Grassmannian of $G$. We compute the stalks of the IC-sheaves on the Schubert strata closures in $Q$. They carry a natural pure Tate Hodge structure, and their generating functions are given by the generic affine Kazhdan-Lusztig polynomials. In the Appendix we prove that Kontsevich s space of stable maps provides a natural resolution of $Q$.
This basic introduction to tropical geometry is hopefully accessible to a first years student in mathematics. The topics discussed here are basic tropical algebra, tropical plane curves, some tropical intersections, and Viro s patchworking. I tried as much as possible to illustrate each new definition with concrete examples and nice pictures. As the title suggests, this text is in French. A Portuguese (Brazil) version, as well as correction of exercises, can be found at this http URL
Let M(v) be the moduli of stable sheaves on K3 surfaces X of Mukai vector v. If v is primitive, than it is expected that M(v) is deformation equivalent to some Hilbert scheme and weight two hogde structure can be described by H^*(X,Z). These are known by Mukai, O Grady and Huybrechts if rank is 1 or 2, or the first Chern class is primitive. Under some conditions on the dimension of M(v), we shall show that these assertion are true. For the proof, we shall use Huybrechts s results on symplectic manifolds.
Following the work of Altmann and Hausen we give a combinatorial description in terms for smooth Fano threefolds admitting a 2-torus action. We show that a whole variety of properties and invariants can be read off from this description. As an application we prove and disprove the existence of Kahler-Einstein metrics for some of these Fano threefolds, calculate their Cox rings and some of their toric canonical degenerations.
Let G be a simple simply connected complex algebraic group. We give a Lie theoretic construction of a conjectural mirror family associated to a general flag variety G/P, and show that it recovers the Peterson variety presentation for the T-equivariant quantum cohomology rings qH*_T(G/P)_(q) with quantum parameters inverted. For SL_n/B we relate our construction to the mirror family defined by Givental and its T-equivariant analogue due to Joe and Kim.
We give a construction of the moduli space of stable maps to the classifying stack B\\mu_r of a cyclic group by a sequence of r-th root constructions on M_{0, n}. We prove a closed formula for the total Chern class of \\mu_r-eigenspaces of the Hodge bundle, and thus of the obstruction bundle of the genus zero Gromov-Witten theory of stacks of the form [C^N/\\mu_r]. We deduce linear recursions for all genus-zero Gromov-Witten invariants.
In this paper, we prove a generalization of Reznikov s theorem which says that the Chern-Simons classes and in particular the Deligne Chern classes (in degrees $>1$) are torsion, of a flat bundle on a smooth complex projective variety. We consider the case of a smooth quasi--projective variety with an irreducible smooth divisor at infinity. We define the Chern-Simons classes of Deligne s canonical extension of a flat vector bundle with unipotent monodromy at infinity, which lift the Deligne Chern classes and prove that these classes are torsion.
A smooth complex projective curve is called pseudoreal if it is isomorphic to its conjugate but is not definable over the reals. Such curves, together with real Riemann surfaces, form the real locus of the moduli space $\\mathcal M_g$. This paper deals with the classification of pseudoreal curves according to the structure of their automorphism group. We follow two different approaches existing in the literature: one coming from number theory, dealing more generally with fields of moduli of projective curves, and the other from complex geometry, through the theory of NEC groups. Using the first approach, we prove that the automorphism group of a pseudoreal Riemann surface $X$ is abelian if $X/Z({\\rm Aut}(X))$ has genus zero, where $Z({\\rm Aut}(X))$ is the center of ${\\rm Aut}(X)$. This includes the case of $p$-gonal Riemann surfaces, already known by results of Huggins and Kontogeorgis. By means of the second approach and of elementary properties of group extensions, we show that $X$ is not pseudoreal if the center of $G={\\rm Aut}(X)$ is trivial and either ${\\rm Out}(G)$ contains no involutions or ${\\rm Inn}(G)$ has a group complement in ${\\rm Aut}(G)$. This extends and gives an elementary proof (over $\\mathbb C$) of a result by D\\`ebes and Emsalem. Finally, we provide an algorithm, implemented in MAGMA, which classifies the automorphism groups of pseudoreal Riemann surfaces of genus $g\\geq 2$, once a list of all groups acting for such genus, with their signature and generating vectors, are given. This program, together with the database provided by J. Paulhus in \\cite{Pau15}, allowed us to classifiy pseudoreal Riemann surfaces up to genus $10$, extending previous results by Bujalance, Conder and Costa.
We present a general construction of model category structures on the category $\\mathbb{C}(\\mathfrak{Qco}(X))$ of unbounded chain complexes of quasi-coherent sheaves on a semi-separated scheme $X$. The construction is based on making compatible the filtrations of individual modules of sections at open affine subsets of $X$. It does not require closure under direct limits as previous methods. We apply it to describe the derived category $\\mathbb D (\\mathfrak{Qco}(X))$ via various model structures on $\\mathbb{C}(\\mathgrak{Qco}(X))$. As particular instances, we recover recent results on the flat model structure for quasi-coherent sheaves. Our approach also includes the case of (infinite-dimensional) vector bundles, and of restricted flat Mittag-Leffler quasi-coherent sheaves, as introduced by Drinfeld. Finally, we prove that the unrestricted case does not induce a model category structure as above in general.
The study of the projective coordinate ring of the (geometric invariant theory) moduli space of n ordered points on P^1 up to automorphisms began with Kempe in 1894, who proved that the ring is generated in degree one in the main (n even, unit weight) case. We describe the relations among the invariants for all possible weights. In the main case, we show that up to the symmetric group symmetry, there is a single equation. For n not 6, it is a simple quadratic binomial relation. (For n=6, it is the classical Segre cubic relation.) For general weights, the ideal of relations is generated by quadratics inherited from the case of 8 points. This paper completes the program set out in [HMSV1].
We describe the singular locus of the compactification of the moduli space $R_{g,l}$ of curves of genus $g$ paired with an $l$-torsion point in their Jacobian. Generalising previous work for $l\\le 2$, we also describe the sublocus of noncanonical singularities for any positive integer $l$. For $g\\ge 4$ and $l=3,4, 6$, this allows us to provide a lifting result on pluricanonical forms playing an essential role in the computation of the Kodaira dimension of $R_{g,l}$: for those values of $l$, every pluricanonical form on the smooth locus of the moduli space extends to a desingularisation of the compactified moduli space.
Let $f: (X,D) \\to B$ be a stably family with log canonical general fiber. We prove that, after a birational modification of the base $\\tilde{B} \\to B$, there is a morphism from a high fibered power of the family to a pair of log general type. If in addition the general fiber is openly canonical, then there is a morphism from a high fibered power of the original family to a pair openly of log general type.
For a complex quasi-projective manifold with a finite group action, we define higher order generalized Euler characteristics with values in the Grothendieck ring of complex quasi-projective varieties extended by the rational powers of the class of the affine line. We compute the generating series of generalized Euler characteristics of a fixed order of the Cartesian products of the manifold with the wreath product actions on them.
This paper introduces a mathematical definition of the category of D-branes in Landau-Ginzburg orbifolds in terms of $A_\\infty$-categories. Our categories coincide with the categories of (graded) matrix factorizations for quasi-homogeneous polynomials. After setting up the necessary definitions, we prove that our category for the polynomial $x^{n+1}$ is equivalent to the derived category of representations of the Dynkin quiver of type $A_{n}$. We also construct a special stability condition for the triangulated category in the sense of T. Bridgeland, which should be the \"origin\" of the space of stability conditions.
On a smooth complex projective variety $X$ of dimension $n$, consider an ample vector bundle $\\mathcal{E}$ of rank $r \\leq n-2$ and an ample line bundle $H$. A numerical character $m_2=m_2(X,\\mathcal{E},H)$ of the triplet $(X,\\mathcal{E},H)$ is defined, extending the well-known second class of a polarized manifold $(X,H)$, when either $n=2$ or $H$ is very ample. Under some additional assumptions on $\\mathcal{F}: = \\mathcal{E} \\oplus H^{\\oplus (n-r-2)}$, triplets $(X,\\mathcal{E},H)$ as above whose $m_2$ is small with respect to the invariants $d:=c_{n-2}(\\mathcal{F})H^2$ and $g:=1+\\frac{1}{2}\\big(K_X + c_1(\\mathcal{F})+H\\big) \\cdot c_{n-2}(\\mathcal{F}) \\cdot H$ are studied and classified.
We show that the idea used by Kempf (1990) in order to obtain a splitting criterion for vector bundles on projective spaces leads to an elementary proof of the Babylonian tower theorem for this class of bundles, a result due to Barth--Van de Ven (1974) in the rank 2 case and to Sato (1977) and Tyurin (1976) in the case of arbitrary rank. As a byproduct we obtain a slight improvement of the numerical criterion of Flenner (1985) in the particular case under consideration.
The nef cone volume appeared first in work of Peyre in a number-theoretic context on Del Pezzo surfaces, and it was studied by Derenthal and co-authors in a series of papers. The idea was subsequently extended to also measure the Zariski chambers of Del Pezzo surfaces. We start in this paper to explore the possibility to use this attractive concept to effectively measure the size of the nef cone on algebraic surfaces in general. This provides an interesting way of measuring in how big a space an ample line bundle can be moved without destroying its positivity. We give here complete results for simple abelian surfaces that admit a principal polarization and for products of elliptic curves.
It is well known that degree two Deligne cohomology groups can be identified with groups of isomorphism classes of holomorphic line bundles with connections. There is also a geometric description of degree three Deligne cohomology, due to J-L. Brylinski and P. Deligne, in terms of gerbes with connective structures and curvings. This paper gives a geometric interpretation of Deligne cohomology of all degrees, in terms of equivalence classes of higher line bundles with $k$-connections. It is also shown that the classical Abel-Jacobi isomorphism $Pic^0(X) \\cong J(X)$ generalizes to the isomorphism between groups of equivalence classes of topologically trivial 1-holomorphic higher line bundles with $k$-connections and Griffiths intermediate Jacobians.
Let $\\eta: C_{f,N}\\to \\mathbb{P}^1$ be a cyclic cover of $\\mathbb{P}^1$ of degree $N$ which is totally and tamely ramified for all the ramification points. We determine the group of fixed points of the cyclic group $\\mathbf{mu}_N\\cong \\mathbb{Z}/N\\mathbb{Z}$ acting on the Jacobian $J_N:=\\Jac(C_{f,N})$. For each $\\ell$ distinct from the characteristic of the base field, the Tate module $T_\\ell J_N$ is shown to be a free module over the ring $\\mathbb{Z}_\\ell[T]/(\\sum_{i=0}^{N-1}T^i)$. We also calculate the degree of the induced polarization on the new part $J_N^{new}$ of the Jacobian.
We prove a comparison formula for curve-counting invariants in the setting of the McKay correspondence, related to the crepant resolution conjecture for Donaldson-Thomas invariants. The conjecture is concerned with comparing the invariants of a (hard Lefschetz) Calabi-Yau orbifold of dimension three with those of a specific crepant resolution of its coarse moduli space. We prove the conjecture for point classes and give a conditional proof for general curve classes. We also prove a variant of the formula for curve classes. Along the way we identify the image of the standard heart of the orbifold under the Bridgeland-King-Reid equivalence.
We determine, for all genus $g\\geq2$ the Riemann surfaces of genus $g$ with $4g$ automorphisms. For $g\\neq$ $3,6,12,15$ or $30$, this surfaces form a real Riemann surface $\\mathcal{F}_{g}$ in the moduli space $\\mathcal{M}_{g}$: the Riemann sphere with three punctures. The set of real Riemann surfaces in $\\mathcal{F}_{g}$ consists of three intervals its closure in the Deligne-Mumford compactification of $\\mathcal{M}_{g}$ is a closed Jordan curve.
We introduce the notion of filtered perversity of a filtered differential complex on a complex analytic manifold $X$, without any assumptions of coherence, with the purpose of studying the connection between the pure Hodge modules and the \\lt-complexes. We show that if a filtered differential complex $(\\cM^\\bullet,F_\\bullet)$ is filtered perverse then $\\aDR(\\cM^\\bullet,F_\\bullet)$ is isomorphic to a filtered $\\cD$-module; a coherence assumption on the cohomology of $(\\cM^\\bullet,F_\\bullet)$ implies that, in addition, this $\\cD$-module is holonomic. We show the converse: the de Rham complex of a holonomic Cohen-Macaulay filtered $\\cD$-module is filtered perverse.
In math.AG/0108089, math.AG/0212090 and math.AG/0308247 we gave numerical conditions which ensure that an equisingular family is irreducible respectively T-smooth. Combining results by Greuel, Lossen and Shustin and an idea from math.AG/9802009 we give in the present paper series of examples of families of irreducible curves on surfaces in projective three-space with only ordinary multiple points which are reducible and where at least one component does not have the expected dimension. The examples show that for families of curves with ordinary multiple points the conditions for T-smoothness in math.AG/0308247 have the right asymptotics.
In this short note, we will show the following weak evidence of S. Lang conjecture over function fields. Let f : X ---> Y be a projective and surjective morphism of algebraic varieties over an algebraically closed field k of characteristic zero, whose generic fiber is geometrically irreducible and of general type. If f is not birationally trivial, then there are countably many proper closed varieties { Z_i } of X such that every quasi-section of f is contained in the union of Z_i.
We construct an $A_{\\infty}$-structure on the Ext-groups of hermitian holomorphic vector bundles on a compact complex manifold. We propose a generalization of the homological mirror conjecture due to Kontsevich. Namely, we conjecture that for mirror dual Calabi-Yau manifolds $M$ and $X$ there exists an $A_{\\infty}$-functor from Fukaya s symplectic $A_{\\infty}$-category of $M$ to the $A_{\\infty}$-derived category of $X$ which is a homotopy equivalence on morphisms. We verify the part of this conjecture concering triple products for elliptic curves.
Moh s claim that Jacobian Conjecture (JC) is true for degree $\\le 100$ is well-known. Unfortunately his proof for the case (99, 66) is not complete. For a Jacobian pair $(f, g)$, we obtain two formulas for intersection numbers ${\\rm I}(f_\\xi, g)$ and ${\\rm I}(f_\\xi, f_y)$ respectively. Here, $\\xi$ is a generic element of the base field and $f_\\xi=f-\\xi$. One is expressed by final minor roots only and the other by final major roots only and total split $\\pi$-roots respectively. These formulas show that major roots and minor roots are constrains of each other. They provide effective tools to check exceptional cases of the JC. It is shown that if there is a counter example of degree (99, 66) for the JC, the principal minor roots must split at order 1. On the other hand, it is shown that for any case, the principal minor roots do not split at order 1. Thus the case (99, 66) is ruled out.
Let T be a general complex tensor of format $(n_1,...,n_d)$. When the fraction $\\prod_in_i/[1+\\sum_i(n_i-1)]$ is an integer, and a natural inequality (called balancedness) is satisfied, it is expected that T has finitely many minimal decomposition as a sum of decomposable tensors. We show how homotopy techniques allow us to find all the decompositions of T, starting from a given one. Computationally, this gives a guess regarding the total number of such decompositions. This guess matches exactly with all cases previously known, and predicts several unknown cases. Some surprising experiments yielded two new cases of generic identifiability: formats (3,4,5) and (2,2,2,3) which have a unique decomposition as the sum of 6 and 4 decomposable tensors, respectively. We conjecture that these two cases together with the classically known matrix pencils are the only cases where generic identifiability holds, i.e., the only identifiable cases. Building on the computational experiments, we use algebraic geometry to prove these two new cases are indeed generically identifiable.
It is proved, as was conjectured by Eisenbud-Koh-Stillman, that for a finitely generated graded module $M$ over the symmetric algebra $S(V)$, if the Koszul group ${\\cal K}_{p,0}(M,V)\\ne 0$, then the set of rank 1 relations in $M_0\\otimes V$ has dimension $\\ge p$. The method is by using ``exterior minors\" to study syzygies of an ideal derived from the Koszul class in the exterior algebra. As a consequence, a conjecture of Lazarsfeld and myself that a set $Z$ of $2r+1-p$ points in ${\\bf P}^r$ for which property $N_p$ fails has a subset $Z $ of at least $2{\\rm dim}(L) +2-p$ points lying on a linear space $L$ such that property $N_p$ fails for $Z $.
The goal of this paper is to generalize a theorem of Fujiwara (formerly Deligne s conjecture) to the situation appearing in a joint work [KV] with David Kazhdan on the global Langlands correspondence over function fields. Moreover, our proof is more elementary than the original one and stays in the realm of ordinary algebraic geometry, that is, does not use rigid geometry. We also include proof of the Lefschetz-Verdier trace formula and of the additivity of filtered trace maps, thus making the paper essentially self-contained.
We discuss an analogue of Riemann-Roch theorem for curves with an infinite number of handles. We represent such a curve X by its Shottki model, which is an open subset U of CP^{1} with infinite union of circles as a boundary. An appropriate bundle on X is \\omega^{1/2} \\otimes L, L being a bundle with (say) constants as gluing conditions on the circles. An admissible section of an appropriate bundle on X is a holomorphic half-form on U with given gluing conditions and H^{1/2}-smoothness condition. We study the restrictions on the mutual position of the circles and the gluing constants which guarantee the finite dimension of the space of appropriate sections of admissible bundles, and make the Riemann-Roch theorem hold. The resulting Jacobian variety is described as an infinite-dimension analogue of a torus.
We study a class obtained from the Segre class $s(Z,Y)$ of an embedding of schemes by incorporating the datum of a line bundle on $Z$. This class satisfies basic properties analogous to the ordinary Segre class, but leads to remarkably simple formulas in standard intersection-theoretic situations such as excess or residual intersections. We prove a formula for the behavior of this class under linear joins, and use this formula to prove that a `Segre zeta function  associated with ideals generated by forms of the same degree is a rational function.
Let C be the union of two general connected, smooth, nonrational curves X and Y intersecting transversally at a point P. Assume that P is a general point of X or of Y. Our main result, in a simplified way, says: Let Q be a point of X. Then Q is the limit of special Weierstrass points on a family of smooth curves degenerating to C if and only if Q is not P and either of the following conditions hold: Q is a special ramification point of the linear system |K_X+(g_Y+1)P|, or Q is a ramification point of the linear system |K_X+(g_Y+1+j)P| for j=-1 or j=1 and P is a Weierstrass point of Y. Above, g_Y stands for the genus of Y and K_X for a canonical divisor of X. As an application, we recover in a unified and conceptually simpler way computations made by Diaz and Cukierman of certain divisor classes in the moduli space of stable curves. In our method there is no need to worry about multiplicities, an usual nuisance of the method of test curves.
Let $K$ be a field finitely generated over the field of rational numbers, $K(c)$ the extension of $K$ obtained by adjoining all roots of unity, $L$ an infinite Galois extension of $K$, $X$ an abelian variety defined over $K$. We prove that under certain conditions on $X$ and $K$ the existence of infinitely many L-rational points of finite order on $X$ implies that the intersection of $L$ and $K(c)$ has infinite degree over $K$.
Many applications modeled by polynomial systems have positive dimensional solution components (e.g., the path synthesis problems for four-bar mechanisms) that are challenging to compute numerically by homotopy continuation methods. A procedure of A. Sommese and C. Wampler consists in slicing the components with linear subspaces in general position to obtain generic points of the components as the isolated solutions of an auxiliary system. Since this requires the solution of a number of larger overdetermined systems, the procedure is computationally expensive and also wasteful because many solution paths diverge. In this article an embedding of the original polynomial system is presented, which leads to a sequence of homotopies, with solution paths leading to generic points of all components as the isolated solutions of an auxiliary system. The new procedure significantly reduces the number of paths to solutions that need to be followed. This approach has been implemented and applied to various polynomial systems, such as the cyclic n-roots problem.
We consider a function $U=e^{-f_0}\\prod_j^N f_j^{\\alpha_j}$ on a real affine space, here $f_0,..,f_N$ are linear functions, $\\alpha_1, ...,\\alpha_N$ complex numbers. The zeros of the functions $f_1, ..., f_N$ form an arrangement of hyperplanes in the affine space. We study the period matrix of the hypergeometric integrals associated with the arrangement and the function $U$ and compute its determinant as an alternating product of gamma functions and critical points of the functions $f_0,..., f_N$ with respect to the arrangement. In the simplest example, $N=1, f_0=f_1=t$, the determinant formula takes the form $\\int_0^\\infty e^{-t} t^{\\alpha -1} dt=\\Gamma (\\alpha).$ We also give a determinant formula for Selberg type exponential integrals. In this case the arangements of hyperplanes is special and admits a symmetry group, the period matrix is decomposed into blocks corresponding to different representations of the symmetry group on the space of the hypergeometric integrals associated with the arrangement. We compute the determinant of the block corresponding to the trivial representation.
We construct a compactification of the moduli of toric pairs by using ideas from mirror symmetry. The secondary fan $\\Sigma(Q)$ is used in [Ale02] to parametrize degenerations of toric pairs. It is also used in [CLS11] to control the variation of GIT. We verify the prediction of mirror symmetry that $\\Sigma(Q)$ for the moduli of toric pairs is equal to the Mori fan of the relative minimal models of the mirror family. As a result, we give an explicit construction of the compactification $\\mathscr{T}_Q$ of the moduli of toric pairs which is the normalization of the compactification in [Ale02] and [Ols08].
A Hodge structure V of weight k on which a CM field acts defines, under certain conditions, a Hodge structure of weight k-1, its half twist. In this paper we consider hypersurfaces in projective space with a cyclic automorphism which defines an action of a cyclotomic field on a Hodge substructure in the cohomology. We determine when the half twist exists and relate it to the geometry and moduli of the hypersurfaces. We use our results to prove the existence of a Kuga-Satake correspondance for certain cubic 4-folds.
For a given Fourier-Mukai equivalence of bounded derived categories of coherent sheaves on smooth quasi-projective varieties, we construct Fourier-Mukai equivalences of derived factorization categories of gauged Landau-Ginzburg (LG) models. As an application, we obtain some equivalences of derived factorization categories of K-equivalent gauged LG models. This result is an equivariant version of the result of Baranovsky and Pecharich, and it also gives a partial answer to Segal s conjecture. As another application, we prove that if the kernel of the Fourier-Mukai equivalence is linearizable with respect to a reductive affine algebraic group action, then the derived categories of equivariant coherent sheaves on the varieties are equivalent. This result is shown by Ploog for finite groups case.
We study deformations of a pair of a $\\mathbb{Q}$-Fano $3$-fold $X$ with only terminal singularities and its elephant $D \\in |{-}K_X|$. We prove that, if there exists $D \\in |{-}K_X|$ with only isolated singularities, the pair $(X,D)$ can be deformed to a pair of a $\\mathbb{Q}$-Fano $3$-fold with only quotient singularities and a Du Val elephant. When there are only non-normal elephants, we reduce the existence problem of such a deformation to a local problem around the singular locus of the elephant. We also give several examples of $\\mathbb{Q}$-Fano $3$-folds without Du Val elephants.
Let $R$ be a strictly local ring complete for a discrete valuation, with fraction field $K$ and residue field of characteristic $p > 0$. Let $X$ be a smooth, proper variety over $K$. Nicaise conjectured that the rational volume of $X$ is equal to the trace of the tame monodromy operator on $\\ell$-adic cohomology if $X$ is cohomologically tame. He proved this equality if $X$ is a curve. We study his conjecture from the point of view of logarithmic geometry, and prove it for a class of varieties in any dimension: those having logarithmic good reduction.
Let HH_{ab}(H) be the equivariant Hilbert scheme parametrizing the zero dimensional subschemes of the affine plane k^2, fixed under the one dimensional torus T_{ab}={(t^{-b},t^a), t\\in k^*} and whose Hilbert function is H. This Hilbert scheme admits a natural stratification in Schubert cells which extends the notion of Schubert cells on Grassmannians. However, the incidence relations between the cells become more complicated than in the case of Grassmannians. In this paper, we give a necessary condition for the closure of a cell to meet another cell. In the particular case of Grassmannians, it coincides with the well known necessary and sufficient incidence condition. There is no known example showing that the condition wouldn t be sufficient.
In response to a question of Reid, we find all anti-canonical Calabi-Yau hypersurfaces $X$ in toric weighted projective bundles over the projective line where the general fiber is a weighted K3 hypersurface. This gives a direct generalization of Reid s discovery of the 95 families of weighted K3 hypersurfaces. We also treat the case where $X$ is fibered over the plane with general fiber a genus one curve in a weighted projective plane.
In this paper, we study the singularities of a pair (X,Y) in arbitrary characteristic via jet schemes. For a smooth variety X in characteristic 0, Ein, Lazarsfeld and Mustata showed that there is a correspondence between irreducible closed cylinders and divisorial valuations on X. Via this correspondence, one can relate the codimension of a cylinder to the log discrepancy of the corresponding divisorial valuation. We now extend this result to positive characteristic. In particular, we prove Mustata s log canonical threshold formula avoiding the use of log resolutions, making the formula available also in positive characteristic. As a consequence, we get a comparison theorem via reduction modulo p and a version of Inversion of Adjunction in positive characteristic.
Let $X$ be the product of two projective spaces and consider the general CICY threefold $Y$ in $X$ with configuration matrix $A$. We prove the finiteness part of the analogue of the Clemens  conjecture for such a CICY in low bidegrees. More precisely, we prove that the number of smooth rational curves on $Y$ with low bidegree and with nondegenerate birational projection is at most finite (even in cases in which positive dimensional families of degenerate rational curves are known).
Based on work of R. Lazarsfeld and M. Popa, we use the derivative complex associated to the bundle of the holomorphic p-forms to provide inequalities for all the Hodge numbers of a special class of irregular compact Kaehler manifolds. For 3-folds and 4-folds we give an asymptotic bound for all the Hodge numbers in terms of the irregularity. As a byproduct, via the BGG correspondence, we also bound the regularity of the exterior cohomology modules of bundles of holomorphic p-forms.
We consider a class of stable smoothable n-dimensional varieties, the analogs of stable curves. Assuming the minimal model program in dimension n+1, we prove that this class is bounded. From Kollar s method of constructing projective moduli spaces we get as a corollary that minimal model program in dimension n+1 implies the existence of a projective coarse moduli space for stable smoothable n-folds.
Let X be a complex surface with no nontrivial 2-forms. Then we show that Bloch s conjecture is true (i.e. the Albanese map in this case is injective) if and only if any homologically trivial idempotent in the ring of correspondences vanishes. Furthermore the cube of the ideal of homologically trivial correspondences is zero if these equivalent conditions are satisfied (e.g. if X is not of general type).
Let (X,D) be a D-scheme in the sense of Beilinson and Bernstein, given by an algebraic variety X and a morphism O_X -> D of sheaves of rings on X. We consider noncommutative deformations of quasi-coherent sheaves of left D-modules on X, and show how to compute their pro-representing hulls. As an application, we compute the noncommutative deformations of the left D_X-module O_X when X is any elliptic curve.
To every singular reduced projective curve X one can associate many fine compactified Jacobians, depending on the choice of a polarization on X, each of which yields a modular compactification of a disjoint union of the generalized Jacobian of X. We investigate the geometric properties of fine compactified Jacobians focusing on curves having locally planar singularities. We give examples of nodal curves admitting non isomorphic (and even non homeomorphic over the field of complex numbers) fine compactified Jacobians. We study universal fine compactified Jacobians, which are relative fine compactified Jacobians over the semiuniversal deformation space of the curve X. Finally, we investigate the existence of twisted Abel maps with values in suitable fine compactified Jacobians.
We show that the finiteness of the fundamental groups of the smooth locus of lower dimensional log Fano pairs would imply the finiteness of the local fundamental group of klt singularities. As an application, we verify that the local fundamental group of a three dimensional klt singularity and the fundamental group of the smooth locus of a three dimensional Fano variety with canonical singularities are always finite.
The aim of this note is to shed some light on the relationships among some notions of positivity for vector bundles that arose in recent decades. Our purpose is to study several of the positivity notions studied for vector bundles with some notions of asymptotic base loci that can be defined on the variety itself, rather than on the projectivization of the given vector bundle. We relate some of the different notions conjectured to be equivalent with the help of these base loci, and we show that these can help simplify the various relationships between the positivity properties present in the literature. In particular, we define augmented and restricted base loci $\\mathbb{B}_+ (E)$ and $\\mathbb{B}_- (E)$ of a vector bundle $E$ on the variety $X$, as generalizations of the corresponding notions studied extensively for line bundles. As it turns out, the asymptotic base loci defined here behave well with respect to the natural map induced by the projectivization of the vector bundle $E$.
Let $\\V$ be a mixed characteristic complete discrete valuation ring, let $\\X$ and $\\Y$ be two smooth formal $\\V$-schemes, let $f_0$ : $X \\to Y$ be a projective morphism between their special fibers, let $T$ be a divisor of $Y$ such that $T_X := f_0 ^{-1} (T) $ is a divisor of $X$ and let $\\M \\in D ^\\mathrm{b}_\\mathrm{coh} (\\D ^\\dag_{\\X} (\\hdag T_X)_{\\Q})$. We construct the relative duality isomorphism $ f_{0T +} \\circ \\DD_{\\X, T_X} (\\M) \\riso \\DD_{\\Y, T} \\circ f_{0T +} (\\M)$. This generalizes the known case when there exists a lifting $f : \\X \\to \\Y$ of $f_{0}$. Moreover, when $f_0$ is a closed immersion, we prove that this isomorphism commutes with Frobenius.
A notion of the radial index of an isolated singular point of a 1-form on a singular (real or complex) variety is discussed. For the differential of a function it is related to the Euler characteristic of the Milnor fibre of the function. A connection between the radial index and the local Euler obstruction of a 1-form is described. This gives an expression for the local Euler obstruction of the differential of a function in terms of Euler characteristics of some Milnor fibres.
Let Y be a non-singular projective manifold with an ample canonical sheaf, and let V be a rational variation of Hodge structures of weight one on Y with Higgs bundle E(1,0) + E(0,1), coming from a family of Abelian varieties. If Y is a curve the Arakelov inequality says that the difference of the slope of E(1,0) and the one of E(0,1) is is smaller than or equal to the degree of the canonical sheaf. We prove a similar inequality in the higher dimensional case. If the latter is an equality, as well as the Bogomolov inequality for E(1,0) or for E(0,1), one hopes that Y is a Shimura variety, and V a uniformizing variation of Hodge structures. This is verified, in case the universal covering of Y does not contain factors of rank >1. Part of the results extend to variations of Hodge structures over quasi-projective manifolds. The revised version corrects several mistakes and ambiguities, pointed out by the referee. Following suggestions of the referee the presentation of the results was improved.
Let $T$ be a torus acting on $\\CC^n$ in such a way that, for all $1\\leq k\\leq n$, the induced action on the grassmannian $G(k,n)$ has only isolated fixed points. This paper proposes a natural, elementary, explicit description of the corresponding $T$-equivariant Schubert calculus. In a suitable natural basis of the $T$-equivariant cohomology, seen as a module over the $T$-equivariant cohomology of a point, it is formally the same as the ordinary cohomology of a grassmann bundle. The main result, useful for computational purposes, is that the $T$-equivariant cohomology of $G(k,n)$ can be realized as the quotient of a ring generated by derivations on the exterior algebra of a free module of rank $n$ over the $T$-equivariant cohomology of a point.
It is a fundamental problem in geometry to decide which moduli spaces of polarized algebraic varieties are embedded by their period maps as Zariski open subsets of locally Hermitian symmetric domains. In the present work we prove that the moduli space of Calabi-Yau threefolds coming from eight planes in $\\mathbb{P}^3$ does {\\em not} have this property. We show furthermore that the monodromy group of a good family is Zariski dense in the corresponding symplectic group. Moreover, we study a natural sublocus which we call hyperelliptic locus, over which the variation of Hodge structures is naturally isomorphic to wedge product of a variation of Hodge structures of weight one. It turns out the hyperelliptic locus does not extend to a Shimura subvariety of type III (Siegel space) within the moduli space. Besides general Hodge theory, representation theory and computational commutative algebra, one of the proofs depends on a new result on the tensor product decomposition of complex polarized variations of Hodge structures.
New classes of modules of equations for secant varieties of Veronese varieties are defined using representation theory and geometry. Some old modules of equations (catalecticant minors) are revisited to determine when they are sufficient to give scheme-theoretic defining equations. An algorithm to decompose a general ternary quintic as the sum of seven fifth powers is given as an illustration of our methods. Our new equations and results about them are put into a larger context by introducing vector bundle techniques for finding equations of secant varieties in general. We include a few homogeneous examples of this method.
We investigate the $W_2(k)$-liftability of singular schemes. We prove constructibility of the locus of $W_2(k)$-liftable schemes in a flat family $X \\to S$. Moreover, we construct an explicit $W_2(k)$-lifting of a Frobenius split scheme $X$ over a perfect field $k$, reproving Bhatt s existential result. Furthermore, we study existence of liftings of the Frobenius morphism. In particular, we prove that in dimension $n \\geq 4$ ordinary double points do not admit a $W_2(k)$-lifting compatible with Frobenius, and that canonical surface singularities are Frobenius liftable. Combined with Bhatt s results, the latter result implies that the crystalline cohomology groups over $k$ of surfaces with canonical singularities are not finite dimensional. As a corollary of our results, we provide a thorough comparison between the notions of $W_2(k)$-liftability, Frobenius liftability and classical $F$-singularity types.
Over a family of varieties with singular special fiber, the relative Picard functor (i.e. the moduli space of line bundles) may fail to be compact. We propose a stability condition for line bundles on reducible varieties that is aimed at compactifying it. This stability condition generalizes the notion of `balanced multidegree  used by Caporaso in compactifying the relative Picard functor over families of curves. Unlike the latter, it is defined `asymptotically ; an important theme of this paper is that although line bundles on higher-dimensional varieties are more complicated than those on curves, their behavior in terms of stability asymptotically approaches that of line bundles on curves. Using this definition of stability, we prove that over a one-parameter family of varieties having smooth total space, any line bundle on the generic fiber can be extended to a unique semistable line bundle on the (possibly reducible) special fiber, provided the special fiber is not too complicated in a combinatorial sense.
We prove the \"strong form\" of the Clemens conjecture in degree 10. Namely, on a general quintic threefold F in P^4, there are only finitely many smooth rational curves of degree 10, and each curve is embedded in F with normal bundle O(-1)^2. Moreover, in degree 10, there are no singular, reduced, and irreducible rational curves, nor any reduced, reducible, and connected curves with rational components in F.
We introduce a subexponential algorithm for geometric solving of multivariate polynomial equation systems whose bit complexity depends mainly on intrinsic geometric invariants of the solution set. From this algorithm, we derive a new procedure for the decision of consistency of polynomial equation systems whose bit complexity is subexponential, too. As a byproduct, we analyze the division of a polynomial modulo a reduced complete intersection ideal and from this, we obtain an intrinsic lower bound for the logarithmic height of diophantine approximations to a given solution of a zero--dimensional polynomial equation system. This result represents a multivariate version of Liouville s classical theorem on approximation of algebraic numbers by rationals. A special feature of our procedures is their {\\em polynomial} character with respect to the mentioned geometric invariants when instead of bit operations only arithmetic operations are counted at unit cost. Technically our paper relies on the use of straight--line programs as a data structure for the encoding of polynomials, on a new symbolic application of Newton s algorithm to the Implicit Function Theorem and on a special, basis independent trace formula for affine Gorenstein algebras.
This semi-expository paper discusses the log minimal model program as applied to the moduli space of curves, especially in the case of curves of genus two. Log canonical models for these moduli spaces can often be constructed using the techniques of Geometric Invariant Theory. In genus two, this boils down to the invariant theory of binary sextics, which was developed systematically in the 19th century.
Richardson varieties play an important role in intersection theory and in the geometric interpretation of the Littlewood-Richardson Rule for flag varieties. We discuss three natural generalizations of Richardson varieties which we call projection varieties, intersection varieties, and rank varieties. In many ways, these varieties are more fundamental than Richardson varieties and are more easily amenable to inductive geometric constructions. In this paper, we study the singularities of each type of generalization. Like Richardson varieties, projection varieties are normal with rational singularities. We also study in detail the singular loci of projection varieties in Type A Grassmannians. We use Kleiman s Transversality Theorem to determine the singular locus of any intersection variety in terms of the singular loci of Schubert varieties. This is a generalization of a criterion for any Richardson variety to be smooth in terms of the nonvanishing of certain cohomology classes which has been known by some experts in the field, but we don t believe has been published previously.
In this paper we extend the notion of specialization functor to the case of several closed submanifolds satisfying some suitable conditions. Applying this functor to the sheaf of Whitney holomorphic functions we construct different kinds of sheaves of multi-asymptotically developable functions, whose definitions are natural extensions of the definition of strongly asymptotically developable functions introduced by Majima.
I show that each etale n-cohomology class on noetherian schemes comes from a Cech cocycle, provided that any n-tuple of points admits an affine open neighborhood. Together with results of Raeburn and Taylor on the bigger Brauer group, this implies that for schemes such that each pair of points admits an affine open neighborhood, any etale G_m-gerbe comes from a central separable algebra. Such algebras are nonunital generalizations of Azumaya algebras. I also prove that, on normal noetherian schemes, each Zariski G_m-gerbe comes from a central separable algebra.
For an ideal of smooth functions that is either {\\L}ojasiewicz or weakly {\\L}ojasiewicz, we give a complete characterization of the ideal of functions vanishing on its variety in terms of the global {\\L}ojasiewicz radical and Whitney closure. We also prove that the {\\L}ojasiewicz radical of such an ideal is analytic-like in the sense that its saturation equals its Whitney closure. This allows us to recover in a different way Nullstellensatz results due to Bochnak and Adkins-Leahy and answer positively a modification of the Nullstellensatz conjecture due to Bochnak.
This paper presents a proof of reciprocity laws for the Parshin symbol and for two new local symbols, defined here, which we call 4-function local symbols. The reciprocity laws for the Parshin symbol are proven using a new method - via iterated integrals. The usefulness of this method is shown by two facts - first, by establishing new local symbols - the 4-function local symbols and their reciprocity laws and, second, by providing refinements of the Parshin symbol in terms of bi-local symbols, each of which satisfies a reciprocity law. The K-theoretic variant of the first 4-function local symbol is defined in the Appendix. It differs by a sign from the one defined via iterated integrals. Both the sign and the K-theoretic variant of the 4-function local symbol satisfy reciprocity laws.
By an additive structure on a hypersurface S in projective space we mean an effective action of commutative unipotent group on projective space which leaves S invariant and acts on S with an open orbit. It is known that these structures correspond to pairs (R,H) of local finite-dimensional algebra R and a hyperplane H in the maximal ideal of R. We show when a projective hypersurface of degree 3 has an additive structure and when structure is unique.
The relationship between stable holomorphic vector bundles on a compact complex surface and the same such objects on a blowup of the surface is investigated, where \"stability\" is with respect to a Gauduchon metric on the surface and naturally derived such metrics on the blowup. The main results are: descriptions of holomorphic vector bundles on a blowup; conditions relating (semi)-stability of these to that of their direct images on the surface; sheaf-theoretic constructions for \"stabilising\" unstable bundles and desingularising moduli of stable bundles; an analysis of the behaviour of Hermitian-Einstein connections on bundles over blowups as the underlying Gauduchon metric degenerates; the definition of a topology on equivalence classes of stable bundles on blowups over a surface and a proof (using results of a concurrent preprint) that this topology is compact in many cases---i.e., a new compactification for moduli of stable bundles on the original surface.
A solution for an initial value problem of the box and ball system is constructed from a solution of the periodic box and ball system. The construction is done through a specific limiting process based on the theory of tropical geometry. This method gives a tropical analogue of the Krichever construction, which is an algebro-geometric method to construct exact solutions to integrable systems, for the non-periodic system.
Let $A$ be an Artinian local ring with algebraically closed residue field $k$, and let $\\mathbf{G}$ be an affine smooth group scheme over $A$. The Greenberg functor $\\mathcal{F}$ associates to $\\mathbf{G}$ a linear algebraic group $G:=(\\mathcal{F}\\mathbf{G})(k)$ over $k$, such that $G\\cong\\mathbf{G}(A)$. We prove that if $\\mathbf{G}$ is a reductive group scheme over $A$, and $\\mathbf{T}$ is a maximal torus of $\\mathbf{G}$, then $T$ is a Cartan subgroup of $G$, and every Cartan subgroup of $G$ is obtained uniquely in this way. The proof is based on establishing a Nullstellensatz analogue for smooth affine schemes with reduced fibre over $A$, and that the Greenberg functor preserves certain normaliser group schemes over $A$. Moreover, we prove that if $\\mathbf{G}$ is reductive and $\\mathbf{P}$ is a parabolic subgroup of $\\mathbf{G}$, then $P$ is a self-normalising subgroup of $G$, and if $\\mathbf{B}$ and $\\mathbf{B} $ are two Borel subgroups of $\\mathbf{G}$, then the corresponding subgroups $B$ and $B $ are conjugate in $G$.
Let X be a projective hypersurface in P_k^n of degree d <= n. In this paper we study the relation between the class [X] in K_0(Var_k) and the existence of k-rational points. Using elementary geometric methods we show, for some particular X, that X(k) is nonempty if and only if [X] is equivalent to 1 modulo the class of the affine line in K_0(Var_k). More precisely we consider the following cases: a union of hyperplanes, a quadric, a cubic hypersurface with a singular k-rational point, and a quartic which is a union of two quadrics one of which being smooth.
These are notes from talks of the authors on some explicit examples of families of Calabi-Yau threefolds which are parametrised by a Shimura variety. We briefly review the periods of Calabi-Yau threefolds and we discuss a recent result on Picard-Fuchs equations for threefolds which are hypersurfaces with many automorphisms. Next various examples of families parametrised by Shimura varieties are given. Most of these are due to J.C. Rohde. The examples with an automorphism of order three are given in some detail. We recall that such families do not have maximally unipotent monodromy and that the Shimura varieties in these cases are ball quotients.
Let X be an irreducible smooth projective curve defined over complex numbers, S= {p_1, p_2,...,p_n} \\subset X$ a finite set of closed points and N > 1 a fixed integer. For any pair (r,d) in Z X Z/N, there exists a parabolic vector bundle R_{r,d,*} on X, with parabolic structure over S and all parabolic weights in Z/N, that has the following property: Take any parabolic vector bundle E_* of rank r on X whose parabolic points are contained in S, all the parabolic weights are in Z/N and the parabolic degree is d. Then E_* is parabolic semistable if and only if there is no nonzero parabolic homomorphism from R_{r,d,*} to E_*.
A rank one local system $\\LL$ on a smooth complex algebraic variety $M$ is admissible roughly speaking if the dimension of the cohomology groups $H^m(M,\\LL)$ can be computed directly from the cohomology algebra $H^*(M,\\C)$. We say that a line arrangement $\\A$ is of type $\\CC_k$ if $k \\ge 0 $ is the minimal number of lines in $\\A$ containing all the points of multiplicity at least 3. We show that if $\\A$ is a line arrangement in the classes $\\CC_k$ for $k\\leq 2$, then any rank one local system $\\LL$ on the line arrangement complement $M$ is admissible. Partial results are obtained for the class $\\CC_3$.
Three types of reciprocity laws for arithmetic surfaces are established. For these around a point or along a vertical curve, we first construct $K_2$ type central extensions, then introduce reciprocity symbols, and finally prove the law as an application of Parshin-Beilinson s theory of adelic complex. For reciprocity law along a horizontal curve, we first introduce a new type of arithmetic central extensions, then apply our arithmetic adelic cohomology theory and arithmetic intersection theory to prove the related reciprocity law. All this can be interpreted within the framework of arithmetic central extensions. We add an appendix to deal with some basic structures of such extensions.
An origami (also known as square-tiled surface) is a Riemann surface covering a torus with at most one branch point. Lifting two generators of the fundamental group of the punctured torus decomposes the surface into finitely many unit squares. By varying the complex structure of the torus one obtains easily accessible examples of Teichm\\\"uller curves in the moduli space of Riemann surfaces. The p-adic analogues of Riemann surfaces are Mumford curves. A p-adic origami is defined as a covering of Mumford curves with at most one branch point, where the bottom curve has genus one. A classification of all normal non-trivial p-adic origamis is presented and used to calculate some invariants. These can be used to describe p-adic origamis in terms of glueing squares.
There are many generalizations of the McKay correspondence for higher dimensional Gorenstein quotient singularities and there are some applications to compute the topological invariants today. But some of the invariants are completely different from the classical invariants, in particular for non-Gorenstein cases. In this paper, we would like to discuss the McKay correspondence for 2-dimensional quotient singularities via \"special\" representations which gives the classical topological invariants and give a new characterization of the special representations for cyclic quotient singularities in terms of combinatorics.
Let $k$ a field of characteristic zero. Let $X$ be a smooth, projective, geometrically rational $k$-surface. Let $\\mathcal{T}$ be a universal torsor over $X$ with a $k$-point et $\\mathcal{T}^c$ a smooth compactification of $\\mathcal{T}$. There is an open question: is $\\mathcal{T}^c$ $k$-birational equivalent to a projective space? We know that the unramified cohomology groups of degree 1 and 2 of $\\mathcal{T}$ and $\\mathcal{T}^c$ are reduced to their constant part. For the analogue of the third cohomology groups, we give a sufficient condition using the Galois structure of the geometrical Picard group of $X$. This enables us to show that $H^{3}_{nr}(\\mathcal{T}^{c},\\mathbb{Q}/\\mathbb{Z}(2))/H^3(k,\\mathbb{Q}/\\mathbb{Z}(2))$ vanishes if $X$ is a generalised Ch\\^atelet surface and that this group is reduced to its $2$-primary part if $X$ is a del Pezzo surface of degree at least 2.
In this article we study the transitivity of the group of automorphisms of real algebraic surfaces. We characterize real algebraic surfaces with very transitive automorphism groups. We give applications to the classification of real algebraic models of compact surfaces: these applications yield new insight into the geometry of the real locus, proving several surprising facts on this geometry. This geometry can be thought of as a half-way point between the biregular and birational geometries.
Using Lipman s results on resolution of two-dimensional singularities, we provide a form of resolution of singularities in codimension two for reduced quasi-excellent schemes. We deduce that operations of degree less than two on algebraic cycles are characterised by their values on classes of regular schemes. We provide several applications of this \"detection principle\", when the base is an arbitrary regular excellent scheme: integrality of the Chern character in codimension less than three, existence of weak forms of the second and third Steenrod squares, Adem relation for the first Steenrod square, commutativity and Poincar\\ e duality for bivariant Chow groups in small degrees. We also provide an application to the possible values of the Witt indices of non-degenerate quadratic forms in characteristic two.
Given two rational, properly parametrized space curves ${\\mathcal C}_1$ and ${\\mathcal C}_2$, where $\\CCC_2$ is contained in some plane $\\Pi$, we provide an algorithm to check whether or not there exist perspective or parallel projections mapping $\\CCC_1$ onto $\\CCC_2$, i.e. to recognize $\\CCC_2$ as the projection of $\\CCC_1$. In the affirmative case, the algorithm provides the eye point(s) of the perspective transformation(s), or the direction(s) of the parallel projection(s). The problem is mainly discussed from a symbolic point of view, but an approximate algorithm is also included.
We introduce a sequence of isolated curve singularities, the elliptic m-fold points, and an associated sequence of stability conditions, generalizing the usual definition of Deligne-Mumford stability. For every pair of integers 0<m<n, we prove that the moduli problem of n-pointed m-stable curves of arithmetic genus one is representable by a proper irreducible Deligne-Mumford stack. We also consider weighted variants of these stability conditions, and construct the corresponding moduli stacks. In forthcoming work, we will prove that these stacks have projective coarse moduli and use the resulting spaces to give a complete description of the log minimal model program for M_{1,n}.
Dropping separatedness in the definition of a toric variety, one obtains the more general notion of a toric prevariety. Toric prevarieties occur as ambient spaces in algebraic geometry and moreover they appear naturally as intermediate steps in quotient constructions. We first provide a complete description of the category of toric prevarieties in terms of convex-geometrical data, so-called systems of fans. In a second part, we consider actions of subtori H of the big torus of a toric prevariety X and investigate quotients for such actions. Using our language of systems of fans, we characterize existence of good prequotients for the action of H on X. Moreover, we show by means of an algorithmic construction that there always exists a toric prequotient for the action of H on X, that means an H-invariant toric morphism p from X to a toric prevariety Y such that every H-invariant toric morphism from X to a toric prevariety factors through p. Finally, generalizing a result of D. Cox, we prove that every toric prevariety occurs as the image of a categorical prequotient of an open toric subvariety of some complex affine space.
A result of Zelevinsky states that an orbit closure in the space of representations of the equioriented quiver of type $A_h$ is in bijection with the opposite cell in a Schubert variety of a partial flag variety $SL(n)/Q$. We prove that Zelevinsky s bijection is a scheme-theoretic isomorphism, which shows that the universal degeneracy schemes of Fulton are reduced and Cohen-Macaulay in arbitrary characteristic.
This text is my thesis, defended in June 2007, in the status it was at this time. The most important results are contained in the article \"Foncteur de Picard d un champ alg\\ ebrique\" to appear in \"Mathematische Annalen\" (see the preprint arXiv:0711.4545). In the article, some results have been added, and some previous results have been strengthened. However, the proofs of the results contained in the appendix (concerning the smooth-\\ etale cohomology on an algebraic stack) have been removed. The thesis is only put on the ArXiv to provide a more lasting reference than my webpage for these proofs.
We introduce the notion of the moduli stack of relations of a quiver. When the quiver with relations is derived-equivalent to an algebraic variety, the corresponding compact moduli scheme can be viewed as a compact moduli of noncommutative deformations of the variety. We study the case of noncommutative projective planes in detail, and discuss its relation with geometry of elliptic curves with level 3 structures.
It has been shown that a best rank-R approximation of an order-k tensor may not exist when R>1 and k>2. This poses a serious problem to data analysts using tensor decompositions. It has been observed numerically that, generally, this issue cannot be solved by consecutively computing and subtracting best rank-1 approximations. The reason for this is that subtracting a best rank-1 approximation generally does not decrease tensor rank. In this paper, we provide a mathematical treatment of this property for real-valued 2x2x2 tensors, with symmetric tensors as a special case. Regardless of the symmetry, we show that for generic 2x2x2 tensors (which have rank 2 or 3), subtracting a best rank-1 approximation results in a tensor that has rank 3 and lies on the boundary between the rank-2 and rank-3 sets. Hence, for a typical tensor of rank 2, subtracting a best rank-1 approximation increases the tensor rank.
We study D-modules generated by rational powers of holomorphic functions, and prove a sufficient condition for that a root of the Bernstein-Sato polynomial contributes to a difference between these D-modules. We then construct an example where a root does not contribute to a difference. This also solves an old open problem about the relation between the Milnor monodromy and the exponential of the residue of the Gauss-Manin connection on the saturation of the Brieskorn lattice.
We show that the infinitesimal deformations of the Brill--Noether locus $W_d$ attached to a smooth non-hyperelliptic curve $C$ are in one-to-one correspondence with the deformations of $C$. As an application, we prove that if a Jacobian $J$ deforms together with a minimal cohomology class out the Jacobian locus, then $J$ is hyperelliptic. In particular, this provides an evidence to a conjecture of Debarre on the classification of ppavs carrying a minimal cohomology class. Finally, we also study simultaneous deformations of Fano surfaces of lines and intermediate Jacobians.
We study nonnegative (psd) real sextic forms $q(x_0,x_1,x_2)$ that are not sums of squares (sos). Such a form has at most ten real zeros. We give a complete and explicit characterization of all sets $S\\subset\\mathbb{P}^2(\\mathbb{R})$ with $|S|=9$ for which there is a psd non-sos sextic vanishing in $S$. Roughly, on every plane cubic $X$ with only real nodes there is a certain natural divisor class $\\tau_X$ of degree~$9$, and $S$ is the real zero set of some psd non-sos sextic if, and only if, there is a unique cubic $X$ through $S$ and $S$ represents the class $\\tau_X$ on $X$. If this is the case, there is a unique extreme ray $\\mathbb{R}_+q_S$ of psd non-sos sextics through $S$, and we show how to find $q_S$ explicitly. The sextic $q_S$ has a tenth real zero which for generic $S$ does not lie in $S$, but which may degenerate into a higher singularity contained in $S$. We also show that for any eight points in $\\mathbb{P}^2(\\mathbb{R})$ in general position there exists a psd sextic that is not a sum of squares and vanishes in the given points.
We extend the notion of lattice polarization for K3 surfaces to families over a (not necessarily simply connected) base, in a way that gives control over the action of monodromy on the algebraic cycles, and discuss the uses of this new theory in the study of families of K3 surfaces admitting fibrewise symplectic automorphisms. We then give an application of these ideas to the study of Calabi-Yau threefolds admitting fibrations by lattice polarized K3 surfaces.
In their paper on multiplicity bounds (1998), Herzog and Srinivasan study the relationship between the graded Betti numbers of a homogeneous ideal I in a polynomial ring R and the degree of I. For certain classes of ideals, they prove a bound on the degree in terms of the largest and smallest Betti numbers, generalizing results of Huneke and Miller (1985). The bound is conjectured to hold in general; we study this using linkage. If R/I is Cohen-Macaulay, we may reduce to the case where I defines a zero-dimensional subscheme Y. If Y is residual to a zero-scheme Z of a certain type (low degree or points in special position), then we show that the conjecture is true for I_Y.
Let $R$ be a polynomial ring in $N$ variables over an arbitrary field $K$ and let $I$ be an ideal of $R$ generated by $n$ polynomials of degree at most 2. We show that there is a bound on the projective dimension of $R/I$ that depends only on $n$, and not on $N$. The proof depends on showing that if $K$ is infinite and $n$ is a positive integer, there exists a positive integer C(n), independent of $N$, such that any $n$ forms of degree at most 2 in $R$ are contained in a subring of $R$ generated over $K$ by at most $t \\leq C(n)$ forms $G_1, ,..., , G_t$ of degree 1 or 2 such that $G_1, ,..., , G_t$ is a regular sequence in $R$. C(n) is asymptotic to $2n^{2n}$.
Let $\\mathbf{F}$ be bounded convex polyhedron of $\\R^3_{\\geq}$ and $\\psi_k$ the homothety with center the origin and radius $k$. The convex polyhedron semigroup associated to $\\mathbf{F}$ is the semigroup $\\cup_{k\\in\\N}\\psi_k(\\mathbf{F})\\cap \\N^3$. In this work, we use topological and discrete geometrical tools to study this class of semigroups. We give conditions to know when one of these semigroups is finitely generated, we characterize the Cohen-Macaulay and Buchsbaum properties, and we provide a family of Gorenstein affine semigroups.
Let $(R,\\m,k)$ be a commutative noetherian local ring of Krull dimension $d$. We prove that the cohomology annihilator $\\ca(R)$ of $R$ is $\\m$-primary if and only if for some $n\\ge0$ the $n$-th syzygies in $\\mod R$ are constructed from syzygies of $k$ by taking direct sums/summands and a fixed number of extensions. These conditions yield that $R$ is an isolated singularity such that the bounded derived category $\\db(R)$ and the singularity category $\\ds(R)$ have finite dimension, and the converse holds when $R$ is Gorenstein. We also show that the modules locally free on the punctured spectrum are constructed from syzygies of finite length modules by taking direct sums/summands and $d$ extensions. This result is exploited to investigate several ascent and descent problems between $R$ and its completion $\\widehat R$.
Let $I$ denote an ideal of a local ring $(R,\\mathfrak{m})$ of dimension $n$. Let $M$ denote a finitely generated $R$-module. We study the endomorphism ring of the local cohomology module $H^c_I(M), c = \\grade (I,M)$. In particular there is a natural homomorphism $\\Hom_{\\hat{R}^I}(\\hat{M}^I, \\hat{M}^I)\\to \\Hom_{R}(H^c_{I}(M),H^c_{I}(M))$, where $\\hat{\\cdot}^I$ denotes the $I$-adic completion functor. We prove sufficient conditions such that it becomes an isomorphism. Moreover, we study a homomorphism of two such endomorphism rings of local cohomology modules for two ideals $J \\subset I$ with the property $\\grade(I,M) = \\grade(J,M)$. Our results extends constructions known in the case of $M = R$ (see e.g. \\cite{h1}, \\cite{p7}, \\cite{p1}).
This work is about the structure of the symbolic Rees algebra of the base ideal of a Cremona map. We give sufficient conditions under which this algebra has the \"expected form\" in some sense. The main theorem in this regard seemingly covers all previous results on the subject so far. The proof relies heavily on a criterion of birationality and the use of the so-called inversion factor of a Cremona map. One adds a pretty long selection of examples of plane and space Cremona maps tested against the conditions of the theorem, with special emphasis on Cohen--Macaulay base ideals.
Let $(R,\\mathfrak{m})$ denote a local ring with $E = E_R(R/\\mathfrak{m})$ the injective hull of the residue field. Let $\\mathfrak{p} \\in \\Spec R$ denote a prime ideal with $\\dim R/\\mathfrak{p} = 1$, and let $E_R(R/\\mathfrak{p})$ be the injective hull of $R/\\mathfrak{p}$. As the main result we prove that the Matlis dual $\\Hom_R(E_R(R/\\mathfrak{p}), E)$ is isomorphic to $\\hat{R_{\\mathfrak{p}}}$, the completion of $R_{\\mathfrak{p}}$, if and only if $R/\\mathfrak{p}$ is complete. In the case of $R$ a one dimensional domain there is a complete description of $Q \\otimes_R \\hat{R}$ in terms of the completion $\\hat{R}$.
Recent results of Kahle and Miller give a method of constructing primary decompositions of binomial ideals by first constructing \"mesoprimary decompositions\" determined by their underlying monoid congruences. These mesoprimary decompositions are highly combinatorial in nature, and are designed to parallel standard primary decomposition over Noetherean rings. In this paper, we generalize mesoprimary decomposition from binomial ideals to \"binomial submodules\" of certain graded modules over the corresponding monoid algebra, analogous to the way primary decomposition of ideals over a Noetherean ring $R$ generalizes to $R$-modules. The result is a combinatorial method of constructing primary decompositions that, when restricting to the special case of binomial ideals, coincides with the method introduced by Kahle and Miller.
Let $G$ be a graph, $\\chi(G)$ be the minimal number of colors which can be assigned to the vertices of $G$ in such a way that every two adjacent vertices have different colors and $\\omega(G)$ to be the least upper bound of the size of the complete subgraphs contained in $G$. It is well-known that $\\chi(G)\\geq \\omega(G)$. Beck in \\cite{b} conjectured that $\\chi(\\Gamma_0(R))=\\omega(\\Gamma_0(R))$ if $\\omega(\\Gamma_0(R))<\\infty$, where $\\Gamma_0(R)$ is a graph associated to a commutative ring $R$. In this note, we provide some sufficient conditions for a ring $R$ to enjoy $\\chi(\\Gamma_0(R))=\\omega(\\Gamma_0(R))$. As a consequence, we verify Beck s conjecture for the homomorphic image of $\\mathbb{Z}^n$.
Let A be the ring obtained by localizing the polynomial ring k[X,Y,Z,W] over a field k at the maximal ideal (X,Y,Z,W) and modulo the ideal (XW-YZ). Let p be the ideal of A generated by X and Y. We study the module structure of a minimal injective resolution of A/p in details using local cohomology. Applications include the description of Ext^i(M,A/p), where M is a module constructed by Dutta, Hochster and McLaughlin, and the Yoneda product of Ext^*(A/p,A/p).
Let R be a complete discrete valuation ring with maximal ideal generated by pi. Let f(X) in R[X] be a monic polynomial with nonzero discriminant Delta(f). Let s >= v_pi(Delta(f)) + 1. Suppose given a factorisation of f(X) in (R/pi^s R)[X] into several factors, not necessarily coprime in (R/pi R)[X]. We lift it uniquely to a factorisation of f(X) in R[X]. This generalises the Hensel-Rychlik Lemma, which covers the case of two factors. We work directly with lifts of factorisations into several factors and avoid having to iterate factorisations into two factors. For this purpose we define a resultant for several polynomials in one variable as determinant of a generalised Sylvester matrix.
Motivated by the work of Chudnovsky and the Eisenbud-Mazur Conjecture on evolutions, Harbourne and Huneke give a series of conjectures that relate symbolic and regular powers of ideals of fat points in $\\mathbb P^n$. The conjectures involve both containment statements and bounds for the initial degree in which there is a non-zero form in an ideal. Working with initial degrees, we verify two of these conjectures for special line count configurations in projective 2-space over an algebraically closed field of characteristic 0.
Let $(S, \\mathfrak n) $ be a regular local ring and let $I \\subseteq \\mathfrak n^2 $ be a perfect ideal of $S. $ Sharp upper bounds on the minimal number of generators of $I$ are known in terms of the Hilbert function of $R=S/I. $ Starting from information on the ideal $I, $ for instance the minimal number of generators, a difficult task is to find good bounds on the minimal number of generators of the leading ideal $I^* $, which defines the tangent cone of $R$ or to give information on its graded structure. Motivated by papers of S.C. Kothari, S. Goto ${\\it{et al.}}$ concerning the leading ideal of a complete intersection $I=(f,g) $ in a regular local ring, we present results provided ht$(I)=2.$ If $I$ is a complete intersection, we prove that the Hilbert function of $R$ determines the graded Betti numbers of the leading ideal and, as a consequence, we recover most of the results of the previously quoted papers. The description is more complicated if $\\nu(I) >2$ and a careful investigation can be provided when $\\nu(I)=3. $ Several examples illustrating our results are given.
Let R be a one-dimensional local Noetherian domain, which is supposed analytically irreducible and residually rational, and let I be a proper ideal of R. Our purpose is to study the two numbers l(I^*/R)-l(R/I) and rl(R/I)-l(I^*/R) (l denotes the length, r the Cohen-Macaulay type) already considered in the literature under various points of view. The basic idea is the expression of these invariants in terms of the type sequence.
Using the description of the Frobenius limit of modules over the ring of invariants under an action of a finite group on a polynomial ring over a field of characteristic $p>0$ developed by Symonds and the author, we give a characterization of the ring of invariants with a positive dual $F$-signature. Combining this result and Kemper s result on depths of the ring of invariants under an action of a permutation group, we give an example of an $F$-rational, but non-$F$-regular ring of invariants under the action of a finite group.
Let $R=k[x_1,..., x_n]$ be a polynomial ring over a field $k$ of characteristic $p>0,$ let $\\m=(x_1,..., x_n)$ be the maximal ideal generated by the variables, let $^*E$ be the naturally graded injective hull of $R/\\m$ and let $^*E(n)$ be $^*E$ degree shifted downward by $n.$ We introduce the notion of graded $F$-modules (as a refinement of the notion of $F$-modules) and show that if a graded $F$-module $\\M$ has zero-dimensional support, then $\\M,$ as a graded $R$-module, is isomorphic to a direct sum of a (possibly infinite) number of copies of $^*E(n).$ As a consequence, we show that if the functors $T_1,...,T_s$ and $T$ are defined by $T_{j}=H^{i_j}_{I_j}(-)$ and $T=T_1\\circ...\\circ T_s,$ where $I_1,..., I_s$ are homogeneous ideals of $R,$ then as a naturally graded $R$-module, the local cohomology module $H^{i_0}_{\\m}(T(R))$ is isomorphic to $^*E(n)^c,$ where $c$ is a finite number. If $\\text{char}k=0,$ this question is open even for $s=1.$
We consider a finite dimensional representation of the dihedral group $D_{2p}$ over a field of characteristic two where $p$ is an odd prime and study the corresponding Hilbert ideal $I_H$. We show that $I_H$ has a universal Gr\\\" {o}bner basis consisting of invariants and monomials only. We provide sharp bounds for the degree of an element in this basis and in a minimal generating set for $I_H$. We also compute the top degree of coinvariants.
Given a double complex $X$ there are spectral sequences with the $E_2$ terms being either H$_I$ (H$_{II}(X))$ or H$_{II}($H$_I (X))$. But if $H_I(X)=H_{II}(X)=0$ both spectral sequences have all their terms 0. This can happen even though there is nonzero (co)homology of interest associated with $X$. This is frequently the case when dealing with Tate (co)homology. So in this situation the spectral sequences may not give any information about the (co)homology of interest. In this article we give a different way of constructing homology groups of $X$ when H$_I(X)=$H$_{II}(X)=0$. With this result we give a new and elementary proof of balance of Tate homology and cohomology.
Let $R$ denote a commutative Noetherian (not necessarily local) ring, $\\frak a$ an ideal of $R$ and $M$ a finitely generated $R$-module. The purpose of this paper is to show that $f^n_{\\frak a}(M)=\\inf \\{0\\leq i\\in\\mathbb{Z}|, \\dim H^{i}_{\\frak a}(M)/N \\geq n, , \\text{for any finitely generated submodule},, N \\subseteq H^{i}_{\\frak a}(M)\\}$, where $n$ is a non-negative integer and the invariant $f^n_{\\frak a}(M):=\\inf\\{f_{\\frak a R_{\\frak p}}(M_{\\frak p}),,|,,{\\frak p}\\in \\Supp M/\\frak a M,,{\\rm and},,\\dim R/{\\frak p}\\geq n\\}$ is the $n$-th finiteness dimension of $M$ relative to $\\frak a$. As a consequence, it follows that the set $$ \\Ass_R(\\oplus _{i=0}^{f^n_{\\frak a}(M)}H^{i}_{\\frak a}(M))\\cap \\{\\frak p\\in \\Spec R|, \\dim R/\\frak p\\geq n\\}$$ is finite. This generalizes the main result of Quy \\cite{Qu}, Brodmann-Lashgari \\cite{BL} and Asadollahi-Naghipour \\cite{AN}.
For a Noetherian local domain $R$ let $R^+$ be the absolute integral closure of $R$ and let $R_{\\infty}$ be the perfect closure of $R$, when $R$ has prime characteristic. In this paper we investigate the projective dimension of residue rings of certain ideals of $R^+$ and $R_{\\infty}$. In particular, we show that any prime ideal of $R_{\\infty}$ has a bounded free resolution of countably generated free $R_{\\infty}$-modules. Also, we show that the analogue of this result is true for the maximal ideals of $R^+$, when $R$ has residue prime characteristic. We compute global dimensions of $R^+$ and $R_{\\infty}$ in some cases. Some applications of these results are given.
Let (R,m) be a regular local ring with prime ideals p and q such that p+q is m-primary and dim(R/p)+dim(R/q)=dim(R). It has been conjectured by Kurano and Roberts that p^{(n)} \\cap q \\subseteq m^{n+1} for all positive integers n. We discuss this conjecture and related conjectures. In particular, we prove that this conjecture holds for all regular local rings if and only if it holds for all localizations of polynomial algebras over complete discrete valuation rings. In addition, we give examples showing that certain generalizations to nonregular rings do not hold.
We introduce the notion of b-sequence for finitely generated modules over Noetherian rings, which characterizes long Bourbaki sequences. Our main concern is an application of this notion to generalized Cohen-Macaulay approximation, which we introduced lately. We will show how we can construct long Bourbaki sequences of non-trivial type characterizing generalized Cohen-Macaualy ideals by finding suitable b-sequences.
Let $(R,\\fm)$ be a commutative Noetherian local ring and let $M$ be an $R$-module which is a relative Cohen-Macaulay with respect to a proper ideal $\\fa$ of $R$ and set $n:=\\h_{M}\\fa$. We prove that $\\ind M<\\infty$ if and only if $\\ind\\H^{n}_\\fa(M)<\\infty$ and that $\\ind\\H^{n}_\\fa(M)=\\ind M-n$. We also prove that if $R$ has a dualizing complex and $\\Gid_{R} M<\\infty$, then $\\Gid_{R}\\H^{n}_\\fa(M)<\\infty$ and $\\Gid_{R}\\H^{n}_\\fa(M)=\\Gid_{R} M-n$. Moreover if $R$ and $M$ are Cohen-Macaulay, then it is proved that $\\Gid_{R} M<\\infty$ whenever $\\Gid_{R}\\H^{n}_\\fa(M)<\\infty$. Next, for a finitely generated $R$-module $M$ of dimension $d$, it is proved that if $K_{\\hat M}$ is Cohen-Macaulay and $\\Gid_{R}\\H_{\\fm}^{d}(M)<\\infty$, then$\\Gid_{R}\\H_{\\fm}^{d}(M)=\\depth R- d.$ The above results have consequences which improve some known results and provide characterizations of Gorenstein rings.
We prove a characterization of a P$\\star$MD, when $\\star$ is a semistar operation, in terms of polynomials (by using the classical characterization of Pr\\\"{u}fer domains, in terms of polynomials given by R. Gilmer and J. Hoffman \\cite{Gilmer/Hoffmann:1974}, as a model), extending a result proved in the star case by E. Houston, S.J. Malik and J. Mott \\cite{Houston/Malik/Mott:1984}. We also deal with the preservation of the P$\\star$MD property by ``ascent   and ``descent   in case of field extensions. In this context, we generalize to the P$\\star$MD case some classical results concerning Pr\\\"{u}fer domains and P$v$MDs. In particular, we reobtain as a particular case a result due to H. Pr\\\"{u}fer \\cite{Prufer} and W. Krull \\cite{Krull:1936} (cf. also F. Lucius \\cite{Lucius:1998} and F. Halter-Koch \\cite{Koch:2000}). Finally, we develop several examples and applications when $\\star$ is a (semi)star given explicitly (e.g. we consider the case of the ``standard   $v$--, $t$--, $b$--, $w$--operations or the case of semistar operations associated to appropriate families of overrings).
The purpose of this paper is to give affirmative answers to two open questions as follows. Let $(R, \\m)$ be a generalized Cohen-Macaulay Noetherian local ring. Both questions, the first question was raised by M. Rogers \\cite {R} and the second one is due to S. Goto and H. Sakurai \\cite {GS1}, ask whether for every parameter ideal $\\q$ contained in a high enough power of the maximal ideal $\\m $ the following statements are true: (1) The index of reducibility $N_R(\\q;R)$ is independent of the choice of $\\q$; and (2) $I^2=\\q I$, where $I=\\q:_R\\m$.
Let $(A,\\mathfrak{m})$ be a complete intersection ring of dimension $d$ and let $I$ be an $\\mathfrak{m}$-primary ideal. Let $M$ be a maximal \\CM \\ $A$-module. For $i = 0,1,\\cdots,d$, let $e_i^I(M)$ denote the $i^{th}$ Hilbert -coefficient of $M$ with respect to $I$. We prove that for $i = 0, 1, 2$, the function $j \\mapsto e_i^I(Syz_j^A(M))$ is of quasi-polynomial type with period $2$. Let $G_I(M)$ be the associated graded module of $M$ with respect to $I$. If $G_I(A)$ is Cohen-Macaulay and $\\dim A \\leq 2$ we also prove that the functions $j \\mapsto depth \\ G_I(Syz^A_{2j+i}(M))$ are eventually constant for $i = 0, 1$. Let $\\xi_I(M) = \\lim_{l \\rightarrow \\infty} depth \\ G_{I^l}(M)$. Finally we prove that if $\\dim A = 2$ and $G_I(A)$ is Cohen-Macaulay then the functions $j \\mapsto \\xi_I(Syz^A_{2j + i}(M))$ are eventually constant for $i = 0, 1$.
The set of Nash equilibria of a finite game is the set of nonnegative solutions to a system of polynomial equations. In this survey article we describe how to construct certain special games and explain how to find all the complex roots of the corresponding polynomial systems, including all the Nash equilibria. We then explain how to find all the complex roots of the polynomial systems for arbitrary generic games, by polyhedral homotopy continuation starting from the solutions to the specially constructed games. We describe the use of Groebner bases to solve these polynomial systems and to learn geometric information about how the solution set varies with the payoff functions. Finally, we review the use of the Gambit software package to find all Nash equilibria of a finite game.
Let $R$ be a commutative ring. A full additive subcategory $\\C$ of $R$-modules is triangulated if whenever two terms of a short exact sequence belong to $\\C$, then so does the third term. In this note we give a classification of triangulated subcategories of finitely generated modules over a principal ideal domain. As a corollary we show that in the category of finitely generated modules over a PID, thick subcategories (triangulated subcategories closed under direct summands), wide subcategories (abelian subcategories closed under extensions) and Serre subcategories (wide subcategories closed under kernels) coincide and correspond to specialisation closed subsets of $\\Spec(R)$.
When M is a finitely generated graded module over a standard graded algebra S and I is an ideal of S, it is known from work of Cutkosky, Herzog, Kodiyalam, R\\\"omer, Trung and Wang that the Castelnuovo-Mumford regularity of I^mM has the form dm+e when m >> 0. We give an explicit bound on the m$for which this is true, under the hypotheses that I is generated in a single degree and M/IM has finite length, and we explore the phenomena that occur when these hypotheses are not satisfied. Finally, we prove a regularity bound for a reduced, equidimensional projective scheme of codimension 2 that is similar to the bound in the Eisenbud-Goto conjecture [1984], under the additional hypotheses that the scheme lies on a quadric and has nice singularities.
Let $R=k[x_1, ..., x_n]/(x_1^d + ... + x_n^d)$, where $k$ is a field of characteristic $p$, $p$ does not divide $d$ and $n \\geq 3$. We describe a method for computing the test ideal for these diagonal hypersurface rings. This method involves using a characterization of test ideals in Gorenstein rings as well as developing a way to compute tight closures of certain ideals despite the lack of a general algorithm. In addition, we compute examples of test ideals in diagonal hypersurface rings of small characteristic (relative to $d$) including several that are not integrally closed. These examples provide a negative answer to Smith s (2000, Comm. in Alg.) question of whether the test id eal in general is always integrally closed.
For a finitely generated module $M$, over a commutative Noetherian local ring $(R, \\mathfrak{m})$, it is shown that there exist only a finite number of non--isomorphic top local cohomology modules $\\mathrm{H}_{\\mathfrak{a}}^{\\mathrm{dim} (M)}(M)$, for all ideals $\\mathfrak{a}$ of $R$. We present a reduced secondary representation for the top local cohomology modules with respect to an ideal. It is also shown that for a given integer $r\\geq 0$, if $\\mathrm{H}_{\\mathfrak{a}}^{r}(R/\\mathfrak {p})$ is zero for all $\\mathfrak{p}$ in $\\mathrm{Supp}(M)$, then $\\mathrm{H}_{\\mathfrak{a}}^{i}(M)= 0$ for all $i\\geq r$.
Let $D$ be an integral domain and $\\star$ a semistar operation stable and of finite type on it. In this paper, we are concerned with the study of the semistar (Krull) dimension theory of polynomial rings over $D$. We introduce and investigate the notions of $\\star$-universally catenarian and $\\star$-stably strong S-domains and prove that, every $\\star$-locally finite dimensional Pr\\\"{u}fer $\\star$-multiplication domain is $\\star$-universally catenarian, and this implies $\\star$-stably strong S-domain. We also give new characterizations of $\\star$-quasi-Pr\\\"{u}fer domains introduced recently by Chang and Fontana, in terms of these notions.
In this work we introduce a new set of invariants associated to the linear strands of a minimal free resolution of a $\\mathbb{Z}$-graded ideal $I\\subseteq R=\\Bbbk[x_1, \\ldots, x_n]$. We also prove that these invariants satisfy some properties analogous to those of Lyubeznik numbers of local rings. In particular, they satisfy a consecutiveness property that we prove first for Lyubeznik numbers. For the case of squarefree monomial ideals we get more insight on the relation between Lyubeznik numbers and the linear strands of their associated Alexander dual ideals. Finally, we prove that Lyubeznik numbers of Stanley-Reisner rings are not only an algebraic invariant but also a topological invariant, meaning that they depend on the homeomorphic class of the geometric realization of the associated simplicial complex and the characteristic of the base field.
In 1969, Osofsky proved that a chained ring (i.e., local arithmetical ring) with zero divisors has infinite weak global dimension; that is, the weak global dimension of an arithmetical ring is 0, 1, or infinite. In 2007, Bazzoni and Glaz studied the homological aspects of Prufer-like rings, with a focus on Gaussian rings. They proved that Osofsky s aforementioned result is valid in the context of coherent Gaussian rings (and, more generally, in coherent Prufer rings). They closed their paper with a conjecture sustaining that ``the weak global dimension of a Gaussian ring is 0, 1, or infinite. In 2010, Bakkari-Kabbaj-Mahdou provided an example of a Gaussian ring which is neither arithmetical nor coherent and has an infinite weak global dimension. In 2011, Abuhlail-Jarrar-Kabbaj introduced and investigated the new class of fqp-rings which stands strictly between the two classes of arithmetical rings and Gaussian rings. Then, they proved the Bazzoni-Glaz conjecture for fqp-rings. This paper surveys a few recent works in the literature on the weak global dimension of Prufer-like rings making this topic accessible and appealing to a broad audience. As a prelude to this, the first section of this paper provides full details for Osofsky s proof of the existence of a module with infinite projective dimension on a chained ring. Numerous examples -arising as trivial ring extensions- are provided to illustrate the concepts and results involved in this paper.
Among the several types of closures of an ideal $I$ that have been defined and studied in the past decades, the integral closure $\\bar{I}$ has a central place being one of the earliest and most relevant. Despite this role, it is often a difficult challenge to describe it concretely once the generators of $I$ are known. Our aim in this note is to show that in a broad class of ideals their radicals play a fundamental role in testing for integral closedness, and in case $I\\neq \\bar{I}$, $\\surd{I}$ is still helpful in finding some fresh new elements in $\\bar{I}\\setminus I$. Among the classes of ideals under consideration are: complete intersection ideals of codimension two, generic complete intersection ideals, and generically Gorenstein ideals.
Given a square matrix $B$ over a principal ideal domain $D$ and an ideal $J$ of $D$, the $J$-ideal of $B$ consists of the polynomials $f\\in D[X]$ such that all entries of $f(B)$ are in $J$. It has been shown that in order to determine all $J$-ideals of $B$ it suffices to compute a generating set of the $(p^t)$-ideal of $B$ for finitely many prime powers $p^t$. Moreover, it is known that $(p^t)$-ideals are generated by polynomials of the form $p^{t-s}\\nu_s$ where $\\nu_s$ is a monic polynomial of minimal degree in the $(p^s)$-ideal of $B$ for some $s\\le t$. However, except for the case of diagonal matrices, it was not known how to determine these polynomials explicitly. We present an algorithm which allows to compute the polynomials $\\nu_s$ for general square matrices. Exploiting one of McCoy s theorems we first compute some set of generators of the $(p^s)$-ideal of $B$ which then can be used to determine $\\nu_s$. This algorithmic computation significantly extends our understanding of the $J$-ideals of $B$.
Let $(R,\\fm)$ be a Cohen-Macaulay local ring of positive dimension $d$ and infinite residue field. Let $I$ be an $\\fm$-primary ideal of $R$ and $J$ be a minimal reduction of $I$. In this paper we show that if $\\widetilde{I^k}=I^k$ and $J\\cap I^n=JI^{n-1}$ for all $n\\geq k+2$, then $\\widetilde{I^n}=I^n$ for all $n\\geq k$. As a consequence, we can deduce that if $r_J(I)=2$, then $\\widetilde{I}=I$ if and only if $\\widetilde{I^n}=I^n$ for all $n\\geq 1$. Moreover, we recover some main results [\\ref{Cpv}] and [\\ref{G}]. Finally, we give a counter example for question 3 of [\\ref{P1}].
We will prove that if $G$ and $H$ are modules over a principal ideal domain $R$ such that the endomorphism rings $\\mathrm{End}_R(R\\oplus G)$ and $\\mathrm{End}_R(R\\oplus H)$ are isomorphic then $G\\cong H$. Conversely, if $R$ is a Dedekind domain such that two $R$-modules $G$ and $H$ are isomorphic whenever the rings $\\mathrm{End}_R(R\\oplus G)$ and $\\mathrm{End}_R(R\\oplus H)$ are isomorphic then $R$ is a PID.
Much work has been done on generalized factorization techniques in integral domains, namely $\\tau$-factorization. There has also been substantial progress made in investigating factorization in commutative rings with zero-divisors. There are many ways authors have decided to study factorization when zero-divisors present. This paper focuses on the method $\\tau$-complete factorizations developed by D.D. Anderson and A. Frazier. There is a natural way to extend $\\tau$-complete factorization to commutative rings with zero-divisors. $\\tau$-complete factorization is a natural way to think of refining factorizations into smaller pieces until one simply cannot refine any further. We see that this notion translates well into the case of commutative rings with zero-divisors and there is an interesting relationship between the $\\tau$-complete finite factorization properties and the original $\\tau$-finite factorization properties in rings with zero-divisors developed by the author in 2012.
Let $X$ be a chain complex over a commutative noetherian ring $R$, that is, an object in the derived category $\\mathcal{D}(R)$. We investigate the small support and co-support of $X$, introduced by Foxby and Benson, Iyengar, and Krause. We show that the derived functors $M \\otimes_R^{\\mathbf{L}} -$ and $\\mathbf{R}\\operatorname{Hom}_R(M,-)$ can detect isomorphisms in $\\mathcal{D}(R)$ between complexes with restrictions on their supports or co-supports. In particular, the derived local (co)homology functors $\\mathbf{R}\\Gamma_{\\mathfrak{a}}(-)$ and $\\mathbf{L}\\Lambda_{\\mathfrak{a}}(-)$ with respect to an ideal $\\mathfrak{a}\\subsetneq R$ have the same ability. Furthermore, we give reprove some results of Benson, Iyengar, and Krause in our setting, with more direct proofs. Also, we include some computations of co-supports, since this construction is still quite mysterious. Lastly, we investigate \"$\\mathfrak{a}$-adically finite\" $R$-complexes, that is, the $X\\in\\mathcal{D}(R)$ that are $\\mathfrak{a}$-cofinite \\textit{\\`a la} Hartshorne. For instance, we characterize these complexes in terms of a finiteness condition on $\\mathbf{L}\\Lambda_{\\mathfrak{a}}(X)$.
Let R be a local ring with maximal ideal m admitting a non-zero element a\\in\\fm for which the ideal (0:a) is isomorphic to R/aR. We study minimal free resolutions of finitely generated R-modules M, with particular attention to the case when m^4=0. Let e denote the minimal number of generators of m. If R is Gorenstein with m^4=0 and e\\ge 3, we show that \\Poi MRt is rational with denominator \\HH R{-t} =1-et+et^2-t^3, for each finitely generated R-module M. In particular, this conclusion applies to generic Gorenstein algebras of socle degree 3.
We investigate decompositions of Betti diagrams over a polynomial ring within the framework of Boij-S\\\"oderberg theory. That is, given a Betti diagram, we determine if it is possible to decompose it into the Betti diagrams of complete intersections. To do so, we determine the extremal rays of the cone generated by the diagrams of complete intersections and provide a rudimentary algorithm for decomposition.
We consider the lattice-ordered groups Inv$(R)$ and Div$(R)$ of invertible and divisorial fractional ideals of a completely integrally closed Pr\\\"ufer domain. We prove that Div$(R)$ is the completion of the group Inv$(R)$, and we show there is a faithfully flat extension $S$ of $R$ such that $S$ is a completely integrally closed B\\ ezout domain with Div$(R) \\cong $ Inv$(S)$. Among the class of completely integrally closed Pr\\\"ufer domains, we focus on the one-dimensional Pr\\\"ufer domains. This class includes Dedekind domains, the latter being the one-dimensional Pr\\\"ufer domains whose maximal ideals are finitely generated. However, numerous interesting examples show that the class of one-dimensional Pr\\\"ufer domains includes domains that differ quite significantly from Dedekind domains by a number of measures, both group-theoretic (involving Inv$(R)$ and Div$(R)$) and topological (involving the maximal spectrum of $R$). We examine these invariants in connection with factorization properties of the ideals of one-dimensional Pr\\\"ufer domains, putting special emphasis on the class of almost Dedekind domains, those domains for which every localization at a maximal ideal is a rank one discrete valuation domain, as well as the class of SP-domains, those domains for which every proper ideal is a product of radical ideals. For this last class of domains, we show that if in addition the ring has nonzero Jacobson radical, then the lattice-ordered groups Inv$(R)$ and Div$(R)$ are determined entirely by the topology of the maximal spectrum of $R$, and that the Cantor-Bendixson derivatives of the maximal spectrum reflect the distribution of sharp and dull maximal ideals.
Let $K$ be a field, $R$ a standard graded $K$-algebra and $M$ be a finitely generated graded $R$-module. The rate of $M$, $rate_R(M)$, is a measure of the growth of the shifts in the minimal graded free resolution of $M$. In this paper, we find upper bounds for this invariant. More precisely, let $(A,\\mathfrak{n})$ be a regular local ring and $I\\subseteq \\mathfrak{n} ^t$ be an ideal of $A$, where $t\\geq 2$. We prove that if $(B=A/I, \\mathfrak{m} =\\mathfrak{n} /I)$ is a Cohen-Macaulay local ring with multiplicity $e(B)= \\binom{h+t-1}{h}$, where $h=embdim(B)-dim B$, then $rat(gr_{\\mathfrak{m}}(B))=t-1$ and for every $B$-module $N$, which annihilated by a minimal reduction of $\\mathfrak{m}$, $rate_{gr_{\\mathfrak{m} }(B)}(gr_{\\mathfrak{m} }(N))\\leq t-1$.
This paper is the continuation of the previous work on generalized compressed algebras (GCA s). First we exhibit a new class of socle-vectors $s$ which admit a GCA (whose $h$-vector is lower than the upper-bound $H$ of Theorem A of the previous paper). In particular, it follows that for every socle-vector $s$ of type 2 there exists a GCA (in any codimension $r$). The main result of this paper is the following: there exist pairs $(r,s)$ which do not admit a GCA. Moreover, the way this pathology occurs may be \"arbitrarily bad\" (even in codimension 3). Finally, we start considering the difficult problem of characterizing the pairs $(r,s)$ which admit a GCA, focusing on a particular class of socle-vectors of codimension 3.
Let $C \\subset {\\bf N}^d$ be an affine semigroup, and $R=K[C]$ its semigroup ring. This paper is a collection of various results on \"$C$-graded\" $R$-modules, especially, monomial ideals. For example, we show the following: If $R$ is normal and $I$ is a radical monomial ideal (i.e., $R/I$ is a generalization of Stanley-Reisner rings), then the sequentially Cohen-Macaulay property of $R/I$ is a topological property of the \"geometric realization\" of the cell complex associated with $I$. Moreover, we can give a squarefree modules/constructible sheaves version of this result.
Let k be a field, let R be a ring of polynomials in a finite number of variables over k, let D be the ring of k-linear differential operators of R and let f be a non-zero element of R. It is well-known that R_f, with its natural D-module structure, has finite length in the category of D-modules. We give a characteristic-free proof of this fact. To the best of our knowledge this is the first characteristic-free proof.
Let $K$ be a field and let $R$ be a regular domain containing $K$. Let $G$ be a finite subgroup of the group of automorphisms of $R$. We assume that $|G|$ is invertible in $K$. Let $R^G$ be the ring of invariants of $G$. Let $I$ be an ideal in $R^G$. Fix $i \\geq 0$. If $R^G$ is Gorenstein then, \\begin{enumerate} \\item $injdim_{R^G} H^i_I(R^G) \\leq \\dim \\ Supp \\ H^i_I(R^G).$ \\item $H^j_{\\mathfrak{m}}(H^i_I(R^G))$ is injective, where $\\mathfrak{m}$ is any maximal ideal of $R^G$. \\item $\\mu_j(P, H^i_I(R^G)) = \\mu_j(P^\\prime, H^i_{IR}(R))$ where $P^\\prime$ is any prime in $R$ lying above $P$. \\end{enumerate} We also prove that if $P$ is a prime ideal in $R^G$ with $R^G_P$ \\textit{not Gorenstein} then either the bass numbers $\\mu_j(P, H^i_I(R^G)) $ is zero for all $j$ or there exists $c$ such that $\\mu_j(P, H^i_I(R^G)) = 0 $ for $j < c$ and $\\mu_j(P, H^i_I(R^G)) > 0$ for all $j \\geq c$.
In this paper we show that there is a close relationship between the invariants characterizing the homogeneous vanishing of the local cohomology of the Rees algebra and the associated graded ring for the good filtrations case. We obtain relationships between the Castelnuovo-Mumford regularity of the fiber cone, associated graded ring, Rees algebra and reduction number for the good filtrations case.
Let $A$ be a graded complete intersection over a field and $B$ the monomial complete intersection with the generators of the same degrees as $A$. The EGH conjecture says that if $I$ is a graded ideal in $A$, then there should be an ideal $J$ in $B$ such that $B/J$ and $A/I$ have the same Hilbert function. We show that if the EGH conjecture is true, then it can be used to prove that every graded complete intersection over any field has the Sperner property.
We consider finite dimensional representations of the dihedral group $D_{2p}$ over an algebraically closed field of characteristic two where $p$ is an odd integer and study the degrees of generating and separating polynomials in the corresponding ring of invariants. We give an upper bound for the degrees of the polynomials in a minimal generating set that does not depend on $p$ when the dimension of the representation is sufficiently large. We also show that $p+1$ is the minimal number such that the invariants up to that degree always form a separating set. As well, we give an explicit description of a separating set when $p$ is prime.
Let $I$ be an ideal of a Noetherian ring R and M be a finitely generated R-module. We introduce the class of extension modules of finitely generated modules by the class of all modules $T$ with $\\dim T\\leq n$ and we show it by ${\\rm FD_{\\leq n}}$ where $n\\geq -1$ is an integer. We prove that for any ${\\rm FD_{\\leq 0}}$(or minimax) submodule N of $H^t_I(M)$ the R-modules ${\\rm Hom}_R(R/I,H^{t}_I(M)/N) {\\rm and} {\\rm Ext}^1_R(R/I,H^{t}_I(M)/N)$ are finitely generated, whenever the modules $H^0_I(M)$, $H^1_I(M)$, ..., $H^{t-1}_I(M)$ are ${\\rm FD_{\\leq 1}}$ (or weakly Laskerian). As a consequence, it follows that the associated primes of $H^{t}_I(M)/N$ are finite. This generalizes the main results of Bahmanpour and Naghipour, Brodmann and Lashgari, Khashyarmanesh and Salarian, and Hong Quy. We also show that the category $\\mathscr {FD}^1(R,I)_{cof}$ of $I$-cofinite ${\\rm FD_{\\leq1}}$ ~ $R$-modules forms an Abelian subcategory of the category of all $R$-modules.
It is proved that when R is a local ring of positive characteristic, $\\phi$ is its Frobenius endomorphism, and some non-zero finite R-module has finite flat dimension or finite injective dimension for the R-module structure induced through $\\phi$, then R is regular. This broad generalization of Kunz s characterization of regularity in positive characteristic is deduced from a theorem concerning a local ring R with residue field of k of arbitrary characteristic: If $\\phi$ is a contracting endomorphism of R, then the Betti numbers and the Bass numbers over $\\phi$ of any non-zero finitely generated R-module grow at the same rate, on an exponential scale, as the Betti numbers of k over R.
Several authors investigating the asymptotic behaviour of the Betti diagrams of the graded system obtained by taking powers of an ideal have shown that the shape of the nonzero entries in the diagrams stabilizes when $I$ is a homogeneous ideal with generators of the same degree. In this paper, we study the Betti diagrams of graded systems of ideals built by taking the initial ideals or generic initial ideals of powers, and discuss the stabilization of additional collections of Betti diagrams. Our main result shows that when I has generators of the same degree, the entries in the Betti diagrams of the reverse lexicographic generic initial system are given asymptotically by polynomials and that the shape of the diagrams stabilizes.
We use the theory of resolutions for a given Hilbert function to investigate the multiplicity conjectures of Huneke and Srinivasan and Herzog and Srinivasan. To prove the conjectures for all modules with a particular Hilbert function, we show that it is enough to prove the statements only for elements at the bottom of the partially ordered set of resolutions with that Hilbert function. This enables us to test the conjectured upper bound for the multiplicity efficiently with the computer algebra system Macaulay 2, and we verify the upper bound for many Artinian modules in three variables with small socle degree. Moreover, with this approach, we show that though numerical techniques have been sufficient in several of the known special cases, they are insufficient to prove the conjectures in general. Finally, we apply a result of Herzog and Srinivasan on ideals with a quasipure resolution to prove the upper bound for Cohen-Macaulay quotients by ideals with generators in high degrees relative to the regularity.
We study a question raised by Eisenbud, Mustata, and Stillman regarding the injectivity of natural maps from Ext modules to local cohomology modules. We obtain some positive answers to this question which extend earlier results of Lyubeznik. In the process, we also prove a vanishing theorem for local cohomology modules which connects theorems previously known in the case of positive characteristic and in the case of monomial ideals.
Test ideals are an important concept in tight closure theory and their behavior via flat base change can be very difficult to understand. Our paper presents results regarding this behavior under flat maps with reasonably nice (but far from smooth) fibers. This involves analyzing, in depth, a special type of ideal of test elements, called the CS test ideal. Besides providing new results, the paper also contains extensions of a theorem by G. Lyubeznik and K. E. Smith on the completely stable test ideal and of theorems by F. Enescu and, independently, M. Hashimoto on the behavior of F-rationality under flat base change.
In this paper we develop an axiomatic setup for algorithmic homological algebra of Abelian categories. This is done by exhibiting all existential quantifiers entering the definition of an Abelian category, which for the sake of computability need to be turned into constructive ones. We do this explicitly for the often-studied example Abelian category of finitely presented modules over a so-called computable ring $R$, i.e., a ring with an explicit algorithm to solve one-sided (in)homogeneous linear systems over $R$. For a finitely generated maximal ideal $\\mathfrak{m}$ in a commutative ring $R$ we show how solving (in)homogeneous linear systems over $R_{\\mathfrak{m}}$ can be reduced to solving associated systems over $R$. Hence, the computability of $R$ implies that of $R_{\\mathfrak{m}}$. As a corollary we obtain the computability of the category of finitely presented $R_{\\mathfrak{m}}$-modules as an Abelian category, without the need of a Mora-like algorithm. The reduction also yields, as a by-product, a complexity estimation for the ideal membership problem over local polynomial rings. Finally, in the case of localized polynomial rings we demonstrate the computational advantage of our homologically motivated alternative approach in comparison to an existing implementation of Mora s algorithm.
We relate the annihilators of graded components of the canonical module of a graded Cohen-Macaulay ring to colon ideals of powers of the homogeneous maximal ideal. In particular, we connect them to the core of the maximal ideal. An application of our results characterizes Cayley-Bacharach sets of points in terms of the structure of the core of the maximal ideal of their homogeneous coordinate ring. In particular, we show that a scheme is Cayley-Bacharach if and only if the core is a power of the maximal ideal.
Let $\\mathcal{S}$ be a class of finitely presented $R$-modules such that $R\\in \\mathcal{S}$ and $\\mathcal{S}$ has a subset $\\mathcal{S}^*,$ with the property that for any $U\\in \\mathcal{S}$ there is a $U^*\\in \\mathcal{S}^*$ with $U^*\\cong U.$ We show that the class of $\\mathcal{S}$-pure injective $R$-modules is preenveloping. As an application, we deduce that the left global $\\mathcal{S}$-pure projective dimension of $R$ is equal to its left global $\\mathcal{S}$-pure injective dimension. As our main result, we prove that, in fact, the class of $\\mathcal{S}$-pure injective $R$-modules is enveloping.
Let $G$ be a finite graph allowing loops, having no multiple edge and no isolated vertex. We associate $G$ with the edge polytope ${\\cal P}_G$ and the toric ideal $I_G$. By classifying graphs whose edge polytope is simple, it is proved that the toric ideals $I_G$ of $G$ possesses a quadratic Gr\\\"obner basis if the edge polytope ${\\cal P}_G$ of $G$ is simple. It is also shown that, for a finite graph $G$, the edge polytope is simple but not a simplex if and only if it is smooth but not a simplex. Moreover, the Ehrhart polynomial and the normalized volume of simple edge polytopes are computed.
We study the ring of arithmetical functions with unitary convolution, giving an isomorphism to a generalized power series ring on infinitely many variables, similar to the isomorphism of Cashwell-Everett between the ring of arithmetical functions with Dirichlet convolution and the power series ring on countably many variables. We topologize it with respect to a natural norm, and shove that all ideals are quasi-finite. Some elementary results on factorization into atoms are obtained. We prove the existence of an abundance of non-associate regular non-units.
In this paper, we present several algorithms for dealing with graded components of Laurent polynomial rings. To be more precise, let $S$ be the Laurent polynomial ring $k[x_1,...,x_{r},x_{r+1}^{\\pm 1},..., x_n^{\\pm 1}]$, $k$ algebraicaly closed field of characteristic 0. We define the multigrading of $S$ by an arbitrary finitely generated abelian group $A$. We construct a set of fans compatible with the multigrading and use this fans to compute the graded components of $S$ using polytopes. We give an algorithm to check whether the graded components of $S$ are finite dimensional. Regardless of the dimension, we determine a finite set of generators of each graded component as a module over the component of homogeneous polynomials of degree 0.
We study the relationship between the Tor-regularity and the local-regularity over a positively graded algebra defined over a field which coincide if the algebra is a standard graded polynomial ring. In this case both are characterizations of the so-called Castelnuovo--Mumford regularity. Moreover, we can characterize a standard graded polynomial ring as an algebra with extremal properties with respect to the Tor- and the local-regularity. For modules of finite projective dimension we get a nice formula relating the two regularity notions. Interesting examples are given to help to understand the relationship between the Tor- and the local-regularity in general.
An integral domain R is said to be a splinter if it is a direct summand, as an R-module, of every module-finite extension ring. Hochster s direct summand conjecture is precisely the conjecture that every regular local ring is a splinter. An integral domain containing the rational numbers is a splinter if and only if it is a normal ring, but the notion is more subtle for rings of positive characteristic: F-regular rings are splinters, and Hochster and Huneke proved that the converse is true for Gorenstein rings. We extend their result by showing that Q-Gorenstein splinters of positive characteristic are F-regular.
We define \"sliding functors\", which are exact endofunctors of the category of multi-graded modules over a polynomial ring. They preserve several invariants of modules, especially the (usual) depth and Stanley depth. In a similar way, we can also define the \"polarization functor\". While this idea has appeared in papers of Bruns-Herzog and Sbarra, we give slightly different approach. Keeping these functors in mind, we treat simplicial spheres of Bier-Murai type.
The content of a polynomial $f(t)$ is the ideal generated by its coefficients. Our aim here is to consider a beautiful formula of Dedekind-Mertens on the content of the product of two polynomials, to explain some of its features from the point of view of Cohen-Macaulay algebras and to apply it to obtain some Noether normalizations of certain toric rings. Furthermore, the structure of the primary decomposition of generic products is given and some extensions to joins of toric rings are considered.
Starting from \\cite{Ayy2} we compute the Groebner basis for the defining ideal, P, of the monomial curves that correspond to arithmetic sequences, and then give an elegant description of the generators of powers of the initial ideal of P, inP. The first result of this paper introduces a procedure for generating infinite families of Ratliff-Rush ideals, in polynomial rings with multivariables, from a Ratliff-Rush ideal in polynomial rings with two variables. The second result is to prove that all powers of inP are Ratliff-Rush. The proof is through applying the first result of this paper combined with Corollary (12) in \\cite{Ayy4}. This generalizes the work of \\cite{Ayy1} (or \\cite{Ayy11}) for the case of arithmetic sequences. Finally, we apply the main result of \\cite{Ayy3} to give the necessary and sufficient conditions for the integral closedness of any power of inP.
We extend Auslander and Buchsbaum s Euler characteristic from the category of finitely generated modules of finite projective dimension to the category of modules of finite G-dimension using Avramov and Martsinkovsky s notion of relative Betti numbers. We prove analogues of some properties of the classical invariant and provide examples showing that other properties do not translate to the new context. One unexpected property is in the characterization of the extremal behavior of this invariant: the vanishing of the Euler characteristic of a module M of finite G-dimension implies the finiteness of the projective dimension of M. We include two applications of the Euler characteristic as well as several explicit calculations.
To a pair $P$ and $Q$ of finite posets we attach the toric ring $K[P,Q]$ whose generators are in bijection to the isotone maps from $P$ to $Q$. This class of algebras, called isotonian, are natural generalizations of the so-called Hibi rings. We determine the Krull dimension of these algebras and for particular classes of posets $P$ and $Q$ we show that $K[P,Q]$ is normal and that their defining ideal admits a quadratic Gr\\\"obner basis.
In this paper we generalize the Ritt-Kolchin method of characteristic sets and the classical Gr\\\"obner basis technique to prove the existence and obtain methods of computation of multivariate difference-differential dimension polynomials associated with a finitely generated difference-differential field extension. We also give an interpretation of such polynomials in the spirit of the A. Einstein s concept of strength of a system of PDEs and determine their invariants, that is, characteristics of a finitely generated difference-differential field extension carried by every its dimension polynomial.
Let G be a finite group acting by automorphism on a lattice A, and hence on the group algebra S=k[A]. The algebra of G-invariants in S is called an algebra of multiplicative invariants. We investigate when algebras of multiplicative invariants are semigroup algebras. In particular, we present an explicit version of a result of Farkas stating that multiplicative invariants of finite reflection groups are indeed semigroup algebras. On the other hand, multiplicative invariants arising from fixed point free actions are shown to never be semigroup algebras. In particular, this holds whenever G has odd prime order.
We look at how the equivalence of tight closure and plus closure (or Frobenius closure) in the homogeneous m-coprimary case implies the same closure equivalence in the non-homogeneous m-coprimary case in standard graded rings. Although our result does not depend upon dimension, the primary application is based on results known in dimension 2 due to the recent results of H. Brenner. We also show that unlike the Noetherian case, the injective hull of the residue field over $R^+$ or $R^\\infty$ contains elements that are not killed by any power of the maximal ideal of R.
We investigate resolutions of letterplace ideals of posets. We develop topological results to compute their multigraded Betti numbers, and to give structural results on these Betti numbers. If the poset is a union of no more than $c$ chains, we show that the Betti numbers may be computed from simplicial complexes of no more than $c$ vertices. We also give a recursive procedure to compute the Betti diagrams when the Hasse diagram of $P$ has tree structure.
The Qth-power algorithm produces a useful canonical P-module presentation for the integral closures of certain integral extensions of $P:=\\mathbf{F}[x_n,...,x_1]$, a polyonomial ring over the finite field $\\mathbf{F}:=\\mathbf{Z}_q$ of $q$ elements. Here it is shown how to use this for several small primes $q$ to reconstruct similar integral closures over the rationals $\\mathbf{Q}$ using the Chinese remainder theorem to piece together presentations in different positive characteristics, and the extended Euclidean algorithm to reconstruct rational fractions to lift these to presentations over $\\mathbf{Q}$.
We consider infinite sequences {R_n} of successive local quadratic transforms of a regular local ring. Let S denote the directed union of the sequence of regular local rings R_n. We previously showed the existence of a unique limit point V of the family of order valuation rings of the sequence. In this paper, we examine asymptotic properties of this family of order valuations. We link this asymptotic behavior to ring-theoretic properties of S, namely whether S is archimedean and whether S is completely integrally closed. We construct examples of such S that are archimedean and completely integrally closed but not valuation domains. We give an explicit description of V, where the description depends on whether S is archimedean or non-archimedean.
Let $(a,a+d,a+2d)$ be an arithmetic progression of positive integers. The following statements are proved: (1) If $a\\mid 2d$, then $(a, a+d, a+2d)\\in\\mdeg(\\Tame(\\mathbb{C}^3))$. (2) If $a\\nmid 2d$, then, except for arithmetic progressions of the form $(4i,4i+ij,4i+2ij)$ with $i,j \\in\\mathbb{N}$ and $j$ is an odd number, $(a, a+d, a+2d)\\notin\\mdeg(\\Tame(\\mathbb{C}^3))$. We also related the exceptional unknown case to a conjecture of Jie-tai Yu, which concerns with the lower bound of the degree of the Poisson bracket of two polynomials.
Support and rank varieties of modules over a group algebra of an elementary abelian p-group have been well studied. In particular, Avrunin and Scott showed that in this setting, the rank and support varieties are equivalent. Avramov and Buchweitz proved an analogous result for pairs of modules over arbitrary commutative local complete intersection rings. In this paper we study support and rank varieties in the triangulated category of totally acyclic chain complexes over a complete intersection ring and show that these varieties are also equivalent.
A contemporary and exciting application of Groebner bases is their use in computational biology, particularly in the reverse engineering of gene regulatory networks from experimental data. In this setting, the data are typically limited to tens of points, while the number of genes or variables is potentially in the thousands. As such data sets vastly underdetermine the biological network, many models may fit the same data and reverse engineering programs often require the use of methods for choosing parsimonious models. Grobner bases have recently been employed as a selection tool for polynomial dynamical systems that are characterized by maps in a vector space over a finite field. While there are numerous existing algorithms to compute Groebner bases, to date none has been specifically designed to cope with large numbers of variables and few distinct data points. In this paper, we present an algorithm for computing Grobner bases of zero-dimensional ideals that is optimized for the case when the number m of points is much smaller than the number n of indeterminates. The algorithm identifies those variables that are essential, that is, in the support of the standard monomials associated to a polynomial ideal, and computes the relations in the Groebner bases in terms of these variables. When n is much larger than m, the complexity is dominated by nm^3. The algorithm has been implemented and tested in the computer algebra system Macaulay 2. We provide a comparison of its performance to the Buchberger-Moeller algorithm, as built into the system.
The question of when the Rees algebra ${\\mathcal R} (I)= \\bigoplus_{n \\ge 0}I^n$ of $I$ is an almost Gorenstein graded ring is explored, where $R$ is a two-dimensional regular local ring and $I$ a contracted ideal of $R$. It is known that ${\\mathcal R} (I)$ is an almost Gorenstein graded ring for every integrally closed ideal $I$ of $R$. The main results of the present paper show that if $I$ is a contracted ideal with $\\mathrm{o}(I) \\le 2$, then ${\\mathcal R} (I)$ is an almost Gorenstein graded ring, while if $\\mathrm{o}(I) \\ge 3$, then ${\\mathcal R} (I)$ is not necessarily an almost Gorenstein graded ring, even though $I$ is a contracted stable ideal. Thus both affirmative answers and negative answers are given.
Let $k$ be a field of characteristic $p > 0$ such that $[k:k^p] < \\infty$ and let $f \\in R = k[x_0, ..., x_n]$ be homogeneous of degree $d$. We obtain a sharp bound on the degrees in which the Frobenius action on $H^n_\\mathfrak{m}(R/fR)$ can be injective when $R/fR$ has an isolated non-F-pure point at $\\mathfrak{m}$. As a corollary, we show that if $(R/fR)_\\mathfrak{m}$ is not F-pure then $R/fR$ has an isolated non-F-pure point at $\\mathfrak{m}$ if and only if the Frobenius action is injective in degrees $\\le -n(d-1)$.
Let $R$ be a standard graded Noetherian algebra over an infinite field $K$ and $M$ a finitely generated $\\mathbb{Z}$-graded $R$-module. Then for any graded ideal $I\\subseteq R_+$ of $R$, we show that there exist integers $e_1\\geq e_2$ such that $r(I^nM)=\\rho_I(M)n+e_1$ and $D(I^nM)=\\rho_I(M)n+e_2$ for $n\\gg0$. Here $r(M)$ and $D(M)$ denote the reduction number of $M$ and the maximal degree of minimal generators of $M$ respectively, and $\\rho_I(M)$ is an integer determined by both $M$ and $I$. We introduce the notion of generalized regularity function $\\Gamma$ for a standard graded algebra over a Noetherian ring and prove that $\\Gamma(I^nM)$ is also a linear function in $n$ for $n\\gg 0$.
Let $S$ be a commutative ring with identity and $R$ a unitary subring of $S$. An ideal $I$ of $S$ is called an $R$-conductor ideal of $S$ if $I=\\{x\\in S\\mid xS\\subseteq V\\}$ for some intermediate ring $V$ of $R$ and $S$. In this note we present necessary and sufficient criterions for being an $R$-conductor ideal of $S$. We generalize several well known facts about them and present a simple approach to rediscover the results of both old and recent papers. We sketch the boundaries of our criterions by providing a few counterexamples.
We investigate the properties of categories of G_C-flat R-modules where C is a semidualizing module over a commutative noetherian ring R. We prove that the category of all G_C-flat R-modules is part of a weak AB-context, in the terminology of Hashimoto. In particular, this allows us to deduce the existence of certain Auslander-Buchweitz approximations for R-modules of finite G_C-flat dimension. We also prove that two procedures for building R-modules from complete resolutions by certain subcategories of G_C-flat R-modules yield only the modules in the original subcategories.
In this short note we prove that the projective dimension of a sequentially Cohen-Macaulay square-free monomial ideal is equal to the maximal height of its minimal primes (also known as the big height), or equivalently, the maximal cardinality of a minimal vertex cover of its facet complex. This in particular gives a formula for the projective dimension of facet ideals of these classes of ideals, which are known to be sequentially Cohen-Macaulay: graph trees and simplicial trees, chordal graphs and some cycles, chordal clutters and graphs, and some path ideals to mention a few. Since polarization preserves projective dimension, our result also gives the projective dimension of any sequentially Cohen-Macaulay monomial ideal.
Let R* be an ideal-adic completion of a Noetherian integral domain R and let L be a subfield of the total quotient ring of R* such that L contains R. Let A denote the intersection of L with R*. The integral domain A sometimes inherits nice properties from R* such as the Noetherian property. For certain fields L it is possible to approximate A using a localzation B of a nested union of polynomial rings over R associated to A; if B is Noetherian, then B = A. If B is not Noetherian, we can sometimes identify the prime ideals of B that are not finitely generated. We have obtained in this way, for each positive integer s, a 3-dimensional local unique factorization domain B such that the maximal ideal of B is 2-generated, B has precisely s prime ideals of height 2, each prime ideal of B of height 2 is not finitely generated and all the other prime ideals of B are finitely generated. We examine the map Spec A to Spec B for this example. We also present a generalization of this example to dimension 4. We describe a 4-dimensional local non-Noetherian UFD B such that the maximal ideal of B is 3-generated, there exists precisely one prime ideal Q of B of height 3, the prime ideal Q is not finitely generated. We consider the question of whether Q is the only prime ideal of B that is not finitely generated, but have not answered this question.
Let $R$ be a commutative Noetherian ring of Krull dimension $d$ admitting a dualizing complex $D$ and let $\\frak a$ be any ideal of $R$, we prove that $\\Gamma_{\\frak a}(G)$ is Gorenstein injective for any Gorenstein injective $R$-module $G$. Let $(R,\\frak m)$ be a local ring and $M$ be a finitely generated $R$-module. We show that ${\\rm Gid}{\\bf R}\\Gamma_{\\frak m}(M)<\\infty$ if and only if ${\\rm Gid}_{\\hat{R}}(M\\otimes_R\\hat{R})<\\infty$. We also show that if ${\\rm Gfd}_R{\\bf R}\\Gamma_{\\frak m}(M)<\\infty$, then ${\\rm Gfd}_RM<\\infty$. Let $(R,\\frak m)$ be a Cohen-Macaulay local ring and $M$ be a Cohen-Macaulay module of dimension $n$. We prove that if $H_{\\frak m}^n(M)$ is of finite G-injective dimension, then Gid$_RH_{\\frak m}^n(M)=d-n$. Moreover, we prove that if $M$ is a Matlis reflexive strongly torsion free module of finite G-flat dimension, then Gfd$_R\\hat{M}<\\infty$, where $\\hat{M}$ is $\\frak m$-adic completion.
This manuscript defines a new family of invariants, analogous to the Lyubeznik numbers, associated to any local ring whose residue field has prime characteristic. In particular, as their nomenclature suggests, these \"Lyubeznik numbers in mixed characteristic\" are defined for all local rings of mixed characteristic. Some properties similar to those in equal characteristic hold for these new invariants. Notably, the \"highest\" Lyubeznik number in mixed characteristic is a well-defined notion. Although the Lyubeznik numbers in mixed characteristic and their equal-characteristic counterparts are the same for certain local rings of equal characteristic p>0, we also provide an example where they differ.
For a local Cohen-Macaulay ring R of finite CM-type, Yoshino has applied methods of Auslander and Reiten to compute the Grothendieck group of the category mod(R) of finitely generated R-modules. For the same type of rings we compute in this paper the first Quillen K-group of mod(R). We also describe the group homomorphism induced by the inclusion of proj(R) into mod(R) and illustrate our results with concrete examples.
Let $X=(x_{ij})$ and $Y=(y_{ij})$ be generic $n$ by $n$ matrices and $Z=XY-YX$. Let $S=k[x_{11},...,x_{nn},y_{11},...,y_{nn}]$, where $k$ is a field, let $I$ be the ideal generated by the entries of $Z$ and let $R=S/I$. We give a conjecture on the first syzygies of $I$, show how these can be used to give a conjecture on the canonical module of $R$. Using this and the Hilbert series of $I$ we give a conjecture on the Betti numbers of $I$ in the $4 \\times 4$ case. We also give some guesses on the structure of the resolution in general.
For valued fields $K$ of rank higher than 1, we describe how elements in the henselization $K^h$ of $K$ can be approximated from within $K$; our result is a handy generalization of the well-known fact that in rank 1, all of these elements lie in the completion of $K$. We apply the result to show that if an element $z$ algebraic over $K$ can be approximated from within $K$ in the same way as an element in $K^h$, then $K(z)$ is not linearly disjoint from $K^h$ over $K$.
Let $R$ be a (commutative Noetherian) local ring of prime characteristic that is $F$-pure. This paper studies a certain finite set ${\\mathcal I}$ of radical ideals of $R$ that is naturally defined by the injective envelope of the simple $R$-module. This set ${\\mathcal I}$ contains $0$ and $R$, and is closed under taking primary components. For a multiplicatively closed subset $S$ of $R$, the concept of tight closure with respect to $S$, or $S$-tight closure, is discussed, together with associated concepts of $S$-test element and $S$-test ideal. It is shown that an ideal of $R$ belongs to ${\\mathcal I}$ if and only if it is the $S $-test ideal of $R$ for some multiplicatively closed subset $S $ of $R$. When $R$ is complete, ${\\mathcal I}$ is also `closed under taking test ideals , in the following sense: for each proper ideal $C$ in ${\\mathcal I}$, it turns out that $R/C$ is again $F$-pure, and if $J$ and $K$ are the unique ideals of $R$ that contain $C$ and are such that $J/C$ is the (tight closure) test ideal of $R/C$ and $K/C$ is the big test ideal of $R/C$, then both $J$ and $K$ belong to ${\\mathcal I}$. The paper ends with several examples.
The Multiplicity Conjecture (MC) of Huneke and Srinivasan provides upper and lower bounds for the multiplicity of a Cohen-Macaulay algebra $A$ in terms of the shifts appearing in the modules of the minimal free resolution (MFR) of $A$. All the examples studied so far have lead to conjecture (see $[HZ]$ and $[MNR2]$) that, moreover, the bounds of the MC are sharp if and only if $A$ has a pure MFR. Therefore, it seems a reasonable - and useful - idea to seek better, if possibly {\\it ad hoc}, bounds for particular classes of Cohen-Macaulay algebras. In this work we will only consider the codimension 3 case. In the first part we will stick to the bounds of the MC, and show that they hold for those algebras whose $h$-vector is that of a compressed algebra. In the second part, we will (mainly) focus on the level case: we will construct new conjectural upper and lower bounds for the multiplicity of a codimension 3 level algebra $A$, which can be expressed exclusively in terms of the $h$-vector of $A$, and which are better than (or equal to) those provided by the MC. Also, our bounds can be sharp even when the MFR of $A$ is not pure. Even though proving our bounds still appears too difficult a task in general, we are already able to show them for some interesting classes of codimension 3 level algebras $A$: namely, when $A$ is compressed, or when its $h$-vector $h(A)$ ends with $(...,3,2)$. Also, we will prove our lower bound when $h(A)$ begins with $(1,3,h_2,...)$, where $h_2\\leq 4$, and our upper bound when $h(A)$ ends with $(...,h_{c-1},h_c)$, where $h_{c-1}\\leq h_c+1$.
Let V be a finite-dimensional vector space over a field k and let W be a 1-dimensional k-vector space. Let < , >: V x V \\to W be a symmetric bilinear form. Then < , > is called anisotropic if for all nonzero v \\in V we have <v,v> \\neq 0. Motivated by a problem in algebraic number theory, we come up with a generalization of the concept of anisotropy to symmetric bilinear forms on finitely generated modules over artinian principal ideal rings. We will give many equivalent definitions of this concept of anisotropy. One of the definitions shows that one can check if a form is anisotropic by checking if certain forms on vector spaces are anisotropic. We will also discuss the concept of quasi-anisotropy of a symmetric bilinear form, which has no useful vector space analogue. Finally we will discuss the radical root of a symmetric bilinear form, which doesn t have a useful vector space analogue either. All three concepts have applications in algebraic number theory.
Let $f:A \\rightarrow B$ be a ring homomorphism and let $J$ be an ideal of $B$. In this paper, we study the amalgamation of $A$ with $B$ along $J$ with respect to $f$, a construction that provides a general frame for studying the amalgamated duplication of a ring along an ideal, introduced by D Anna and Fontana in 2007, and other classical constructions (such as the $A+ XB[X]$, the $A+ XB[\\![X]\\!]$ and the $D+M$ constructions). In particular, we completely describe the prime spectrum of the amalgamation and, when it is a local Noetherian ring, we study its embedding dimension and when it turns to be a Cohen-Macaulay ring or a Gorenstein ring.
Absolutely superficial sequences was introduced by P. Schenzel in order to study generalized Cohen-Macaulay (resp. Buchsbaum) modules. For an arbitrary local ring, they turned out to be d-sequences. This paper established properties of absolutely superficial sequences with respect to a module. It is shown that they are closely related to other sequences in the theory of generalized Cohen-Macaulay (resp. Buchsbaum) modules. In particular, there is a bounding function for the Hilbert-Samuel function of every parameter ideal such that this bounding function is attained if and only if the ideal is generated by an absolutely superficial sequence.
This paper continues the investigation of quasilength, of content of local cohomology with respect to generators of the support ideal, and of robust algebras begun in joint work of Hochster and Huneke. We settle several questions raised by Hochster and Huneke. In particular, we give a family of examples of top local cohomology modules both in equal characteristic 0 and in positive prime characteristic that are nonzero but have content 0. We use the notion of a robust forcing algebra (the condition turns out to be strictly stronger than the notion of a solid forcing algebra in, for example, equal characteristic 0) to define a new closure operation on ideals. We prove that this new notion of closure coincides with tight closure for ideals in complete local domains of positive characteristic, which requires proving that forcing algebras for instances of tight closure are robust, and study several related problems. This gives, in effect, a new characterization of tight closure in complete local domains of positive characteristic. As a byproduct, we also answer a question of Lyubeznik in the negative.
Let R be an integral domain and I a nonzero ideal of R. A sub-ideal J of I is a t-reduction of I if (JI^{n})_{t}=(I^{n+1})_{t} for some positive integer n. An element x in R is t-integral over I if there is an equation x^{n} + a_{1}x^{n-1} +...+ a_{n-1}x + a_{n} = 0 with a_{i} in (I^{i})_{t} for I = 1,...,n. The set of all elements that are t-integral over I is called the t-integral closure of I. This paper investigates the t-reductions and t-integral closure of ideals. Our objective is to establish satisfactory t-analogues of well-known results, in the literature, on the integral closure of ideals and its correlation with reductions. Namely, Section 2 identifies basic properties of t-reductions of ideals and features explicit examples discriminating between the notions of reduction and t-reduction. Section 3 investigates the concept of t-integral closure of ideals, including its correlation with t-reductions. Section 4 studies the persistence and contraction of t-integral closure of ideals under ring homomorphisms. All along the paper, the main results are illustrated with original examples.
Let $X$ and $Y$ be schemes of finite type over $\\mathrm{Spec}\\ \\mathbb{Z}$ and let $\\alpha: Y \\to X$ be a finite map. We show the following holds for all sufficiently large primes $p$: If $\\phi$ and $\\psi$ are any splittings on $X \\times \\mathrm{Spec}\\ F_p$ and $Y \\times \\mathrm{Spec}\\ F_p$, such that the restriction of $\\alpha$ is compatible with $\\phi$ and $\\psi$, and $V$ is any compatibly split subvariety of $(X \\times \\mathrm{Spec}\\ F_p, \\phi)$, then the reduction $\\alpha^{-1}(V)^{\\mathrm{red}}$ is a compatibly split subvariety of $(Y \\times \\mathrm{Spec}\\ F_p, \\psi)$. This is meant as a tool to aid in listing the compatibly split subvarieties of various classically split varieties.
Let (R,m) be a Noetherian local domain of dimension n that is essentially finitely generated over a field and let R^ denote the m-adic completion of R. Matsumura has shown that n-1 is the maximal height possible for prime ideals of R^ in the generic formal fiber of R. In this article we prove that every prime ideal of R^ that is maximal in the generic formal fiber of R has height n-1. We also present a related result concerning the generic formal fibers of certain extensions of mixed polynomial-power series rings.
We study the computational power of machines that specify their own acceptance types, and show that they accept exactly the languages that $\\manyonesharp$-reduce to NP sets. A natural variant accepts exactly the languages that $\\manyonesharp$-reduce to P sets. We show that these two classes coincide if and only if $\\psone = \\psnnoplusbigohone$, where the latter class denotes the sets acceptable via at most one question to $\\sharpp$ followed by at most a constant number of questions to $\\np$.
We study a stability property of probability laws with respect to small violations of algorithmic randomness. A sufficient condition of stability is presented in terms of Schnorr tests of algorithmic randomness. Most probability laws, like the strong law of large numbers, the law of iterated logarithm, and even Birkhoff s pointwise ergodic theorem for ergodic transformations, are stable in this sense. Nevertheless, the phenomenon of instability occurs in ergodic theory. Firstly, the stability property of the Birkhoff s ergodic theorem is non-uniform. Moreover, a computable non-ergodic measure preserving transformation can be constructed such that ergodic theorem is non-stable. We also show that any universal data compression scheme is also non-stable with respect to the class of all computable ergodic measures.
We continue the study of communication cost of computing functions when inputs are distributed among $k$ processors, each of which is located at one vertex of a network/graph called a terminal. Every other node of the network also has a processor, with no input. The communication is point-to-point and the cost is the total number of bits exchanged by the protocol, in the worst case, on all edges. Chattopadhyay, Radhakrishnan and Rudra (FOCS 14) recently initiated a study of the effect of topology of the network on the total communication cost using tools from $L_1$ embeddings. Their techniques provided tight bounds for simple functions like Element-Distinctness (ED), which depend on the 1-median of the graph. This work addresses two other kinds of natural functions. We show that for a large class of natural functions like Set-Disjointness the communication cost is essentially $n$ times the cost of the optimal Steiner tree connecting the terminals. Further, we show for natural composed functions like $\\text{ED} \\circ \\text{XOR}$ and $\\text{XOR} \\circ \\text{ED}$, the naive protocols suggested by their definition is optimal for general networks. Interestingly, the bounds for these functions depend on more involved topological parameters that are a combination of Steiner tree and 1-median costs. To obtain our results, we use some new tools in addition to ones used in Chattopadhyay et. al. These include (i) viewing the communication constraints via a linear program; (ii) using tools from the theory of tree embeddings to prove topology sensitive direct sum results that handle the case of composed functions and (iii) representing the communication constraints of certain problems as a family of collection of multiway cuts, where each multiway cut simulates the hardness of computing the function on the star topology.
We study the direct-sum problem for $k$-party ``Number On the Forehead   (NOF) deterministic communication complexity. We prove several positive results, showing that the complexity of computing a function $f$ in this model, on $\\ell$ instances, may be significantly cheaper than $\\ell$ times the complexity of computing $f$ on a single instance. Quite surprisingly, we show that this is the case for ``most   (boolean, $k$-argument) functions. We then formalize two-types of sufficient conditions on a NOF protocol $Q$, for a single instance, each of which guarantees some communication complexity savings when appropriately extending $Q$ to work on $\\ell$ instances. One such condition refers to what each party needs to know about inputs of the other parties, and the other condition, additionally, refers to the communication pattern that the single-instance protocol $Q$ uses. In both cases, the tool that we use is ``multiplexing  : we combine messages sent in parallel executions of protocols for a single instance, into a single message for the multi-instance (direct-sum) case, by xoring them with each other.
We formulate the conditional Kolmogorov complexity of x given y at precision r, where x and y are points in Euclidean spaces and r is a natural number. We demonstrate the utility of this notion in two ways. 1. We prove a point-to-set principle that enables one to use the (relativized, constructive) dimension of a single point in a set E in a Euclidean space to establish a lower bound on the (classical) Hausdorff dimension of E. We then use this principle, together with conditional Kolmogorov complexity in Euclidean spaces, to give a new proof of the known, two-dimensional case of the Kakeya conjecture. This theorem of geometric measure theory, proved by Davies in 1971, says that every plane set containing a unit line segment in every direction has Hausdorff dimension 2. 2. We use conditional Kolmogorov complexity in Euclidean spaces to develop the lower and upper conditional dimensions dim(x|y) and Dim(x|y) of x given y, where x and y are points in Euclidean spaces. Intuitively these are the lower and upper asymptotic algorithmic information densities of x conditioned on the information in y. We prove that these conditional dimensions are robust and that they have the correct information-theoretic relationships with the well-studied dimensions dim(x) and Dim(x) and the mutual dimensions mdim(x:y) and Mdim(x:y).
It is a challenge to manage complex systems efficiently without confronting NP-hard problems. To address the situation we suggest to use self-organization processes of prime integer relations for information processing. Self-organization processes of prime integer relations define correlation structures of a complex system and can be equivalently represented by transformations of two-dimensional geometrical patterns determining the dynamics of the system and revealing its structural complexity. Computational experiments raise the possibility of an optimality condition of complex systems presenting the structural complexity of a system as a key to its optimization. From this perspective the optimization of a system could be all about the control of the structural complexity of the system to make it consistent with the structural complexity of the problem. The experiments also indicate that the performance of a complex system may behave as a concave function of the structural complexity. Therefore, once the structural complexity could be controlled as a single entity, the optimization of a complex system would be potentially reduced to a one-dimensional concave optimization irrespective of the number of variables involved its description. This might open a way to a new type of information processing for efficient management of complex systems.
We study how the adoption of an evaluation mechanism with sharing and memoization impacts the class of functions which can be computed in polynomial time. We first show how a natural cost model in which lookup for an already computed value has no cost is indeed invariant. As a corollary, we then prove that the most general notion of ramified recurrence is sound for polynomial time, this way settling an open problem in implicit computational complexity.
Graph Isomorphism is the prime example of a computational problem with a wide difference between the best known lower and upper bounds on its complexity. We bridge this gap for a natural and important special case, planar graph isomorphism, by presenting an upper bound that matches the known logspace hardness [Lindell 92]. In fact, we show the formally stronger result that planar graph canonization is in logspace. This improves the previously known upper bound of AC1 [MillerReif 91]. Our algorithm first constructs the biconnected component tree of a connected planar graph and then refines each biconnected component into a triconnected component tree. The next step is to logspace reduce the biconnected planar graph isomorphism and canonization problems to those for 3-connected planar graphs, which are known to be in logspace by [DattaLimayeNimbhorkar 08]. This is achieved by using the above decomposition, and by making significant modifications to Lindell s algorithm for tree canonization, along with changes in the space complexity analysis. The reduction from the connected case to the biconnected case requires further new ideas, including a non-trivial case analysis and a group theoretic lemma to bound the number of automorphisms of a colored 3-connected planar graph. This lemma is crucial for the reduction to work in logspace.
We show that the Minesweeper game is PP-hard, when the object is to locate all mines with the highest probability. When the probability of locating all mines may be infinitesimal, the Minesweeper game is even PSPACE-complete. In our construction, the player can reveal a boolean circuit in polynomial time, after guessing an initial square with no surrounding mines, a guess that has 99 percent probability of success. Subsequently, the mines must be located with a maximum probability of success. Furthermore, we show that determining the solvability of a partially uncovered Minesweeper board is NP-complete with hexagonal and triangular grids as well as a square grid, extending a similar result for square grids only by R. Kaye. Actually finding the mines with a maximum probability of success is again PP-hard or PSPACE-complete respectively. Our constructions are in such a way that the number of mines can be computed in polynomial time and hence a possible mine counter does not provide additional information. The results are obtained by replacing the dyadic gates in [3] by two primitives which makes life more easy in this context.
The field of computational complexity is concerned both with the intrinsic hardness of computational problems and with the efficiency of algorithms to solve them. Given such a problem, normally one designs an algorithm to solve it and sets about establishing bounds on its performance as functions of the algorithm s variables, particularly upper bounds expressed via the big-oh notation. But if we were given some inscrutable code and were asked to figure out its big-oh profile from performance data on a given set of inputs, how hard would we have to grapple with the various possibilities before zooming in on a reasonably small set of candidates? Here we show that, even if we restricted our search to upper bounds given by polynomials, the number of possibilities could be arbitrarily large for two or more variables. This is unexpected, given the available body of examples on algorithmic efficiency, and serves to illustrate the many facets of the big-oh notation, as well as its counter-intuitive twists.
Assuming the Unique Games Conjecture, we show strong inapproximability results for two natural vertex deletion problems on directed graphs: for any integer $k\\geq 2$ and arbitrary small $\\epsilon > 0$, the Feedback Vertex Set problem and the DAG Vertex Deletion problem are inapproximable within a factor $k-\\epsilon$ even on graphs where the vertices can be almost partitioned into $k$ solutions. This gives a more structured and therefore stronger UGC-based hardness result for the Feedback Vertex Set problem that is also simpler (albeit using the \"It Ain t Over Till It s Over\" theorem) than the previous hardness result. In comparison to the classical Feedback Vertex Set problem, the DAG Vertex Deletion problem has received little attention and, although we think it is a natural and interesting problem, the main motivation for our inapproximability result stems from its relationship with the classical Discrete Time-Cost Tradeoff Problem. More specifically, our results imply that the deadline version is NP-hard to approximate within any constant assuming the Unique Games Conjecture. This explains the difficulty in obtaining good approximation algorithms for that problem and further motivates previous alternative approaches such as bicriteria approximations.
In the present paper, we construct an algorithm for the evaluation of real Riemann zeta function $\\zeta(s)$ for all real $s$, $s>1$, in polynomial time and linear space on Turing machines in Ko-Friedman model. The algorithms is based on a series expansion of real Riemann zeta function $\\zeta(s)$ (the series globally convergents) and uses algorithms for the evaluation of real function $(1+x)^h$ and hypergeometric series in polynomial time and linear space. The algorithm from the present paper modified in an obvious way to work with the complex numbers can be used to evaluate complex Riemann zeta function $\\zeta(s)$ for $s=\\sigma+\\mathbf{i}t$, $\\sigma\\ne 1$ (so, also for the case of $\\sigma<1$), in polynomial time and linear space in $n$ wherein $2^{-n}$ is a precision of the computation; the modified algorithm will be also polynomial time and linear space in $\\lceil \\log_2(t)\\rceil$ and exponential time and exponential space in $\\lceil \\log_2(\\sigma)\\rceil$.
In the book Boolean Function Complexity by Stasys Jukna, two lower bound techniques for Tree-like Cutting Plane proofs (henceforth, \"Tree-CP proofs\") using Karchmer-Widgerson type communication games (henceforth, \"KW games\") are presented: The first, applicable to Tree-CP proofs with bounded coefficients, translates Omega(t) deterministic lower bounds on KW games to 2^Omega(t/log n) lower bounds on Tree-CP proof size. The second, applicable to Tree-CP proofs with unbounded coefficients, translates Omega(t) randomized lower bounds on KW games to 2^Omega(t/log^2 n) lower bounds on Tree-CP proof size. The textbook proof in the latter case uses a O(log^2 n)-bit randomized protocol for the GreaterThan function. However, Nisan mentioned using the ideas of Feige, et al. to construct a O(log n + log(1/epsilon))-bit randomized protocol for GreaterThan. Nisan did not explicitly give the proof, though later results in his paper assume such a protocol. In this short exposition, we present the full O(log n + log(1/epsilon))-bit randomized protocol for the GreaterThan function based on the ideas of Feige, et al. for \"noisy binary search.\" As an application, we show how to translate Omega(t) randomized lower bounds on KW games to 2^Omega(t/log n) lower bounds on Tree-CP proof size in the unbounded coefficient case. This equates randomness with coefficient size for the Tree-CP/KW game lower bound method. We believe that, while the O(log n + log(1/epsilon))-bit randomized protocol for GreaterThan is a \"known\" result, the explicit connection to Tree-CP proof size lower bounds given here is new.
Two languages are \"finitely different\" if their symmetric difference is finite. We consider the DFAs of finitely different regular languages and find major structural similarities. We proceed to consider the smallest DFAs that recognize a language finitely different from some given DFA. Such \"f-minimal\" DFAs are not unique, and this non-uniqueness is characterized. Finally, we offer a solution to the minimization problem of finding such f-minimal DFAs.
We show that polynomial-time randomness (p-randomness) is preserved under a variety of familiar operations, including addition and multiplication by a nonzero polynomial-time computable real number. These results follow from a general theorem: If $I$ is an open interval in the reals, $f$ is a function mapping $I$ into the reals, and $r$ in $I$ is p-random, then $f(r)$ is p-random provided 1. $f$ is p-computable on the dyadic rational points in $I$, and 2. $f$ varies sufficiently at $r$, i.e., there exists a real constant $C > 0$ such that either (a) $(f(x) - f(r))/(x-r) > C$ for all $x$ in $I$ with $x \\ne r$, or (b) $(f(x) - f(r))(x-r) < -C$ for all $x$ in $I$ with $x \\ne r$. Our theorem implies in particular that any analytic function about a p-computable point whose power series has uniformly p-computable coefficients preserves p-randomness in its open interval of absolute convergence. Such functions include all the familiar functions from first-year calculus.
Assume $D$ is a finite set and $R$ is a finite set of functions from $D$ to the natural numbers. An instance of the minimum $R$-cost homomorphism problem ($MinHom_R$) is a set of variables $V$ subject to specified constraints together with a positive weight $c_{vr}$ for each combination of $v \\in V$ and $r \\in R$. The aim is to find a function $f:V \\rightarrow D$ such that $f$ satisfies all constraints and $\\sum_{v \\in V} \\sum_{r \\in R} c_{vr}r(f(v))$ is minimized. This problem unifies well-known optimization problems such as the minimum cost homomorphism problem and the maximum solution problem, and this makes it a computationally interesting fragment of the valued CSP framework for optimization problems. We parameterize $MinHom_R\\left(\\Gamma\\right)$ by {\\em constraint languages}, i.e. sets $\\Gamma$ of relations that are allowed in constraints. A constraint language is called {\\em conservative} if every unary relation is a member of it; such constraint languages play an important role in understanding the structure of constraint problems. The dichotomy conjecture for $MinHom_R$ is the following statement: if $\\Gamma$ is a constraint language, then $MinHom_R\\left(\\Gamma\\right)$ is either polynomial-time solvable or NP-complete. For $MinHom$ the dichotomy result has been recently obtained [Takhanov, STACS, 2010] and the goal of this paper is to expand this result to the case of $MinHom_R$ with conservative constraint language. For arbitrary $R$ this problem is still open, but assuming certain restrictions on $R$ we prove a dichotomy. As a consequence of this result we obtain a dichotomy for the conservative maximum solution problem.
A PCP is a proof system for NP in which the proof can be checked by a probabilistic verifier. The verifier is only allowed to read a very small portion of the proof, and in return is allowed to err with some bounded probability. The probability that the verifier accepts a false proof is called the soundness error, and is an important parameter of a PCP system that one seeks to minimize. Constructing PCPs with sub-constant soundness error and, at the same time, a minimal number of queries into the proof (namely two) is especially important due to applications for inapproximability. In this work we construct such PCP verifiers, i.e., PCPs that make only two queries and have sub-constant soundness error. Our construction can be viewed as a combinatorial alternative to the \"manifold vs. point\" construction, which is the only construction in the literature for this parameter range. The \"manifold vs. point\" PCP is based on a low degree test, while our construction is based on a direct product test. We also extend our construction to yield a decodable PCP (dPCP) with the same parameters. By plugging in this dPCP into the scheme of Dinur and Harsha (FOCS 2009) one gets an alternative construction of the result of Moshkovitz and Raz (FOCS 2008), namely: a construction of two-query PCPs with small soundness error and small alphabet size. Our construction of a PCP is based on extending the derandomized direct product test of Impagliazzo, Kabanets and Wigderson (STOC 09) to a derandomized parallel repetition theorem. More accurately, our PCP construction is obtained in two steps. We first prove a derandomized parallel repetition theorem for specially structured PCPs. Then, we show that any PCP can be transformed into one that has the required structure, by embedding it on a de-Bruijn graph.
We prove that for every sign matrix $A$ there is a deterministic communication protocol that uses $O(corr_{1/4}(A)\\log^2 rk(A))$ bits of communication, where $corr_{1/4}(A)$ is the corruption/rectangle bound with error $1/4$. This bound generalizes several of the known upper bounds on deterministic communication complexity, involving nondeterministic complexity, randomized complexity, information complexity notions, and rank. It also implies that the corruption bound is a lower bound on exact quantum communication complexity, if and only if quantum communication is polynomially equivalent to deterministic communication complexity.
Block sensitivity ($bs(f)$), certificate complexity ($C(f)$) and fractional certificate complexity ($C^*(f)$) are three fundamental combinatorial measures of complexity of a boolean function $f$. It has long been known that $bs(f) \\leq C^{\\ast}(f) \\leq C(f) =O(bs(f)^2)$. We provide an infinite family of examples for which $C(f)$ grows quadratically in $C^{\\ast}(f)$ (and also $bs(f)$) giving optimal separations between these measures. Previously the biggest separation known was $C(f)=C^{\\ast}(f)^{\\log_{4.5}5}$. We also give a family of examples for which $C^{\\ast}(f)=\\Omega(bs(f)^{3/2})$. These examples are obtained by composing boolean functions in various ways. Here the composition $f \\circ g$ of $f$ with $g$ is obtained by substituting for each variable of $f$ a copy of $g$ on disjoint sets of variables. To construct and analyse these examples we systematically investigate the behaviour under function composition of these measures and also the sensitivity measure $s(f)$. The measures $s(f)$, $C(f)$ and $C^{\\ast}(f)$ behave nicely under composition: they are submultiplicative (where measure $m$ is submultiplicative if $m(f \\circ g) \\leq m(f)m(g)$) with equality holding under some fairly general conditions. The measure $bs(f)$ is qualitatively different: it is not submultiplicative. This qualitative difference was not noticed in the previous literature and we correct some errors that appeared in previous papers. We define the composition limit of a measure $m$ at function $f$, $m^{\\lim}(f)$ to be the limit as $k$ grows of $m(f^{(k)})^{1/k}$, where $f^{(k)}$ is the iterated composition of $f$ with itself $k$-times. For any function $f$ we show that $bs^{\\lim}(f) = (C^*)^{\\lim}(f)$ and characterize $s^{\\lim}(f), (C^*)^{\\lim}(f)$, and $C^{\\lim}(f)$ in terms of the largest eigenvalue of a certain set of $2\\times 2$ matrices associated with $f$.
We consider the problem of approximating the partition function of the hard-core model on planar graphs of degree at most 4. We show that when the activity lambda is sufficiently large, there is no fully polynomial randomised approximation scheme for evaluating the partition function unless NP=RP. The result extends to a nearby region of the parameter space in a more general two-state spin system with three parameters. We also give a polynomial-time randomised approximation scheme for the logarithm of the partition function.
This paper aims to present an advanced version of PP-hardness proof of Minesweeper by Bondt. The advancement includes improved Minesweeper configurations for  logic circuits  in a hexagonal Minesweeper. To do so, I demonstrate logical uncertainty in Minesweeper, which ironically allows a possibility to make some Boolean operators. The fact that existing hexagonal logic circuits did not clearly distinguish the true and false signal needs an improved form of a hexagonal wire. I introduce new forms of logic circuits such as NOT, AND, OR gates, a curve and a splitter of wires. Moreover, these new logic circuits complement Bondt s proof for PP-hardness of Minesweeper by giving a new figure.
We consider the robustness of computational hardness of problems whose input is obtained by applying independent random deletions to worst-case instances. For some classical $NP$-hard problems on graphs, such as Coloring, Vertex-Cover, and Hamiltonicity, we examine the complexity of these problems when edges (or vertices) of an arbitrary graph are deleted independently with probability $1-p > 0$. We prove that for $n$-vertex graphs, these problems remain as hard as in the worst-case, as long as $p > \\frac{1}{n^{1-\\epsilon}}$ for arbitrary $\\epsilon \\in (0,1)$, unless $NP \\subseteq BPP$. We also prove hardness results for Constraint Satisfaction Problems, where random deletions are applied to clauses or variables, as well as the Subset-Sum problem, where items of a given instance are deleted at random.
We show that if DTIME[2^{O(n)}] is not included in DSPACE[2^{o(n)}], then, for every set B in PSPACE, all strings x in B of length n can be represented by a string compressed(x) of length at most log (|B^{=n}|) + O(log n), such that a polynomial-time algorithm, given compressed(x), can distinguish x from all the other strings in B^{=n}. Modulo the O(log n) additive trem, this achieves the information-theoretical optimum for string compression.
Non-deterministic Constraint Logic is a family of graph games introduced by Demaine and Hearn that facilitates the construction of complexity proofs. It is convenient for the analysis of games, providing a uniform view. We focus on the acyclic version, apply this to Klondike, Mahjong Solitaire and Nonogram (that requires planarity), and discuss the more complicated game of Dou Shou Qi. While for the first three games we reobtain known characterizations in a simple and uniform manner, the result for Dou Shou Qi is new.
Chemical reaction networks (CRNs) model the behavior of molecules in a well-mixed system. The emerging field of molecular programming uses CRNs not only as a descriptive tool, but as a programming language for chemical computation. Recently, Chen, Doty and Soloveichik introduced a new model of chemical kinetics, rate-independent continuous CRNs (CCRNs), to study the chemical computation of continuous functions. A fundamental question of a CRN is whether a state of the system is reachable through a sequence of reactions in the network. This is known as the reachability problem. In this paper, we investigate CCRN-REACH, the reachability problem for this model of chemical reaction networks. We show that, for continuous CRNs, constructing a path to a state of the network is computable in polynomial time. We also prove that a related problem, Sub-CCRN-REACH, is NP-complete.
In the framework of computational complexity and in an effort to define a more natural reduction for problems of equivalence, we investigate the recently introduced kernel reduction, a reduction that operates on each element of a pair independently. This paper details the limitations and uses of kernel reductions. We show that kernel reductions are weaker than many-one reductions and provide conditions under which complete problems exist. Ultimately, the number and size of equivalence classes can dictate the existence of a kernel reduction. We leave unsolved the unconditional existence of a complete problem under polynomial-time kernel reductions for the standard complexity classes.
We study reductions that limit the extreme adaptivity of Turing reductions. In particular, we study reductions that make a rapid, structured progression through the set to which they are reducing: Each query is strictly longer (shorter) than the previous one. We call these reductions query-increasing (query-decreasing) Turing reductions. We also study query-nonincreasing (query-nondecreasing) Turing reductions. These are Turing reductions in which the sequence of query lengths is nonincreasing (nondecreasing). We ask whether these restrictions in fact limit the power of reductions. We prove that query-increasing and query-decreasing Turing reductions are incomparable with (that is, are neither strictly stronger than nor strictly weaker than) truth-table reductions and are strictly weaker than Turing reductions. In addition, we prove that query-nonincreasing and query-nondecreasing Turing reductions are strictly stronger than truth-table reductions and strictly weaker than Turing reductions. Despite the fact that we prove query-increasing and query-decreasing Turing reductions to in the general case be strictly weaker than Turing reductions, we identify a broad class of sets A for which any set that Turing reduces to A will also reduce to A via both query-increasing and query-decreasing Turing reductions. In particular, this holds for all tight paddable sets, where a set is said to be tight paddable exactly if it is paddable via a function whose output length is bounded tightly both from above and from below in the length of the input. We prove that many natural NP-complete problems such as satisfiability, clique, and vertex cover are tight paddable.
The study of semifeasible algorithms was initiated by Selman s work a quarter of century ago [Sel79,Sel81,Sel82]. Informally put, this research stream studies the power of those sets L for which there is a deterministic (or in some cases, the function may belong to one of various nondeterministic function classes) polynomial-time function f such that when at least one of x and y belongs to L, then f(x,y) \\in L \\cap \\{x,y\\}. The intuition here is that it is saying: ``Regarding membership in L, if you put a gun to my head and forced me to bet on one of x or y as belonging to L, my money would be on f(x,y).   In this article, we present a number of open problems from the theory of semifeasible algorithms. For each we present its background and review what partial results, if any, are known.
We establish tight bounds on the amount on nonuniformity that is necessary for extracting a string with randomness rate 1 from a single source of randomness with lower randomness rate. More precisely, as instantiations of more general results, we show that while O(1) amount of advice regarding the source is not enough for extracting a string with randomness rate 1 from a source string with constant subunitary random rate, \\omega(1) amount of advice is.
The halting probabilities of universal prefix-free machines are universal for the class of reals with computably enumerable left cut (also known as left-c.e. reals), and coincide with the Martin-Loef random elements of this class. We study the differences of Martin-Loef random left-c.e. reals and show that for each pair of such reals a, b there exists a unique number r > 0 such that qa - b is a 1-random left-c.e. real for each positive rational q > r and a 1-random right-c.e. real for each positive rational q < r. Based on this result we develop a theory of differences of halting probabilities, which answers a number of questions about Martin-Loef random left-c.e. reals, including one of the few remaining open problems from the list of open questions in algorithmic randomness by Miller and Nies in 2006. The halting probability of a prefix-free machine M restricted to a set X is the probability that the machine halts and outputs an element of X. These numbers Omega_M(X) were studied by a number of authors in the last decade as a way to obtain concrete highly random numbers. When X is the complement of a computably enumerable set, the number Omega_M(X) is the difference of two halting probabilities. Becher, Figueira, Grigorieff, and Miller asked whether Omega_U(X) is Martin-Loef random when U is universal and X is the complement of a computably enumerable set. This problem has resisted numerous attempts in the last decade. We apply our theory of differences of halting probabilities to give a positive answer, and show that Omega_U(X) is a Martin-Loef random left-c.e. real whenever X is nonempty and the complement of a computably enumerable set.
The Sensitivity Conjecture and the Log-rank Conjecture are among the most important and challenging problems in concrete complexity. Incidentally, the Sensitivity Conjecture is known to hold for monotone functions, and so is the Log-rank Conjecture for $f(x \\wedge y)$ and $f(x\\oplus y)$ with monotone functions $f$, where $\\wedge$ and $\\oplus$ are bit-wise AND and XOR, respectively. In this paper, we extend these results to functions $f$ which alternate values for a relatively small number of times on any monotone path from $0^n$ to $1^n$. These deepen our understandings of the two conjectures, and contribute to the recent line of research on functions with small alternating numbers.
This paper considers the question of P = NP in context of the polynomial time SAT algorithm. It posits proposition dependent on existence of conjectured problem that even where the algorithm is shown to solve SAT in polynomial time it remains theoretically possible for there to yet exist a non-deterministically polynomial (NP) problem for which the algorithm does not provide a polynomial (P) time solution. The paper leaves open as subject of continuing research the question of existence of instance of conjectured problem.
The main goal of this paper is to put some known results in a common perspective and to simplify their proofs. We start with a simple proof of a result from (Vereshchagin, 2002) saying that $\\limsup_n\\KS(x|n)$ (here $\\KS(x|n)$ is conditional (plain) Kolmogorov complexity of $x$ when $n$ is known) equals $\\KS^{\\mathbf{0 }(x)$, the plain Kolmogorov complexity with $\\mathbf{0 $-oracle. Then we use the same argument to prove similar results for prefix complexity (and also improve results of (Muchnik, 1987) about limit frequencies), a priori probability on binary tree and measure of effectively open sets. As a by-product, we get a criterion of $\\mathbf{0 }$ Martin-L\\\"of randomness (called also 2-randomness) proved in (Miller, 2004): a sequence $\\omega$ is 2-random if and only if there exists $c$ such that any prefix $x$ of $\\omega$ is a prefix of some string $y$ such that $\\KS(y)\\ge |y|-c$. (In the 1960ies this property was suggested in (Kolmogorov, 1968) as one of possible randomness definitions; its equivalence to 2-randomness was shown in (Miller, 2004) while proving another 2-randomness criterion (see also (Nies et al. 2005)): $\\omega$ is 2-random if and only if $\\KS(x)\\ge |x|-c$ for some $c$ and infinitely many prefixes $x$ of $\\omega$. Finally, we show that the low-basis theorem can be used to get alternative proofs for these results and to improve the result about effectively open sets; this stronger version implies the 2-randomness criterion mentioned in the previous sentence.
Geometric complexity theory (GCT) is an approach to the $P$ vs. $NP$ and related problems. A high level overview of this research plan and the results obtained so far was presented in a series of three lectures in the Institute of Advanced study, Princeton, Feb 9-11, 2009. This article contains the material covered in those lectures after some revision, and gives a mathematical overview of GCT. No background in algebraic geometry, representation theory or quantum groups is assumed.
A $(k \\times l)$-birthday repetition $\\mathcal{G}^{k \\times l}$ of a two-prover game $\\mathcal{G}$ is a game in which the two provers are sent random sets of questions from $\\mathcal{G}$ of sizes $k$ and $l$ respectively. These two sets are sampled independently uniformly among all sets of questions of those particular sizes. We prove the following birthday repetition theorem: when $\\mathcal{G}$ satisfies some mild conditions, $val(\\mathcal{G}^{k \\times l})$ decreases exponentially in $\\Omega(kl/n)$ where $n$ is the total number of questions. Our result positively resolves an open question posted by Aaronson, Impagliazzo and Moshkovitz (CCC 2014). As an application of our birthday repetition theorem, we obtain new fine-grained hardness of approximation results for dense CSPs. Specifically, we establish a tight trade-off between running time and approximation ratio for dense CSPs by showing conditional lower bounds, integrality gaps and approximation algorithms. In particular, for any sufficiently large $i$ and for every $k \\geq 2$, we show the following results: - We exhibit an $O(q^{1/i})$-approximation algorithm for dense Max $k$-CSPs with alphabet size $q$ via $O_k(i)$-level of Sherali-Adams relaxation. - Through our birthday repetition theorem, we obtain an integrality gap of $q^{1/i}$ for $\\tilde\\Omega_k(i)$-level Lasserre relaxation for fully-dense Max $k$-CSP. - Assuming that there is a constant $\\epsilon > 0$ such that Max 3SAT cannot be approximated to within $(1-\\epsilon)$ of the optimal in sub-exponential time, our birthday repetition theorem implies that any algorithm that approximates fully-dense Max $k$-CSP to within a $q^{1/i}$ factor takes $(nq)^{\\tilde \\Omega_k(i)}$ time, almost tightly matching the algorithmic result based on Sherali-Adams relaxation.
We consider logic-based argumentation in which an argument is a pair (Fi,al), where the support Fi is a minimal consistent set of formulae taken from a given knowledge base (usually denoted by De) that entails the claim al (a formula). We study the complexity of three central problems in argumentation: the existence of a support Fi ss De, the validity of a support and the relevance problem (given psi is there a support Fi such that psi ss Fi?). When arguments are given in the full language of propositional logic these problems are computationally costly tasks, the validity problem is DP-complete, the others are SigP2-complete. We study these problems in Schaefer s famous framework where the considered propositional formulae are in generalized conjunctive normal form. This means that formulae are conjunctions of constraints build upon a fixed finite set of Boolean relations Ga (the constraint language). We show that according to the properties of this language Ga, deciding whether there exists a support for a claim in a given knowledge base is either polynomial, NP-complete, coNP-complete or SigP2-complete. We present a dichotomous classification, P or DP-complete, for the verification problem and a trichotomous classification for the relevance problem into either polynomial, NP-complete, or SigP2-complete. These last two classifications are obtained by means of algebraic tools.
Recent breakthroughs in quantum query complexity have shown that any formula of size n can be evaluated with O(sqrt(n)log(n)/log log(n)) many quantum queries in the bounded-error setting [FGG08, ACRSZ07, RS08b, Rei09]. In particular, this gives an upper bound on the approximate polynomial degree of formulas of the same magnitude, as approximate polynomial degree is a lower bound on quantum query complexity [BBCMW01]. These results essentially answer in the affirmative a conjecture of O Donnell and Servedio [O DS03] that the sign degree--the minimal degree of a polynomial that agrees in sign with a function on the Boolean cube--of every formula of size n is O(sqrt(n)). In this note, we show that sign degree is super-multiplicative under function composition. Combining this result with the above mentioned upper bounds on the quantum query complexity of formulas allows the removal of logarithmic factors to show that the sign degree of every size n formula is at most sqrt(n).
A parameterized problem consists of a classical problem and an additional component, the so-called parameter. This point of view allows a formal definition of preprocessing: Given a parameterized instance (I,k), a polynomial kernelization computes an equivalent instance (I ,k ) of size and parameter bounded by a polynomial in k. We give a complete classification of Min Ones Constraint Satisfaction problems, i.e., Min Ones SAT(\\Gamma), with respect to admitting or not admitting a polynomial kernelization (unless NP \\subseteq coNP/poly). For this we introduce the notion of mergeability. If all relations of the constraint language \\Gamma are mergeable, then a new variant of sunflower kernelization applies, based on non-zero-closed cores. We obtain a kernel with O(k^{d+1}) variables and polynomial total size, where d is the maximum arity of a constraint in \\Gamma, comparing nicely with the bound of O(k^{d-1}) vertices for the less general and arguably simpler d-Hitting Set problem. Otherwise, any relation in \\Gamma that is not mergeable permits us to construct a log-cost selection formula, i.e., an n-ary selection formula with O(log n) true local variables. From this we can construct our lower bound using recent results by Bodlaender et al. as well as Fortnow and Santhanam, proving that there is no polynomial kernelization, unless NP \\subseteq coNP/poly and the polynomial hierarchy collapses to the third level.
A graph homomorphism is a vertex map which carries edges from a source graph to edges in a target graph. We study the approximability properties of the Weighted Maximum H-Colourable Subgraph problem (MAX H-COL). The instances of this problem are edge-weighted graphs G and the objective is to find a subgraph of G that has maximal total edge weight, under the condition that the subgraph has a homomorphism to H; note that for H=K_k this problem is equivalent to MAX k-CUT. To this end, we introduce a metric structure on the space of graphs which allows us to extend previously known approximability results to larger classes of graphs. Specifically, the approximation algorithms for MAX CUT by Goemans and Williamson and MAX k-CUT by Frieze and Jerrum can be used to yield non-trivial approximation results for MAX H-COL. For a variety of graphs, we show near-optimality results under the Unique Games Conjecture. We also use our method for comparing the performance of Frieze & Jerrum s algorithm with Hastad s approximation algorithm for general MAX 2-CSP. This comparison is, in most cases, favourable to Frieze & Jerrum.
We present a proof of the conjecture $\\mathcal{NP}$ = $\\mathcal{PSPACE}$ by showing that arbitrary tautologies of Johansson s minimal propositional logic admit \"small\" polynomial-size dag-like natural deductions in Prawitz s system for minimal propositional logic. These \"small\" deductions arise from standard \"large\"\\ tree-like inputs by horizontal dag-like compression that is obtained by merging distinct nodes labeled with identical formulas occurring in horizontal sections of deductions involved. The underlying \"geometric\" idea: if the height, $h\\left( \\partial \\right) $ , and the total number of distinct formulas, $\\phi \\left( \\partial \\right) $ , of a given tree-like deduction $\\partial$ of a minimal tautology $\\rho$ are both polynomial in the length of $\\rho$, $\\left| \\rho \\right|$, then the size of the horizontal dag-like compression is at most $h\\left( \\partial \\right) \\times \\phi \\left( \\partial \\right) $, and hence polynomial in $\\left| \\rho \\right|$. The attached proof is due to the first author, but it was the second author who proposed an initial idea to attack a weaker conjecture $\\mathcal{NP}= \\mathcal{\\mathit{co}NP}$ by reductions in diverse natural deduction formalisms for propositional logic. That idea included interactive use of minimal, intuitionistic and classical formalisms, so its practical implementation was too involved. The attached proof of $ \\mathcal{NP}=\\mathcal{PSPACE}$ runs inside the natural deduction interpretation of Hudelmaier s cutfree sequent calculus for minimal logic.
Kernelization is a formalization of efficient preprocessing for NP-hard problems using the framework of parameterized complexity. Among open problems in kernelization it has been asked many times whether there are deterministic polynomial kernelizations for Subset Sum and Knapsack when parameterized by the number $n$ of items. We answer both questions affirmatively by using an algorithm for compressing numbers due to Frank and Tardos (Combinatorica 1987). This result had been first used by Marx and V\\ egh (ICALP 2013) in the context of kernelization. We further illustrate its applicability by giving polynomial kernels also for weighted versions of several well-studied parameterized problems. Furthermore, when parameterized by the different item sizes we obtain a polynomial kernelization for Subset Sum and an exponential kernelization for Knapsack. Finally, we also obtain kernelization results for polynomial integer programs.
The Shortest Path Reconfiguration problem has as input a graph G (with unit edge lengths) with vertices s and t, and two shortest st-paths P and Q. The question is whether there exists a sequence of shortest st-paths that starts with P and ends with Q, such that subsequent paths differ in only one vertex. This is called a rerouting sequence. This problem is shown to be PSPACE-complete. For claw-free graphs and chordal graphs, it is shown that the problem can be solved in polynomial time, and that shortest rerouting sequences have linear length. For these classes, it is also shown that deciding whether a rerouting sequence exists between all pairs of shortest st-paths can be done in polynomial time. Finally, a polynomial time algorithm for counting the number of isolated paths is given.
A general theory of resource-bounded measurability and measure is developed. Starting from any feasible probability measure $\\nu$ on the Cantor space $\\C$ and any suitable complexity class $C \\subseteq \\C$, the theory identifies the subsets of $\\C$ that are $\\nu$-measurable in $C$ and assigns measures to these sets, thereby endowing $C$ with internal measure-theoretic structure. Classes to which the theory applies include various exponential time and space complexity classes, the class of all decidable languages, and the Cantor space itself, on which the resource-bounded theory is shown to agree with the classical theory. The sets that are $\\nu$-measurable in $C$ are shown to form an algebra relative to which $\\nu$-measure is well-behaved. This algebra is also shown to be complete and closed under sufficiently uniform infinitary unions and intersections, and $\\nu$-measure in $C$ is shown to have the appropriate additivity and monotone convergence properties with respect to such infinitary operations. A generalization of the classical Kolmogorov zero-one law is proven, showing that when $\\nu$ is any feasible coin-toss probability measure on $\\C$, every set that is $\\nu$-measurable in $C$ and (like most complexity classes) invariant under finite alterations must have $\\nu$-measure 0 or $\\nu$-measure 1 in $C$. The theory is presented here is based on resource-bounded martingale splitting operators, which are type-2 functionals, each of which maps $\\N \\times {\\cal D}_\\nu$ into ${\\cal D}_\\nu \\times {\\cal D}_\\nu$, where ${\\cal D}_\\nu$ is the set of all $\\nu$-martingales. This type-2 aspect of the theory appears to be essential for general $\\nu$-measure in complexity classes $C$, but the sets of $\\nu$-measure 0 or 1 in C are shown to be characterized by the success conditions for martingales (type-1 functions) that have been used in resource-bounded measure to date.
Let $\\cal{P}$ be an affine invariant property of functions $\\mathbb{F}_p^n \\to [R]$ for fixed $p$ and $R$. We show that if $\\cal{P}$ is locally testable with a constant number of queries, then one can estimate the distance of a function $f$ from $\\cal{P}$ with a constant number of queries. This was previously unknown even for simple properties such as cubic polynomials over $\\mathbb{F}_2$. Our test is simple: take a restriction of $f$ to a constant dimensional affine subspace, and measure its distance from $\\cal{P}$. We show that by choosing the dimension large enough, this approximates with high probability the global distance of $f$ from $\\cP$. The analysis combines the approach of Fischer and Newman [SIAM J. Comp 2007] who established a similar result for graph properties, with recently developed tools in higher order Fourier analysis, in particular those developed in Bhattacharyya et al. [STOC 2013].
The embedding problem is to decide, given an ordered pair of structures, whether or not there is an injective homomorphism from the first structure to the second. We study this problem using an established perspective in parameterized complexity theory: the universe size of the first structure is taken to be the parameter, and we define the embedding problem relative to a class ${\\cl A}$ of structures to be the restricted version of the general problem where the first structure must come from ${\\cl A}$. We initiate a systematic complexity study of this problem family, by considering classes whose structures are what we call rooted path structures; these structures have paths as Gaifman graphs. Our main theorem is a dichotomy theorem on classes of rooted path structures.
The parameterized complexity of a problem is considered \"settled\" once it has been shown to lie in FPT or to be complete for a class in the W-hierarchy or a similar parameterized hierarchy. Several natural parameterized problems have, however, resisted such a classification. At least in some cases, the reason is that upper and lower bounds for their parameterized space complexity have recently been obtained that rule out completeness results for parameterized time classes. In this paper, we make progress in this direction by proving that the associative generability problem and the longest common subsequence problem are complete for parameterized space classes. These classes are defined in terms of different forms of bounded nondeterminism and in terms of simultaneous time--space bounds. As a technical tool we introduce a \"union operation\" that translates between problems complete for classical complexity classes and for W-classes.
This article has been withdrawn because it has been merged with the earlier article GCT3 (arXiv: CS/0501076 [cs.CC]) in the series. The merged article is now available as: Geometric Complexity Theory III: on deciding nonvanishing of a Littlewood-Richardson Coefficient, Journal of Algebraic Combinatorics, vol. 36, issue 1, 2012, pp. 103-110. (Authors: Ketan Mulmuley, Hari Narayanan and Milind Sohoni) The new article in this GCT5 slot in the series is: Geometric Complexity Theory V: Equivalence between blackbox derandomization of polynomial identity testing and derandomization of Noether s Normalization Lemma, in the Proceedings of FOCS 2012 (abstract), arXiv:1209.5993 [cs.CC] (full version) (Author: Ketan Mulmuley)
In this paper we study polynomial identity testing of sums of $k$ read-once algebraic branching programs ($\\Sigma_k$-RO-ABPs), generalizing the work in (Shpilka and Volkovich 2008,2009), who considered sums of $k$ read-once formulas ($\\Sigma_k$-RO-formulas). We show that $\\Sigma_k$-RO-ABPs are strictly more powerful than $\\Sigma_k$-RO-formulas, for any $k \\leq \\lfloor n/2\\rfloor$, where $n$ is the number of variables. We obtain the following results: 1) Given free access to the RO-ABPs in the sum, we get a deterministic algorithm that runs in time $O(k^2n^7s) + n^{O(k)}$, where $s$ bounds the size of any largest RO-ABP given on the input. This implies we have a deterministic polynomial time algorithm for testing whether the sum of a constant number of RO-ABPs computes the zero polynomial. 2) Given black-box access to the RO-ABPs computing the individual polynomials in the sum, we get a deterministic algorithm that runs in time $k^2n^{O(\\log n)} + n^{O(k)}$. 3) Finally, given only black-box access to the polynomial computed by the sum of the $k$ RO-ABPs, we obtain an $n^{O(k + \\log n)}$ time deterministic algorithm.
We show that if DTIME[2^O(n)] is not included in DSPACE[2^o(n)], then, for every set B in PSPACE/poly, all strings x in B of length n can be represented by a string compressed(x) of length at most log(|B^{=n}|)+O(log n), such that a polynomial-time algorithm, given compressed(x), can distinguish x from all the other strings in B^{=n}. Modulo the O(log n) additive term, this achieves the information-theoretic optimum for string compression. We also observe that optimal compression is not possible for sets more complex than PSPACE/poly because for any time-constructible superpolynomial function t, there is a set A computable in space t(n) such that at least one string x of length n requires compressed(x) to be of length 2 log(|A^=n|).
Downward collapse (a.k.a. upward separation) refers to cases where the equality of two larger classes implies the equality of two smaller classes. We provide an unqualified downward collapse result completely within the polynomial hierarchy. In particular, we prove that, for k > 2, if $\\psigkone = \\psigktwo$ then $\\sigmak = \\pik = \\ph$. We extend this to obtain a more general downward collapse result.
In this paper we are going to solve an open problem about the game tetris. We are going to give the first results in the complexity of a variant of offline tetris introduced by Erik Demaine, Susan Hohenberger and David Liben Nowell in their paper \"Tetris is hard, even to approximate\". In this variant, that follows a model of movements introduced by John Brzustowsky, we can move and rotate a piece the number of times we want in the first row. But then, when we left the piece fall, we cannot move it or rotate it anymore. We are going to demonstrate that the problem of maximizing the number of cleared lines of this variant on a particular game board, is NP-hard by reducing the 3-partition problem to the problem of clearing the board in this variant of tetris
This paper proposes a thought experiment to search for efficient bounded algorithms of NPC problems by machine enumeration. The key contributions are: -- On Universal Turing Machines, a program s time complexity should be characterized as: execution time(n) = loading time(n) + running time(n). -- Introduces the concept of bounded algorithms; proposes a comparison based criterion to decide if a bounded algorithm is inefficient; and establishes the length upper bound of efficient bounded programs. -- Introduces the growth rate characteristic function to evaluate program complexity, which is more easily machine checkable based on observations. -- Raises the theoretical question: if there exists any bounded algorithm with polynomial execution time for NPC problems.
The problem of finding large cliques in random graphs and its \"planted\" variant, where one wants to recover a clique of size $\\omega \\gg \\log{(n)}$ added to an \\Erdos-\\Renyi graph $G \\sim G(n,\\frac{1}{2})$, have been intensely studied. Nevertheless, existing polynomial time algorithms can only recover planted cliques of size $\\omega = \\Omega(\\sqrt{n})$. By contrast, information theoretically, one can recover planted cliques so long as $\\omega \\gg \\log{(n)}$. In this work, we continue the investigation of algorithms from the sum of squares hierarchy for solving the planted clique problem begun by Meka, Potechin, and Wigderson (MPW, 2015) and Deshpande and Montanari (DM,2015). Our main results improve upon both these previous works by showing: 1. Degree four SoS does not recover the planted clique unless $\\omega \\gg \\sqrt n poly \\log n$, improving upon the bound $\\omega \\gg n^{1/3}$ due to DM. A similar result was obtained independently by Raghavendra and Schramm (2015). 2. For $2 < d = o(\\sqrt{\\log{(n)}})$, degree $2d$ SoS does not recover the planted clique unless $\\omega \\gg n^{1/(d + 1)} /(2^d poly \\log n)$, improving upon the bound due to MPW. Our proof for the second result is based on a fine spectral analysis of the certificate used in the prior works MPW,DM and Feige and Krauthgamer (2003) by decomposing it along an appropriately chosen basis. Along the way, we develop combinatorial tools to analyze the spectrum of random matrices with dependent entries and to understand the symmetries in the eigenspaces of the set symmetric matrices inspired by work of Grigoriev (2001). An argument of Kelner shows that the first result cannot be proved using the same certificate. Rather, our proof involves constructing and analyzing a new certificate that yields the nearly tight lower bound by \"correcting\" the certificate of previous works.
An integer polynomial $p$ of $n$ variables is called a \\emph{threshold gate} for a Boolean function $f$ of $n$ variables if for all $x \\in \\zoon$ $f(x)=1$ if and only if $p(x)\\geq 0$. The \\emph{weight} of a threshold gate is the sum of its absolute values. In this paper we study how large a weight might be needed if we fix some function and some threshold degree. We prove $2^{\\Omega(2^{2n/5})}$ lower bound on this value. The best previous bound was $2^{\\Omega(2^{n/8})}$ (Podolskii, 2009). In addition we present substantially simpler proof of the weaker $2^{\\Omega(2^{n/4})}$ lower bound. This proof is conceptually similar to other proofs of the bounds on weights of nonlinear threshold gates, but avoids a lot of technical details arising in other proofs. We hope that this proof will help to show the ideas behind the construction used to prove these lower bounds.
We give two new characterizations of ($\\F_2$-linear) locally testable error-correcting codes in terms of Cayley graphs over $\\F_2^h$: \\begin{enumerate} \\item A locally testable code is equivalent to a Cayley graph over $\\F_2^h$ whose set of generators is significantly larger than $h$ and has no short linear dependencies, but yields a shortest-path metric that embeds into $\\ell_1$ with constant distortion. This extends and gives a converse to a result of Khot and Naor (2006), which showed that codes with large dual distance imply Cayley graphs that have no low-distortion embeddings into $\\ell_1$. \\item A locally testable code is equivalent to a Cayley graph over $\\F_2^h$ that has significantly more than $h$ eigenvalues near 1, which have no short linear dependencies among them and which \"explain\" all of the large eigenvalues. This extends and gives a converse to a recent construction of Barak et al. (2012), which showed that locally testable codes imply Cayley graphs that are small-set expanders but have many large eigenvalues. \\end{enumerate}
We examine the power of silent constant-space probabilistic verifiers that watch asymmetric debates (where one side is unable to see some of the messages of the other) between two deterministic provers, and try to determine who is right. We prove that probabilistic verifiers outperform their deterministic counterparts as asymmetric debate checkers. It is shown that the membership problem for every language in NSPACE(s(n)) has a 2^{s(n)}-time debate where one prover is completely blind to the other one, for polynomially bounded space constructible s(n). When partial information is allowed to be seen by the handicapped prover, the class of languages debatable in 2^{s(n)} time contains TIME(2^{s(n)}), so a probabilistic finite automaton can solve any decision problem in P with small error in polynomial time with the aid of such a debate. We also compare our systems with those with a single prover, and with competing-prover interactive proof systems.
Among all sequences that satisfy a divide-and-conquer recurrence, the sequences that are rational with respect to a numeration system are certainly the most immediate and most essential. Nevertheless, until recently they have not been studied from the asymptotic standpoint. We show how a mechanical process permits to compute their asymptotic expansion. It is based on linear algebra, with Jordan normal form, joint spectral radius, and dilation equations. The method is compared with the analytic number theory approach, based on Dirichlet series and residues, and new ways to compute the Fourier series of the periodic functions involved in the expansion are developed. The article comes with an extended bibliography.
In this paper, we exhibit a strong relation between the sand automata configuration space and the cellular automata configuration space. This relation induces a compact topology for sand automata, and a new context in which sand automata are homeomorphic to cellular automata acting on a specific subshift. We show that the existing topological results for sand automata, including the Hedlund-like representation theorem, still hold. In this context, we give a characterization of the cellular automata which are sand automata, and study some dynamical behaviors such as equicontinuity. Furthermore, we deal with the nilpotency. We show that the classical definition is not meaningful for sand automata. Then, we introduce a suitable new notion of nilpotency for sand automata. Finally, we prove that this simple dynamical behavior is undecidable.
Sensitivity, certificate complexity and block sensitivity are widely used Boolean function complexity measures. A longstanding open problem, proposed by Nisan and Szegedy, is whether sensitivity and block sensitivity are polynomially related. Motivated by the constructions of functions which achieve the largest known separations, we study the relation between 1-certificate complexity and 0-sensitivity and 0-block sensitivity. Previously the best known lower bound was $C_1(f)\\geq \\frac{bs_0(f)}{2 s_0(f)}$, achieved by Kenyon and Kutin. We improve this to $C_1(f)\\geq \\frac{3 bs_0(f)}{2 s_0(f)}$. While this improvement is only by a constant factor, this is quite important, as it precludes achieving a superquadratic separation between $bs(f)$ and $s(f)$ by iterating functions which reach this bound. In addition, this bound is tight, as it matches the construction of Ambainis and Sun up to an additive constant.
We revisit various PTAS s (Polynomial Time Approximation Schemes) for minimization versions of dense problems, and show that they can be performed with sublinear query complexity. This means that not only do we obtain a (1+eps)-approximation to the NP-Hard problems in polynomial time, but also avoid reading the entire input. This setting is particularly advantageous when the price of reading parts of the input is high, as is the case, for examples, where humans provide the input. Trading off query complexity with approximation is the raison d etre of the field of learning theory, and of the ERM (Empirical Risk Minimization) setting in particular. A typical ERM result, however, does not deal with computational complexity. We discuss two particular problems for which (a) it has already been shown that sublinear querying is sufficient for obtaining a (1 + eps)-approximation using unlimited computational power (an ERM result), and (b) with full access to input, we could get a (1+eps)-approximation in polynomial time (a PTAS). Here we show that neither benefit need be sacrificed. We get a PTAS with efficient query complexity.
Rush Hour Logic was introduced in [Flake&Baum99] as a model of computation inspired by the ``Rush Hour   toy puzzle, in which cars can move horizontally or vertically within a parking lot. The authors show how the model supports polynomial space computation, using certain car configurations as building blocks to construct boolean circuits for a cpu and memory. They consider the use of cars of length 3 crucial to their construction, and conjecture that cars of size 2 only, which we ll call `Size 2 Rush Hour , do not support polynomial space computation. We settle this conjecture by showing that the required building blocks are constructible in Size 2 Rush Hour. Furthermore, we consider Unit Rush Hour, which was hitherto believed to be trivial, show its relation to maze puzzles, and provide empirical support for its hardness.
We prove a lower bound of $\\Omega(n^{1/2 - c})$, for all $c>0$, on the query complexity of (two-sided error) non-adaptive algorithms for testing whether an $n$-variable Boolean function is monotone versus constant-far from monotone. This improves a $\\tilde{\\Omega}(n^{1/5})$ lower bound for the same problem that was recently given in [CST14] and is very close to $\\Omega(n^{1/2})$, which we conjecture is the optimal lower bound for this model.
Let G=(V,E) be a graph. Let k < |V| be an integer. Let O_k be the number of edge induced subgraphs of G having k vertices and an odd number of edges. Let E_k be the number of edge induced subgraphs of G having k vertices and an even number of edges. Let D_k = O_k - E_k. The ODD EVEN DELTA problem consists in computing D_k, given G and k. We show that such problem is #P-hard, even on 3-regular bipartite planar graphs.
We show some facts regarding the question whether, for any number $n$, the length of the shortest Addition Multiplications Chain (AMC) computing $n$ is polynomial in the length of the shortest division-free Straight Line Program (SLP) that computes $n$. If the answer to this question is \"yes\", then we can show a stronger upper bound for $\\mathrm{PosSLP}$, the important problem which essentially captures the notion of efficient computation over the reals. If the answer is \"no\", then this would demonstrate how subtraction helps generating integers super-polynomially faster, given that addition and multiplication can be done in unit time. In this paper, we show that, for almost all numbers, AMCs and SLPs need same asymptotic length for computation. However, for one specific form of numbers, SLPs are strictly more powerful than AMCs by at least one step of computation.
Manipulation, bribery, and control are well-studied ways of changing the outcome of an election. Many voting rules are, in the general case, computationally resistant to some of these manipulative actions. However when restricted to single-peaked electorates, these rules suddenly become easy to manipulate. Recently, Faliszewski, Hemaspaandra, and Hemaspaandra (2014) studied the complexity of dishonest behavior in nearly single-peaked electorates. These are electorates that are not single-peaked but close to it according to some distance measure. In this paper we introduce several new distance measures regarding single-peakedness. We prove that determining whether a given profile is nearly single-peaked is NP-complete in many cases. For one case we present a polynomial-time algorithm. In case the single-peaked axis is given, we show that determining the distance is always computable in polynomial time. Furthermore, we explore the relations between the new notions introduced in this paper and existing notions from the literature.
The class P is in fact a proper sub-class of NP. We explore topological properties of the Hamming space 2^[n] where [n]={1, 2,..., n}. With the developed theory, we show: (i) a theorem that is closely related to Erdos and Rado s sunflower lemma, and claims a stronger statement in most cases, (ii) a new approach to prove the exponential monotone circuit complexity of the clique problem, (iii) NC \\ne NP through the impossibility of a Boolean circuit with poly-log depth to compute cliques, based on the construction of (ii), and (iv) P \\ne NP through the exponential circuit complexity of the clique problem, based on the construction of (iii). Item (i) leads to the existence of a sunflower with a small core in certain families of sets, which is not an obvious consequence of the sunflower lemma. In (iv), we show that any Boolean circuit computing the clique function CLIQUE_{n,k} (k=n^{1/4}) has a size exponential in n. Thus, we will separate P/poly from NP also. Razborov and Rudich showed strong evidence that no natural proof can prove exponential circuit complexity of a Boolean function. We confirm that the proofs for (iii) and (iv) are not natural.
We study the following computational problem: for which values of $k$, the majority of $n$ bits $\\text{MAJ}_n$ can be computed with a depth two formula whose each gate computes a majority function of at most $k$ bits? The corresponding computational model is denoted by $\\text{MAJ}_k \\circ \\text{MAJ}_k$. We observe that the minimum value of $k$ for which there exists a $\\text{MAJ}_k \\circ \\text{MAJ}_k$ circuit that has high correlation with the majority of $n$ bits is equal to $\\Theta(n^{1/2})$. We then show that for a randomized $\\text{MAJ}_k \\circ \\text{MAJ}_k$ circuit computing the majority of $n$ input bits with high probability for every input, the minimum value of $k$ is equal to $n^{2/3+o(1)}$. We show a worst case lower bound: if a $\\text{MAJ}_k \\circ \\text{MAJ}_k$ circuit computes the majority of $n$ bits correctly on all inputs, then $k\\geq n^{13/19+o(1)}$. This lower bound exceeds the optimal value for randomized circuits and thus is unreachable for pure randomized techniques. For depth $3$ circuits we show that a circuit with $k= O(n^{2/3})$ can compute $\\text{MAJ}_n$ correctly on all inputs.
We show here that every non-adaptive property testing algorithm making a constant number of queries, over a fixed alphabet, can be converted to a sample-based (as per [Goldreich and Ron, 2015]) testing algorithm whose average number of queries is a fixed, smaller than $1$, power of $n$. Since the query distribution of the sample-based algorithm is not dependent at all on the property, or the original algorithm, this has many implications in scenarios where there are many properties that need to be tested for concurrently, such as testing (relatively large) unions of properties, or converting a Merlin-Arthur Proximity proof (as per [Gur and Rothblum, 2013]) to a proper testing algorithm. The proof method involves preparing the original testing algorithm for a combinatorial analysis, which in turn involves a new result about the existence of combinatorial structures (essentially generalized sunflowers) that allow the sample-based tester to replace the original constant query complexity tester.
We develop techniques to investigate relativized hierarchical unambiguous computation. We apply our techniques to generalize known constructs involving relativized unambiguity based complexity classes (UP and \\mathcal{UP}) to new constructs involving arbitrary higher levels of the relativized unambiguous polynomial hierarchy (UPH). Our techniques are developed on constraints imposed by hierarchical arrangement of unambiguous nondeterministic polynomial-time Turing machines, and so they differ substantially, in applicability and in nature, from standard methods (such as the switching lemma [Hastad, Computational Limitations of Small-Depth Circuits, MIT Press, 1987]), which play roles in carrying out similar generalizations. Aside from achieving these generalizations, we resolve a question posed by Cai, Hemachandra, and Vyskoc [J. Cai, L. Hemachandra, and J. Vyskoc, Promises and fault-tolerant database access, In K. Ambos-Spies, S. Homer, and U. Schoening, editors, Complexity Theory, pages 101-146. Cambridge University Press, 1993] on an issue related to nonadaptive Turing access to UP and adaptive smart Turing access to \\mathcal{UP}.
We present a new approach to constructing unconditional pseudorandom generators against classes of functions that involve computing a linear function of the inputs. We give an explicit construction of a pseudorandom generator that fools the discrete Fourier transforms of linear functions with seed-length that is nearly logarithmic (up to polyloglog factors) in the input size and the desired error parameter. Our result gives a single pseudorandom generator that fools several important classes of tests computable in logspace that have been considered in the literature, including halfspaces (over general domains), modular tests and combinatorial shapes. For all these classes, our generator is the first that achieves near logarithmic seed-length in both the input length and the error parameter. Getting such a seed-length is a natural challenge in its own right, which needs to be overcome in order to derandomize RL - a central question in complexity theory. Our construction combines ideas from a large body of prior work, ranging from a classical construction of [NN93] to the recent gradually increasing independence paradigm of [KMN11, CRSW13, GMRTV12], while also introducing some novel analytic machinery which might find other applications.
We suggest a diagrammatic model of computation based on an axiom of distributivity. A diagram of a decorated coloured tangle, similar to those that appear in low dimensional topology, plays the role of a circuit diagram. Equivalent diagrams represent bisimilar computations. We prove that our model of computation is Turing complete, and that with bounded resources it can moreover decide any language in complexity class IP, sometimes with better performance parameters than corresponding classical protocols.
We report the consequences of a destabilization process on a simulated General Purpose Analog Computer. This new technology overcomes problems linked with serial ambiguity, and provides an analog bias to encode algorithms whose complexity is over polynomial. We also implicitly demonstrate how countermesures of the Stochastic Aperture Degeneracy could efficiently reach higher computational classes, and would open a road towards Analog Reverse Time Computation.
We study depth lower bounds against non-monotone circuits, parametrized by a new measure of non-monotonicity: the orientation of a function $f$ is the characteristic vector of the minimum sized set of negated variables needed in any DeMorgan circuit computing $f$. We prove trade-off results between the depth and the weight/structure of the orientation vectors in any circuit $C$ computing the Clique function on an $n$ vertex graph. We prove that if $C$ is of depth $d$ and each gate computes a Boolean function with orientation of weight at most $w$ (in terms of the inputs to $C$), then $d \\times w$ must be $\\Omega(n)$. In particular, if the weights are $o(\\frac{n}{\\log^k n})$, then $C$ must be of depth $\\omega(\\log^k n)$. We prove a barrier for our general technique. However, using specific properties of the Clique function and the Karchmer-Wigderson framework (Karchmer and Wigderson, 1988), we go beyond the limitations and obtain lower bounds when the weight restrictions are less stringent. We then study the depth lower bounds when the structure of the orientation vector is restricted. Asymptotic improvements to our results (in the restricted setting), separates NP from NC. As our main tool, we generalize Karchmer-Wigderson gamefor monotone functions to work for non-monotone circuits parametrized by the weight/structure of the orientation. We also prove structural results about orientation and prove connections between number of negations and weight of orientations required to compute a function.
The problems studied in this paper originate from Graph Motif, a problem introduced in 2006 in the context of biological networks. Informally speaking, it consists in deciding if a multiset of colors occurs in a connected subgraph of a vertex-colored graph. Due to the high rate of noise in the biological data, more flexible definitions of the problem have been outlined. We present in this paper two inapproximability results for two different optimization variants of Graph Motif: one where the size of the solution is maximized, the other when the number of substitutions of colors to obtain the motif from the solution is minimized. We also study a decision version of Graph Motif where the connectivity constraint is replaced by the well known notion of graph modularity. While the problem remains NP-complete, it allows algorithms in FPT for biologically relevant parameterizations.
We make progress on some questions related to polynomial approximations of ${\\rm AC}^0$. It is known, by works of Tarui (Theoret. Comput. Sci. 1993) and Beigel, Reingold, and Spielman (Proc. $6$th CCC, 1991), that any ${\\rm AC}^0$ circuit of size $s$ and depth $d$ has an $\\varepsilon$-error probabilistic polynomial over the reals of degree $(\\log (s/\\varepsilon))^{O(d)}$. We improve this upper bound to $(\\log s)^{O(d)}\\cdot \\log(1/\\varepsilon)$, which is much better for small values of $\\varepsilon$. We give an application of this result by using it to resolve a question posed by Tal (ECCC 2014): we show that $(\\log s)^{O(d)}\\cdot \\log(1/\\varepsilon)$-wise independence fools ${\\rm AC}^0$, improving on Tal s strengthening of Braverman s theorem (J. ACM, 2010) that $(\\log (s/\\varepsilon))^{O(d)}$-wise independence fools ${\\rm AC}^0$. Up to the constant implicit in the $O(d)$, our result is tight. As far as we know, this is the first PRG construction for ${\\rm AC}^0$ that achieves optimal dependence on the error $\\varepsilon$. We also prove lower bounds on the best polynomial approximations to ${\\rm AC}^0$. We show that any polynomial approximating the ${\\rm OR}$ function on $n$ bits to a small constant error must have degree at least $\\widetilde{\\Omega}(\\sqrt{\\log n})$. This result improves exponentially on a recent lower bound demonstrated by Meka, Nguyen, and Vu (arXiv 2015).
Any positive word comprised of random sequence of tokens form a finite alphabet can be reduced (without change of length) using an appropriate size Braid group relationships. Surprisingly the Braid relations dramatically reduce the Kolmogorov Complexity of the original random word and do so in distinct bands of (rate of change) values with gaps in between. Distribution of these bands are estimated and empirical statistics collected by actually coding approximations to the Kolmogorov Complexity (in Mathematica 9.0). Lempel-Ziv-Welch lossless compression algorithm techniques used to estimate the distribution for gaped bands. Evidence provided that such distributions of reduction in Kolmogorov Complexity based upon Braid groups are universal i.e. they can model more general algebraic structures other than Braid groups.
Motivated by the Hadamard product of matrices we define the Hadamard product of multivariate polynomials and study its arithmetic circuit and branching program complexity. We also give applications and connections to polynomial identity testing. Our main results are the following. 1. We show that noncommutative polynomial identity testing for algebraic branching programs over rationals is complete for the logspace counting class $\\ceql$, and over fields of characteristic $p$ the problem is in $\\ModpL/\\Poly$. 2.We show an exponential lower bound for expressing the Raz-Yehudayoff polynomial as the Hadamard product of two monotone multilinear polynomials. In contrast the Permanent can be expressed as the Hadamard product of two monotone multilinear formulas of quadratic size.
We consider an instance of the following problem: Parties P_1,..., P_k each receive an input x_i, and a coordinator (distinct from each of these parties) wishes to compute f(x_1,..., x_k) for some predicate f. We are interested in one-round protocols where each party sends a single message to the coordinator; there is no communication between the parties themselves. What is the minimum communication complexity needed to compute f, possibly with bounded error? We prove tight bounds on the one-round communication complexity when f corresponds to the promise problem of distinguishing sums (namely, determining which of two possible values the {x_i} sum to) or the problem of determining whether the {x_i} sum to a particular value. Similar problems were studied previously by Nisan and in concurrent work by Viola. Our proofs rely on basic theorems from additive combinatorics, but are otherwise elementary.
The sensitivity conjecture which claims that the sensitivity complexity is polynomially related to block sensitivity complexity, is one of the most important and challenging problem in decision tree complexity theory. Despite of a lot of efforts, the best known upper bound of block sensitivity, as well as the certificate complexity, are still exponential in terms of sensitivity: $bs(f)\\leq C(f)\\leq\\max\\{2^{s(f)-1}(s(f)-\\frac{1}{3}),s(f)\\}$. In this paper, we give a better upper bound of $bs(f)\\leq C(f)\\leq(\\frac{8}{9} + o(1))s(f)2^{s(f) - 1}$. The proof is based on a deep investigation on the structure of the sensitivity graph. We also provide a tighter relationship between $C_0(f)$ and $s_0(f)$ for functions with $s_1(f)=2$.
Graph constraint logic is a framework introduced by Hearn and Demaine, which provides several problems that are often a convenient starting point for reductions. We study the parameterized complexity of Constraint Graph Satisfiability and both bounded and unbounded versions of Nondeterministic Constraint Logic (NCL) with respect to solution length, treewidth and maximum degree of the underlying constraint graph as parameters. As a main result we show that restricted NCL remains PSPACE-complete on graphs of bounded bandwidth, strengthening Hearn and Demaine s framework. This allows us to improve upon existing results obtained by reduction from NCL. We show that reconfiguration versions of several classical graph problems (including independent set, feedback vertex set and dominating set) are PSPACE-complete on planar graphs of bounded bandwidth and that Rush Hour, generalized to $k\\times n$ boards, is PSPACE-complete even when $k$ is at most a constant.
Comparator circuit model was originally introduced by Mayr and Subramanian (1992) (and further studied by Cook, Filmus and Le (2012)) to capture problems which are not known to be P-complete but still not known to admit efficient parallel algorithms. The class CC is the complexity class of problems many-one logspace reducible to the Comparator Circuit Value Problem and we know that NL is contained in CC which is inturn contained in P. Cook, Filmus and Le (2012) showed that CC is also the class of languages decided by polynomial size comparator circuits. We study generalizations of the comparator circuit model that work over fixed finite bounded posets. We observe that there are universal comparator circuits even over arbitrary fixed finite bounded posets. Building on this, we show that general (resp. skew) comparator circuits of polynomial size over fixed finite distributive lattices characterizes CC (resp. L). Complementing this, we show that general comparator circuits of polynomial size over arbitrary fixed finite lattices exactly characterizes P and that when the comparator circuit is skew they characterize NL. In addition, we show a characterization of the class NP by a family of polynomial sized comparator circuits over fixed {\\em finite bounded posets}. These results generalize the results by Cook, Filmus and Le (2012) regarding the power of comparator circuits. As an aside, we consider generalizations of Boolean formulae over arbitrary lattices. We show that Spira s theorem (1971) can be extended to this setting as well and show that polynomial sized Boolean formulae over finite fixed lattices capture exactly NC^1. Our results indicate potential new approaches towards the problems P vs CC and NL vs L using lattice theoretic methods.
In this note, we generalize the results of arXiv:0901.2703v1 We show that all one-way quantum finite automaton (QFA) models that are at least as general as Kondacs-Watrous QFA s are equivalent in power to classical probabilistic finite automata in this setting. Unlike their probabilistic counterparts, allowing the tape head to stay put for some steps during its traversal of the input does enlarge the class of languages recognized by such QFA s with unbounded error. (Note that, the proof of Theorem 1 in the abstract was presented in the previous version (arXiv:0901.2703v1).)
We propose models for lobbying in a probabilistic environment, in which an actor (called \"The Lobby\") seeks to influence voters  preferences of voting for or against multiple issues when the voters  preferences are represented in terms of probabilities. In particular, we provide two evaluation criteria and two bribery methods to formally describe these models, and we consider the resulting forms of lobbying with and without issue weighting. We provide a formal analysis for these problems of lobbying in a stochastic environment, and determine their classical and parameterized complexity depending on the given bribery/evaluation criteria and on various natural parameterizations. Specifically, we show that some of these problems can be solved in polynomial time, some are NP-complete but fixed-parameter tractable, and some are W[2]-complete. Finally, we provide approximability and inapproximability results for these problems and several variants.
We show how to calculate the finite-state dimension (equivalently, the finite-state compressibility) of a saturated sets $X$ consisting of {\\em all} infinite sequences $S$ over a finite alphabet $\\Sigma_m$ satisfying some given condition $P$ on the asymptotic frequencies with which various symbols from $\\Sigma_m$ appear in $S$. When the condition $P$ completely specifies an empirical probability distribution $\\pi$ over $\\Sigma_m$, i.e., a limiting frequency of occurrence for {\\em every} symbol in $\\Sigma_m$, it has been known since 1949 that the Hausdorff dimension of $X$ is precisely $\\CH(\\pi)$, the Shannon entropy of $\\pi$, and the finite-state dimension was proven to have this same value in 2001. The saturated sets were studied by Volkmann and Cajar decades ago. It got attention again only with the recent developments in multifractal analysis by Barreira, Saussol, Schmeling, and separately Olsen. However, the powerful methods they used -- ergodic theory and multifractal analysis -- do not yield a value for the finite-state (or even computable) dimension in an obvious manner. We give a pointwise characterization of finite-state dimensions of saturated sets. Simultaneously, we also show that their finite-state dimension and strong dimension coincide with their Hausdorff and packing dimension respectively, though the techniques we use are completely elementary. Our results automatically extend to less restrictive effective settings (e.g., constructive, computable, and polynomial-time dimensions).
One of the strongest techniques available for showing lower bounds on quantum communication complexity is the logarithm of the approximation rank of the communication matrix--the minimum rank of a matrix which is entrywise close to the communication matrix. This technique has two main drawbacks: it is difficult to compute, and it is not known to lower bound quantum communication complexity with entanglement. Linial and Shraibman recently introduced a norm, called gamma_2^{alpha}, to quantum communication complexity, showing that it can be used to lower bound communication with entanglement. Here the parameter alpha is a measure of approximation which is related to the allowable error probability of the protocol. This bound can be written as a semidefinite program and gives bounds at least as large as many techniques in the literature, although it is smaller than the corresponding alpha-approximation rank, rk_alpha. We show that in fact log gamma_2^{alpha}(A)$ and log rk_{alpha}(A)$ agree up to small factors. As corollaries we obtain a constant factor polynomial time approximation algorithm to the logarithm of approximate rank, and that the logarithm of approximation rank is a lower bound for quantum communication complexity with entanglement.
We present a general method for converting any family of unsatisfiable CNF formulas that is hard for one of the simplest proof systems, tree resolution, into formulas that require large rank in any proof system that manipulates polynomials or polynomial threshold functions of degree at most k (known as Th(k) proofs). Such systems include Lovasz-Schrijver and Cutting Planes proof systems as well as their high degree analogues. These are based on analyzing two new proof systems, denoted by T^cc(k) and R^cc(k). The proof lines of T^cc(k) are arbitrary Boolean functions, each of which can be evaluated by an efficient k-party randomized communication protocol. They include Th{k-1} proofs as a special case. R^cc(k) proofs are stronger and only require that each inference be locally checkable by an efficient k-party randomized communication protocol. Our main results are the following: (1) When k is O(loglogn), for any unsatisfiable CNF formula F requiring resolution rank r, there is a related CNF formula G=Lift_k(F) requiring refutation rank r^Omega(1/k) log^O(1) n in all R^cc(k) systems. (2) There are strict hierarchies for T^cc(k) and R^cc(k) systems with respect to k when k is O(loglogn in that there are unsatisfiable CNF formulas requiring large rank R^cc(k) refutations but having log^O(1) n rank Th(k) refutations. (3) When k is O(loglogn) there are 2^(n^Omega(1/k)) lower bounds on the size of tree-like T^cc(k) refutations for large classes of lifted CNF formulas. (4) A general method for producing integrality gaps for low rank R^cc(2) inference (and hence Cutting Planes and Th(1) inference) based on related gaps for low rank resolution. These gaps are optimal for MAX-2t-SAT.
We introduce the notion of a robust parameterized arithmetic circuit for the evaluation of algebraic families of multivariate polynomials. Based on this notion, we present a computation model, adapted to Scientific Computing, which captures all known branching parsimonious symbolic algorithms in effective Algebraic Geometry. We justify this model by arguments from Software Engineering. Finally we exhibit a class of simple elimination problems of effective Algebraic Geometry which require exponential time to be solved by branching parsimonious algorithms of our computation model.
Properties of Boolean functions on the hypercube invariant with respect to linear transformations of the domain are among the most well-studied properties in the context of property testing. In this paper, we study the fundamental class of linear-invariant properties called matroid freeness properties. These properties have been conjectured to essentially coincide with all testable linear-invariant properties, and a recent sequence of works has established testability for increasingly larger subclasses. One question left open, however, is whether the infinitely many syntactically different properties recently shown testable in fact correspond to new, semantically distinct ones. This is a crucial issue since it has also been shown that there exist subclasses of these properties for which an infinite set of syntactically different representations collapse into one of a small, finite set of properties, all previously known to be testable. An important question is therefore to understand the semantics of matroid freeness properties, and in particular when two syntactically different properties are truly distinct. We shed light on this problem by developing a method for determining the relation between two matroid freeness properties P and Q. Furthermore, we show that there is a natural subclass of matroid freeness properties such that for any two properties P and Q from this subclass, a strong dichotomy must hold: either P is contained in Q or the two properties are \"well separated.\" As an application of this method, we exhibit new, infinite hierarchies of testable matroid freeness properties such that at each level of the hierarchy, there are functions that are far from all functions lying in lower levels of the hierarchy. Our key technical tool is an apparently new notion of maps between linear matroids, called matroid homomorphisms, that might be of independent interest.
We consider the multiplicative complexity of Boolean functions with multiple bits of output, studying how large a multiplicative complexity is necessary and sufficient to provide a desired nonlinearity. For so-called $\\Sigma\\Pi\\Sigma$ circuits, we show that there is a tight connection between error correcting codes and circuits computing functions with high nonlinearity. Combining this with known coding theory results, we show that functions with $n$ inputs and $n$ outputs with the highest possible nonlinearity must have at least $2.32n$ AND gates. We further show that one cannot prove stronger lower bounds by only appealing to the nonlinearity of a function; we show a bilinear circuit computing a function with almost optimal nonlinearity with the number of AND gates being exactly the length of such a shortest code. Additionally we provide a function which, for general circuits, has multiplicative complexity at least $2n-3$. Finally we study the multiplicative complexity of \"almost all   functions. We show that every function with $n$ bits of input and $m$ bits of output can be computed using at most $2.5(1+o(1))\\sqrt{m2^n}$ AND gates.
This paper analyzes to what extent it is possible to efficiently reduce the number of clauses in NP-hard satisfiability problems, without changing the answer. Upper and lower bounds are established using the concept of kernelization. Existing results show that if NP is not contained in coNP/poly, no efficient preprocessing algorithm can reduce n-variable instances of CNF-SAT with d literals per clause, to equivalent instances with O(n^{d-e}) bits for any e > 0. For the Not-All-Equal SAT problem, a compression to size \\~O(n^{d-1}) exists. We put these results in a common framework by analyzing the compressibility of binary CSPs. We characterize constraint types based on the minimum degree of multivariate polynomials whose roots correspond to the satisfying assignments, obtaining (nearly) matching upper and lower bounds in several settings. Our lower bounds show that not just the number of constraints, but also the encoding size of individual constraints plays an important role. For example, for Exact Satisfiability with unbounded clause length it is possible to efficiently reduce the number of constraints to n+1, yet no polynomial-time algorithm can reduce to an equivalent instance with O(n^{2-e}) bits for any e > 0, unless NP is a subset of coNP/poly.
Given a boolean n by n matrix A we consider arithmetic circuits for computing the transformation x->Ax over different semirings. Namely, we study three circuit models: monotone OR-circuits, monotone SUM-circuits (addition of non-negative integers), and non-monotone XOR-circuits (addition modulo 2). Our focus is on \\emph{separating} these models in terms of their circuit complexities. We give three results towards this goal: (1) We prove a direct sum type theorem on the monotone complexity of tensor product matrices. As a corollary, we obtain matrices that admit OR-circuits of size O(n), but require SUM-circuits of size \\Omega(n^{3/2}/\\log^2n). (2) We construct so-called \\emph{k-uniform} matrices that admit XOR-circuits of size O(n), but require OR-circuits of size \\Omega(n^2/\\log^2n). (3) We consider the task of \\emph{rewriting} a given OR-circuit as a XOR-circuit and prove that any subquadratic-time algorithm for this task violates the strong exponential time hypothesis.
The simplified linguistic relation between syntax and semantics as intrinsic property of classic Arabic motivates a dedicated look at P vs. NP in light of efforts and solutions presented by ancient Arab- and Muslim scholars to facilitate logical- and mathematical deduction. In Islamic Jurisprudence (Fikh) it has recently been shown [Abdelwahab et al. 2014] that if a formal system expressing Fikh is chosen in such a way that it is both, logically complete and decidable, the question of a complete and consistent legislation is decidable. If this formal Fikh-system is additionally chosen to be at least as expressive as propositional logic, the deduction of detailed sentences is efficient while the deduction of general rules is NP-complete. Further investigation reveals that ancient scholars adopted a very efficient approach for checking the validity of assertions with regard to both, language and logical argument which was mainly characterized by the extensive use of syntactical patterns already existent in input-variables. Accordingly, this paper introduces efficient pattern-oriented procedures for 3-SAT as well as 2-approximation algorithms for MinFBDD. It opens up the possibility of constructing polynomial sized FBDDs for all Boolean functions expressed in a compact way. Eventually, an application of this new 3-SAT-solver is shown to enable polynomial upper bounds of the number of nodes in FBDDs constructed for finite projective planes problems overhauling the currently known exponential lower bounds.
We establish a generic form of hardness amplification for the approximability of constant-depth Boolean circuits by polynomials. Specifically, we show that if a Boolean circuit cannot be pointwise approximated by low-degree polynomials to within constant error in a certain one-sided sense, then an OR of disjoint copies of that circuit cannot be pointwise approximated even with very high error. As our main application, we show that for every sequence of degrees $d(n)$, there is an explicit depth-three circuit $F: \\{-1,1\\}^n \\to \\{-1,1\\}$ of polynomial-size such that any degree-$d$ polynomial cannot pointwise approximate $F$ to error better than $1-\\exp\\left(-\\tilde{\\Omega}(nd^{-3/2})\\right)$. As a consequence of our main result, we obtain an $\\exp\\left(-\\tilde{\\Omega}(n^{2/5})\\right)$ upper bound on the the discrepancy of a function in AC$^0$, and an $\\exp\\left(\\tilde{\\Omega}(n^{2/5})\\right)$ lower bound on the threshold weight of AC$^0$, improving over the previous best results of $\\exp\\left(-\\Omega(n^{1/3})\\right)$ and $\\exp\\left(\\Omega(n^{1/3})\\right)$ respectively. Our techniques also yield a new lower bound of $\\Omega\\left(n^{1/2}/\\log^{(d-2)/2}(n)\\right)$ on the approximate degree of the AND-OR tree of depth $d$, which is tight up to polylogarithmic factors for any constant $d$, as well as new bounds for read-once DNF formulas. In turn, these results imply new lower bounds on the communication and circuit complexity of these classes, and demonstrate strong limitations on existing PAC learning algorithms.
We investigate the complexity of integration and derivative for multivariate polynomials in the standard computation model. The integration is in the unit cube $[0,1]^d$ for a multivariate polynomial, which has format $f(x_1,\\cdots, x_d)=p_1(x_1,\\cdots, x_d)p_2(x_1,\\cdots, x_d)\\cdots p_k(x_1,\\cdots, x_d)$, where each $p_i(x_1,\\cdots, x_d)=\\sum_{j=1}^d q_j(x_j)$ with all single variable polynomials $q_j(x_j)$ of degree at most two and constant coefficients. We show that there is no any factor polynomial time approximation for the integration $\\int_{[0,1]^d}f(x_1,\\cdots,x_d)d_{x_1}\\cdots d_{x_d}$ unless $P=NP$. For the complexity of multivariate derivative, we consider the functions with the format $f(x_1,\\cdots, x_d)=p_1(x_1,\\cdots, x_d)p_2(x_1,\\cdots, x_d)\\cdots p_k(x_1,\\cdots, x_d),$ where each $p_i(x_1,\\cdots, x_d)$ is of degree at most $2$ and $0,1$ coefficients. We also show that unless $P=NP$, there is no any factor polynomial time approximation to its derivative ${\\partial f^{(d)}(x_1,\\cdots, x_d)\\over \\partial x_1\\cdots \\partial x_d}$ at the origin point $(x_1,\\cdots, x_d)=(0,\\cdots,0)$. Our results show that the derivative may not be easier than the integration in high dimension. We also give some tractable cases of high dimension integration and derivative.
We study the effect of query order on computational power, and show that $\\pjk$-the languages computable via a polynomial-time machine given one query to the jth level of the boolean hierarchy followed by one query to the kth level of the boolean hierarchy-equals $\\redttnp{j+2k-1}$ if j is even and k is odd, and equals $\\redttnp{j+2k}$ otherwise. Thus, unless the polynomial hierarchy collapses, it holds that for each $1\\leq j \\leq k$: $\\pjk = \\pkj \\iff (j=k) \\lor (j{is even} \\land k=j+1)$. We extend our analysis to apply to more general query classes.
Asymptotic notations are heavily used while analysing runtimes of algorithms. Present paper argues that some of these usages are non trivial, therefore incurring errors in communication of ideas. After careful reconsidera- tion of the various existing notations a new notation is proposed. This notation has similarities with the other heavily used notations like Big-Oh, Big Theta, while being more accurate when describing the order relationship. It has been argued that this notation is more suitable for describing algorithm runtime than Big-Oh.
Scoring systems are an extremely important class of election systems. We study the complexity of manipulation, constructive control by deleting voters (CCDV), and bribery for scoring systems. For manipulation, we show that for all scoring rules with a constant number of different coefficients, manipulation is in P. And we conjecture that there is no dichotomy theorem. On the other hand, we obtain dichotomy theorems for CCDV and bribery problem. More precisely, we show that both of these problems are easy for 1-approval, 2-approval, 1-veto, 2-veto, 3-veto, generalized 2-veto, and (2,1,...,1,0), and hard in all other cases. These results are the \"dual\" of the dichotomy theorem for the constructive control by adding voters (CCAV) problem from (Hemaspaandra, Hemaspaandra, Schnoor, AAAI 2014), but do not at all follow from that result. In particular, proving hardness for CCDV is harder than for CCAV since we do not have control over what the controller can delete, and proving easiness for bribery tends to be harder than for control, since bribery can be viewed as control followed by manipulation.
We present and study a framework in which one can present alternation-based lower bounds on proof length in proof systems for quantified Boolean formulas. A key notion in this framework is that of proof system ensemble, which is (essentially) a sequence of proof systems where, for each, proof checking can be performed in the polynomial hierarchy. We introduce a proof system ensemble called relaxing QU-res which is based on the established proof system QU-resolution. Our main results include an exponential separation of the tree-like and general versions of relaxing QU-res, and an exponential lower bound for relaxing QU-res; these are analogs of classical results in propositional proof complexity.
This papers considers the problem of maximizing the load that can be served by a power network. We use the commonly accepted Linear DC power network model and consider wo configuration options: switching lines and using FACTS devices. We present the first comprehensive complexity study of this optimization problem. Our results show hat the problem is NP-complete and that there is no fully polynomial-time approximation scheme. For switching, these results extend to planar networks with a aximum-node degree of 3. Additionally, we demonstrate that the optimization problems are still NP-hard if we restrict the network structure to cacti with a maximum degree of 3.
In a recent result, Khot and Saket [FOCS 2014] proved the quasi-NP-hardness of coloring a 2-colorable 12-uniform hypergraph with $2^{(\\log n)^{\\Omega(1)}}$ colors. This result was proved using a novel outer PCP verifier which had a strong soundness guarantee. In this note, we show that we can reduce the arity of their result by modifying their 12-query inner verifier to an 8-query inner verifier based on the hypergraph coloring hardness reductions of Guruswami et. al. [STOC 2014]. More precisely, we prove quasi-NP-hardness of the following problems on n-vertex hypergraphs. - Coloring a 2-colorable 8-uniform hypergraph with $2^{(\\log n)^{\\Omega(1)}}$ colors. - Coloring a 4-colorable 4-uniform hypergraph with $2^{(\\log n)^{\\Omega(1)}}$ colors.
A concept of a 650 MHz CW magnetron transmitter with fast control in phase and power, based on two-stage injection-locked CW magnetrons, has been proposed to drive Superconducting Cavities (SC) for intensity-frontier accelerators. The concept is based on a theoretical model considering a magnetron as a forced oscillator and experimentally verified with a 2.5 MW pulsed magnetron. To fulfill fast control of phase and output power requirements of SC accelerators, both two-stage injection-locked CW magnetrons are combined with a 3-dB hybrid. Fast control in output power is achieved by varying the input phase of one of the magnetrons. For output power up to 250 kW we expect the output/input power ratio to be about 35 to 40 dB in CW or quasi-CW mode with long pulse duration. All magnetrons of the transmitter should be based on commercially available models to decrease the cost of the system. An experimental model using 1 kW, CW, S-band, injection-locked magnetrons with a 3-dB hybrid combiner has been developed and built for study. A description of the model, simulations, and experimental results are presented and discussed in this work.
The energy-spread of the triple-pulse electron beam generated by the Dragon-II linear induction accelerator is measured using the method of energy dispersion in the magnetic field. A sector magnet is applied for energy analyzing of the electron beam, which has a bending radius of 300 mm and a deflection angle of 90 degrees. For each pulse, both the time-resolved and the integral images of the electron position at the output port of the bending beam line are recorded by a streak camera and a CCD camera, respectively. Experimental results demonstrate an energy-spread of less than +-2.0% for the electron pulses. The cavity voltage waveforms obtained by different detectors are also analyzed for comparison.
A beam loss in the superconducting part of the SNS linac has been observed during its commissioning and operation. Although the loss does not prevent the SNS high power operation, it results in an almost uniform irradiation of linac components and increased radiation levels in the tunnel. Multi-particle tracking could neither account for the magnitude of the observed loss nor its dependence on machine parameters. It was recently found that the loss is consistent with the intrabeam particle collisions resulting in stripping of H- ions. The paper describes experimental observations and corresponding analytical estimates of the intrabeam stripping.
Beam halo is an important factor in any high intensity accelerator. It can cause difficulties in the control of the beam, emittance growth, particle loss and even damage to the accelerator. It is therefore essential to understand the mechanisms of halo formation and its dynamics in order to control and minimize its effects. Experimental measurement of the halo distribution is an important tool for such studies. In this paper, we present a new adaptive masking method that we have developed to image beam halo, which uses a digital micro-mirror-array device (DMD). This method has been thoroughly investigated in the laboratory using laser and white light sources, and with real beams produced by the University of Maryland Electron Ring (UMER). A high dynamic range ~10(5) has been demonstrated with this new method and recent studies indicate that this number can be exceeded for more intense beams by at least an order of magnitude. The method is flexible, easy to setup and can be used at any accelerator or light source. We present the results of our measurements of the performance of the method and images of beam halos produced under various experimental conditions.
A Compact laser plasma accelerator (CLAPA) is being built in Peking University, which is based on RPA-PSA mechanism or other acceleration mechanisms. According to the beam parameters from preparatory experiments and theoretical simulations, the beam line is preliminarily designed. The beam line is mainly constituted by common transport elements to deliver proton beam with the energy of 1~50MeV, energy spread of 0~1% and current of 0~108 proton per pulse to satisfy the requirement of different experiments. The simulation result of 15MeV proton beam with an energy spread of 1%, current of 1x108 proton per pulse and final spot radius of 9mm is presented in this paper.
Particle accelerators are invaluable tools for research in the basic and applied sciences, in fields such as materials science, chemistry, the biosciences, particle physics, nuclear physics and medicine. The design, commissioning, and operation of accelerator facilities is a non-trivial task, due to the large number of control parameters and the complex interplay of several conflicting design goals. We propose to tackle this problem by means of multi-objective optimization algorithms which also facilitate a parallel deployment. In order to compute solutions in a meaningful time frame we require a fast and scalable software framework. In this paper, we present the implementation of such a general-purpose framework for simulation based multi-objective optimization methods that allows the automatic investigation of optimal sets of machine parameters. The implementation is based on a master/slave paradigm, employing several masters that govern a set of slaves executing simulations and performing optimization tasks. Using evolutionary algorithms and OPAL simulations as optimizer and forward solver in our framework, we present validation experiments and first results of multi-objective optimization problems in the domain of beam dynamics.
The injector linacs of the JLC/NLC project include the prelinac, the e+ drive linac, the $e- booster, and the $e+ booster. The first three will be S-band machines, the last one, an L-band machine. We have demonstrated that by using detuning alone in the accelerator structure design of these linacs we will have acceptable tolerances for emittance growth due to both injection jitter and structure misalignments, for both the nominal (2.8ns) and alternate (1.4ns) bunch spacings.
In this study, a low energy beam transport (LEBT) channel for the proton linac section of the Turkic Accelerator Complex (TAC) has been designed by using TRACE 2D and TRAVEL codes. The LEBT channel is located between an ion source and a radio frequency quadrupole (RFQ) structure. The aims of the design studies are perfect matching between input and output beams with two solenoid magnets, small emittance growth and sufficient space for beam diagnostics. Total length of such LEBT channel is about 1.3 m. The current of H- ion beam from ion source is 80 mA. In the beam dynamical simulations, we have taken into account some space charge compensation (SCC) factors between %93.75 and %100. The results of both codes have been compared for the selected SCC factors. Additionally, beam aperture study for % 95 SCC factor has been done to discard unwanted particles and increase the beam brightness.
A proposal for a 10-120 mA proton linac employing superconducting beta-graded, CERN type, four cell cavities at 352 MHz is presented. The high energy part (100 MeV-1 GeV) of the machine is split in three beta-graded sections, and transverse focusing is provided via a periodic doublet array. All the parameters, like power in the couplers and accelerating fields in the cavities, are within the state of the art, achieved in operating machines. A first stage of operation at 30 mA beam current is proposed, while the upgrade of the machine to 120 mA operation can be obtained increasing the number of klystrons and couplers per cavity. The additional coupler ports, up to four, will be integrated in the cavity design. Preliminary calculations indicate that beam transport is feasible, given the wide aperture of the 352 MHz structures. A capital cost of less than 100 M$ at 10 mA, reaching up to 280 M$ for the 120 mA extension, has been estimated for the superconducting high energy section (100 MeV-1 GeV). The high efficiency of the proposed machine, reaching 50% at 15 mA, makes it a good candidate for proposed nuclear waste incineration facilities and Energy Amplifier studies.
Single biomolecular imaging using XFEL radiation is an emerging method for protein structure determination using the \"diffraction before destruction\" method at near atomic resolution. Crucial parameters for such bio-imaging experiments are photon energy range, peak power, pulse duration, and transverse coherence. The largest diffraction signals are achieved at the longest wavelength that supports a given resolution, which should be better than 0.3 nm. We propose a configuration which combines self-seeding and undulator tapering techniques with the emittance-spoiler method in order to increase the XFEL output peak power and to shorten the pulse duration up to a level sufficient for performing bio-imaging of single protein molecules at the optimal photon energy range, i.e. around 4 keV. Experiments at the LCLS confirmed the feasibility of these three new techniques. Based on start-to-end simulations we demonstrate that self-seeding, combined with undulator tapering, allows one to achieve up to a 100-fold increase in peak-power. A slotted foil in the last bunch compressor is added for x-ray pulse duration control. Simulations indicate that one can achieve diffraction to the desired resolution with 50 mJ (corresponding to 1e14 photons) per 10 fs pulse at 3.5 keV photon energy in a 100 nm focus. This result is exemplified using the photosystem I membrane protein as a case study.
Most of the current research in superconducting radio frequency (SRF) cavities is focused on ways to reduce the construction and operating cost of SRF based accelerators as well as on the development of new or improved cavity processing techniques. The increase in quality factors is the result of the reduction of the surface resistance of the materials. A recent test on a 1.5 GHz single cell cavity made from ingot niobium of medium purity and heat treated at 1400 C in a ultra-high vacuum induction furnace resulted in a residual resistance of about 1nanoohm and a quality factor at 2.0 K increasing with field up to 5x10^10 at a peak magnetic field of 90 mT. In this contribution, we present some results on the investigation of the origin of the extended Q0-increase, obtained by multiple HF rinses, oxypolishing and heat treatment of all Nb cavities.
The beam coupling impedances of small discontinuities of an accelerator vacuum chamber have been calculated [e.g., S.S. Kurennoy, R.L. Gluckstern, and G.V. Stupakov, Phys. Rev. E 52, 4354 (1995)] for ultrarelativistic beams using the Bethe diffraction theory. Here we extend the results to an arbitrary beam velocity. The vacuum chamber is assumed to have an arbitrary, but uniform along the beam path, cross section. The longitudinal and transverse coupling impedances are derived in terms of series over cross-section eigenfunctions, while the discontinuity shape enters via its polarizabilities. Simple explicit formulas for two important particular cases - circular and rectangular chamber cross sections - are presented. The impedance dependence on the beam velocity exhibits some unusual features: for example, the reactive impedance, which dominates in the ultrarelativistic limit, can vanish at a certain beam velocity, or its magnitude can exceed the ultrarelativistic value many times. In addition, we demonstrate that the same technique, the field expansion into a series of cross-section eigenfunctions, is convenient for calculating the space-charge impedance of uniform beam pipes with arbitrary cross section.
We propose a method to simultaneously correct linear optics errors and linear coupling for storage rings using turn-by-turn (TbT) beam position monitor (BPM) data. The independent component analysis (ICA) method is used to isolate the betatron normal modes from the measured TbT BPM data. The betatron amplitudes and phase advances of the projections of the normal modes on the horizontal and vertical planes are then extracted, which, combined with dispersion measurement, are used to fit the lattice model. The fitting results are used for lattice correction. The method has been successfully demonstrated on the NSLS-II storage ring.
The spectrum of electromagnetic fields satisfying perfectly conducting boundary conditions in a segment of a straight beam pipe with a circular cross-section is discussed as a function of various source models. These include charged bunches that move along the axis of the pipe with constant speed for which an exact solution to the initial-boundary value problem for Maxwell s equations in the beam pipe is derived. In the ultra-relativistic limit all longitudinal components of the fields tend to zero and the spectral content of the transverse fields and average total electromagnetic energy crossing any section of the beam pipe are directly related to the properties of the ultra-relativistic source. It is shown that for axially symmetric ultra-relativistic bunches interference effects occur that show a striking resemblance to those that occur due to CSR in cyclic machines despite the fact that in this limit the source is no longer accelerating. The results offer an analytic description showing how such enhanced spectral behaviour depends on the geometry of the source and the details of the stochastic distribution of structure within the source. They offer a viable experimental means for inferring properties of the longitudinal charge distribution of bunches with micro-structure in ultra-relativistic motion in straight segments of a beam pipe from observation of the associated electromagnetic energy spectra. They are also of relevance to design criteria where the coherence effects of such fields play a significant role.
This paper proposes a novel method for resonant slow extraction in synchrotrons by using special anti-symmetric sextupole fields, which can be produced by a special magnet structure. The method has the potential in applications demanding for very stable slow extraction from synchrotrons. Our studies show that the slow extraction at the half-integer resonance by using anti-symmetric sextupole field has some advantages compared to the normal sextupole field, and the latter is widely used in the slow extraction method. One of them is that it can work at a more distant tune from the resonance, so that it can reduce significantly the intensity variation of the extracted beam which is mainly caused by the ripples of magnet power supplies. The studies by both the Hamiltonian theory and numerical simulations show that the stable region at the proximity of the half-integer resonance by anti-symmetric sextupole field is much smaller and flatter than the one by standard sextupole field at the third-order resonance. By gradually increasing the field strength, the beam can be extracted with intensity more homogeneous than by the usual third-order resonant method, in the means of both smaller intensity variation and spike in the beginning spill. Similar to the case with a normal sextupole, we derive an empirical formula for the area of the stable region with an anti-symmetric sextupole. One can find that with the same field strength and the same tune distance to the resonance, the area of stable region or the change of the area due to the working point variation in the case of anti-symmetric sextupole is about 1/14 of the one in the case of standard sextupole. The detailed studies including beam dynamic behaviors at the proximity of other resonances, influence of 2-D field error, half-integer stop-band, and resonant slow extraction by using quadrupole field have also been presented.
We examine the potential impacts to slip-stacking from a change of the Booster cycle-rate from 15- to 20-Hz. We find that changing the Booster cycle-rate to 20-Hz would greatly increase the slip-stacking bucket area, while potentially requiring greater usage of the Recycler momentum aperture and additional power dissipation in the RF cavities. In particular, the losses from RF interference can be reduced by a factor of 4-10 (depending on Booster beam longitudinal parameters). We discuss the aspect ratio and beam emittance requirements for efficient slip-stacking in both cycle-rate cases. Using a different injection scheme can eliminate the need for greater momentum aperture in the Recycler.
Modern advances in polarized beam control should make it possible to accurately measure Stern-Gerlach (S-G) deflection of relativistic beams. Toward this end a relativistically covariant S-G formalism is developed that respects the opposite behavior under inversion of electric and magnetic fields. Not at all radical, or even new, this introduces a distinction between electric and magnetic fields that is not otherwise present in pure Maxwell theory. Experimental configurations (mainly using polarized electron beams passing through magnetic or electric quadrupoles) are described. Electron beam preparation and experimental methods needed to detect the extremely small deflections are discussed.
The Higher-Energy LHC (HE-LHC) should collide two proton beams of 16.5-TeV energy, circulating in the LHC tunnel. We discuss the main parameter choices, as well as some optics and beam dynamics issues, in particular the time evolution of emittances, beam-beam tune shift and luminosity, with and without controlled emittance blow up, considering various constraints, and the quadrupole-magnet parameters for arcs and interaction regions.
This paper describes electrical design and operational characteristics of a zero-voltage-switching 20 kHz polyphase bridge, boost converter/modulator for klystron pulse application. The DC-DC converter derives the buss voltages from a standard 13.8 kV to 2300 Y substation cast-core transformer. Energy storage and filtering is provided by self-clearing metallized hazy polypropylene traction capacitors. Three \"H-Bridge\" IGBT switching networks are used to generate the polyphase 20 kHz transformers primary drive waveforms. The 20 kHz drive waveforms are chirped the appropriate duration to generate the desired klystron pulse width. PWM (pulse width modulation) of the individual 20 kHz pulses is utilized to provide regulated output waveforms with adaptive feedforward and feedback techniques. The boost transformer design utilizes amorphous nanocrystalline material that provides the required low core loss at design flux levels and switching frequencies. Resonant shunt peaking is used on the transformer secondary to boost output voltage and resonate transformer leakage inductance. With the appropriate transformer leakage inductance and peaking capacitance, zero-voltage-switching of the IGBT s is attained, minimizing switching losses. A review of these design parameters and a comparison of computer calculations, scale model, and first article results will be performed.
Most present and future electron accelerators require bright sources. Invented less than ten years ago, the photo-injector the principle of which is briefly recalled, has already demonstrated that it can provide very bright beams. In this paper, the most advanced photo-injector projects are reviewed, their specific features are outlined, and their major issues are examined. The state-of-the-art in photocathode and laser technologies is presented. Beam dynamics issues are also considered since they are essential in the production of bright beams. Finally, the question of the maturity of photo-injector technology is addressed.
Output characteristics of the European XFEL have been previously studied assuming an operation point at 5 kA peak current. In this paper we explore the possibility to go well beyond such nominal peak current level. In order to illustrate the potential of the European XFEL accelerator complex we consider a bunch with 0.25 nC charge, compressed up to a peak current of 45 kA. An advantage of operating at such high peak current is the increase of the x-ray output peak power without any modification to the baseline design. Based on start-to-end simulations, we demonstrate that such high peak current, combined with undulator tapering, allows one to achieve up to a 100-fold increase in a peak power in the conventional SASE regime, compared to the nominal mode of operation. In particular, we find that 10 TW-power level, femtosecond x-ray pulses can be generated in the photon energy range between 3 keV and 5 keV, which is optimal for single biomolecule imaging. Our simulations are based on the exploitation of all the 21 cells foreseen for the SASE3 undulator beamline, and indicate that one can achieve diffraction to the desired resolution with 15 mJ (corresponding to about 3e13 photons) in pulses of about 3 fs, in the case of a 100 nm focus at the photon energy of 3.5 keV.
In the past decade, the bunch lengths of electrons in accelerators have decreased dramatically to the range of a few picoseconds \\cite{Uesaka94,Trotz97}. Measurement of the length as well as the longitudinal profile of these short bunches have been a topic of research in a number of institutions \\cite{Uesaka97,Liu97,Hutchins00}. One of the techniques uses the electric field induced by the passage of electrons in the vicinity of a birefringent crystal to change its optical characteristics. Well-established electro-optic techniques can then be used to measure the temporal characteristics of the electron bunch. In this paper we present a novel, non-invasive, single-shot approach to improve the resolution to tens of femtoseconds so that sub-millimeter bunch length can be measured.
Since its inception in the early 1980 s, the SLC control system has been driven by a highly structured memory resident real-time database. While efficient, its rigid structure and file-based sources makes it difficult to maintain and extract relevant information. The goal of transforming the sources for this database into a relational form is to enable it to be part of a Control System Enterprise Database that is an integrated central repository for SLC accelerator device and control system data with links to other associated databases.
Symplectic tracking is important in accelerator beam dynamics simulation. So far, to the best of our knowledge, there is no self-consistent symplectic space-charge tracking model available in the accelerator community. In this paper, we present a two-dimensional and a three-dimensional symplectic multi-particle spectral model for space-charge tracking simulation. This model includes both the effect from external fields and the effect of self-consistent space-charge fields using a split-operator method. Such a model preserves the phase space structure and shows much less numerical emittance growth than the particle-in-cell model in the illustrative examples.
The vacuum arc ion source has evolved into a more or less standard laboratory tool for the production of high-current beams of metal ions, and is now used in a number of different embodiments at many laboratories around the world. Applications include primarily ion implantation for material surface modification research, and good performance has been obtained for the injection of high-current beams of heavy-metal ions, in particular uranium, into particle accelerators. As the use of the source has grown, so also have the operational characteristics been improved in a variety of different ways. Here we review the principles, design, and performance of vacuum arc ion sources.
Activation of the surroundings of an accelerator must be quantified and those data provided to the official agencies. This is a necessary step in obtaining the authorization to operate such an accelerator. SwissFEL, being a fourth generation light source, will produce more accelerated charges, which are dumped or lost, than conventional third generation light source, such as the Swiss Light Source. We have simulated the propagation of a dark current beam produced in the photoelectron gun using tracking codes like ASTRA and Elegant for the current layout of SwissFEL. Experimental studies have been carried out at the SwissFEL test facilities at PSI (C-Band RF Stand and SwissFEL Injector Test Facility), in order to provide necessary input data for detailed study of components (RF gun and C-band RF structures) using the simulation code OPAL. A summary of these studies are presented.
During the 2011 run of the LHC there was a significant measured temperature increase in the LHC Injection Kicker Magnets (MKI) during operation with 50ns bunch spacing. This was due to increased beam-induced heating of the magnet due to beam impedance. Due to concerns about future heating with the increased total intensity to nominal and ultimate luminosities a review of the impedance reduction techniques within the magnet was required. A number of new beam screen designs are proposed and their impedance evaluated. Heating estimates are also given with a particular attention paid to future intensity upgrades to ultimate parameters.
The Electron Cyclotron Resonance Ion Source (ECRIS) is nowadays the most effective device that can feed particle accelerators in a continuous and reliable way, providing high-current beams of low- and medium-charge-state ions and relatively intense currents for highly charged ions. The ECRIS is an important tool for research with ion beams (in surface, atomic, and nuclear science) while, on the other hand, it implies plasma under extreme conditions and thus constitutes an object of scientific interest in itself. The fundamental aspect of the coupling between the electromagnetic wave and the plasma is hereinafter treated together with some variations to the classical ECR heating mechanism, with particular attention being paid to the frequency tuning effect and two-frequency heating. Considerations of electron and ion dynamics will be presented together with some recent observations connecting the beam shape with the frequency of the electromagnetic wave feeding the cavity. The future challenges of higher-charge states, high-charge breeding efficiency, and high absolute ionization efficiency also call for the exploration of new heating schemes and synergy between experiments and modelling. Some results concerning the investigation of innovative mechanisms of plasma ignition based on upper hybrid resonance will be described.
Charge breeding is a technique to increase the charge state of ions, in many cases radioactive ions. The singly charged radioactive ions, produced in an isotope separator on-line facility, and extracted with a low kinetic energy of some tens of keV, are injected into a charge breeder, where the charge state is increased to Q. The transformed ions are either directed towards a dedicated experiment requiring highly charged ions, or post-accelerated to higher beam energies. In this paper the physics processes involved in the production of highly charged ions will be introduced, and the injection and extraction beam parameters of the charge breeder defined. A description of the three main charge-breeding methods is given, namely: electron stripping in gas jet or foil; external ion injection into an electron-beam ion source/trap (EBIS/T); and external ion injection into an electron cyclotron resonance ion source (ECRIS). In addition, some preparatory devices for charge breeding and practical beam delivery aspects will be covered.
The longitudinal Schottky spectra of a radio-frequency (RF) bunched and electron cooled 22Ne10+ ion beam at 70 MeV/u have been studied by a newly installed resonant Schottky pick-up at the experimental cooler storage ring (CSRe), at IMP. For an RF-bunched ion beam, a longitudinal momentum spread of has been reached with less than 107 stored ions. The reduction of momentum spread compared with coasting ion beam was observed from Schottky noise signal of the bunched ion beam. In order to prepare the future laser cooling experiment at the CSRe, the RF-bunching power was modulated at 25th, 50th and 75th harmonic of the revolution frequency, effective bunching amplitudes were extracted from the Schottky spectrum analysis. Applications of Schottky noise for measuring beam lifetime with ultra-low intensity of ion beams are presented, and it is relevant to upcoming experiments on laser cooling of relativistic heavy ion beams and nuclear physics at the CSRe.
An important goal for any advanced X-ray FEL is an option for providing Fourier-limited X-ray pulses. In this way, no monochromator is needed in the experimental hall. Self-seeding is a promising approach to significantly narrow the SASE bandwidth to produce nearly transform-limited pulses. These are important for many experiments including 3D diffraction imaging. We discuss the implementation of a single-crystal self-seeding scheme in the hard X-ray lines of the European XFEL. For this facility, transform-limited pulses are particularly valuable since they naturally support the extraction of more FEL power than at saturation by exploiting tapering in the tunable-gap baseline undulators. Tapering consists of a stepwise change of the undulator gap from segment to segment. Based on start-to-end simulations dealing with the up-to-date parameters of the European XFEL, we show that the FEL power reaches about 400 GW, or one order of magnitude higher power than the SASE saturation level (20 GW). This analysis indicates that our self-seeding scheme is not significantly affected by non-ideal electron phase-space distribution, and yields about the same performance as in the case for an electron beam with ideal parameters. The self-seeding scheme with a single crystal monochromator is extremely compact (about 5 m long), and cost estimations are low enough to consider adding it to the European XFEL capabilities from the very beginning of the operation phase.
In Free Electron Lasers (FEL), a transverse centroid misalignment of longitudinal slices in an electron bunch reduces the effective overlap between radiation field and electron bunch and therefore the FEL performance. The dominant sources of slice misalignments for FELs are the incoherent and coherent synchrotron radiation within bunch compressors as well as transverse wake fields in the accelerating cavities. This is of particular importance for over-compression which is required for one of the key operation modes for the SwissFEL planned at the Paul Scherrer Institute. The centroid shift is corrected using corrector magnets in dispersive sections, e.g. the bunch compressors. First and second order corrections are achieved by pairs of sextupole and quadrupole magnets in the horizontal plane while skew quadrupoles correct to first order in the vertical plane. Simulations and measurements at the SwissFEL Injector Test Facility are done to investigate the proposed correction scheme for SwissFEL. This paper presents the methods and results obtained.
The T-980 bent crystal collimation experiment at the Tevatron has recently acquired substantial enhancements. First, two new crystals - a 16-strip one manufactured and characterized by the INFN Ferrara group and a quasi-mosaic crystal manufactured and characterized by the PNPI group. Second, a two plane telescope with 3 high-resolution pixel detectors per plane along with corresponding mechanics, electronics, control and software has been manufactured, tested and installed in the E0 crystal region. The purpose of the pixel telescope is to measure and image channeled (CH), volume-reflected (VR) and multiple volume-reflected (MVR) beam profiles produced by bent crystals. Third, an ORIGIN-based system has been developed for thorough analysis of experimental and simulation data. Results of analysis are presented for different types of crystals used from 2005 to present for channeling and volume reflection including pioneering tests of two-plane crystal collimation at the collider, all in comparison with detailed simulations.
The design luminosity for the future linear colliders is very demanding and challenging. Beam-based feedback systems will be required to achieve the necessary beam-beam stability and steer the two beams into collision. In particular we have studied the luminosity performance improvement by intra-train beam-based feedback systems for position and angle corrections at the interaction point. We have set up a simulation model which introduces different machine imperfections and can be applied to both the International Linear Collider (ILC) and the Compact Linear Collider (CLIC).
A gas-filled reverse cyclotron for the thermalisation of energetic beams is under construction at NSCL/MSU. Rare isotopes produced via projectile fragmentation after in-flight separation will be injected into the device and converted into low-energy beams through buffer gas interactions as they spiral towards the centre of the device. The extracted thermal beams will be used for low energy experiments such as precision mass measurements with traps or laser spectroscopy, and further transport for reacceleration. Detailed calculations have been performed to optimize the magnetic field design as well as the transport and stopping of ions inside the gas. An RF carpet will be used to transport the thermal ions to the axial extraction point. The calculations indicate that the cyclotron gas stopper will be much more efficient for the thermalisation of light and medium mass ions compared to linear gas cells. In this contribution we will discuss simulations of the overall performance and acceptance of machine, the beam matching calculations to the fragment separator emittance, and the construction status.
We present results from luminosity, energy and polarization studies at a future Linear Collider. We compare e+e- and e-e- modes of operation and consider both NLC and TESLA beam parameter specifications at a center-of-mass energy of 500 GeV. Realistic colliding beam distributions are used, which include dynamic effects of the beam transport from the Damping Rings to the Interaction Point. Beam-beam deflections scans and their impact for beam-based feedbacks are considered. A transverse kink instability is studied, including its impact on determining the luminosity-weighted center-of-mass energy. Polarimetry in the extraction line from the IP is presented, including results on beam distributions at the Compton IP and at the Compton detector.
The McMillan map is a well-known example of a rational integrable system for one particle in a two-dimensional phase space. An elegant recent paper presented a generalization of the McMillan map to an $N$-body system, for particles moving in $d$ space dimensions. This paper presents some alternative generalizations (also completely integrable) of the McMillan map to $N$-body systems. In all cases, the phase space is foliated by a biquadratic curve in the dynamical variables (and a set of suitably chosen angular momentum variables). It is also demonstrated that the constraints to generalize the McMillan map to $N$-body systems are not trivial.
This paper presents the pre-experiment plan and prediction of the first stage of Vacuum Laser Acceleration (VLA) collaborating by UCLA, Fudan University and ATF-BNL. This first stage experiment is a Proof-of-Principle to support our previously posted novel VLA theory. Simulations show that based on ATF s current experimental conditions, the electron beam with initial energy of 15MeV can get net energy gain from intense CO2 laser beam. The difference of electron beam energy spread is observable by ATF beam line diagnostics system. Further this energy spread expansion effect increases along with the laser intensity increasing. The proposal has been approved by ATF committee and experiment will be the next project.
The HICAT project is a Heavy Ion accelerator for light ion Cancer Treatment to be built for the clinics in Heidelberg, Germany. It consists of a 7 MeV/u linac, a compact synchrotron and three treatment places, one of them equipped with a 360 degree gantry beam-line. The facility will implement the intensity controlled raster-scanning technique that was developed and successfully demonstrated at GSI with over 100 patients at present. In order to produce the beams with the characteristics requested by the treatment sequencer, the accelerator must operate on a pulse-to-pulse basis with different settings. This concept imposes strict and challenging demands on the operation of the accelerators and hence the control system of the facility. The control system should be developed, installed and maintained by and under the complete responsibility of an industrial system provider, using a state-of-the-art system and wide-spread industrial components wherever possible. The presentation covers the status of the project and the requirements on the control system.
In this paper we describe a measurement technique capable of resolving femtosecond X-ray pulses from XFEL facilities. Since these ultrashort pulses are themselves the shortest event available, our measurement strategy is to let the X-ray pulse sample itself. Our method relies on the application of a \"fresh\" bunch technique, which allows for the production of a seeded X-ray pulse with a variable delay between seed and electron bunch. The shot-to-shot averaged energy per pulse is recorded. It turns out that one actually measures the autocorrelation function of the X-ray pulse, which is related in a simple way to the actual pulse width. For implementation of the proposed technique, it is sufficient to substitute a single undulator segment with a short magnetic chicane. The focusing system of the undulator remains untouched, and the installation does not perturb the baseline mode of operation. We present a feasibility study and we make exemplifications with typical parameters of an X-ray FEL.
Flat beams -- beams with asymmetric transverse emittances -- have important applications in novel light-source concepts, advanced-acceleration schemes and could possibly alleviate the need for damping rings in lepton colliders. Over the last decade, a flat-beam-generation technique based on the conversion of an angular-momentum-dominated beam was proposed and experimentally tested. In this paper we explore the production of compressed flat beams. We especially investigate and optimize the flat-beam transformation for beams with substantial fractional energy spread. We use as a simulation example the photoinjector of the Fermilab s Advanced Superconducting Test Accelerator (ASTA). The optimizations of the flat beam generation and compression at ASTA were done via start-to-end numerical simulations for bunch charges of 3.2 nC, 1.0 nC and 20 pC at ~37 MeV. The optimized emittances of flat beams with different bunch charges were found to be 0.25 {\\mu}m (emittance ratio is ~400), 0.13 {\\mu}m, 15 nm before compression, and 0.41 {\\mu}m, 0.20 {\\mu}m, 16 nm after full compression, respectively with peak currents as high as 5.5 kA for a 3.2-nC flat beam. These parameters are consistent with requirements needed to excite wakefields in asymmetric dielectric-lined waveguides or produce significant photon flux using small-gap micro-undulators.
The nuclear physics experiments at the Thomas Jefferson National Accelerator Facility often require longitudinally polarized electrons to be simultaneously delivered to three experimental halls. The degree of longitudinal polarization to each hall varies as function of the accelerator settings, making it challenging in certain situations to deliver a high degree of longitudinal polarization to all the halls simultaneously. Normally, the degree of longitudinal polarization the halls receive is optimized by changing the initial spin direction at the beginning of the machine with a Wien filter. Herein, it is shown that it is possible to further improve the degree of longitudinal polarization for multiple experimental halls by redistributing the energy gain of the CEBAF linacs while keeping the total energy gain fixed.
The FCC-ee aims to improve on electroweak precision measurements, with goals of 100 keV on the Z mass and width, and a fraction of MeV on the W mass. Compared to LEP, this implies a much improved knowledge of the centre-of-mass energy when operating at the Z peak and WW threshold. This can be achieved by making systematic use of resonant depolarization. A number of issues have been identified, due in particular to the long polarization times. However the smaller emittance and energy spread of FCC-ee with respect to LEP should help achieve a much improved performance.
The A0 Photoinjector at Fermilab can produce high charge (10-14 nC) electron bunches of low emittance (20 pi mm-mrad for 12 nC). We have undertaken a study of the optimal compression conditions. Off-crest acceleration in the 9-cell capture cavity induces an energy-time correlation, which is rotated by the compressor chicane (4 dipoles). The bunch length is measured using streak camera images of optical transition radiation. We present measurements under various conditions, including the effect of the laser pulse length (2 ps sigma Gaussian vs. 10 ps FWHM flat top). The best compression to date is for a 13.2 nC bunch with sigma = 0.63 mm (1.89 ps), which corresponds to a peak current of 2.8 kA.
Vertical vibration of linac components (accelerating structures, girders and quadrupoles) in the NLC has been studied experimentally and analytically. Effects such as structural resonances and vibration caused by cooling water both in accelerating structures and quadrupoles have been considered. Experimental data has been compared with analytical predictions and simulations using ANSYS. A design, incorporating the proper decoupling of structure vibrations from the linac quadrupoles, is being pursued.
Using a two-dimensional fluid description, we investigate the nonlinear radial-longitudinal dynamics of intense beams in storage rings and cyclotrons. With a multiscale analysis separating the time scale associated with the betatron motion and the slower time scale associated with space-charge effects, we show that the longitudinal-radial vortex motion can be understood in the frame moving with the charged beam as the nonlinear advection of the beam by the $\\mathbf{E}\\times\\mathbf{B}$ velocity field, where $\\mathbf{E}$ is the electric field due to the space charge and $\\mathbf{B}$ is the external magnetic field. This interpretation provides simple explanations for the stability of round beams and for the development of spiral halos in elongated beams. By numerically solving the nonlinear advection equation for the beam density, we find that it is also in quantitative agreement with results obtained in PIC simulations.
We consider a technique to determine the initial beam conditions of the DARHT II Accelerator by measuring the beam size under three different magnetic transport settings. This may be time gated to resolve the parameters as a function of time within the 2000 nsec pulse. This technique leads to three equations in three unknowns with solution giving the accelerator exit beam radius, tilt and emittance. We find that systematic errors cancel and so are not a problem in unfolding the initial beam conditions. Random uncorrelated shot to shot errors can be managed by one of three strategies: 1) make the transport system optically de-magnifying; 2) average over many individual shots; or 3) make the random uncorrelated shot to shot errors sufficiently small. The high power of the DARHT II beam requires that the beam transport system leading to a radius measuring apparatus be optically magnifying. This means that the shot to shot random errors must either be made small (less than about 1%) or that we average each of the three beam radius determinations over many individual shots.
A beam-energy-spread monitor is under development in order to control and stabilize the energy spread of high-current single-bunch electron beams for producing a sufficient number of positrons. The author has proposed a new monitor using multi-stripline electrodes in order to reinforce this purpose. This report describes the basic design of the monitor based on a numerical analysis. The analysis result shows that the resolution of an energy-spread measurement is expected to be less than 0.3% for nominal operation conditions.
Plasma wakefield acceleration, either laser driven or electron-bunch driven, has been demonstrated to hold great potential. However, it is not obvious how to scale these approaches to bring particles up to the TeV regime. In this paper, we discuss the possibility of proton-bunch driven plasma wakefield acceleration, and show that high energy electron beams could potentially be produced in a single accelerating stage.
The short wavelength and high peak power of the present generation of free-electron lasers (FELs) opens the possibility of ultra-short pulses even surpassing the present (tens to hundreds of attoseconds) capabilities of other light sources - but only if x-ray FELs can be made to generate pulses consisting of just a few optical cycles. For hard x-ray operation (~0.1nm), this corresponds to durations of approximately a single attosecond, and below into the zeptosecond scale. This talk will describe a novel method to generate trains of few-cycle pulses, at GW peak powers, from existing x-ray FEL facilities by using a relatively short  afterburner . Such pulses would enhance research opportunity in atomic dynamics and push capability towards the investigation of electronic-nuclear and nuclear dynamics. The corresponding multi-colour spectral output, with a bandwidth envelope increased by up to two orders of magnitudes over SASE, also has potential applications.
In LCLS-II, after acceleration and compression and just before entering the undulator, the beam passes through 2.5 km of 24.5 mm (radius) stainless steel pipe. The bunch that passes through the pipe is extremely short---with an rms of 8 um for the nominal 100 pC case. Thus, even though the pipe has a large aperture, the wake that applies is the {\\it short-range} resistive wall wakefield. The bunch distribution is approximately uniform, and therefore the wake induced voltage is characterized by a rather linear voltage chirp. It turns out that the wake supplies needed dechirping to the LCLS-II beam before it enters the undulator. In this note we calculate the wake, discuss the confidence in the calculation, and investigate how to improve the induced chirp linearity and/or strength. Finally, we also study the strength and effects of the transverse (dipole) resistive wall wakefield.
The 75-keV injector and 6.7-MeV RFQ that comprise the first portion of the cw, 100-mA proton linac for the accelerator production of tritium (APT) project have been built and operated. The LEDA RFQ has been extensively tested for pulsed and cw output-beam currents <=100 mA. Up to 2.2 MW of cw rf power from the 350-MHz rf system is coupled into the RFQ, including 670 kW for the cw proton beam. The emittance for a 93-mA pulsed RFQ output beam, as determined from quadrupole-magnet-scan measurements, is ex x ey = 0.25 x 0.31 (pi mm mrad)2 [rms normalized]. A follow-on experiment, to intentionally introduce and measure beam halo on the RFQ output beam, is now being installed.
The LHC Schottky system consists for four independent 4.8 GHz triple down conversion receivers with associated data acquisition systems. Each system is capable of measuring tune, chromaticity, momentum spread in either horizontal or vertical planes; two systems per beam. The hardware commissioning has taken place from spring through fall of 2010. With nominal bunch beam currents of 1011 protons, the first incoherent Schottky signals were detected and analyzed. This paper will report on these initial commissioning results. A companion paper will report on the data analysis curve fitting and remote control user interface of the system.
A transverse multipole expansion is derived, including the longitudinal components necessarily present in regions of varying magnetic field profile. It can be used for exact numerical orbit following through the fringe field regions of magnets whose end designs introduce no extraneous components, {\\it i.e.} fields not required to be present by Maxwell s equations. Analytic evaluations of the deflections are obtained in various approximations. Mainly emphasized is a ``straight-line approximation  , in which particle orbits are treated as straight lines through the fringe field regions. This approximation leads to a readily-evaluated figure of merit, the ratio of r.m.s. end deflection to nominal body deflection, that can be used to determine whether or not a fringe field can be neglected. Deflections in ``critical   cases (e.g. near intersection regions) are analysed in the same approximation.
The timing system of the Swiss Light Source is based on the event system concept of APS, Argonne [1]. However, for SLS the hardware was completely redesigned while preserving the software compatibility with the APS system. This gave us a head start in the implementation: we could use the latest available hardware and take advantage of the features integrated in the EPICS software. The event system is used as the sole timing distribution method, for hardware trigger delivery (assisted with a high-precision delay at a few places) and for controlling all the timing-related tasks of operation: injector sequencing, filling patterns, software synchronization, timestamps and so on. The event network is also extended to the beamlines to allow synchronization of the beamline experiments. The implementation consists of the hardware (Gigabit Ethernet link, FPGAs) and a firmware core written in VHDL. The functionality of the cards can be modified in situ by rewriting the firmware in flash memory. On the other hand, the functionality can be easily ported to new hardware architectures, allowing smooth upgrade paths and maximal reusability of the soft- and hardware resources. [1] F.R.Lenkszus et.al.,  The Advanced Photon Source Event System , Proc. ICALEPCS 95
The lattice for the present design of the TESLA Linear Collider with integrated X-Ray Laser Facility is basically a FODO structure with constant beta-function. There are more than 800 individually powered superconducting quadrupoles to focus the beam in the two main linear accelerators (each with a length of 15 km). For the availability of the beams it is important that a power supply failure or even a magnet failure does not cause a significant down time of the linac. It is demonstrated that the beta-function can be matched with a quadrupole \"missing\". One part of the main linac (up-to 50 GeV) will be used to accelerate the High Energy Physics beam and the Free Electron Laser drive beam with different accelerating gradients. Therefore the betatron phase advance will be 60 deg. or 90 deg. depending on the beam energy. It is shown that even in that case it is possible to match the lattice simultaneously for both beams with a quadrupole missing.
Presently clearing electrodes are being considered as a possible cure of e-cloud driven problems in existing and future colliders.  Invisible  electrodes, made of a thin highly resistive layer pasted on a dielectric plate, have been proposed as one of design solutions for the e-cloud clearing. For the first time such electrodes were successfully used in the electron-positron accumulator (EPA) of LEP. Similar electrodes had been using for a long time for ion clearing purposes in the DAFNE electron ring. Theoretical considerations and experimental measurements at DAFNE have revealed a substantial contribution of the ion clearing electrodes (ICE) to the machine broad-band impedance giving rise to several harmful effects degrading the collider performance. In this paper we discuss the impact of the electrodes on DAFNE beam dynamics, show the results of ICE wake field and impedance calculations and compare them with available experimental data. We also describe the procedure of ICE removal from the wiggler sections of the electron ring that has resulted in remarkable improvements in terms of beam dynamics and geometric luminosity.
Travelling wave in a helical wave guide is considered for electron acceleration. A first determination of the travelling wave modes using a partial wave expansion (PWE) and a point matching method is presented. It gives a rapid solution for moderate deformation of the guide relative to a straight cylinder. Strong deformations will give higher accelerating gradient but the PWE diverges. Two methods overcoming this difficulties are suggested.
We present the first observation of Self-Amplified Spontaneous Emission (SASE) in a free-electron laser (FEL) in the Vacuum Ultraviolet regime at 109 nm wavelength (11 eV). The observed free-electron laser gain (approx. 3000) and the radiation characteristics, such as dependency on bunch charge, angular distribution, spectral width and intensity fluctuations all corroborate the existing models for SASE FELs.
On the basis of the recently proposed {\\it Thermal Wave Model (TWM) for particle beams}, we give a description of the longitudinal charge particle dynamics in circular accelerating machines by taking into account both radiation damping and quantum excitation (stochastic effect), in presence of a RF potential well. The longitudinal dynamics is governed by a 1-D Schr\\\"{o}dinger-like equation for a complex wave function whose squared modulus gives the longitudinal bunch density profile. In this framework, the appropriate {\\it r.m.s. emittance} scaling law, due to the damping effect, is naturally recovered, and the asymptotic equilibrium condition for the bunch length, due to the competition between quantum excitation (QE) and radiation damping (RD), is found. This result opens the possibility to apply the TWM, already tested for protons, to electrons, for which QE and RD are very important.
In fast ramping synchrotrons like the Fermilab Booster the conventional methods of betatron tune evaluation from the turn-by-turn data may not work due to rapid changes of the tunes (sometimes in a course of a few dozens of turns) and a high level of noise. We propose a technique based on phasing of signals from a large number of BPMs which significantly increases the signal to noise ratio. Implementation of the method in the Fermilab Booster control system is described and some measurement results are presented.
The operation and parameters of Bunch Shape Monitors using coherent transformation of time structure of an analyzed beam into a spatial one of low energy secondary electrons emitted from a wire target is influenced by the characteristics of a beam under study. The electromagnetic field of a bunch disturbs the trajectories of secondary electrons, thus resulting in a degradation of phase resolution and in errors of phase reading. Another effect is the perturbation of the target potential due to the current in the wire induced by a bunch as well as due to current compensating emission of the secondary electrons. The methods, the models and the results of simulations are presented.
The intense neutron source for development of fusion materials planned by international collaboration makes a new step to clarify the technical issues for realizing the 40 MeV, 250 mA deuteron beam facility. The baseline concept employs two identical 125 mA linac modules whose beams are combined at the flowing lithium target. Recent work for reducing the cost loading concerns the staged deployment of the full irradiation capability in three steps. The Japanese activity about the design and development study about IFMIF accelerator in this year is presented and the schedule of next several years is overviewed.
We present results of an experiment where, using a 200 GW CO2 laser seed, a 65 MeV electron beam was decelerated down to 35 MeV in a 54 cm long strongly tapered helical magnetic undulator, extracting over 30$\\%$ of the initial electron beam energy to coherent radiation. These results demonstrate unparalleled electro-optical conversion efficiencies for a relativistic beam in an undulator field and represent an important step in the development of high peak and average power coherent radiation sources.
Muon ionization cooling provides the only practical solution to prepare high-brilliance beams necessary for a neutrino factory or muon collider. The Muon Ionization Cooling Experiment (MICE), under development at the Rutherford Appleton Laboratory, is installing the first set of particle detectors ever built to measure to 0.1% the emittance of a 200 MeV/c or so muon beam in and out of a cooling cell, and thus measure the cooling cell s performance. Two identical \"emittometers\" (a precise scintillating-fiber tracker in solenoidal magnetic field and a 50 ps time-of-flight station) measure the six phase-space coordinates of each muon. Another TOF plane and two Cherenkov counters assure the purity of the incoming muon beam. A downstream electron/muon calorimeter eliminates contamination from decay electrons.
In the initial phase of the Swiss Light Source, four insertion devices will be installed. The control system for all the ID s follows an uniform concept to allow a rapid installation schedule, while at the same time allowing for a variety in operational requirements. The components of the control system include the gap drive system with encoders, temperature monitoring, beam position monitoring, power supply controllers for corrector magnets [1] and a timing module [2]. The gap drive system requirements range from micron-level accuracy to driving double undulators in synchronism with each other and also with the other beamline elements. The local synchronism is achieved with a tightly coupled system having an intelligent motor controller and the global synchronism by extending the machine timing distribution to the insertion devices and the beamlines with the capability to add beamline-specific timing events. [1] A.Luedeke et.al., Digital Power supplies for the Swiss Light Source , these proceedings
Recent experiments [1] have explored the use of a free-electron laser (FEL) as a buncher for a microwave two-beam accelerator, and the subsequent driving of a standing-wave rf output cavity. Here we present a deeper analysis of the longitudinal dynamics of the electron bunches as they are transported from the end of the FEL and through the output cavity. In particular, we examine the effect of the transport region and cavity aperture to filter the bunched portion of the beam. [1] T. Lefevre, et. al., Phys. Rev. Lett. 84 (2000), 1188.
Central frequency is a key parameter of storage rings. This paper presents the measurement of central frequency of the HLS-II storage ring using the sextupole modulation method. Firstly, the basis of central frequency measurement of the electron storage ring is briefly introduced. Then, the error sources and the optimized measurement method for the HLS-II storage ring are discussed. The workflow of the self-compiled Matlab script used in central frequency measurement is also described. In the end, the results achieved by using two methods to cross-check each other are shown. The measured value of the central frequency demonstrates that the real circumference of the HLS-II storage ring agrees well with the designed value.
We report on the results of theoretical simulations of the electron channeling in a bent silicon crystal. The dynamics of ultra-relativistic electrons in the crystal is computed using the newly developed part [1] of the MBN Explorer package [2,3], which simulates classical trajectories of in a crystalline medium by integrating the relativistic equations of motion with account for the interaction between the projectile and crystal atoms. A Monte Carlo approach is employed to sample the incoming electrons and to account for thermal vibrations of the crystal atoms. The electron channeling along Si(110) crystallographic planes are studied for the projectile energies 195--855 MeV and different curvatures of the bent crystal.
The use of transverse electric (TE) waves has proved to be a powerful, noninvasive method for estimating the densities of electron clouds formed in particle accelerators. Results from the plasma simulation program VORPAL have been a useful guide for experimental studies related to this method, which have been performed at various accelerator facilities. This paper provides results of the simulation and modeling work done in conjunction with experimental efforts carried out at CesrTA. The discussion starts from the phase shift induced by electron clouds in the transmission of the wave, followed by the effect of reflections along the beam-pipe, the simulation of the resonant wave method and the effects of external magnetic fields, namely dipoles and wigglers. A derivation of the dispersion relationship of wave propagation for arbitrary geometries in field free regions with a uniform cloud density is also provided.
Q-slope issue, which is caused by the field dependent surface resistance, puzzled people for a long time in SRF fields. In this paper, we related the Q-slope with surface treatments; and proposed a surface-impurity model to explain the field-dependent of surface resistance of SRF cavities. Eighteen cavity-test results have been analyzed to examine the model. These cavities were treated by different recipes: Nitrogen-doping; BCP and HF-rinsing; EP with 120{\\deg}C baking; and EP without 120{\\deg}C baking. The performance of these cavities, which is normally represented by cavity quality factor versus accelerating gradient or surface magnetic field curves (Q0 vs. Eacc or Q0 vs. B), has included all types of Q-slope, such as Low-field Q-slope, Medium-field Q-slope, and Anti-Q-slope. The data fittings are quite successful; the fitting results will be shown. The model can be used to evaluate the effectiveness of the surface treatments. At last, the paper discussed the way to build a high-Q high-gradient SRF cavity.
The active power filter (APF) is attracting more and more attention for its outstanding performance in current and voltage ripple compensation. As modern high-energy accelerators are demanding much more stringent current ripple guideline, the APF is introduced to the magnet power supply (MPS) in accelerator system. However, the conventional APF has a lot of shortages and drawbacks due to its traditional topology, such as complex structure, nonadjustable working voltage, requirement of power supply, and so on. This paper proposes a new topology of APF, which is working as two types of chopper circuits. This APF need not extra electricity, but to use the power of the MPS current ripple to realize ripple depressing. At the end of this paper, the experiment result proves its feasibility and effect.
Here we will derive the general theory of the beam-breakup instability in recirculating linear accelerators, in which the bunches do not have to be at the same RF phase during each recirculation turn. This is important for the description of energy recovery linacs (ERLs) where bunches are recirculated at a decelerating phase of the RF wave and for other recirculator arrangements where different RF phases are of an advantage. Furthermore it can be used for the analysis of phase errors of recirculated bunches. It is shown how the threshold current for a given linac can be computed and a remarkable agreement with tracking data is demonstrated. The general formulas are then analyzed for several analytically solvable cases, which show: (a) Why different higher order modes (HOM) in one cavity do not couple so that the most dangerous modes can be considered individually. (b) How different HOM frequencies have to be in order to consider them separately. (c) That no optics can cause the HOMs of two cavities to cancel. (d) How an optics can avoid the addition of the instabilities of two cavities. (e) How a HOM in a multiple-turn recirculator interferes with itself. Furthermore, a simple method to compute the orbit deviations produced by cavity misalignments has also been introduced. It is shown that the BBU instability always occurs before the orbit excursion becomes very large.
Proposed methods for measuring the electric dipole moment (EDM) of the proton use an intense, polarized proton beam stored in an all-electric storage ring \"trap\". At the \"magic\" kinetic energy of 232.792 MeV, proton spins are \"frozen\", for example always parallel to the instantaneous particle momentum. This paper describes an accelerator simulation code, ETEAPOT, a new component of the Unified Accelerator Libraries (UAL), to be used for long term tracking of particle orbits and spins in electric bend accelerators, in order to simulate EDM storage ring experiments. Though qualitatively much like magnetic rings, the non-constant particle velocity in electric rings give them significantly different properties, especially in weak focusing rings. Like the earlier code TEAPOT (for magnetic ring simulation) this code performs \\emph{exact tracking in an idealized (approximate) lattice} rather than the more conventional approach, which is \\emph{approximate tracking in a more nearly exact lattice.} The BMT equation describing the evolution of spin vectors through idealized bend elements is also solved exactly---original to this paper. Furthermore the idealization permits the code to be exactly symplectic (with no artificial \"symplectification\"). Any residual spurious damping or anti-damping is sufficiently small to permit reliable tracking for the long times, such as the 1000 seconds assumed in estimating the achievable EDM precision.
We report the results of theoretical and numerical analysis of the crystalline undulators planned to be used in the experiments which are the part of the ongoing PECU project [1]. The goal of such an analysis was to define the parameters (different from those pre-set by the experimental setup) of the undulators which ensure the highest yield of photons of specified energies. The calculations were performed for 0.6 and 10 GeV positrons channeling through periodically bent Si and Si$_{1-x}$Ge$_x$ crystals.
In the trial \\cite{BNL} of measuring the proton electric moment, storage rings with electrostatic lattice have been considered. Here an overview is given about the main parameters regarding such a kind of focusing. Beyond confirming all the issues regarding this subject, a non-null element $M_{31}$ is introduced in all the $3\\times 3$ matrices which deal with the vector $(x,x ,\\Delta p/p)$ and its role is discussed.
An electron lens is planned for the Fermilab Integrable Optics Test Accelerator as a nonlinear element for integrable dynamics, as an electron cooler, and as an electron trap to study space-charge compensation in rings. We present the main design principles and constraints for nonlinear integrable optics. A magnetic configuration of the solenoids and of the toroidal section is laid out. Single-particle tracking is used to optimize the electron path. Electron beam dynamics at high intensity is calculated with a particle-in-cell code to estimate current limits, profile distortions, and the effects on the circulating beam. In the conclusions, we summarize the main findings and list directions for further work.
Short period, high field undulators are used to produce hard X-rays on synchrotron radiation based storage ring facilities of intermediate energy and enable short wavelength Free Electron Laser. Cryogenic permanent magnet undulators take benefit from improved magnetic properties of RE2Fe14B (Rare Earth based magnets) at low temperatures for achieving short period, high magnetic field and high coercivity. Using Pr2Fe14B instead of Nd2Fe14B, which is generally employed for undulators, avoids the limitation caused by the Spin Reorientation Transition phenomenon, and simplifies the cooling system by allowing the working temperature of the undulator to be directly at the liquid nitrogen one (77 K). We describe here the development of a full scale (2 m), 18 mm period Pr2Fe14B cryogenic permanent magnet undulator (U18). The design, construction and optimization, as well as magnetic measurements and shimming at low temperature are presented. The commissioning and operation of the undulator with the electron beam and spectrum measurement using the Nanoscopmium beamline at SOLEIL are also reported.
In this paper, the theoretical aspects behind longitudinal RF capture are reviewed and the capture process is simulated via a program based on this theory. Four kinds of cases with different initial distribution and capture curve are considered, i.e. uniform distribution with adiabatic capture, uniform distribution with non-adiabatic capture, Gaussian distribution with adiabatic capture and Gaussian distribution with non-adiabatic capture. The simulation results are compared each other and discussed, and Gaussian distribution with adiabatic capture is demonstrated having a higher capture efficiency and leading to a shorter bunch length. In addition, the BPM induced signal is simulated with high input impendence, i.e. $1M\\Omega$, and low input impendence, i.e. $50\\Omega$, respectively. Finally, the BPM signal of Heavy Ion Medical Machine (HIMM) is estimated and compared with measured one, and a good agreement is achieved.
If a beam of unpolarized positrons (which is considered as a sum of two fractions with opposite helicities) passes through an intense circular polarized laser radiation these fractions may be separated. For high laser flash intensity each positron will interact with $k_0\\gg$1 laser photons subsequently (linear multiple compton scattering process). Due to difference in the compton cross-section for positrons polarized in opposite directions the mean final energy of each fraction will be different. It allows to get a polarized positron beam using the momentum selection (with some intensity loss). Estimations show the possibility to obtain a positron beam with 35% longitudinal polarization and 25% intensity from the initial one for focussed laser flash with total energy 5J and positron beam with energy 5 GeV.
At the Holifield Radioactive Ion Beam Facility (HRIBF) at Oak Ridge National Laboratory (ORNL), molecular ions extracted from a positive ion source and subsequently broken up in a charge exchange cell produce Radioactive Ion Beams (RIBs) with several hundred eV energy spread, preventing effective magnetic isobar separation. In order to perform magnetic isobar separation prior to charge exchange, a multi-harmonic buncher and a 12 MHz RFQ (Radio-Frequency Quadrupole) is proposed to supplement the present 300 kV injection system for the 25 MV tandem electrostatic accelerator. The RFQ will be mounted on a variable high voltage platform to accelerate ions with masses from 10 to 150 amu.
A new CLIC Test Facility (CTF3) at CERN will serve to study the drive beam generation for the Compact Linear Collider (CLIC). CTF3 has to accelerate a 3.5 A electron beam in almost fully-loaded structures. The pulse contains more than 2000 bunches, one in every second RF bucket, and has a length of more than one microsecond. Different options for the lattice of the drive-beam accelerator are presented, based on FODO-cells and triplets as well as solenoids. The transverse stability is simulated, including the effects of beam jitter, alignment and beam-based correction.
These proceedings collate lectures given at the twenty-eighth specialized course organised by the CERN Accelerator School (CAS). The course was held at the Hotel du Parc, Baden, Switzerland from 7 - 14 May 2014, in collaboration with the Paul Scherrer Institute. Following introductory lectures on accelerators and the requirements on power converters, the course covered components and topologies of the different types of power converters needed for particle accelerators. Issues of design, control and exploitation in a sometimes-hostile environment were addressed. Site visits to ABB and PSI provided an insight into state-of-the-art power converter production and operation, while topical seminars completed the programme.
The next generation of accelerators for MegaWatt proton, electron and heavy-ion beams puts unprecedented requirements on the accuracy of particle production predictions, the capability and reliability of the codes used in planning new accelerator facilities and experiments, the design of machine, target and collimation systems, detectors and radiation shielding and minimization of their impact on environment. Recent advances in code developments are described for the critical modules related to these challenges. Examples are given for the most demanding areas: targets, collimators, beam absorbers, radiation shielding, induced radioactivity and radiation damage.
We briefly outline shorter and longer term physics motivation for constructing a dual, fast-cycling superconducting synchrotron accelerator (DSFMR - Dual Super-Ferric Main Ring) in the Tevatron tunnel at Fermilab. We discuss using this accelerator as a high-intensity dual neutrino beam source for the long-baseline neutrino oscillation search experiments, and also as a fast, dual pre-injector accelerator for the VLHC (Very Large Hadron Collider).
We propose a novel scheme for final muon ionization cooling with quadrupole doublets followed by emittance exchange in vacuum to achieve the small beam sizes needed by a muon collider. A flat muon beam with a series of quadrupole doublet half cells appears to provide the strong focusing required for final cooling. Each quadrupole doublet has a low beta region occupied by a dense, low Z absorber. After final cooling, normalized transverse, longitudinal, and angular momentum emittances of 0.100, 2.5, and 0.200 mm-rad are exchanged into 0.025, 70, and 0.0 mm-rad. A skew quadrupole triplet transforms a round muon bunch with modest angular momentum into a flat bunch with no angular momentum. Thin electrostatic septa efficiently slice the flat bunch into 17 parts. The 17 bunches are interleaved into a 3.7 meter long train with RF deflector cavities. Snap bunch coalescence combines the muon bunch train longitudinally in a 21 GeV ring in 55 microseconds, one quarter of a synchrotron oscillation period. A linear long wavelength RF bucket gives each bunch a different energy causing the bunches to drift in the ring until they merge into one bunch and can be captured in a short wavelength RF bucket with a 13% muon decay loss and a packing fraction as high as 87%.
Off-axis beams passing through an accelerating cavity excite dipole modes among other higher order modes (HOMs). These modes have linear dependence on the transverse beam offset from the cavity axis. Therefore they can be used to monitor the beam position within the cavity. The fifth dipole passband of the third harmonic superconducting cavities at FLASH has modes trapped within each cavity and do not propagate through the adjacent beam pipes, while most other cavity modes do. This could enable the beam position measurement in individual cavities. This paper investigates the possibility to use the fifth dipole band for beam alignment in the third harmonic cavity module. Simulations and measurements both with and without beam-excitations are presented. Various analysis methods are used and compared. A good correlation of HOM signals to the beam position is observed.
The proposed Next Linear Collider (NLC) contains linac systems operating at L,S,C, and X band. This paper describes a wideband modular low-level RF (LLRF) system applicable for all NLC pulsed RF systems. High speed digital IF techniques are used for both arbitrary klystron drive modulation and accurate RF vector detection. Measurement of relative beam to RF phase, beam loading compensation, and structure dipole modes for automated alignment are all handled by the system. Modern signal processing techniques are also described.
A transition-free lattice is a basic requirement of a high-intensity medium-energy (several GeV) proton synchrotron in order to eliminate beam losses during transition crossing. An 8 GeV synchrotron is proposed as a principal component in an alternative hybrid design of Project-X [1]. This machine would be housed in the Fermilab antiproton source enclosure replacing the present Debuncher. A simple doublet lattice with high transition gamma has been designed. It uses just one type of dipoles and one type of quadrupoles (QF and QD are of the same length). It has no transition crossing. It has a triangular shape with three zero dispersion straight sections, which can be used for injection, extraction, RF and collimators. The beta-functions and dispersion are low. This lattice has plenty of free space for correctors and diagnostic devices, as well as good optical properties including large dynamic aperture, weak dependence of lattice functions on amplitude and momentum deviation.
We discuss the use of self-seeding schemes with wake monochromators to produce TW power, fully coherent pulses for applications at the dedicated bio-imaging bealine at the European X-ray FEL, a concept for an upgrade of the facility beyond the baseline previously proposed by the authors. We exploit the asymmetric and symmetric Bragg and Laue reflections (sigma polarization) in diamond crystal. Optimization of the bio-imaging beamline is performed with extensive start-to-end simulations, which also take into account effects such as the spatio-temporal coupling caused by the wake monochromator. The spatial shift is maximal in the range for small Bragg angles. A geometry with Bragg angles close to pi/2 would be a more advantageous option from this viewpoint, albeit with decrease of the spectral tunability. We show that it will be possible to cover the photon energy range from 3 keV to 13 keV by using four different planes of the same crystal with one rotational degree of freedom.
A new approach to search for CP violation in the neutrino sector [1,2] is proposed by the experiment called DAE{\\delta}ALUS (Decay At rest Experiment for {\\delta}cp At Laboratory for Underground Science). DAE{\\delta}ALUS needs three sources of neutrino fluxes, each one located at 1.5, 8 and 20 km from the underground detector. Here we present the study for a Superconducting Ring Cyclotron able to accelerate the H2+ molecules and to deliver proton beam with maximum energy of 800 MeV and the required high power. The magnetic field produced by the proposed superconducting magnetic sector, simulated by the code TOSCA, the isochronous magnetic field, some preliminary feature on the beam dynamic and the magnetic forces acting on the coils are here presented.
Fast muon beam six dimensional (6D) phase space cooling is essential for muon colliders. The Helical Cooling Channel (HCC) uses hydrogen-pressurized RF cavities imbedded in a magnet system with solenoid, helical dipole, and helical quadrupole components that provide the continuous dispersion needed for emittance exchange and effective 6D beam cooling. A series of HCC segments, each with sequentially smaller aperture, higher magnetic field, and higher RF frequency to match the beam size as it is cooled, has been optimized by numerical simulation to achieve a factor of 105 emittance reduction in a 300 m long channel with only a 40% loss of beam. Conceptual designs of the hardware required for this HCC system and the status of the RF studies and HTS helical solenoid magnet prototypes are described.
Charging up the surface of an insulator after beam impact can lead either to reverse sign of field between the surface and collector of electrons for case of thick sample or appearance of very high internal field for thin films. Both situations discard correct measurements of secondary electron emission (SEE) and can be avoided via reducing the beam dose. The single pulse method with pulse duration of order of tens microseconds has been used. The beam pulsing was carried out by means of an analog switch introduced in deflection plate circuit which toggles its output between \"beam on\" and \"beam off\" voltages depending on level of a digital pulse. The error in measuring the beam current for insulators with high value of SEE was significantly reduced due to the use for this purpose a titanium sample having low value of the SEE with DC method applied. Results obtained for some not coated insulators show considerable increase of the SEE after baking out at 3500C what could be explained by the change of work function. Titanium coatings on alumina exhibit results close to the ones for pure titanium and could be considered as an effective antimultipactor coating.
We derive a simple relation for estimating the relative emittance growth in x and y due to intrabeam scattering (IBS) in electron storage rings. We show that IBS calculations for the ATF damping ring, when using the formalism of Bjorken-Mtingwa, a modified formalism of Piwinski (where eta squared divided by beta has been replaced by the dispersion invariant), or a simple high-energy approximate formula all give results that agree well. Comparing theory, including the effect of potential well bunch lengthening, with a complete set of ATF steady-state beam size vs. current measurements we find reasonably good agreement for energy spread and horizontal emittance. The measured vertical emittance, however, is larger than theory in both offset (zero current emittance) and slope (emittance change with current). The slope error indicates measurement error and/or additional current-dependent physics at the ATF; the offset error, that the assumed Coulomb log is correct to within a factor of 1.75.
Polarized antiprotons can be produced in a storage ring by spin--dependent interaction in a purely electron--polarized hydrogen gas target. The polarizing process is based on spin transfer from the polarized electrons of the target atoms to the orbiting antiprotons. After spin filtering for about two beam lifetimes at energies $T\\approx 40-170$ MeV using a dedicated large acceptance ring, the antiproton beam polarization would reach $P=0.2-0.4$. Polarized antiprotons would open new and unique research opportunities for spin--physics experiments in $\\bar{p}p$ interactions.
For selecting the properly magnetic alloy (MA) material to load the RF compression cavity, the measurement of the MA cores which is produced by Liyuan Company has been carried out at IMP. We measured 4 kinds of MA core materials, type V1, V2, A1 and A2. And we mainly focus on the permeability, quality factor (Q value) and shunt impedance of the MA core. The MA cores which have higher permeability, lower Q value and higher shunt impedance will be selected to load RF compression cavity. According to the results of measurement, the type V1, V2 and A2 material will be chosen as candidate to load RF cavity.
Recent simulation shows that a self-modulated high energy proton bunch can excite a large amplitude plasma wakefield and accelerate an externally injected electron bunch to the energy frontier in a single stage acceleration through a long plasma channel. Based on this scheme, future colliders, either an electron-positron linear collider (e+-e- collider) or an electron-hadron collider (e-p collider) can be conceived. In this paper, we discuss some key design issues for an e+-e- collider and a high energy e-p collider, based on the existing infrastructure of the CERN accelerator complex.
We present an idea for creation of a crystalline undulator and report its first realization. One face of a silicon crystal was given periodic micro-scratches (trenches) by means of a diamond blade. The X-ray tests of the crystal deformation due to given periodic pattern of surface scratches have shown that a sinusoidal shape is observed on both the scratched surface and the opposite (unscratched) face of the crystal, that is, a periodic sinusoidal deformation goes through the bulk of the crystal. This opens up the possibility for experiments with high-energy particles channeled in crystalline undulator, a novel compact source of radiation.
Compton scattering of a laser beam with a relativistic electron beam has been used to generate intense, highly polarized and nearly monoenergetic x-ray or gamma-ray beams at many facilities. The ability to predict the spatial, spectral and temporal characteristics of a Compton gamma-ray beam is crucial for the optimization of the operation of a Compton light source as well as for the applications utilizing the Compton beam. In this paper, we present two approaches, one based upon analytical calculations and the other based upon Monte Carlo simulations, to study the Compton scattering process for various electron and laser beam parameters as well as different gamma-beam collimation conditions. These approaches have been successfully applied to characterize Compton gamma-ray beams, after being benchmarked against experimental results at the High Intensity Gamma-ray Source (HIGS) facility at Duke University.
In the design of a diffraction-limited storage ring (DLSR) consisting of compact multi-bend achromats (MBAs), it is challenging to simultaneously achieve an ultralow emittance and a satisfactory nonlinear performance, due to extremely large nonlinearities and limited tuning ranges of the element parameters. Nevertheless, taking the High Energy Photon Source (HEPS) as an example, we demonstrate that the potential of a DLSR design can be explored with a successive and iterative implementation of the particle swarm optimization (PSO) and multi-objective genetic algorithm (MOGA). It turns out that with a hybrid MBA lattice, it is feasible for the HEPS to attain a natural emittance of about 50 pm.rad, and meanwhile, realize a sufficient ring acceptance for beam accumulation with an on-axis longitudinal injection scheme. Particularly, this study indicates that a rational combination of the PSO and MOGA is more effective than either of them alone in approaching the true global optima, for an explorative multi-objective problem with many optimizing variables and local optima.
Obtaining high performance in IO intensive applications requires systems that support reliable fast transfer, data replication, and caching. In this paper we present an architecture designed for supporting IO intensive applications in MedioGRID, a system for real-time processing of satellite images, operating in a Grid environment. The solution ensures that applications which are processing geographical data have uniform access to data and is based on continuous monitoring of the data transfers using MonALISA and its extensions. The MedioGRID architecture is also built on Globus, Condor and PBS and based on this middleware we aim to extract information about the running systems. The results obtained in testing MedioGRID system for large data transfers show that monitoring system provides a very good view of system evolution.
Typical characteristics of remote sensing applications are concurrent tasks, such as those found in disaster rapid response. The existing composition approach to geographical information processing service chain, searches for an optimisation solution and is what can be deemed a \"selfish\" way. This way leads to problems of conflict amongst concurrent tasks and decreases the performance of all service chains. In this study, a non-cooperative game-based mathematical model to analyse the competitive relationships between tasks, is proposed. A best response function is used, to assure each task maintains utility optimisation by considering composition strategies of other tasks and quantifying conflicts between tasks. Based on this, an iterative algorithm that converges to Nash equilibrium is presented, the aim being to provide good convergence and maximise the utilisation of all tasks under concurrent task conditions. Theoretical analyses and experiments showed that the newly proposed method, when compared to existing service composition methods, has better practical utility in all tasks.
Enhancements in technology always follow Consumer requirements. Consumer requires best of service with least possible mismatch and on time. Numerous applications available today are based on Web Services and Cloud Computing. Recently, there exist many Web Services with similar functional characteristics. Choosing a right Service from group of similar Web Service is a complicated task for Service Consumer. In that case, Service Consumer can discover the required Web Service using non functional attributes of the Web Services such as QoS. Proposed layered architecture and Web Service Cloud i.e.WS Cloud computing Framework synthesizes the Non functional attributes that includes reliability, availability, response time, latency etc. The Service Consumer is projected to provide the QoS requirements as part of Service discovery query. This framework will discover and filter the Web Services form the cloud and rank them according to Service Consumer preferences to facilitate Service on time.
The VERCE project has pioneered an e-Infrastructure to support researchers using established simulation codes on high-performance computers in conjunction with multiple sources of observational data. This is accessed and organised via the VERCE science gateway that makes it convenient for seismologists to use these resources from any location via the Internet. Their data handling is made flexible and scalable by two Python libraries, ObsPy and dispel4py and by data services delivered by ORFEUS and EUDAT. Provenance driven tools enable rapid exploration of results and of the relationships between data, which accelerates understanding and method improvement. These powerful facilities are integrated and draw on many other e-Infrastructures. This paper presents the motivation for building such systems, it reviews how solid-Earth scientists can make significant research progress using them and explains the architecture and mechanisms that make their construction and operation achievable. We conclude with a summary of the achievements to date and identify the crucial steps needed to extend the capabilities for seismologists, for solid-Earth scientists and for similar disciplines.
Large-scale distributed graph-parallel computing is challenging. On one hand, due to the irregular computation pattern and lack of locality, it is hard to express parallelism efficiently. On the other hand, due to the scale-free nature, real-world graphs are hard to partition in balance with low cut. To address these challenges, several graph-parallel frameworks including Pregel and GraphLab (PowerGraph) have been developed recently. In this paper, we present an alternative framework, Graph Runtime Engine (GRE). While retaining the vertex-centric programming model, GRE proposes two new abstractions: 1) a Scatter-Combine computation model based on active message to exploit massive fined-grained edge-level parallelism, and 2) a Agent-Graph data model based on vertex factorization to partition and represent directed graphs. GRE is implemented on commercial off-the-shelf multi-core cluster. We experimentally evaluate GRE with three benchmark programs (PageRank, Single Source Shortest Path and Connected Components) on real-world and synthetic graphs of millions billion of vertices. Compared to PowerGraph, GRE shows 2.5~17 times better performance on 8~16 machines (192 cores). Specifically, the PageRank in GRE is the fastest when comparing to counterparts of other frameworks (PowerGraph, Spark,Twister) reported in public literatures. Besides, GRE significantly optimizes memory usage so that it can process a large graph of 1 billion vertices and 17 billion edges on our cluster with totally 768GB memory, while PowerGraph can only process less than half of this graph scale.
Failure detection protocols---a fundamental building block for crafting fault-tolerant distributed systems---are in many cases described by their authors making use of informal pseudo-codes of their conception. Often these pseudo-codes use syntactical constructs that are not available in COTS programming languages such as C or C++. This translates into informal descriptions that call for ad hoc interpretations and implementations. Being informal, these descriptions cannot be tested by their authors, which may translate into insufficiently detailed or even faulty specifications. This paper tackles this problem introducing a formal syntax for those constructs and a C library that implements them---a tool-set to express and reason about failure detection protocols. The resulting specifications are longer but non ambiguous, and eligible for becoming a standard form.
The success of Google s Pregel framework in distributed graph processing has inspired a surging interest in developing Pregel-like platforms featuring a user-friendly \"think like a vertex\" programming model. Existing Pregel-like systems support a fault tolerance mechanism called checkpointing, which periodically saves computation states as checkpoints to HDFS, so that when a failure happens, computation rolls back to the latest checkpoint. However, a checkpoint in existing systems stores a huge amount of data, including vertex states, edges, and messages sent by vertices, which significantly degrades the failure-free performance. Moreover, the high checkpointing cost prevents frequent checkpointing, and thus recovery has to replay all the computations from a state checkpointed some time ago. In this paper, we propose a novel checkpointing approach which only stores vertex states and incremental edge updates to HDFS as a lightweight checkpoint (LWCP), so that writing an LWCP is typically tens of times faster than writing a conventional checkpoint. To recover from the latest LWCP, messages are generated from the vertex states, and graph topology is recovered by replaying incremental edge updates. We show how to realize lightweight checkpointing with minor modifications of the vertex-centric programming interface. We also apply the same idea to a recently-proposed log-based approach for fast recovery, to make it work efficiently in practice by significantly reducing the cost of garbage collection of logs. Extensive experiments on large real graphs verified the effectiveness of LWCP in improving both failure-free performance and the performance of recovery.
MapReduce has become a popular programming model for running data intensive applications on the cloud. Completion time goals or deadlines of MapReduce jobs set by users are becoming crucial in existing cloud-based data processing environments like Hadoop. There is a conflict between the scheduling MR jobs to meet deadlines and \"data locality\" (assigning tasks to nodes that contain their input data). To meet the deadline a task may be scheduled on a node without local input data for that task causing expensive data transfer from a remote node. In this paper, a novel scheduler is proposed to address the above problem which is primarily based on the dynamic resource reconfiguration approach. It has two components: 1) Resource Predictor: which dynamically determines the required number of Map/Reduce slots for every job to meet completion time guarantee; 2) Resource Reconfigurator: that adjusts the CPU resources while not violating completion time goals of the users by dynamically increasing or decreasing individual VMs to maximize data locality and also to maximize the use of resources within the system among the active jobs. The proposed scheduler has been evaluated against Fair Scheduler on virtual cluster built on a physical cluster of 20 machines. The results demonstrate a gain of about 12% increase in throughput of Jobs
We found that a reliability model commonly used to estimate Mean-Time-To-Data-Loss (MTTDL), while suitable for modeling RAID 0 and RAID 5, fails to accurately model systems having a fault-tolerance greater than 1. Therefore, to model the reliability of RAID 6, Triple-Replication, or k-of-n systems requires an alternate technique. In this paper, we explore some alternatives, and evaluate their efficacy by comparing their predictions to simulations. Our main result is a new formula which more accurately models storage system reliability.
This discussion paper argues that there are five fundamental pitfalls, which can restrict academics from conducting cloud computing research at the infrastructure level, which is currently where the vast majority of academic research lies. Instead academics should be conducting higher risk research, in order to gain understanding and open up entirely new areas. We call for a renewed mindset and argue that academic research should focus less upon physical infrastructure and embrace the abstractions provided by clouds through five opportunities: user driven research, new programming models, PaaS environments, and improved tools to support elasticity and large-scale debugging. The objective of this paper is to foster discussion, and to define a roadmap forward, which will allow academia to make longer-term impacts to the cloud computing community.
Cloud Data centers aim to provide reliable, sustainable and scalable services for all kinds of applications. Resource scheduling is one of keys to cloud services. To model and evaluate different scheduling policies and algorithms, we propose FlexCloud, a flexible and scalable simulator that enables users to simulate the process of initializing cloud data centers, allocating virtual machine requests and providing performance evaluation for various scheduling algorithms. FlexCloud can be run on a single computer with JVM to simulate large scale cloud environments with focus on infrastructure as a service; adopts agile design patterns to assure the flexibility and extensibility; models virtual machine migrations which is lack in the existing tools; provides user-friendly interfaces for customized configurations and replaying. Comparing to existing simulators, FlexCloud has combining features for supporting public cloud providers, load-balance and energy-efficiency scheduling. FlexCloud has advantage in computing time and memory consumption to support large-scale simulations. The detailed design of FlexCloud is introduced and performance evaluation is provided.
Search pattern experienced by the processor to search an element in secondary storage devices follows a random sequence. Formally, it is a random walk and its modeling is crucial in studying performance metrics like memory access time. In this paper, we first model the random walk using extended Fibonacci series. Our simulation is done on a parallel computing model (PRAM) with EREW strategy. Three search primitives are proposed under parallel computing model and each primitive is thoroughly tested on an array of size $10^7$ with the size of random walk being $10^4$. Our findings reveal that search primitive with pointer jumping is better than the other two primitives. Our key contribution lies in modeling random walk as an extended Fibonacci series generator and simulating the same with various search primitives.
Network virtualization allows cloud infrastructure providers to accommodate multiple virtual networks on a single physical network. However, mapping multiple virtual network resources to physical network components, called virtual network embedding (VNE), is known to be non-deterministic polynomial-time hard (NP-hard). Effective virtual network embedding increases the revenue by increasing the number of accepted virtual networks. In this paper, we propose virtual network embedding algorithm, which improves virtual network embedding by coarsening virtual networks. Heavy Clique matching technique is used to coarsen virtual networks. Then, the coarsened virtual networks are enhanced by using a refined Kernighan-Lin algorithm. The performance of the proposed algorithm is evaluated and compared with existing algorithms using extensive simulations, which show that the proposed algorithm improves virtual network embedding by increasing the acceptance ratio and the revenue.
Grid computing has attracted many researchers over a few years, and as a result many new protocols have emerged and also evolved since its inception a decade ago. Grid protocols play major role in implementing services that facilitate coordinated resource sharing across diverse organizations. In this paper, we provide comprehensive coverage of different core Grid protocols that can be used in Global Grid Computing. We establish the classification of core Grid protocols into i) Grid network communication and Grid data transfer protocols, ii) Grid information security protocols, iii) Grid resource information protocols, iv) Grid management protocols, and v) Grid interface protocols, depending upon the kind of activities handled by these protocols. All the classified protocols are also organized into layers of the Hourglass model of Grid architecture to understand dependency among these protocols. We also present the characteristics of each protocol. For better understanding of these protocols, we also discuss applied protocols as examples from either Globus toolkit or other popular Grid middleware projects. We believe that our classification and characterization of Grid protocols will enable better understanding of core Grid protocols and will motivate further research in the area of Global Grid Computing.
One of the fundamental concepts in Grid computing is the creation of Virtual Organizations (VO s): a set of resource consumers and providers that join forces to solve a common problem. Typical examples of Virtual Organizations include collaborations formed around the Large Hadron Collider (LHC) experiments. To date, Grid computing has been applied on a relatively small scale, linking dozens of users to a dozen resources, and management of these VO s was a largely manual operation. With the advance of large collaboration, linking more than 10000 users with a 1000 sites in 150 counties, a comprehensive, automated management system is required. It should be simple enough not to deter users, while at the same time ensuring local site autonomy. The VO Management Service (VOMS), developed by the EU DataGrid and DataTAG projects[1, 2], is a secured system for managing authorization for users and resources in virtual organizations. It extends the existing Grid Security Infrastructure[3] architecture with embedded VO affiliation assertions that can be independently verified by all VO members and resource providers. Within the EU DataGrid project, Grid services for job submission, file- and database access are being equipped with fine- grained authorization systems that take VO membership into account. These also give resource owners the ability to ensure site security and enforce local access policies. This paper will describe the EU DataGrid security architecture, the VO membership service and the local site enforcement mechanisms Local Centre Authorization Service (LCAS), Local Credential Mapping Service(LCMAPS) and the Java Trust and Authorization Manager.
This paper describes two tools that aim to support decision making during the migration of IT systems to the cloud. The first is a modeling tool that produces cost estimates of using public IaaS clouds. The tool enables IT architects to model their applications, data and infrastructure requirements in addition to their computational resource usage patterns. The tool can be used to compare the cost of different cloud providers, deployment options and usage scenarios. The second tool is a spreadsheet that outlines the benefits and risks of using IaaS clouds from an enterprise perspective; this tool provides a starting point for risk assessment. Two case studies were used to evaluate the tools. The tools were useful as they informed decision makers about the costs, benefits and risks of using the cloud.
Cloud computing is a new computing paradigm which allows sharing of resources on remote server such as hardware, network, storage using internet and provides the way through which application, computing power, computing infrastructure can be delivered to the user as a service. Cloud computing unique attribute promise cost effective Information Technology Solution (IT Solution) to the user. All computing needs are provided by the Cloud Service Provider (CSP) and they can be increased or decreased dynamically as required by the user. As data and Application are located at the server and may be beyond geographical boundary, this leads a number of concern from the user prospective. The objective of this paper is to explore the key issues of cloud computing which is delaying its adoption.
We study Plurality Consensus in the Gossip Model over a network of $n$ anonymous agents. Each agent supports an initial opinion or color. We assume that at the onset, the number of agents supporting the plurality color exceeds that of the agents supporting any other color by a sufficiently-large bias. The goal is to provide a protocol that, with high probability, brings the system into the configuration in which all agents support the (initial) plurality color. We consider the Undecided-State Dynamics, a well-known protocol which uses just one more state (the undecided one) than those necessary to store colors. We show that the speed of convergence of this protocol depends on the initial color configuration as a whole, not just on the gap between the plurality and the second largest color community. This dependence is best captured by a novel notion we introduce, namely, the monochromatic distance ${md}(\\bar{\\mathbf{c}})$ which measures the distance of the initial color configuration $\\bar{ \\mathbf {c}}$ from the closest monochromatic one. In the complete graph, we prove that, for a wide range of the input parameters, this dynamics converges within $O({md}(\\bar {\\mathbf {c}}) \\log {n})$ rounds. We prove that this upper bound is almost tight in the strong sense: Starting from any color configuration $\\bar {\\mathbf {c}}$, the convergence time is $\\Omega({md}(\\bar {\\mathbf {c}}))$. Finally, we adapt the Undecided-State Dynamics to obtain a fast, random walk-based protocol for plurality consensus on regular expanders. This protocol converges in $O({md}(\\bar {\\mathbf {c}}) \\mathrm{polylog}(n))$ rounds using only $\\mathrm{polylog}(n)$ local memory. A key-ingredient to achieve the above bounds is a new analysis of the maximum node congestion that results from performing $n$ parallel random walks on regular expanders. All our bounds hold with high probability.
In this article, hybrid parallel bidirectional sieve method is implemented by SMP Cluster, the individual computational units joined together by the communication network, are usually shared-memory systems with one or more multicore processor. To high-efficiency optimization, we propose average divide data into nodes, generating double-ended queues (deque) for sieve method that are able to exploit dual-cores simultaneously start sifting out primes from the head and tail.And each node create a FIFO queue as dynamic data buffer to ache temporary data from another nodes send to. The approach obtains huge speedup and efficiency on SMP Cluster.
In this report, we detail the model using Petri Nets of a new fully distributed resource reservation system. The basic idea of the considered distributed system is to let a user reserve a set of resources on a local network and to use them, without any specific, central administration component such as a front-end node. Resources can be, for instance, computing resources (cores, nodes, GPUs...) or some memory on a server. In order to verify some qualitative and quantitative properties provided by this system, we need to model it. We detail the algorithms used by this system and the Petri Net models we made of it.
Numerous sophisticated local algorithm were suggested in the literature for various fundamental problems. Notable examples are the MIS and $(\\Delta+1)$-coloring algorithms by Barenboim and Elkin [6], by Kuhn [22], and by Panconesi and Srinivasan [34], as well as the $O(\\Delta 2)$-coloring algorithm by Linial [28]. Unfortunately, most known local algorithms (including, in particular, the aforementioned algorithms) are non-uniform, that is, local algorithms generally use good estimations of one or more global parameters of the network, e.g., the maximum degree $\\Delta$ or the number of nodes n. This paper provides a method for transforming a non-uniform local algorithm into a uniform one. Furthermore , the resulting algorithm enjoys the same asymp-totic running time as the original non-uniform algorithm. Our method applies to a wide family of both deterministic and randomized algorithms. Specifically, it applies to almost all state of the art non-uniform algorithms for MIS and Maximal Matching, as well as to many results concerning the coloring problem. (In particular, it applies to all aforementioned algorithms.) To obtain our transformations we introduce a new distributed tool called pruning algorithms, which we believe may be of independent interest.
The generalized method to have a parallel solution to a computational problem, is to find a way to use Divide & Conquer paradigm in order to have processors acting on its own data and therefore all can be scheduled in parallel. MapReduce is an example of this approach: Input data is transformed by the mappers, in order to feed the reducers that can run in parallel. In general this schema gives efficient problem solutions, but it stops being true when the replication factor grows. We present another program schema that is useful for describing problem solutions, that can exploit dynamic pipeline parallelism without having to deal with replica- tion factors. We present the schema in an example: counting triangles in graphs, in particular when the graph do not fit in memory. We describe the solution in NiMo, a graphical programming language that implements the implicitly functional parallel data ow model of computation. The solution obtained using NiMo, is architecture agnostic and can be deployed in any parallel/distributed architecture adapting dynamically the processor usage to input characteristics.
Rapid analysis of DNA sequences is important in preventing the evolution of different viruses and bacteria during an early phase, early diagnosis of genetic predispositions to certain diseases (cancer, cardiovascular diseases), and in DNA forensics. However, real-world DNA sequences may comprise several Gigabytes and the process of DNA analysis demands adequate computational resources to be completed within a reasonable time. In this paper we present a scalable approach for parallel DNA analysis that is based on Finite Automata, and which is suitable for analyzing very large DNA segments. We evaluate our approach for real-world DNA segments of mouse (2.7GB), cat (2.4GB), dog (2.4GB), chicken (1GB), human (3.2GB) and turkey (0.2GB). Experimental results on a dual-socket shared-memory system with 24 physical cores show speed-ups of up to 17.6x. Our approach is up to 3x faster than a pattern-based parallel approach that uses the RE2 library.
Service matching concerns finding suitable services according to the service requester s requirements, which is a complex task due to the increasing number and diversity of cloud services available. Service matching is discussed in web services composition and user oriented service marketplaces contexts. The suggested approaches have different problem definitions and have to be examined closer in order to identify comparable results and to find out which approaches have built on the former ones. One of the most important use cases is service requesters with limited technical knowledge who need to compare services based on their QoS requirements in cloud service marketplaces. Our survey examines the service matching approaches in order to find out the relation between their context and their objectives. Moreover, it evaluates their applicability for the cloud service marketplaces context.
Deployment of distributed applications on large systems, and especially on grid infrastructures, becomes a more and more complex task. Grid users spend a lot of time to prepare, install and configure middleware and application binaries on nodes, and eventually start their applications. The problem is that the deployment process is composed of many heterogeneous tasks that have to be orchestrated in a specific correct order. As a consequence, the automatization of the deployment process is currently very difficult to reach. To address this problem, we propose in this paper a generic deployment framework allowing to automatize the execution of heterogeneous tasks composing the whole deployment process. Our approach is based on a reification as software components of all required deployment mechanisms or existing tools. Grid users only have to describe the configuration to deploy in a simple natural language instead of programming or scripting how the deployment process is executed. As a toy example, this framework is used to deploy CORBA component-based applications and OpenCCM middleware on one thousand nodes of the French Grid5000 infrastructure.
AliEn (ALICE Environment) is a lightweight GRID framework developed by the Alice Collaboration. When the experiment starts running, it will collect data at a rate of approximately 2 PB per year, producing O(109) files per year. All these files, including all simulated events generated during the preparation phase of the experiment, must be accounted and reliably tracked in the GRID environment. The backbone of AliEn is a distributed file catalogue, which associates universal logical file name to physical file names for each dataset and provides transparent access to datasets independently of physical location. The file replication and transport is carried out under the control of the File Transport Broker. In addition, the file catalogue maintains information about every job running in the system. The jobs are distributed by the Job Resource Broker that is implemented using a simplified pull (as opposed to traditional push) architecture. This paper describes the Job and File Transport Resource Brokers and shows that a similar architecture can be applied to solve both problems.
A phaser is an expressive synchronization construct that unifies collective and point-to-point coordination with dynamic task parallelism. Each task can participate in a phaser as a signaler, a waiter, or both. The participants in a phaser may change over time as dynamic tasks are added and deleted. In this poster, we present a highly concurrent and scalable design of phasers for a distributed memory environment that is suitable for use with asynchronous partitioned global address space programming models. Our design for a distributed phaser employs a pair of skip lists augmented with the ability to collect and propagate synchronization signals. To enable a high degree of concurrency, addition and deletion of participant tasks are performed in two phases: a \"fast single-link-modify\" step followed by multiple hand-overhand \"lazy multi-link-modify\" steps. We show that the cost of synchronization and structural operations on a distributed phaser scales logarithmically, even in the presence of concurrent structural modifications. To verify the correctness of our design for distributed phasers, we employ the SPIN model checker. To address this issue of state space explosion, we describe how we decompose the state space to separately verify correct handling for different kinds of messages, which enables complete model checking of our phaser design.
Self-stabilization is a versatile approach to fault-tolerance since it permits a distributed system to recover from any transient fault that arbitrarily corrupts the contents of all memories in the system. Byzantine tolerance is an attractive feature of distributed systems that permits to cope with arbitrary malicious behaviors. We consider the well known problem of constructing a maximum metric tree in this context. Combining these two properties leads to some impossibility results. In this paper, we provide two necessary conditions to construct maximum metric tree in presence of transients and (permanent) Byzantine faults.
K-means is one of the most influential and utilized machine learning algorithms today. Its computation limits the performance and scalability of many statistical analysis and machine learning tasks. We rethink k-means in terms of modern architectures to develop a novel parallelization scheme that delays and minimizes synchronization barriers. We utilize this to develop two modules k$||$means$_T$, and SEM-k$||$means$_T^{RC}$. k$||$means$_T$ is optimized for NUMA architectures and radically improves the performance for datasets that fit in memory. SEM-k$||$means$_T^{RC}$ improves k-means  scalability on a memory budget using semi-external memory, SSDs and a minimalistic triangle inequality pruning algorithm. SEM-k$||$means$_T^{RC}$ scales to billions of points on a single machine, using a fraction of the resources that distributed in-memory systems require. We show k$||$means$_T$ outperforms commercial products like H$_2$O, Dato and Spark s MLlib by up to an order of magnitude on $O(10^7)$ point datasets. Furthermore, SEM-k$||$means$_T^{RC}$ effortlessly clusters $\\geq O(10^8)$ point datasets while outperforming distributed in-memory frameworks.
High Performance Computing is an internet based computing which makes computer infrastructure and services available to the user for research purpose. However, an important issue which needs to be resolved before High Performance Computing Cluster with large pool of servers gain widespread acceptance is the design of data centers with less energy consumption. It is only possible when servers produce less heat and consume less power. Systems reliability decreases with increase in temperature due to heat generation caused by large power consumption as computing in high temperature is more error-prone. Here in this paper our approach is to design and implement a high performance cluster for high-end research in the High Energy Physics stream. This involves the usage of fine grained power gating technique in microprocessors and energy efficient algorithms that reduce the overall running cost of the data center.
Merging two sorted arrays is a prominent building block for sorting and other functions. Its efficient parallelization requires balancing the load among compute cores, minimizing the extra work brought about by parallelization, and minimizing inter-thread synchronization requirements. Efficient use of memory is also important. We present a novel, visually intuitive approach to partitioning two input sorted arrays into pairs of contiguous sequences of elements, one from each array, such that 1) each pair comprises any desired total number of elements, and 2) the elements of each pair form a contiguous sequence in the output merged sorted array. While the resulting partition and the computational complexity are similar to those of certain previous algorithms, our approach is different, extremely intuitive, and offers interesting insights. Based on this, we present a synchronization-free, cache-efficient merging (and sorting) algorithm. While we use a shared memory architecture as the basis, our algorithm is easily adaptable to additional architectures. In fact, our approach is even relevant to cache-efficient sequential sorting. The algorithms are presented, along with important cache-related insights.
There is no existence of dedicated simulators on the Internet that studies the impact of load balancing principles of the cloud architectures. Request Assignment Simulator (RAS) is a customizable, visual tool that helps to understand the request assignment to the resources based on the load balancing principles. We have designed this simulator to fit into Infrastructure as a Service (IaaS) cloud model. In this paper, we present a working manual useful for the conduct of experiment with RAS. The objective of this paper is to instill the user to understand the pertinent parameters in the cloud, their metrics, load balancing principles, and their impact on the performance.
Scientific problems that depend on processing large amounts of data require overcoming challenges in multiple areas: managing large-scale data distribution, co-placement and scheduling of data with compute resources, and storing and transferring large volumes of data. We analyze the ecosystems of the two prominent paradigms for data-intensive applications, hereafter referred to as the high-performance computing and the Apache-Hadoop paradigm. We propose a basis, common terminology and functional factors upon which to analyze the two approaches of both paradigms. We discuss the concept of \"Big Data Ogres\" and their facets as means of understanding and characterizing the most common application workloads found across the two paradigms. We then discuss the salient features of the two paradigms, and compare and contrast the two approaches. Specifically, we examine common implementation/approaches of these paradigms, shed light upon the reasons for their current \"architecture\" and discuss some typical workloads that utilize them. In spite of the significant software distinctions, we believe there is architectural similarity. We discuss the potential integration of different implementations, across the different levels and components. Our comparison progresses from a fully qualitative examination of the two paradigms, to a semi-quantitative methodology. We use a simple and broadly used Ogre (K-means clustering), characterize its performance on a range of representative platforms, covering several implementations from both paradigms. Our experiments provide an insight into the relative strengths of the two paradigms. We propose that the set of Ogres will serve as a benchmark to evaluate the two paradigms along different dimensions.
Recently, Cloud-based Mobile Augmentation (CMA) approaches have gained remarkable ground from academia and industry. CMA is the state-of-the-art mobile augmentation model that employs resource-rich clouds to increase, enhance, and optimize computing capabilities of mobile devices aiming at execution of resource-intensive mobile applications. Augmented mobile devices envision to perform extensive computations and to store big data beyond their intrinsic capabilities with least footprint and vulnerability. Researchers utilize varied cloud-based computing resources (e.g., distant clouds and nearby mobile nodes) to meet various computing requirements of mobile users. However, employing cloud-based computing resources is not a straightforward panacea. Comprehending critical factors that impact on augmentation process and optimum selection of cloud-based resource types are some challenges that hinder CMA adaptability. This paper comprehensively surveys the mobile augmentation domain and presents taxonomy of CMA approaches. The objectives of this study is to highlight the effects of remote resources on the quality and reliability of augmentation processes and discuss the challenges and opportunities of employing varied cloud-based resources in augmenting mobile devices. We present augmentation definition, motivation, and taxonomy of augmentation types, including traditional and cloud-based. We critically analyze the state-of-the-art CMA approaches and classify them into four groups of distant fixed, proximate fixed, proximate mobile, and hybrid to present a taxonomy. Vital decision making and performance limitation factors that influence on the adoption of CMA approaches are introduced and an exemplary decision making flowchart for future CMA approaches are presented. Impacts of CMA approaches on mobile computing is discussed and open challenges are presented as the future research directions.
We propose a simple distributed hash table called ReCord, which is a generalized version of Randomized-Chord and offers improved tradeoffs in performance and topology maintenance over existing P2P systems. ReCord is scalable and can be easily implemented as an overlay network, and offers a good tradeoff between the node degree and query latency. For instance, an $n$-node ReCord with $O(\\log n)$ node degree has an expected latency of $\\Theta(\\log n)$ hops. Alternatively, it can also offer $\\Theta(\\frac{\\log n}{\\log \\log n})$ hops latency at a higher cost of $O(\\frac{\\log^2 n}{\\log \\log n})$ node degree. Meanwhile, simulations of the dynamic behaviors of ReCord are studied.
The Byzantine agreement problem requires a set of $n$ processes to agree on a value sent by a transmitter, despite a subset of $b$ processes behaving in an arbitrary, i.e. Byzantine, manner and sending corrupted messages to all processes in the system. It is well known that the problem has a solution in a (an eventually) synchronous message passing distributed system iff the number of processes in the Byzantine subset is less than one third of the total number of processes, i.e. iff $n > 3b+1$. The rest of the processes are expected to be correct: they should never deviate from the algorithm assigned to them and send corrupted messages. But what if they still do? We show in this paper that it is possible to solve Byzantine agreement even if, beyond the $ b$ ($< n/3 $) Byzantine processes, some of the other processes also send corrupted messages, as long as they do not send them to all. More specifically, we generalize the classical Byzantine model and consider that Byzantine failures might be partial. In each communication step, some of the processes might send corrupted messages to a subset of the processes. This subset of processes - to which corrupted messages might be sent - could change over time. We compute the exact number of processes that can commit such faults, besides those that commit classical Byzantine failures, while still solving Byzantine agreement. We present a corresponding Byzantine agreement algorithm and prove its optimality by giving resilience and complexity bounds.
The map-reduce parallel programming model has become extremely popular in the big data community. Many big data workloads can benefit from the enhanced performance offered by supercomputers. LLMapReduce provides the familiar map-reduce parallel programming model to big data users running on a supercomputer. LLMapReduce dramatically simplifies map-reduce programming by providing simple parallel programming capability in one line of code. LLMapReduce supports all programming languages and many schedulers. LLMapReduce can work with any application without the need to modify the application. Furthermore, LLMapReduce can overcome scaling limits in the map-reduce parallel programming model via options that allow the user to switch to the more efficient single-program-multiple-data (SPMD) parallel programming model. These features allow users to reduce the computational overhead by more than 10x compared to standard map-reduce for certain applications. LLMapReduce is widely used by hundreds of users at MIT. Currently LLMapReduce works with several schedulers such as SLURM, Grid Engine and LSF.
In the context of large-scale networks, the consideration of faults is an evident necessity. This document is focussing on the self-stabilizing approach which aims at conceiving algorithms \"repairing themselves\" in case of transient faults, that is of faults implying an arbitrary modification of the states of the processes. The document focuses on two different contexts, covering the major part of my research work these last years. The first part of the document is dedicated to the design and analysis of self-stabilizing algorithms for networks of processes. The second part of the document is dedicated to the design and analysis of self-stabilizing algorithms for autonomous entities (i.e., software agents, robots, etc.) moving in a network.
In this paper, we propose a paradigm for processing in parallel graph joins in road networks. The methodology we present can be used for distance join processing among the elements of two disjoint sets R,S of nodes from the road network, with R preceding S, and we are in search for the pairs of vertices (u,v), where u in R and v in S, such that dist(u,v) < {\\theta}. Another variation of the problem would involve retrieving the k closest pairs (u,v) in the road network with u in R and v in S, such that dist(u,v) <= dist(w,y), where w,y do not belong in the result. We reckon that this is an extremely useful paradigm with many practical applications. A typical example of usage of our methods would be to find the pairs of restaurants and bars (in that order) from which to select for a night out, that either fall within walking distance for example, or just the k closest pairs, depending on the parameters. Another entirely different scenario would involve finding the points of two distinct trajectories that are within a certain distance predicate, or the k closest such points. For example, we would like to transfer from one train to another a few tones of freight, and hence, we want to minimize the distance we have to cover for moving the cargo from the carrying train to the other. We reckon that this endeavor of ours covers exactly those needs for processing such queries efficiently. Moreover, for the specific purposes of this paper, we also propose a novel heuristic graph partitioning scheme. It resembles a recursive bisection method, and is tailored to the requirements of the problem, targeting at establishing well separated partitions, so as to allow computations to be performed simultaneously and independently within each partition, unlike hitherto work that aims at minimizing either the number of edges among different partitions, or the number of nodes thereof.
P2P architecture is a viable option for enterprise backup. In contrast to dedicated backup servers, nowadays a standard solution, making backups directly on organization s workstations should be cheaper (as existing hardware is used), more efficient (as there is no single bottleneck server) and more reliable (as the machines are geographically dispersed). We present the architecture of a p2p backup system that uses pairwise replication contracts between a data owner and a replicator. In contrast to standard p2p storage systems using directly a DHT, the contracts allow our system to optimize replicas  placement depending on a specific optimization strategy, and so to take advantage of the heterogeneity of the machines and the network. Such optimization is particularly appealing in the context of backup: replicas can be geographically dispersed, the load sent over the network can be minimized, or the optimization goal can be to minimize the backup/restore time. However, managing the contracts, keeping them consistent and adjusting them in response to dynamically changing environment is challenging. We built a scientific prototype and ran the experiments on 150 workstations in the university s computer laboratories and, separately, on 50 PlanetLab nodes. We found out that the main factor affecting the quality of the system is the availability of the machines. Yet, our main conclusion is that it is possible to build an efficient and reliable backup system on highly unreliable machines (our computers had just 13% average availability).
We present a novel framework, called balanced overlay networks (BON), that provides scalable, decentralized load balancing for distributed computing using large-scale pools of heterogeneous computers. Fundamentally, BON encodes the information about each node s available computational resources in the structure of the links connecting the nodes in the network. This distributed encoding is self-organized, with each node managing its in-degree and local connectivity via random-walk sampling. Assignment of incoming jobs to nodes with the most free resources is also accomplished by sampling the nodes via short random walks. Extensive simulations show that the resulting highly dynamic and self-organized graph structure can efficiently balance computational load throughout large-scale networks. These simulations cover a wide spectrum of cases, including significant heterogeneity in available computing resources and high burstiness in incoming load. We provide analytical results that prove BON s scalability for truly large-scale networks: in particular we show that under certain ideal conditions, the network structure converges to Erdos-Renyi (ER) random graphs; our simulation results, however, show that the algorithm does much better, and the structures seem to approach the ideal case of d-regular random graphs. We also make a connection between highly-loaded BONs and the well-known ball-bin randomized load balancing framework.
With the emergence of social networks and improvements in computational photography, billions of JPEG images are shared and viewed on a daily basis. Desktops, tablets and smartphones constitute the vast majority of hardware platforms used for displaying JPEG images. Despite the fact that these platforms are heterogeneous multicores, no approach exists yet that is capable of joining forces of a system s CPU and GPU for JPEG decoding. In this paper we introduce a novel JPEG decoding scheme for heterogeneous architectures consisting of a CPU and an OpenCL-programmable GPU. We employ an offline profiling step to determine the performance of a system s CPU and GPU with respect to JPEG decoding. For a given JPEG image, our performance model uses (1) the CPU and GPU performance characteristics, (2) the image entropy and (3) the width and height of the image to balance the JPEG decoding workload on the underlying hardware. Our run-time partitioning and scheduling scheme exploits task, data and pipeline parallelism by scheduling the non-parallelizable entropy decoding task on the CPU, whereas inverse cosine transformations (IDCTs), color conversions and upsampling are conducted on both the CPU and the GPU. Our kernels have been optimized for GPU memory hierarchies. We have implemented the proposed method in the context of the libjpeg-turbo library, which is an industrial-strength JPEG encoding and decoding engine. Libjpeg-turbo s hand-optimized SIMD routines for ARM and x86 constitute a competitive yardstick for the comparison to the proposed approach. Retro-fitting our method with libjpeg-turbo provided insights on the software-engineering aspects of re-engineering legacy code for heterogeneous multicores.
The specialty of desktop-as-a-service cloud computing is that user can access their desktop and can execute applications in virtual desktops on remote servers. Resource management and resource utilization are most significant in the area of desktop-as-a-service, cloud computing; however, handling a large amount of clients in the most efficient manner poses important challenges. Especially deciding how many clients to handle on one server, and where to execute the user applications at each time is important. This is because we have to ensure maximum resource utilization along with user data confidentiality, customer satisfaction, scalability, minimum Service level agreement (SLA) violation etc. Assigning too many users to one server leads to customer dissatisfaction, while assigning too little leads to higher investments costs. So we have taken into consideration these two situations also. We study different aspects to optimize the resource usage and customer satisfaction. Here in this paper We proposed Intelligent Resource Allocation (IRA) Technique which assures the above mentioned parameters like minimum SLA violation. For this, priorities are assigned to user requests based on their SLA Factors in order to maintain their confidentiality. The results of the paper indicate that by applying IRA Technique to the already existing overbooking mechanism will improve the performance of the system with significant reduction in SLA violation.
\" How well connected is the network? \" This is one of the most fundamental questions one would ask when facing the challenge of designing a communication network. Three major notions of connectivity have been considered in the literature, but in the context of traditional (single-layer) networks, they turn out to be equivalent. This paper introduces a model for studying the three notions of connectivity in multi-layer networks. Using this model, it is easy to demonstrate that in multi-layer networks the three notions may differ dramatically. Unfortunately, in contrast to the single-layer case, where the values of the three connectivity notions can be computed efficiently, it has been recently shown in the context of WDM networks (results that can be easily translated to our model) that the values of two of these notions of connectivity are hard to compute or even approximate in multi-layer networks. The current paper shed some positive light into the multi-layer connectivity topic: we show that the value of the third connectivity notion can be computed in polynomial time and develop an approximation for the construction of well connected overlay networks.
This paper deals with the replica placement problem on fully homogeneous tree networks known as the Replica Placement optimization problem. The client requests are known beforehand, while the number and location of the servers are to be determined. We investigate the latter problem using the Closest access policy when adding QoS and bandwidth constraints. We propose an optimal algorithm in two passes using dynamic programming.
In the context of GreenPAD project it is important to predict the energy consumption of individual (and mixture of) VMs / workload for optimal scheduling (running those VMs which require higher energy when there is more green energy available and vice-versa) in order to maximize green energy utilization. For this we execute the following experiments on an Openstack cloud testbed consisting of Fujitsu servers: VM energy measurement for different configurations (flavor + workload) and VM energy prediction for a new configuration. The automation framework for running these experiments uses bash scripts which call tools like  stress  (simulating workloads),  collected  (resource usage) and  IPMI  (power measurement). We propose a linear model for predicting the power usage of the VMs based on regression. We first collect the resource usage (using collected) and the associated power usage (using IPMI) for different VM configurations and use this to build a (multi-) regression model (between resource usage and VM energy consumption). Then we use the information about the resource usage patterns of the new workload to predict the power usage. For predicting power for mix of workloads we execute (build a regression model based on) experiments with random workloads. We observe the highest energy usage for CPU-intensive workloads followed by memory-intensive workloads.
This paper considers distributed coding for multi-source single-sink data collection wireless networks. A unified framework for network coding and channel coding, termed \"generalized adaptive network coded cooperation\" (GANCC), is proposed. Key ingredients of GANCC include: matching code graphs with the dynamic network graphs on-the-fly, and integrating channel coding with network coding through circulant low-density parity-check codes. Several code constructing methods and several families of sparse-graph codes are proposed, and information theoretical analysis is performed. It is shown that GANCC is simple to operate, adaptive in real time, distributed in nature, and capable of providing remarkable coding gains even with a very limited number of cooperating users.
Exploiting full computational power of current more and more hierarchical multiprocessor machines requires a very careful distribution of threads and data among the underlying non-uniform architecture. Unfortunately, most operating systems only provide a poor scheduling API that does not allow applications to transmit valuable scheduling hints to the system. In a previous paper, we showed that using a bubble-based thread scheduler can significantly improve applications  performance in a portable way. However, since multithreaded applications have various scheduling requirements, there is no universal scheduler that could meet all these needs. In this paper, we present a framework that allows scheduling experts to implement and experiment with customized thread schedulers. It provides a powerful API for dynamically distributing bubbles among the machine in a high-level, portable, and efficient way. Several examples show how experts can then develop, debug and tune their own portable bubble schedulers.
In a sequence of recent results (PODC 2015 and PODC 2016), the running time of the fastest algorithm for the \\emph{minimum spanning tree (MST)} problem in the \\emph{Congested Clique} model was first improved to $O(\\log \\log \\log n)$ from $O(\\log \\log n)$ (Hegeman et al., PODC 2015) and then to $O(\\log^* n)$ (Ghaffari and Parter, PODC 2016). All of these algorithms use $\\Theta(n^2)$ messages independent of the number of edges in the input graph. This paper positively answers a question raised in Hegeman et al., and presents the first \"super-fast\" MST algorithm with $o(m)$ message complexity for input graphs with $m$ edges. Specifically, we present an algorithm running in $O(\\log^* n)$ rounds, with message complexity $\\tilde{O}(\\sqrt{m \\cdot n})$ and then build on this algorithm to derive a family of algorithms, containing for any $\\varepsilon$, $0 < \\varepsilon \\le 1$, an algorithm running in $O(\\log^* n/\\varepsilon)$ rounds, using $\\tilde{O}(n^{1 + \\varepsilon}/\\varepsilon)$ messages. Setting $\\varepsilon = \\log\\log n/\\log n$ leads to the first sub-logarithmic round Congested Clique MST algorithm that uses only $\\tilde{O}(n)$ messages. Our primary tools in achieving these results are (i) a component-wise bound on the number of candidates for MST edges, extending the sampling lemma of Karger, Klein, and Tarjan (Karger, Klein, and Tarjan, JACM 1995) and (ii) $\\Theta(\\log n)$-wise-independent linear graph sketches (Cormode and Firmani, Dist.~Par.~Databases, 2014) for generating MST candidate edges.
Erasure coding techniques are getting integrated in networked distributed storage systems as a way to provide fault-tolerance at the cost of less storage overhead than traditional replication. Redundancy is maintained over time through repair mechanisms, which may entail large network resource overheads. In recent years, several novel codes tailor-made for distributed storage have been proposed to optimize storage overhead and repair, such as Regenerating Codes that minimize the per repair traffic, or Self-Repairing Codes which minimize the number of nodes contacted per repair. Existing studies of these coding techniques are however predominantly theoretical, under the simplifying assumption that only one object is stored. They ignore many practical issues that real systems must address, such as data placement, de/correlation of multiple stored objects, or the competition for limited network resources when multiple objects are repaired simultaneously. This paper empirically studies the repair performance of these novel storage centric codes with respect to classical erasure codes by simulating realistic scenarios and exploring the interplay of code parameters, failure characteristics and data placement with respect to the trade-offs of bandwidth usage and speed of repairs.
This paper precisely analyzes the wire density and required area in standard layout styles for the hypercube. The most natural, regular layout of a hypercube of N^2 nodes in the plane, in a N x N grid arrangement, uses floor(2N/3)+1 horizontal wiring tracks for each row of nodes. (The number of tracks per row can be reduced by 1 with a less regular design.) This paper also gives a simple formula for the wire density at any cut position and a full characterization of all places where the wire density is maximized (which does not occur at the bisection).
The Desktop Grid offers solutions to overcome several challenges and to answer increasingly needs of scientific computing. This technology consists mainly in exploiting PC resources, geographically dispersed, to treat time consuming applications and/or important storage capacity requiring applications. However, as resources number increases, the need for scalability, self-organisation, dynamic reconfiguration, decentralization and performance becomes more and more essential. In this context, this paper evaluates the scalability and performance of P2P tools for registering and discovering services (Publish/Subscribe systems). Three protocols are used in this purpose: Bonjour, Avahi and Pastry. We have studied the behaviour of these protocols related to two criteria: the elapsed time for registrations services and the needed time to discover new services.
Consider an asynchronous network in a shared-memory environment consisting of n nodes. Assume that up to f of the nodes might be Byzantine (n > 12f), where the adversary is full-information and dynamic (sometimes called adaptive). In addition, the non-Byzantine nodes may undergo transient failures. Nodes advance in atomic steps, which consist of reading all registers, performing some calculation and writing to all registers. This paper contains three main contributions. First, the clock-function problem is defined, which is a generalization of the clock synchronization problem. This generalization encapsulates previous clock synchronization problem definitions while extending them to the current paper s model. Second, a randomized asynchronous self-stabilizing Byzantine tolerant clock synchronization algorithm is presented. In the construction of the clock synchronization algorithm, a building block that ensures different nodes advance at similar rates is developed. This feature is the third contribution of the paper. It is self-stabilizing and Byzantine tolerant and can be used as a building block for different algorithms that operate in an asynchronous self-stabilizing Byzantine model. The convergence time of the presented algorithm is exponential. Observe that in the asynchronous setting the best known full-information dynamic Byzantine agreement also has expected exponential convergence time, even though currently there is no known reduction between the two.
This work reports experiences on using radio ranging to position sensors in a grid topology. The implementation is simple, efficient, and could be practically distributed. The paper describes an implementation and experimental result based on RSSI distance estimation. Novel techniques such as fuzzy membership functions and table lookup are used to obtain more accurate result and simplify the computation. An 86% accuracy is achieved in the experiment in spite of inaccurate RSSI distance estimates with errors up to 60%.
An Abstract Graph Machine(AGM) is an abstract model for distributed memory parallel stabilizing graph algorithms. A stabilizing algorithm starts from a particular initial state and goes through series of different state changes until it converges. The AGM adds work dependency to the stabilizing algorithm. The work is processed within the processing function. All processes in the system execute the same processing function. Before feeding work into the processing function, work is ordered using a strict weak ordering relation. The strict weak ordering relation divides work into equivalence classes, hence work within a single equivalence class can be processed in parallel, but work in different equivalence classes must be executed in the order they appear in equivalence classes. The paper presents the AGM model, semantics and AGM models for several existing distributed memory parallel graph algorithms.
Group communication is becoming a more and more popular infrastructure for efficient distributed applications. It consists in representing locally a group of remote objects as a single object accessed in a single step; communications are then broadcasted to all members. This paper provides models for automatic verification of group-based applications, typically for detecting deadlocks or checking message ordering. We show how to encode group communication, together with different forms of synchronisation for group results. The proposed models are parametric such that, for example, different group sizes or group members could be experimented with the minimum modification of the original model.
This paper considers the \\textit{minimum spanning tree (MST)} problem in the Congested Clique model and presents an algorithm that runs in $O(\\log \\log \\log n)$ rounds, with high probability. Prior to this, the fastest MST algorithm in this model was a deterministic algorithm due to Lotker et al.~(SIAM J on Comp, 2005) from about a decade ago. A key step along the way to designing this MST algorithm is a \\textit{connectivity verification} algorithm that not only runs in $O(\\log \\log \\log n)$ rounds with high probability, but also has low message complexity. This allows the fast computation of an MST by running multiple instances of the connectivity verification algorithm in parallel. These results depend on a new edge-sampling theorem, developed in the paper, that says that if each edge $e = \\{u, v\\}$ is sampled independently with probability $c \\log^2 n/\\min\\{\\mbox{degree}(u), \\mbox{degree}(v)\\}$ (for a large enough constant $c$) then all cuts of size at least $n$ are approximated in the sampled graph. This sampling theorem is inspired by series of papers on graph sparsification via random edge sampling due to Karger~(STOC 1994), Bencz\\ ur and Karger~(STOC 1996, arxiv 2002), and Fung et al.~(STOC 2011). The edge sampling techniques in these papers use probabilities that are functions of edge-connectivity or a related measure called edge-strength. For the purposes of this paper, these edge-connectivity measures seem too costly to compute and the main technical contribution of this paper is to show that degree-based edge-sampling suffices to approximate large cuts.
This paper addresses the impact of Virtual Memory Streaming (VMS) technique in provisioning virtual machines (VMs) in cloud environment. VMS is a scaling virtualization technology that allows different virtual machines rapid scale, high performance, and increase hardware utilization. Traditional hypervisors do not support true no-downtime live migration, and its lack of memory oversubscription can hurt the economics of a private cloud deployment by limiting the number of VMs on each host. VMS brings together several advanced hypervisor memory management techniques including granular page sharing, dynamic memory footprint management, live migration, read caching, and a unique virtual machine cloning capability. An architecture model is described, together with a proof-of-concept implementation, that VMS dynamically scaling of virtualized infrastructure with true live migration and cloning of VMs. This paper argues that VMS for Cloud allows requiring significantly reduced server memory and reducing the time for virtualized resource scaling by instantly adding more virtual machines.
This document describes the Gloss software currently implemented. The description of the Gloss demonstrator for multi-surface interaction can be found in D17. The ongoing integration activity for the work described in D17 and D8 constitutes our development of infrastructure for a first smart space. In this report, the focus is on infrastructure to support the implementation of location aware services. A local architecture provides a framework for constructing Gloss applications, termed assemblies, that run on individual physical nodes. A global architecture defines an overlay network for linking individual assemblies. Both local and global architectures are under active development.
This paper argues that there are three fundamental challenges that need to be overcome in order to foster the adoption of big data technologies in non-computer science related disciplines: addressing issues of accessibility of such technologies for non-computer scientists, supporting the ad hoc exploration of large data sets with minimal effort and the availability of lightweight web-based frameworks for quick and easy analytics. In this paper, we address the above three challenges through the development of  BigExcel , a three tier web-based framework for exploring big data to facilitate the management of user interactions with large data sets, the construction of queries to explore the data set and the management of the infrastructure. The feasibility of BigExcel is demonstrated through two Yahoo Sandbox datasets. The first dataset is the Yahoo Buzz Score data set we use for quantitatively predicting trending technologies and the second is the Yahoo n-gram corpus we use for qualitatively inferring the coverage of important events. A demonstration of the BigExcel framework and source code is available at this http URL
This report has two objectives. First, we describe a set of the production distributed infrastructures currently available, so that the reader has a basic understanding of them. This includes explaining why each infrastructure was created and made available and how it has succeeded and failed. The set is not complete, but we believe it is representative. Second, we describe the infrastructures in terms of their use, which is a combination of how they were designed to be used and how users have found ways to use them. Applications are often designed and created with specific infrastructures in mind, with both an appreciation of the existing capabilities provided by those infrastructures and an anticipation of their future capabilities. Here, the infrastructures we discuss were often designed and created with specific applications in mind, or at least specific types of applications. The reader should understand how the interplay between the infrastructure providers and the users leads to such usages, which we call usage modalities. These usage modalities are really abstractions that exist between the infrastructures and the applications; they influence the infrastructures by representing the applications, and they influence the ap- plications by representing the infrastructures.
We consider a request processing system composed of organizations and their servers connected by the Internet. The latency a user observes is a sum of communication delays and the time needed to handle the request on a server. The handling time depends on the server congestion, i.e. the total number of requests a server must handle. We analyze the problem of balancing the load in a network of servers in order to minimize the total observed latency. We consider both cooperative and selfish organizations (each organization aiming to minimize the latency of the locally-produced requests). The problem can be generalized to the task scheduling in a distributed cloud; or to content delivery in an organizationally-distributed CDNs. In a cooperative network, we show that the problem is polynomially solvable. We also present a distributed algorithm iteratively balancing the load. We show how to estimate the distance between the current solution and the optimum based on the amount of load exchanged by the algorithm. During the experimental evaluation, we show that the distributed algorithm is efficient, therefore it can be used in networks with dynamically changing loads. In a network of selfish organizations, we prove that the price of anarchy (the worst-case loss of performance due to selfishness) is low when the network is homogeneous and the servers are loaded (the request handling time is high compared to the communication delay). After relaxing these assumptions, we assess the loss of performance caused by the selfishness experimentally, showing that it remains low. Our results indicate that a network of servers handling requests can be efficiently managed by a distributed algorithm. Additionally, even if the network is organizationally distributed, with individual organizations optimizing performance of their requests, the network remains efficient.
Cloud computing allows users to view computing in a new direction, as it uses the existing technologies to provide better IT services at low-cost. To offer high QOS to customers according SLA, cloud services broker or cloud service provider uses individual cloud providers that work collaboratively to form a federation of clouds. It is required in applications like Real-time online interactive applications, weather research and forecasting etc., in which the data and applications are complex and distributed. In these applications secret data should be shared, so secure data sharing mechanism is required in Federated clouds to reduce the risk of data intrusion, the loss of service availability and to ensure data integrity. So In this paper we have proposed zero knowledge data sharing scheme where Trusted Cloud Authority (TCA) will control federated clouds for data sharing where the secret to be exchanged for computation is encrypted and retrieved by individual cloud at the end. Our scheme is based on the difficulty of solving the Discrete Logarithm problem (DLOG) in a finite abelian group of large prime order which is NP-Hard. So our proposed scheme provides data integrity in transit, data availability when one of host providers are not available during the computation.
The prediction of water temperature is crucial for aquatic ecosystem studies and management. In this paper, we raise challenging issues in supporting real time water temperature prediction and present a system called WT-Agabus to address those issues. The WT-Agabus system is designed to be a cyberinfrastructure and to support various prediction models in a uniform way. In addition, we present a neural network-based water temperature prediction model to use only data available online from Korea Meteorological Administration (KMA). In this paper, we also show the current prototype implementation of the WT-Agabus system to support the prediction model
We present the first algorithm that implements an abstract MAC (absMAC) layer in the Signal-to-Interference-plus-Noise-Ratio (SINR) wireless network model. We first prove that efficient SINR implementations are not possible for the standard absMAC specification. We modify that specification to an \"approximate\" version that better suits the SINR model. We give an efficient algorithm to implement the modified specification, and use it to derive efficient algorithms for higher-level problems of global broadcast and consensus. In particular, we show that the absMAC progress property has no efficient implementation in terms of the SINR strong connectivity graph $G_{1-\\epsilon}$, which contains edges between nodes of distance at most $(1-\\epsilon)$ times the transmission range, where $\\epsilon>0$ is a small constant that can be chosen by the user. This progress property bounds the time until a node is guaranteed to receive some message when at least one of its neighbors is transmitting. To overcome this limitation, we introduce the slightly weaker notion of approximate progress into the absMAC specification. We provide a fast implementation of the modified specification, based on decomposing a known algorithm into local and global parts. We analyze our algorithm in terms of local parameters such as node degrees, rather than global parameters such as the overall number of nodes. A key contribution is our demonstration that such a local analysis is possible even in the presence of global interference. Our absMAC algorithm leads to several new, efficient algorithms for solving higher-level problems in the SINR model. Namely, by combining our algorithm with known high-level algorithms, we obtain an improved algorithm for global single-message broadcast in the SINR model, and the first efficient algorithm for multi-message broadcast in that model.
Recent advances in wireless sensor networks (WSNs) have led to many new promissing applications. However data communication between nodes consumes a large portion of the total energy of WSNs. Consequently efficient data aggregation technique can help greatly to reduce power consumption. Data aggregation has emerged as a basic approach in WSNs in order to reduce the number of transmissions of sensor nodes over {\\it aggregation tree} and hence minimizing the overall power consumption in the network. If a sensor node fails during data aggregation then the aggregation tree is disconnected. Hence the WSNs rely on in-network aggregation for efficiency but a single faulty node can severely influence the outcome by contributing an arbitrary partial aggregate value. In this paper we have presented a distributed algorithm that reconstruct the aggregation tree from the initial aggregation tree excluding the faulty sensor node. This is a synchronous model that is completed in several rounds. Our proposed scheme can handle multiple number of faulty nodes as well.
We introduce Rambrain, a user space library that manages memory consumption of your code. Using Rambrain you can overcommit memory over the size of physical memory present in the system. Rambrain takes care of temporarily swapping out data to disk and can handle multiples of the physical memory size present. Rambrain is thread-safe, OpenMP and MPI compatible and supports Asynchronous IO. The library was designed to require minimal changes to existing programs and to be easy to use.
Objectives: Grid-based technologies are emerging as potential solutions for managing and collaborating distributed resources in the biomedical domain. Few examples exist, however, of successful implementations of Grid-enabled medical systems and even fewer have been deployed for evaluation in practice. The objective of this paper is to evaluate the use in clinical practice of a Grid-based imaging prototype and to establish directions for engineering future medical Grid developments and their subsequent deployment. Method: The MammoGrid project has deployed a prototype system for clinicians using the Grid as its information infrastructure. To assist in the specification of the system requirements (and for the first time in healthgrid applications), use-case modelling has been carried out in close collaboration with clinicians and radiologists who had no prior experience of this modelling technique. A critical qualitative and, where possible, quantitative analysis of the MammoGrid prototype is presented leading to a set of recommendations from the delivery of the first deployed Grid-based medical imaging application. Results: We report critically on the application of software engineering techniques in the specification and implementation of the MammoGrid project and show that use-case modelling is a suitable vehicle for representing medical requirements and for communicating effectively with the clinical community. This paper also discusses the practical advantages and limitations of applying the Grid to real-life clinical applications and presents the consequent lessons learned.
Previous geographic routing schemes in Delay/Disruption Tolerant Networks (DTNs) only consider the homogeneous scenario where nodal mobility is identical. Motivated by this gap, we turn to design a DTN based geographic routing scheme in heterogeneous scenario. Systematically, our target is achieved via two steps: 1) We first propose \"The-Best-Geographic-Relay (TBGR)\" routing scheme to relay messages via a limited number of copies, under the homogeneous scenario. We further overcome the local maximum problem of TBGR given a sparse network density, different from those efforts in dense networks like clustered Wireless Sensor Networks (WSNs). 2) We next extend TBGR for heterogeneous scenario, and propose \"The-Best-Heterogeneity-Geographic-Relay (TBHGR)\" routing scheme considering individual nodal visiting preference (referred to non-identical nodal mobility). Extensive results under a realistic heterogeneous scenario show the advantage of TBHGR over literature works in terms of reliable message delivery, while with low routing overhead.
When thousands of processors are involved in performing event filtering on a trigger farm, there is likely to be a large number of failures within the software and hardware systems. BTeV, a proton/antiproton collider experiment at Fermi National Accelerator Laboratory, has designed a trigger, which includes several thousand processors. If fault conditions are not given proper treatment, it is conceivable that this trigger system will experience failures at a high enough rate to have a negative impact on its effectiveness. The RTES (Real Time Embedded Systems) collaboration is a group of physicists, engineers, and computer scientists working to address the problem of reliability in large-scale clusters with real-time constraints such as this. Resulting infrastructure must be highly scalable, verifiable, extensible by users, and dynamically changeable.
We analyze parallel algorithms in the context of exhaustive search over totally ordered sets. Imagine an infinite list of \"boxes\", with a \"treasure\" hidden in one of them, where the boxes  order reflects the importance of finding the treasure in a given box. At each time step, a search protocol executed by a searcher has the ability to peek into one box, and see whether the treasure is present or not. By equally dividing the workload between them, $k$ searchers can find the treasure $k$ times faster than one searcher. However, this straightforward strategy is very sensitive to failures (e.g., crashes of processors), and overcoming this issue seems to require a large amount of communication. We therefore address the question of designing parallel search algorithms maximizing their speed-up and maintaining high levels of robustness, while minimizing the amount of resources for coordination. Based on the observation that algorithms that avoid communication are inherently robust, we analyze the best running time performance of non-coordinating algorithms. Specifically, we devise non-coordinating algorithms that achieve a speed-up of $9/8$ for two searchers, a speed-up of $4/3$ for three searchers, and in general, a speed-up of $\\frac{k}{4}(1+1/k)^2$ for any $k\\geq 1$ searchers. Thus, asymptotically, the speed-up is only four times worse compared to the case of full-coordination, and our algorithms are surprisingly simple and hence applicable. Moreover, these bounds are tight in a strong sense as no non-coordinating search algorithm can achieve better speed-ups. Overall, we highlight that, in faulty contexts in which coordination between the searchers is technically difficult to implement, intrusive with respect to privacy, and/or costly in term of resources, it might well be worth giving up on coordination, and simply run our non-coordinating exhaustive search algorithms.
In large scale systems such as the Internet, replicating data is an essential feature in order to provide availability and fault-tolerance. Attiya and Welch proved that using strong consistency criteria such as atomicity is costly as each operation may need an execution time linear with the latency of the communication network. Weaker consistency criteria like causal consistency and PRAM consistency do not ensure convergence. The different replicas are not guaranteed to converge towards a unique state. Eventual consistency guarantees that all replicas eventually converge when the participants stop updating. However, it fails to fully specify the semantics of the operations on shared objects and requires additional non-intuitive and error-prone distributed specification techniques. This paper introduces and formalizes a new consistency criterion, called update consistency, that requires the state of a replicated object to be consistent with a linearization of all the updates. In other words, whereas atomicity imposes a linearization of all of the operations, this criterion imposes this only on updates. Consequently some read operations may return out-dated values. Update consistency is stronger than eventual consistency, so we can replace eventually consistent objects with update consistent ones in any program. Finally, we prove that update consistency is universal, in the sense that any object can be implemented under this criterion in a distributed system where any number of nodes may crash.
The recent proliferation of Data Grids and the increasingly common practice of using resources as distributed data stores provide a convenient environment for communities of researchers to share, replicate, and manage access to copies of large datasets. This has led to the question of which replica can be accessed most efficiently. In such environments, fetching data from one of the several replica locations requires accurate predictions of end-to-end transfer times. The answer to this question can depend on many factors, including physical characteristics of the resources and the load behavior on the CPUs, networks, and storage devices that are part of the end-to-end data path linking possible sources and sinks. Our approach combines end-to-end application throughput observations with network and disk load variations and captures whole-system performance and variations in load patterns. Our predictions characterize the effect of load variations of several shared devices (network and disk) on file transfer times. We develop a suite of univariate and multivariate predictors that can use multiple data sources to improve the accuracy of the predictions as well as address Data Grid variations (availability of data and sporadic nature of transfers). We ran a large set of data transfer experiments using GridFTP and observed performance predictions within 15% error for our testbed sites, which is quite promising for a pragmatic system.
Topology recognition and leader election are fundamental tasks in distributed computing in networks. The first of them requires each node to find a labeled isomorphic copy of the network, while the result of the second one consists in a single node adopting the label 1 (leader), with all other nodes adopting the label 0 and learning a path to the leader. We consider both these problems in networks whose nodes are equipped with not necessarily distinct labels called colors, and ports at each node of degree $d$ are arbitrarily numbered $0,1,\\dots, d-1$. Colored networks are generalizations both of labeled networks and anonymous networks. In colored networks, topology recognition and leader election are not always feasible. Hence we study two more general problems. The aim of the problem TOP (resp. LE), for a colored network and for input $I$ given to its nodes, is to solve topology recognition (resp. leader election) in this network, if this is possible under input $I$, and to have all nodes answer \"unsolvable\" otherwise. We show that nodes of a network can solve problems TOP and LE, if they are given, as input $I$, an upper bound $k$ on the number of nodes of a given color, called the size of this color. On the other hand we show that, if the nodes are given an input that does not bound the size of any color, then the answer to TOP and LE must be \"unsolvable\", even for the class of rings. Under the assumption that nodes are given an upper bound $k$ on the size of a given color, we study the time of solving problems TOP and LE in the $LOCAL$. We give an algorithm to solve each of these problems in arbitrary $n$-node networks of diameter $D$ in time $O(kD+D\\log(n/D))$. We also show that this time is optimal, by exhibiting classes of networks in which every algorithm solving problems TOP or LE must use time $\\Omega(kD+D\\log(n/D))$.
Graphics processing units (GPU) had evolved from a specialized hardware capable to render high quality graphics in games to a commodity hardware for effective processing blocks of data in a parallel schema. This evolution is particularly interesting for scientific groups, which traditionally use mainly CPU as a work horse, and now can profit of the arrival of GPU hardware to HPC clusters. This new GPU hardware promises a boost in peak performance, but it is not trivial to use. In this article a programming platform designed to promote a direct use of this specialized hardware is presented. This platform includes a visual editor of parallel data flows and it is oriented to the execution in distributed clusters with GPUs. Examples of application in two characteristic problems, Fast Fourier Transform and Image Compression, are also shown.
We present fast deterministic distributed protocols in synchronous networks for leader election and spanning tree construction. The protocols are designed under the assumption that nodes in a network have identifiers but the size of an identifier is unlimited. So time bounds of protocols depend on the sizes of identifiers. We present fast protocols running in time $O(D\\log L+L)$, where $L$ is the size of the minimal identifier and $D$ is the diameter of a network.
Many algorithms have been parallelized successfully on the Intel Xeon Phi coprocessor, especially those with regular, balanced, and predictable data access patterns and instruction flows. Irregular and unbalanced algorithms are harder to parallelize efficiently. They are, for instance, present in artificial intelligence search algorithms such as Monte Carlo Tree Search (MCTS). In this paper we study the scaling behavior of MCTS, on a highly optimized real-world application, on real hardware. The Intel Xeon Phi allows shared memory scaling studies up to 61 cores and 244 hardware threads. We compare work-stealing (Cilk Plus and TBB) and work-sharing (FIFO scheduling) approaches. Interestingly, we find that a straightforward thread pool with a work-sharing FIFO queue shows the best performance. A crucial element for this high performance is the controlling of the grain size, an approach that we call Grain Size Controlled Parallel MCTS. Our subsequent comparing with the Xeon CPUs shows an even more comprehensible distinction in performance between different threading libraries. We achieve, to the best of our knowledge, the fastest implementation of a parallel MCTS on the 61 core Intel Xeon Phi using a real application (47 relative to a sequential run).
Grid computing has enabled pooling a very large number of heterogeneous resource administered by different security domains. Applications are dynamically deployed on the resources available at the time. Dynamic nature of the resources and applications requirements makes needs the grid middleware to support the ability of migrating a running application to a different resource. Especially, Grid applications are typically long running and thus stoping them and starting them from scratch is not a feasible option. This paper presents an overview of migration support in a java based grid middleware called DGET. Migration support in DGET includes multi-threaded migration and asynchronous migration as well.
Coordinated checkpointing is an effective fault tolerant technique in distributed system as it avoids the domino effect and require minimum storage requirement. Most of the earlier coordinated checkpoint algorithms block their computation during checkpointing and forces minimum-process or non-blocking but forces all nodes to takes checkpoint even though many of them may not be necessary or non-blocking minimum-process but takes useless checkpoints or reduced useless checkpoint but has higher synchronization message overhead or has high checkpoint request propagation time. Hence in mobile distributed systems there is a great need of minimizing the number of communication message and checkpointing overhead as it raise new issues such as mobility, low bandwidth of wireless channels, frequently disconnections, limited battery power and lack of reliable stable storage on mobile nodes. In this paper, we propose a minimum-process coordinated checkpointing algorithm for mobile distributed system where no useless checkpoints are taken, no blocking of processes takes place and enforces a minimum-number of processes to take checkpoints. Our algorithm imposes low memory and computation overheads on MH s and low communication overheads on wireless channels. It avoids awakening of an MH if it is not required to take its checkpoint and has reduced latency time as each process involved in a global checkpoint can forward its own decision directly to the checkpoint initiator.
Spark has been established as an attractive platform for big data analysis, since it manages to hide most of the complexities related to parallelism, fault tolerance and cluster setting from developers. However, this comes at the expense of having over 150 configurable parameters, the impact of which cannot be exhaustively examined due to the exponential amount of their combinations. The default values allow developers to quickly deploy their applications but leave the question as to whether performance can be improved open. In this work, we investigate the impact of the most important of the tunable Spark parameters on the application performance and guide developers on how to proceed to changes to the default values. We conduct a series of experiments with known benchmarks on the MareNostrum petascale supercomputer to test the performance sensitivity. More importantly, we offer a trial-and-error methodology for tuning parameters in arbitrary applications based on evidence from a very small number of experimental runs. We test our methodology in three case studies, where we manage to achieve speedups of more than 10 times.
Current reconfiguration techniques are based on starting the system in a consistent configuration, in which all participating entities are in their initial state. Starting from that state, the system must preserve consistency as long as a predefined churn rate of processors joins and leaves is not violated, and unbounded storage is available. Many working systems cannot control this churn rate and do not have access to unbounded storage. System designers that neglect the outcome of violating the above assumptions may doom the system to exhibit illegal behaviors. We present the first automatically recovering reconfiguration scheme that recovers from transient faults, such as temporal violations of the above assumptions. Our self-stabilizing solutions regain safety automatically by assuming temporal access to reliable failure detectors. Once safety is re-established, the failure detector reliability is no longer needed. Still, liveness is conditioned by the failure detector s unreliable signals. We show that our self-stabilizing reconfiguration techniques can serve as the basis for the implementation of several dynamic services over message passing systems. Examples include self-stabilizing reconfigurable virtual synchrony, which, in turn, can be used for implementing a self-stabilizing reconfigurable state-machine replication and self-stabilizing reconfigurable emulation of shared memory.
Massive data centers housing thousands of computing nodes have become commonplace in enterprise computing, and the power consumption of such data centers is growing at an unprecedented rate. Adding to the problem is the inability of the servers to exhibit energy proportionality, i.e., provide energy-efficient execution under all levels of utilization, which diminishes the overall energy efficiency of the data center. It is imperative that we realize effective strategies to control the power consumption of the server and improve the energy efficiency of data centers. With the advent of Intel Sandy Bridge processors, we have the ability to specify a limit on power consumption during runtime, which creates opportunities to design new power-management techniques for enterprise workloads and make the systems that they run on more energy-proportional. In this paper, we investigate whether it is possible to achieve energy proportionality for enterprise-class server workloads, namely SPECpower_ssj2008 and SPECweb2009 benchmarks, by using Intel s Running Average Power Limit (RAPL) interfaces. First, we analyze the average power consumption of the full system as well as the subsystems and describe the energy proportionality of these components. We then characterize the instantaneous power profile of these benchmarks within different subsystems using the on-chip energy meters exposed via the RAPL interfaces. Finally, we present the effects of power limiting on the energy proportionality, performance, power and energy efficiency of enterprise-class server workloads. Our observations and results shed light on the efficacy of the RAPL interfaces and provide guidance for designing power-management techniques for enterprise-class workloads.
Electing leader is a vital issue not only in distributed computing but also in communication network [1, 2, 3, 4, 5], centralized mutual exclusion algorithm [6, 7], centralized control IPC, etc. A leader is required to make synchronization between different processes. And different election algorithms are used to elect a coordinator among the available processes in the system such a way that there will be only one coordinator at any time. Bully election algorithm is one of the classical and well-known approaches in coordinator election process. This paper will present a modified version of bully election algorithm using a new concept called election commission. This approach will not only reduce redundant elections but also minimize total number of elections and hence it will minimize message passing, network traffic, and complexity of the existing system.
Large-scale storage cluster systems need to manage a vast amount of information denoting combinations of data identifiers (IDs) and corresponding nodes that store the data. Management using data distribution algorithms, rather than management using tables, has been proposed in recent research. In algorithm management, data are distributed in accordance with a data distribution algorithm that is capable of determining, on the basis of the datum ID, the node in which the required data is being stored. Among the requirements for a data distribution algorithm are short calculation times, low memory consumption, uniform data distribution in accordance with the capacity of each node and the ability to handle the addition or removal of nodes. This paper presents a data distribution algorithm called ASURA (Advanced Scalable and Uniform storage by Random number Algorithm), which satisfies these requirements. It offers roughly 0.6-{\\mu}s calculation time, kilobyte-order memory consumption, less than 1% maximum variability between nodes in data distribution, data distribution in accordance with the capacity of each node and optimal data movement to maintain data distribution in accordance with node capacity when nodes are added or removed. ASURA is contrasted in this paper qualitatively and quantitatively with representative data distribution algorithms: Consistent Hashing and Straw Buckets in CRUSH. The comparison results show that ASURA can achieve the same storage cluster capacity as Consistent Hashing with dozens fewer nodes by virtue of the uniformity of its distribution with the same level calculation time. They also show that the execution time of ASURA is shorter than that of Straw Buckets in CRUSH. The results reveal that ASURA is the best algorithm for large-scale storage cluster systems.
As new data and updates are constantly arriving, the results of data mining applications become stale and obsolete over time. Incremental processing is a promising approach to refreshing mining results. It utilizes previously saved states to avoid the expense of re-computation from scratch. In this paper, we propose i2MapReduce, a novel incremental processing extension to MapReduce, the most widely used framework for mining big data. Compared with the state-of-the-art work on Incoop, i2MapReduce (i) performs key-value pair level incremental processing rather than task level re-computation, (ii) supports not only one-step computation but also more sophisticated iterative computation, which is widely used in data mining applications, and (iii) incorporates a set of novel techniques to reduce I/O overhead for accessing preserved fine-grain computation states. We evaluate i2MapReduce using a one-step algorithm and three iterative algorithms with diverse computation characteristics. Experimental results on Amazon EC2 show significant performance improvements of i2MapReduce compared to both plain and iterative MapReduce performing re-computation.
We present preliminary results of an investigation into the suitability of virtualised hardware -- in particular clouds -- for running computational experiments. Our main concern was that the reported CPU time would not be reliable and reproducible. The results demonstrate that while this is true in cases where many virtual machines are running on the same physical hardware, there is no inherent variation introduced by using virtualised hardware compared to non-virtualised hardware.
A group of mutually trusting clients outsources a computation service to a remote server, which they do not fully trust and that may be subject to attacks. The clients do not communicate with each other and would like to verify the correctness of the remote computation and the consistency of the server s responses. This paper first presents the Commutative-Operation verification Protocol (COP) that ensures linearizability when the server is correct and preserves fork-linearizability in any other case. All clients that observe each other s operations are consistent, in the sense that their own operations and those operations of other clients that they see are linearizable. Second, this work extends COP through authenticated data structures to Authenticated COP, which allows consistency verification of outsourced services whose state is kept only remotely, by the server. This yields the first fork-linearizable consistency verification protocol for generic outsourced services that (1) relieves clients from storing the state, (2) supports wait-free client operations, and (3) handles sequences of arbitrary commutative operations.
An increasing number of high-performance distributed systems are written in garbage collected languages. This removes a large class of harmful bugs from these systems. However, it also introduces high tail-latency do to garbage collection pause times. We address this problem through a new technique of garbage collection avoidance which we call Blade. Blade is an API between the collector and application developer that allows developers to leverage existing failure recovery mechanisms in distributed systems to coordinate collection and bound the latency impact. We describe Blade and implement it for the Go programming language. We also investigate two different systems that utilize Blade, a HTTP load-balancer and the Raft consensus algorithm. For the load-balancer, we eliminate any latency introduced by the garbage collector, for Raft, we bound the latency impact to a single network round-trip, (48 {\\mu}s in our setup). In both cases, latency at the tail using Blade is up to three orders of magnitude better.
Despite the fact that size-based schedulers can give excellent results in terms of both average response times and fairness, data-intensive computing execution engines generally do not employ size-based schedulers, mainly because of the fact that job size is not known a priori. In this work, we perform a simulation-based analysis of the performance of size-based schedulers when they are employed with the workload of typical data-intensive schedules and with approximated size estimations. We show results that are very promising: even when size estimation is very imprecise, response times of size-based schedulers can be definitely smaller than those of simple scheduling techniques such as processor sharing or FIFO.
Cloud computing has recently evolved as a popular computing infrastructure for many applications. Scientific computing, which was mainly hosted in private clusters and grids, has started to migrate development and deployment to the public cloud environment. eScience as a service becomes an emerging and promising direction for science computing. We review recent efforts in developing and deploying scientific computing applications in the cloud. In particular, we introduce a taxonomy specifically designed for scientific computing in the cloud, and further review the taxonomy with four major kinds of science applications, including life sciences, physics sciences, social and humanities sciences, and climate and earth sciences. Our major finding is that, despite existing efforts in developing cloud-based eScience, eScience still has a long way to go to fully unlock the power of cloud computing paradigm. Therefore, we present the challenges and opportunities in the future development of cloud-based eScience services, and call for collaborations and innovations from both the scientific and computer system communities to address those challenges.
In this work we describe the PriSM framework for decentralized deployment of a federation of autonomous social networks (ASN). The individual ASNs are centrally managed by organizations according to their institutional needs, while cross-ASN interactions are facilitated subject to security and confidentiality requirements specified by administrators and users of the ASNs. Such decentralized deployment, possibly either on private or public clouds, provides control and ownership of information/flow to individual organizations. Lack of such complete control (if third party online social networking services were to be used) has so far been a great barrier in taking full advantage of the novel communication mechanisms at workplace that have however become commonplace for personal usage with the advent of Web 2.0 platforms and online social networks. PriSM provides a practical solution for organizations to harness the advantages of online social networking both in intra/inter-organizational settings without sacrificing autonomy, security and confidentiality needs.
In hadoop, the job scheduling is an independent module, users can design their own job scheduler based on their actual application requirements, thereby meet their specific business needs. Currently, hadoop has three schedulers: FIFO, computing capacity scheduling and fair scheduling policy, all of them are take task allocation strategy that considerate data locality simply. They neither support data locality well nor fully apply to all cases of jobs scheduling. In this paper, we took the concept of resources-prefetch into consideration, and proposed a job scheduling algorithm based on data locality. By estimate the remaining time to complete a task, compared with the time to transfer a resources block, to preselect candidate nodes for task allocation. Then we preselect a non-local map tasks from the unfinished job queue as resources-prefetch tasks. Getting information of resources blocks of preselected map task, select a nearest resources blocks from the candidate node and transferred to local through network. Thus we would ensure data locality good enough. Eventually, we design a experiment and proved resources-prefetch method can guarantee good job data locality and reduce the time to complete the job to a certain extent.
Mapping workflow applications onto parallel platforms is a challenging problem, even for simple application patterns such as pipeline graphs. Several antagonistic criteria should be optimized, such as throughput and latency (or a combination). Typical applications include digital image processing, where images are processed in steady-state mode. In this paper, we study the mapping of a particular image processing application, the JPEG encoding. Mapping pipelined JPEG encoding onto parallel platforms is useful for instance for encoding Motion JPEG images. As the bi-criteria mapping problem is NP-complete, we concentrate on the evaluation and performance of polynomial heuristics.
Cloud computing provides scientists a platform that can deploy computation and data intensive applications without infrastructure investment. With excessive cloud resources and a decision support system, large generated data sets can be flexibly 1 stored locally in the current cloud, 2 deleted and regenerated whenever reused or 3 transferred to cheaper cloud service for storage. However, due to the pay for use model, the total application cost largely depends on the usage of computation, storage and bandwidth resources, hence cutting the cost of cloud based data storage becomes a big concern for deploying scientific applications in the cloud. In this paper, we propose a novel strategy that can cost effectively store large generated data sets with multiple cloud service providers. The strategy is based on a novel algorithm that finds the trade off among computation, storage and bandwidth costs in the cloud, which are three key factors for the cost of data storage. Both general (random) simulations conducted with popular cloud service providers pricing models and three specific case studies on real world scientific applications show that the proposed storage strategy is highly cost effective and practical for run time utilization in the cloud.
Data availability is critical in distributed storage systems, especially when node failures are prevalent in real life. A key requirement is to minimize the amount of data transferred among nodes when recovering the lost or unavailable data of failed nodes. This paper explores recovery solutions based on regenerating codes, which are shown to provide fault-tolerant storage and minimum recovery bandwidth. Existing optimal regenerating codes are designed for single node failures. We build a system called CORE, which augments existing optimal regenerating codes to support a general number of failures including single and concurrent failures. We theoretically show that CORE achieves the minimum possible recovery bandwidth for most cases. We implement CORE and evaluate our prototype atop a Hadoop HDFS cluster testbed with up to 20 storage nodes. We demonstrate that our CORE prototype conforms to our theoretical findings and achieves recovery bandwidth saving when compared to the conventional recovery approach based on erasure codes.
The wide availability of powerful and inexpensive cloud computing services naturally motivates the study of distributed graph layout algorithms, able to scale to very large graphs. Nowadays, to process Big Data, companies are increasingly relying on PaaS infrastructures rather than buying and maintaining complex and expensive hardware. So far, only a few examples of basic force-directed algorithms that work in a distributed environment have been described. Instead, the design of a distributed multilevel force-directed algorithm is a much more challenging task, not yet addressed. We present the first multilevel force-directed algorithm based on a distributed vertex-centric paradigm, and its implementation on Giraph, a popular platform for distributed graph algorithms. Experiments show the effectiveness and the scalability of the approach. Using an inexpensive cloud computing service of Amazon, we draw graphs with ten million edges in about 60 minutes.
Applications such as web search and social networking have been moving from centralized to decentralized cloud architectures to improve their scalability. MapReduce, a programming framework for processing large amounts of data using thousands of machines in a single cloud, also needs to be scaled out to multiple clouds to adapt to this evolution. The challenge of building a multi-cloud distributed architecture is substantial. Notwithstanding, the ability to deal with the new types of faults introduced by such setting, such as the outage of a whole datacenter or an arbitrary fault caused by a malicious cloud insider, increases the endeavor considerably. In this paper we propose Medusa, a platform that allows MapReduce computations to scale out to multiple clouds and tolerate several types of faults. Our solution fulfills four objectives. First, it is transparent to the user, who writes her typical MapReduce application without modification. Second, it does not require any modification to the widely used Hadoop framework. Third, the proposed system goes well beyond the fault-tolerance offered by MapReduce to tolerate arbitrary faults, cloud outages, and even malicious faults caused by corrupt cloud insiders. Fourth, it achieves this increased level of fault tolerance at reasonable cost. We performed an extensive experimental evaluation in the ExoGENI testbed, demonstrating that our solution significantly reduces execution time when compared to traditional methods that achieve the same level of resilience.
One of the biggest huddles faced by researchers studying algorithms for massive graphs is the lack of large input graphs that are essential for the development and test of the graph algorithms. This paper proposes two efficient and highly scalable parallel graph generation algorithms that can produce massive realistic graphs to address this issue. The algorithms, designed to achieve high degree of parallelism by minimizing inter-processor communications, are two of the fastest graph generators which are capable of generating scale-free graphs with billions of vertices and edges. The synthetic graphs generated by the proposed methods possess the most common properties of real complex networks such as power-law degree distribution, small-worldness, and communities-within-communities. Scalability was tested on a large cluster at Lawrence Livermore National Laboratory. In the experiment, we were able to generate a graph with 1 billion vertices and 5 billion edges in less than 13 seconds. To the best of our knowledge, this is the largest synthetic scale-free graph reported in the literature.
This report discusses many-task computing (MTC) generically and in the context of the proposed Blue Waters systems, which is planned to be the largest NSF-funded supercomputer when it begins production use in 2012. The aim of this report is to inform the BW project about MTC, including understanding aspects of MTC applications that can be used to characterize the domain and understanding the implications of these aspects to middleware and policies. Many MTC applications do not neatly fit the stereotypes of high-performance computing (HPC) or high-throughput computing (HTC) applications. Like HTC applications, by definition MTC applications are structured as graphs of discrete tasks, with explicit input and output dependencies forming the graph edges. However, MTC applications have significant features that distinguish them from typical HTC applications. In particular, different engineering constraints for hardware and software must be met in order to support these applications. HTC applications have traditionally run on platforms such as grids and clusters, through either workflow systems or parallel programming systems. MTC applications, in contrast, will often demand a short time to solution, may be communication intensive or data intensive, and may comprise very short tasks. Therefore, hardware and software for MTC must be engineered to support the additional communication and I/O and must minimize task dispatch overheads. The hardware of large-scale HPC systems, with its high degree of parallelism and support for intensive communication, is well suited for MTC applications. However, HPC systems often lack a dynamic resource-provisioning feature, are not ideal for task communication via the file system, and have an I/O system that is not optimized for MTC-style applications. Hence, additional software support is likely to be required to gain full benefit from the HPC hardware.
A fundamental problem in distributed computing is the distribution of requests to a set of uniform servers without a centralized controller. Classically, such problems are modeled as static balls into bins processes, where $m$ balls (tasks) are to be distributed to $n$ bins (servers). In a seminal work, Azar et al. proposed the sequential strategy \\greedy{d} for $n=m$. When thrown, a ball queries the load of $d$ random bins and is allocated to a least loaded of these. Azar et al. showed that $d=2$ yields an exponential improvement compared to $d=1$. Berenbrink et al. extended this to $m\\gg n$, showing that the maximal load difference is independent of $m$ for $d=2$ (in contrast to $d=1$). We propose a new variant of an \\emph{infinite} balls into bins process. Each round an expected number of $\\lambda n$ new balls arrive and are distributed (in parallel) to the bins. Each non-empty bin deletes one of its balls. This setting models a set of servers processing incoming requests, where clients can query a server s current load but receive no information about parallel requests. We study the \\greedy{d} distribution scheme in this setting and show a strong self-stabilizing property: For \\emph{any} arrival rate $\\lambda=\\lambda(n)<1$, the system load is time-invariant. Moreover, for \\emph{any} (even super-exponential) round $t$, the maximum system load is (w.h.p.) $O(\\frac{1}{1-\\lambda}\\cdot\\log\\frac{n}{1-\\lambda})$ for $d=1$ and $O(\\log\\frac{n}{1-\\lambda})$ for $d=2$. In particular, \\greedy{2} has an exponentially smaller system load for high arrival rates.
The verification and validation of cyber-physical systems is known to be a difficult problem due to the different modeling abstractions used for control components and for software components. A recent trend to address this difficulty is to reduce the need for verification by adopting correct-by-design methodologies. According to the correct-by-design paradigm, one seeks to automatically synthesize a controller that can be refined into code and that enforces temporal specifications on the cyber-physical system. In this paper we consider an instance of this problem where the specifications are given by a fragment of Linear Temporal Logic (LTL) and the physical environment is described by a smooth differential equation. The contribution of this paper is to show that synthesis for cyber-physical systems is viable by considering a fragment of LTL that is expressive enough to describe interesting properties but simple enough to avoid Safra s construction. We report on two examples illustrating a preliminary implementation of these techniques on the tool PESSOALTL.
There are logics where necessity is defined by means of a given identity connective: $\\square\\varphi := \\varphi\\equiv\\top$ ($\\top$ is a tautology). On the other hand, in many standard modal logics the concept of propositional identity (PI) $\\varphi\\equiv\\psi$ can be defined by strict equivalence (SE) $\\square(\\varphi\\leftrightarrow\\psi)$. All these approaches to modality involve a principle that we call the Collapse Axiom (CA): \"There is only one necessary proposition.\" In this paper, we consider a notion of PI which relies on the identity axioms of Suszko s non-Fregean logic $\\mathit{SCI}$. Then $S3$ proves to be the smallest Lewis modal system where PI can be defined as SE. We extend $S3$ to a non-Fregean logic with propositional quantifiers such that necessity and PI are integrated as non-interdefinable concepts. CA is not valid and PI refines SE. Models are expansions of $\\mathit{SCI}$-models. We show that $\\mathit{SCI}$-models are Boolean prealgebras, and vice-versa. This associates Non-Fregean Logic with research on Hyperintensional Semantics. PI equals SE iff models are Boolean algebras and CA holds. A representation result establishes a connection to Fine s approach to propositional quantifiers and shows that our theories are \\textit{conservative} extensions of $S3$--$S5$, respectively. If we exclude the Barcan formula and a related axiom, then the resulting systems are still complete w.r.t. a simpler denotational semantics.
This paper is a sequel to arXiv:0902.2355 and continues the study of quantum logic via dagger kernel categories. It develops the relation between these categories and both orthomodular lattices and Foulis semigroups. The relation between the latter two notions has been uncovered in the 1960s. The current categorical perspective gives a broader context and reconstructs this relationship between orthomodular lattices and Foulis semigroups as special instance.
We introduce a reduction order called the weighted path order (WPO) that subsumes many existing reduction orders. WPO compares weights of terms as in the Knuth-Bendix order (KBO), while WPO allows weights to be computed by a wide class of interpretations. We investigate summations, polynomials and maximums for such interpretations. We show that KBO is a restricted case of WPO induced by summations, the polynomial order (POLO) is subsumed by WPO induced by polynomials, and the lexicographic path order (LPO) is a restricted case of WPO induced by maximums. By combining these interpretations, we obtain an instance of WPO that unifies KBO, LPO and POLO. In order to fit WPO in the modern dependency pair framework, we further provide a reduction pair based on WPO and partial statuses. As a reduction pair, WPO also subsumes matrix interpretations. We finally present SMT encodings of our techniques, and demonstrate the significance of our work through experiments.
A logic for specification and verification is derived from the axioms of Zermelo-Fraenkel set theory. The proofs are performed using the proof assistant Isabelle. Isabelle is generic, supporting several different logics. Isabelle has the flexibility to adapt to variants of set theory. Its higher-order syntax supports the definition of new binding operators. Unknowns in subgoals can be instantiated incrementally. The paper describes the derivation of rules for descriptions, relations and functions, and discusses interactive proofs of Cantor s Theorem, the Composition of Homomorphisms challenge [9], and Ramsey s Theorem [5]. A generic proof assistant can stand up against provers dedicated to particular logics.
As software systems become more complex, there is an increasing need for new static analyses. Thanks to the declarative style, logic programming is an attractive formalism for specifying them. However, prior work on using logic programming for static analysis focused on analyses defined over some powerset domain, which is quite limiting. In this paper we present a logic that lifts this restriction, called Lattice based Least Fixed Point Logic (LLFP), that allows interpretations over any complete lattice satisfying Ascending Chain Condition. The main theoretical contribution is a Moore Family result that guarantees that there always is a unique least solution for a given problem. Another contribution is the development of solving algorithm that computes the least model of LLFP formulae guaranteed by the Moore Family result.
When teaching an elementary logic course to students who have a general scientific background but have never been exposed to logic, we have to face the problem that the notions of deduction rule and of derivation are completely new to them, and are related to nothing they already know, unlike, for instance, the notion of model, that can be seen as a generalization of the notion of algebraic structure. In this note, we defend the idea that one strategy to introduce these notions is to start with the notion of inductive definition [1]. Then, the notion of derivation comes naturally. We also defend the idea that derivations are pervasive in logic and that defining precisely this notion at an early stage is a good investment to later define other notions in proof theory, computability theory, automata theory, ... Finally, we defend the idea that to define the notion of derivation precisely, we need to distinguish two notions of derivation: labeled with elements and labeled with rule names. This approach has been taken in [2].
We consider a temporal logic EF+F^-1 for unranked, unordered finite trees. The logic has two operators: EF\\phi, which says \"in some proper descendant \\phi holds\", and F^-1\\phi, which says \"in some proper ancestor \\phi holds\". We present an algorithm for deciding if a regular language of unranked finite trees can be expressed in EF+F^-1. The algorithm uses a characterization expressed in terms of forest algebras.
Two formal stochastic models are said to be bisimilar if their solutions as a stochastic process are probabilistically equivalent. Bisimilarity between two stochastic model formalisms means that the strengths of one stochastic model formalism can be used by the other stochastic model formalism. The aim of this paper is to explain bisimilarity relations between stochastic hybrid automata, stochastic differential equations on hybrid space and stochastic hybrid Petri nets. These bisimilarity relations make it possible to combine the formal verification power of automata with the analysis power of stochastic differential equations and the compositional specification power of Petri nets. The relations and their combined strengths are illustrated for an air traffic example.
This volume contains the proceedings of the First International Workshop on Rewriting Techniques for Real-Time Systems (RTRTS 2010), held in Longyearbyen, Spitsbergen, on April 6-9, 2010. The aim of the workshop is to bring together researchers with an interest in the use of rewriting-based techniques (including rewriting logic) and tools for the modeling, analysis, and/or implementation of real-time and hybrid systems, and to give them the opportunity to present their recent works, discuss future research directions, and exchange ideas. The topics of the workshop comprise, but are not limited to: methods and tools supporting rewriting-based modeling and analysis of real-time and hybrid systems, and extensions of such systems; use of rewriting techniques to provide rigorous support for model-based software engineering of timed systems; applications and case studies; and comparison with other formalisms and tools.
We present Classical BI (CBI), a new addition to the family of bunched logics which originates in O Hearn and Pym s logic of bunched implications BI. CBI differs from existing bunched logics in that its multiplicative connectives behave classically rather than intuitionistically (including in particular a multiplicative version of classical negation). At the semantic level, CBI-formulas have the normal bunched logic reading as declarative statements about resources, but its resource models necessarily feature more structure than those for other bunched logics; principally, they satisfy the requirement that every resource has a unique dual. At the proof-theoretic level, a very natural formalism for CBI is provided by a display calculus \\`a la Belnap, which can be seen as a generalisation of the bunched sequent calculus for BI. In this paper we formulate the aforementioned model theory and proof theory for CBI, and prove some fundamental results about the logic, most notably completeness of the proof theory with respect to the semantics.
Term unification plays an important role in many areas of computer science, especially in those related to logic. The universal mechanism of grammar-based compression for terms, in particular the so-called Singleton Tree Grammars (STG), have recently drawn considerable attention. Using STGs, terms of exponential size and height can be represented in linear space. Furthermore, the term representation by directed acyclic graphs (dags) can be efficiently simulated. The present paper is the result of an investigation on term unification and matching when the terms given as input are represented using different compression mechanisms for terms such as dags and Singleton Tree Grammars. We describe a polynomial time algorithm for context matching with dags, when the number of different context variables is fixed for the problem. For the same problem, NP-completeness is obtained when the terms are represented using the more general formalism of Singleton Tree Grammars. For first-order unification and matching polynomial time algorithms are presented, each of them improving previous results for those problems.
In this paper sequent calculi for the classical fragment (that is, the conjunction-disjunction-implication-negation fragment) of the nonsense logics B3, introduced by Bochvar, and H3, introduced by Halld\\ en, are presented. These calculi are obtained by restricting in an appropriate way the application of the rules of a sequent calculus for classical propositional logic CPL. The nice symmetry between the provisos in the rules reveal the semantical relationship between these logics. The Soundness and Completeness theorems for both calculi are obtained, as well as the respective Cut elimination theorems.
In the standard testing theory of DeNicola-Hennessy one process is considered to be a refinement of another if every test guaranteed by the former is also guaranteed by the latter. In the domain of web services this has been recast, with processes viewed as servers and tests as clients. In this way the standard refinement preorder between servers is determined by their ability to satisfy clients. But in this setting there is also a natural refinement preorder between clients, determined by their ability to be satisfied by servers. In more general settings where there is no distinction between clients and servers, but all processes are peers, there is a further refinement preorder based on the mutual satisfaction of peers. We give a uniform account of these three preorders. In particular we give two characterisations. The first is behavioural, in terms of traces and ready sets. The second, for finite processes, is equational.
We study the almost-sure reachability problem in a distributed system obtained as the asynchronous composition of N copies (called processes) of the same automaton (called protocol), that can communicate via a shared register with finite domain. The automaton has two types of transitions: write-transitions update the value of the register, while read-transitions move to a new state depending on the content of the register. Non-determinism is resolved by a stochastic scheduler. Given a protocol, we focus on almost-sure reachability of a target state by one of the processes. The answer to this problem naturally depends on the number N of processes. However, we prove that our setting has a cut-off property: the answer to the almost-sure reachability problem is constant when N is large enough; we then develop an EXPSPACE algorithm deciding whether this constant answer is positive or negative.
A number of flexible tactic-based logical frameworks are nowadays available that can implement a wide range of mathematical theories using a common higher-order metalanguage. Used as proof assistants, one of the advantages of such powerful systems resides in their responsiveness to extensibility of their reasoning capabilities, being designed over rule-based programming languages that allow the user to build her own `programs to construct proofs  - the so-called proof tactics. The present contribution discusses the implementation of an algorithm that generates sound and complete tableau systems for a very inclusive class of sufficiently expressive finite-valued propositional logics, and then illustrates some of the challenges and difficulties related to the algorithmic formation of automated theorem proving tactics for such logics. The procedure on whose implementation we will report is based on a generalized notion of analyticity of proof systems that is intended to guarantee termination of the corresponding automated tactics on what concerns theoremhood in our targeted logics.
For many application-level distributed protocols and parallel algorithms, the set of participants, the number of messages or the interaction structure are only known at run-time. This paper proposes a dependent type theory for multiparty sessions which can statically guarantee type-safe, deadlock-free multiparty interactions among processes whose specifications are parameterised by indices. We use the primitive recursion operator from G\\\"odel s System T to express a wide range of communication patterns while keeping type checking decidable. To type individual distributed processes, a parameterised global type is projected onto a generic generator which represents a class of all possible end-point types. We prove the termination of the type-checking algorithm in the full system with both multiparty session types and recursive types. We illustrate our type theory through non-trivial programming and verification examples taken from parallel algorithms and Web services usecases.
We present the topos S of trees as a model of guarded recursion. We study the internal dependently-typed higher-order logic of S and show that S models two modal operators, on predicates and types, which serve as guards in recursive definitions of terms, predicates, and types. In particular, we show how to solve recursive type equations involving dependent types. We propose that the internal logic of S provides the right setting for the synthetic construction of abstract versions of step-indexed models of programming languages and program logics. As an example, we show how to construct a model of a programming language with higher-order store and recursive types entirely inside the internal logic of S. Moreover, we give an axiomatic categorical treatment of models of synthetic guarded domain theory and prove that, for any complete Heyting algebra A with a well-founded basis, the topos of sheaves over A forms a model of synthetic guarded domain theory, generalizing the results for S.
We introduce a logical foundation to reason on tree structures with constraints on the number of node occurrences. Related formalisms are limited to express occurrence constraints on particular tree regions, as for instance the children of a given node. By contrast, the logic introduced in the present work can concisely express numerical bounds on any region, descendants or ancestors for instance. We prove that the logic is decidable in single exponential time even if the numerical constraints are in binary form. We also illustrate the usage of the logic in the description of numerical constraints on multi-directional path queries on XML documents. Furthermore, numerical restrictions on regular languages (XML schemas) can also be concisely described by the logic. This implies a characterization of decidable counting extensions of XPath queries and XML schemas. Moreover, as the logic is closed under negation, it can thus be used as an optimal reasoning framework for testing emptiness, containment and equivalence.
Proving failure of queries for definite logic programs can be done by constructing a finite model of the program in which the query is false. A general purpose model generator for first order logic can be used for this. A recent paper presented at PLILP98 shows how the peculiarities of definite programs can be exploited to obtain a better solution. There a procedure is described which combines abduction with tabulation and uses a meta-interpreter for heuristic control of the search. The current paper shows how similar results can be obtained by direct execution under the standard tabulation of the XSB-Prolog system. The loss of control is compensated for by better intelligent backtracking and more accurate failure analysis.
Several types of term rewriting systems can be distinguished by the way their rules overlap. In particular, we define the classes of prefix, suffix, bottom-up and top-down systems, which generalize similar classes on words. Our aim is to study the derivation relation of such systems (i.e. the reflexive and transitive closure of their rewriting relation) and, if possible, to provide a finite mechanism characterizing it. Using a notion of rational relations based on finite graph grammars, we show that the derivation of any bottom-up, top-down or suffix systems is rational, while it can be non recursive for prefix systems.
We present a new approach to enhancing Answer Set Programming (ASP) with Constraint Processing techniques which allows for solving interesting Constraint Satisfaction Problems in ASP. We show how constraints on finite domains can be decomposed into logic programs such that unit-propagation achieves arc, bound or range consistency. Experiments with our encodings demonstrate their computational impact.
We present a game semantics for Linear Logic, in which formulas denote games and proofs denote winning strategies. We show that our semantics yields a categorical model of Linear Logic and prove full completeness for Multiplicative Linear Logic with the MIX rule: every winning strategy is the denotation of a unique cut-free proof net. A key role is played by the notion of {\\em history-free} strategy; strong connections are made between history-free strategies and the Geometry of Interaction. Our semantics incorporates a natural notion of polarity, leading to a refined treatment of the additives. We make comparisons with related work by Joyal, Blass et al.
We investigate the problem whether two ALC knowledge bases are indistinguishable by queries over a given vocabulary. We give model-theoretic criteria in terms of (partial) homomorphisms and products and prove that this problem is undecidable for conjunctive queries (CQs) but 2EXPTIME-complete for UCQs (unions of CQs). The same results hold if CQs are replaced by rooted CQs. We also consider the problem whether two ALC TBoxes give the same answers to any query in a given vocabulary over all ABoxes, and show that for CQs this problem is undecidable, too, but becomes decidable and 2EXPTIME-complete in Horn-ALC, and even EXPTIME-complete in Horn-ALC when restricted to (unions of) rooted CQs.
Many behavioural equivalences or preorders for probabilistic processes involve a lifting operation that turns a relation on states into a relation on distributions of states. We show that several existing proposals for lifting relations can be reconciled to be different presentations of essentially the same lifting operation. More interestingly, this lifting operation nicely corresponds to the Kantorovich metric, a fundamental concept used in mathematics to lift a metric on states to a metric on distributions of states, besides the fact the lifting operation is related to the maximum flow problem in optimisation theory. The lifting operation yields a neat notion of probabilistic bisimulation, for which we provide logical, metric, and algorithmic characterisations. Specifically, we extend the Hennessy-Milner logic and the modal mu-calculus with a new modality, resulting in an adequate and an expressive logic for probabilistic bisimilarity, respectively. The correspondence of the lifting operation and the Kantorovich metric leads to a natural characterisation of bisimulations as pseudometrics which are post-fixed points of a monotone function. We also present an \"on the fly\" algorithm to check if two states in a finitary system are related by probabilistic bisimilarity, exploiting the close relationship between the lifting operation and the maximum flow problem.
An intensional model for the programming language PCF is described, in which the types of PCF are interpreted by games, and the terms by certain \"history-free\" strategies. This model is shown to capture definability in PCF. More precisely, every compact strategy in the model is definable in a certain simple extension of PCF. We then introduce an intrinsic preorder on strategies, and show that it satisfies some striking properties, such that the intrinsic preorder on function types coincides with the pointwise preorder. We then obtain an order-extensional fully abstract model of PCF by quotienting the intensional model by the intrinsic preorder. This is the first syntax-independent description of the fully abstract model for PCF. (Hyland and Ong have obtained very similar results by a somewhat different route, independently and at the same time). We then consider the effective version of our model, and prove a Universality Theorem: every element of the effective extensional model is definable in PCF. Equivalently, every recursive strategy is definable up to observational equivalence.
We present an illative system I_s of classical higher-order logic with subtyping and basic inductive types. The system I_s allows for direct definitions of partial and general recursive functions, and provides means for handling functions whose termination has not been proven. We give examples of how properties of some recursive functions may be established in our system. In a technical appendix to the paper we prove consistency of I_s. The proof is by model construction. We then use this construction to show conservativity of I_s over classical first-order logic. Conservativity over higher-order logic is conjectured, but not proven.
This paper shows that a classic metalogical framework, including all Boolean operators, can be used to support the development of a metric behavioural theory for Markov processes. Previously, only intuitionistic frameworks or frameworks without negation and logical implication have been developed to fulfill this task. The focus of this paper is on continuous Markovian logic (CML), a logic that characterizes stochastic bisimulation of Markov processes with an arbitrary measurable state space and continuous-time transitions. For a parameter epsilon>0 interpreted as observational error, we introduce an epsilon-parameterized metatheory for CML: we define the concepts of epsilon-satisfiability and epsilon-provability related by a sound and complete axiomatization and prove a series of \"parameterized\" metatheorems including decidability, weak completeness and finite model property. We also prove results regarding the relations between metalogical concepts defined for different parameters. Using this framework, we can characterize both the stochastic bisimulation relation and various observational preorders based on behavioural pseudometrics. The main contribution of this paper is proving that all these analyses can actually be done using a unified complete Boolean framework. This extends the state of the art in this field, since the related works only propose intuitionistic contexts that limit, for instance, the use of the Boolean logical implication.
We consider the incremental computation of minimal unsatisfiable cores (MUCs) of QBFs. To this end, we equipped our incremental QBF solver DepQBF with a novel API to allow for incremental solving based on clause groups. A clause group is a set of clauses which is incrementally added to or removed from a previously solved QBF. Our implementation of the novel API is related to incremental SAT solving based on selector variables and assumptions. However, the API entirely hides selector variables and assumptions from the user, which facilitates the integration of DepQBF in other tools. We present implementation details and, for the first time, report on experiments related to the computation of MUCs of QBFs using DepQBF s novel clause group API.
We prove several decidability and undecidability results for the satisfiability and validity problems for languages that can express solutions to word equations with length constraints. The atomic formulas over this language are equality over string terms (word equations), linear inequality over the length function (length constraints), and membership in regular sets. These questions are important in logic, program analysis, and formal verification. Variants of these questions have been studied for many decades by mathematicians. More recently, practical satisfiability procedures (aka SMT solvers) for these formulas have become increasingly important in the context of security analysis for string-manipulating programs such as web applications. We prove three main theorems. First, we give a new proof of undecidability for the validity problem for the set of sentences written as a forall-exists quantifier alternation applied to positive word equations. A corollary of this undecidability result is that this set is undecidable even with sentences with at most two occurrences of a string variable. Second, we consider Boolean combinations of quantifier-free formulas constructed out of word equations and length constraints. We show that if word equations can be converted to a solved form, a form relevant in practice, then the satisfiability problem for Boolean combinations of word equations and length constraints is decidable. Third, we show that the satisfiability problem for quantifier-free formulas over word equations in regular solved form, length constraints, and the membership predicate over regular expressions is also decidable.
We develop a general criterion for cut elimination in sequent calculi for propositional modal logics, which rests on absorption of cut, contraction, weakening and inversion by the purely modal part of the rule system. Our criterion applies also to a wide variety of logics outside the realm of normal modal logic. We give extensive example instantiations of our framework to various conditional logics. For these, we obtain fully internalised calculi which are substantially simpler than those known in the literature, along with leaner proofs of cut elimination and complexity. In one case, conditional logic with modus ponens and conditional excluded middle, cut elimination and complexity were explicitly stated as open in the literature.
Finite valued constraint satisfaction problems are a formalism for describing many natural optimization problems, where constraints on the values that variables can take come with rational weights and the aim is to find an assignment of minimal cost. Thapper and Zivny have recently established a complexity dichotomy for finite valued constraint languages. They show that each such language either gives rise to a polynomial-time solvable optimization problem, or to an NP-hard one, and establish a criterion to distinguish the two cases. We refine the dichotomy by showing that all optimization problems in the first class are definable in fixed-point language with counting, while all languages in the second class are not definable, even in infinitary logic with counting. Our definability dichotomy is not conditional on any complexity-theoretic assumption.
Probabilistic applicative bisimulation is a recently introduced coinductive methodology for program equivalence in a probabilistic, higher-order, setting. In this paper, the technique is applied to a typed, call-by-value, lambda-calculus. Surprisingly, the obtained relation coincides with context equivalence, contrary to what happens when call-by-name evaluation is considered. Even more surprisingly, full-abstraction only holds in a symmetric setting.
The paper presents an extension of temporal epistemic logic with operators that quantify over strategies. The language also provides a natural way to represent what agents would know were they to be aware of the strategies being used by other agents. Some examples are presented to motivate the framework, and relationships to several variants of alternating temporal epistemic logic are discussed. The computational complexity of model checking the logic is also characterized.
Hammers are tools that provide general purpose automation for formal proof assistants. Despite the gaining popularity of the more advanced versions of type theory, there are no hammers for such systems. We present an extension of the various hammer components to type theory: (i) a translation of a significant part of the Coq logic into the format of automated proof systems; (ii) a proof reconstruction mechanism based on a Ben-Yelles-type algorithm combined with limited rewriting, congruence closure and a first-order generalization of the left rules of Dyckhoff s system LJT.
We provide a formula for the lower bound in the form of $|F| \\ge K$, in such a way that the decision version of unweighted non-bipartite matching can be solved in polynomial time. ~The parameter $K$ can vary from instance to instance. We assume that the domains, the set of vertices and the set of edges, are ordered. To our knowledge, no polynomially solvable satisfiability expression has been developed for this problem so far, or for that matter, for any decision problem derived from optimization. Hence for such problems, this opens up a new approach to solving them.
We study fragments of dependence logic defined either by restricting the number k of universal quantifiers or the width of dependence atoms in formulas. We find the sublogics of existential second-order logic corresponding to these fragments of dependence logic. We also show that these both ways of defining fragments of dependence logic give rise to a hierarchy in expressive power with respect to k.
This article is concerned with the application of the program extraction technique to a new class of problems: the synthesis of decision procedures for the classical satisfiability problem that are correct by construction. To this end, we formalize a completeness proof for the DPLL proof system and extract a SAT solver from it. When applied to a propositional formula in conjunctive normal form the program produces either a satisfying assignment or a DPLL derivation showing its unsatisfiability. We use non-computational quantifiers to remove redundant computational content from the extracted program and translate it into Haskell to improve performance. We also prove the equivalence between the resolution proof system and the DPLL proof system with a bound on the size of the resulting resolution proof. This demonstrates that it is possible to capture quantitative information about the extracted program on the proof level. The formalization is carried out in the interactive proof assistant Minlog.
These lecture notes concern the basics of the theory of process behaviour. First the concept of a (labelled) transition system receives ample treatment and then the following issues concerning process behaviour are elaborated in the setting of transition systems: (i) concurrency and interaction, (ii) abstraction, (iii) sequential composition, alternative composition, and iteration, (iv) expressions that represent process behaviours, and (v) structural operational semantics and equational laws for such expressions. To quicken an intuitive understanding, direct connections with programs and automata are established wherever appropriate. For the interested reader, direct connections with Petri nets are also established. In each chapter, except the last one, it shows that what has been dealt with so far still has certain limitations. Each time, the next chapter is devoted to reducing the limitations concerned.
Service composition has become commonplace nowadays, in large part due to the increased complexity of software and supporting networks. Composition can be of many types, for instance sequential, prioritising, non-deterministic. However, a fundamental feature of the services to be composed consists in their dependencies with respect to each other. In this paper we propose a theory of service dependency, modelled around a dependency operator in the Action Systems formalism. We analyze its properties, composition behaviour, and refinement conditions with accompanying examples.
The classic approaches to synthesize a reactive system from a linear temporal logic (LTL) specification first translate the given LTL formula to an equivalent omega-automaton and then compute a winning strategy for the corresponding omega-regular game. To this end, the obtained omega-automata have to be (pseudo)-determinized where typically a variant of Safra s determinization procedure is used. In this paper, we show that this determinization step can be significantly improved for tool implementations by replacing Safra s determinization by simpler determinization procedures. In particular, we exploit (1) the temporal logic hierarchy that corresponds to the well-known automata hierarchy consisting of safety, liveness, Buechi, and co-Buechi automata as well as their boolean closures, (2) the non-confluence property of omega-automata that result from certain translations of LTL formulas, and (3) symbolic implementations of determinization procedures for the Rabin-Scott and the Miyano-Hayashi breakpoint construction. In particular, we present convincing experimental results that demonstrate the practical applicability of our new synthesis procedure.
Nested Petri nets have been applied for modeling interaction protocols, mobility, adaptive systems and interorganizational workflows. However, few results have been reported on the use of automated tools for analyzing the behavior of these nets. In this paper we present a general translation from nested Petri nets into PROMELA and explain how some properties of these nets can be studied using SPIN model checker. Besides, we discuss how to deal with the main limitations that may influence SPIN performance when verifying practical examples.
We combine constrained literals for model representation with key concepts from first-order superposition and propositional conflict-driven clause learning (CDCL) to create the new calculus Non-Redundant Clause Learning (NRCL) deciding the Bernays-Sch\\\"onfinkel fragment. Our calculus uses first-order literals constrained by disequations between tuples of terms for compact model representation. From superposition, NRCL inherits the abstract redundancy criterion and the monotone model operator. CDCL adds the dynamic, conflict-driven search for an atom ordering inducing a model. As a result, in NRCL a false clause can be found effectively modulo the current model candidate. It guides the derivation of a first-order ordered resolvent that is never redundant. Similar to 1UIP-learning in CDCL, the learned resolvent induces backtracking and, by blocking the previous conflict state via propagation, it enforces progress towards finding a model or a refutation. The non-redundancy result also implies that only finitely many clauses can be generated by NRCL on the Bernays-Sch\\\"onfinkel fragment, which serves as an argument for termination.
The increased interest in reactive synthesis over the last decade has led to many improved solutions but also to many new questions. In this paper, we discuss the question of how to deal with assumptions on environment behavior. We present four goals that we think should be met and review several different possibilities that have been proposed. We argue that each of them falls short in at least one aspect.
Interaction nets are a graphical formalism inspired by Linear Logic proof-nets often used for studying higher order rewriting e.g. \\Beta-reduction. Traditional presentations of interaction nets are based on graph theory and rely on elementary properties of graph theory. We give here a more explicit presentation based on notions borrowed from Girard s Geometry of Interaction: interaction nets are presented as partial permutations and a composition of nets, the gluing, is derived from the execution formula. We then define contexts and reduction as the context closure of rules. We prove strong confluence of the reduction within our framework and show how interaction nets can be viewed as the quotient of some generalized proof-nets.
This paper gives a thorough overview of what is known about first-order logic with counting quantifiers and with arithmetic predicates. As a main theorem we show that Presburger arithmetic is closed under unary counting quantifiers. Precisely, this means that for every first-order formula phi(y,z_1,...,z_k) over the signature {<,+} there is a first-order formula psi(x,z_1,...,z_k) which expresses over the structure <Nat,<,+> (respectively, over initial segments of this structure) that the variable x is interpreted exactly by the number of possible interpretations of the variable y for which the formula phi(y,z_1,...,z_k) is satisfied. Applying this theorem, we obtain an easy proof of Ruhl s result that reachability (and similarly, connectivity) in finite graphs is not expressible in first-order logic with unary counting quantifiers and addition. Furthermore, the above result on Presburger arithmetic helps to show the failure of a particular version of the Crane Beach conjecture.
We describe a program logic for weak memory (also known as relaxed memory). The logic is based on Hoare logic within a thread, and rely/guarantee between threads. It is presented via examples, giving proofs of many weak-memory litmus tests. It extends to coherence but not yet to synchronised assignment (compare-and-swap, load-logical/store-conditional). It deals with conditionals and loops but not yet arrays or heap. The logic uses a version of Hoare logic within threads, and a version of rely/guarantee between threads, with five stability rules to handle various kinds of parallelism (external, internal, propagation-free and two kinds of in-flight parallelism). There are $\\mathbb{B}$ and $\\mathbb{U}$ modalities to regulate propagation, and temporal modalities $\\mathsf{since}$, $\\mathbb{S}\\mathsf{ofar}$ and $\\mathbb{O}\\mathsf{uat}$ to deal with global coherence (SC per location). The logic is presented by example. Proofs and unproofs of about thirty weak-memory examples, including many litmus tests in various guises, are dealt with in detail. There is a proof of a version of the token ring. In version 2: The correspondence with Herding Cats has been clarified. The stability rules have been simplified: in particular the sat and x= x tests have been eliminated from external stability checks. The embedding is simplified and has a more transparent relation to the mechanisms of the logic. Definitions of U, Sofar and Ouat have been considerably altered. The description of modalities and the treatment of termination has been reworked. Many proofs are reconstructed. A comprehensive summary of the logic is an appendix.
In earlier work, the Abstract State Machine Thesis -- that arbitrary algorithms are behaviorally equivalent to abstract state machines -- was established for several classes of algorithms, including ordinary, interactive, small-step algorithms. This was accomplished on the basis of axiomatizations of these classes of algorithms. In Part I (Interactive Small-Step Algorithms I: Axiomatization), the axiomatization was extended to cover interactive small-step algorithms that are not necessarily ordinary. This means that the algorithms (1) can complete a step without necessarily waiting for replies to all queries from that step and (2) can use not only the environment s replies but also the order in which the replies were received. In order to prove the thesis for algorithms of this generality, we extend here the definition of abstract state machines to incorporate explicit attention to the relative timing of replies and to the possible absence of replies. We prove the characterization theorem for extended abstract state machines with respect to general algorithms as axiomatized in Part I.
This paper extends the fibrational approach to induction and coinduction pioneered by Hermida and Jacobs, and developed by the current authors, in two key directions. First, we present a dual to the sound induction rule for inductive types that we developed previously. That is, we present a sound coinduction rule for any data type arising as the carrier of the final coalgebra of a functor, thus relaxing Hermida and Jacobs  restriction to polynomial functors. To achieve this we introduce the notion of a quotient category with equality (QCE) that i) abstracts the standard notion of a fibration of relations constructed from a given fibration; and ii) plays a role in the theory of coinduction dual to that played by a comprehension category with unit (CCU) in the theory of induction. Secondly, we show that inductive and coinductive indexed types also admit sound induction and coinduction rules. Indexed data types often arise as carriers of initial algebras and final coalgebras of functors on slice categories, so we give sufficient conditions under which we can construct, from a CCU (QCE) U:E \\rightarrow B, a fibration with base B/I that models indexing by I and is also a CCU (resp., QCE). We finish the paper by considering the more general case of sound induction and coinduction rules for indexed data types when the indexing is itself given by a fibration.
In this paper we present the denotational semantics for channel mobility in the Unifying Theories of Programming (UTP) semantics framework. The basis for the model is the UTP theory of reactive processes (precisely, the UTP semantics for Communicating Sequential Processes (CSP)), which is slightly extended to allow the mobility of channels: the set of actions in which a process is authorised to participate, originally static or constant (set during the process s definition), is now made dynamic or variable: it can change during the process s execution. A channel is thus moved around by communicating it via other channels and then allowing the receiving process to extend its alphabet with the received channel. New healthiness conditions are stated to ensure an appropriate use of mobile channels.
We propose modal Markov logic as an extension of propositional Markov logic to reason under the principle of maximum entropy for modal logics K45, KD45, and S5. Analogous to propositional Markov logic, the knowledge base consists of weighted formulas, whose weights are learned from data. However, in contrast to Markov logic, in our framework we use the knowledge base to define a probability distribution over non-equivalent epistemic situations (pointed Kripke structures) rather than over atoms, and use this distribution to assign probabilities to modal formulas. As in all probabilistic representations, the central task in our framework is inference. Although the size of the state space grows doubly exponentially in the number of propositions in the domain, we provide an algorithm that scales only exponentially in the size of the knowledge base. Finally, we briefly discuss the case of languages with an infinite number of propositions.
Bisimulation metrics provide a robust and accurate approach to study the behavior of nondeterministic probabilistic processes. In this paper, we propose a logical characterization of bisimulation metrics based on a simple probabilistic variant of the Hennessy-Milner logic. Our approach is based on the novel notions of mimicking formulae and distance between formulae. The former are a weak version of the well known characteristic formulae and allow us to characterize also (ready) probabilistic simulation and probabilistic bisimilarity. The latter is a 1-bounded pseudometric on formulae that mirrors the Hausdorff and Kantorovich lifting the defining bisimilarity pseudometric. We show that the distance between two processes equals the distance between their own mimicking formulae.
Apart from a brief look at applications (Relational Databases, Formal Concept Analysis, data mining) this article is devoted to the mathematical t h e o r y of implications (=pure Horn formulas). It is mainly a survey of results obtained in the last thirty years, but features a few novelties as well. Some keywords: The Duquenne-Guiges (implicational) base, the canonical direct base, prime implicates, the consensus method, implications and meet irreducible closed sets, optimum bases for certain lattices, ordered direct bases, generating all closed sets, general (i.e. impure) Horn functions. We pose four open problems to stimulate further research.
The reachability problem for vector addition systems is a central problem of net theory. This problem is known to be decidable but the complexity is still unknown. Whereas the problem is EXPSPACE-hard, no elementary upper bounds complexity are known. In this paper we consider the reversible reachability problem. This problem consists to decide if two configurations are reachable one from each other, or equivalently if they are in the same strongly connected component of the reachability graph. We show that this problem is EXPSPACE-complete. As an application of the introduced materials we characterize the reversibility domains of a vector addition system.
In this paper, we present an integrated structural and behavioral model of Reo connectors and Petri nets, allowing a direct comparison of the two concurrency models. For this purpose, we introduce a notion of connectors which consist of a number of interconnected, user-defined primitives with fixed behavior. While the structure of connectors resembles hypergraphs, their semantics is given in terms of so-called port automata. We define both models in a categorical setting where composition operations can be elegantly defined and integrated. Specifically, we formalize structural gluings of connectors as pushouts, and joins of port automata as pullbacks. We then define a semantical functor from the connector to the port automata category which preserves this composition. We further show how to encode Reo connectors and Petri nets into this model and indicate applications to dynamic reconfigurations modeled using double pushout graph transformation.
Unsatisfiable core analysis can boost the computation of optimum stable models for logic programs with weak constraints. However, current solvers employing unsatisfiable core analysis either run to completion, or provide no suboptimal stable models but the one resulting from the preliminary disjoint cores analysis. This drawback is circumvented here by introducing a progression based shrinking of the analyzed unsatisfiable cores. In fact, suboptimal stable models are possibly found while shrinking unsatisfiable cores, hence resulting into an anytime algorithm. Moreover, as confirmed empirically, unsatisfiable core analysis also benefits from the shrinking process in terms of solved instances. This paper is under consideration for acceptance in TPLP.
This paper proposes new mathematical models of the untyped Lambda-mu calculus. One is called the stream model, which is an extension of the lambda model, in which each term is interpreted as a function from streams to individual data. The other is called the stream combinatory algebra, which is an extension of the combinatory algebra, and it is proved that the extensional equality of the Lambda-mu calculus is equivalent to equality in stream combinatory algebras. In order to define the stream combinatory algebra, we introduce a combinatory calculus SCL, which is an abstraction-free system corresponding to the Lambda-mu calculus. Moreover, it is shown that stream models are algebraically characterized as a particular class of stream combinatory algebras.
In the last years, the adoption of active systems has increased in many fields of computer science, such as databases, sensor networks, and software engineering. These systems are able to automatically react to events, by collecting information from outside and internally generating new events. However, the collection of data is often hampered by uncertainty and vagueness that can arise from the imprecision of the monitoring infrastructure, unreliable data sources, and networks. The decision making mechanism used to produce a reaction is also imprecise, and cannot be evaluated in a crisp way. It depends on the evaluation of vague temporal constraints, which are expressed on the collected data by humans. Despite fuzzy logic has been mainly conceived as a mathematical abstraction to express vagueness, no attempt has been made to fuzzify the temporal modalities. Existing fuzzy languages do not allow us to represent temporal properties, such as \"almost always\" and \"soon\". Indeed, the semantics of existing fuzzy temporal operators is based on the idea of replacing classical connectives or propositions with their fuzzy counterparts. To overcome these limitations, we propose a temporal framework, FTL (Fuzzy-time Temporal Logic), to express vagueness on time. This framework formally defines a set of fuzzy temporal modalities, which can be customized by choosing a specific semantics for the connectives. The semantics of the language is sound, and the introduced modalities respect a set of expected mutual relations. We also prove that under the assumption that all events are crisp, FTL reduces to LTL. Finally, for some of the possible fuzzy interpretations of the connectives, we identify adequate sets of temporal operators, from which it is possible to derive all the others.
We consider state-based systems modelled as coalgebras whose type incorporates branching, and show that by suitably adapting the definition of coalgebraic bisimulation, one obtains a general and uniform account of the linear-time behaviour of a state in such a coalgebra. By moving away from a boolean universe of truth values, our approach can measure the extent to which a state in a system with branching is able to exhibit a particular linear-time behaviour. This instantiates to measuring the probability of a specific behaviour occurring in a probabilistic system, or measuring the minimal cost of exhibiting a specific behaviour in the case of weighted computations.
We present a construction of a certain infinite complete partial order (CPO) that differs from the standard construction used in Scott s denotational semantics. In addition, we construct several other infinite CPO s. For some of those, we apply the usual Fixed Point Theorem (FPT) to yield a fixed point for every continuous function $\\mu:2\\to 2$ (where 2 denotes the set $\\{0,1\\}$), while for the other CPO s we cannot invoke that theorem to yield such fixed points. Every element of each of these CPO s is a binary string in the monotypic form and we show that invalidation of the applicability of the FPT to the CPO that Scott s constructed yields the concept of replication.
Fault Tree (FT) is a standard failure modeling technique that has been extensively used to predict reliability, availability and safety of many complex engineering systems. In order to facilitate the formal analysis of FT based analyses, a higher-order-logic formalization of FTs has been recently proposed. However, this formalization is quite limited in terms of handling large systems and transformation of FT models into their corresponding Reliability Block Diagram (RBD) structures, i.e., a frequently used transformation in reliability and availability analyses. In order to overcome these limitations, we present a deep embedding based formalization of FTs. In particular, the paper presents a formalization of AND, OR and NOT FT gates, which are in turn used to formalize other commonly used FT gates, i.e., NAND, NOR, XOR, Inhibit, Comparator and majority Voting, and the formal verification of their failure probability expressions. For illustration purposes, we present a formal failure analysis of a communication gateway software for the next generation air traffic management system.
A new framework for presenting and analyzing the functionality of a modern DLL-based SAT solver is proposed. Our approach exploits the inherent relation between backtracking and resolution. We show how to derive the algorithm of a modern SAT solver from DLL step-by-step. We analyze the inference power of Boolean Constraint Propagation, Non-Chronological Backtracking and 1UIP-based Conflict-Directed Backjumping. Our work can serve as an introduction to a modern SAT solver functionality and as a basis for future work on the inference power of a modern SAT solver and on practical SAT solver design.
In this paper we present an algorithm for performing runtime verification of a bounded temporal logic over timed runs. The algorithm consists of three elements. First, the bounded temporal formula to be verified is translated into a monadic first-order logic over difference inequalities, which we call monadic difference logic. Second, at each step of the timed run, the monadic difference formula is modified by computing a quotient with the state and time of that step. Third, the resulting formula is checked for being a tautology or being unsatisfiable by a decision procedure for monadic difference logic. We further provide a simple decision procedure for monadic difference logic based on the data structure Difference Decision Diagrams. The algorithm is complete in a very strong sense on a subclass of temporal formulae characterized as homogeneously monadic and it is approximate on other formulae. The approximation comes from the fact that not all unsatisfiable or tautological formulae are recognised at the earliest possible time of the runtime verification. Contrary to existing approaches, the presented algorithms do not work by syntactic rewriting but employ efficient decision structures which make them applicable in real applications within for instance business software.
Deficiency in expressive power of the first-order logic has led to developing its numerous extensions by fixed point operators, such as Least Fixed-Point (LFP), inflationary fixed-point (IFP), partial fixed-point (PFP), etc. These logics have been extensively studied in finite model theory, database theory, descriptive complexity. In this paper we introduce unifying framework, the logic with iteration operator, in which iteration steps may be accessed by temporal logic formulae. We show that proposed logic FO+TAI subsumes all mentioned fixed point extensions as well as many other fixed point logics as natural fragments. On the other hand we show that over finite structures FO+TAI is no more expressive than FO+PFP. Further we show that adding the same machinery to the logic of monotone inductions (FO+LFP) does not increase its expressive power either.
We introduce a new way of formalizing the intensional identity type based on the notion of computational paths which will be taken to be proofs of propositional equality, and thus terms of the identity type. Our approach results in an elimination rule different than the one given by Martin-L\\\"of in his intensional identity type. In order to show the validity and power of our approach, we formulate and prove the basic concepts, lemmas and theorems of Homotopy Type Theory using computational paths. We also show that these proves and formulations resulted, as a side effect, in the improvement, by means of the addition of new rules, of a term rewrite system known as LND_{EQ}-TRS, originally proposed by de Oliveira (1995).
Event Structures (ESs) are mainly concerned with the representation of causal relationships between events, usually accompanied by other event relations capturing conflicts and disabling. Among the most prominent variants of ESs are Prime ESs, Bundle ESs, Stable ESs, and Dual ESs, which differ in their causality models and event relations. Yet, some application domains require further kinds of relations between events. Here, we add the possibility to express priority relationships among events. We exemplify our approach on Prime, Bundle, Extended Bundle, and Dual ESs. Technically, we enhance these variants in the same way. For each variant, we then study the interference between priority and the other event relations. From this, we extract the redundant priority pairs-notably differing for the types of ESs-that enable us to provide a comparison between the extensions. We also exhibit that priority considerably complicates the definition of partial orders in ESs.
Quantified constraints over the reals appear in numerous contexts. Usually existential quantification occurs when some parameter can be chosen by the user of a system, and univeral quantification when the exact value of a parameter is either unknown, or when it occurs in infinitely many, similar versions. The following is a list of application areas and publications that contain applications for solving quantified constraints over the reals. The list is certainly not complete, but grows as the author encounters new items. Contributions are very welcome!
This paper considers finite-automata based algorithms for handling linear arithmetic with both real and integer variables. Previous work has shown that this theory can be dealt with by using finite automata on infinite words, but this involves some difficult and delicate to implement algorithms. The contribution of this paper is to show, using topological arguments, that only a restricted class of automata on infinite words are necessary for handling real and integer linear arithmetic. This allows the use of substantially simpler algorithms, which have been successfully implemented.
We consider partially observable Markov decision processes (POMDPs) with {\\omega}-regular conditions specified as parity objectives. The class of {\\omega}-regular languages extends regular languages to infinite strings and provides a robust specification language to express all properties used in verification, and parity objectives are canonical forms to express {\\omega}-regular conditions. The qualitative analysis problem given a POMDP and a parity objective asks whether there is a strategy to ensure that the objective is satis- fied with probability 1 (resp. positive probability). While the qualitative analysis problems are known to be undecidable even for very special cases of parity objectives, we establish decidability (with optimal complexity) of the qualitative analysis problems for POMDPs with all parity objectives under finite- memory strategies. We establish optimal (exponential) memory bounds and EXPTIME-completeness of the qualitative analysis problems under finite-memory strategies for POMDPs with parity objectives.
We review the notion of perfect recall in the literature on interpreted systems, game theory, and epistemic logic. In the context of Epistemic Temporal Logic (ETL), we give a (to our knowledge) novel frame condition for perfect recall, which is local and can straightforwardly be translated to a defining formula in a language that only has next-step temporal operators. This frame condition also gives rise to a complete axiomatization for S5 ETL frames with perfect recall. We then consider how to extend and consolidate the notion of perfect recall in sub-S5 settings, where the various notions discussed are no longer equivalent.
In 2002 Jurdzinski and Lorys settled a long-standing conjecture that palindromes are not a Church-Rosser language. Their proof required a sophisticated theory about computation graphs of 2-stack automata. We present their proof in terms of 1-tape Turing machines.We also provide an alternative proof of Buntrock and Otto s result that the set of non-square bitstrings, which is context-free, is not Church-Rosser.
We present the first session typing system guaranteeing request-response liveness properties for possibly non-terminating communicating processes. The types augment the branch and select types of the standard binary session types with a set of required responses, indicating that whenever a particular label is selected, a set of other labels, its responses, must eventually also be selected. We prove that these extended types are strictly more expressive than standard session types. We provide a type system for a process calculus similar to a subset of collaborative BPMN processes with internal (data-based) and external (event-based) branching, message passing, bounded and unbounded looping. We prove that this type system is sound, i.e., it guarantees request-response liveness for dead-lock free processes. We exemplify the use of the calculus and type system on a concrete example of an infinite state system.
We examine the relationship between the algebraic lambda-calculus, a fragment of the differential lambda-calculus and the linear-algebraic lambda-calculus, a candidate lambda-calculus for quantum computation. Both calculi are algebraic: each one is equipped with an additive and a scalar-multiplicative structure, and their set of terms is closed under linear combinations. However, the two languages were built using different approaches: the former is a call-by-name language whereas the latter is call-by-value; the former considers algebraic equalities whereas the latter approaches them through rewrite rules. In this paper, we analyse how these different approaches relate to one another. To this end, we propose four canonical languages based on each of the possible choices: call-by-name versus call-by-value, algebraic equality versus algebraic rewriting. We show that the various languages simulate one another. Due to subtle interaction between beta-reduction and algebraic rewriting, to make the languages consistent some additional hypotheses such as confluence or normalisation might be required. We carefully devise the required properties for each proof, making them general enough to be valid for any sub-language satisfying the corresponding properties.
This article is about temporal multi-agent logics. Several of these formalisms have been already presented (ATL-ATL*, ATLsc, SL). They enable to express the capacities of agents in a system to ensure the satisfaction of temporal properties. Particularly, SL and ATLsc enable several agents to interact in a context mixing the different strategies they play in a semantical game. We generalize this possibility by proposing a new formalism, Updating Strategy Logic (USL). In USL, an agent can also refine its own strategy. The gain in expressive power rises the notion of \"sustainable capacities\" for agents. USL is built from SL. It mainly brings to SL the two following modifications: semantically, the successor of a given state is not uniquely determined by the data of one choice from each agent. Syntactically, we introduce in the language an operator, called an \"unbinder\", which explicitely deletes the binding of a strategy to an agent. We show that USL is strictly more expressive than SL.
This paper describes a simpler way for programmers to reason about the correctness of their code. The study of semantics of logic programs has shown strong links between the model theoretic semantics (truth and falsity of atoms in the programmer s interpretation of a program), procedural semantics (for example, SLD resolution) and fixpoint semantics (which is useful for program analysis and alternative execution mechanisms). Most of this work assumes that intended interpretations are two-valued: a ground atom is true (and should succeed according to the procedural semantics) or false (and should not succeed). In reality, intended interpretations are less precise. Programmers consider that some atoms \"should not occur\" or are \"ill-typed\" or \"inadmissible\". Programmers don t know and don t care whether such atoms succeed. In this paper we propose a three-valued semantics for (essentially) pure Prolog programs with (ground) negation as failure which reflects this. The semantics of Fitting is similar but only associates the third truth value with non-termination. We provide tools to reason about correctness of programs without the need for unnatural precision or undue restrictions on programming style. As well as theoretical results, we provide a programmer-oriented synopsis. This work has come out of work on declarative debugging, where it has been recognised that inadmissible calls are important. This paper has been accepted to appear in Theory and Practice of Logic Programming.
The paper presents an extension of temporal epistemic logic with operators that quantify over agent strategies. Unlike previous work on alternating temporal epistemic logic, the semantics works with systems whose states explicitly encode the strategy being used by each of the agents. This provides a natural way to express what agents would know were they to be aware of the strategies being used by other agents. A number of examples that rely upon the ability to express an agent s knowledge about the strategies being used by other agents are presented to motivate the framework, including reasoning about game theoretic equilibria, knowledge-based programs, and information theoretic computer security policies. Relationships to several variants of alternating temporal epistemic logic are discussed. The computational complexity of model checking the logic and several of its fragments are also characterized.
Petri net unfoldings are a useful tool to tackle state-space explosion in verification and related tasks. Moreover, their structure allows to access directly the relations of causal precedence, concurrency, and conflict between events. Here, we explore the data structure further, to determine the following relation: event a is said to reveal event b iff the occurrence of a implies that b inevitably occurs, too, be it before, after, or concurrently with a. Knowledge of reveals facilitates in particular the analysis of partially observable systems, in the context of diagnosis, testing or verification; it can also be used to generate more concise representations of behaviours via abstractions. The reveals relation was previously introduced in the context of fault diagnosis, where it was shown that the reveals relation was decidable: for a given pair a,b in the unfolding U of a safe Petri net N, a finite prefix P of U is sufficient to decide whether or not a reveals b. In this paper, we first considerably improve the bound on |P|. We then show that there exists an efficient algorithm for computing the relation on a given prefix. We have implemented the algorithm and report on experiments.
We introduce Parametric Linear Dynamic Logic (PLDL), which extends Linear Dynamic Logic (LDL) by temporal operators equipped with parameters that bound their scope. LDL was proposed as an extension of Linear Temporal Logic (LTL) that is able to express all $\\omega$-regular specifications while still maintaining many of LTL s desirable properties like an intuitive syntax and a translation into non-deterministic B\\\"uchi automata of exponential size. But LDL lacks capabilities to express timing constraints. By adding parameterized operators to LDL, we obtain a logic that is able to express all $\\omega$-regular properties and that subsumes parameterized extensions of LTL like Parametric LTL and PROMPT-LTL. Our main technical contribution is a translation of PLDL formulas into non-deterministic B\\\"uchi word automata of exponential size via alternating automata. This yields a PSPACE model checking algorithm and a realizability algorithm with doubly-exponential running time. Furthermore, we give tight upper and lower bounds on optimal parameter values for both problems. These results show that PLDL model checking and realizability are not harder than LTL model checking and realizability.
In systems verification we are often concerned with multiple, inter-dependent properties that a program must satisfy. To prove that a program satisfies a given property, the correctness of intermediate states of the program must be characterized. However, this intermediate reasoning is not always phrased such that it can be easily re-used in the proofs of subsequent properties. We introduce a function annotation logic that extends Hoare logic in two important ways: (1) when proving that a function satisfies a Hoare triple, intermediate reasoning is automatically stored as function annotations, and (2) these function annotations can be exploited in future Hoare logic proofs. This reduces duplication of reasoning between the proofs of different properties, whilst serving as a drop-in replacement for traditional Hoare logic to avoid the costly process of proof refactoring. We explain how this was implemented in Isabelle/HOL and applied to an experimental branch of the seL4 microkernel to significantly reduce the size and complexity of existing proofs.
In 1985, van den Dries showed that the theory of the reals with a predicate for the integer powers of two admits quantifier elimination in an expanded language, and is hence decidable. He gave a model-theoretic argument, which provides no apparent bounds on the complexity of a decision procedure. We provide a syntactic argument that yields a procedure that is primitive recursive, although not elementary. In particular, we show that it is possible to eliminate a single block of existential quantifiers in time $2^0_{O(n)}$, where $n$ is the length of the input formula and $2_k^x$ denotes $k$-fold iterated exponentiation.
Logical reasoning about program data often requires dealing with heap structures as well as scalar data types. Recent advances in Satisfiability Modular Theory (SMT) already offer efficient procedures for dealing with scalars, yet they lack any support for dealing with heap structures. In this paper, we present an approach that integrates Separation Logic---a prominent logic for reasoning about list segments on the heap---and SMT. We follow a model-based approach that communicates aliasing among heap cells between the SMT solver and the Separation Logic reasoning part. An experimental evaluation using the Z3 solver indicates that our approach can effectively put to work the advances in SMT for dealing with heap structures. This is the first decision procedure for the combination of separation logic with SMT theories.
Modern conflict-driven clause learning (CDCL) SAT solvers are very good in solving conjunctive normal form (CNF) formulas. However, some application problems involve lots of parity (xor) constraints which are not necessarily efficiently handled if translated into CNF. This paper studies solving CNF formulas augmented with xor-clauses in the DPLL(XOR) framework where a CDCL SAT solver is coupled with a separate xor-reasoning module. New techniques for analyzing xor-reasoning derivations are developed, allowing one to obtain smaller CNF clausal explanations for xor-implied literals and also to derive and learn new xor-clauses. It is proven that these new techniques allow very short unsatisfiability proofs for some formulas whose CNF translations do not have polynomial size resolution proofs, even when a very simple xor-reasoning module capable only of unit propagation is applied. The efficiency of the proposed techniques is evaluated on a set of challenging logical cryptanalysis instances.
Linearization is the procedure of rewriting a process term into a linear form, which consist only of basic operators of the process language. This procedure is interesting both from a theoretical and a practical point of view. In particular, a linearization algorithm is needed for the Compositional Interchange Format (CIF), an automaton based modeling language. The problem of devising efficient linearization algorithms is not trivial, and has been already addressed in literature. However, the linearization algorithms obtained are the result of an inventive process, and the proof of correctness comes as an afterthought. Furthermore, the semantic specification of the language does not play an important role on the design of the algorithm. In this work we present a method for obtaining an efficient linearization algorithm, through a step-wise refinement of the SOS rules of CIF. As a result, we show how the semantic specification of the language can guide the implementation of such a procedure, yielding a simple proof of correctness.
In this paper we investigate fair computations in the pi-calculus. Following Costa and Stirling s approach for CCS-like languages, we consider a method to label process actions in order to filter out unfair computations. We contrast the existing fair-testing notion with those that naturally arise by imposing weak and strong fairness. This comparison provides insight about the expressiveness of the various `fair  testing semantics and about their discriminating power.
CLP(H) is an instantiation of the general constraint logic programming scheme with the constraint domain of hedges. Hedges are finite sequences of unranked terms, built over variadic function symbols and three kinds of variables: for terms, for hedges, and for function symbols. Constraints involve equations between unranked terms and atoms for regular hedge language membership. We study algebraic semantics of CLP(H) programs, define a sound, terminating, and incomplete constraint solver, investigate two fragments of constraints for which the solver returns a complete set of solutions, and describe classes of programs that generate such constraints.
In this paper, we present the interval neutrosophic logics which generalizes the fuzzy logic, paraconsistent logic, intuitionistic fuzzy logic and many other non-classical and non-standard logics. We will give the formal definition of interval neutrosophic propositional calculus and interval neutrosophic predicate calculus. Then we give one application of interval neutrosophic logics to do approximate reasoning.
The aim of this thesis is to present an extension to the string graphs of Dixon, Duncan and Kissinger that allows the finite representation of certain infinite families of graphs and graph rewrite rules, and to demonstrate that a logic can be built on this to allow the formalisation of inductive proofs in the string diagrams of compact closed and traced symmetric monoidal categories. String diagrams provide an intuitive method for reasoning about monoidal categories. However, this does not negate the ability for those using them to make mistakes in proofs. To this end, there is a project (Quantomatic) to build a proof assistant for string diagrams, at least for those based on categories with a notion of trace. The development of string graphs has provided a combinatorial formalisation of string diagrams, laying the foundations for this project. The prevalence of commutative Frobenius algebras (CFAs) in quantum information theory, a major application area of these diagrams, has led to the use of variable-arity nodes as a shorthand for normalised networks of Frobenius algebra morphisms, so-called \"spider notation\". This notation greatly eases reasoning with CFAs, but string graphs are inadequate to properly encode this reasoning. This dissertation extends string graphs to allow for variable-arity nodes to be represented at all, and then introduces !-box notation (and structures to encode it) to represent string graph equations containing repeated subgraphs, where the number of repetitions is abitrary. It then demonstrates how we can reason directly about !-graphs, viewed as (typically infinite) families of string graphs. Of particular note is the presentation of a form of graph-based induction, allowing the formal encoding of proofs that previously could only be represented as a mix of string diagrams and explanatory text.
Linearisability has become the standard correctness criterion for concurrent data structures, ensuring that every history of invocations and responses of concurrent operations has a matching sequential history. Existing proofs of linearisability require one to identify so-called linearisation points within the operations under consideration, which are atomic statements whose execution causes the effect of an operation to be felt. However, identification of linearisation points is a non-trivial task, requiring a high degree of expertise. For sophisticated algorithms such as Heller et al s lazy set, it even is possible for an operation to be linearised by the concurrent execution of a statement outside the operation being verified. This paper proposes an alternative method for verifying linearisability that does not require identification of linearisation points. Instead, using an interval-based logic, we show that every behaviour of each concrete operation over any interval is a possible behaviour of a corresponding abstraction that executes with coarse-grained atomicity. This approach is applied to Heller et al s lazy set to show that verification of linearisability is possible without having to consider linearisation points within the program code.
The formal system lambda-delta is a typed lambda calculus that pursues the unification of terms, types, environments and contexts as the main goal. lambda-delta takes some features from the Automath-related lambda calculi and some from the pure type systems, but differs from both in that it does not include the Pi construction while it provides for an abbreviation mechanism at the level of terms. lambda-delta enjoys some important desirable properties such as the confluence of reduction, the correctness of types, the uniqueness of types up to conversion, the subject reduction of the type assignment, the strong normalization of the typed terms and, as a corollary, the decidability of type inference problem.
Propositional satisfiability (SAT) solvers, which typically operate using conjunctive normal form (CNF), have been successfully applied in many domains. However, in some application areas such as circuit verification, bounded model checking, and logical cryptanalysis, instances can have many parity (xor) constraints which may not be handled efficiently if translated to CNF. Thus, extensions to the CNF-driven search with various parity reasoning engines ranging from equivalence reasoning to incremental Gaussian elimination have been proposed. This paper studies how stronger parity reasoning techniques in the DPLL(XOR) framework can be simulated by simpler systems: resolution, unit propagation, and parity explanations. Such simulations are interesting, for example, for developing the next generation SAT solvers capable of handling parity constraints efficiently.
Let E be a set of inequalities between finite {\\Sigma}-terms. Let V_{\\omega} and V_r denote the varieties of all {\\omega}-continuous ordered {\\Sigma}-algebras and regular ordered {\\Sigma}-algebras satisfying E, respectively. We prove that the free V_r-algebra R(X) on generators X is the subalgebra of the corresponding free V_{\\omega}-algebra F_{\\omega}(X) determined by those elements of F_{\\omega}(X) denoted by the regular {\\Sigma}-coterms. We actually establish this fact as a special case of a more general construction for families of algebras specified by syntactically restricted completeness and continuity properties. Thus our result is also applicable to ordered regular algebras of higher order.
The majority of modern systems exhibit sophisticated concurrent behaviour, where several system components modify and observe the system state with fine-grained atomicity. Many systems (e.g., multi-core processors, real-time controllers) also exhibit truly concurrent behaviour, where multiple events can occur simultaneously. This paper presents data refinement defined in terms of an interval-based framework, which includes high-level operators that capture non-deterministic expression evaluation. By modifying the type of an interval, our theory may be specialised to cover data refinement of both discrete and continuous systems. We present an interval-based encoding of forward simulation, then prove that our forward simulation rule is sound with respect to our data refinement definition. A number of rules for decomposing forward simulation proofs over both sequential and parallel composition are developed.
Relational semantics for linear logic is a form of non-idempotent intersection type system, from which several informations on the execution of a proof-structure can be recovered. An element of the relational interpretation of a proof-structure R with conclusion $\\Gamma$ acts thus as a type (refining $\\Gamma$) having R as an inhabitant. We are interested in the following type-checking question: given a proof-structure R, a list of formulae $\\Gamma$, and a point x in the relational interpretation of $\\Gamma$, is x in the interpretation of R? This question is decidable. We present here an algorithm that decides it in time linear in the size of R, if R is a proof-structure in the multiplicative fragment of linear logic. This algorithm can be extended to larger fragments of multiplicative-exponential linear logic containing $\\lambda$-calculus.
Relying on the formulae-as-types paradigm for classical logic, we define a program logic for an imperative language with higher-order procedural variables and non-local jumps. Then, we show how to derive a sound program logic for this programming language. As a by-product, we obtain a non-dependent type system which is more permissive than what is usually found in statically typed imperative languages. As a generic example, we encode imperative versions of delimited continuations operators shift and reset.
Modularity and decontextualisation are core principles of a service-oriented architecture. However, the principles are often lost when it comes to an implementation of services, as a result of a rigidly defined service interface. The interface, which defines a data format, is typically specific to a particular context and its change entails significant redevelopment costs. This paper focuses on a two-fold problem. On the one hand, the interface description language must be flexible enough for maintaining service compatibility in a variety of different contexts without modification of the service itself. On the other hand, the composition of interfaces in a distributed environment must be provably consistent. The existing approaches for checking compatibility of service choreographies are either inflexible (WS-CDL and WSCI) or require behaviour specification associated with each service, which is often impossible to provide in practice. We present a novel approach for automatic interface configuration in distributed stream-connected components operating as closed-source services (i.e. the behavioural protocol is unknown). We introduce a Message Definition Language (MDL), which can extend the existing interfaces description languages, such as WSDL, with support of subtyping, inheritance and polymorphism. The MDL supports configuration variables that link input and output interfaces of a service and propagate requirements over an application graph. We present an algorithm that solves the interface reconciliation problem using constraint satisfaction that relies on Boolean satisfiability as a subproblem.
Goedel s functional \"Dialectica\" interpretation can be used to extract functional programs from non-constructive proofs in arithmetic by employing two sorts of higher-order witnessing terms: positive realisers and negative counterexamples. In the original interpretation decidability of atoms is required to compute the correct counterexample from a set of candidates. When combined with recursion, this choice needs to be made for every step in the extracted program, however, in some special cases the decision on negative witnesses can be calculated only once. We present a variant of the interpretation in which the time complexity of extracted programs can be improved by marking the chosen witness and thus avoiding recomputation. The achieved effect is similar to using an abortive control operator to interpret computational content of non-constructive principles.
A function f is continuous iff the PRE-image f^{-1}[V] of any open set V is open again. Dual to this topological property, f is called OPEN iff the IMAGE f[U] of any open set U is open again. Several classical Open Mapping Theorems in Analysis provide a variety of sufficient conditions for openness. By the Main Theorem of Recursive Analysis, computable real functions are necessarily continuous. In fact they admit a well-known characterization in terms of the mapping V+->f^{-1}[V] being EFFECTIVE: Given a list of open rational balls exhausting V, a Turing Machine can generate a corresponding list for f^{-1}[V]. Analogously, EFFECTIVE OPENNESS requires the mapping U+->f[U] on open real subsets to be effective. By effectivizing classical Open Mapping Theorems as well as from application of Tarski s Quantifier Elimination, the present work reveals several rich classes of functions to be effectively open.
Model rotation is an efficient technique for improving MUS finding algorithms. In previous work we have studied model rotation as an algorithm that traverses a graph which is induced by the input formula. This document introduces the notion of blocked edges, which are edges in this graph that can never be traversed. We show the existence of irredundant CNF formulas in which some clauses are unreachable by model rotation. Additionally, we proof a conjecture by Belov, Lynce and Marques-Silva.
Subtyping in concurrency has been extensively studied since early 1990s as one of the most interesting issues in type theory. The correctness of subtyping relations has been usually provided as the soundness for type safety. The converse direction, the completeness, has been largely ignored in spite of its usefulness to define the largest subtyping relation ensuring type safety. This paper formalises preciseness (i.e. both soundness and completeness) of subtyping for mobile processes and studies it for the synchronous and the asynchronous session calculi. We first prove that the well-known session subtyping, the branching-selection subtyping, is sound and complete for the synchronous calculus. Next we show that in the asynchronous calculus, this subtyping is incomplete for type-safety: that is, there exist session types T and S such that T can safely be considered as a subtype of S, but T < S is not derivable by the subtyping. We then propose an asynchronous subtyping system which is sound and complete for the asynchronous calculus. The method gives a general guidance to design rigorous channel-based subtypings respecting desired safety properties. Both the synchronous and the asynchronous calculus are first considered with lin ear channels only, and then they are extended with session initialisations and c ommunications of expressions (including shared channels).
Logic L was introduced by Lewitzka [8] as a modal system that combines intuitionistic and classical logic: L is a conservative extension of CPC and it contains a copy of IPC via embedding $\\varphi\\mapsto\\square\\varphi$. In this article, we consider L3, i.e. L augmented with S3 modal axioms, define basic epistemic extensions and prove completeness w.r.t. algebraic semantics. Our systems involve, in adapted form, some of the epistemic principles of Intuitionistic Epistemic Logic presented by Artemov and Protopopescu [1]. In particular, the implications \"intuitionistic truth implies knowledge implies classical truth\" are given as theorems $\\square\\varphi\\rightarrow K\\varphi$ and $K\\varphi\\rightarrow\\varphi$ of our logic EL3. Intuitionistic and classical (epistemic) principles are combined within a single system. Finally, we show that a slight modification of our semantics yields algebraic models for the systems of Intuitionistic Epistemic Logic studied in [1].
The Induced Disjoint Paths problem is to test whether a graph G with k distinct pairs of vertices (s_i,t_i) contains paths P_1,...,P_k such that P_i connects s_i and t_i for i=1,...,k, and P_i and P_j have neither common vertices nor adjacent vertices (except perhaps their ends) for 1<=i < j<=k. We present a linear-time algorithm for Induced Disjoint Paths on circular-arc graphs. For interval graphs, we exhibit a linear-time algorithm for the generalization of Induced Disjoint Paths where the pairs (s_i,t_i) are not necessarily distinct.
The restless bandit problem is one of the most well-studied generalizations of the celebrated stochastic multi-armed bandit problem in decision theory. In its ultimate generality, the restless bandit problem is known to be PSPACE-Hard to approximate to any non-trivial factor, and little progress has been made despite its importance in modeling activity allocation under uncertainty. We consider a special case that we call Feedback MAB, where the reward obtained by playing each of n independent arms varies according to an underlying on/off Markov process whose exact state is only revealed when the arm is played. The goal is to design a policy for playing the arms in order to maximize the infinite horizon time average expected reward. This problem is also an instance of a Partially Observable Markov Decision Process (POMDP), and is widely studied in wireless scheduling and unmanned aerial vehicle (UAV) routing. Unlike the stochastic MAB problem, the Feedback MAB problem does not admit to greedy index-based optimal policies. We develop a novel and general duality-based algorithmic technique that yields a surprisingly simple and intuitive 2+epsilon-approximate greedy policy to this problem. We then define a general sub-class of restless bandit problems that we term Monotone bandits, for which our policy is a 2-approximation. Our technique is robust enough to handle generalizations of these problems to incorporate various side-constraints such as blocking plays and switching costs. This technique is also of independent interest for other restless bandit problems. By presenting the first (and efficient) O(1) approximations for non-trivial instances of restless bandits as well as of POMDPs, our work initiates the study of approximation algorithms in both these contexts.
In this paper, a sorting technique is presented that takes as input a data set whose primary key domain is known to the sorting algorithm, and works with an time efficiency of O(n+k), where k is the primary key domain. It is shown that the algorithm has applicability over a wide range of data sets. Later, a parallel formulation of the same is proposed and its effectiveness is argued. Though this algorithm is applicable over a wide range of general data sets, it finds special application (much superior to others) in places where sorting information that arrives in parts and in cases where input data is huge in size.
We study the online budgeted allocation (also called ADWORDS) problem, where a set of impressions arriving online are allocated to a set of budget-constrained advertisers to maximize revenue. Motivated by connections to Internet advertising, several variants of this problem have been studied since the seminal work of Mehta, Saberi, Vazirani, and Vazirani (FOCS 2005). However, this entire body of work focuses on a single budget for every advertising campaign, whereas in order to fully represent the actual agenda of an advertiser, an advertising budget should be expressible over multiple tiers of user-attribute granularity. A simple example is an advertising campaign that is constrained by an overall budget but is also accompanied by a set of sub-budgets for each target demographic. In such a contract scheme, an advertiser can specify their true user-targeting goals, allowing the publisher to fulfill them through relevant allocations. In this paper, we give a complete characterization of the ADWORDS problem for general advertising budgets. In the most general setting, we show that, unlike in the single-budget ADWORDS problem, obtaining a constant competitive ratio is impossible and give asymptotically tight upper and lower bounds. However for our main result, we observe that in many real-world scenarios (as in the above example), multi-tier budgets have a laminar structure, since most relevant consumer or product classifications are hierarchical. For laminar budgets, we obtain a competitive ratio of e/(e-1) in the small bids case, which matches the best known ADWORDS result for single budgets. Our algorithm has a primal-dual structure and generalizes the primal-dual analysis for single- budget ADWORDS first given by Buchbinder, Jain, and Naor (ESA 2007).
Given data stream $D = \\{p_1,p_2,...,p_m\\}$ of size $m$ of numbers from $\\{1,..., n\\}$, the frequency of $i$ is defined as $f_i = |\\{j: p_j = i\\}|$. The $k$-th \\emph{frequency moment} of $D$ is defined as $F_k = \\sum_{i=1}^n f_i^k$. We consider the problem of approximating frequency moments in insertion-only streams for $k\\ge 3$. For any constant $c$ we show an $O(n^{1-2/k}\\log(n)\\log^{(c)}(n))$ upper bound on the space complexity of the problem. Here $\\log^{(c)}(n)$ is the iterative $\\log$ function. To simplify the presentation, we make the following assumptions: $n$ and $m$ are polynomially far; approximation error $\\epsilon$ and parameter $k$ are constants. We observe a natural bijection between streams and special matrices. Our main technical contribution is a non-uniform sampling method on matrices. We call our method a \\emph{pick-and-drop sampling}; it samples a heavy element (i.e., element $i$ with frequency $\\Omega(F_k)$) with probability $\\Omega(1/n^{1-2/k})$ and gives approximation $\\tilde{f_i} \\ge (1-\\epsilon)f_i$. In addition, the estimations never exceed the real values, that is $ \\tilde{f_j} \\le f_j$ for all $j$. As a result, we reduce the space complexity of finding a heavy element to $O(n^{1-2/k}\\log(n))$ bits. We apply our method of recursive sketches and resolve the problem with $O(n^{1-2/k}\\log(n)\\log^{(c)}(n))$ bits.
We consider a natural generalization of the Partial Vertex Cover problem. Here an instance consists of a graph G = (V,E), a positive cost function c: V-> Z^{+}, a partition $P_1,..., P_r$ of the edge set $E$, and a parameter $k_i$ for each partition $P_i$. The goal is to find a minimum cost set of vertices which cover at least $k_i$ edges from the partition $P_i$. We call this the Partition Vertex Cover problem. In this paper, we give matching upper and lower bound on the approximability of this problem. Our algorithm is based on a novel LP relaxation for this problem. This LP relaxation is obtained by adding knapsack cover inequalities to a natural LP relaxation of the problem. We show that this LP has integrality gap of $O(log r)$, where $r$ is the number of sets in the partition of the edge set. We also extend our result to more general settings.
The 2010 Workshop on Algorithms for Modern Massive Data Sets (MMDS 2010) was held at Stanford University, June 15--18. The goals of MMDS 2010 were (1) to explore novel techniques for modeling and analyzing massive, high-dimensional, and nonlinearly-structured scientific and Internet data sets; and (2) to bring together computer scientists, statisticians, applied mathematicians, and data analysis practitioners to promote cross-fertilization of ideas. MMDS 2010 followed on the heels of two previous MMDS workshops. The first, MMDS 2006, addressed the complementary perspectives brought by the numerical linear algebra and theoretical computer science communities to matrix algorithms in modern informatics applications; and the second, MMDS 2008, explored more generally fundamental algorithmic and statistical challenges in modern large-scale data analysis.
We consider TSP with time windows and service time. In this problem we receive a sequence of requests for a service at nodes in a metric space and a time window for each request. The goal of the online algorithm is to maximize the number of requests served during their time window. The time to traverse an edge is the distance between the incident nodes of that edge. Serving a request requires unit time. We characterize the competitive ratio for each metric space separately. The competitive ratio depends on the relation between the minimum laxity (the minimum length of a time window) and the diameter of the metric space. Specifically, there is a constant competitive algorithm depending whether the laxity is larger or smaller than the diameter. In addition, we characterize the rate of convergence of the competitive ratio to $1$ as the laxity increases. Specifically, we provide a matching lower and upper bounds depending on the ratio between the laxity and the TSP of the metric space (the minimum distance to traverse all nodes). An application of our result improves the lower bound for colored packets with transition cost and matches the upper bound. In proving our lower bounds we use an interesting non-standard embedding with some special properties. This embedding may be interesting by its own.
A mobile robot represented by a point moving in the plane has to explore an unknown terrain with obstacles. Both the terrain and the obstacles are modeled as arbitrary polygons. We consider two scenarios: the unlimited vision, when the robot situated at a point p of the terrain explores (sees) all points q of the terrain for which the segment pq belongs to the terrain, and the limited vision, when we require additionally that the distance between p and q be at most 1. All points of the terrain (except obstacles) have to be explored and the performance of an exploration algorithm is measured by the length of the trajectory of the robot. For unlimited vision we show an exploration algorithm with complexity O(P + D?k), where P is the total perimeter of the terrain (including perimeters of obstacles), D is the diameter of the convex hull of the terrain, and k is the number of obstacles. We do not assume knowledge of these parameters. We also prove a matching lower bound showing that the above complexity is optimal, even if the terrain is known to the robot. For limited vision we show exploration algorithms with complexity O(P + A + ?Ak), where A is the area of the terrain (excluding obstacles). Our algorithms work either for arbitrary terrains, if one of the parameters A or k is known, or for c-fat terrains, where c is any constant (unknown to the robot) and no additional knowledge is assumed. (A terrain T with obstacles is c-fat if R/r ? c, where R is the radius of the smallest disc containing T and r is the radius of the largest disc contained in T .) We also prove a matching lower bound ?(P + A + ?Ak) on the complexity of exploration for limited vision, even if the terrain is known to the robot.
We propose the design and an implementation of a bulk-parallel external memory priority queue to take advantage of both shared-memory parallelism and high external memory transfer speeds to parallel disks. To achieve higher performance by decoupling item insertions and extractions, we offer two parallelization interfaces: one using \"bulk\" sequences, the other by defining \"limit\" items. In the design, we discuss how to parallelize insertions using multiple heaps, and how to calculate a dynamic prediction sequence to prefetch blocks and apply parallel multiway merge for extraction. Our experimental results show that in the selected benchmarks the priority queue reaches 75% of the full parallel I/O bandwidth of rotational disks and and 65% of SSDs, or the speed of sorting in external memory when bounded by computation.
Two mobile agents, starting from different nodes of an unknown network, have to meet at the same node. Agents move in synchronous rounds using a deterministic algorithm. Each agent has a different label, which it can use in the execution of the algorithm, but it does not know the label of the other agent. Agents do not know any bound on the size of the network. In each round an agent decides if it remains idle or if it wants to move to one of the adjacent nodes. Agents are subject to delay faults: if an agent incurs a fault in a given round, it remains in the current node, regardless of its decision. If it planned to move and the fault happened, the agent is aware of it. We consider three scenarios of fault distribution: random (independently in each round and for each agent with constant probability 0 < p < 1), unbounded adver- sarial (the adversary can delay an agent for an arbitrary finite number of consecutive rounds) and bounded adversarial (the adversary can delay an agent for at most c consecutive rounds, where c is unknown to the agents). The quality measure of a rendezvous algorithm is its cost, which is the total number of edge traversals. For random faults, we show an algorithm with cost polynomial in the size n of the network and polylogarithmic in the larger label L, which achieves rendezvous with very high probability in arbitrary networks. By contrast, for unbounded adversarial faults we show that rendezvous is not feasible, even in the class of rings. Under this scenario we give a rendezvous algorithm with cost O(nl), where l is the smaller label, working in arbitrary trees, and we show that \\Omega(l) is the lower bound on rendezvous cost, even for the two-node tree. For bounded adversarial faults, we give a rendezvous algorithm working for arbitrary networks, with cost polynomial in n, and logarithmic in the bound c and in the larger label L.
Recently, Marcus et al. (Bioinformatics 2014) proposed to use a compressed de Bruijn graph to describe the relationship between the genomes of many individuals/strains of the same or closely related species. They devised an $O(n \\log g)$ time algorithm called splitMEM that constructs this graph directly (i.e., without using the uncompressed de Bruijn graph) based on a suffix tree, where $n$ is the total length of the genomes and $g$ is the length of the longest genome. In this paper, we present a construction algorithm that outperforms their algorithm in theory and in practice. Moreover, we propose a new space-efficient representation of the compressed de Bruijn graph that adds the possibility to search for a pattern (e.g. an allele - a variant form of a gene) within the pan-genome.
We study the minimum cut problem in the presence of uncertainty and show how to apply a novel robust optimization approach, which aims to exploit the similarity in subsequent graph measurements or similar graph instances, without posing any assumptions on the way they have been obtained. With experiments we show that the approach works well when compared to other approaches that are also oblivious towards the relationship between the input datasets.
Two mobile agents starting at different nodes of an unknown network have to meet. This task is known in the literature as rendezvous. Each agent has a different label which is a positive integer known to it, but unknown to the other agent. Agents move in an asynchronous way: the speed of agents may vary and is controlled by an adversary. The cost of a rendezvous algorithm is the total number of edge traversals by both agents until their meeting. The only previous deterministic algorithm solving this problem has cost exponential in the size of the graph and in the larger label. In this paper we present a deterministic rendezvous algorithm with cost polynomial in the size of the graph and in the length of the smaller label. Hence we decrease the cost exponentially in the size of the graph and doubly exponentially in the labels of agents. As an application of our rendezvous algorithm we solve several fundamental problems involving teams of unknown size larger than 1 of labeled agents moving asynchronously in unknown networks. Among them are the following problems: team size, in which every agent has to find the total number of agents, leader election, in which all agents have to output the label of a single agent, perfect renaming in which all agents have to adopt new different labels from the set {1, . . . , k}, where k is the number of agents, and gossiping, in which each agent has initially a piece of information (value) and all agents have to output all the values. Using our rendezvous algorithm we solve all these problems at cost polynomial in the size of the graph and in the smallest length of all labels of participating agents.
We study a general stochastic probing problem defined on a universe V, where each element e in V is \"active\" independently with probability p_e. Elements have weights {w_e} and the goal is to maximize the weight of a chosen subset S of active elements. However, we are given only the p_e values-- to determine whether or not an element e is active, our algorithm must probe e. If element e is probed and happens to be active, then e must irrevocably be added to the chosen set S; if e is not active then it is not included in S. Moreover, the following conditions must hold in every random instantiation: (1) the set Q of probed elements satisfy an \"outer\" packing constraint, and (2) the set S of chosen elements satisfy an \"inner\" packing constraint. The kinds of packing constraints we consider are intersections of matroids and knapsacks. Our results provide a simple and unified view of results in stochastic matching and Bayesian mechanism design, and can also handle more general constraints. As an application, we obtain the first polynomial-time $\\Omega(1/k)$-approximate \"Sequential Posted Price Mechanism\" under k-matroid intersection feasibility constraints.
We present a novel approach to finding the $k$-sink on dynamic path networks with general edge capacities. Our first algorithm runs in $O(n \\log n + k^2 \\log^4 n)$ time, where $n$ is the number of vertices on the given path, and our second algorithm runs in $O(n \\log^3 n)$ time. Together, they improve upon the previously most efficient $O(kn \\log^2 n)$ time algorithm due to Arumugam et al. for all values of $k$. In the case where all the edges have the same capacity, we again present two algorithms that run in $O(n + k^2 \\log^2n)$ time and $O(n \\log n)$ time, respectively, and they together improve upon the previously best $O(kn)$ time algorithm due to Higashikawa et al. for all values of $k$.
Cost-efficient compressive sensing is challenging when facing large-scale data, {\\em i.e.}, data with large sizes. Conventional compressive sensing methods for large-scale data will suffer from low computational efficiency and massive memory storage. In this paper, we revisit well-known solvers called greedy algorithms, including Orthogonal Matching Pursuit (OMP), Subspace Pursuit (SP), Orthogonal Matching Pursuit with Replacement (OMPR). Generally, these approaches are conducted by iteratively executing two main steps: 1) support detection and 2) solving least square problem. To reduce the cost of Step 1, it is not hard to employ the sensing matrix that can be implemented by operator-based strategy instead of matrix-based one and can be speeded by fast Fourier Transform (FFT). Step 2, however, requires maintaining and calculating a pseudo-inverse of a sub-matrix, which is random and not structural, and, thus, operator-based matrix does not work. To overcome this difficulty, instead of solving Step 2 by a closed-form solution, we propose a fast and cost-effective least square solver, which combines a Conjugate Gradient (CG) method with our proposed weighted least square problem to iteratively approximate the ground truth yielded by a greedy algorithm. Extensive simulations and theoretical analysis validate that the proposed method is cost-efficient and is readily incorporated with the existing greedy algorithms to remarkably improve the performance for large-scale problems.
Rounding linear programs using techniques from discrepancy is a recent approach that has been very successful in certain settings. However this method also has some limitations when compared to approaches such as randomized and iterative rounding. We provide an extension of the discrepancy-based rounding algorithm due to Lovett-Meka that (i) combines the advantages of both randomized and iterated rounding, (ii) makes it applicable to settings with more general combinatorial structure such as matroids. As applications of this approach, we obtain new results for various classical problems such as linear system rounding, degree-bounded matroid basis and low congestion routing.
It was recently found that there are very close connections between the existence of additive spanners (subgraphs where all distances are preserved up to an additive stretch), distance preservers (subgraphs in which demand pairs have their distance preserved exactly), and pairwise spanners (subgraphs in which demand pairs have their distance preserved up to a multiplicative or additive stretch) [Abboud-Godwin SODA  16, Godwin-Williams SODA  16]. We study these problems from an optimization point of view, where rather than studying the existence of extremal instances we are given an instance and are asked to find the sparsest possible spanner/preserver. We give an $O(n^{3/5 + \\epsilon})$-approximation for distance preservers and pairwise spanners (for arbitrary constant $\\epsilon > 0$). This is the first nontrivial upper bound for either problem, both of which are known to be as hard to approximate as Label Cover. We also prove Label Cover hardness for approximating additive spanners, even for the cases of additive 1 stretch (where one might expect a polylogarithmic approximation, since the related multiplicative 2-spanner problem admits an $O(\\log n)$-approximation) and additive polylogarithmic stretch (where the related multiplicative spanner problem has an $O(1)$-approximation). Interestingly, the techniques we use in our approximation algorithm extend beyond distance-based problem to pure connectivity network design problems. In particular, our techniques allow us to give an $O(n^{3/5 + \\epsilon})$-approximation for the Directed Steiner Forest problem (for arbitrary constant $\\epsilon > 0$) when all edges have uniform costs, improving the previous best $O(n^{2/3 + \\epsilon})$-approximation due to Berman et al.~[ICALP  11] (which holds for general edge costs).
We consider the problem of discovering overlapping communities in networks which we model as generalizations of Graph Packing problems with overlap. We seek a collection $\\mathcal{S}  \\subseteq \\mathcal{S}$ consisting of at least $k$ sets subject to certain disjointness restrictions. In the $r$-Set Packing with $t$-Membership, each element of $\\mathcal{U}$ belongs to at most $t$ sets of $\\mathcal{S }$ while in $t$-Overlap each pair of sets in $\\mathcal{S }$ overlaps in at most $t$ elements. Each set of $\\mathcal{S}$ has at most $r$ elements. Similarly, both of our graph packing problems seek a collection $\\mathcal{K}$ of at least $k$ subgraphs in a graph $G$ each isomorphic to a graph $H \\in \\mathcal{H}$. In $\\mathcal{H}$-Packing with $t$-Membership, each vertex of $G$ belongs to at most $t$ subgraphs of $\\mathcal{K}$ while in $t$-Overlap each pair of subgraphs in $\\mathcal{K}$ overlaps in at most $t$ vertices. Each member of $\\mathcal{H}$ has at most $r$ vertices and $m$ edges. We show NP-Completeness results for all of our packing problems and we give a dichotomy result for the $\\mathcal{H}$-Packing with $t$-Membership problem analogous to the Kirkpatrick and Hell \\cite{Kirk78}. We reduce the $r$-Set Packing with $t$-Membership to a problem kernel with $O((r+1)^r k^{r})$ elements while we achieve a kernel with $O(r^r k^{r-t-1})$ elements for the $r$-Set Packing with $t$-Overlap. In addition, we reduce the $\\mathcal{H}$-Packing with $t$-Membership and its edge version to problem kernels with $O((r+1)^r k^{r})$ and $O((m+1)^{m} k^{{m}})$ vertices, respectively. On the other hand, we achieve kernels with $O(r^r k^{r-t-1})$ and $O(m^{m} k^{m-t-1})$ vertices for the $\\mathcal{H}$-Packing with $t$-Overlap and its edge version, respectively. In all cases, $k$ is the input parameter while $t$, $r$, and $m$ are constants.
Quite recently, the algorithmic community has focused on solving multiple shortest-path query problems beyond simple vertex-to-vertex queries, especially in the context of road networks. Unfortunately, this research cannot be generalized for large-scale graphs, e.g., social or collaboration networks, or to efficiently answer Reverse k-Nearest Neighbor (RkNN) queries, which are of practical relevance to a wide range of applications. To remedy this, we propose ReHub, a novel main-memory algorithm that extends the Hub Labeling technique to efficiently answer RkNN queries on large-scale networks. Our experimentation will show that ReHub is the best overall solution for this type of queries, requiring only minimal preprocessing and providing very fast query times.
We study approximation algorithms for several variants of the MaxCover problem, with the focus on algorithms that run in FPT time. In the MaxCover problem we are given a set N of elements, a family S of subsets of N, and an integer K. The goal is to find up to K sets from S that jointly cover (i.e., include) as many elements as possible. This problem is well-known to be NP-hard and, under standard complexity-theoretic assumptions, the best possible polynomial-time approximation algorithm has approximation ratio (1 - 1/e). We first consider a variant of MaxCover with bounded element frequencies, i.e., a variant where there is a constant p such that each element belongs to at most p sets in S. For this case we show that there is an FPT approximation scheme (i.e., for each B there is a B-approximation algorithm running in FPT time) for the problem of maximizing the number of covered elements, and a randomized FPT approximation scheme for the problem of minimizing the number of elements left uncovered (we take K to be the parameter). Then, for the case where there is a constant p such that each element belongs to at least p sets from S, we show that the standard greedy approximation algorithm achieves approximation ratio exactly (1-e^{-max(pK/|S|, 1)}). We conclude by considering an unrestricted variant of MaxCover, and show approximation algorithms that run in exponential time and combine an exact algorithm with a greedy approximation. Some of our results improve currently known results for MaxVertexCover.
Trees are fundamental data structure for many areas of computer science and system engineering. In this report, we show how to ensure eventual consistency of optimistically replicated trees. In optimistic replication, the different replicas of a distributed system are allowed to diverge but should eventually reach the same value if no more mutations occur. A new method to ensure eventual consistency is to design Conflict-free Replicated Data Types (CRDT). In this report, we design a collection of tree CRDT using existing set CRDTs. The remaining concurrency problems particular to tree data structure are resolved using one or two layers of correction algorithm. For each of these layer, we propose different and independent policies. Any combination of set CRDT and policies can be constructed, giving to the distributed application programmer the entire control of the behavior of the shared data in face of concurrent mutations. We also propose to order these trees by adding a positioning layer which is also independent to obtain a collection of ordered tree CRDTs.
We present two adaptive schemes for dynamically choosing the number of parallel instances in parallel evolutionary algorithms. This includes the choice of the offspring population size in a (1+$\\lambda$) EA as a special case. Our schemes are parameterless and they work in a black-box setting where no knowledge on the problem is available. Both schemes double the number of instances in case a generation ends without finding an improvement. In a successful generation, the first scheme resets the system to one instance, while the second scheme halves the number of instances. Both schemes provide near-optimal speed-ups in terms of the parallel time. We give upper bounds for the asymptotic sequential time (i.e., the total number of function evaluations) that are not larger than upper bounds for a corresponding non-parallel algorithm derived by the fitness-level method.
Makespan minimization in restricted assignment $(R|p_{ij}\\in \\{p_j, \\infty\\}|C_{\\max})$ is a classical problem in the field of machine scheduling. In a landmark paper in 1990 [8], Lenstra, Shmoys, and Tardos gave a 2-approximation algorithm and proved that the problem cannot be approximated within 1.5 unless P=NP. The upper and lower bounds of the problem have been essentially unimproved in the intervening 25 years, despite several remarkable successful attempts in some special cases of the problem [2,4,12] recently. In this paper, we consider a special case called graph-balancing with light hyper edges, where heavy jobs can be assigned to at most two machines while light jobs can be assigned to any number of machines. For this case, we present algorithms with approximation ratios strictly better than 2. Specifically, Two job sizes: Suppose that light jobs have weight $w$ and heavy jobs have weight $W$, and $w < W$. We give a $1.5$-approximation algorithm (note that the current 1.5 lower bound is established in an even more restrictive setting [1,3]). Indeed, depending on the specific values of $w$ and $W$, sometimes our algorithm guarantees sub-1.5 approximation ratios. Arbitrary job sizes: Suppose that $W$ is the largest given weight, heavy jobs have weights in the range of $(\\beta W, W]$, where $4/7\\leq \\beta < 1$, and light jobs have weights in the range of $(0,\\beta W]$. We present a $(5/3+\\beta/3)$-approximation algorithm. Our algorithms are purely combinatorial, without the need of solving a linear program as required in most other known approaches.
We introduce a novel algorithm for approximating the logarithm of the determinant of a symmetric positive definite (SPD) matrix. The algorithm is randomized and approximates the traces of a small number of matrix powers of a specially constructed matrix, using the method of Avron and Toledo~\\cite{AT11}. From a theoretical perspective, we present additive and relative error bounds for our algorithm. Our additive error bound works for any SPD matrix, whereas our relative error bound works for SPD matrices whose eigenvalues lie in the interval $(\\theta_1,1)$, with $0<\\theta_1<1$; the latter setting was proposed in~\\cite{icml2015_hana15}. From an empirical perspective, we demonstrate that a C++ implementation of our algorithm can approximate the logarithm of the determinant of large matrices very accurately in a matter of seconds.
The deviation of the observed frequency of a word $w$ from its expected frequency in a given sequence $x$ is used to determine whether or not the word is avoided. This concept is particularly useful in DNA linguistic analysis. The value of the standard deviation of $w$, denoted by $std(w)$, effectively characterises the extent of a word by its edge contrast in the context in which it occurs. A word $w$ of length $k>2$ is a $\\rho$-avoided word in $x$ if $std(w) \\leq \\rho$, for a given threshold $\\rho < 0$. Notice that such a word may be completely absent from $x$. Hence computing all such words na\\\"{\\i}vely can be a very time-consuming procedure, in particular for large $k$. In this article, we propose an $O(n)$-time and $O(n)$-space algorithm to compute all $\\rho$-avoided words of length $k$ in a given sequence $x$ of length $n$ over a fixed-sized alphabet. We also present a time-optimal $O(\\sigma n)$-time and $O(\\sigma n)$-space algorithm to compute all $\\rho$-avoided words (of any length) in a sequence of length $n$ over an alphabet of size $\\sigma$. Furthermore, we provide a tight asymptotic upper bound for the number of $\\rho$-avoided words and the expected length of the longest one. We make available an open-source implementation of our algorithm. Experimental results, using both real and synthetic data, show the efficiency of our implementation.
In a graph $G = (V,E)$, a vertex subset $S\\subseteq V(G)$ is said to be a dominating set of $G$ if every vertex not in $S$ is adjacent to a vertex in $S$. A dominating set $S$ of $G$ is called a paired-dominating set of $G$ if the induced subgraph $G[S]$ contains a perfect matching. In this paper, we propose an $O(n+m)$-time algorithm for the weighted paired-domination problem on block graphs using dynamic programming, which strengthens the results in [Theoret. Comput. Sci., 410(47--49):5063--5071, 2009] and [J. Comb. Optim., 19(4):457--470, 2010]. Moreover, the algorithm can be completed in $O(n)$ time if the block-cut-vertex structure of $G$ is given.
Cheeger s fundamental inequality states that any edge-weighted graph has a vertex subset $S$ such that its expansion (a.k.a. conductance) is bounded as follows: \\[ \\phi(S) \\defeq \\frac{w(S,\\bar{S})}{\\min \\set{w(S), w(\\bar{S})}} \\leq 2\\sqrt{\\lambda_2} \\] where $w$ is the total edge weight of a subset or a cut and $\\lambda_2$ is the second smallest eigenvalue of the normalized Laplacian of the graph. Here we prove the following natural generalization: for any integer $k \\in [n]$, there exist $ck$ disjoint subsets $S_1, ..., S_{ck}$, such that \\[ \\max_i \\phi(S_i) \\leq C \\sqrt{\\lambda_{k} \\log k} \\] where $\\lambda_i$ is the $i^{th}$ smallest eigenvalue of the normalized Laplacian and $c<1,C>0$ are suitable absolute constants. Our proof is via a polynomial-time algorithm to find such subsets, consisting of a spectral projection and a randomized rounding. As a consequence, we get the same upper bound for the small set expansion problem, namely for any $k$, there is a subset $S$ whose weight is at most a $\\bigO(1/k)$ fraction of the total weight and $\\phi(S) \\le C \\sqrt{\\lambda_k \\log k}$. Both results are the best possible up to constant factors. The underlying algorithmic problem, namely finding $k$ subsets such that the maximum expansion is minimized, besides extending sparse cuts to more than one subset, appears to be a natural clustering problem in its own right.
Estimating the number of triangles in graph streams using a limited amount of memory has become a popular topic in the last decade. Different variations of the problem have been studied, depending on whether the graph edges are provided in an arbitrary order or as incidence lists. However, with a few exceptions, the algorithms have considered {\\em insert-only} streams. We present a new algorithm estimating the number of triangles in {\\em dynamic} graph streams where edges can be both inserted and deleted. We show that our algorithm achieves better time and space complexity than previous solutions for various graph classes, for example sparse graphs with a relatively small number of triangles. Also, for graphs with constant transitivity coefficient, a common situation in real graphs, this is the first algorithm achieving constant processing time per edge. The result is achieved by a novel approach combining sampling of vertex triples and sparsification of the input graph. In the course of the analysis of the algorithm we present a lower bound on the number of pairwise independent 2-paths in general graphs which might be of independent interest. At the end of the paper we discuss lower bounds on the space complexity of triangle counting algorithms that make no assumptions on the structure of the graph.
The greedy spanner is arguably the simplest and most well-studied spanner construction. Experimental results demonstrate that it is at least as good as any other spanner construction, in terms of both the size and weight parameters. However, a rigorous proof for this statement has remained elusive. In this work we fill in the theoretical gap via a surprisingly simple observation: The greedy spanner is \\emph{existentially optimal} (or existentially near-optimal) for several important graph families. Focusing on the weight parameter, the state-of-the-art spanner constructions for both general graphs (due to Chechik and Wulff-Nilsen [SODA 16]) and doubling metrics (due to Gottlieb [FOCS 15]) are complex. Plugging our observation on these results, we conclude that the greedy spanner achieves near-optimal weight guarantees for both general graphs and doubling metrics, thus resolving two longstanding conjectures in the area. Further, we observe that approximate-greedy algorithms are existentially near-optimal as well. Consequently, we provide an $O(n \\log n)$-time construction of $(1+\\epsilon)$-spanners for doubling metrics with constant lightness and degree. Our construction improves Gottlieb s construction, whose runtime is $O(n \\log^2 n)$ and whose number of edges and degree are unbounded, and remarkably, it matches the state-of-the-art Euclidean result (due to Gudmundsson et al. [SICOMP 02]) in all the involved parameters (up to dependencies on $\\epsilon$ and the dimension).
In this paper, we provide faster algorithms for computing various fundamental quantities associated with random walks on a directed graph, including the stationary distribution, personalized PageRank vectors, hitting times, and escape probabilities. In particular, on a directed graph with $n$ vertices and $m$ edges, we show how to compute each quantity in time $\\tilde{O}(m^{3/4}n+mn^{2/3})$, where the $\\tilde{O}$ notation suppresses polylogarithmic factors in $n$, the desired accuracy, and the appropriate condition number (i.e. the mixing time or restart probability). Our result improves upon the previous fastest running times for these problems; previous results either invoke a general purpose linear system solver on a $n\\times n$ matrix with $m$ non-zero entries, or depend polynomially on the desired error or natural condition number associated with the problem (i.e. the mixing time or restart probability). For sparse graphs, we obtain a running time of $\\tilde{O}(n^{7/4})$, breaking the $O(n^{2})$ barrier of the best running time one could hope to achieve using fast matrix multiplication. We achieve our result by providing a similar running time improvement for solving directed Laplacian systems, a natural directed or asymmetric analog of the well studied symmetric or undirected Laplacian systems. We show how to solve such systems in time $\\tilde{O}(m^{3/4}n+mn^{2/3})$, and efficiently reduce a broad range of problems to solving $\\tilde{O}(1)$ directed Laplacian systems on Eulerian graphs. We hope these results and our analysis open the door for further study into directed spectral graph theory.
The dictionary matching problem preprocesses a set of patterns and finds all occurrences of each of the patterns in a text when it is provided. We focus on the dynamic setting, in which patterns can be inserted to and removed from the dictionary, without reprocessing the entire dictionary. This article presents the first algorithm that performs \\emph{dynamic} dictionary matching on two-dimensional data within small space. The time complexity of our algorithm is almost linear. The only slowdown is incurred by querying the compressed self-index that replaces the dictionary. The dictionary is updated in time proportional to the size of the pattern that is being inserted to or removed from the dictionary. Our algorithm is suitable for rectangular patterns that are of uniform size in one dimension.
Recently, Holt and McMillan [Bionformatics 2014, ACM-BCB 2014] have proposed a simple and elegant algorithm to merge the Burrows-Wheeler transforms of a family of strings. In this paper we show that the H&M algorithm can be improved so that, in addition to merging the BWTs, it can also merge the Longest Common Prefix (LCP) arrays. The new algorithm, called Gap because of how it operates, has the same asymptotic cost as the H&M algorithm and requires additional space only for storing the LCP values.
In the classical (min-cost) Steiner tree problem, we are given an edge-weighted undirected graph and a set of terminal nodes. The goal is to compute a min-cost tree S which spans all terminals. In this paper we consider the min-power version of the problem, which is better suited for wireless applications. Here, the goal is to minimize the total power consumption of nodes, where the power of a node v is the maximum cost of any edge of S incident to v. Intuitively, nodes are antennas (part of which are terminals that we need to connect) and edge costs define the power to connect their endpoints via bidirectional links (so as to support protocols with ack messages). Differently from its min-cost counterpart, min-power Steiner tree is NP-hard even in the spanning tree case, i.e. when all nodes are terminals. Since the power of any tree is within once and twice its cost, computing a rho \\leq ln(4)+eps [Byrka et al. 10] approximate min-cost Steiner tree provides a 2rho<2.78 approximation for the problem. For min-power spanning tree the same approach provides a 2 approximation, which was improved to 5/3+eps with a non-trivial approach in [Althaus et al. 06]. Here we present an improved approximation algorithm for min-power Steiner tree. Our result is based on two main ingredients. We prove the first decomposition theorem for min-power Steiner tree, in the spirit of analogous structural results for min-cost Steiner tree and min-power spanning tree. Based on this theorem, we define a proper LP relaxation, that we exploit within the iterative randomized rounding framework in [Byrka et al. 10]. A careful analysis provides a 3ln 4-9/4+eps<1.91 approximation factor. The same approach gives an improved 1.5+eps approximation for min-power spanning tree as well, matching the approximation factor in [Nutov and Yaroshevitch 09] for the special case of min-power spanning tree with edge weights in {0,1}.
Least squares approximation is a technique to find an approximate solution to a system of linear equations that has no exact solution. In a typical setting, one lets $n$ be the number of constraints and $d$ be the number of variables, with $n \\gg d$. Then, existing exact methods find a solution vector in $O(nd^2)$ time. We present two randomized algorithms that provide very accurate relative-error approximations to the optimal value and the solution vector of a least squares approximation problem more rapidly than existing exact algorithms. Both of our algorithms preprocess the data with the Randomized Hadamard Transform. One then uniformly randomly samples constraints and solves the smaller problem on those constraints, and the other performs a sparse random projection and solves the smaller problem on those projected coordinates. In both cases, solving the smaller problem provides relative-error approximations, and, if $n$ is sufficiently larger than $d$, the approximate solution can be computed in $O(nd \\log d)$ time.
The NP-hard EFFECTORS problem on directed graphs is motivated by applications in network mining, particularly concerning the analysis of probabilistic information-propagation processes in social networks. In the corresponding model the arcs carry probabilities and there is a probabilistic diffusion process activating nodes by neighboring activated nodes with probabilities as specified by the arcs. The point is to explain a given network activation state as well as possible by using a minimum number of \"effector nodes\"; these are selected before the activation process starts. We correct, complement, and extend previous work from the data mining community by a more thorough computational complexity analysis of EFFECTORS, identifying both tractable and intractable cases. To this end, we also exploit a parameterization measuring the \"degree of randomness\" (the number of \"really\" probabilistic arcs) which might prove useful for analyzing other probabilistic network diffusion problems as well.
In this paper we present a practical solution with performance guarantees to the problem of dimensionality reduction for very large scale sparse matrices. We show applications of our approach to computing the low rank approximation (reduced SVD) of such matrices. Our solution uses coresets, which is a subset of $O(k/\\eps^2)$ scaled rows from the $n\\times d$ input matrix, that approximates the sub of squared distances from its rows to every $k$-dimensional subspace in $\\REAL^d$, up to a factor of $1\\pm\\eps$. An open theoretical problem has been whether we can compute such a coreset that is independent of the input matrix and also a weighted subset of its rows. %An open practical problem has been whether we can compute a non-trivial approximation to the reduced SVD of very large databases such as the Wikipedia document-term matrix in a reasonable time. We answer this question affirmatively. % and demonstrate an algorithm that efficiently computes a low rank approximation of the entire English Wikipedia. Our main technical result is a novel technique for deterministic coreset construction that is based on a reduction to the problem of $\\ell_2$ approximation for item frequencies.
We explore various techniques to compress a permutation $\\pi$ over n integers, taking advantage of ordered subsequences in $\\pi$, while supporting its application $\\pi$(i) and the application of its inverse $\\pi^{-1}(i)$ in small time. Our compression schemes yield several interesting byproducts, in many cases matching, improving or extending the best existing results on applications such as the encoding of a permutation in order to support iterated applications $\\pi^k(i)$ of it, of integer functions, and of inverted lists and suffix arrays.
Lattice data structures are space efficient and cache-suitable data structures. The basic searching, insertion, and deletion operations are of time complexity $O(\\sqrt{N})$. We give a jump searching algorithm of time complexity $O(J(L)\\log(N))$, where $J(L)$ is the jump factor of the lattice. $J(L)$ approaches $4$ when the degree of sortedness of the lattice approaches $\\sqrt{N}$. A sorting procedure of time complexity $O(\\sqrt{N})$ that can be used, during the system idle time, to increase the degree of sortedness of the lattice is given.
Analyzing networks requires complex algorithms to extract meaningful information. Centrality metrics have shown to be correlated with the importance and loads of the nodes in network traffic. Here, we are interested in the problem of centrality-based network management. The problem has many applications such as verifying the robustness of the networks and controlling or improving the entity dissemination. It can be defined as finding a small set of topological network modifications which yield a desired closeness centrality configuration. As a fundamental building block to tackle that problem, we propose incremental algorithms which efficiently update the closeness centrality values upon changes in network topology, i.e., edge insertions and deletions. Our algorithms are proven to be efficient on many real-life networks, especially on small-world networks, which have a small diameter and a spike-shaped shortest distance distribution. In addition to closeness centrality, they can also be a great arsenal for the shortest-path-based management and analysis of the networks. We experimentally validate the efficiency of our algorithms on large networks and show that they update the closeness centrality values of the temporal DBLP-coauthorship network of 1.2 million users 460 times faster than it would take to compute them from scratch. To the best of our knowledge, this is the first work which can yield practical large-scale network management based on closeness centrality values.
We study the problem of releasing $k$-way marginals of a database $D \\in (\\{0,1\\}^d)^n$, while preserving differential privacy. The answer to a $k$-way marginal query is the fraction of $D$ s records $x \\in \\{0,1\\}^d$ with a given value in each of a given set of up to $k$ columns. Marginal queries enable a rich class of statistical analyses of a dataset, and designing efficient algorithms for privately releasing marginal queries has been identified as an important open problem in private data analysis (cf. Barak et. al., PODS  07). We give an algorithm that runs in time $d^{O(\\sqrt{k})}$ and releases a private summary capable of answering any $k$-way marginal query with at most $\\pm .01$ error on every query as long as $n \\geq d^{O(\\sqrt{k})}$. To our knowledge, ours is the first algorithm capable of privately releasing marginal queries with non-trivial worst-case accuracy guarantees in time substantially smaller than the number of $k$-way marginal queries, which is $d^{\\Theta(k)}$ (for $k \\ll d$).
Let G=(V,E)(|V|=n and |E|=m) be an undirected graph with positive edge weights. Let P_{G}(s, t) be a shortest s-t path in G. Let l be the number of edges in P_{G}(s, t). The \\emph{Edge Replacement Path} problem is to compute a shortest s-t path in G\\{e}, for every edge e in P_{G}(s, t). The \\emph{Node Replacement Path} problem is to compute a shortest s-t path in G\\{v}, for every vertex v in P_{G}(s, t). In this paper we present an O(T_{SPT}(G)+m+l^2) time and O(m+l^2) space algorithm for both the problems. Where, T_{SPT}(G) is the asymptotic time to compute a single source shortest path tree in G. The proposed algorithm is simple and easy to implement.
The longest common extension problem (LCE problem) is to construct a data structure for an input string $T$ of length $n$ that supports LCE$(i,j)$ queries. Such a query returns the length of the longest common prefix of the suffixes starting at positions $i$ and $j$ in $T$. This classic problem has a well-known solution that uses $O(n)$ space and $O(1)$ query time. In this paper we show that for any trade-off parameter $1 \\leq \\tau \\leq n$, the problem can be solved in $O(\\frac{n}{\\tau})$ space and $O(\\tau)$ query time. This significantly improves the previously best known time-space trade-offs, and almost matches the best known time-space product lower bound.
Blelloch and Farzan (2010) showed how we can represent succinctly any planar embedding of a connected planar simple graph while still supporting constant-time navigation queries, but their representation does not allow multi-edges. Other authors have shown how to represent any connected planar multigraph compactly while supporting fast navigation, but not with an arbitrary planar embedding of such a graph. In this paper we show how we can represent any given planar embedding of any connected planar (multi)graph using asymptotically four bits per edge such that later we can list the edges incident to any vertex in counter-clockwise order using constant time per edge, and determine whether two vertices are neighbours or find a vertex s degree in almost constant time.
Given a pair of distinct vertices u, v in a graph G, we say that s is a junction of u, v if there are in G internally vertex disjoint directed paths from s to u and from s to v. We show how to characterize junctions in directed acyclic graphs. We also consider the two problems in the following and derive efficient algorithms to solve them. Given a directed acyclic graph G and a vertex s in G, how can we find all pairs of vertices of G such that s is a junction of them? And given a directed acyclic graph G and k pairs of vertices of G, how can we preprocess G such that all junctions of k given pairs of vertices could be listed quickly? All junctions of k pairs problem arises in an application in Anthropology and we apply our algorithm to find such junctions on kinship networks of some brazilian indian ethnic groups.
Abelian string matching problems are becoming an object of considerable interest in last years. Very recently, Alatabbi et al. \\cite{AILR2015} presented the first solution for the longest common Abelian factor problem for a pair of strings, reaching $O(\\sigma n^2)$ time with $O(\\sigma n \\log n)$ bits of space, where $n$ is the length of the strings and $\\sigma$ is the alphabet size. In this note we show how the time complexity can be preserved while the space is reduced by a factor of $\\sigma$, and then how the time complexity can be improved, if the alphabet is not too small, when superlinear space is allowed.
We investigate the problem of computing a minimum set of solutions that approximates within a specified accuracy $\\epsilon$ the Pareto curve of a multiobjective optimization problem. We show that for a broad class of bi-objective problems (containing many important widely studied problems such as shortest paths, spanning tree, and many others), we can compute in polynomial time an $\\epsilon$-Pareto set that contains at most twice as many solutions as the minimum such set. Furthermore we show that the factor of 2 is tight for these problems, i.e., it is NP-hard to do better. We present upper and lower bounds for three or more objectives, as well as for the dual problem of computing a specified number $k$ of solutions which provide a good approximation to the Pareto curve.
Recursive partitioning is the core of several statistical methods including CART, random forest, and boosted trees. Despite the popularity of tree based methods, to date, there did not exist methods for combining multiple trees into a single tree, or methods for systematically quantifying the discrepancy between two trees. Taking advantage of the recursive structure in trees we formulated fast algorithms for computing affine combinations, distances and correlations in a vector subspace of recursive partition functions.
We study the problem of abstracting a table of data about individuals so that no selection query can identify fewer than k individuals. We show that it is impossible to achieve arbitrarily good polynomial-time approximations for a number of natural variations of the generalization technique, unless P = NP, even when the table has only a single quasi-identifying attribute that represents a geographic or unordered attribute: Zip-codes: nodes of a planar graph generalized into connected subgraphs GPS coordinates: points in R2 generalized into non-overlapping rectangles Unordered data: text labels that can be grouped arbitrarily. In addition to impossibility results, we provide approximation algorithms for these difficult single-attribute generalization problems, which, of course, apply to multiple-attribute instances with one that is quasi-identifying. We show theoretically and experimentally that our approximation algorithms can come reasonably close to optimal solutions. Incidentally, the generalization problem for unordered data can be viewed as a novel type of bin packing problem--min-max bin covering--which may be of independent interest.
Engineering efficient implementations of compact and succinct structures is a time-consuming and challenging task, since there is no standard library of easy-to- use, highly optimized, and composable components. One consequence is that measuring the practical impact of new theoretical proposals is a difficult task, since older base- line implementations may not rely on the same basic components, and reimplementing from scratch can be very time-consuming. In this paper we present a framework for experimentation with succinct data structures, providing a large set of configurable components, together with tests, benchmarks, and tools to analyze resource requirements. We demonstrate the functionality of the framework by recomposing succinct solutions for document retrieval.
We present a new data structure called the \\emph{Compressed Random Access Memory} (CRAM) that can store a dynamic string $T$ of characters, e.g., representing the memory of a computer, in compressed form while achieving asymptotically almost-optimal bounds (in terms of empirical entropy) on the compression ratio. It allows short substrings of $T$ to be decompressed and retrieved efficiently and, significantly, characters at arbitrary positions of $T$ to be modified quickly during execution \\emph{without decompressing the entire string}. This can be regarded as a new type of data compression that can update a compressed file directly. Moreover, at the cost of slightly increasing the time spent per operation, the CRAM can be extended to also support insertions and deletions. Our key observation that the empirical entropy of a string does not change much after a small change to the string, as well as our simple yet efficient method for maintaining an array of variable-length blocks under length modifications, may be useful for many other applications as well.
Online Bin Stretching is a semi-online variant of bin packing in which the algorithm has to use the same number of bins as an optimal packing, but is allowed to slightly overpack the bins. The goal is to minimize the amount of overpacking, i.e., the maximum size packed into any bin. We give an algorithm for Online Bin Stretching with a stretching factor of $11/8 = 1.375$ for three bins. Additionally, we present a lower bound of $45/33 = 1.\\overline{36}$ for Online Bin Stretching on three bins and a lower bound of $19/14$ for four and five bins that were discovered using a computer search.
We study the problem of efficiently correcting an erroneous product of two $n\\times n$ matrices over a ring. Among other things, we provide a randomized algorithm for correcting a matrix product with at most $k$ erroneous entries running in $\\tilde{O}(n^2+kn)$ time and a deterministic $\\tilde{O}(kn^2)$-time algorithm for this problem (where the notation $\\tilde{O}$ suppresses polylogarithmic terms in $n$ and $k$).
We give the first L_1-sketching algorithm for integer vectors which produces nearly optimal sized sketches in nearly linear time. This answers the first open problem in the list of open problems from the 2006 IITK Workshop on Algorithms for Data Streams. Specifically, suppose Alice receives a vector x in {-M,...,M}^n and Bob receives y in {-M,...,M}^n, and the two parties share randomness. Each party must output a short sketch of their vector such that a third party can later quickly recover a (1 +/- eps)-approximation to ||x-y||_1 with 2/3 probability given only the sketches. We give a sketching algorithm which produces O(eps^{-2}log(1/eps)log(nM))-bit sketches in O(n*log^2(nM)) time, independent of eps. The previous best known sketching algorithm for L_1 is due to [Feigenbaum et al., SICOMP 2002], which achieved the optimal sketch length of O(eps^{-2}log(nM)) bits but had a running time of O(n*log(nM)/eps^2). Notice that our running time is near-linear for every eps, whereas for sufficiently small values of eps, the running time of the previous algorithm can be as large as quadratic. Like their algorithm, our sketching procedure also yields a small-space, one-pass streaming algorithm which works even if the entries of x,y are given in arbitrary order.
Recent advances in random linear systems on finite fields have paved the way for the construction of constant-time data structures representing static functions and minimal perfect hash functions using less space with respect to existing techniques. The main obstruction for any practical application of these results is the cubic-time Gaussian elimination required to solve these linear systems: despite they can be made very small, the computation is still too slow to be feasible. In this paper we describe in detail a number of heuristics and programming techniques to speed up the resolution of these systems by several orders of magnitude, making the overall construction competitive with the standard and widely used MWHC technique, which is based on hypergraph peeling. In particular, we introduce broadword programming techniques for fast equation manipulation and a lazy Gaussian elimination algorithm. We also describe a number of technical improvements to the data structure which further reduce space usage and improve lookup speed. Our implementation of these techniques yields a minimal perfect hash function data structure occupying 2.24 bits per element, compared to 2.68 for MWHC-based ones, and a static function data structure which reduces the multiplicative overhead from 1.23 to 1.03.
A dominating induced matching, also called an efficient edge domination, of a graph $G=(V,E)$ with $n=|V|$ vertices and $m=|E|$ edges is a subset $F \\subseteq E$ of edges in the graph such that no two edges in $F$ share a common endpoint and each edge in $E\\setminus F$ is incident with exactly one edge in $F$. It is NP-hard to decide whether a graph admits a dominating induced matching or not. In this paper, we design a $1.1467^nn^{O(1)}$-time exact algorithm for this problem, improving all previous results. This problem can be redefined as a partition problem that is to partition the vertex set of a graph into two parts $I$ and $F$, where $I$ induces an independent set (a 0-regular graph) and $F$ induces a perfect matching (a 1-regular graph). After giving several structural properties of the problem, we show that the problem always contains some \"good vertices\", branching on which by including them to either $I$ or $F$ we can effectively reduce the graph. This leads to a fast exact algorithm to this problem.
A problem studied in Systems Biology is how to find shortest paths in metabolic networks. Unfortunately, simple (i.e., graph theoretic) shortest paths do not properly reflect biochemical facts. An approach to overcome this issue is to use edge labels and search for paths with distinct labels. In this paper, we show that such biologically feasible shortest paths are hard to compute. Moreover, we present solutions to find such paths in networks in reasonable time.
We present two on-line algorithms for maintaining a topological order of a directed $n$-vertex acyclic graph as arcs are added, and detecting a cycle when one is created. Our first algorithm handles $m$ arc additions in $O(m^{3/2})$ time. For sparse graphs ($m/n = O(1)$), this bound improves the best previous bound by a logarithmic factor, and is tight to within a constant factor among algorithms satisfying a natural {\\em locality} property. Our second algorithm handles an arbitrary sequence of arc additions in $O(n^{5/2})$ time. For sufficiently dense graphs, this bound improves the best previous bound by a polynomial factor. Our bound may be far from tight: we show that the algorithm can take $\\Omega(n^2 2^{\\sqrt{2\\lg n}})$ time by relating its performance to a generalization of the $k$-levels problem of combinatorial geometry. A completely different algorithm running in $\\Theta(n^2 \\log n)$ time was given recently by Bender, Fineman, and Gilbert. We extend both of our algorithms to the maintenance of strong components, without affecting the asymptotic time bounds.
In this paper we consider two above lower bound parameterizations of the Node Multiway Cut problem - above the maximum separating cut and above a natural LP-relaxation - and prove them to be fixed-parameter tractable. Our results imply O*(4^k) algorithms for Vertex Cover above Maximum Matching and Almost 2-SAT as well as an O*(2^k) algorithm for Node Multiway Cut with a standard parameterization by the solution size, improving previous bounds for these problems.
We consider the classical problem of minimizing the total weighted flow-time for unrelated machines in the online \\emph{non-clairvoyant} setting. In this problem, a set of jobs $J$ arrive over time to be scheduled on a set of $M$ machines. Each job $j$ has processing length $p_j$, weight $w_j$, and is processed at a rate of $\\ell_{ij}$ when scheduled on machine $i$. The online scheduler knows the values of $w_j$ and $\\ell_{ij}$ upon arrival of the job, but is not aware of the quantity $p_j$. We present the {\\em first} online algorithm that is {\\em scalable} ($(1+\\eps)$-speed $O(\\frac{1}{\\epsilon^2})$-competitive for any constant $\\eps > 0$) for the total weighted flow-time objective. No non-trivial results were known for this setting, except for the most basic case of identical machines. Our result resolves a major open problem in online scheduling theory. Moreover, we also show that no job needs more than a logarithmic number of migrations. We further extend our result and give a scalable algorithm for the objective of minimizing total weighted flow-time plus energy cost for the case of unrelated machines and obtain a scalable algorithm. The key algorithmic idea is to let jobs migrate selfishly until they converge to an equilibrium. Towards this end, we define a game where each job s utility which is closely tied to the instantaneous increase in the objective the job is responsible for, and each machine declares a policy that assigns priorities to jobs based on when they migrate to it, and the execution speeds. This has a spirit similar to coordination mechanisms that attempt to achieve near optimum welfare in the presence of selfish agents (jobs). To the best our knowledge, this is the first work that demonstrates the usefulness of ideas from coordination mechanisms and Nash equilibria for designing and analyzing online algorithms.
In the paper we consider the problem of scheduling $n$ identical jobs on 4 uniform machines with speeds $s_1 \\geq s_2 \\geq s_3 \\geq s_4,$ respectively. Our aim is to find a schedule with a minimum possible length. We assume that jobs are subject to some kind of mutual exclusion constraints modeled by a bipartite incompatibility graph of degree $\\Delta$, where two incompatible jobs cannot be processed on the same machine. We show that the problem is NP-hard even if $s_1=s_2=s_3$. If, however, $\\Delta \\leq 4$ and $s_1 \\geq 12 s_2$, $s_2=s_3=s_4$, then the problem can be solved to optimality in time $O(n^{1.5})$. The same algorithm returns a solution of value at most 2 times optimal provided that $s_1 \\geq 2s_2$. Finally, we study the case $s_1 \\geq s_2 \\geq s_3=s_4$ and give an $O(n^{1.5})$-time $32/15$-approximation algorithm in all such situations.
We consider the Fault-Tolerant Facility Placement problem ($FTFP$), which is a generalization of the classical Uncapacitated Facility Location problem ($UFL$). In the $FTFP$ problem we have a set of clients $C$ and a set of facilities $F$. Each facility $i \\in F$ can be opened many times. For each opening of facility $i$ we pay $f_i \\geq 0$. Our goal is to connect each client $j \\in C$ with $r_j \\geq 1$ open facilities in a way that minimizes the total cost of open facilities and established connections. In a series of recent papers $FTFP$ was essentially reduced to $FTFL$ and then to $UFL$ showing it could be approximated with ratio $1.575$. In this paper we show that $FTFP$ can actually be approximated even better. We consider approximation ratio as a function of $r = min_{j \\in C} r_j$ (minimum requirement of a client). With increasing $r$ the approximation ratio of our algorithm $\\lambda_r$ converges to one. Furthermore, for $r > 1$ the value of $\\lambda_r$ is less than 1.463 (hardness of approximation of $UFL$). We also show a lower bound of 1.278 for the approximability of the Fault-Tolerant Facility Location problem ($FTFL$) for arbitrary $r$. Already for $r > 3$ we obtain that $FTFP$ can be approximated with ratio 1.275, showing that under standard complexity theoretic assumptions $FTFP$ is strictly better approximable than $FTFL$.
The problem of maximizing a non-negative submodular function was introduced by Feige, Mirrokni, and Vondrak [FOCS 07] who provided a deterministic local-search based algorithm that guarantees an approximation ratio of $\\frac 1 3$, as well as a randomized $\\frac 2 5$-approximation algorithm. An extensive line of research followed and various algorithms with improving approximation ratios were developed, all of them are randomized. Finally, Buchbinder et al. [FOCS 12] presented a randomized $\\frac 1 2$-approximation algorithm, which is the best possible. This paper gives the first deterministic algorithm for maximizing a non-negative submodular function that achieves an approximation ratio better than $\\frac 1 3$. The approximation ratio of our algorithm is $\\frac 2 5$. Our algorithm is based on recursive composition of solutions obtained by the local search algorithm of Feige et al. We show that the $\\frac 2 5$ approximation ratio can be guaranteed when the recursion depth is $2$, and leave open the question of whether the approximation ratio improves as the recursion depth increases.
In the standard set reconciliation problem, there are two parties $A_1$ and $A_2$, each respectively holding a set of elements $S_1$ and $S_2$. The goal is for both parties to obtain the union $S_1 \\cup S_2$. In many distributed computing settings the sets may be large but the set difference $|S_1-S_2|+|S_2-S_1|$ is small. In these cases one aims to achieve reconciliation efficiently in terms of communication; ideally, the communication should depend on the size of the set difference, and not on the size of the sets. Recent work has considered generalizations of the reconciliation problem to multi-party settings, using a framework based on a specific type of linear sketch called an Invertible Bloom Lookup Table. Here, we consider multi-party set reconciliation using the alternative framework of characteristic polynomials, which have previously been used for efficient pairwise set reconciliation protocols, and compare their performance with Invertible Bloom Lookup Tables for these problems.
Matrix multiplication (hereafter we use the acronym MM) is among the most fundamental operations of modern computations. The efficiency of its performance depends on various factors, in particular vectorization, data movement and arithmetic complexity of the computations, but here we focus just on the study of the arithmetic cost and the impact of this study on other areas of modern computing. In the early 1970s it was expected that the straightforward cubic time algorithm for MM will soon be accelerated to enable MM in nearly quadratic arithmetic time, with some far fetched implications. While pursuing this goal the mainstream research had its focus on the decrease of the classical exponent 3 of the complexity of MM towards its lower bound 2, disregarding the growth of the input size required to support this decrease. Eventually, surprising combinations of novel ideas and sophisticated techniques enabled the decrease of the exponent to its benchmark value of about 2.38, but the supporting MM algorithms improved the straightforward one only for the inputs of immense sizes. Meanwhile, the communication complexity, rather than the arithmetic complexity, has become the bottleneck of computations in linear algebra. This development may seem to undermine the value of the past and future research aimed at the decrease of the arithmetic cost of MM, but we feel that the study should be reassessed rather than closed and forgotten. We review the old and new work in this area in the present day context, recall some major techniques introduced in the study of MM, discuss their impact on the modern theory and practice of computations for MM and beyond MM, and link one of these techniques to some simple algorithms for inner product and summation.
Large data sets are increasingly common in cloud and virtualized environments. For example, transfers of multiple gigabytes are commonplace, as are replicated blocks of such sizes. There is a need for fast error-correction or data reconciliation in such settings even when the expected number of errors is small. Motivated by such cloud reconciliation problems, we consider error-correction schemes designed for large data, after explaining why previous approaches appear unsuitable. We introduce Biff codes, which are based on Bloom filters and are designed for large data. For Biff codes with a message of length $L$ and $E$ errors, the encoding time is $O(L)$, decoding time is $O(L + E)$ and the space overhead is $O(E)$. Biff codes are low-density parity-check codes; they are similar to Tornado codes, but are designed for errors instead of erasures. Further, Biff codes are designed to be very simple, removing any explicit graph structures and based entirely on hash tables. We derive Biff codes by a simple reduction from a set reconciliation algorithm for a recently developed data structure, invertible Bloom lookup tables. While the underlying theory is extremely simple, what makes this code especially attractive is the ease with which it can be implemented and the speed of decoding. We present results from a prototype implementation that decodes messages of 1 million words with thousands of errors in well under a second.
Vehicle (bike or car) sharing represents an emerging transportation scheme which may comprise an important link in the green mobility chain of smart city environments. This chapter offers a comprehensive review of algorithmic approaches for the design and management of vehicle sharing systems. Our focus is on one-way vehicle sharing systems (wherein customers are allowed to pick-up a vehicle at any location and return it to any other station) which best suits typical urban journey requirements. Along this line, we present methods dealing with the so-called asymmetric demand-offer problem (i.e. the unbalanced offer and demand of vehicles) typically experienced in one-way sharing systems which severely affects their economic viability as it implies that considerable human (and financial) resources should be engaged in relocating vehicles to satisfy customer demand. The chapter covers all planning aspects that affect the effectiveness and viability of vehicle sharing systems: the actual system design (e.g. number and location of vehicle station facilities, vehicle fleet size, vehicles distribution among stations); customer incentivisation schemes to motivate customer-based distribution of bicycles/cars (such schemes offer meaningful incentives to users so as to leave their vehicle to a station different to that originally intended and satisfy future user demand); cost-effective solutions to schedule operator-based repositioning of bicycles/cars (by employees explicitly enrolled in vehicle relocation) based on the current and future (predicted) demand patterns (operator-based and customer-based relocation may be thought as complementary methods to achieve the intended distribution of vehicles among stations).
In this paper I present a conjecture for a recursive algorithm that finds each permutation of combining two sets of objects (AKA the Shuffle Product). This algorithm provides an efficient way to navigate this problem, as each atomic operation yields a permutation of the union. The permutations of the union of the two sets are represented as binary integers which are then manipulated mathematically to find the next permutation. The routes taken to find each of the permutations then form a series of associations or adjacencies which can be represented in a tree graph which appears to possess some properties of a fractal. This algorithm was discovered while attempting to identify every possible end-state of a Tic-Tac-Toe (Naughts and Crosses) board. It was found to be a viable and efficient solution to the problem, and now---in its more generalized state---it is my belief that it may find applications among a wide range of theoretical and applied sciences. I hypothesize that, due to the fractal-like nature of the tree it traverses, this algorithm sheds light on a more generic principle of combinatorics and as such could be further generalized to perhaps be applied to the union of any number of sets.
Let G be a graph that may be drawn in the plane in such a way that all internal faces are centrally symmetric convex polygons. We show how to find a drawing of this type that maximizes the angular resolution of the drawing, the minimum angle between any two incident edges, in polynomial time, by reducing the problem to one of finding parametric shortest paths in an auxiliary graph. The running time is at most O(t^3), where t is a parameter of the input graph that is at most O(n) but is more typically proportional to n^.5.
We study the {\\em min-cost chain-constrained spanning-tree} (abbreviated \\mcst) problem: find a min-cost spanning tree in a graph subject to degree constraints on a nested family of node sets. We devise the {\\em first} polytime algorithm that finds a spanning tree that (i) violates the degree constraints by at most a constant factor {\\em and} (ii) whose cost is within a constant factor of the optimum. Previously, only an algorithm for {\\em unweighted} \\cst was known \\cite{olver}, which satisfied (i) but did not yield any cost bounds. This also yields the first result that obtains an $O(1)$-factor for {\\em both} the cost approximation and violation of degree constraints for any spanning-tree problem with general degree bounds on node sets, where an edge participates in a super-constant number of degree constraints. A notable feature of our algorithm is that we {\\em reduce} \\mcst to unweighted \\cst (and then utilize \\cite{olver}) via a novel application of {\\em Lagrangian duality} to simplify the {\\em cost structure} of the underlying problem and obtain a decomposition into certain uniform-cost subproblems. We show that this Lagrangian-relaxation based idea is in fact applicable more generally and, for any cost-minimization problem with packing side-constraints, yields a reduction from the weighted to the unweighted problem. We believe that this reduction is of independent interest. As another application of our technique, we consider the {\\em $k$-budgeted matroid basis} problem, where we build upon a recent rounding algorithm of \\cite{BansalN16} to obtain an improved $n^{O(k^{1.5}/\\epsilon)}$-time algorithm that returns a solution that satisfies (any) one of the budget constraints exactly and incurs a $(1+\\epsilon)$-violation of the other budget constraints.
Given two positions $i$ and $j$ in a string $T$ of length $N$, a longest common extension (LCE) query asks for the length of the longest common prefix between suffixes beginning at $i$ and $j$. A compressed LCE data structure is a data structure that stores $T$ in a compressed form while supporting fast LCE queries. In this article we show that the recompression technique is a powerful tool for compressed LCE data structures. We present a new compressed LCE data structure of size $O(z \\lg (N/z))$ that supports LCE queries in $O(\\lg N)$ time, where $z$ is the size of Lempel-Ziv 77 factorization without self-reference of $T$. Given $T$ as an uncompressed form, we show how to build our data structure in $O(N)$ time and space. Given $T$ as a grammar compressed form, i.e., an straight-line program of size n generating $T$, we show how to build our data structure in $O(n \\lg (N/n))$ time and $O(n + z \\lg (N/z))$ space. Our algorithms are deterministic and always return correct answers.
Computing the eigenvectors and eigenvalues of a given Hermitian matrix is arguably one of the most well-studied computational problems. Yet despite its immense importance, and a vast array of heuristic techniques, there is no algorithm that can provably approximate the spectral decomposition of any Hermitian matrix in asymptotic bit-complexity o(n^3). Inspired by the quantum computing paradigm, we introduce a new perspective on this problem that draws from the theory of quasi-random, or low-discrepancy sequences - a theory which has been unconnected to linear-algebra problems thus far. We analyze the discrepancy of an n-dimensional sequence formed by taking the fractional part of integer multiples of the vector of eigenvalues of the input matrix. This analysis gives rise to a conceptually new algorithm to compute an approximate spectral decomposition of any n x n Hermitian matrix. This algorithm can be implemented by (randomized) circuits of bit-complexity at most O(n^{\\omega+\\nu}) for any \\nu> 0. Because it is disjoint from previous algorithms, we hope it sheds new light on the complexity of approximate spectral decomposition, in terms of run-time, space complexity, and the number of random bits required.
We consider the all pairs all shortest paths (APASP) problem, which maintains all of the multiple shortest paths for every vertex pair in a directed graph G=(V,E) with a positive real weight on each edge. We present a fully dynamic algorithm for this problem in which an update supports either weight increases or weight decreases on a subset of edges incident to a vertex. Our algorithm runs in amortized O(\\vstar^2 \\cdot \\log^3 n) time per update, where n = |V|, and \\vstar bounds the number of edges that lie on shortest paths through any single vertex. Our APASP algorithm leads to the same amortized bound for the fully dynamic computation of betweenness centrality (BC), which is a parameter widely used in the analysis of large complex networks. Our method is a generalization and a variant of the fully dynamic algorithm of Demetrescu and Italiano [DI04] for unique shortest path, and it builds on very recent work on decremental APASP [NPR14]. Our algorithm matches the fully dynamic amortized bound in [DI04] for graphs with unique shortest paths, though our method, and especially its analysis, are different.
The lower and upper bound of any given algorithm is one of the most crucial pieces of information needed when evaluating the computational effectiveness for said algorithm. Here a novel method of Boolean Algebraic Programming for symbolic manipulation of Machines, Functions, and Inputs is presented which allows for direct analysis of time complexities and proof of deterministic methodologies. It is demonstrated through the analysis of a particular problem which is proven and solved through the application of Boolean algebraic programming.
The problem of finding dominators in a directed graph has many important applications, notably in global optimization of computer code. Although linear and near-linear-time algorithms exist, they use sophisticated data structures. We develop an algorithm for finding dominators that uses only a \"static tree\" disjoint set data structure in addition to simple lists and maps. The algorithm runs in near-linear or linear time, depending on the implementation of the disjoint set data structure. We give several versions of the algorithm, including one that computes loop nesting information (needed in many kinds of global code optimization) and that can be made self-certifying, so that the correctness of the computed dominators is very easy to verify.
A new general decomposition theory inspired from modular graph decomposition is presented. This helps unifying modular decomposition on different structures, including (but not restricted to) graphs. Moreover, even in the case of graphs, the terminology ``module   not only captures the classical graph modules but also allows to handle 2-connected components, star-cutsets, and other vertex subsets. The main result is that most of the nice algorithmic tools developed for modular decomposition of graphs still apply efficiently on our generalisation of modules. Besides, when an essential axiom is satisfied, almost all the important properties can be retrieved. For this case, an algorithm given by Ehrenfeucht, Gabow, McConnell and Sullivan 1994 is generalised and yields a very efficient solution to the associated decomposition problem.
Given an undirected node-weighted graph, the Maximum-Weight Connected Subgraph problem (MWCS) is to identify a subset of nodes of maximalsum of weights that induce a connected subgraph. MWCS is closely related to the well-studied Prize Collecting Steiner Tree problem and has many applications in different areas, including computational biology, network design and computer vision. The problem is NP-hard and even hard to approximate within a constant factor. In this work we describe an algorithmic scheme for solving MWCS to provable optimality, which is based on preprocessing rules, new results on decomposing an instance into its biconnected and triconnected components and a branch-and-cut approach combined with a primal heuristic. We demonstrate the performance of our method on the benchmark instances of the 11th DIMACS implementation challenge consisting of MWCS as well as transformed PCST instances.
When treating Markov decision processes (MDPs) with large state spaces, using explicit representations quickly becomes unfeasible. Lately, Wimmer et al. have proposed a so-called symblicit algorithm for the synthesis of optimal strategies in MDPs, in the quantitative setting of expected mean-payoff. This algorithm, based on the strategy iteration algorithm of Howard and Veinott, efficiently combines symbolic and explicit data structures, and uses binary decision diagrams as symbolic representation. The aim of this paper is to show that the new data structure of pseudo-antichains (an extension of antichains) provides another interesting alternative, especially for the class of monotonic MDPs. We design efficient pseudo-antichain based symblicit algorithms (with open source implementations) for two quantitative settings: the expected mean-payoff and the stochastic shortest path. For two practical applications coming from automated planning and LTL synthesis, we report promising experimental results w.r.t. both the run time and the memory consumption.
The problem of maximizing a constrained monotone set function has many practical applications and generalizes many combinatorial problems. Unfortunately, it is generally not possible to maximize a monotone set function up to an acceptable approximation ratio, even subject to simple constraints. One highly studied approach to cope with this hardness is to restrict the set function. An outstanding disadvantage of imposing such a restriction on the set function is that no result is implied for set functions deviating from the restriction, even slightly. A more flexible approach, studied by Feige and Izsak, is to design an approximation algorithm whose approximation ratio depends on the complexity of the instance, as measured by some complexity measure. Specifically, they introduced a complexity measure called supermodular degree, measuring deviation from submodularity, and designed an algorithm for the welfare maximization problem with an approximation ratio that depends on this measure. In this work, we give the first (to the best of our knowledge) algorithm for maximizing an arbitrary monotone set function, subject to a k-extendible system. This class of constraints captures, for example, the intersection of k-matroids (note that a single matroid constraint is sufficient to capture the welfare maximization problem). Our approximation ratio deteriorates gracefully with the complexity of the set function and k. Our work can be seen as generalizing both the classic result of Fisher, Nemhauser and Wolsey, for maximizing a submodular set function subject to a k-extendible system, and the result of Feige and Izsak for the welfare maximization problem. Moreover, when our algorithm is applied to each one of these simpler cases, it obtains the same approximation ratio as of the respective original work.
Lexicographical sorting is a fundamental problem with applications to contingency tables, databases, Bayesian networks, and more. A standard method to lexicographically sort general data is to iteratively use a stable sort -- a sort which preserves existing orders. Here we present a new method of lexicographical sorting called QuickLexSort. Whereas a stable sort based lexicographical sorting algorithm operates from the least important to most important features, in contrast, QuickLexSort sorts from the most important to least important features, refining the sort as it goes. QuickLexSort first requires a one-time modest pre-processing step where each feature of the data set is sorted independently. When lexicographically sorting a database, QuickLexSort (including pre-processing) has comparable running time to using a stable sort based approach. For a data base with $m$ rows and $n$ columns, and a sorting algorithm running in time $O(mlog(m))$, a stable sort based lexicographical sort and QuickLexSort will both take time $O(nmlog(m))$. However in many applications one has the need to lexicographically sort nested data, e.g.\\ all possible sub-matrices up to a certain cardinality of columns. In such cases we show QuickLexSort gives a performance improvement of a log factor of the database length (rows in matrix) over using a standard stable sort based approach. E.g.\\ to sort all sub-matrices up to cardinality $k$, QuickLexSort has running time $O(mn^k)$ whereas a stable sort based lexicographical sort will take time $O(mlog(m)n^k)$. After the pre-processing step that is run only once for the entire matrix, QuickLexSort has a running time linear in the number of nested sub-matrices to sort. We conclude with an application to Bayesian network scoring to detect epistasis using SNP marker data.
In this article, we consider the problem of computing minimum dominating set for a given set $S$ of $n$ points in $\\IR^2$. Here the objective is to find a minimum cardinality subset $S $ of $S$ such that the union of the unit radius disks centered at the points in $S $ covers all the points in $S$. We first propose a simple 4-factor and 3-factor approximation algorithms in $O(n^6 \\log n)$ and $O(n^{11} \\log n)$ time respectively improving time complexities by a factor of $O(n^2)$ and $O(n^4)$ respectively over the best known result available in the literature [M. De, G.K. Das, P. Carmi and S.C. Nandy, {\\it Approximation algorithms for a variant of discrete piercing set problem for unit disk}, Int. J. of Comp. Geom. and Appl., to appear]. Finally, we propose a very important shifting lemma, which is of independent interest and using this lemma we propose a $\\frac{5}{2}$-factor approximation algorithm and a PTAS for the minimum dominating set problem.
We show that for a number of parameterized problems for which only $2^{O(k)} n^{O(1)}$ time algorithms are known on general graphs, subexponential parameterized algorithms with running time $2^{O(k^{1-\\frac{1}{1+\\delta}} \\log^2 k)} n^{O(1)}$ are possible for graphs of polynomial growth with growth rate (degree) $\\delta$, that is, if we assume that every ball of radius $r$ contains only $O(r^\\delta)$ vertices. The algorithms use the technique of low-treewidth pattern covering, introduced by Fomin et al. [FOCS 2016] for planar graphs; here we show how this strategy can be made to work for graphs with polynomial growth. Formally, we prove that, given a graph $G$ of polynomial growth with growth rate $\\delta$ and an integer $k$, one can in randomized polynomial time find a subset $A \\subseteq V(G)$ such that on one hand the treewidth of $G[A]$ is $O(k^{1-\\frac{1}{1+\\delta}} \\log k)$, and on the other hand for every set $X \\subseteq V(G)$ of size at most $k$, the probability that $X \\subseteq A$ is $2^{-O(k^{1-\\frac{1}{1+\\delta}} \\log^2 k)}$. Together with standard dynamic programming techniques on graphs of bounded treewidth, this statement gives subexponential parameterized algorithms for a number of subgraph search problems, such as Long Path or Steiner Tree, in graphs of polynomial growth. We complement the algorithm with an almost tight lower bound for Long Path: unless the Exponential Time Hypothesis fails, no parameterized algorithm with running time $2^{k^{1-\\frac{1}{\\delta}-\\varepsilon}}n^{O(1)}$ is possible for any $\\varepsilon > 0$ and an integer $\\delta \\geq 3$.
Consider the continuous distributed monitoring model in which $n$ distributed nodes, receiving individual data streams, are connected to a designated server. The server is asked to continuously monitor a function defined over the values observed across all streams while minimizing the communication. We study a variant in which the server is equipped with a broadcast channel and is supposed to keep track of an approximation of the set of nodes currently observing the $k$ largest values. Such an approximate set is exact except for some imprecision in an $\\varepsilon$-neighborhood of the $k$-th largest value. This approximation of the Top-$k$-Position Monitoring Problem is of interest in cases where marginal changes (e.g. due to noise) in observed values can be ignored so that monitoring an approximation is sufficient and can reduce communication. This paper extends our results from [IPDPS 15], where we have developed a filter-based online algorithm for the (exact) Top-k-Position Monitoring Problem. There we have presented a competitive analysis of our algorithm against an offline adversary that also is restricted to filter-based algorithms. Our new algorithms as well as their analyses use new methods. We analyze their competitiveness against adversaries that use both exact and approximate filter-based algorithms, and observe severe differences between the respective powers of these adversaries.
Depth first search (DFS) tree is one of the most well-known data structures for designing efficient graph algorithms. Given an undirected graph $G=(V,E)$ with $n$ vertices and $m$ edges, the textbook algorithm takes $O(n+m)$ time to construct a DFS tree. In this paper, we study the problem of maintaining a DFS tree when the graph is undergoing updates. Formally, we show the following results. Incremental DFS tree: Given any arbitrary online sequence of edge or vertex insertions, we can report a DFS tree in $O(n)$ worst case time per operation, and $O\\left(\\min\\{m \\log n + n \\log^2 n, n^2\\}\\right)$ preprocessing time. Fault tolerant DFS tree: There exists a data structure of size $O(m \\log n)$, such that given any set $\\mathcal{F}$ of failed vertices or edges, it can report a DFS tree of the graph $G \\setminus \\mathcal{F}$ in $O(n|\\mathcal{F}|\\log^2 n)$ time. Fully dynamic DFS tree: Given any arbitrary online sequence of edge or vertex updates, we can report a DFS tree in $O(\\sqrt{nm}\\log^{1.5} n)$ worst case time per operation. Our result for incremental DFS tree improves the previous $O(n \\log^3 n)$ worst case update time by Baswana et al., and matches the trivial $\\Omega(n)$ lower bound when it is required to explicitly output the DFS tree. Our other results also improve the corresponding state-of-the-art results by Baswana et al. as well. Our work builds on the framework of the breakthrough work by Baswana et al., together with a novel use of a tree-partition lemma by Duan and Zhang, and the celebrated fractional cascading technique by Chazelle and Guibas.
We study the complexity of some algorithmic problems on directed hypergraphs and their strongly connected components (SCCs). The main contribution is an almost linear time algorithm computing the terminal strongly connected components (i.e. SCCs which do not reach any components but themselves). \"Almost linear\" here means that the complexity of the algorithm is linear in the size of the hypergraph up to a factor alpha(n), where alpha is the inverse of Ackermann function, and n is the number of vertices. Our motivation to study this problem arises from a recent application of directed hypergraphs to computational tropical geometry. We also discuss the problem of computing all SCCs. We establish a superlinear lower bound on the size of the transitive reduction of the reachability relation in directed hypergraphs, showing that it is combinatorially more complex than in directed graphs. Besides, we prove a linear time reduction from the well-studied problem of finding all minimal sets among a given family to the problem of computing the SCCs. Only subquadratic time algorithms are known for the former problem. These results strongly suggest that the problem of computing the SCCs is harder in directed hypergraphs than in directed graphs.
An undirected graph is Eulerian if it is connected and all its vertices are of even degree. Similarly, a directed graph is Eulerian, if for each vertex its in-degree is equal to its out-degree. It is well known that Eulerian graphs can be recognized in polynomial time while the problems of finding a maximum Eulerian subgraph or a maximum induced Eulerian subgraph are NP-hard. In this paper, we study the parameterized complexity of the following Euler subgraph problems: - Large Euler Subgraph: For a given graph G and integer parameter k, does G contain an induced Eulerian subgraph with at least k vertices? - Long Circuit: For a given graph G and integer parameter k, does G contain an Eulerian subgraph with at least k edges? Our main algorithmic result is that Large Euler Subgraph is fixed parameter tractable (FPT) on undirected graphs. We find this a bit surprising because the problem of finding an induced Eulerian subgraph with exactly k vertices is known to be W[1]-hard. The complexity of the problem changes drastically on directed graphs. On directed graphs we obtained the following complexity dichotomy: Large Euler Subgraph is NP-hard for every fixed k>3 and is solvable in polynomial time for k<=3. For Long Circuit, we prove that the problem is FPT on directed and undirected graphs.
We compute a \\emph{sparse} solution to the classical least-squares problem $\\min_x||A x -b||,$ where $A$ is an arbitrary matrix. We describe a novel algorithm for this sparse least-squares problem. The algorithm operates as follows: first, it selects columns from $A$, and then solves a least-squares problem only with the selected columns. The column selection algorithm that we use is known to perform well for the well studied column subset selection problem. The contribution of this article is to show that it gives favorable results for sparse least-squares as well. Specifically, we prove that the solution vector obtained by our algorithm is close to the solution vector obtained via what is known as the \"SVD-truncated regularization approach\".
In some applications of matching, the structural or hierarchical properties of the two graphs being aligned must be maintained. The hierarchical properties are induced by the direction of the edges in the two directed graphs. These structural relationships defined by the hierarchy in the graphs act as a constraint on the alignment. In this paper, we formalize the above problem as the weighted alignment between two directed acyclic graphs. We prove that this problem is NP-complete, show several upper bounds for approximating the solution, and finally introduce polynomial time algorithms for sub-classes of directed acyclic graphs.
The complexity of computing the Lempel-Ziv factorization and the set of all runs (= maximal repetitions) is studied in the decision tree model of computation over ordered alphabet. It is known that both these problems can be solved by RAM algorithms in $O(n\\log\\sigma)$ time, where $n$ is the length of the input string and $\\sigma$ is the number of distinct letters in it. We prove an $\\Omega(n\\log\\sigma)$ lower bound on the number of comparisons required to construct the Lempel-Ziv factorization and thereby conclude that a popular technique of computation of runs using the Lempel-Ziv factorization cannot achieve an $o(n\\log\\sigma)$ time bound. In contrast with this, we exhibit an $O(n)$ decision tree algorithm finding all runs in a string. Therefore, in the decision tree model the runs problem is easier than the Lempel-Ziv factorization. Thus we support the conjecture that there is a linear RAM algorithm finding all runs.
This paper deals with the Pollution-Routing Problem (PRP), a Vehicle Routing Problem (VRP) with environmental considerations, recently introduced in the literature by [Bektas and Laporte (2011), Transport. Res. B-Meth. 45 (8), 1232-1250]. The objective is to minimize operational and environmental costs while respecting capacity constraints and service time windows. Costs are based on driver wages and fuel consumption, which depends on many factors, such as travel distance and vehicle load. The vehicle speeds are considered as decision variables. They complement routing decisions, impacting the total cost, the travel time between locations, and thus the set of feasible routes. We propose a method which combines a local search-based metaheuristic with an integer programming approach over a set covering formulation and a recursive speed-optimization algorithm. This hybridization enables to integrate more tightly route and speed decisions. Moreover, two other \"green\" VRP variants, the Fuel Consumption VRP (FCVRP) and the Energy Minimizing VRP (EMVRP), are addressed. The proposed method compares very favorably with previous algorithms from the literature and many new improved solutions are reported.
This article presents effective (dynamic) algorithm for solving a problem of counting the number of substrings of given string which are also substrings of second string. Presented algorithm can be used for example for quick calculation of strings similarity measure using generalized $n$-gram method (Niewiadomski measure), which are shown. Correctness and complexity analyses are included. ----- W artykule przedstawiono efektywny (dynamiczny) algorytm wyznaczaj\\k{a}cy miar\\k{e} podobie\\ nstwa wyraz\\ ow za pomoc\\k{a} uog\\ olnionej metody $n$-gram\\ ow (miary Niewiadomskiego). Uzasadniono tak\\.ze poprawno\\ s\\ c dzia{\\l}ania algorytmu i oszacowano jego z{\\l}o\\.zono\\ s\\ c obliczeniow\\k{a}.
We consider directed graphs where each edge is labeled with an integer weight and study the fundamental algorithmic question of computing the value of a cycle with minimum mean weight. Our contributions are twofold: (1) First we show that the algorithmic question is reducible in O(n^2) time to the problem of a logarithmic number of min-plus matrix multiplications of n-by-n matrices, where n is the number of vertices of the graph. (2) Second, when the weights are nonnegative, we present the first (1 + {\\epsilon})-approximation algorithm for the problem and the running time of our algorithm is \\tilde(O)(n^\\omega log^3(nW/{\\epsilon}) / {\\epsilon}), where O(n^\\omega) is the time required for the classic n-by-n matrix multiplication and W is the maximum value of the weights.
We study the problem of buffer management in QoS-enabled network switches in the bounded delay model where each packet is associated with a weight and a deadline. We consider the more realistic situation where the network switch has a finite buffer size. A 9.82-competitive algorithm is known for the case of multiple buffers (Azar and Levy, SWAT 06). Recently, for the case of a single buffer, a 3-competitive deterministic algorithm and a 2.618-competitive randomized algorithm was known (Li, INFOCOM 09). In this paper we give a simple deterministic 2-competitive algorithm for the case of a single buffer.
We present a novel hashing strategy for approximate furthest neighbor search that selects projection bases using the data distribution. This strategy leads to an algorithm, which we call DrusillaHash, that is able to outperform existing approximate furthest neighbor strategies. Our strategy is motivated by an empirical study of the behavior of the furthest neighbor search problem, which lends intuition for where our algorithm is most useful. We also present a variant of the algorithm that gives an absolute approximation guarantee; to our knowledge, this is the first such approximate furthest neighbor hashing approach to give such a guarantee. Performance studies indicate that DrusillaHash can achieve comparable levels of approximation to other algorithms while giving up to an order of magnitude speedup. An implementation is available in the mlpack machine learning library (found at this http URL).
Longest common extension queries (LCE queries) and runs are ubiquitous in algorithmic stringology. Linear-time algorithms computing runs and preprocessing for constant-time LCE queries have been known for over a decade. However, these algorithms assume a linearly-sortable integer alphabet. A recent breakthrough paper by Bannai et.\\ al.\\ (SODA 2015) showed a link between the two notions: all the runs in a string can be computed via a linear number of LCE queries. The first to consider these problems over a general ordered alphabet was Kosolobov (\\emph{Inf.\\ Process.\\ Lett.}, 2016), who presented an $O(n (\\log n)^{2/3})$-time algorithm for answering $O(n)$ LCE queries. This result was improved by Gawrychowski et.\\ al.\\ (accepted to CPM 2016) to $O(n \\log \\log n)$ time. In this work we note a special \\emph{non-crossing} property of LCE queries asked in the runs computation. We show that any $n$ such non-crossing queries can be answered on-line in $O(n \\alpha(n))$ time, which yields an $O(n \\alpha(n))$-time algorithm for computing runs.
We consider the online resource minimization problem in which jobs with hard deadlines arrive online over time at their release dates. The task is to determine a feasible schedule on a minimum number of machines. We rigorously study this problem and derive various algorithms with small constant competitive ratios for interesting restricted problem variants. As the most important special case, we consider scheduling jobs with agreeable deadlines. We provide the first constant ratio competitive algorithm for the non-preemptive setting, which is of particular interest with regard to the known strong lower bound of n for the general problem. For the preemptive setting, we show that the natural algorithm LLF achieves a constant ratio for agreeable jobs, while for general jobs it has a lower bound of Omega(n^(1/3)). We also give an O(log n)-competitive algorithm for the general preemptive problem, which improves upon the known O(p_max/p_min)-competitive algorithm. Our algorithm maintains a dynamic partition of the job set into loose and tight jobs and schedules each (temporal) subset individually on separate sets of machines. The key is a characterization of how the decrease in the relative laxity of jobs influences the optimum number of machines. To achieve this we derive a compact expression of the optimum value, which might be of independent interest. We complement the general algorithmic result by showing lower bounds that rule out that other known algorithms may yield a similar performance guarantee.
This report considers a sporadic real-time task system with $n$ sporadic tasks on a uniprocessor platform, in which the lowest-priority task is a segmented self-suspension task and the other higher-priority tasks are ordinary sporadic real-time tasks. This report proves that the schedulability analysis for fixed-priority preemptive scheduling even with only one segmented self-suspending task as the lowest-priority task is $co{\\cal NP}$-hard in the strong sense. Under fixed-priority preemptive scheduling, Nelissen et al. in ECRTS 2015 provided a mixed-integer linear programming (MILP) formulation to calculate an upper bound on the worst-case response time of the lowest-priority self-suspending task. This report provides a comprehensive support to explain several hidden properties that were not provided in their paper. We also provide an input task set to explain why the resulting solution of their MILP formulation can be quite far from the exact worst-case response time.
We propose a new greedy algorithm for the maximum cardinality matching problem. We give experimental evidence that this algorithm is likely to find a maximum matching in random graphs with constant expected degree c>0, independent of the value of c. This is contrary to the behavior of commonly used greedy matching heuristics which are known to have some range of c where they probably fail to compute a maximum matching.
Real-world point sets tend to be clustered, so using a machine word for each point is wasteful. In this paper we first bound the number of nodes in the quadtree for a point set in terms of the points  clustering. We then describe a quadtree data structure that uses $\\mathcal{O} (1)$ bits per node and supports faster queries than previous structures with this property. Finally, we present experimental evidence that our structure is practical.
We introduce the notion of log-Riemann surfaces. These are Riemann surfaces given by cutting and pasting planes together isometrically, and come equipped with a holomorphic local diffeomorphism to C called the projection map, and a corresponding flat metric obtained by pulling back the Euclidean metric. We define ramification points to be the points added in the metric completion of the surface with respect to the induced path metric; any such point has a well-defined order $1 \\leq n \\leq +\\infty$ such that the projection map restricted to a small punctured neighbourhood of the point is an $n-to-1$ covering of a punctured disk in C. We prove that simply connected log-Riemann surfaces with finitely many ramification points are biholomorphic to C and the uniformization, with respect to the distinguished charts on the surface given by the projection map, is given by an entire function of the form $F(z) = \\int Q(z)e^{P(z)} dz$ where $P, Q$ are polynomials of degrees equal to the number of infinite and finite order ramification points respectively. We also develop an algebraic theory for such log-Riemann surfaces, defining a ring of functions on the surface with finite values at all ramification points, such that the ring separates all points including the infinite order ramification points.
The uniqueness problems on transcendental meromorphic or entire functions sharing at least two values with their derivatives or linear differential polynomials have been studied and many results have been obtained. In this paper, we study a transcendental entire function f that shares a non-zero polynomial a with f , together with its linear differential polynomials of the form with rational function coefficients.
Let $f_1$, $f_2$, and $f_3$ be holomorphic functions on a complex manifold and assume that the common zero set of the $f_j$ has maximal codimension, i.e., that it is a complete intersection. We prove that the iterated Mellin transform of the residue integral has an analytic continuation to a neighborhood of the origin in $\\mathbb{C}^3$. We prove also that the natural regularization of the residue current converges unrestrictedly.
A classical result states that every lower bounded superharmonic function on $\\Bbb R^2$ is constant. In this paper the following (stronger) one-circle version is proven. If $f\\colon \\Bbb R^2\\to (-\\infty,\\infty]$ is lower semicontinuous, $\\liminf_{|x|\\to\\infty} f(x)/\\ln|x|\\ge 0$, and, for every $x\\in\\Bbb R^2$, $1/(2\\pi) \\int_0^{2\\pi} f(x+r(x)e^{it}) dt\\le f(x)$, where $r\\colon \\Bbb R^2\\to (0,\\infty)$ is continuous, $\\sup_{x\\in\\Bbb R^2} (r(x)-|x|)<\\infty$, and $\\inf_{x\\in\\Bbb R^2} (r(x)-|x|)=-\\infty$, then $f$ is constant. Moreover, it is shown that, with respect to the assumption $r\\le c|\\cdot|+M$ on $\\Bbb R^d$, there is a striking difference between the restricted volume mean property for the cases $d=1$ and $d=2$.
We find all non-rational meromorphic solutions of the equation $ww\"-(w )^2=\\alpha(z)w+\\beta(z)w +\\gamma(z)$, where $\\alpha$, $\\beta$ and $\\gamma$ are rational functions of $z$. In so doing we answer a question of Hayman by showing that all such solutions have finite order. Apart from special choices of the coefficient functions, the general solution is not meromorphic and contains movable branch points. For some choices for the coefficient functions the equation admits a one-parameter family of non-rational meromorphic solutions. Nevanlinna theory is used to show that all such solutions have been found and allows us to avoid issues that can arise from the fact that resonances can occur at arbitrarily high orders. We actually solve the more general problem of finding all meromorphic solutions that are admissible in the sense of Nevanlinna theory, where the coefficients $\\alpha$, $\\beta$ and $\\gamma$ are meromorphic functions.
Let $A$ be an algebra of bounded smooth functions on the interior of a compact set in the plane. We study the following problem: if $f,f_1,\\dots,f_n\\in A$ satisfy $|f|\\leq \\sum_{j=1}^n |f_j|$, does there exist $g_j\\in A$ and a constant $N\\in\\N$ such that $f^N=\\sum_{j=1}^n g_j f_j$? A prominent role in our proofs is played by a new space, $C_{\\dbar, 1}(K)$, which we call the algebra of $\\dbar$-smooth functions. In the case $n=1$, a complete solution is given for the algebras $A^m(K)$ of functions holomorphic in $K^\\circ$ and whose first $m$-derivatives extend continuously to $\\ov{K^\\circ}$. This necessitates the introduction of a special class of compacta, the so-called locally L-connected sets. We also present another constructive proof of the Nullstellensatz for $A(K)$, that is only based on elementary $\\dbar$-calculus and Wolff s method.
In the first part of this study we consider the boundedness and compactness properties of Cauchy-Fantappie type operators on Poletsky-Stessin Hardy spaces $H^{p}_{u}(\\mathbb{B}^{\\textbf{p}})$ of complex ellipsoids. We show that boundedness and compactness criteria are given by the Carleson conditions. In addition we give a basic compactness property for the subsets of $H^{p}_{u}(\\mathbb{B}^{\\textbf{p}})$ spaces and the characterization of weakly convergent sequences in $H^{p}_{u}(\\mathbb{B}^{\\textbf{p}})$. In the second part we will discuss the dual complement of the complex ellipsoid and we will give a duality result for $H^{p}_{u}(\\mathbb{B}^{\\textbf{p}})$ spaces in the sense of Grothendieck-K\\\"{o}the-da Silva.
Let $H^n$ be the metric space of all bounded domains in $C^n$ with the metric equal to the Hausdorff distance between boundaries of domains. We prove that the dimension of the group of automorphisms of domains is an upper semicontinuous function on $\\H^n$. We also provide theorems and examples regarding the change in topological structure of these groups under small perturbation of a domain in $H^n$.
We introduce new biholomorphic invariants for real-analytic hypersurfaces in 2-dimensional complex space and show how they can be used to show that a hypersurface possesses few automorphisms. We give conditions, in terms of the new invariants, guaranteeing that the stability group is finite, and give (sharp) bounds on the cardinality of the stability group in this case. We also give a sufficient condition for the stability group to be trivial. The main technical tool developed in this paper is a complete (formal) normal form for a certain class of hypersurfaces. As a byproduct, a complete classification, up to biholomorphic equivalence, of the finite type hypersurfaces in this class is obtained.
We study the relationship between singular holomorphic foliations in $(\\mathbb{C}^{2},0)$ and their separatrices. Under mild conditions we describe a complete set of analytic invariants characterizing foliations with quasi-homogeneous separatrices. Further, we give the full moduli space of quasi-homogeneous plane curves. This paper has an expository character in order to make it accessible also to non-specialists.
Let $\\Om$ be a unbounded domain in a Banach space. In this work, we wish to impose {\\it local conditions} on boundary point of $\\Om$ (including the point at infinity) that guarantee complete hyperbolic of $\\Om.$ We also search for local boundary conditions so that Vitali properties hold true for $\\Om.$ These properties might be considered as analogues of the taut property in the finite dimensional case.
The topic of the paper is the study of germs of local holomorphisms $f$ between $C^n$ and $C^{n }$ such that $f(M)\\subset M $ and $df(T^cM)=T^cM $ for $M\\subset C^n$ and $M \\subset C^{n }$ generic real-analytic CR submanifolds of arbitrary codimensions. It is proved that for $M$ minimal and $M $ finitely nondegenerate, such germs depend analytically on their jets. As a corollary, an analytic structure on the set of all germs of this type is obtained.
The Loewner-Kufarev evolution produces asymptotics for mappings onto domains close to the unit disk or the exterior of the unit disk. We deduce variational formulae which lead to the asymptotic conformal welding for such domains. The comparison of mappings onto bounded and unbounded components of the Jordan curve establishes an asymptotic connection between driving functions in both versions of the Loewner-Kufarev equation and conformal radii of the two domains.
The asymptotic behavior of conformal metrics with negative curvatures near an isolated singularity for at most second order derivatives was described by Kraus and Roth in one of their papers in 2008. Our work improves one estimate of theirs and shows the estimate for higher order derivatives near an isolated singularity by means of potential theory. We also give some limits of Minda-type for SK-metrics near the origin. Combining these limits with the Ahlfors  lemma, we provide some observations SK-metrics.
Let $A_\\zeta=\\Omega-\\overline{\\rho(\\zeta)\\cdot\\Omega}$ be a family of generalized annuli over a domain $U$. We show that the logarithm $\\log K_{\\zeta}(z)$ of the Bergman kernel $K_{\\zeta}(z)$ of $A_\\zeta$ is plurisubharmonic provided $\\rho\\in PSH(U)$. It is remarkable that $A_\\zeta$ is non-pseudoconvex when the dimension of $A_\\zeta$ is larger than one. For standard annuli in ${\\mathbb C}$, we obtain an interesting formula for $\\partial^2 \\log K_{\\zeta}/\\partial \\zeta\\partial\\bar{\\zeta}$, as well as its boundary behavior.
Given a generically surjective holomorphic vector bundle morphism $f\\colon E\\to Q$, $E$ and $Q$ Hermitian bundles, we construct a current $R^f$ with values in $\\Hom(Q,H)$, where $H$ is a certain derived bundle, and with support on the set $Z$ where $f$ is not surjective. The main property is that if $\\phi$ is a holomorphic section of $Q$, and $R^f\\phi=0$, then locally $f\\psi=\\phi$ has a holomorphic solution $\\psi$. In the generic case also the converse holds. This gives a generalization of the corresponding theorem for a complete intersection, due to Dickenstein-Sessa and Passare. We also present results for polynomial mappings, related to M Noether s theorem and the effective Nullstellensatz. The construction of the current is based on a generalization of the Koszul complex. By means of this complex one can also obtain new global estimates of solutions to $f\\psi=\\phi$, and as an example we give new results related to the $H^p$-corona problem.
We shall study non-linear extremal problems in Bergman space $\\mathcal{A}^2(\\mathbb{D})$. We show the existence of the solution and that the extremal functions are bounded. Further, we shall discuss special cases for polynomials, investigate the properties of the solution and provide a bound for the solution. This problem is an equivalent formulation of B. Korenblum s conjecture, also known as Korenblum s Maximum Principle: for $f$, $g\\in \\mathcal{A}^2(\\mathbb{D})$, there is a constant $c$, $0<c<1$ such that if $|f(z)|\\leq |g(z)|$ for all $z$ such that $c<|z|<1$, then $\\|f\\|_2\\leq \\|g\\|_2$. The existence of such $c$ was proved by W. Hayman but the exact value of the best possible value of $c$, denoted by $\\kappa$, remains unknown.
We prove the non-hyperbolicity of the Kobayashi distance for $\\mathcal{C}^{1,1}$-smooth convex domains in $\\mathbb{C}^{2}$ which contain an analytic disc in the boundary or have a point of infinite type with rotation symmetry. Moreover, examples of smooth, non pseudoconvex, Gromov hyperbolic domains are given; we prove that the symmetrized polydisc and the tetrablock are not Gromov hyperbolic and write down some results about Gromov hyperbolicity of product spaces.
Off-diagonal upper bounds are established away from the diagonal for the Bergman kernels associated to high powers of holomorphic line bundles over compact complex manifolds, asymptotically as the power tends to infinity. The line bundle is assumed to be equipped with a Hermitian metric with positive curvature form, which is infinitely differentiable but not necessarily real analytic. The bounds obtained are the best possible for this class of metrics.
We study non-univalent solutions of the Polubarinova-Galin equation, describing the time evolution of the conformal map from the unit disk onto a Hele-Shaw blob of fluid subject to injection at one point. In particular, we tackle the difficulties arising when the map is not even locally univalent, in which case one has to pass to weak solutions developing on a branched covering surface of the complex plane. One major concern is the construction of this Riemann surface, which is not given in advance but has to be constantly up-dated along with the solution. Once the Riemann surface is constructed the weak solution is automatically global in time, but we have had to leave open the question whether the weak solution can be kept simply connected all the time (as is necessary to connect to the Polubarinova-Galin equation). A certain crucial statement, a kind of stability statement for free boundaries, has therefore been left as a conjecture only. Another major part of the paper concerns the structure of rational solutions (as for the derivative of the mapping function). Here we have fairly complete results on the dynamics. Several examples are given.
While the existence of conformal mappings between doubly connected domains is characterized by their conformal moduli, no such characterization is available for harmonic diffeomorphisms. Intuitively, one expects their existence if the domain is not too thick compared to the codomain. We make this intuition precise by showing that for a Dini-smooth doubly connected domain $\\Omega^*$ there exists $\\epsilon>0$ such that for every doubly connected domain $\\Omega$ with $\\operatorname{Mod} \\Omega^*<\\operatorname{Mod}\\Omega<\\operatorname{Mod} \\Omega^*+\\epsilon$ there exists a harmonic diffeomorphism from $\\Omega$ onto $\\Omega^*$.
We give conditions under which a germ of a holomorphic mapping in $\\Bbb C^N$, mapping an irreducible real algebraic set into another of the same dimension, is actually algebraic. Let $A\\subset \\bC^N$ be an irreducible real algebraic set. Assume that there exists $\\po \\in A$ such that $A$ is a minimal, generic, holomorphically nondegenerate submanifold at $\\po$. We show here that if $H$ is a germ at $p_1 \\in A$ of a holomorphic mapping from $\\bC^N$ into itself, with Jacobian $H$ not identically $0$, and $H(A)$ contained in a real algebraic set of the same dimension as $A$, then $H$ must extend to all of $\\bC^N$ (minus a complex algebraic set) as an algebraic mapping. Conversely, we show that for any ``model case   (i.e., $A$ given by quasi-homogeneous real polynomials), the conditions on $A$ are actually necessary for the conclusion to hold.
Given $N$ a non generic smooth CR submanifold of $\\C^L$, $N=\\{(\\n,h(\\n))\\}$ where $\\n$ is generic in $\\C^{L-n}$ and $h$ is a CR map from $\\n$ into $\\C^n$. We prove, using only elementary tools, that if $h$ is decomposable at $p \\in \\n$ then any decomposable CR distribution on $N$ at $p=(p ,h(p ))$ extends holomorphically to a complex transversal wedge. This gives an elementary proof of the well known equivalent for totally real non generic submanifolds, i.e if $N$ is a smooth totally real submanifold of $\\C^L$ any continuous function on $N$ admits a holomorphic extension to a complex transverse wedge
We study extremal discs for the Kobayashi metric. Inspired by work of Lempert on strongly convex domains, we present results on strongly pseudoconvex domains. We also consider a useful biholomorphic invariant, inspired by the Kobayashi (and Carath\\ {e}odory) metric, and prove several new results about biholomorphic equivalence of domains. Some useful results about automorphism groups of complex domains are also established.
We study modular subspaces corresponding to two deformation functors associated to an isolated singularity X_0: the functor Def_{X_0} of deformations of X_0 and the functor Def^s_{X_0} of deformations with section of X_0. After recalling some standard facts on the cotangent cohomology of analytic algebras and the general theory of deformations with section, we give several criteria for modularity in terms of the relative cotangent cohomology modules of a deformation. In particular it is shown that the modular strata for the functors Def_{X_0} and Def^s_{X_0} of quasihomogeneous complete intersection singularities coincide. Flatness conditions for the first cotangent cohomology modules of the deformation functors under consideration are then compared.
We study the local equivalence problem for five dimensional real hypersurfaces $M^5$ of $\\mathbb{C}^3$ which are $2$-nondegenerate and of constant Levi rank $1$ under biholomorphisms. We find two invariants, $J$ and $W$, which are expressed explicitly in terms of the graphing function $F$ of $M$, the annulation of which give a necessary and sufficient condition for $M$ to be locally biholomorphic to a model hypersurface, the tube over the light cone. If one of the two invariants $J$ or $W$ does not vanish on $M$, we show that the equivalence problem under biholomophisms reduces to an equivalence problem between $\\{e \\}$-structures, that is we construct an absolute parallelism on $M$.
We derive a quasiconformal extension to 3-space of the Weierstrass-Enneper lifts of a class of harmonic mappings defined in the unit disk. The extension is based on fibrations of space by circles in domain and image that correspond to each other in a natural way. Convexity plays an essential role in the analysis. As a corollary we derive a sufficient condition for the underlying harmonic mapping to be univalent in the disk, with an explicit quasiconformal extension to the extended plane that generalizes the well known formula by Ahlfors-Weill.
We consider the classical problem of maximizing the derivative at a fixed point over the set of all bounded analytic functions in the unit disk with prescribed critical points. We show that the extremal function is essentially unique and always an indestructible Blaschke product. This result extends the Nehari--Schwarz Lemma and leads to a new class of Blaschke products called maximal Blaschke products. We establish a number of properties of maximal Blaschke products, which indicate that maximal Blaschke products constitute an appropriate infinite generalization of the class of finite Blaschke products.
In this paper, the second order differential equation with a state derivative dependent delay of the form $a_2x\"(z) + a_1x (z) + a_0x(z) = x(p(z) + bx (z)) + h(z)$ has been studied. Considering a convergent power series $g(z)$ of an auxiliary equation $a_2 \\gamma^{2} g\"(\\gamma z) g (z) = [g (\\gamma^2 z) - p(g(\\gamma z))] \\gamma g (\\gamma z)(g  (z))^{2} + bh (g(z))(g  (z))^{3} + \\Big( a_2p\"(g(z))+ a_1p (g(z)) +a_0p(g(z))\\Big) (g (z))^{3} - a_1\\gamma g (\\gamma z) (g  (z))^{2} - a_0g(\\gamma z)(g (z))^{3} + a_2\\gamma g (\\gamma z)g\"( z)$ with the relation $p(z) + bx (z) = g(\\gamma g^{-1}(z)),$ we obtain an analytic solution $x(z).$ Moreover, an analytic solution depends on a parameter $\\gamma$ which satisfies one of the following conditions: $(H1) \\ 0<|\\gamma|<1,$ $(H2) \\ \\gamma = e^{2\\pi i \\theta }$ where $\\theta$ is a Brjuno number or $(H3) \\ \\gamma = e^{2\\pi i \\theta }$ where $\\theta$ is a rational number.
It has been recently shown that for a convex domain $\\Omega$ in $\\mathbb C^n$ and $w\\in\\Omega$ the function $F_\\Omega(w):=\\big(K_\\Omega(w)\\lambda(I_\\Omega(w))\\big)^{1/n}$, where $K_\\Omega$ is the Bergman kernel on the diagonal and $I_\\Omega(w)$ the Kobayashi indicatrix, satisfies $1\\leq F_\\Omega\\leq 4$. While the lower bound is optimal, not much more is known about the upper bound. In general it is quite difficult to compute $F_\\Omega$ even numerically and the highest value of it obtained so far is $1.010182\\dots$ In this paper we present precise, although rather complicated formulas for the ellipsoids $\\Omega=\\{|z_1|^{2m}+|z_2|^2<1\\}$ (with $m\\geq 1/2$) and all $w$, as well as for $\\Omega=\\{|z_1|+|z_2|<1\\}$ and $w$ on the diagonal. The Bergman kernel for those ellipsoids had been known, the main point is to compute the volume of the Kobayashi indicatrix. It turns out that in the second case the function $\\lambda(I_\\Omega(w))$ is not $C^{3,1}$.
The Chern-Moser normal form and its analog on finite type hypersurfaces in general do not respect symmetries. Extending the work of N. K. Stanton, we consider the local equivalence problem for symmetric Levi degenerate hypersurfaces of finite type in $\\mathbb C^2$. The results give for all such hypersurfaces a complete normalization which respects the symmetries. In particular, they apply to tubes and rigid hypersurfaces, providing an effective classification. The main tool is a complete normal form constructed for a general hypersurface with a tube model. As an application, we describe all biholomorphic maps between tubes, answering a question posed by N. Hanges.
In a holomorphic family $(X_b)_{b\\in B}$ of non-K\\\"ahlerian compact manifolds, the holomorphic curves representing a fixed 2-homology class do not form a proper family in general. The deep source of this fundamental difficulty in non-K\\\"ahler geometry is the {\\it explosion of the area} phenomenon: the area of a curve $C_b\\subset X_b$ in a fixed 2-homology class can diverge as $b\\to b_0$. This phenomenon occurs frequently in the deformation theory of class VII surfaces. For instance it is well known that any minimal GSS surface $X_0$ is a degeneration of a 1-parameter family of simply blown up primary Hopf surfaces $(X_z)_{z\\in D\\setminus\\{0\\}}$, so one obtains non-proper families of exceptional divisors $E_z\\subset X_z$ whose area diverge as $z\\to 0$. Our main goal is to study in detail this non-properness phenomenon in the case of class VII surfaces. We will prove that, under certain technical assumptions, a lift $\\widetilde E_z$ of $E_z$ in the universal cover $\\widetilde X_z$ does converge to an effective divisor $\\widetilde E_0$ in $\\widetilde X_0$, but this limit divisor is not compact. We prove that this limit divisor is always bounded towards the pseudo-convex end of $\\widetilde X_0$ and that, when $X_0$ is a a minimal surface with global spherical shell, it is given by an infinite series of {\\it compact} rational curves, whose coefficients can be computed explicitly. This phenomenon - degeneration of a family of compact curves to an infinite union of compact curves - should be called {\\it infinite bubbling}. We believe that such a decomposition result holds for any family of class VII surfaces whose generic fiber is a blown up primary Hopf surface. This statement would have important consequences for the classification of class VII surfaces.
The paper presents some recent results on the Weil-Petersson geometry theory of the universal Teichm\\\"uller space, a topic which is important in Teichm\\\"uller theory and has wide applications to various areas such as mathematical physics, differential equation and computer vision. \\noindent (1) It is shown that a sense-preserving homeomorphism $h$ on the unit circle belongs to the Weil-Petersson class, namely, $h$ can be extended to a quasiconformal mapping to the unit disk whose Beltrami coefficient is squarely integrable in the Poincar\\ e metric if and only if $h$ is absolutely continuous such that $\\log h $ belongs to the Sobolev class $H^{\\frac 12}$. This solves an open problem posed by Takhtajan-Teo [TT2] in 2006 and investigated later by Figalli [Fi], Gay-Balmaz-Marsden-Ratiu ([GMR], [GR]) and others. \\noindent The intrinsic characterization (1) of the Weil-Petersson class has the following applications which are also explored in this paper: \\noindent (2) It is proved that there exists a quasisymmetric homeomorphism of the Weil-Petersson class which belongs neither to the Sobolev class $H^{\\frac 32}$ nor to the Lipschitz class $\\Lambda^1$, which was conjectured very recently by Gay-Balmaz-Ratiu [GR] when studying the classical Euler-Poincar\\ e equation in the new setting that the involved sense-preserving homeomorphisms on the unit circle belong to the Weil-Petersson class. \\noindent (3) It is proved that the flows of the $H^{\\frac 32}$ vector fields on the unit circle are contained in the Weil-Petersson class, which was also conjectured by Gay-Balmaz-Ratiu [GR] during their above mentioned research. \\noindent (4) A new metric is introduced on the Weil-Petersson Teichm\\\"uller space and is shown to be topologically equivalent to the Weil-Petersson metric.
Let $S$ be a hyperbolic Riemann surface. In a finite-dimensional Teichm\\\"uller space $T(S)$, it is still an open problem whether the geodesic disk passing through two points is unique. In an infinite-dimensional Teichm\\\"uller space it is also unclear how many geodesic disks pass through a Strebel point and the basepoint while we know that there are always geodesic disks passing through a non-Strebel point and the basepoint. In this paper, we answer the problem arising in the universal asymptotic Teichm\\\"uller space and prove that there are always infinitely many geodesic disks passing through two points.
We give an explicit verifiable characterization of weakly pseudoconvex but locally nonconvexifiable hypersurfaces of finite type in dimension two. It is expressed in terms of a generalized model, which captures local geometry of the hypersurface both in the complex tangential and nontangential directions. As an application we obtain a new class of nonconvexifiable pseudoconvex hypersurfaces with convex models.
Geometric properties of the Jackson and Hahn-Exton $q$-Bessel functions are studied. For each of them, three different normalizations are applied in such a way that the resulting functions are analytic in the unit disk of the complex plane. For each of the six functions we determine the radii of starlikeness and convexity precisely by using their Hadamard factorization. These are $q$-generalizations of some known results for Bessel functions of the first kind. The characterization of entire functions from the Laguerre-P\\ olya class via hyperbolic polynomials play an important role in this paper. Moreover, the interlacing property of the zeros of Jackson and Hahn-Exton $q$-Bessel functions and their derivatives is also useful in the proof of the main results. We also deduce a sufficient and necessary condition for the close-to-convexity of a normalized Jackson $q$-Bessel function and its derivatives. Some open problems are proposed at the end of the paper.
The Ramanujan $_1\\psi_1$ summation theorem in studied from the perspective of $q$-Jackson integrals, $q$-difference equations and connection formulas. This is an approach which has previously been shown to yield Bailey s very-well-poised $_6\\psi_6$ summation. Bilateral Jackson integral generalizations of the Dixon--Anderson and Selberg integrals relating to the type $A$ root system are identified as natural candidates for multidimensional generalizations of the Ramanujan $_1\\psi_1$ summation theorem. New results of this type are announced, and furthermore they are put into context by reviewing from previous literature explicit product formulas for Jackson integrals relating to other roots systems obtained from the same perspective.
In this paper we obtain, by the method of Loewner chains, some sufficient conditions for the analyticity and the univalence of the functions defined by an integral operator. These conditions in- volves Ruscheweyh and Salagean derivative operator in the open unit disk. In particular cases, we find the well-known conditions for univalency established by Becker [3], Ahlfors [2], Kanas and Srivastava [8] and others for analytic mappings f : U ! C: Also, we obtain the corresponding new, useful and simpler conditions for this integral operator.
In this paper we offer a definition of monogenicity for functions defined on $\\rr^{n+1}$ with values in the Clifford algebra $\\rr_n$ following an idea inspired by the recent papers \\cite{gs}, \\cite{advances}. This new class of monogenic functions contains the polynomials (and, more in general, power series) with coefficients in the Clifford algebra $\\rr_n$. We will prove a Cauchy integral formula as well as some of its consequences. Finally, we deal with the zeroes of some polynomials and power series.
In this paper we obtain the closed forms of some hypergeometric functions. As an application, we obtain the explicit forms of the Bergman kernel functions for Reinhardt domains $\\{|z_3|^{\\lambda} < |z_1|^{2p} + |z_2|^2, \\quad |z_1|^{2p} + |z_2|^2 < |z_1|^{p} \\}$ and $\\{|z_4|^{\\lambda} < (|z_1|^2 + |z_2|^2)^{p} + |z_3|^2, \\quad (|z_1|^2 + |z_2|^2)^{p} + |z_3|^2 < (|z_1|^2 + |z_2|^2 )^{p/2} \\}$.
We study the action of a real reductive group G on a real submanifold X of a K\"ahler manifold Z. We suppose that the action of G extends holomorphically to an action of a complex reductive group and is Hamiltonian with respect to a compatible maximal compact subgroup of the complex reductive group. There is a corresponding gradient map obtained from a Cartan decomposition of G. We obtain a Morse like function on X. Associated to its critical points are various sets of semistable points which we study in great detail. In particular, we have G-stable submanifolds of X which are called pre-strata. In case that the gradient map is proper, the pre-strata form a decomposition of X and in case that X is compact they are the strata of a Morse type stratification of X. Our results are generalizations of results of Kirwan obtained in the case that X=Z is compact and the group itself is complex reductive.
This work is a complement of the study on H\\\"ormander s solution of the $\\bar\\partial$ equation initialised by H. Hedenmalm. Let $\\varphi$ be a strictly plurisubharmonic function of class C 2 in C n, let $c_\\varphi(z)$ be the smallest eigenvalue of $i\\partial\\bar\\partial\\varphi$ then $\\forall z\\in\\mathbb{C}^n$, $c_\\varphi (z)>0$. We denote by $L^2_{p,q}(\\mathbb{C}^n, e^\\varphi)$ the $(p, q)$ currents with coefficients in $L^2_{p,q}(\\mathbb{C}^n, e^\\varphi)$. We prove that if $\\omega\\in L^2_{p,q}(\\mathbb{C}^n,e^\\varphi)$, $\\bar\\partial$$\\omega$ = 0 for q <n then there is a solution u $\\in L ^2_{p,q-1}(\\mathbb{C}^n,c_\\varphi e^\\varphi)$ of $\\bar\\partial$u = $\\omega$. This is done via a theorem giving a solution with compact support if the data has compact support.
In this paper equilibrium measures in the presence of external fields created by fixed charges are analyzed. These external fields are a particular case of the so-called rational external fields (in the sense that their derivatives are rational functions). Along with some general results, a thorough analysis of the particular case of two fixed negative charges (``attractors ) is presented. As for the main tools used, this paper is a natural continuation of \\cite{MOR2015}, where polynomial external fields were thoroughly studied, and \\cite{OrSL2015}, where rational external fields with a polynomial part were considered. However, the absence of the polynomial part in the external fields analyzed in the current paper adds a considerable difficulty to solve the problem and justifies its separated treatment; moreover, it is noteworthy to point out the simplicity and beauty of the results obtained.
A family of formal power series, such that its coefficients satisfy a recursion formula, is characterized in terms of the summability, in the sense of J. P. Ramis, of its elements along certain well chosen directions. We describe a set of ordinary differential equations which have, as a formal solution, one of such formal power series, and also describe the actual solutions which own such formal power series as Gevrey asymptotic expansion. The main results are extended into the framework of $q-$Gevrey series and $q-$difference equations, and also to the case of moment-differential equations, whose formal solutions have their coefficients  growth governed by a so-called strongly regular sequence, appearing as a generalization of the Gevrey-like sequences.
Consider the following uniformization problem. Take two holomorphic (parametrized by some analytic set defined on a neighborhood of 0 in $\\Bbb C^p$, for some $p>0$) or differentiable (parametrized by an open neighborhood of 0 in $\\Bbb R^p$, for some $p>0$) deformation families of compact complex manifolds. Assume they are pointwise isomorphic, that is for each point $t$ of the parameter space, the fiber over $t$ of the first family is biholomorphic to the fiber over $t$ of the second family. Then, under which conditions are the two families locally isomorphic at 0? In this article, we give a sufficient condition in the case of holomorphic families. We show then that, surprisingly, this condition is not sufficient in the case of differentiable families. We also describe different types of counterexamples and give some elements of classification of the counterexamples. These results rely on a geometric study of the Kuranishi space of a compact complex manifold.
In the present paper, the coefficient estimates are found for the class $\\mathcal S^{*-1}(\\alpha)$ consisting of inverses of functions in the class of univalent starlike functions of order $\\alpha$ in $\\mathcal D=\\{z\\in\\mathbb C:|z|<1\\}$. These estimates extend the work of {\\it Krzyz, Libera and Zlotkiewicz [Ann. Univ. Marie Curie-Sklodowska, 33(1979), 103-109]} who found sharp estimates on only first two coefficients for the functions in the class $\\mathcal S^{*-1}(\\alpha)$. The coefficient estimates are also found for the class $\\sum^{*-1}(\\alpha)$, consisting of inverses of functions in the class $\\sum^*(\\alpha)$ of univalent starlike functions of order $\\alpha$ in $\\mathcal V=\\{z\\in\\mathbb C:1<|z|<\\infty\\}$. The open problem of finding sharp coefficient estimates for functions in the class $\\sum^*(\\alpha)$ stands completely settled in the present work by our method developed here.
This technical note describes the application of saddle-point integration to the asymptotic Fourier analysis of the well-known $C_\\infty$ \"bump\" function $\\exp[-(1-x^2)^{-1}]$, deriving both the asymptotic decay rate $k^{-3/4} \\exp(-\\sqrt k)$ of the Fourier transform $F(k)$ and the exact coefficient. The result is checked against brute-force numerical integration and is extended to generalizations of this bump function.
In this paper we obtain sharp coefficient bounds for certain $p$-valent starlike functions of order $\\beta$, $0\\le \\beta<1$. Initially this problem was handled by Aouf in \"M. K. Aouf, On a class of $p$-valent starlike functions of order $\\alpha$, Internat. J. Math. $\\&$ Math. Sci. 1987;10:733--744\". We pointed out that the proof given by Aouf was incorrect and a correct proof is presented in this paper.
If $R$ is a real analytic set in $\\C^n$ (viewed as $\\R^{2n}$), then for any point $p\\in R$ there is a uniquely defined germ $X_p$ of the smallest complex analytic variety which contains $R_p$, the germ of $R$ at $p$. It is shown that if $R$ is irreducible of constant dimension, then the function $p\\to\\dim X_p$ is constant on a dense open subset of $R$. As an application it is proved that a continuous map from a real analytic CR manifold $M$ into $\\C^N$ which is CR on some open subset of $M$ and whose graph is a real analytic set in $M\\times \\C^N$ is necessarily CR everywhere on $M$.
Let $K$ be a compact set in $\\mathbb{C}$, $f$ a function analytic in $\\overline{\\mathbb{C}}\\smallsetminus K$ vanishing at $\\infty $. Let $% f\\left( z\\right) =\\sum_{k=0}^{\\infty }a_{k}\\ z^{-k-1}$ be its Taylor expansion at $\\infty $, and $H_{s}\\left( f\\right) =\\det \\left( a_{k+l}\\right) _{k,l=0}^{s}$ the sequence of Hankel determinants. The classical Polya inequality says that \\[ \\limsup\\limits_{s\\rightarrow \\infty }\\left\\vert H_{s}\\left( f\\right) \\right\\vert ^{1/s^{2}}\\leq d\\left( K\\right) , \\]% where $d\\left( K\\right) $ is the transfinite diameter of $K$. Goluzin has shown that for some class of compacta this inequality is sharp. We provide here a sharpness result for the multivariate analog of Polya s inequality, considered by the second author in Math. USSR Sbornik, 25 (1975), 350-364.
The real projective plan $P^2$ can be endowed with a dianalytic structure making it into a non orientable Klein surface. Dianalytic self-mappings of that surface are projections of analytic self-mappings of the Riemann sphere $\\widehat{\\mathbb{C}}$. It is known that the only analytic bijective self-mappings of $\\widehat{\\mathbb{C}}$ are the Moebius transformations. The Blaschke products are obtained by multiplying particular Moebius transformations. They are no longer one-to-one mappings. However, some of these products can be projected on $P^2$ and they become dianalytic self-mappings of $P^2$. More exactly, they represent canonical projections of non orientable branched covering Klein surfaces over $P^2$. This article is devoted to color visualization of such mappings. The working tool is the technique of simultaneous continuation we introduced in previous papers.
We study the parameter dependence of the Bergman kernels on some planar domains depending on complex parameter \\zeta in nontrivial \"pseudoconvex\" ways. Smoothly bounded cases are studied at first: It turns out that, in an example where the domains are annuli, the Levi form for the logarithm of the Bergman kernels with respect to \\zeta approaches to 0 as the point tends to the boundary of the domain, and in another example where the domains are discs, it approaches to 1 as the point tends to the complement of a point in the boundary. Further, in contrast to this, in the cases where the boundary of the domains are not smooth, such as discs with slits, rectangles and half strips, completely different phenomena are observed.
In this paper, we prove necessary and sufficient conditions for a sense-preserving harmonic function to be absolutely convex in the open unit disk. We also estimate the coefficient bound and obtain growth, covering and area theorems for absolutely convex harmonic mappings. A natural generalization of the classical Bernardi type operator for harmonic functions is considered and its connection between certain classes of uniformly starlike harmonic functions and uniformly convex harmonic functions is also investigated. At the end, as applications, we present a number of results connected with hypergeometric and polylogarithm functions.
Let $E$ be an arbitrary subset of the unit circle $T$ and let $f$ be a function defined on $E$. When there exist polynomials $P_n$ which are uniformly bounded by a number $M > 0$ on $T$ and converge (pointwise) to $f$ at each point of $E$? We give a necessary and sufficient description of such functions $f$. The necessity part of our result, in fact, is a classical theorem of S.Ya. Khavinson, while the proof of sufficiency uses the method that has been recently applied in particular in the author s solution of an approximation problem proposed by L. Zalcman.
Let $F\\in W_{loc}^{1,n}(\\Omega;\\Bbb R^n)$ be a mapping with non-negative Jacobian $J_F(x)=\\text{det} DF(x)\\ge 0$ a.e. in a domain $\\Omega\\in \\Bbb R^n$. The dilatation of the mapping $F$ is defined, almost everywhere in $\\Omega$, by the formula $$K(x)={{|DF(x)|^n}\\over {J_F(x)}}.$$ If $K(x)$ is bounded a.e., the mapping is said to be quasiregular. Quasiregular mappings are a generalization to higher dimensions of holomorphic mappings. The theory of higher dimensional quasiregular mappings began with Re\\v{s}hetnyak s theorem, stating that non constant quasiregular mappings are continuous, discrete and open. In some problems appearing in the theory of non-linear elasticity, the boundedness condition on $K(x)$ is too restrictive. Tipically we only know that $F$ has finite dilatation, that is, $K(x)$ is finite a.e. and $K(x)^p$ is integrable for some value $p$. In two dimensions, Iwaniec and \\v{S}verak [IS] have shown that $K(x)\\in L^1_{loc}$ is sufficient to guarantee the conclusion of Re\\v{s}hetnyak s theorem. For $n\\ge 3$, Heinonen and Koskela [HK], showed that if the mapping is quasi-light and $K(x)\\in L^p_{loc}$ for $p>n-1$, then the mapping $F(x)$ is continuous, discrete and open. Manfredi and Villamor [MV] proved a similar result without assuming that the mapping $f(x)$ was quasi-light. The result is known to be false, see [Ball], when $p<n-1$. In this paper we attempt to improve in those results. In particular, we will deal with the case $p=n-1$ for $n\\ge 3$, and will assume that our mapping $F(x)$ is quasi-light, that is, the inverse image of any point is compact in $\\Omega$. Our approach will be different from the ones used in [MV] and [HK]. It is more geometrical in nature and uses the method of extremal length.
Let X be a regular irreducible variety in CP^{n-1}, Y the associated homogeneous variety in C^n, and N the restriction of the universal bundle of CP^{n-1} to X. In the present paper, we compute the obstructions to solving the d-bar-equation in the L^p-sense on Y for 1<=p<=\\infty in terms of cohomology groups H^q(X,O(N^m)). That allows to identify obstructions explicitly if X is specified more precisely, for example if it is equivalent to CP^1 or an elliptic curve.
We study the topological invariant $\\phi$ of Kwieci\\ nski and Tworzewski, particularly beyond the case of mappings with smooth targets. We derive a lower bound for $\\phi$ of a general mapping, which is similarly effective as the upper bound given by Kwieci\\ nski and Tworzewski. Some classes of mappings are identified for which the exact value of $\\phi$ can be computed. Also, we prove that the variation of $\\phi$ on the source space of a mapping with a smooth target is semicontinuous in Zariski topology.
The purpose of this article is threefold. The first is to construct a Nevanlina theory for meromorphic mappings from a polydisc to a compact complex manifold. In particular, we give a simple proof of Lemma on logarithmic derivative for nonzero meromorphic functions on $\\mathbb{C}^l.$ The second is to improve the definition of the non-integrated defect relation of H. Fujimoto \\cite{F2} and to show two theorems on the new non-integrated defect relation of meromorphic maps from a closed submanifold of $\\mathbb{C}^l$ to a compact complex manifold. The third is to give a unicity theorem for meromorphic mappings from a Stein manifold to a compact complex manifold.
The Jensen envelope $J\\phi$ of an upper semicontinuous function $\\phi$ on a complex manifold X is defined at $x\\in X$ as the infimum of $\\mu(\\phi)$ over all Jensen measures $\\mu$ centred at x. The Poisson envelope $P\\phi$ is defined by using only the boundary measures of analytic discs centred at x. One of the main open problems in the theory of disc functionals is whether the Poisson envelope is plurisubharmonic on an arbitrary manifold. This is equivalent to the two envelopes being equal, so plurisubharmonicity of $J\\phi$ is a necessary condition for $P\\phi$ to be plurisubharmonic. We prove that the Jensen envelope is plurisubharmonic, with no assumptions on the manifold X. Hence $J\\phi$ is the largest plurisubharmonic function smaller than $\\phi$. We also show that the Poisson envelope is plurisubharmonic if and only if boundary measures of analytic discs are dense among Jensen measures.
We consider a family $M_t^n$, with $n\\ge 2$, $t>1$, of real hypersurfaces in a complex affine $n$-dimensional quadric arising in connection with the classification of homogeneous compact simply-connected real-analytic hypersurfaces in ${\\mathbb C}^n$ due to Morimoto and Nagano. To finalize their classification, one needs to resolve the problem of the embeddability of $M_t^n$ in ${\\mathbb C}^n$ for $n=3,7$. In our earlier article we showed that $M_t^7$ is not embeddable in ${\\mathbb C}^7$ for every $t$ and that $M_t^3$ is embeddable in ${\\mathbb C}^3$ for all $1<t<1+10^{-6}$. In the present paper, we improve on the latter result by showing that the embeddability of $M_t^3$ in fact takes place for $1<t<\\sqrt{(2+\\sqrt{2})/3}$. This is achieved by analyzing the explicit totally real embedding of the sphere $S^3$ in ${\\mathbb C}^3$ constructed by Ahern and Rudin. For $t\\ge\\sqrt{(2+\\sqrt{2})/3}$ the problem of the embeddability of $M_t^3$ remains open.
We establish compactness estimates for $\\bar{\\partial}_{M}$ on a compact pseudoconvex CR-submanifold $M$ of $\\mathbb{C}^{n}$ of hypersurface type that satisfies the (analogue of the) geometric sufficient conditions for compactness of the $\\bar{\\partial}$-Neumann operator given by the authors earlier. These conditions are formulated in terms of certain short time flows in complex tangential directions.
We study conformal mappings from the unit disk to one-toothed gear-shaped planar domains from the point of view of the Schwarzian derivative. Gear-shaped (or \"gearlike\") domains fit into a more general category of domains we call \"pregears\" (images of gears under Mobius transformations), which aid in the study of the conformal mappings for gears and which we also describe in detail. Such domains being bounded by arcs of circles, the Schwarzian derivative of the Riemann mapping is known to be a rational function of a specific form. One accessory parameter of these mappings is naturally related to the conformal modulus of the gear (or pregear) and we prove several qualitative results relating it to the principal remaining accessory parameter. The corresponding region of univalence (parameters for which the rational function is the Schwarzian derivative of a conformal mapping) is determined precisely.
Let $\\mathcal{W}_{\\beta}^\\delta(\\alpha,\\gamma)$ be the class of normalized analytic functions $f$ defined in the region $|z|<1$ and satisfying \\begin{align*} {\\rm Re,} e^{i\\phi}\\left(\\dfrac{}{}(1\\!-\\!\\alpha\\!+\\!2\\gamma)\\!\\left({f}/{z}\\right)^\\delta +\\left(\\alpha\\!-\\!3\\gamma+\\gamma\\left[\\dfrac{}{}\\left(1-{1}/{\\delta}\\right)\\left({zf }/{f}\\right)+ {1}/{\\delta}\\left(1+{zf\"}/{f }\\right)\\right]\\right)\\right.\\\\ \\left.\\dfrac{}{}\\left({f}/{z}\\right)^\\delta \\!\\left({zf }/{f}\\right)-\\beta\\right)>0, \\end{align*} with the conditions $\\alpha\\geq 0$, $\\beta<1$, $\\gamma\\geq 0$, $\\delta>0$ and $\\phi\\in\\mathbb{R}$. For a non-negative and real-valued integrable function $\\lambda(t)$ with $\\int_0^1\\lambda(t) dt=1$, the generalized non-linear integral transform is defined as \\begin{align*} V_{\\lambda}^\\delta(f)(z)= \\left(\\int_0^1 \\lambda(t) \\left({f(tz)}/{t}\\right)^\\delta dt\\right)^{1/\\delta}. \\end{align*} The main aim of the present work is to find conditions on the related parameters such that $V_\\lambda^\\delta(f)(z)\\in\\mathcal{W}_{\\beta_1}^{\\delta_1}(\\alpha_1,\\gamma_1)$, whenever $f\\in\\mathcal{W}_{\\beta_2}^{\\delta_2}(\\alpha_2,\\gamma_2)$. Further, several interesting applications for specific choices of $\\lambda(t)$ are discussed.
We prove that solutions of the homogeneous equation $Lu=0$, where $L$ is a locally integrable vector field with smooth coefficients in two variables possess the F. and M. Riesz property. That is, if $\\Omega$ is an open subset of the plane with smooth boundary, $u\\in C^1(\\Omega)$ satisfies $Lu=0$ on $\\Omega$, has tempered growth at the boundary, and its weak boundary value is a measure $\\mu$, then $\\mu$ is absolutely continuous with respect to Lebesgue measure on the noncharacteristic portion of $\\partial\\Omega$.
The $\\Pi$-operator (Ahlfors-Beurling transform) plays an important role in solving the Beltrami equation. In this paper we define two $\\Pi$-operators on the n-sphere. The first spherical $\\Pi$-operator is shown to be an $L^2$ isometry up to isomorphism. To improve this, with the help of the spectrum of the spherical Dirac operator, the second spherical $\\Pi$ operator is constructed as an isometric $L^2$ operator over the sphere. Some analogous properties for both $\\Pi$-operators are also developed. We also study the applications of both spherical $\\Pi$-operators to the solution of the spherical Beltrami equations.
Consider the Dirichlet-type space on the bidisk consisting of holomorphic functions $f(z_1,z_2):=\\sum_{k,l\\geq 0}a_{kl}z_1^kz_2^l$ such that $\\sum_{k,l\\geq 0}(k+1)^{\\alpha_1} (l+1)^{\\alpha_2}|a_{kl}|^2 <\\infty.$ Here the parameters $\\alpha_1,\\alpha_2$ are arbitrary real numbers. We characterize the polynomials that are cyclic for the shift operators on this space. More precisely, we show that, given an irreducible polynomial $p(z_1,z_2)$ depending on both $z_1$ and $z_2$ and having no zeros in the bidisk: if $\\alpha_1+\\alpha_2\\leq 1$, then $p$ is cyclic; if $\\alpha_1+\\alpha_2>1$ and $\\min\\{\\alpha_1,\\alpha_2\\}\\leq 1$, then $p$ is cyclic if and only if it has finitely many zeros in the two-torus $\\mathbb T^2$; if $\\min\\{\\alpha_1,\\alpha_2\\}>1$, then $p$ is cyclic if and only if it has no zeros in $\\mathbb T^2$.
Motivated by the study of the distribution of zeros of generalized Bessel-type functions, the principal goal of this paper is to identify new research directions in the theory of multiplier sequences. The investigations focus on multiplier sequences interpolated by functions which are not entire and sums, averages and parametrized families of multiplier sequences. The main results include (i) the development of a `logarithmic  multiplier sequence and (ii) several integral representations of a generalized Bessel-type function utilizing some ideas of G. H. Hardy and L. V. Ostrovskii. The explorations and analysis, augmented throughout the paper by a plethora of examples, led to a number of conjectures and intriguing open problems.
The characterization of the solvability of matrix versions of truncated Stieltjes-type moment problems led to the class of $\\alpha$-Stieltjes non-negative definite sequences of complex $q \\times q$ matrices. In [21], a parametrization of this class was introduced, the so-called $\\alpha$-Stieltjes parametrization. The main topic of this first part of the paper is the construction of a Schur-type algorithm which produces exactly the $\\alpha$-Stieltjes parametrization.
In this survey of the Andersen-Lempert theory we present the state of the art in the study of the density property (which means that the Lie algebra generated by completely integrable holomorphic vector fields on a given Stein manifold is dense in the space of all holomorphic vector fields). There are also two new results in the paper one of which is the theorem stating that the product of Stein manifolds with the volume density property possesses such a property as well. The second one is a meaningful example of an algebraic surface without the algebraic density property. The proof of the last fact requires Brunella s technique.
In this paper we have introduced two new classes $\\mathcal{H}\\mathcal{M}(\\beta, \\lambda, k, \\nu)$ and $\\overline{\\mathcal{H}\\mathcal{M}} (\\beta, \\lambda, k, \\nu)$ of complex valued harmonic multivalent functions of the form $f = h + \\overline g$, satisfying the condition \\[ Re \\{(1 - \\lambda) \\frac{\\Omega^vf}{z} + \\lambda(1-k) \\frac{(\\Omega^vf) }{z } + \\lambda k \\frac{(\\Omega^vf)  }{z  } \\} > \\beta, (z\\in \\mathcal{D})\\] where $h$ and $g$ are analytic in the unit disk $\\mathcal{D} = \\{z : |z| < 1\\}.$ A sufficient coefficient condition for this function in the class $\\mathcal{H}\\mathcal{M}(\\beta, \\lambda, k, \\nu)$ and a necessary and sufficient coefficient condition for the function $f$ in the class $\\overline{\\mathcal{H}\\mathcal{M}}(\\beta, \\lambda, k, \\nu)$ are determined. We investigate inclusion relations, distortion theorem, extreme points, convex combination and other interesting properties for these families of harmonic functions.
Given a bounded domain $D \\subset {\\mathbb R}^n$ strictly starlike with respect to $0 \\in D,,$ we define a quasi-inversion w.r.t. the boundary $\\partial D ,.$ We show that the quasi-inversion is bi-Lipschitz w.r.t. the chordal metric if and only if every \"tangent line\" of $\\partial D$ is far away from the origin. Moreover, the bi-Lipschitz constant tends to $1,$ when $\\partial D$ approaches the unit sphere in a suitable way. For the formulation of our results we use the concept of the $\\alpha$-tangent condition due to F. W. Gehring and J. V\\\"ais\\\"al\\\"a (Acta Math. 1965). This condition is shown to be equivalent to the bi-Lipschitz and quasiconformal extension property of what we call the polar parametrization of $\\partial D$. In addition, we show that the polar parametrization, which is a mapping of the unit sphere onto $\\partial D,,$ is bi-Lipschitz if and only if $D$ satisfies the $\\alpha$-tangent condition.
We give an explicit description of hyperbolic Reinhardt domains D in C^2 such that: (i) D has C^k-smooth boundary for some k greater than or equal to 1, (ii) D intersects at least one of the coordinate complex lines $\\{z_1=0\\}$, $\\{z_2=0\\}$, and (iii) D has noncompact automorphism group. We also give an example that explains why such a setting is natural for the case of hyperbolic domains and an example that indicates that the situation in C^n for n greater than or equal to 3 is essentially more complicated than that in C^2.
In this paper we introduce a class of pseudo-dissipative holomorphic maps which contains, in particular, the class of infinitesimal generators of semigroups of holomorphic maps on the unit ball of a complex Banach space. We give a growth estimate for maps of this class. In particular, it follows that pseudo-dissipative maps on the unit ball of (infinite-dimensional) Banach spaces are bounded on each domain strictly contained inside the ball. We also present some applications.
In this paper, we will show that if two meromorphic mappings $f$ and $g$ of $\\mathbb C^m$ into $\\mathbb P^n(\\mathbb C)$ have the same inverse images for $(2n+2)$ moving hyperplanes $\\{a_i\\}_{i=1}^{2n+2}$ with multiplicities counted to level $l_0$ then the map $f\\times g$ must be algebraically degenerated over the field $\\mathcal R\\{a_i\\}_{i=1}^{2n+2}$, where $l_0=3n^3(n+1)q(q-2)$ with $q=\\binom{2n+2}{n+2}$. Our result generalizes the previous result for fixed hyperplanes case of Fujimoto and also improves his result by giving an explicit estimate for the number $l_0$.
We introduce a new sequence of CR invariant determinants on a three dimensional CR manifold $M$ embedded in $\\mathbb C^2$. The lowest order invariant $\\det A_3$ represents E. Cartan s 6th order invariant (the umbilical \"tensor\"), whose zero locus yields the set of umbilical points on $M$. As an application of this new presentation of the umbilical invariant, we show that generic, almost circular perturbations of the unit sphere always contain curves or surfaces of umbilical points.
We prove estimates for solutions of the $\\bar \\partial u=\\omega $ equation in a strictly pseudo convex domain $ \\Omega $ in ${\\mathbb{C}}^{n}.$ For instance if the $ (p,q)$ current $\\omega $ has its coefficients in $L^{r}(\\Omega )$ with $1\\leq r<2(n+1)$ then there is a solution $u$ in $L^{s}(\\Omega )$ with $\\ \\frac{1}{s}=\\frac{1}{r}-\\frac{1}{2(n+1)}.$ We also have $BMO$ and Lipschitz estimates for $r\\geq 2(n+1).$ These results were already done by S. Krantz in the case of $(0,1)$ forms and just for the $L^{r}-L^{s}$ part by L. Ma and S. Vassiliadou for general $(p,q)$ forms. To get the complete result we propose another approach, based on Carleson measures of order $\\alpha $ and on the subordination lemma.
Answering a question of A.Zygmund in \\cite{MR} G.MacLane and L.Rubel described boundedness of $L_2$-norm w.r.t. the argument of $\\log |B|$, where $B$ is a Blaschke product. We generalize their results in several directions. We describe growth of $p$th means, $p\\in(1, \\infty)$, of subharmonic functions bounded from above in the unit disc. Necessary and sufficient conditions are formulated in terms of the complete measure (of a subharmonic function) in the sense of A.Grishin. We also prove sharp estimates of the growth of $p$th means of analytic and subharmonic functions of finite order in the unit disc.
By extending the idea of a difference operator with a fixed step to varying-steps difference operators, we have established a difference Nevanlinna theory for meromorphic functions with the steps tending to zero (vanishing period) and a difference Nevanlinna theory for finite order meromorphic functions with the steps tending to infinity (infinite period) in this paper. We can recover the classical little Picard theorem from the vanishing period theory, but we require additional finite order growth restriction for meromorphic functions from the infinite period theory. Then we give some applications of our theories to exhibit connections between discrete equations and and their continuous analogues.
An open Riemann surface is called parabolic in case every bounded subharmonic function on it reduces to a constant. Several authors introduced seemingly different analogs of this notion for Stein manifolds of arbitrary dimension. In the first part of this note we compile these notions of parabolicity and give some immediate relations among them. In section 3 we relate some of these notions to the linear topological type of the Fr\\ echet space of analytic functions on the given manifold. In sections 4 and 5 we look at some examples and show, for example, that the complement of the zero set of a Weierstrass polynomial possesses a continuous plurisubharmonic exhaustion function that is maximal off a compact subset.
We introduce and discuss some basic properties of a natural integral transform mapping isometrically the standard Hilbert space on the real line into the two-dimensional Bargmann-Fock space. This transform looks like the well-known one-dimensional Segal-Bargmann transform. Its left inverse is also obtained. Generalization to high dimensions is possible for $d=2^n$. Once connected to some well-known operators namely the Fourier transform and the Weyl operator we can recuperate isometrically the two-dimensional Bargmann-Fock space from its analogue on the complex plane.
In the present paper, questions about a local behavior of mappings $f:D\\rightarrow \\overline{{\\Bbb R}^n},$ $n\\ge 2,$ in $\\overline{D}$ are studied. Under some conditions on a measurable function $Q(x),$ $Q:D\\rightarrow [0, \\infty],$ and boundaries of $D$ and $D^{,\\prime}=f(D),$ it is showed that a family of open discrete map\\-ping $f:D\\rightarrow \\overline{{\\Bbb R}^n},$ $n\\ge 2,$ with characteristic of quasiconformality $Q(x),$ is equicontinuous in $\\overline{D}.$
We consider a proper holomorphic map form D to G domains in C^n and show that it induces a unitary isomorphism between the Bergman space A^2(G) and some subspace of A^2(D). Using this isomorphism we construct orthogonal projection onto that subspace and we derive Bells transformation formula for the Bergman kernel under proper holomorphic mappings. As a consequence of the formula we get that the tetrablock is not a Lu Qi-Keng domain.
It was once conjectured that if $A$ is a uniform algebra on its maximal ideal space $X$, and if each point of $X$ is a peak point for $A$, then $A = C(X)$. This peak-point conjecture was disproved by Brian Cole in 1968. Here we establish a peak-point theorem for uniform algebras generated by real-analytic functions on real-analytic varieties, generalizing previous results of the authors and John Wermer.
We consider the class of all analytic and locally univalent functions $f$ of the form $f(z)=z+\\sum_{n=2}^\\infty a_{2n-1} z^{2n-1}$, $|z|<1$, satisfying the condition $$ {\\rm Re},\\left(1+\\frac{zf^{\\prime\\prime}(z)}{f^\\prime (z)}\\right)>-\\frac{1}{2}. $$ We show that every section $s_{2n-1}(z)=z+\\sum_{k=2}^na_{2k-1}z^{2k-1}$, of $f$, is convex in the disk $|z|<\\sqrt{2}/3$. We also prove that the radius $\\sqrt{2}/3$ is best possible, i.e. the number $\\sqrt{2}/3$ cannot be replaced by a larger one.
This article considers isometries of the Kobayashi and Carath\\ {e}od-ory metrics on domains in $ \\mathbf{C}^n $ and the extent to which they behave like holomorphic mappings. First we prove a metric version of Poincar\\ {e} s theorem about biholomorphic inequivalence of $ \\mathbf{B}^n $, the unit ball in $ \\mathbf{C}^n $ and $ \\Delta^n $, the unit polydisc in $ \\mathbf{C}^n $ and then provide few examples which \\textit{suggest} that $ \\mathbf{B}^n $ cannot be mapped isometrically onto a product domain. In addition, we prove several results on continuous extension of isometries $ f : D_1 \\rightarrow D_2 $ to the closures under purely local assumptions on the boundaries. As an application, we show that there is no isometry between a strongly pseudoconvex domain in $ \\mathbf{C}^2 $ and certain classes of weakly pseudoconvex finite type domains in $ \\mathbf{C}^2 $.
Let $X$ be an Abelian cover $\\mathbb{CP}^{1}$ ramified at $mr$ points, $\\lambda_1...\\lambda_{mr}.$ we define a class of non positive divisors on $X$ of degree $g-1$ supported in the pre images of the branch points on $X$, such that the Riemann theta function doesn t vanish on their image in $J(X).$ We obtain a Thomae formula similar to the formulas [BR],[Na],[Z] ,[EG] and [Ko]. We show that up to a certain determinant of the non standard periods of $X$, the value of the Riemann theta function at these divisors raised to a high enough power is a polynomial in the branch point of the curve $X.$ Our approach is based on a refinement of Accola s results and Nakayashiki s approach explained in [Na] for Abelian covers.
We discuss the regularity of extremal functions in certain weighted Bergman and Fock type spaces. Given an appropriate analytic function $k$, the corresponding extremal function is the function with unit norm maximizing $\\text{Re} \\int_\\Omega f(z) \\overline{k(z)}, \\nu(z) , dA(z)$ over all functions $f$ of unit norm, where $\\nu$ is the weight function and $\\Omega$ is the domain of the functions in the space. We consider the case where $\\nu(z)$ is a decreasing radial function satisfying some additional assumptions, and where $\\Omega$ is either a disc centered at the origin or the entire complex plane. We show that if $k$ grows slowly in a certain sense, then $f$ must grow slowly in a related sense. We also discuss a relation between the integrability and growth of certain log-convex functions, and apply the result to obtain information about the growth of integral means of extremal functions in Fock type spaces.
Let $\\rho_\\Sigma=h(|z|^2)$ be a metric in a Riemann surface $\\Sigma$, where $h$ is a positive real function. Let $\\mathcal H_{r_1}=\\{w=f(z)\\}$ be the family of univalent $\\rho_\\Sigma$ harmonic mapping of the Euclidean annulus $A(r_1,1):=\\{z:r_1< |z| <1\\}$ onto a proper annulus $A_\\Sigma$ of the Riemann surface $\\Sigma$, which is subject of some geometric restrictions. It is shown that if $A_{\\Sigma}$ is fixed, then $\\sup\\{r_1: \\mathcal H_{r_1}\\neq \\emptyset \\}<1$. This generalizes the similar results from Euclidean case. The cases of Riemann and of hyperbolic harmonic mappings are treated in detail. Using the fact that the Gauss map of a surface with constant mean curvature (CMC) is a Riemann harmonic mapping, an application to the CMC surfaces is given (see Corollary \\ref{cor}). In addition some new examples of hyperbolic and Riemann radial harmonic diffeomorphisms are given, which have inspired some new J. C. C. Nitsche type conjectures for the class of these mappings.
In this paper, we study the gap rigidity phenomenon for proper holomorphic maps between balls of different dimension. We show that any $F\\in prop_3({\\mathbb{B}}^n, {\\mathbb{B}} ^N)$, with $3n<N\\leq 4n-7$ and $n\\geq 7$, is equivalent to a map of the form $(G,0)$ with $G\\in Rat ({\\mathbb{B}}^n,{\\mathbb{B}}^{3n})$. The main ingredients for the proof of our main theorem are the normal form obtained by Huang-Ji-Xu and a lemma of the first author.
We present a construction of regular Stein neighborhoods of a union of maximally totally real subspaces $M=(A+iI)\\mathbb{R}^n$ and $N=\\mathbb{R}^n$ in $\\mathbb{C}^n$, provided that the entries of a real $n \\times n$ matrix $A$ are sufficiently small. Our proof is based on a local construction of a suitable plurisubharmonic function $\\rho$ near the origin, such that the sublevel sets of $\\rho$ are strongly pseudoconvex and admit strong deformation retraction to $M\\cup N$. We also give the application of this result to totally real immersions of real $n$-manifolds in $\\mathbb{C}^n$ with only finitely many double points, and such that the union of the tangent spaces at each intersection in some local coordinates coincides with $M\\cup N$, described above.
If f: C -> P^n is a holomorphic curve of hyper-order less than one for which 2n + 1 hyperplanes in general position have forward invariant preimages with respect to the translation t(z)=z+c, then f is periodic with period c. This result, which can be described as a difference analogue of M. Green s Picard-type theorem for holomorphic curves, follows from a more general result presented in this paper. The proof relies on a new version of Cartan s second main theorem for the Casorati determinant and an extended version of the difference analogue of the lemma on the logarithmic derivatives, both of which are proved here. Finally, an application to the uniqueness theory of meromorphic functions is given, and the sharpness of the obtained results is demonstrated by examples.
Let H be the space of quaternions, with its standard hypercomplex structure. Let R(D) be the module of regular functions on D. For every unitary vector p in S^2, R(D) contains the space of holomorphic functions w.r.t. the complex structure J_p induced by p. We prove the existence, on any bounded domain D, of regular functions that are not J_p-holomorphic for any p. Our starting point is a result of Chen and Li concerning maps between hyperkaehler manifolds, where a similar result is obtained for a less restricted class of quaternionic maps. We give a criterion, based on the energy-minimizing property of holomorphic maps, that distinguishes J_p-holomorphic functions among regular functions.
The article deals with the class ${\\mathcal F}_{\\alpha }$ consisting of non-vanishing functions $f$ that are analytic and univalent in $\\ID$ such that the complement $\\IC\\backslash f(\\ID) $ is a convex set, $f(1)=\\infty ,$ $f(0)=1$ and the angle at $\\infty $ is less than or equal to $\\alpha \\pi ,$ for some $\\alpha \\in (1,2]$. Related to this class is the class $CO(\\alpha)$ of concave univalent mappings in $\\ID$, but this differs from ${\\mathcal F}_{\\alpha }$ with the standard normalization $f(0)=0=f (0)=1.$ A number of properties of these classes are discussed which includes an easy proof of the coefficient conjecture for $CO(2)$ settled by Avkhadiev et al. \\cite{Avk-Wir-04}. Moreover, another interesting result connected with the Yamashita conjecture on Dirichlet finite integral for $CO(\\alpha)$ is also presented.
A new class of regular quaternionic functions, defined by power series in a natural fashion, has been introduced in recent years. Several results of the theory recall the classical complex analysis, whereas other results reflect the peculiarity of the quaternionic structure. A more recent paper identified a larger class of domains, on which the study of regular functions is most natural and not limited to the study of quaternionic power series. In the present paper we extend some basic results concerning the algebraic and topological properties of the zero set to regular functions defined on these domains. We then use these results to prove the Maximum and Minimum Modulus Principles and a version of the Open Mapping Theorem in this new setting.
We give a generalization of the Komatu-Loewner equation to multiple slits. Therefore, we consider an $n$-connected circular slit disk $\\Omega$ as our initial domain minus $m\\in \\mathbb{N}$ disjoint, simple and continuous curves that grow from the outer boundary $\\partial \\mathbb{D}$ of $\\Omega$ into the interior. Consequently we get a decreasing family $(\\Omega_t)_{t\\in[0,T]}$ of domains with $\\Omega_0=\\Omega$. We will prove that the corresponding Riemann mapping functions $g_t$ from $\\Omega_t$ onto a circular slit disk, which are normalized by $g_t(0)=0$ and $g_t (0)>0$, satisfy a Loewner equation known as the Komatu-Loewner equation.
A crucial ingredient in the recent discovery by Ablowitz, Halburd, Herbst and Korhonen \\cite{AHH}, \\cite {HK-2} that a connection exists between discrete Painlev\\ e equations and (finite order) Nevanlinna theory is an estimate of the integrated average of $\\log^+|f(z+1)/f(z)|$ on $|z|=r$. We obtained essentially the same estimate in our previous paper \\cite{CF} independent of Halburd et al \\cite{HK-1}. We continue our study in this paper by establishing complete asymptotic relations amongst the logarithmic differences, difference quotients and logarithmic derivatives for finite order meromorphic functions. In addition to the potential applications of our new estimates in integrable systems, they are also of independent interest. In particular, our findings show that there are marked differences between the growth of meromorphic functions with Nevanlinna order smaller and greater than one. We have established a \"difference\" analogue of the classical Wiman-Valiron type estimates for meromorphic functions with order less than one, which allow us to prove all entire solutions of linear difference equations (with polynomial coefficients) of order less than one must have positive rational order of growth. We have also established that any entire solution to a first order algebraic difference equation (with polynomial coefficients) must have a positive order of growth, which is a \"difference\" analogue of a classical result of P\\ olya.
Let $\\Omega\\subset {\\mathbb C}^n$ be a bounded domain with the hyperconvexity index $\\alpha(\\Omega)>0$. Let $\\varrho$ be the relative extremal function of a fixed closed ball in $\\Omega$ and set $\\mu:=|\\varrho|(1+|\\log|\\varrho||)^{-1}$, $\\nu:=|\\varrho|(1+|\\log|\\varrho||)^n$. We obtain the following estimates for the Bergman kernel: (1) For every $0<\\alpha<\\alpha(\\Omega)$ and $2\\le p<2+\\frac{2\\alpha(\\Omega)}{2n-\\alpha(\\Omega)}$, there exists a constant $C>0$ such that $\\int_\\Omega |\\frac{K_\\Omega(\\cdot,w)}{\\sqrt{K_\\Omega(w)}}|^{p}\\le C |\\mu(w)|^{-\\frac{(p-2) n}\\alpha}$ for all $w\\in \\Omega$. (2) For every $0<r<1$, there exists a constant $C>0$ such that $ \\frac{|K_\\Omega(z,w)|^2}{K_\\Omega(z)K_\\Omega(w)}\\le C (\\min\\{\\frac{\\nu(z)}{\\mu(w)},\\frac{\\nu(w)}{\\mu(z)}\\})^r $ for all $z,w\\in \\Omega$. Various application of these estimates are given.
A complex manifold $Y$ is said to have the interpolation property if a holomorphic map to $Y$ from a subvariety $S$ of a reduced Stein space $X$ has a holomorphic extension to $X$ if it has a continuous extension. Taking $S$ to be a contractible submanifold of $X=\\mathbb{C}^n$ gives an ostensibly much weaker property called the convex interpolation property. By a deep theorem of Forstneri\\v{c}, the two properties are equivalent. They (and about a dozen other nontrivially equivalent properties) define the class of Oka manifolds. This paper is the first attempt to develop Oka theory for singular targets. The targets that we study are affine toric varieties, not necessarily normal. We prove that every affine toric variety satisfies a weakening of the interpolation property that is much stronger than the convex interpolation property, but the full interpolation property fails for most affine toric varieties, even for a source as simple as the product of two annuli embedded in $\\mathbb{C}^4$.
The paper is related to the author s talk at the Hayama Symposium in Complex Analysis in December 2000. In section 1 we survey results on the Oka principle for sections of holomorphic submersions over Stein manifolds. In section 2 we apply these results to the lifting problem for holomorphic mappings from Stein manifolds, and in section 3 we apply them to the problem of removability of intersections of holomorphic maps from Stein manifolds with closed complex subvarieties of the target space.
After the solution of Cousin II problem by K. Oka III in 1939, he thought an {\\it extra-zero problem} in 1945 (his posthumous paper) asking if it is possible to solve an arbitrarily given Cousin II problem adding some extra-zeros whose support is disjoint from the given one. By the secondly named author, some special case was affirmatively confirmed in dimension two and a counter-example in dimension three or more was given. The purpose of the present paper is to give a complete solution of this problem with examples and to discuss some new questions.
Since many real-world concepts are associated with colour, for example danger with red, linguistic information is often complimented with the use of appropriate colours in information visualization and product marketing. Yet, there is no comprehensive resource that captures concept-colour associations. We present a method to create a large word-colour association lexicon by crowdsourcing. We focus especially on abstract concepts and emotions to show that even though they cannot be physically visualized, they too tend to have strong colour associations. Finally, we show how word-colour associations manifest themselves in language, and quantify usefulness of co-occurrence and polarity cues in automatically detecting colour associations.
Principal component analysis (PCA) and related techniques have been successfully employed in natural language processing. Text mining applications in the age of the online social media (OSM) face new challenges due to properties specific to these use cases (e.g. spelling issues specific to texts posted by users, the presence of spammers and bots, service announcements, etc.). In this paper, we employ a Robust PCA technique to separate typical outliers and highly localized topics from the low-dimensional structure present in language use in online social networks. Our focus is on identifying geospatial features among the messages posted by the users of the Twitter microblogging service. Using a dataset which consists of over 200 million geolocated tweets collected over the course of a year, we investigate whether the information present in word usage frequencies can be used to identify regional features of language use and topics of interest. Using the PCA pursuit method, we are able to identify important low-dimensional features, which constitute smoothly varying functions of the geographic location.
In this article, how word embeddings can be used as features in Chinese sentiment classification is presented. Firstly, a Chinese opinion corpus is built with a million comments from hotel review websites. Then the word embeddings which represent each comment are used as input in different machine learning methods for sentiment classification, including SVM, Logistic Regression, Convolutional Neural Network (CNN) and ensemble methods. These methods get better performance compared with N-gram models using Naive Bayes (NB) and Maximum Entropy (ME). Finally, a combination of machine learning methods is proposed which presents an outstanding performance in precision, recall and F1 score. After selecting the most useful methods to construct the combinational model and testing over the corpus, the final F1 score is 0.920.
We present a model for aggregation of product review snippets by joint aspect identification and sentiment analysis. Our model simultaneously identifies an underlying set of ratable aspects presented in the reviews of a product (e.g., sushi and miso for a Japanese restaurant) and determines the corresponding sentiment of each aspect. This approach directly enables discovery of highly-rated or inconsistent aspects of a product. Our generative model admits an efficient variational mean-field inference algorithm. It is also easily extensible, and we describe several modifications and their effects on model structure and inference. We test our model on two tasks, joint aspect identification and sentiment analysis on a set of Yelp reviews and aspect identification alone on a set of medical summaries. We evaluate the performance of the model on aspect identification, sentiment analysis, and per-word labeling accuracy. We demonstrate that our model outperforms applicable baselines by a considerable margin, yielding up to 32% relative error reduction on aspect identification and up to 20% relative error reduction on sentiment analysis.
The emergence and global adoption of social media has rendered possible the real-time estimation of population-scale sentiment, bearing profound implications for our understanding of human behavior. Given the growing assortment of sentiment measuring instruments, comparisons between them are evidently required. Here, we perform detailed tests of 6 dictionary-based methods applied to 4 different corpora, and briefly examine a further 20 methods. We show that a dictionary-based method will only perform both reliably and meaningfully if (1) the dictionary covers a sufficiently large enough portion of a given text s lexicon when weighted by word usage frequency; and (2) words are scored on a continuous scale.
In this work we explore recent advances in Recurrent Neural Networks for large scale Language Modeling, a task central to language understanding. We extend current models to deal with two key challenges present in this task: corpora and vocabulary sizes, and complex, long term structure of language. We perform an exhaustive study on techniques such as character Convolutional Neural Networks or Long-Short Term Memory, on the One Billion Word Benchmark. Our best single model significantly improves state-of-the-art perplexity from 51.3 down to 30.0 (whilst reducing the number of parameters by a factor of 20), while an ensemble of models sets a new record by improving perplexity from 41.0 down to 23.7. We also release these models for the NLP and ML community to study and improve upon.
In this paper, an event network is presented for exploring open information, where linguistic units about an event are organized for analysing. The process is divided into three steps: document event detection, event network construction and event network analysis. First, by implementing event detection or tracking, documents are retrospectively (or on-line) organized into document events. Secondly, for each of the document event, linguistic units are extracted and combined into event networks. Thirdly, various analytic methods are proposed for event network analysis. In our application methodologies are presented for exploring open information.
Conversation between two people is usually of mixed-initiative, with control over the conversation being transferred from one person to another. We apply a set of rules for the transfer of control to 4 sets of dialogues consisting of a total of 1862 turns. The application of the control rules lets us derive domain-independent discourse structures. The derived structures indicate that initiative plays a role in the structuring of discourse. In order to explore the relationship of control and initiative to discourse processes like centering, we analyze the distribution of four different classes of anaphora for two data sets. This distribution indicates that some control segments are hierarchically related to others. The analysis suggests that discourse participants often mutually agree to a change of topic. We also compared initiative in Task Oriented and Advice Giving dialogues and found that both allocation of control and the manner in which control is transferred is radically different for the two dialogue types. These differences can be explained in terms of collaborative planning principles.
Question answering tasks have shown remarkable progress with distributed vector representation. In this paper, we investigate the recently proposed Facebook bAbI tasks which consist of twenty different categories of questions that require complex reasoning. Because the previous work on bAbI are all end-to-end models, errors could come from either an imperfect understanding of semantics or in certain steps of the reasoning. For clearer analysis, we propose two vector space models inspired by Tensor Product Representation (TPR) to perform knowledge encoding and logical reasoning based on common-sense inference. They together achieve near-perfect accuracy on all categories including positional reasoning and path finding that have proved difficult for most of the previous approaches. We hypothesize that the difficulties in these categories are due to the multi-relations in contrast to uni-relational characteristic of other categories. Our exploration sheds light on designing more sophisticated dataset and moving one step toward integrating transparent and interpretable formalism of TPR into existing learning paradigms.
We present an empirical study of the applicability of Probabilistic Lexicalized Tree Insertion Grammars (PLTIG), a lexicalized counterpart to Probabilistic Context-Free Grammars (PCFG), to problems in stochastic natural-language processing. Comparing the performance of PLTIGs with non-hierarchical N-gram models and PCFGs, we show that PLTIG combines the best aspects of both, with language modeling capability comparable to N-grams, and improved parsing performance over its non-lexicalized counterpart. Furthermore, training of PLTIGs displays faster convergence than PCFGs.
We propose a novel convolutional architecture, named $gen$CNN, for word sequence prediction. Different from previous work on neural network-based language modeling and generation (e.g., RNN or LSTM), we choose not to greedily summarize the history of words as a fixed length vector. Instead, we use a convolutional neural network to predict the next word with the history of words of variable length. Also different from the existing feedforward networks for language modeling, our model can effectively fuse the local correlation and global correlation in the word sequence, with a convolution-gating strategy specifically designed for the task. We argue that our model can give adequate representation of the history, and therefore can naturally exploit both the short and long range dependencies. Our model is fast, easy to train, and readily parallelized. Our extensive experiments on text generation and $n$-best re-ranking in machine translation show that $gen$CNN outperforms the state-of-the-arts with big margins.
In this work, we model abstractive text summarization using Attentional Encoder-Decoder Recurrent Neural Networks, and show that they achieve state-of-the-art performance on two different corpora. We propose several novel models that address critical problems in summarization that are not adequately modeled by the basic architecture, such as modeling key-words, capturing the hierarchy of sentence-to-word structure, and emitting words that are rare or unseen at training time. Our work shows that many of our proposed models contribute to further improvement in performance. We also propose a new dataset consisting of multi-sentence summaries, and establish performance benchmarks for further research.
Large-scale comparisons between the poetry of Tang and Song dynasties shed light on how words, collocations, and expressions were used and shared among the poets. That some words were used only in the Tang poetry and some only in the Song poetry could lead to interesting research in linguistics. That the most frequent colors are different in the Tang and Song poetry provides a trace of the changing social circumstances in the dynasties. Results of the current work link to research topics of lexicography, semantics, and social transitions. We discuss our findings and present our algorithms for efficient comparisons among the poems, which are crucial for completing billion times of comparisons within acceptable time.
We propose NEMO, a system for extracting organization names in the affiliation and normalizing them to a canonical organization name. Our parsing process involves multi-layered rule matching with multiple dictionaries. The system achieves more than 98% f-score in extracting organization names. Our process of normalization that involves clustering based on local sequence alignment metrics and local learning based on finding connected components. A high precision was also observed in normalization. NEMO is the missing link in associating each biomedical paper and its authors to an organization name in its canonical form and the Geopolitical location of the organization. This research could potentially help in analyzing large social networks of organizations for landscaping a particular topic, improving performance of author disambiguation, adding weak links in the co-author network of authors, augmenting NLM s MARS system for correcting errors in OCR output of affiliation field, and automatically indexing the PubMed citations with the normalized organization name and country. Our system is available as a graphical user interface available for download along with this paper.
Computational measures of semantic similarity between geographic terms provide valuable support across geographic information retrieval, data mining, and information integration. To date, a wide variety of approaches to geo-semantic similarity have been devised. A judgment of similarity is not intrinsically right or wrong, but obtains a certain degree of cognitive plausibility, depending on how closely it mimics human behavior. Thus selecting the most appropriate measure for a specific task is a significant challenge. To address this issue, we make an analogy between computational similarity measures and soliciting domain expert opinions, which incorporate a subjective set of beliefs, perceptions, hypotheses, and epistemic biases. Following this analogy, we define the semantic similarity ensemble (SSE) as a composition of different similarity measures, acting as a panel of experts having to reach a decision on the semantic similarity of a set of geographic terms. The approach is evaluated in comparison to human judgments, and results indicate that an SSE performs better than the average of its parts. Although the best member tends to outperform the ensemble, all ensembles outperform the average performance of each ensemble s member. Hence, in contexts where the best measure is unknown, the ensemble provides a more cognitively plausible approach.
Textual sentiment analysis and emotion detection consists in retrieving the sentiment or emotion carried by a text or document. This task can be useful in many domains: opinion mining, prediction, feedbacks, etc. However, building a general purpose tool for doing sentiment analysis and emotion detection raises a number of issues, theoretical issues like the dependence to the domain or to the language but also pratical issues like the emotion representation for interoperability. In this paper we present our sentiment/emotion analysis tools, the way we propose to circumvent the di culties and the applications they are used for.
Structured language models for speech recognition have been shown to remedy the weaknesses of n-gram models. All current structured language models are, however, limited in that they do not take into account dependencies between non-headwords. We show that non-headword dependencies contribute to significantly improved word error rate, and that a data-oriented parsing model trained on semantically and syntactically annotated data can exploit these dependencies. This paper also contains the first DOP model trained by means of a maximum likelihood reestimation procedure, which solves some of the theoretical shortcomings of previous DOP models.
When parsing unrestricted language, wide-covering grammars often undergenerate. Undergeneration can be tackled either by sentence correction, or by grammar correction. This thesis concentrates upon automatic grammar correction (or machine learning of grammar) as a solution to the problem of undergeneration. Broadly speaking, grammar correction approaches can be classified as being either {\\it data-driven}, or {\\it model-based}. Data-driven learners use data-intensive methods to acquire grammar. They typically use grammar formalisms unsuited to the needs of practical text processing and cannot guarantee that the resulting grammar is adequate for subsequent semantic interpretation. That is, data-driven learners acquire grammars that generate strings that humans would judge to be grammatically ill-formed (they {\\it overgenerate}) and fail to assign linguistically plausible parses. Model-based learners are knowledge-intensive and are reliant for success upon the completeness of a {\\it model of grammaticality}. But in practice, the model will be incomplete. Given that in this thesis we deal with undergeneration by learning, we hypothesise that the combined use of data-driven and model-based learning would allow data-driven learning to compensate for model-based learning s incompleteness, whilst model-based learning would compensate for data-driven learning s unsoundness. We describe a system that we have used to test the hypothesis empirically. The system combines data-driven and model-based learning to acquire unification-based grammars that are more suitable for practical text parsing. Using the Spoken English Corpus as data, and by quantitatively measuring undergeneration, overgeneration and parse plausibility, we show that this hypothesis is correct.
Texts exhibit considerable stylistic variation. This paper reports an experiment where a corpus of documents (N= 75 000) is analyzed using various simple stylistic metrics. A subset (n = 1000) of the corpus has been previously assessed to be relevant for answering given information retrieval queries. The experiment shows that this subset differs significantly from the rest of the corpus in terms of the stylistic metrics studied.
Training efficiency is one of the main problems for Neural Machine Translation (NMT). Deep networks, very large data and many training iterations are necessary to achieve state-of-the-art performance for NMT. This results in very high computation cost and slow down research and industrialization. In this paper, we first investigate the instability by randomizations for NMT training, and further propose an efficient training method based on data boosting and bootstrapping with no modifications to the neural network. Experiments show that this method can converge much faster compared with a baseline system and achieve stable improvement up to 2.36 BLEU points with 80% training cost.
In this work we present the results of our experimental work on the develop-ment of lexical class-based lexica by automatic means. The objective is to as-sess the use of linguistic lexical-class based information as a feature selection methodology for the use of classifiers in quick lexical development. The results show that the approach can help in re-ducing the human effort required in the development of language resources sig-nificantly.
About 1115 rules in Astadhyayi from A.4.1.76 to A.5.4.160 deal with generation of derivative nouns, making it one of the largest topical sections in Astadhyayi, called as the Taddhita section owing to the head rule A.4.1.76. This section is a systematic arrangement of rules that enumerates various affixes that are used in the derivation under specific semantic relations. We propose a system that automates the process of generation of derivative nouns as per the rules in Astadhyayi. The proposed system follows a completely object oriented approach, that models each rule as a class of its own and then groups them as rule groups. The rule groups are decided on the basis of selective grouping of rules by virtue of anuvrtti. The grouping of rules results in an inheritance network of rules which is a directed acyclic graph. Every rule group has a head rule and the head rule notifies all the direct member rules of the group about the environment which contains all the details about data entities, participating in the derivation process. The system implements this mechanism using multilevel inheritance and observer design patterns. The system focuses not only on generation of the desired final form, but also on the correctness of sequence of rules applied to make sure that the derivation has taken place in strict adherence to Astadhyayi. The proposed system s design allows to incorporate various conflict resolution methods mentioned in authentic texts and hence the effectiveness of those rules can be validated with the results from the system. We also present cases where we have checked the applicability of the system with the rules which are not specifically applicable to derivation of derivative nouns, in order to see the effectiveness of the proposed schema as a generic system for modeling Astadhyayi.
Machine learning about language can be improved by supplying it with specific knowledge and sources of external information. We present here a new version of the linked open data resource ConceptNet that is particularly well suited to be used with modern NLP techniques such as word embeddings. ConceptNet is a knowledge graph that connects words and phrases of natural language with labeled edges. Its knowledge is collected from many sources that include expert-created resources, crowd-sourcing, and games with a purpose. It is designed to represent the general knowledge involved in understanding language, improving natural language applications by allowing the application to better understand the meanings behind the words people use. When ConceptNet is combined with word embeddings acquired from distributional semantics (such as word2vec), it provides applications with understanding that they would not acquire from distributional semantics alone, nor from narrower resources such as WordNet or DBPedia. We demonstrate this with state-of-the-art results on intrinsic evaluations of word relatedness that translate into improvements on applications of word vectors, including solving SAT-style analogies.
This paper presents a statistical decision procedure for lexical ambiguity resolution. The algorithm exploits both local syntactic patterns and more distant collocational evidence, generating an efficient, effective, and highly perspicuous recipe for resolving a given ambiguity. By identifying and utilizing only the single best disambiguating evidence in a target context, the algorithm avoids the problematic complex modeling of statistical dependencies. Although directly applicable to a wide class of ambiguities, the algorithm is described and evaluated in a realistic case study, the problem of restoring missing accents in Spanish and French text.
Maximum entropy models are considered by many to be one of the most promising avenues of language modeling research. Unfortunately, long training times make maximum entropy research difficult. We present a novel speedup technique: we change the form of the model to use classes. Our speedup works by creating two maximum entropy models, the first of which predicts the class of each word, and the second of which predicts the word itself. This factoring of the model leads to fewer non-zero indicator functions, and faster normalization, achieving speedups of up to a factor of 35 over one of the best previous techniques. It also results in typically slightly lower perplexities. The same trick can be used to speed training of other machine learning techniques, e.g. neural networks, applied to any problem with a large number of outputs, such as language modeling.
This paper describes the Arabic Multi-Genre Broadcast (MGB-2) Challenge for SLT-2016. Unlike last year s English MGB Challenge, which focused on recognition of diverse TV genres, this year, the challenge has an emphasis on handling the diversity in dialect in Arabic speech. Audio data comes from 19 distinct programmes from the Aljazeera Arabic TV channel between March 2005 and December 2015. Programmes are split into three groups: conversations, interviews, and reports. A total of 1,200 hours have been released with lightly supervised transcriptions for the acoustic modelling. For language modelling, we made available over 110M words crawled from Aljazeera Arabic website Aljazeera.net for a 10 year duration 2000-2011. Two lexicons have been provided, one phoneme based and one grapheme based. Finally, two tasks were proposed for this year s challenge: standard speech transcription, and word alignment. This paper describes the task data and evaluation process used in the MGB challenge, and summarises the results obtained.
We present WikiReading, a large-scale natural language understanding task and publicly-available dataset with 18 million instances. The task is to predict textual values from the structured knowledge base Wikidata by reading the text of the corresponding Wikipedia articles. The task contains a rich variety of challenging classification and extraction sub-tasks, making it well-suited for end-to-end models such as deep neural networks (DNNs). We compare various state-of-the-art DNN-based architectures for document classification, information extraction, and question answering. We find that models supporting a rich answer space, such as word or character sequences, perform best. Our best-performing model, a word-level sequence to sequence model with a mechanism to copy out-of-vocabulary words, obtains an accuracy of 71.8%.
In languages such as Japanese, the use of {\\it zeros}, unexpressed arguments of the verb, in utterances that shift the topic involves a risk that the meaning intended by the speaker may not be transparent to the hearer. However, this potentially undesirable conversational strategy often occurs in the course of naturally-occurring discourse. In this chapter, I report on an empirical study of 250 utterances with {\\it zeros} in 20 Japanese newspaper articles. Each utterance is analyzed in terms of centering transitions and the form in which centers are realized by referring expressions. I also examine lexical subcategorization information, and tense and aspect in order to test the hypothesis that the speaker expects the hearer to use this information in determining global discourse structure. I explain the occurrence of {\\it zeros} in {\\sc retain} and {\\sc rough-shift} centering transitions, by claiming that a {\\it zero} can only be used in these cases when the shift of centers is supported by contextual information such as lexical semantics, tense and aspect, and agreement features. I then propose an algorithm by which centering can incorporate these observations to integrate centering with global discourse structure, and thus enhance its ability for non-local pronoun resolution.
We train one multilingual model for dependency parsing and use it to parse sentences in several languages. The parsing model uses (i) multilingual word clusters and embeddings; (ii) token-level language information; and (iii) language-specific features (fine-grained POS tags). This input representation enables the parser not only to parse effectively in multiple languages, but also to generalize across languages based on linguistic universals and typological similarities, making it more effective to learn from limited annotations. Our parser s performance compares favorably to strong baselines in a range of data scenarios, including when the target language has a large treebank, a small treebank, or no treebank for training.
This paper describes the Georgia Tech team s approach to the CoNLL-2016 supplementary evaluation on discourse relation sense classification. We use long short-term memories (LSTM) to induce distributed representations of each argument, and then combine these representations with surface features in a neural network. The architecture of the neural network is determined by Bayesian hyperparameter search.
Bagging and boosting, two effective machine learning techniques, are applied to natural language parsing. Experiments using these techniques with a trainable statistical parser are described. The best resulting system provides roughly as large of a gain in F-measure as doubling the corpus size. Error analysis of the result of the boosting technique reveals some inconsistent annotations in the Penn Treebank, suggesting a semi-automatic method for finding inconsistent treebank annotations.
The process of microplanning encompasses a range of problems in Natural Language Generation (NLG), such as referring expression generation, lexical choice, and aggregation, problems in which a generator must bridge underlying domain-specific representations and general linguistic representations. In this paper, we describe a uniform approach to microplanning based on declarative representations of a generator s communicative intent. These representations describe the results of NLG: communicative intent associates the concrete linguistic structure planned by the generator with inferences that show how the meaning of that structure communicates needed information about some application domain in the current discourse context. Our approach, implemented in the SPUD (sentence planning using description) microplanner, uses the lexicalized tree-adjoining grammar formalism (LTAG) to connect structure to meaning and uses modal logic programming to connect meaning to context. At the same time, communicative intent representations provide a resource for the process of NLG. Using representations of communicative intent, a generator can augment the syntax, semantics and pragmatics of an incomplete sentence simultaneously, and can assess its progress on the various problems of microplanning incrementally. The declarative formulation of communicative intent translates into a well-defined methodology for designing grammatical and conceptual resources which the generator can use to achieve desired microplanning behavior in a specified domain.
Phonology, as it is practiced, is deeply computational. Phonological analysis is data-intensive and the resulting models are nothing other than specialized data structures and algorithms. In the past, phonological computation - managing data and developing analyses - was done manually with pencil and paper. Increasingly, with the proliferation of affordable computers, IPA fonts and drawing software, phonologists are seeking to move their computation work online. Computational Phonology provides the theoretical and technological framework for this migration, building on methodologies and tools from computational linguistics. This piece consists of an apology for computational phonology, a history, and an overview of current research.
Chinese text processing systems are using Double Byte Coding , while almost all existing Sanskrit Based Indian Languages have been using Single Byte coding for text processing. Through observation, Chinese Information Processing Technique has already achieved great technical development both in east and west. In contrast,Indian Languages are being processed by computer, more or less, for word processing purpose. This paper mainly emphasizes the method of processing Indian languages from a Computational Linguistic point of view. An overall design method is illustrated in this paper.This method concentrated on maximum resource utilization and compatibility: the ultimate goal is to have a Multiplatform Multilingual System. Keywords Text Procrssing, Multilingual Text Processing, Chinese Language Processing, Indian Language Processing, Character Coding.
Emoji are a contemporary and extremely popular way to enhance electronic communication. Without rigid semantics attached to them, emoji symbols take on different meanings based on the context of a message. Thus, like the word sense disambiguation task in natural language processing, machines also need to disambiguate the meaning or sense of an emoji. In a first step toward achieving this goal, this paper presents EmojiNet, the first machine readable sense inventory for emoji. EmojiNet is a resource enabling systems to link emoji with their context-specific meaning. It is automatically constructed by integrating multiple emoji resources with BabelNet, which is the most comprehensive multilingual sense inventory available to date. The paper discusses its construction, evaluates the automatic resource creation process, and presents a use case where EmojiNet disambiguates emoji usage in tweets. EmojiNet is available online for use at this http URL
Keystroke dynamics have been extensively used in psycholinguistic and writing research to gain insights into cognitive processing. But do keystroke logs contain actual signal that can be used to learn better natural language processing models? We postulate that keystroke dynamics contain information about syntactic structure that can inform shallow syntactic parsing. To test this hypothesis, we explore labels derived from keystroke logs as auxiliary task in a multi-task bidirectional Long Short-Term Memory (bi-LSTM). Our results show promising results on two shallow syntactic parsing tasks, chunking and CCG supertagging. Our model is simple, has the advantage that data can come from distinct sources, and produces models that are significantly better than models trained on the text annotations alone.
Universal schema predicts the types of entities and relations in a knowledge base (KB) by jointly embedding the union of all available schema types---not only types from multiple structured databases (such as Freebase or Wikipedia infoboxes), but also types expressed as textual patterns from raw text. This prediction is typically modeled as a matrix completion problem, with one type per column, and either one or two entities per row (in the case of entity types or binary relation types, respectively). Factorizing this sparsely observed matrix yields a learned vector embedding for each row and each column. In this paper we explore the problem of making predictions for entities or entity-pairs unseen at training time (and hence without a pre-learned row embedding). We propose an approach having no per-row parameters at all; rather we produce a row vector on the fly using a learned aggregation function of the vectors of the observed columns for that row. We experiment with various aggregation functions, including neural network attention models. Our approach can be understood as a natural language database, in that questions about KB entities are answered by attending to textual or database evidence. In experiments predicting both relations and entity types, we demonstrate that despite having an order of magnitude fewer parameters than traditional universal schema, we can match the accuracy of the traditional model, and more importantly, we can now make predictions about unseen rows with nearly the same accuracy as rows available at training time.
This paper presents text normalization which is an integral part of any text-to-speech synthesis system. Text normalization is a set of methods with a task to write non-standard words, like numbers, dates, times, abbreviations, acronyms and the most common symbols, in their full expanded form are presented. The whole taxonomy for classification of non-standard words in Croatian language together with rule-based normalization methods combined with a lookup dictionary are proposed. Achieved token rate for normalization of Croatian texts is 95%, where 80% of expanded words are in correct morphological form.
Understanding entailment and contradiction is fundamental to understanding natural language, and inference about entailment and contradiction is a valuable testing ground for the development of semantic representations. However, machine learning research in this area has been dramatically limited by the lack of large-scale resources. To address this, we introduce the Stanford Natural Language Inference corpus, a new, freely available collection of labeled sentence pairs, written by humans doing a novel grounded task based on image captioning. At 570K pairs, it is two orders of magnitude larger than all other resources of its type. This increase in scale allows lexicalized classifiers to outperform some sophisticated existing entailment models, and it allows a neural network-based model to perform competitively on natural language inference benchmarks for the first time.
At the present time, computers are employed to solve complex tasks and problems ranging from simple calculations to intensive digital image processing and intricate algorithmic optimization problems to computationally-demanding weather forecasting problems. ASR short for Automatic Speech Recognition is yet another type of computational problem whose purpose is to recognize human spoken speech and convert it into text that can be processed by a computer. Despite that ASR has many versatile and pervasive real-world applications,it is still relatively erroneous and not perfectly solved as it is prone to produce spelling errors in the recognized text, especially if the ASR system is operating in a noisy environment, its vocabulary size is limited, and its input speech is of bad or low quality. This paper proposes a post-editing ASR error correction method based on MicrosoftN-Gram dataset for detecting and correcting spelling errors generated by ASR systems. The proposed method comprises an error detection algorithm for detecting word errors; a candidate corrections generation algorithm for generating correction suggestions for the detected word errors; and a context-sensitive error correction algorithm for selecting the best candidate for correction. The virtue of using the Microsoft N-Gram dataset is that it contains real-world data and word sequences extracted from the web which canmimica comprehensive dictionary of words having a large and all-inclusive vocabulary. Experiments conducted on numerous speeches, performed by different speakers, showed a remarkable reduction in ASR errors. Future research can improve upon the proposed algorithm so much so that it can be parallelized to take advantage of multiprocessor and distributed systems.
The study presented here relies on the integrated use of different kinds of knowledge in order to improve first-guess accuracy in non-word context-sensitive correction for general unrestricted texts. State of the art spelling correction systems, e.g. ispell, apart from detecting spelling errors, also assist the user by offering a set of candidate corrections that are close to the misspelled word. Based on the correction proposals of ispell, we built several guessers, which were combined in different ways. Firstly, we evaluated all possibilities and selected the best ones in a corpus with artificially generated typing errors. Secondly, the best combinations were tested on texts with genuine spelling errors. The results for the latter suggest that we can expect automatic non-word correction for all the errors in a free running text with 80% precision and a single proposal 98% of the times (1.02 proposals on average).
A patent is a property right for an invention granted by the government to the inventor. An invention is a solution to a specific technological problem. So patents often have a high concentration of scientific and technical terms that are rare in everyday language. The Chinese word segmentation model trained on currently available everyday language data sets performs poorly because it cannot effectively recognize these scientific and technical terms. In this paper we describe a pragmatic approach to Chinese word segmentation on patents where we train a character-based semi-supervised sequence labeling model by extracting features from a manually segmented corpus of 142 patents, enhanced with information extracted from the Chinese TreeBank. Experiments show that the accuracy of our model reached 95.08% (F1 score) on a held-out test set and 96.59% on development set, compared with an F1 score of 91.48% on development set if the model is trained on the Chinese TreeBank. We also experimented with some existing domain adaptation techniques, the results show that the amount of target domain data and the selected features impact the performance of the domain adaptation techniques.
Attention mechanism has enhanced state-of-the-art Neural Machine Translation (NMT) by jointly learning to align and translate. It tends to ignore past alignment information, however, which often leads to over-translation and under-translation. To address this problem, we propose coverage-based NMT in this paper. We maintain a coverage vector to keep track of the attention history. The coverage vector is fed to the attention model to help adjust future attention, which lets NMT system to consider more about untranslated source words. Experiments show that the proposed approach significantly improves both translation quality and alignment quality over standard attention-based NMT.
Neural encoder-decoder models of machine translation have achieved impressive results, rivalling traditional translation models. However their modelling formulation is overly simplistic, and omits several key inductive biases built into traditional models. In this paper we extend the attentional neural translation model to include structural biases from word based alignment models, including positional bias, Markov conditioning, fertility and agreement over translation directions. We show improvements over a baseline attentional model and standard phrase-based model over several language pairs, evaluating on difficult languages in a low resource setting.
Current syntactic theory limits the range of grammatical variation so severely that the logical problem of grammar learning is trivial. Yet, children exhibit characteristic stages in syntactic development at least through their sixth year. Rather than positing maturational delays, I suggest that acquisition difficulties are the result of limitations in manipulating grammatical representations. I argue that the genesis of complex sentences reflects increasing generative capacity in the systems generating structural descriptions: conjoined clauses demand only a regular tree rewriting system; sentential embedding uses a context-free tree substitution grammar; modification requires TAG, a mildly context-sensitive system.
Dialogue state tracking (DST) is a process to estimate the distribution of the dialogue states as a dialogue progresses. Recent studies on constrained Markov Bayesian polynomial (CMBP) framework take the first step towards bridging the gap between rule-based and statistical approaches for DST. In this paper, the gap is further bridged by a novel framework -- recurrent polynomial network (RPN). RPN s unique structure enables the framework to have all the advantages of CMBP including efficiency, portability and interpretability. Additionally, RPN achieves more properties of statistical approaches than CMBP. RPN was evaluated on the data corpora of the second and the third Dialog State Tracking Challenge (DSTC-2/3). Experiments showed that RPN can significantly outperform both traditional rule-based approaches and statistical approaches with similar feature set. Compared with the state-of-the-art statistical DST approaches with a lot richer features, RPN is also competitive.
Traditional natural language parsers are based on rewrite rule systems developed in an arduous, time-consuming manner by grammarians. A majority of the grammarian s efforts are devoted to the disambiguation process, first hypothesizing rules which dictate constituent categories and relationships among words in ambiguous sentences, and then seeking exceptions and corrections to these rules. In this work, I propose an automatic method for acquiring a statistical parser from a set of parsed sentences which takes advantage of some initial linguistic input, but avoids the pitfalls of the iterative and seemingly endless grammar development process. Based on distributionally-derived and linguistically-based features of language, this parser acquires a set of statistical decision trees which assign a probability distribution on the space of parse trees given the input sentence. These decision trees take advantage of significant amount of contextual information, potentially including all of the lexical information in the sentence, to produce highly accurate statistical models of the disambiguation process. By basing the disambiguation criteria selection on entropy reduction rather than human intuition, this parser development method is able to consider more sentences than a human grammarian can when making individual disambiguation rules. In experiments between a parser, acquired using this statistical framework, and a grammarian s rule-based parser, developed over a ten-year period, both using the same training material and test sentences, the decision tree parser significantly outperformed the grammar-based parser on the accuracy measure which the grammarian was trying to maximize, achieving an accuracy of 78% compared to the grammar-based parser s 69%.
Obtaining syntactic parses is a crucial part of many NLP pipelines. However, most of the world s languages do not have large amounts of syntactically annotated corpora available for building parsers. Syntactic projection techniques attempt to address this issue by using parallel corpora consisting of resource-poor and resource-rich language pairs, taking advantage of a parser for the resource-rich language and word alignment between the languages to project the parses onto the data for the resource-poor language. These projection methods can suffer, however, when the two languages are divergent. In this paper, we investigate the possibility of using small, parallel, annotated corpora to automatically detect divergent structural patterns between two languages. These patterns can then be used to improve structural projection algorithms, allowing for better performing NLP tools for resource-poor languages, in particular those that may not have large amounts of annotated data necessary for traditional, fully-supervised methods. While this detection process is not exhaustive, we demonstrate that common patterns of divergence can be identified automatically without prior knowledge of a given language pair, and the patterns can be used to improve performance of projection algorithms.
We present a novel technique for learning semantic representations, which extends the distributional hypothesis to multilingual data and joint-space embeddings. Our models leverage parallel data and learn to strongly align the embeddings of semantically equivalent sentences, while maintaining sufficient distance between those of dissimilar sentences. The models do not rely on word alignments or any syntactic information and are successfully applied to a number of diverse languages. We extend our approach to learn semantic representations at the document level, too. We evaluate these models on two cross-lingual document classification tasks, outperforming the prior state of the art. Through qualitative analysis and the study of pivoting effects we demonstrate that our representations are semantically plausible and can capture semantic relationships across languages without parallel data.
Twitter is often used in quantitative studies that identify geographically-preferred topics, writing styles, and entities. These studies rely on either GPS coordinates attached to individual messages, or on the user-supplied location field in each profile. In this paper, we compare these data acquisition techniques and quantify the biases that they introduce; we also measure their effects on linguistic analysis and text-based geolocation. GPS-tagging and self-reported locations yield measurably different corpora, and these linguistic differences are partially attributable to differences in dataset composition by age and gender. Using a latent variable model to induce age and gender, we show how these demographic variables interact with geography to affect language use. We also show that the accuracy of text-based geolocation varies with population demographics, giving the best results for men above the age of 40.
This work consists of creating a system of the Computer Assisted Language Learning (CALL) based on a system of Automatic Speech Recognition (ASR) for the Arabic language using the tool CMU Sphinx3 [1], based on the approach of HMM. To this work, we have constructed a corpus of six hours of speech recordings with a number of nine speakers. we find in the robustness to noise a grounds for the choice of the HMM approach [2]. the results achieved are encouraging since our corpus is made by only nine speakers, but they are always reasons that open the door for other improvement works.
This article presents a fragment of a new comparative dictionary \"A comparative dictionary of names of expansive action in Russian and Bulgarian languages\". Main features of the new web-based comparative dictionary are placed, the principles of its formation are shown, primary links between the word-matches are classified. The principal difference between translation dictionaries and the model of double comparison is also shown. The classification scheme of the pages is proposed. New concepts and keywords have been introduced. The real prototype of the dictionary with a few key pages is published. The broad debate about the possibility of this prototype to become a version of Russian-Bulgarian comparative dictionary of a new generation is available.
Machine translation (MT) has recently been formulated in terms of constraint-based knowledge representation and unification theories, but it is becoming more and more evident that it is not possible to design a practical MT system without an adequate method of handling mismatches between semantic representations in the source and target languages. In this paper, we introduce the idea of ``information-based   MT, which is considerably more flexible than interlingual MT or the conventional transfer-based MT.
We describe a new method for summarizing similarities and differences in a pair of related documents using a graph representation for text. Concepts denoted by words, phrases, and proper names in the document are represented positionally as nodes in the graph along with edges corresponding to semantic relations between items. Given a perspective in terms of which the pair of documents is to be summarized, the algorithm first uses a spreading activation technique to discover, in each document, nodes semantically related to the topic. The activated graphs of each document are then matched to yield a graph corresponding to similarities and differences between the pair, which is rendered in natural language. An evaluation of these techniques has been carried out.
This article describes a method to build syntactical dependencies starting from the phrase structure parsing process. The goal is to obtain all the information needed for a detailled semantical analysis. Interaction Grammars are used for parsing; the saturation of polarities which is the core of this formalism can be mapped to dependency relation. Formally, graph patterns are used to express the set of constraints which control dependency creations.
This paper addresses the problem of corpus-level entity typing, i.e., inferring from a large corpus that an entity is a member of a class such as \"food\" or \"artist\". The application of entity typing we are interested in is knowledge base completion, specifically, to learn which classes an entity is a member of. We propose FIGMENT to tackle this problem. FIGMENT is embedding-based and combines (i) a global model that scores based on aggregated contextual information of an entity and (ii) a context model that first scores the individual occurrences of an entity and then aggregates the scores. In our evaluation, FIGMENT strongly outperforms an approach to entity typing that relies on relations obtained by an open information extraction system.
In this paper, we enhance the attention-based neural machine translation (NMT) by adding explicit coverage embedding models to alleviate issues of repeating and dropping translations in NMT. For each source word, our model starts with a full coverage embedding vector to track the coverage status, and then keeps updating it with neural networks as the translation goes. Experiments on the large-scale Chinese-to-English task show that our enhanced model improves the translation quality significantly on various test sets over the strong large vocabulary NMT system.
We introduce a novel approach for building language models based on a systematic, recursive exploration of skip n-gram models which are interpolated using modified Kneser-Ney smoothing. Our approach generalizes language models as it contains the classical interpolation with lower order models as a special case. In this paper we motivate, formalize and present our approach. In an extensive empirical experiment over English text corpora we demonstrate that our generalized language models lead to a substantial reduction of perplexity between 3.1% and 12.7% in comparison to traditional language models using modified Kneser-Ney smoothing. Furthermore, we investigate the behaviour over three other languages and a domain specific corpus where we observed consistent improvements. Finally, we also show that the strength of our approach lies in its ability to cope in particular with sparse training data. Using a very small training data set of only 736 KB text we yield improvements of even 25.7% reduction of perplexity.
This paper provides a model theoretic semantics to feature terms augmented with set descriptions. We provide constraints to specify HPSG style set descriptions, fixed cardinality set descriptions, set-membership constraints, restricted universal role quantifications, set union, intersection, subset and disjointness. A sound, complete and terminating consistency checking procedure is provided to determine the consistency of any given term in the logic. It is shown that determining consistency of terms is a NP-complete problem.
We demonstrate that an attention-based encoder-decoder model can be used for sentence-level grammatical error identification for the Automated Evaluation of Scientific Writing (AESW) Shared Task 2016. The attention-based encoder-decoder models can be used for the generation of corrections, in addition to error identification, which is of interest for certain end-user applications. We show that a character-based encoder-decoder model is particularly effective, outperforming other results on the AESW Shared Task on its own, and showing gains over a word-based counterpart. Our final model--a combination of three character-based encoder-decoder models, one word-based encoder-decoder model, and a sentence-level CNN--is the highest performing system on the AESW 2016 binary prediction Shared Task.
In settings where only unlabelled speech data is available, speech technology needs to be developed without transcriptions, pronunciation dictionaries, or language modelling text. A similar problem is faced when modelling infant language acquisition. In these cases, categorical linguistic structure needs to be discovered directly from speech audio. We present a novel unsupervised Bayesian model that segments unlabelled speech and clusters the segments into hypothesized word groupings. The result is a complete unsupervised tokenization of the input speech in terms of discovered word types. In our approach, a potential word segment (of arbitrary length) is embedded in a fixed-dimensional acoustic vector space. The model, implemented as a Gibbs sampler, then builds a whole-word acoustic model in this space while jointly performing segmentation. We report word error rates in a small-vocabulary connected digit recognition task by mapping the unsupervised decoded output to ground truth transcriptions. The model achieves around 20% error rate, outperforming a previous HMM-based system by about 10% absolute. Moreover, in contrast to the baseline, our model does not require a pre-specified vocabulary size.
Word alignment is an important natural language processing task that indicates the correspondence between natural languages. Recently, unsupervised learning of log-linear models for word alignment has received considerable attention as it combines the merits of generative and discriminative approaches. However, a major challenge still remains: it is intractable to calculate the expectations of non-local features that are critical for capturing the divergence between natural languages. We propose a contrastive approach that aims to differentiate observed training examples from noises. It not only introduces prior knowledge to guide unsupervised learning but also cancels out partition functions. Based on the observation that the probability mass of log-linear models for word alignment is usually highly concentrated, we propose to use top-n alignments to approximate the expectations with respect to posterior distributions. This allows for efficient and accurate calculation of expectations of non-local features. Experiments show that our approach achieves significant improvements over state-of-the-art unsupervised word alignment methods.
To interpret natural language at the discourse level, it is very useful to accurately recognize dialogue acts, such as SUGGEST, in identifying speaker intentions. Our research explores the utility of a machine learning method called Transformation-Based Learning (TBL) in computing dialogue acts, because TBL has a number of advantages over alternative approaches for this application. We have identified some extensions to TBL that are necessary in order to address the limitations of the original algorithm and the particular demands of discourse processing. We use a Monte Carlo strategy to increase the applicability of the TBL method, and we select features of utterances that can be used as input to improve the performance of TBL. Our system is currently being tested on the VerbMobil corpora of spoken dialogues, producing promising preliminary results.
The morphological systems of natural languages are replete with examples of the same devices used for multiple purposes: (1) the same type of morphological process (for example, suffixation for both noun case and verb tense) and (2) identical morphemes (for example, the same suffix for English noun plural and possessive). These sorts of similarity would be expected to convey advantages on language learners in the form of transfer from one morphological category to another. Connectionist models of morphology acquisition have been faulted for their supposed inability to represent phonological similarity across morphological categories and hence to facilitate transfer. This paper describes a connectionist model of the acquisition of morphology which is shown to exhibit transfer of this type. The model treats the morphology acquisition problem as one of learning to map forms onto meanings and vice versa. As the network learns these mappings, it makes phonological generalizations which are embedded in connection weights. Since these weights are shared by different morphological categories, transfer is enabled. In a set of experiments with artificial stimuli, networks were trained first on one morphological task (e.g., tense) and then on a second (e.g., number). It is shown that in the context of suffixation, prefixation, and template rules, the second task is facilitated when the second category either makes use of the same forms or the same general process type (e.g., prefixation) as the first.
We define {\\em semantic complexity} using a new concept of {\\em meaning automata}. We measure the semantic complexity of understanding of prepositional phrases, of an \"in depth understanding system\", and of a natural language interface to an on-line calendar. We argue that it is possible to measure some semantic complexities of natural language processing systems before building them, and that systems that exhibit relatively complex behavior can be built from semantically simple components.
In general, self help systems are being increasingly deployed by service based industries because they are capable of delivering better customer service and increasingly the switch is to voice based self help systems because they provide a natural interface for a human to interact with a machine. A speech based self help system ideally needs a speech recognition engine to convert spoken speech to text and in addition a language processing engine to take care of any misrecognitions by the speech recognition engine. Any off-the-shelf speech recognition engine is generally a combination of acoustic processing and speech grammar. While this is the norm, we believe that ideally a speech recognition application should have in addition to a speech recognition engine a separate language processing engine to give the system better performance. In this paper, we discuss ways in which the speech recognition engine and the language processing engine can be combined to give a better user experience.
Text classification is a task of automatic classification of text into one of the predefined categories. The problem of text classification has been widely studied in different communities like natural language processing, data mining and information retrieval. Text classification is an important constituent in many information management tasks like topic identification, spam filtering, email routing, language identification, genre classification, readability assessment etc. The performance of text classification improves notably when phrase patterns are used. The use of phrase patterns helps in capturing non-local behaviours and thus helps in the improvement of text classification task. Phrase structure extraction is the first step to continue with the phrase pattern identification. In this survey, detailed study of phrase structure learning methods have been carried out. This will enable future work in several NLP tasks, which uses syntactic information from phrase structure like grammar checkers, question answering, information extraction, machine translation, text classification. The paper also provides different levels of classification and detailed comparison of the phrase structure learning methods.
In this paper we describe the systems we developed for the English (lexical and all-words) and Basque tasks. They were all supervised systems based on Yarowsky s Decision Lists. We used Semcor for training in the English all-words task. We defined different feature sets for each language. For Basque, in order to extract all the information from the text, we defined features that have not been used before in the literature, using a morphological analyzer. We also implemented systems that selected automatically good features and were able to obtain a prefixed precision (85%) at the cost of coverage. The systems that used all the features were identified as BCU-ehu-dlist-all and the systems that selected some features as BCU-ehu-dlist-best.
Contrarily to standard approaches to topic annotation, the technique used in this work does not centrally rely on some sort of -- possibly statistical -- keyword extraction. In fact, the proposed annotation algorithm uses a large scale semantic database -- the EDR Electronic Dictionary -- that provides a concept hierarchy based on hyponym and hypernym relations. This concept hierarchy is used to generate a synthetic representation of the document by aggregating the words present in topically homogeneous document segments into a set of concepts best preserving the document s content. This new extraction technique uses an unexplored approach to topic selection. Instead of using semantic similarity measures based on a semantic resource, the later is processed to extract the part of the conceptual hierarchy relevant to the document content. Then this conceptual hierarchy is searched to extract the most relevant set of concepts to represent the topics discussed in the document. Notice that this algorithm is able to extract generic concepts that are not directly present in the document.
Memory-based learning (MBL) has enjoyed considerable success in corpus-based natural language processing (NLP) tasks and is thus a reliable method of getting a high-level of performance when building corpus-based NLP systems. However there is a bottleneck in MBL whereby any novel testing item has to be compared against all the training items in memory base. For this reason there has been some interest in various forms of memory editing whereby some method of selecting a subset of the memory base is employed to reduce the number of comparisons. This paper investigates the use of a modified self-organising map (SOM) to select a subset of the memory items for comparison. This method involves reducing the number of comparisons to a value proportional to the square root of the number of training items. The method is tested on the identification of base noun-phrases in the Wall Street Journal corpus, using sections 15 to 18 for training and section 20 for testing.
In this paper, we show that Higher-Order Coloured Unification - a form of unification developed for automated theorem proving - provides a general theory for modeling the interface between the interpretation process and other sources of linguistic, non semantic information. In particular, it provides the general theory for the Primary Occurrence Restriction which (Dalrymple, Shieber and Pereira, 1991) s analysis called for.
This paper presents a statistical parser for natural language that obtains a parsing accuracy---roughly 87% precision and 86% recall---which surpasses the best previously published results on the Wall St. Journal domain. The parser itself requires very little human intervention, since the information it uses to make parsing decisions is specified in a concise and simple manner, and is combined in a fully automatic way under the maximum entropy framework. The observed running time of the parser on a test sentence is linear with respect to the sentence length. Furthermore, the parser returns several scored parses for a sentence, and this paper shows that a scheme to pick the best parse from the 20 highest scoring parses could yield a dramatically higher accuracy of 93% precision and recall.
Natural logic offers a powerful relational conception of meaning that is a natural counterpart to distributed semantic representations, which have proven valuable in a wide range of sophisticated language tasks. However, it remains an open question whether it is possible to train distributed representations to support the rich, diverse logical reasoning captured by natural logic. We address this question using two neural network-based models for learning embeddings: plain neural networks and neural tensor networks. Our experiments evaluate the models  ability to learn the basic algebra of natural logic relations from simulated data and from the WordNet noun graph. The overall positive results are promising for the future of learned distributed representations in the applied modeling of logical semantics.
The problem of named entity recognition in the medical/clinical domain has gained increasing attention do to its vital role in a wide range of clinical decision support applications. The identification of complete and correct term span is vital for further knowledge synthesis (e.g., coding/mapping concepts thesauruses and classification standards). This paper investigates boundary adjustment by sequence labeling representations models and post-processing techniques in the problem of clinical named entity recognition (recognition of clinical events). Using current state-of-the-art sequence labeling algorithm (conditional random fields), we show experimentally that sequence labeling representation and post-processing can be significantly helpful in strict boundary identification of clinical events.
The sampling problem in training corpus is one of the major sources of errors in corpus-based applications. This paper proposes a corrective training algorithm to best-fit the run-time context domain in the application of bag generation. It shows which objects to be adjusted and how to adjust their probabilities. The resulting techniques are greatly simplified and the experimental results demonstrate the promising effects of the training algorithm from generic domain to specific domain. In general, these techniques can be easily extended to various language models and corpus-based applications.
In this paper we propose a computational treatment of the resolution of zero pronouns in Japanese discourse, using an adaptation of the centering algorithm. We are able to factor language-specific dependencies into one parameter of the centering algorithm. Previous analyses have stipulated that a zero pronoun and its cospecifier must share a grammatical function property such as {\\sc Subject} or {\\sc NonSubject}. We show that this property-sharing stipulation is unneeded. In addition we propose the notion of {\\sc topic ambiguity} within the centering framework, which predicts some ambiguities that occur in Japanese discourse. This analysis has implications for the design of language-independent discourse modules for Natural Language systems. The centering algorithm has been implemented in an HPSG Natural Language system with both English and Japanese grammars.
In this paper, we propose a novel strategy which is designed to enhance the accuracy of the parser by simplifying complex sentences before parsing. This approach involves the separate parsing of the constituent sub-sentences within a complex sentence. To achieve that, the divide-and-conquer strategy first disambiguates the roles of the link words in the sentence and segments the sentence based on these roles. The separate parse trees of the segmented sub-sentences and the noun phrases within them are then synthesized to form the final parse. To evaluate the effects of this strategy on parsing, we compare the original performance of a dependency parser with the performance when it is enhanced with the divide-and-conquer strategy. When tested on 600 sentences of the IPSM 95 data sets, the enhanced parser saw a considerable error reduction of 21.2% in its accuracy.
The problem of word search in Sanskrit is inseparable from complexities that include those caused by euphonic conjunctions and case-inflections. The case-inflectional forms of a noun normally number 24 owing to the fact that in Sanskrit there are eight cases and three numbers-singular, dual and plural. The traditional method of generating these inflectional forms is rather elaborate owing to the fact that there are differences in the forms generated between even very similar words and there are subtle nuances involved. Further, it would be a cumbersome exercise to generate and search for 24 forms of a word during a word search in a large text, using the currently available case-inflectional form generators. This study presents a new approach to generating case-inflectional forms that is simpler to compute. Further, an optimized model that is sufficient for generating only those word forms that are required in a word search and is more than 80% efficient compared to the complete case-inflectional forms generator, is presented in this study for the first time.
Automatic annotation of temporal expressions is a research challenge of great interest in the field of information extraction. Gold standard temporally-annotated resources are limited in size, which makes research using them difficult. Standards have also evolved over the past decade, so not all temporally annotated data is in the same format. We vastly increase available human-annotated temporal expression resources by converting older format resources to TimeML/TIMEX3. This task is difficult due to differing annotation methods. We present a robust conversion tool and a new, large temporal expression resource. Using this, we evaluate our conversion process by using it as training data for an existing TimeML annotation tool, achieving a 0.87 F1 measure -- better than any system in the TempEval-2 timex recognition exercise.
Modalities of communication for human beings are gradually increasing in number with the advent of new forms of technology. Many human beings can readily transition between these different forms of communication with little or no effort, which brings about the question: How similar are these different communication modalities? To understand technology$\\text{ }$s influence on English communication, four different corpora were analyzed and compared: Writing from Books using the 1-grams database from the Google Books project, Twitter, IRC Chat, and transcribed Talking. Multi-word confusion matrices revealed that Talking has the most similarity when compared to the other modes of communication, while 1-grams were the least similar form of communication analyzed. Based on the analysis of word usage, word usage frequency distributions, and word class usage, among other things, Talking is also the most similar to Twitter and IRC Chat. This suggests that communicating using Twitter and IRC Chat evolved from Talking rather than Writing. When we communicate online, even though we are writing, we do not Tweet or Chat how we write books; we Tweet and Chat how we Speak. Nonfiction and Fiction writing were clearly differentiable from our analysis with Twitter and Chat being much more similar to Fiction than Nonfiction writing. These hypotheses were then tested using author and journalists Cory Doctorow. Mr. Doctorow$\\text{ }$s Writing, Twitter usage, and Talking were all found to have very similar vocabulary usage patterns as the amalgamized populations, as long as the writing was Fiction. However, Mr. Doctorow$\\text{ }$s Nonfiction writing is different from 1-grams and other collected Nonfiction writings. This data could perhaps be used to create more entertaining works of Nonfiction.
Speech recognition has of late become a practical technology for real world applications. Aiming at speech-driven text retrieval, which facilitates retrieving information with spoken queries, we propose a method to integrate speech recognition and retrieval methods. Since users speak contents related to a target collection, we adapt statistical language models used for speech recognition based on the target collection, so as to improve both the recognition and retrieval accuracy. Experiments using existing test collections combined with dictated queries showed the effectiveness of our method.
Distributed word representations are very useful for capturing semantic information and have been successfully applied in a variety of NLP tasks, especially on English. In this work, we innovatively develop two component-enhanced Chinese character embedding models and their bigram extensions. Distinguished from English word embeddings, our models explore the compositions of Chinese characters, which often serve as semantic indictors inherently. The evaluations on both word similarity and text classification demonstrate the effectiveness of our models.
In this paper, a method of domain adaptation for clustered language models is developed. It is based on a previously developed clustering algorithm, but with a modified optimisation criterion. The results are shown to be slightly superior to the previously published  Fillup  method, which can be used to adapt standard n-gram models. However, the improvement both methods give compared to models built from scratch on the adaptation data is quite small (less than 11% relative improvement in word error rate). This suggests that both methods are still unsatisfactory from a practical point of view.
The Cmabrigde Uinervtisy (Cambridge University) effect from the psycholinguistics literature has demonstrated a robust word processing mechanism in humans, where jumbled words (e.g. Cmabrigde / Cambridge) are recognized with little cost. Inspired by the findings from the Cmabrigde Uinervtisy effect, we propose a word recognition model based on a semi-character level recursive neural network (scRNN). In our experiments, we demonstrate that scRNN has significantly more robust performance in word spelling correction (i.e. word recognition) compared to existing spelling checkers. Furthermore, we demonstrate that the model is cognitively plausible by replicating a psycholinguistics experiment about human reading difficulty using our model.
The article provides lexical statistical analysis of K. Vonnegut s two novels and their Russian translations. It is found out that there happen some changes between the speed of word types and word tokens ratio change in the source and target texts. The author hypothesizes that these changes are typical for English-Russian translations, and moreover, they represent an example of Baker s translation feature of levelling out.
Most successful information extraction systems operate with access to a large collection of documents. In this work, we explore the task of acquiring and incorporating external evidence to improve extraction accuracy in domains where the amount of training data is scarce. This process entails issuing search queries, extraction from new sources and reconciliation of extracted values, which are repeated until sufficient evidence is collected. We approach the problem using a reinforcement learning framework where our model learns to select optimal actions based on contextual information. We employ a deep Q-network, trained to optimize a reward function that reflects extraction accuracy while penalizing extra effort. Our experiments on two databases -- of shooting incidents, and food adulteration cases -- demonstrate that our system significantly outperforms traditional extractors and a competitive meta-classifier baseline.
We consider learning representations of entities and relations in KBs using the neural-embedding approach. We show that most existing models, including NTN (Socher et al., 2013) and TransE (Bordes et al., 2013b), can be generalized under a unified learning framework, where entities are low-dimensional vectors learned from a neural network and relations are bilinear and/or linear mapping functions. Under this framework, we compare a variety of embedding models on the link prediction task. We show that a simple bilinear formulation achieves new state-of-the-art results for the task (achieving a top-10 accuracy of 73.2% vs. 54.7% by TransE on Freebase). Furthermore, we introduce a novel approach that utilizes the learned relation embeddings to mine logical rules such as \"BornInCity(a,b) and CityInCountry(b,c) => Nationality(a,c)\". We find that embeddings learned from the bilinear objective are particularly good at capturing relational semantics and that the composition of relations is characterized by matrix multiplication. More interestingly, we demonstrate that our embedding-based rule extraction approach successfully outperforms a state-of-the-art confidence-based rule mining approach in mining Horn rules that involve compositional reasoning.
Recently, knowledge graph embedding, which projects symbolic entities and relations into continuous vector space, has become a new, hot topic in artificial intelligence. This paper addresses a new issue of \\textbf{multiple relation semantics} that a relation may have multiple meanings revealed by the entity pairs associated with the corresponding triples, and proposes a novel Gaussian mixture model for embedding, \\textbf{TransG}. The new model can discover latent semantics for a relation and leverage a mixture of relation component vectors for embedding a fact triple. To the best of our knowledge, this is the first generative model for knowledge graph embedding, which is able to deal with multiple relation semantics. Extensive experiments show that the proposed model achieves substantial improvements against the state-of-the-art baselines.
I pinpoint an interesting similarity between a recent account to rational parsing and the treatment of sequential decisions problems in a dynamical systems approach. I argue that expectation-driven search heuristics aiming at fast computation resembles a high-risk decision strategy in favor of large transition velocities. Hale s rational parser, combining generalized left-corner parsing with informed $\\mathrm{A}^*$ search to resolve processing conflicts, explains gardenpath effects in natural sentence processing by misleading estimates of future processing costs that are to be minimized. On the other hand, minimizing the duration of cognitive computations in time-continuous dynamical systems can be described by combining vector space representations of cognitive states by means of filler/role decompositions and subsequent tensor product representations with the paradigm of stable heteroclinic sequences. Maximizing transition velocities according to a high-risk decision strategy could account for a fast race even between states that are apparently remote in representation space.
Attention-based encoder-decoder neural network models have recently shown promising results in machine translation and speech recognition. In this work, we propose an attention-based neural network model for joint intent detection and slot filling, both of which are critical steps for many speech understanding and dialog systems. Unlike in machine translation and speech recognition, alignment is explicit in slot filling. We explore different strategies in incorporating this alignment information to the encoder-decoder framework. Learning from the attention mechanism in encoder-decoder model, we further propose introducing attention to the alignment-based RNN models. Such attentions provide additional information to the intent classification and slot label prediction. Our independent task models achieve state-of-the-art intent detection error rate and slot filling F1 score on the benchmark ATIS task. Our joint training model further obtains 0.56% absolute (23.8% relative) error reduction on intent detection and 0.23% absolute gain on slot filling over the independent task models.
Language models (LMs) are statistical models that calculate probabilities over sequences of words or other discrete symbols. Currently two major paradigms for language modeling exist: count-based n-gram models, which have advantages of scalability and test-time speed, and neural LMs, which often achieve superior modeling performance. We demonstrate how both varieties of models can be unified in a single modeling framework that defines a set of probability distributions over the vocabulary of words, and then dynamically calculates mixture weights over these distributions. This formulation allows us to create novel hybrid models that combine the desirable features of count-based and neural LMs, and experiments demonstrate the advantages of these approaches.
This paper presents the results of using Roget s International Thesaurus as the taxonomy in a semantic similarity measurement task. Four similarity metrics were taken from the literature and applied to Roget s The experimental evaluation suggests that the traditional edge counting approach does surprisingly well (a correlation of r=0.88 with a benchmark set of human similarity judgements, with an upper bound of r=0.90 for human subjects performing the same task.)
In this paper we describe our experiences with a tool for the development and testing of natural language grammars called GTU (German: Grammatik-Testumgebumg; grammar test environment). GTU supports four grammar formalisms under a window-oriented user interface. Additionally, it contains a set of German test sentences covering various syntactic phenomena as well as three types of German lexicons that can be attached to a grammar via an integrated lexicon interface. What follows is a description of the experiences we gained when we used GTU as a tutoring tool for students and as an experimental tool for CL researchers. From these we will derive the features necessary for a future grammar workbench.
We live in a translingual society, in order to communicate with people from different parts of the world we need to have an expertise in their respective languages. Learning all these languages is not at all possible; therefore we need a mechanism which can do this task for us. Machine translators have emerged as a tool which can perform this task. In order to develop a machine translator we need to develop several different rules. The very first module that comes in machine translation pipeline is morphological analysis. Stemming and lemmatization comes under morphological analysis. In this paper we have created a lemmatizer which generates rules for removing the affixes along with the addition of rules for creating a proper root word.
We describe a corpus-based induction algorithm for probabilistic context-free grammars. The algorithm employs a greedy heuristic search within a Bayesian framework, and a post-pass using the Inside-Outside algorithm. We compare the performance of our algorithm to n-gram models and the Inside-Outside algorithm in three language modeling tasks. In two of the tasks, the training data is generated by a probabilistic context-free grammar and in both tasks our algorithm outperforms the other techniques. The third task involves naturally-occurring data, and in this task our algorithm does not perform as well as n-gram models but vastly outperforms the Inside-Outside algorithm.
Quantifying the degree of spatial dependence for linguistic variables is a key task for analyzing dialectal variation. However, existing approaches have important drawbacks. First, they are based on parametric models of dependence, which limits their power in cases where the underlying parametric assumptions are violated. Second, they are not applicable to all types of linguistic data: some approaches apply only to frequencies, others to boolean indicators of whether a linguistic variable is present. We present a new method for measuring geographical language variation, which solves both of these problems. Our approach builds on Reproducing Kernel Hilbert space (RKHS) representations for nonparametric statistics, and takes the form of a test statistic that is computed from pairs of individual geotagged observations without aggregation into predefined geographical bins. We compare this test with prior work using synthetic data as well as a diverse set of real datasets: a corpus of Dutch tweets, a Dutch syntactic atlas, and a dataset of letters to the editor in North American newspapers. Our proposed test is shown to support robust inferences across a broad range of scenarios and types of data.
We describe a set of bilingual English--French and English--German parallel corpora in which the direction of translation is accurately and reliably annotated. The corpora are diverse, consisting of parliamentary proceedings, literary works, transcriptions of TED talks and political commentary. They will be instrumental for research of translationese and its applications to (human and machine) translation; specifically, they can be used for the task of translationese identification, a research direction that enjoys a growing interest in recent years. To validate the quality and reliability of the corpora, we replicated previous results of supervised and unsupervised identification of translationese, and further extended the experiments to additional datasets and languages.
Despite the loss of semantic information, bag-of-ngram based methods still achieve state-of-the-art results for tasks such as sentiment classification of long movie reviews. Many document embeddings methods have been proposed to capture semantics, but they still can t outperform bag-of-ngram based methods on this task. In this paper, we modify the architecture of the recently proposed Paragraph Vector, allowing it to learn document vectors by predicting not only words, but n-gram features as well. Our model is able to capture both semantics and word order in documents while keeping the expressive power of learned vectors. Experimental results on IMDB movie review dataset shows that our model outperforms previous deep learning models and bag-of-ngram based models due to the above advantages. More robust results are also obtained when our model is combined with other models. The source code of our model will be also published together with this paper.
This paper presents a new view of Explanation-Based Learning (EBL) of natural language parsing. Rather than employing EBL for specializing parsers by inferring new ones, this paper suggests employing EBL for learning how to reduce ambiguity only partially. The present method consists of an EBL algorithm for learning partial-parsers, and a parsing algorithm which combines partial-parsers with existing ``full-parsers\". The learned partial-parsers, implementable as Cascades of Finite State Transducers (CFSTs), recognize and combine constituents efficiently, prohibiting spurious overgeneration. The parsing algorithm combines a learned partial-parser with a given full-parser such that the role of the full-parser is limited to combining the constituents, recognized by the partial-parser, and to recognizing unrecognized portions of the input sentence. Besides the reduction of the parse-space prior to disambiguation, the present method provides a way for refining existing disambiguation models that learn stochastic grammars from tree-banks. We exhibit encouraging empirical results using a pilot implementation: parse-space is reduced substantially with minimal loss of coverage. The speedup gain for disambiguation models is exemplified by experiments with the DOP model.
In this paper we examine how the differences in modelling between different data driven systems performing the same NLP task can be exploited to yield a higher accuracy than the best individual system. We do this by means of an experiment involving the task of morpho-syntactic wordclass tagging. Four well-known tagger generators (Hidden Markov Model, Memory-Based, Transformation Rules and Maximum Entropy) are trained on the same corpus data. After comparison, their outputs are combined using several voting strategies and second stage classifiers. All combination taggers outperform their best component, with the best combination showing a 19.1% lower error rate than the best individual tagger.
Let $C(K)$ be the space of all real or complex valued continuous functions on a compact Hausdorff space $K$. We are interested in the following property of $K$: for any real valued $f \\in C(K)$ the double commutant of the corresponding multiplication operator $F$ coincides with the norm closed algebra generated by $F$ and $I$. In this case we say that $K \\in \\mathcal{DCP}$. It was proved in \\cite{Ki} that any locally connected metrizable continuum is in $\\mathcal{DCP}$. In this paper we indicate a class of arc connected but not locally connected continua that are in $\\mathcal{DCP}$. We also construct an example of a continuum that is not arc connected but is in $\\mathcal{DCP}$.
The adiabatic groupoid $\\mathcal{G}_{ad}$ of a smooth groupoid $\\mathcal{G}$ is a deformation relating $\\mathcal{G}$ with its algebroid. In a previous work, we constructed a natural action of $\\mathbb{R}$ on the C*-algebra of zero order pseudodifferential operators on $\\mathcal{G}$ and identified the crossed product with a natural ideal $J(\\mathcal{G})$ of $C^*(\\mathcal{G}_{ad})$. In the present paper we show that $C^*(\\mathcal{G}_{ad})$ itself is a pseudodifferential extension of this crossed product in a sense introduced by Saad Baaj. Let us point out that we prove our results in a slightly more general situation: the smooth groupoid $\\mathcal{G}$ is assumed to act on a C*-algebra $A$. We construct in this generalized setting the extension of order $0$ pseudodifferential operators $\\Psi(A,\\mathcal{G})$ of the associated crossed product $A\\rtimes \\mathcal{G}$. We show that $\\mathbb{R}$ acts naturally on $\\Psi(A,\\mathcal{G})$ and identify the crossed product of $A$ by the action of the adiabatic groupoid $\\mathcal{G}_{ad}$ with an extension of the crossed product $\\Psi(A,\\mathcal{G})\\rtimes \\mathbb{R}$. Note that our construction of $\\Psi(A,\\mathcal{G})$ unifies the ones of Connes (case $A=\\mathbb{C} $) and of Baaj ($\\mathcal{G}$ is a Lie group).
We define N-theory being some analogue of K-theory on the category of von Neumann algebras such that $K_0(A)\\subset N_0(A)$ for any von Neumann algebra A. Moreover, it turns out to be possible to construct the extension of the Chern character to some homomorphism from $N_0(A)$ to even Banach cyclic homology of A. Also, we define generalized Lefschetz numbers for an arbitrary unitary endomorphism U of an A-elliptic complex. We study them in the situation when U is an element of a representation of some compact Lie group.
Let $\\tau$ be a linear map from a unital $C^*$-algebra $\\CMcal A$ to a von Neumann algebra $\\mathematical B$ and let $\\CMcal C$ be a unital $C^*$-algebra. A map $T$ from a Hilbert $\\CMcal A$-module $E$ to a von Neumann $\\CMcal C$-$\\CMcal B$ module $F$ is called a $\\tau$-map if $$\\langle T(x),T(y)\\rangle=\\tau(\\langle x, y\\rangle)~\\mbox{for all}~x,y\\in E.$$ A Stinespring type theorem for $\\tau$-maps and its covariant version are obtained when $\\tau$ is completely positive. We show that there is a bijective correspondence between the set of all $\\tau$-maps from $E$ to $F$ which are $(u ,u)$-covariant with respect to a dynamical system $(G,\\eta,E)$ and the set of all $(u ,u)$-covariant $\\widetilde{\\tau}$-maps from the crossed product $E\\times_{\\eta} G$ to $F$, where $\\tau$ and $\\widetilde{\\tau}$ are completely positive.
We construct operator systems $\\mathfrak C_I$ that are universal in the sense that all operator systems can be realized as their quotients. They satisfy the operator system lifting property. Without relying on the theorem by Kirchberg, we prove the Kirchberg type tensor theorem $$\\mathfrak C_I \\otimes_{\\min} B(H) = \\mathfrak C_I \\otimes_{\\max} B(H).$$ Combining this with a result of Kavruk, we give a new operator system theoretic proof of Kirchberg s theorem and show that Kirchberg s conjecture is equivalent to its operator system analogue $$\\mathfrak C_I \\otimes_{\\min} \\mathfrak C_I =\\mathfrak C_I \\otimes_{\\rm c} \\mathfrak C_I.$$ It is natural to ask whether the universal operator systems $\\mathfrak C_I$ are projective objects in the category of operator systems. We show that an operator system from which all unital completely positive maps into operator system quotients can be lifted is necessarily one-dimensional. Moreover, a finite dimensional operator system satisfying a perturbed lifting property can be represented as the direct sum of matrix algebras. We give an operator system theoretic approach to the Effros-Haagerup lifting theorem.
In this paper we investigate whether positive elements in the multiplier algebras of certain finite C*-algebras can be written as finite linear combinations of projections with positive coefficients (PCP). Our focus is on the category of underlying C*-algebras that are separable, simple, with real rank zero, stable rank one, finitely many extreme traces, and strict comparison of projections by the traces. We prove that the strict comparison of projections holds also in the multiplier algebra of the stabilizer algebra. Based on this result and under the additional hypothesis that the multiplier algebra has real rank zero, we characterize which positive elements of the multiplier algebra are PCP.
It is proved that the family of equivalence classes of Lip-normed C*-algebras introduced by M. Rieffel, up to isomorphisms preserving the Lip-seminorm, is not complete w.r.t. the matricial quantum Gromov-Hausdorff distance introduced by D. Kerr. This is shown by exhibiting a Cauchy sequence whose limit, which always exists as an operator system, is not completely order isomorphic to any C*-algebra. Conditions ensuring the existence of a C*-structure on the limit are considered, making use of the notion of ultraproduct. More precisely, a necessary and sufficient condition is given for the existence, on the limiting operator system, of a C*-product structure inherited from the approximating C*-algebra. Such condition can be considered as a generalisation of the f-Leibniz conditions introduced by Kerr and Li. Furthermore, it is shown that our condition is not necessary for the existence of a C*-structure tout court, namely there are cases in which the limit is a C*-algebra, but the C*-structure is not inherited.
On a discrete group G a length function may implement a spectral triple on the reduced group C*-algebra. Following A. Connes, the Dirac operator of the triple then can induce a metric on the state space of reduced group C*-algebra. Recent studies by M. Rieffel raise several questions with respect to such a metric on the state space. Here it is proven that for a free non Abelian group, the metric on the state space is bounded. Further we propose a relaxation in the way a length function is used in the construction of a metric, and we show that for groups of rapid decay there are many metrics related to a length function which all have all the expected properties. The boundedness result for free groups is based on an estimate of the completely bounded norm of a certain Schur multiplier and on some techniques concerning free groups due to U. Haagerup. At the end we have included a noncommutative version of the Arzela-Ascoli Theorem.
For a selfadjoint element x in a tracial von Neumann algebra and $\\alpha = \\delta_0(x)$ we compute bounds for $\\mathbb H^{\\alpha}(x),$ where $\\mathbb H^{\\alpha}(x)$ is the free Hausdorff $\\alpha$-entropy of $x.$ The bounds are in terms of $\\int \\int_{\\mathbb R^2 -D} \\log |y-z| d\\mu(y) d\\mu(z)$ where $\\mu$ is the Borel measure on the spectrum of x induced by the trace and $D \\subset \\mathbb R^2$ is the diagonal. We compute similar bounds for the free Hausdorff entropy of a free family of selfadjoints.
Roe algebras are C*-algebras built using large-scale (or  coarse ) aspects of a metric space (X,d). In the special case that X=G is a finitely generated group and d is a word metric, the simplest Roe algebra associated to (G,d) is isomorphic to the reduced crossed product C*-algebra l^\\infty(G)\\rtimes G. Roe algebras are  coarse invariants , in the sense that if X and Y are coarsely equivalent metric spaces, then their Roe algebras are isomorphic. Motivated in part by the coarse Baum-Connes conjecture, we ask if there is a converse to the above statement: that is, if X and Y are metric spaces with isomorphic Roe algebras, must X and Y be coarsely equivalent? We show that for very large classes of spaces the answer to this question, and some related questions, is  yes . This can be thought of as a  C*-rigidity result : it shows that the Roe algebra construction preserves a large amount of information about the space, and is thus surprisingly  rigid . As an example of our results, in the group case we have that if G and H are finitely generated elementary amenable, hyperbolic, or linear, groups such that the crossed products l^\\infty(G)\\rtimes G and l^\\infty(H)\\rtimes H are isomorphic, then G and H are quasi-isometric.
Recently C. Houdayer and Y. Isono have proved among other things that every biexact group $\\Gamma$ has the property that for any non-singular strongly ergodic action $\\Gamma\\curvearrowright (X,\\mu)$ on a standard measure space the group measure space von Neumann algebra $\\Gamma\\ltimes L^\\infty(X)$ is full. In this note, we prove the same property for a wider class of groups, notably including $\\mathrm{SL}(3,{\\mathbb Z})$. We also prove that for any connected simple Lie group $G$ with finite center, any lattice $\\Gamma\\le G$, and any closed non-amenable subgroup $H\\le G$, the non-singular action $\\Gamma\\curvearrowright G/H$ is strongly ergodic and the von Neumann factor $\\Gamma\\ltimes L^\\infty(G/H)$ is full.
We combine the notion of norming algebra introduced by Pop, Sinclair and Smith with a result of Pisier to show that if A_1 and A_2 are operator algebras, then any bounded epimorphism of A_1 onto A_2 is completely bounded provided that A_2 contains a norming C*-subalgebra. We use this result to give some insights into Kadison s Similarity Problem: we show that every faithful bounded homomorphism of a C*-algebra on a Hilbert space has completely bounded inverse, and show that a bounded representation of a C*-algebra is similar to a *-representation precisely when the image operator algebra \\lambda-norms itself. We give two applications to isometric isomorphisms of certain operator algebras. The first is an extension of a result of Davidson and Power on isometric isomorphisms of CSL algebras. Secondly, we show that an isometric isomorphism between subalgebras A_i of C*-diagonals (C_i,D_i) (i=1,2) satisfying D_i \\subseteq A_i \\subseteq C_i extends uniquely to a *-isomorphism of the C*-algebras generated by A_1 and A_2; this generalizes results of Muhly-Qiu-Solel and Donsig-Pitts.
Topological quivers generalize the notion of directed graphs in which the sets of vertices and edges are locally compact (second countable) Hausdorff spaces. Associated to a topological quiver $Q$ is a $C^*$-correspondence, and in turn, a Cuntz-Pimsner algebra $C^*(Q).$ Given $\\Gamma$ a locally compact group and $\\alpha$ and $\\beta$ endomorphisms on $\\Gamma,$ one may construct a topological quiver $Q_{\\alpha,\\beta}(\\Gamma)$ with vertex set $\\Gamma,$ and edge set $\\Omega_{\\alpha,\\beta}(\\Gamma)= \\{(x,y)\\in\\Gamma\\times\\Gamma\\st \\alpha(y)=\\beta(x)\\}.$ In \\cite{Mc1}, the author examined the Cuntz-Pimsner algebra $\\cO_{\\alpha,\\beta}(\\Gamma):=C^*(Q_{\\alpha,\\beta}(\\Gamma))$ and found generators (and their relations) of $\\cO_{\\alpha,\\beta}(\\Gamma).$ In this paper, the author uses this information to create a six term exact sequence in order to calculate the $K$-groups of $\\cO_{\\alpha,\\beta}(\\Gamma).$
In this paper we consider certain proejctions in the corona algebra of $C(X)\\otimes B$ associated to $(p_0, p_1, \\dots, p_n)$ where $p_i: X_i \\to \\mt_s$ a continuous projection valued section to the multiplier algebra of a stable $C\\sp*$-algebra $B$ for each i. Here $X_i$ s are closed intervals given by a partition $\\{x_1, \\dots, x_n\\}$ on the interior of $X$ and adjacent sections differ by compacts at each partition point. Assuming a kind of homogeneity on the projection we characterize when two such projections are homotopy equivalent.
We introduce property $(T_{Schur},G,K)$ and prove it for some non-cocompact lattice in $Sp_4$ in a local field of finite characteristic. We show that property $(T_{Schur},G,K)$ for a non-cocompact lattice $\\Gamma$ in a higher rank almost simple algebraic group in a local field is an obstacle to proving the Baum Connes conjecture without coefficient for $\\Gamma$ with known methods, and this is stronger than the well-known fact that $\\Gamma$ does not have the property of rapid decay (property (RD)). It is the first example (as announced in [Laf10a]) for which all known methods for proving the Baum Connes conjecture without coefficient fail.
In this paper, we give examples of maximal amenable subalgebras of the free group factor of two generators. More precisely, we consider two copies of the hyperfinite factor $R_i$ of type $\\mathrm{II}_1$. From each $R_i$, we take a Haar unitary $u_i$ which generates a Cartan subalgebra of it. We show that the von Neumann subalgebra generated by the self-adjoint operator $u_1+u_1^{-1}+u_2+u_2^{-1}$ is maximal amenable in the free product. This provides infinitely many non-unitary conjugate maximal amenable MASAs.
In this partly expository paper we compare three different categories of C*-algebras in which crossed-product duality can be formulated, both for actions and for coactions of locally compact groups. In these categories, the isomorphisms correspond to C*-algebra isomorphisms, imprimitivity bimodules, and outer conjugacies, respectively. In each case, a variation of the fixed-point functor that arises from classical Landstad duality is used to obtain a quasi-inverse for a crossed-product functor. To compare the various cases, we describe in a formal way our view of the fixed-point functor as an \"inversion\" of the process of forming a crossed product. In some cases, we obtain what we call \"good\" inversions, while in others we do not. For the outer-conjugacy categories, we generalize a theorem of Pedersen to obtain a fixed-point functor that is quasi-inverse to the reduced-crossed-product functor for actions, and we show that this gives a good inversion. For coactions, we prove a partial version of Pedersen s theorem that allows us to define a fixed-point functor, but the question of whether it is a quasi-inverse for the crossed-product functor remains open.
According to J. Feldman and C. Moore s well-known theorem on Cartan subalgebras, a variant of the group measure space construction gives an equivalence of categories between twisted countable standard measured equivalence relations and Cartan pairs, i.e. a von Neumann algebra (on a separable Hilbert space) together with a Cartan subalgebra. A. Kumjian gave a C*-algebraic analogue of this theorem in the early eighties. After a short survey of maximal abelian self-adjoint subalgebras in operator algebras, I present a natural definition of a Cartan subalgebra in a C*-algebra and an extension of Kumjian s theorem which covers graph algebras and some foliation algebras.
Let B be a sigma-unital C*-algebra. We show that every strongly continuous E_0-semigroup on the algebra of adjointable operators on a full Hilbert B-module E gives rise to a full continuous product system of correspondences over B. We show that every full continuous product system of correspondences over B arises in that way. If the product system is countably generated, then E can be chosen countable generated, and if E is countably generated, then so is the product system. We show that under these countability hypotheses there is a one-to-one correspondence between E_0-semigroup up to stable cocycle conjugacy and continuous product systems up isomorphism. This generalizes the results for unital B to the sigma-unital case.
Let $\\mathcal{U}=\\left[ \\begin{array}{cc} \\mathcal{A} & \\mathcal{M} \\mathcal{N}& \\mathcal{B} \\end{array} \\right]$ be a generalized matrix ring, where $\\mathcal{A}$ and $\\mathcal{B}$ are 2-torsion free. We prove that if $\\phi :\\mathcal{U}\\rightarrow \\mathcal{U}$ is an additive mapping such that $\\phi(U)\\circ V+U\\circ \\phi(V)=0$ whenever $UV=VU=0,$ then $\\phi=\\delta+\\eta$, where $\\delta$ is a Jordan derivation and $\\eta$ is a multiplier. As its applications, we prove that the similar conclusion remains valid on full matrix algebras, unital prime rings with a nontrivial idempotent, unital standard operator algebras, CDCSL algebras and von Neumann algebras.
We put two C*-algebras together in a noncommutative tensor product using quantum group coactions on them and a bicharacter relating the two quantum groups that act. We describe this twisted tensor product in two equivalent ways. The first construction is based on certain pairs of representations of quantum groups which we call Heisenberg pairs because they generalise the Weyl form of the canonical commutation relations. The second construction uses covariant Hilbert space representations. We establish basic properties of the twisted tensor product and study some examples.
We replaced the classical string theory notions of parameter space and world-time with noncommutative tori and consider maps between these spaces. The dynamics of mappings between different noncommutative tori were studied and a noncommutative generalization of the Polyakov action was derived. The quantum torus was studied in detail as well as *-homomorphisms between different quantum tori. A finite dimensional representation of the quantum torus was studied and the partition function and other path integrals were calculated. At the end we proved existence theorems for mappings between different noncommutative tori.
Various partially ordered Grothendieck group invariants are introduced for general operator algebras and these are used in the classification of direct systems and direct limits of finite-dimensional complex incidence algebras with common reduced digraph H (systems of H-algebras). In particular the dimension distribution group G(A; C), defined for an operator algebra A and a self-adjoint subalgebra C, generalises both the K0 group of a sigma unital C*-algebra B and the spectrum (fundamental relation) R(A) of a regular limit A of triangular digraph algebras. This invariant is more economical and computable than the so called regular Grothendieck group which nevertheless forms the basis for a complete classification of regular systems of H-algebras.
We present versions of several classical results on harmonic functions and Poisson boundaries in the setting of locally compact quantum groups. In particular, the Choquet--Deny theorem holds for compact quantum groups; also, the result of Kaimanovich--Vershik and Rosenblatt, which characterizes group amenability in terms of harmonic functions, admits a non-commutative analogue in the separable case. We also explore the relation between classical and quantum Poisson boundaries by investigating the spectrum of the quantum group. We apply this machinery to find a concrete realization of the Poisson boundaries of the compact quantum group $SU_{q}(2)$ arising from measures on its spectrum.
In this paper, we will introduce a notion of basis related Morita equivalence in the Cuntz--Krieger algebras $({{\\mathcal{O}}_A}, \\{S_a\\}_{a \\in E_A})$ with the canonical right finite basis $\\{S_a\\}_{a \\in E_A}$ as Hilbert $C^*$-bimodule, and prove that two nonnegative irreducible matrices $A$ and $B$ are elementary equivalent, that is, $A = CD, B = DC$ for some nonnegative rectangular matrices $C, D$, if and only if the Cuntz--Krieger algebras $({{\\mathcal{O}}_A}, \\{S_a\\}_{a \\in E_A})$ and $({{\\mathcal{O}}_B}, \\{ S_b\\}_{b\\in E_B})$ with the canonical right finite bases are basis relatedly elementary Morita equivalent.
We consider the mixed $q$-Gaussian algebras introduced by Speicher which are generated by the variables $X_i=l_i+l_i^*,i=1,\\ldots,N$, where $l_i^* l_j-q_{ij}l_j l_i^*=\\delta_{i,j}$ and $-1<q_{ij}=q_{ji}<1$. Using the free monotone transport theorem of Guionnet and Shlyakhtenko, we show that the mixed $q$-Gaussian von Neumann algebras are isomorphic to the free group von Neumann algebra $L(\\mathbb{F}_N)$, provided that $\\max_{i,j}|q_{ij}|$ is small enough. The proof relies on some estimates which are generalizations of Dabrowski s results for the special case $q_{ij}\\equiv q$.
We characterise simplicity of twisted C*-algebras of row-finite k-graphs with no sources. We show that each 2-cocycle on a cofinal k-graph determines a canonical second-cohomology class for the periodicity group of the graph. The groupoid of the k-graph then acts on the cartesian product of the infinite-path space of the graph with the dual group of the centre of any bicharacter representing this second-cohomology class. The twisted k-graph algebra is simple if and only if this action is minimal. We apply this result to characterise simplicity for many twisted crossed products of k-graph algebras by quasifree actions of free abelian groups.
The notion of an open quantum subgroup of a locally compact quantum group is introduced and given several equivalent characterizations in terms of group-like projections, inclusions of quantum group C*-algebras and properties of respective quantum homogenous spaces. Open quantum subgroups are shown to be closed in the sense of Vaes and normal open quantum subgroups are proved to be in 1-1 correspondence with normal compact quantum subgroups of the dual quantum group.
The paper of S. Gulick [Sidney (Denny) L. Gulick, Commutativity and ideals in the biduals of topological algebras, Pacific J. Math 18 No. 1, 1966] contains some good mathematics, but it also contains an error. It claims that for a Banach algebra A, the intersection of the Jacobson radical of A** with A is precisely the radical of A (this is claimed for either of the Arens products on A** - in itself a reasonable claim, because A is always contained in the topological centre of A**, so a fixed a in A lies in the radical of A** with the first Arens product, if and only if it lies in the radical of A** when that Banach space is given the second Arens product, if and only if ab is quasinilpotent for every b in A**). In this paper we begin with a simple counterexample to that claim, in which A is a radical operator algebra, but not every element of A lies in the radical of A**. We then develope a more complicated example A which, once again, is a radical operator algebra, but A** is semisimple. So rad A** $\\cap$ A is zero, but rad A=A. We conclude by examining the uses Gulick s paper has been put to since 1966 (at least 8 subsequent papers refer to it), and we find that most authors have used the correct material from that paper, and avoided using the wrong result. We reckon, then, that we are not the first to suspect that the result rad A** $\\cap$ A=rad A was wrong; but we believe we are the first to provide \"neat\" counterexamples as described.
We describe a method of adding tails to C*-correspondences which generalizes the process used in the study of graph C*-algebras. We show how this technique can be used to extend results for augmented Cuntz-Pimsner algebras to C*-algebras associated to general C*-correspondences, and as an application we prove a gauge-invariant uniqueness theorem for these algebras. We also define a notion of relative graph C*-algebras and show that properties of these C*-algebras can provide insight and motivation for results about relative Cuntz-Pimsner algebras.
We study comparison properties in the category Cu aiming to lift results to the C*-algebraic setting. We introduce a new comparison property and relate it to both the CFP and $\\omega$-comparison. We show differences of all properties by providing examples, which suggest that the corona factorization property for C*-algebras might allow for both finite and infinite projections. In addition, we show that R{\\o}rdam s simple, nuclear C*-algebra with a finite and an infinite projection does not have the CFP.
Let $\\M$ be a type ${\\rm II}_1$ factor with a faithful normal tracial state $\\tau$ and let $\\M^\\omega$ be the ultrapower algebra of $\\M$. In this paper, we prove that for every operator $T\\in \\M^\\omega$, there is a family of projections $\\{P_t\\}_{0\\leq t\\leq 1}$ in $\\M^\\omega$ such that $TP_t=P_tTP_t$, $P_s\\leq P_t$ if $s\\leq t$, and $\\tau_\\omega(P_t)=t$. Let $\\mathfrak{M}=\\{Z \\in \\M: \\text{there is a family of projections} \\{P_t\\}_{0\\leq t\\leq 1} \\text{in} \\M \\text{such that} ZP_t=P_tZP_t, P_s\\leq P_t \\text{if} s\\leq t, \\text{and} \\tau(P_t)=t\\}$. As an application we show that for every operator $T\\in \\M$ and $\\epsilon>0$, there is an operator $S\\in \\mathfrak{M}$ such that $\\|S\\|\\leq \\|T\\|$ and $\\|S-T\\|_2<\\epsilon$. We also show that $\\prod_n^\\omega M_n(\\cc)$ is not $\\ast$-isomorphic to the ultrapower algebra of the hyperfinite type ${\\rm II}_1$ factor.
In this paper we propose a new technical tool for analyzing representations of Hilbert $C^*$-product systems. Using this tool, we give a new proof that every doubly commuting representation over $\\mathbb{N}^k$ has a regular isometric dilation, and we also prove sufficient conditions for the existence of a regular isometric dilation of representations over more general subsemigroups of $\\mathbb{R}_+^k$.
A linear mapping $\\phi$ on an algebra $\\mathcal{A}$ is called a centralizable mapping at $G\\in\\mathcal{A}$ if $\\phi(AB)=\\phi(A)B=A\\phi(B)$ for each $A$ and $B$ in $\\mathcal{A}$ with $AB=G$, and $\\phi$ is called a derivable mapping at $G\\in\\mathcal{A}$ if $\\phi(AB)=\\phi(A)B+A\\phi(B)$ for each $A$ and $B$ in $\\mathcal{A}$ with $AB=G$. A point $G$ in $\\mathcal{A}$ is called a full-centralizable point (resp. full-derivable point) if every centralizable (resp. derivable) mapping at $G$ is a centralizer (resp. derivation). We prove that every point in a von Neumann algebra or a triangular algebra is a full-centralizable point. We also prove that a point in a von Neumann algebra is a full-derivable point if and only if its central carrier is the unit.
This paper is a further study of finite Rokhlin dimension for actions of finite groups and the integers on C*-algebras, introduced by the first author, Winter, and Zacharias. We extend the definition of finite Rokhlin dimension to the nonunital case. This definition behaves well with respect to extensions, and is sufficient to establish permanence of finite nuclear dimension and Z-absorption. We establish K-theoretic obstructions to the existence of actions of finite groups with finite Rokhlin dimension (in the commuting tower version). In particular, we show that there are no actions of any nontrivial finite group on the Jiang-Su algebra or on the Cuntz algebra O_\\infty with finite Rokhlin dimension in this sense.
A category structure for Bratteli diagrams is proposed and a functor from the category of AF algebras to the category of Bratteli diagrams is constructed. Since isomorphism of Bratteli diagrams in this category coincides with Bratteli s notion of equivalence, we obtain in particular a functorial formulation of Bratteli s classification of AF algebras (and at the same time, of Glimm s classification of UHF algebras). It is shown that the three approaches to classification of AF algebras, namely, through Bratteli diagrams, K-theory, and abstract classifying categories, are essentially the same from a categorical point of view.
We will study two kinds of actions of a discrete amenable Kac algebra. The first one is an action whose modular part is normal. We will construct a new invariant which generalizes a characteristic invariant for a discrete group action, and we will present a complete classification. The second is a centrally free action. By constructing a Rohlin tower in an asymptotic centralizer, we will show that the Connes-Takesaki module is a complete invariant.
We obtain necessary and sufficient conditions for Nevanlinna-Pick interpolation on the unit disk with the additional restriction that all analytic interpolating functions satisfy $f (0)=0.$ Alternatively, these results can be interpreted as interpolation results for $H^{\\infty}(V),$ where $V$ is the intersection of the bidisk with an algebraic variety. We use an analysis of C*-envelopes to show that these same conditions do not suffice for matrix interpolation.
We consider an extendible endomorphism $\\alpha$ of a $C^*$-algebra $A$. We associate to it a canonical $C^*$-dynamical system $(B,\\beta)$ that extends $(A,\\alpha)$ and is `reversible  in the sense that the endomorphism $\\beta$ admits a unique regular transfer operator $\\beta_*$. The theory for $(B,\\beta)$ is analogous to the theory of classic crossed products by automorphisms, and the key idea is to describe the counterparts of classic notions for $(B,\\beta)$ in terms of the initial system $(A,\\alpha)$. We apply this idea to study the ideal structure of a non-unital version of the crossed product $C^*(A,\\alpha,J)$ introduced recently by the author and A. V. Lebedev. This crossed product depends on the choice of an ideal $J$ in $(\\ker\\alpha)^\\bot$, and if $J=(\\ker\\alpha)^\\bot$ it is a modification of Stacey s crossed product that works well with non-injective $\\alpha$ s. We provide descriptions of the lattices of ideals in $C^*(A,\\alpha,J)$ consisting of gauge-invariant ideals and ideals generated by their intersection with $A$. We investigate conditions under which these lattices coincide with the set of all ideals in $C^*(A,\\alpha,J)$. In particular, we obtain simplicity criteria that besides minimality of the action require either outerness of powers of $\\alpha$ or pointwise quasinilpotence of $\\alpha$.
Starting with a $W^{*}$-algebra $M$ we use the inverse system obtained by cutting down $M$ by its (central) projections to define an inverse limit of $W^{*}$-algebras, and show that how this pro-$W^{*}$-algebra encodes the local structure of $M$. For the $C^{*}$-algebras we do the same thing using their atomic enveloping $W^{*}$-algebra . We investigate the relation of these ideas to the Akemann-Giles-Kummer non commutative topology. Finally we use these ideas to look at the local structure of Kac algebras.
Given an $m$-tempered strongly continuous action $\\alpha$ of $\\R$ by continuous $^{*}$-automorphisms of a Frechet $^{*}$-algebra $A$, it is shown that the enveloping \\hbox{$\\sigma$-$C^{*}$-algebra} $E(S(\\R,A^{\\infty},\\alpha))$ of the smooth Schwartz crossed product $S(\\R,A^{\\infty},\\alpha)$ of the Frechet algebra $A^{\\infty}$ of $C^{\\infty}$-elements of $A$ is isomorphic to the \\hbox{$\\sigma$-$C^{*}$-crossed} product $C^{*}(\\R,E(A),\\alpha)$ of the enveloping $\\sigma$-$C^{*}$-algebra $E(A)$ of $A$ by the induced action. When $A$ is a hermitian $Q$-algebra, one gets $K$-theory isomorphism $RK_{*}(S(\\R,A^{\\infty},\\alpha)) = K_{*}(C^{*}(\\R,E(A),\\alpha)$ for the representable $K$-theory of Frechet algebras. An application to the differential structure of a $C^{*}$-algebra defined by densely defined differential seminorms is given.
In this paper, Property $\\Gamma$ for a type II$_{1}$ von Neumann algebra is introduced as a generalization of Murray and von Neumann s Property $\\Gamma$ for a type II$_{1}$ factor. The main result of this paper is that if a type II$_{1}$ von Neumann algebra $\\mathcal{M}$ with separable predual has Property $\\Gamma$, then the continuous Hochschild cohomology group $H^{k}(\\mathcal{M}, \\mathcal{M})$ vanishes for every $k \\geq 2$. This gives a generalization of an earlier result due to E. Christensen, F. Pop, A.M. Sinclair and R.R. Smith.
We consider three notions of divisibility in the Cuntz semigroup of a C*-algebra, and show how they reflect properties of the C*-algebra. We develop methods to construct (simple and non-simple) C*-algebras with specific divisibility behaviour. As a byproduct of our investigations, we show that there exists a sequence $(A_n)$ of simple unital infinite dimensional C*-algebras such that the product $\\prod_{n=1}^\\infty A_n$ has a character.
We introduce the analog of Bohr compactification for discrete quantum groups on C*-algebra level. The cases of unimodular and general C*-algebraic discrete quantum groups are treated separately. The passage from the former case to the latter is done with help of the concept of canonical Kac quotient for compact quantum groups\\footnotemark. Several examples are presented and passage to the Bohr compactification is investigated.
It is a wide open problem to give an intrinsic criterion for a II_1 factor $M$ to admit a Cartan subalgebra $A$. When $A \\subset M$ is a Cartan subalgebra, the $A$-bimodule $L^2(M)$ is \"simple\" in the sense that the left and right action of $A$ generate a maximal abelian subalgebra of $B(L^2(M))$. A II_1 factor $M$ that admits such a subalgebra $A$ is said to be s-thin. Very recently, Popa discovered an intrinsic local criterion for a II_1 factor $M$ to be s-thin and left open the question whether all s-thin II_1 factors admit a Cartan subalgebra. We answer this question negatively by constructing s-thin II_1 factors without Cartan subalgebras.
Let $\\mathcal A$ be a separable, unital, approximately divisible C$^*$-algebra. We show that $\\mathcal A$ is generated by two self-adjoint elements and the topological free entropy dimension of any finite generating set of $\\mathcal A$ is less than or equal to 1. In addition, we show that the similarity degree of $\\mathcal A$ is at most 5. Thus an approximately divisible C$^*$-algebra has an affirmative answer to Kadison s similarity problem.
We use the theory of quantization to introduce non-commutative versions of metric on state space and Lipschitz seminorm. We show that a lower semicontinuous matrix Lipschitz seminorm is determined by their matrix metrics on the matrix state spaces. A matrix metric comes from a lower semicontinuous matrix Lip-norm if and only if it is convex, midpoint balanced, and midpoint concave. The operator space of Lipschitz functions with a matrix norm coming from a closed matrix Lip-norm is the operator space dual of an operator space. They generalize Rieffel s results to the quantized situation.
We prove an index theorem for Toeplitz operators on the quarter-plane using the index theory for generalized Toeplitz operators introduced by G. J. Murphy. To prove this index theorem we construct an indicial triple on the tensor product of two C*-algebras provided with indicial triples with general conditions. We show that our results can be extended to some extensions of the theory of Toeplitz operators on the quarter-plane.
Let $1\\le p<\\8$ and $(x_n)_{\\nen}$ be a sequence of positive elements in a non-commutative $L_p$ space and $(E_n)_{\\nen}$ be an increasing sequence of conditional expectations, then the $L_p$ norm of \\sum_n E_n(x_n) can be estimated by c_p times the $L_p$ norm of \\sum_n x_n. This inequality is due to Burkholder, Davis and Gundy in the commutative case. By duality, we obtain a version of Doob s maximal inequality for $1<p\\le \\8$.
Let A be a positive operator in an infinite sigma-finite von Neumann factor M and let B_j be a sequence of positive elements in M. We give sufficient conditions for decomposing A into a sum of elements C_j equivalent to B_j for all j ( C equivalent to B in M means that C=XX* and B=X*X for some X in M) and when C_j are unitarily equivalent to B_j for all j. This extends recent work of Bourin and Lee for the case of B_j= B for all j and M=B(H) and answers affirmatively their conjecture. For the case when B_j= B for all j we provide necessary conditions, which in the type III case are also sufficient.
Let $P_E$ be the set of all values of a spectral measure $E$ and $A(P_E)$ be the smallest von Neumann algebra containing $P_E$. We give a simple description of all sets of generators of $A(P_E)$ in terms of the integrals with respect to $E$. The treatment covers not only the case of generators belonging to $A(P_E)$, but also the case of (possibly unbounded) generators affiliated with this algebra.
We show that for a linear space of operators ${\\mathcal M}\\subseteq {\\mathcal B}(H_1,H_2)$ the following assertions are equivalent. (i) ${\\mathcal M} $ is reflexive in the sense of Loginov--Shulman. (ii) There exists an order-preserving map $\\Psi=(\\psi_1,\\psi_2)$ on a bilattice $Bil({\\mathcal M})$ of subspaces determined by ${\\mathcal M}$, with $P\\leq \\psi_1(P,Q)$ and $Q\\leq \\psi_2(P,Q)$, for any pair $(P,Q)\\in Bil({\\mathcal M})$, and such that an operator $T\\in {\\mathcal B}(H_1,H_2)$ lies in ${\\mathcal M}$ if and only if $\\psi_2(P,Q)T\\psi_1(P,Q)=0$ for all $(P,Q)\\in Bil( {\\mathcal M})$. This extends to reflexive spaces the Erdos--Power type characterization of weakly closed bimodules over a nest algebra.
The paper is devoted to 2-local derivations on matrix algebras over commutative regular algebras. We give necessary and sufficient conditions on a commutative regular algebra to admit 2-local derivations which are not derivations. We prove that every 2-local derivation on a matrix algebra over a commutative regular algebra is a derivation. We apply these results to 2-local derivations on algebras of measurable and locally measurable operators affiliated with type I von Neumann algebras.
Let (A,\\alpha) be a C*-dynamical system. We introduce the notion of pressure P_\\alpha(H) of the automorphism \\alpha at a self-adjoint operator H\\in A. Then we consider the class of AF-systems satisfying the following condition: there exists a dense \\alpha-invariant *-subalgebra \\A of A such that for all pairs a,b\\in\\A the C*-algebra they generate is finite dimensional, and there is p=p(a,b)\\in\\N such that [\\alpha^j(a),b]=0 for |j|\\ge p. For systems in this class we prove the variational principle, i.e. show that P_\\alpha(H) is the supremum of the quantities h_\\phi(\\alpha)-\\phi(H), where h_\\phi(\\alpha) is the Connes-Narnhofer-Thirring dynamical entropy of \\alpha with respect to the \\alpha-invariant state \\phi. If H\\in\\A, and P_\\alpha(H) is finite, we show that any state on which the supremum is attained is a KMS-state with respect to a one-parameter automorphism group naturally associated with H. In particular, Voiculescu s topological entropy is equal to the supremum of h_\\phi(\\alpha), and any state of finite maximal entropy is a trace.
We give a concrete formula for the unique faithful trace on the finite simple non-AF labeled graph $C^*$-algebra $C^*(E_{\\mathbb{Z}}, \\mathcal{L}, \\overline{\\mathcal{E}}_{\\mathbb{Z}})$ associated to the Thue--Morse sequence $(E_{\\mathbb{Z}}, \\mathcal{L})$. Our result provides an alternative proof of the existence of a labeled graph $C^*$-algebra that is not Morita equivalent to any graph $C^*$-algebras. Furthermore, we compute the $K$-groups of $C^*(E_{\\mathbb{Z}}, \\mathcal{L}, \\overline{\\mathcal{E}}_{\\mathbb{Z}})$ using the path structure of the Thue--Morse sequence.
In this paper we construct a new, previously unknown four-parameter family of complex Hadamard matrices of order 6, the entries of which are described by algebraic functions of roots of various sextic polynomials. We conjecture that the new, generic family G together with Karlsson s degenerate family K and Tao s spectral matrix S form an exhaustive list of complex Hadamard matrices of order 6. Such a complete characterization might finally lead to the solution of the famous MUB-6 problem.
Mimicking a recent article of Stefaan Vaes, in which was proved that every locally compact quantum group can act outerly, we prove that we get the same result for measured quantum groupoids, with an appropriate definition of outer actions of measured quantum groupoids. This result is used to show that every measured quantum groupoid can be found from some depth 2 inclusion of von Neumann algebras.
We investigate the $K$-theory of unital UCT Kirchberg algebras $\\mathcal{Q}_S$ arising from families $S$ of relatively prime numbers. It is shown that $K_*(\\mathcal{Q}_S)$ is the direct sum of a free abelian group and a torsion group, each of which is realized by another distinct $C^*$-algebra naturally associated to $S$. The $C^*$-algebra representing the torsion part is identified with a natural subalgebra $\\mathcal{A}_S$ of $\\mathcal{Q}_S$. For the $K$-theory of $\\mathcal{Q}_S$, the cardinality of $S$ determines the free part and is also relevant for the torsion part, for which the greatest common divisor $g_S$ of $\\{p-1 : p \\in S\\}$ plays a central role as well. In the case where $\\lvert S \\rvert \\leq 2$ or $g_S=1$ we obtain a complete classification for $\\mathcal{Q}_S$. Our results support the conjecture that $\\mathcal{A}_S$ coincides with $\\otimes_{p \\in S} \\mathcal{O}_p$. This would lead to a complete classification of $\\mathcal{Q}_S$, and is related to a conjecture about $k$-graphs.
Given $n\\geq 2$, $z_{ij}\\in\\mathbb{T}$ such that $z_{ij}=\\overline z_{ji}$ for $1\\leq i,j\\leq n$ and $z_{ii}=1$ for $1\\leq i\\leq n$, and integers $p_1,...,p_n\\geq 1$, we show that the universal $\\mathrm{C}^*$-algebra generated by unitaries $u_1,...,u_n$ such that $u_i^{p_i}u_j^{p_j}=z_{ij}u_j^{p_j}u_i^{p_i}$ for $1\\leq i,j \\leq n$ is not simple if at least one exponent $p_i$ is at least two. We indicate how the method of proof by `working with various quotients  can be used to establish nonsimplicity of universal $\\mathrm{C}^*$-algebras in other cases.
We define the complete numerical radius norm for homomorphisms from any operator algebra into ${\\mathcal B}({\\mathcal H})$, and show that this norm can be computed explicitly in terms of the completely bounded norm. This is used to show that if $K$ is a complete $C$-spectral set for an operator $T$, then it is a complete $M$-numerical radius set, where $M=\\frac12(C+C^{-1})$. In particular, in view of Crouzeix s theorem, there is a universal constant $M$ (less than 5.6) so that if $P$ is a matrix polynomial and $T \\in {\\mathcal B}({\\mathcal H})$, then $w(P(T)) \\le M \\|P\\|_{W(T)}$. When $W(T) = \\overline{\\mathbb D}$, we have $M = \\frac54$.
(See detailed abstract in the article.) We single out the correct class of spatial product systems (and the spatial endomorphism semigroups with which the product systems are associated) that allows the most far reaching analogy in their classifiaction when compared with Arveson systems. The main differences are that mere existence of a unit is not it sufficient: The unit must be CENTRAL. And the tensor product under which the index is additive is not available for product systems of Hilbert modules. It must be replaced by a new product that even for Arveson systems need not coincide with the tensor product.
This paper is concerned with weak* closed masa-bimodules generated by A(G)-invariant subspaces of VN(G). An annihilator formula is established, which is used to characterise the weak* closed subspaces of B(L^2(G)) which are invariant under both Schur multipliers and a canonical action of M(G) on B(L^2(G)) via completely bounded maps. We study the special cases of extremal ideals with a given null set and, for a large class of groups, we establish a link between relative spectral synthesis and relative operator synthesis.
Suppose $A$ is a $C^*$-algebra and $H$ is a $C^*$-correspondence over $A$. If $H$ is regular in the sense that the left action of $A$ is faithful and is given by compact operators, then we compute the $K$-theory of $\\mathcal{O}_A(H) \\rtimes \\mathbb{T}$ where the action is the usual gauge action. The case where $A$ is an AF-algebra is carefully analyzed. In particular, if $A$ is AF, we show $\\mathcal{O}_A(H) \\rtimes \\mathbb{T}$ is AF. Combining this with Takai duality and an AF-embedding theorem of N. Brown, we show the conditions AF-embeddability, quasidiagonality, and stable finiteness are equivalent for $\\mathcal{O}_A(H)$. If $H$ is also assumed to be regular, these finiteness conditions can be characterized in terms of the ordered $K$-theory of $A$.
We consider the following problem. Suppose $\\alpha$ is an action of a locally compact group $G$ on a $C^*$-algebra $A$, $H$ is a closed subgroup of $G$, and $(\\pi,U)$ is a covariant representation of $(A,H,\\alpha)$. For which closed subgroups $K$ containing $H$ is there a covariant representation $(\\pi,V)$ of $(A,K,\\alpha)$ such that $V|_H=U$? We answer this problem by providing a criterion involving the induced representation of $(A,G,\\alpha)$. We then consider the dual problem for coactions of locally compact groups.
An automorphism $\\beta$ of a $k$-graph $\\Lambda$ induces a crossed product $C^* ( \\Lambda ) \\rtimes_\\beta \\mathbb{Z}$ which is isomorphic to a $(k+1)$-graph algebra $C^* ( \\Lambda \\times_\\beta \\mathbb{Z})$. In this paper we show how this process interacts with $k$-graph $C^*$-algebras which have been twisted by an element of their second cohomology group. This analysis is done using a long exact sequence in cohomology associated to this data. We conclude with some examples
A classical result of Namioka and Phelps states that the square is a test object to verify semi-simplexity in the tensor theory of convex compact sets. By using the quantization of generalized Namioka-Phelps test spaces we formulate a nuclearity criteria for C*-algebras, which establishes a non-commutative version of their result. The proof we suggest covers the nuclearity characterization via non-commutative polyhedron outlined by Effros. Several matrix systems studied by Farenick and Paulsen are shown to be test systems for nuclearity. We also prove that the standard Namioka-Phelps test space is C*-nuclear. We propose a partition of unity property for C*-algebras which distinguishes nuclear C*-algebras among the others.
We explore various limit constructions for C*-algebras, such as composition series and inverse limits, in relation to the notions of real rank, stable rank, and extremal richness. We also consider extensions and pullbacks. We identify some conditions under which the constructions preserve low rank for the C*-algebras or their multiplier algebras. We also discuss the version of topological dimension theory appropriate for primitive ideal spaces of C*-algebras and provide an analogue for rank of the countable sum theorem of dimension theory. As an illustration of how the main results can be applied, we show that a CCR algebra has stable rank one if and only if it has topological dimension zero or one, and we characterize those sigma-unital CCR algebras whose multiplier algebras have stable rank one or extremal richness. (The real rank zero case was already known.)
We solve a class of lifting problems involving approximate polynomial relations (soft polynomial relations). Various associated C*-algebras are therefore projective. The technical lemma we need is a new manifestation of Akemann and Pedersen s discovery of the norm adjusting power of quasi-central approximate units. A projective C*-algebra is the analog of an absolute retract. Thus we can say that various noncommutative semialgebraic sets turn out to be absolute retracts. In particular we show a noncommutative absolute retract results from the intersection of the approximate locus of a homogeneous polynomial with the noncommutative unit ball. By unit ball we are referring the C*-algebra of the universal row contraction. We show projectivity of alternative noncommutative unit balls. Sufficiently many C*-algebras are now known to be projective that we are able to show that the cone over any separable C*-algebra is the inductive limit of C*-algebras that are projective.
Using principles of the theory of smoothness spaces we give systematic constructions of scales of inverse-closed subalgebras of a given Banach algebra with the action of a d-parameter automorphism group. In particular we obtain the inverse-closedness of Besov algebras, Bessel potential algebras and approximation algebras of polynomial order in their defining algebra. By a proper choice of the group action these general results can be applied to algebras of infinite matrices and yield inverse-closed subalgebras of matrices with off-diagonal decay of polynomial order. Besides alternative proofs of known results we obtain new classes of inverse-closed subalgebras of matrices with off-diagonal decay .
We study tensor products and nuclearity-related properties of the operator system $\\mathcal S_n$ generated by the Cuntz isometries. By using the nuclearity of the Cuntz algebra, we can show that $\\mathcal{S}_n$ is $C^*$-nuclear, and this implies a dual row contraction version of Ando s theorem characterizing operators of numerical radius 1. On the other hand, without using the nuclearity of the Cuntz algebra, we are still able to show directly this Ando type property of dual row contractions and conclude that $\\mathcal{S}_n$ is $C^*$-nuclear, which yields a new proof of the nuclearity of the Cuntz algebras. We prove that the dual operator system of $\\mathcal{S}_n$ is completely order isomorphic to an operator subsystem of $M_{n+1}$. Finally, a lifting result concerning Popescu s joint numerical radius is proved via operator system techniques.
In 2006, Restorff completed the classification of all Cuntz-Krieger algebras with finitely many ideals (i.e., those that are purely infinite) up to stable isomorphism. He left open the questions concerning strong classification up to stable isomorphism and unital classification. In this paper, we address both questions. We show that any isomorphism between the reduced filtered K-theory of two Cuntz-Krieger algebras with finitely many ideals lifts to a *-isomorphism between the stabilized Cuntz-Krieger algebras. As a result, we also obtain strong unital classification.
We study non-linear $\\sigma$-models defined on noncommutative torus as a two dimensional string world-sheet. We consider a quantum group as a noncommutative space-time as well as two points, a circle, and a noncommutative torus. Using the establised results we show that the trivial harmonic unitaries of the noncommutative chiral model, which are known as local minima, are not global minima by comparing those with the symmetric unitaries coming from instanton solutions of noncommutative Ising model, which corresponds to the two points target space. In addition,we introduce a $\\mathbb{Z}^2$-action on field maps to noncommutative torus and show how it acts on solutions of various Euler-Lagrange equations.
We give two different proofs of the existence of the $AH+2$ subfactor, which is a $3$-supertransitive self-dual subfactor with index $\\frac{9+\\sqrt{17}}{2} $. The first proof is a direct construction using connections on graphs and intertwiner calculus for bimodule categories. The second proof is indirect, and deduces the existence of $AH+2$ from a recent alternative construction of the Asaeda-Haagerup subfactor and fusion combinatorics of the Brauer-Picard groupoid.
Using the spectral subspaces obtained in [HS], Brown s results on the Brown measure of an operator in a type II_1 factor (M,tr) are generalized to finite sets of commuting operators in M. It is shown that whenever T_1,..., T_n in M are mutually commuting operators, there exists one and only one compactly supported Borel probability measure mu_{T_1,..., T_n} on C^n such that for all alpha_1,..., alpha_n in C, tr(log|alpha_1 T_1+ ... + alpha_n T_n - 1|) is the integral of log|alpha_1 z_1 + ... + alpha_n z_n-1| w.r.t mu_{T_1,...,T_n}. Moreover, for every polynomial q in n commuting variables, mu_{q(T_1,..., T_n)} is the push-forward measure of mu_{T_1,...,T_n} via the map q. In addition it is shown that, as in [HS], for every Borelset B in C^n there is a maximal closed T_1-,..., T_n-invariant subspace K affiliated with M, such that mu_{T_1|_K,..., T_n|_K} is concentrated on B. Moreover, tr(P_K)=mu_{T_1,...,T_n}(B). This generalizes the main result from [HS] to n-tuples of commuting operators in M.
We show that whenever $m \\geq 1$ and $M_1, \\dots, M_m$ are nonamenable factors in a large class of von Neumann algebras that we call $\\mathcal C_{(\\text{AO})}$ and which contains all free Araki-Woods factors, the tensor product factor $M_1 \\mathbin{\\overline{\\otimes}} \\cdots \\mathbin{\\overline{\\otimes}} M_m$ retains the integer $m$ and each factor $M_i$ up to stable isomorphism, after permutation of the indices. Our approach unifies the Unique Prime Factorization (UPF) results from [OP03, Is14] and moreover provides new UPF results in the case when $M_1, \\dots, M_m$ are free Araki-Woods factors. In order to obtain the aforementioned UPF results, we show that Connes s bicentralizer problem has a positive solution for all type ${\\rm III_1}$ factors in the class $\\mathcal C_{(\\text{AO})}$.
Let A be a unital C* algebra with involution * represented in a Hilbert space H, G the group of invertible elements of A, U the unitary group of A, G^s the set of invertible selfadjoint elements of A, Q={e in G : e^2 = 1} the space of reflections and P = Q\\cap U. For any positive a in G consider the a-unitary group U_a={g in G : a^{-1} g^* a = g^{-1}}, i.e. the elements which are unitary with respect to the scalar product <\\xi,\\eta>_a = <a \\xi,\\eta> for \\xi, \\eta in H. If \\pi denotes the map that assigns to each invertible element its unitary part in the polar decomposition, we show that the restriction \\pi|_{U_a}: U_a \\to U is a diffeomorphism, that \\pi(U_a \\cap Q) = P and that \\pi(U_a\\cap G^s) = U_a\\cap G^s = {u in G: u=u^*=u^{-1} and au = ua}.
We call a subfactor trivial if it is isomorphic with the obvious inclusion of N into matrices over N. We prove the existence of type II_1 factors M without non-trivial finite index subfactors. Equivalently, every M-M-bimodule with finite coupling constant, both as a left and as a right M-module, is a multiple of L^2(M). Our results rely on the recent work of Ioana, Peterson and Popa, who proved the existence of type II_1 factors without outer automorphisms.
Product systems are the classifying structures for semigroups of endomorphisms of B(H), in that two $E_0$-semigroups are cocycle conjugate iff their product systems are isomorphic. Thus it is important to know that every abstract product system is associated with an $E_0$-semigrouop. This was first proved more than fifteen years ago by rather indirect methods. Recently, Skeide has given a more direct proof. In this note we give yet another proof by an elementary construction.
A precise description of the injective envelope of a spatial continuous trace C*-algebra A over a Stonean space Delta is given. The description is based on the notion of a weakly continuous Hilbert bundle, which we show to be a Kaplansky--Hilbert module over the abelian AW*-algebra C(Delta). We then use the description of the injective envelope of A to study the first- and second-order local multiplier algebras of A. In particular, we show that the second-order local multiplier algebra of A is precisely the injective envelope of A.
We prove that if $G$ is a countable discrete group with property (T) over an infinite subgroup $H<G$ which contains an infinite Abelian subgroup or is normal, then $G$ has continuum many orbit inequivalent measure preserving a.e. free ergodic actions on a standard Borel probability space. Further, we obtain that the measure preserving a.e. free ergodic actions of such a $G$ cannot be classified up to orbit equivalence be a reasonable assignment of countable structures as complete invariants. We also obtain a strengthening and a new proof of a non-classification result of Foreman and Weiss for conjugacy of measure preserving ergodic, a.e. free actions of discrete countable groups.
We show that in a tracial and finitely generated $W^\\ast$-probability space existence of conjugate variables excludes algebraic relations for the generators. Moreover, under the assumption of maximal non-microstates free entropy dimension, we prove that there are no zero divisors in the sense that the product of any non-commutative polynomial in the generators with any element from the von Neumann algebra is zero if and only if at least one of those factors is zero. In particular, this shows that in this case the distribution of any non-constant self-adjoint non-commutative polynomial in the generators does not have atoms. Questions on the absence of atoms for polynomials in non-commuting random variables (or for polynomials in random matrices) have been an open problem for quite a while. We solve this general problem by showing that maximality of free entropy dimension excludes atoms.
Let $\\Omega$ be a compact Hausdorff space and let $A$ be a C$^*$-algebra. We prove that if every weak-2-local derivation on $A$ is a linear derivation and every derivation on $C(\\Omega,A)$ is inner, then every weak-2-local derivation $\\Delta:C(\\Omega,A)\\to C(\\Omega,A)$ is a {\\rm(}linear{\\rm)} derivation. As a consequence we derive that, for every complex Hilbert space $H$, every weak-2-local derivation $\\Delta : C(\\Omega,B(H)) \\to C(\\Omega,B(H))$ is a (linear) derivation. We actually show that the same conclusion remains true when $B(H)$ is replaced with an atomic von Neumann algebra. With a modified technique we prove that, if $B$ denotes a compact C$^*$-algebra (in particular, when $B=K(H)$), then every weak-2-local derivation on $C(\\Omega,B)$ is a (linear) derivation. Among the consequences, we show that for each von Neumann algebra $M$ and every compact Hausdorff space $\\Omega$, every 2-local derivation on $C(\\Omega,M)$ is a (linear) derivation.
To an $r$-dimensional subshift of finite type satisfying certain special properties we associate a $C^*$-algebra $\\cA$. This algebra is a higher rank version of a Cuntz-Krieger algebra. In particular, it is simple, purely infinite and nuclear. We study an example: if $\\G$ is a group acting freely on the vertices of an $\\wt A_2$ building, with finitely many orbits, and if $\\Omega$ is the boundary of that building, then $C(\\Om)\\rtimes \\G$ is the algebra associated to a certain two dimensional subshift.
In this paper an automorphism of a unital C*-algebra is said to be /locally inner/ if on any element it agrees with some inner automorphism. We make a fairly complete study of local innerness in von Neumann algebras, incorporating comparison with the pointwise innerness of Haagerup-Stormer. On some von Neumann algebras, including all with separable predual, a locally inner automorphism must be inner. But a transfinitely recursive construction demonstrates that this is not true in general. As an application, we show that the diagonal sum descends to a well-defined map on the automorphism orbits of a unital C*-algebra if and only if all its automorphisms are locally inner.
We classify flows on AFD factors with faithful Connes-Takesaki modules. This is a generalization of classification of trace-scaling flows on the AFD $\\mathrm{II}_\\infty$ factor, which is equivalent to the uniqueness of the AFD $\\mathrm{III}_1$ factor. In order to do this, we show that a flow on an AFD factor with faithful Connes-Takesaki module has the Rohlin property, which gives a partial answer to a characterization problem of the Rohlin property posed by Masuda-Tomatsu. It is also possible to think of this result as an $\\mathbf{R}$-version of Izumi s result about compact group actions on type III factors with faithful Connes-Takesaki modules.
We present a construction, which assigns two groupoids, $\\Gugamma$ and $\\Gmgamma$, to an inverse semigroup $\\Gamma$. By definition, $\\Gmgamma$ is a subgroupoid (even a reduction) of $\\Gugamma$. The construction unifies known constructions for groupoids. More precisely, the groupoid $\\Gugamma$ is shown to be isomorphic to the universal groupoid of $\\Gamma$ introduced by Paterson. For $\\Gamma$ arising from graphs resp. tilings, the groupoid $\\Gmgamma$ is the graph groupoid introduced by Kumjian et al. resp. the tiling groupoid introduced by Kellendonk. We obtain a characterisation of open invariant sets in $\\Gmgamma^{(0)}$ in terms of certain order ideals of $\\Gammanull$ for a large class of $\\Gamma$ (including those arising from graphs and from tilings). If $\\Gmgamma$ is essentially principal this gives a characterization of the ideal structure of $\\Cred(\\Gmgamma)$ by a theory of Renault. In particular, we then obtain necessary and sufficient conditions on $\\Gamma$ for simplicity of $\\Cred(\\Gmgamma)$. Our approach relies on a detailed analysis of the order structure of $\\Gamma$.
For i=1,2, let (M_i,D_i) be pairs consisting of a Cartan MASA D_i in a von Neumann algebra M_i, let atom(D_i) be the set of atoms of D_i, and let S_i be the lattice of Bures-closed D_i bimodules in M_i. We show that when M_i have separable preduals, there is a lattice isomorphism between S_1 and S_2 if and only if the sets {(Q_1, Q_2) \\in atom(D_i) x atom(D_i): Q_1 M_i Q_2 \\neq (0)} have the same cardinality. In particular, when D_i is non-atomic, S_i is isomorphic to the lattice of projections in L^\\infty([0,1],m) where m is Lebesgue measure, regardless of the isomorphism classes of M_1 and M_2.
Let $M_n$ denote the algebra of complex $n\\times n $ matrices and write $M$ for the direct sum of the $M_n$. So a typical element of $M$ has the form \\[x = x_1\\oplus x_2 \\... \\oplus x_n \\oplus \\...,\\] where $x_n \\in M_n$ and $\\|x\\| = \\sup_n\\|x_n\\|$. We set $D= \\{\\{x_n\\} \\in M: x_n$ is diagonal for all $N\\}$. We conjecture (contra Kadison and Singer (1959)) that every pure state of $D$ extends uniquely to a pure state of $M$. This is known for the normal pure states of D, and we show that this is true for a (weak*) open, dense subset of all the singular pure states of $D$. We also show that (assuming the Continuum hypothesis) $M$ has pure states that are not multiplicative on any maximal abelian *-subalgebra of $M$.
A surjective endomorphism or, more generally, a polymorphism in the sense of \\cite{SV}, of a compact abelian group $H$ induces a transformation of $L^2(H)$. We study the C*-algebra generated by this operator together with the algebra of continuous functions $C(H)$ which acts as multiplication operators on $L^2(H)$. Under a natural condition on the endo- or polymorphism, this algebra is simple and can be described by generators and relations. In the case of an endomorphism it is always purely infinite, while for a polymorphism in the class we consider, it is either purely infinite or has a unique trace. We prove a formula allowing to determine the $K$-theory of these algebras and use it to compute the $K$-groups in a number of interesting examples.
For $A$ a $C^*$-algebra, $E_1, E_2$ two Hilbert bimodules over $A$, and a fixed isomorphism $\\chi : E_1\\otimes_AE_2\\to E_2\\otimes_AE_1$, we consider the problem of computing the $K$-theory of the Cuntz-Pimsner algebra ${\\mathcal O}_{E_2\\otimes_A{\\mathcal O}_{E_1}}$ obtained by extending the scalars and by iterating the Pimsner construction. The motivating examples are a commutative diagram of Douglas and Howe for the Toeplitz operators on the quarter plane, and the Toeplitz extensions associated by Pimsner and Voiculescu to compute the $K$-theory of a crossed product. The applications are for Hilbert bimodules arising from rank two graphs and from commuting endomorphisms of abelian $C^*$-algebras.
We show that a separable, nuclear C*-algebra satisfies the UCT if it has a Cartan subalgebra. Furthermore, we prove that the UCT is closed under crossed products by group actions which respect Cartan subalgebras. This observation allows us to deduce, among other things, that a crossed product $\\mathcal O_2\\rtimes_\\alpha \\mathbb Z_p $ satisfies the UCT if there is some automorphism $\\gamma$ of $\\mathcal O_2$ with the property that $\\gamma(\\mathcal D_2)\\subseteq \\mathcal O_2\\rtimes_\\alpha \\mathbb Z_p$ is regular, where $\\mathcal D_2$ denotes the canonical masa of $\\mathcal O_2$. We prove that this condition is automatic if $\\gamma(\\mathcal D_2)\\subseteq \\mathcal O_2\\rtimes_\\alpha \\mathbb Z_p$ is not a masa or $\\alpha(\\gamma(\\mathcal D_2))$ is inner conjugate to $\\gamma(\\mathcal D_2)$. Finally, we relate the UCT problem for separable, nuclear, $M_{2^\\infty}$-absorbing C*-algebras to Cartan subalgebras and order two automorphisms of $\\mathcal O_2$.
Let $A$ be a separable $C^*$-algebra and let $B$ be a stable $C^*$-algebra with a strictly positive element. We consider the (semi)group $\\Ext^{as}(A,B)$ (resp. $\\Ext(A,B)$) of homotopy classes of asymptotic (resp. of genuine) homomorphisms from $A$ to the corona algebra $M(B)/B$ and the natural map $i:\\Ext(A,B)\\ar\\Ext^{as}(A,B)$. We show that if $A$ is a suspension then $\\Ext^{as}(A,B)$ coincides with $E$-theory of Connes and Higson and the map $i$ is surjective. In particular any asymptotic homomorphism from $SA$ to $M(B)/B$ is homotopic to some genuine homomorphism.
Conditions $C$, $C $, and $C\"$ were introduced for operator spaces in an attempt to study local reflexivity and exactness of operator spaces (Effros and Ruan, 2000). For example, it is known that an operator space $W$ is locally reflexive if and only if $W$ satisfies condition $C\"$ (Effros and Ruan, 2000) and an operator space $V$ is exact if and only if $V$ satisfies condition $C $ (Effros and Ruan, 2000). It is also known that an operator space $V$ satisfies condition $C$ if and only if it satisfies conditions $C $ and $C\"$ (Effros and Ruan, 2000, and Han, 2007). In this paper, we define $p$-operator space analogues of these definitions, which will be called conditions $C_p$, $C _p$, and $C\"_p$, and show that a $p$-operator space on $L_p$ space satisfies condition $C_p$ if and only if it satisfies both conditions $C _p$ and $C\"_p$. The $p$-operator space injective tensor product of $p$-operator spaces will play a key role.
We study the matricial field (MF) property for certain reduced crossed product C*-algebras and their traces. Using classification techniques and induced K-theoretic dynamics, we show that reduced crossed products of ASH-algebras of real rank zero by free groups are MF if and only if they are stably finite. We also examine traces on these crossed products and show they always admit certain finite dimensional approximation properties. Combining these results with recent progress in Elliott s Classification Program, it follows that if $A$ is a separable, simple, unital, nuclear, monotracial C*-algebra satisfying the UCT, then $A \\rtimes_{\\lambda} \\mathbb{F}_r$ is MF for any action $\\alpha$. Appealing to a result of Ozawa, R{\\o}rdam, and Sato, we show that discrete groups of the form $G \\rtimes \\mathbb{F}_r$ with $G$ amenable admit MF reduced group C*-algebras In the process, some new permanence properties of MF algebras are obtained which are of independent interest. In particular, minimal tensor products of MF algebras are again MF provided one of the factors is exact.
We define type $\\mathfrak{A}$, type $\\mathfrak{B}$, type $\\mathfrak{C}$ as well as C*-semi-finite C*-algebras. It is shown that a von Neumann algebra is a type $\\mathfrak{A}$, type $\\mathfrak{B}$, type $\\mathfrak{C}$ or C*-semi-finite C*-algebra if and only if it is, respectively, a type I, type II, type III or semi-finite von Neumann algebra. Any type I C*-algebra is of type $\\mathfrak{A}$ (actually, type $\\mathfrak{A}$ coincides with the discreteness as defined by Peligrad and Zsido), and any type II C*-algebra (as defined by Cuntz and Pedersen) is of type $\\mathfrak{B}$. Moreover, any type $\\mathfrak{C}$ C*-algebra is of type III (in the sense of Cuntz and Pedersen). Furthermore, any purely infinite C*-algebra (in the sense of Kirchberg and Rordam) with real rank zero is of type $\\mathfrak{C}$, and any separable purely infinite C*-algebra with stable rank one is also of type $\\mathfrak{C}$. We also prove that type $\\mathfrak{A}$, type $\\mathfrak{B}$, type $\\mathfrak{C}$ and C*-semi-finiteness are stable under taking hereditary C*-subalgebras, multiplier algebras and strong Morita equivalence. Furthermore, any C*-algebra $A$ contains a largest type $\\mathfrak{A}$ closed ideal $J_\\mathfrak{A}$, a largest type $\\mathfrak{B}$ closed ideal $J_\\mathfrak{B}$, a largest type $\\mathfrak{C}$ closed ideal $J_\\mathfrak{C}$ as well as a largest C*-semi-finite closed ideal $J_\\mathfrak{sf}$. Among them, we have $J_\\mathfrak{A} + J_\\mathfrak{B}$ being an essential ideal of $J_\\mathfrak{sf}$, and $J_\\mathfrak{A} + J_\\mathfrak{B} + J_\\mathfrak{C}$ being an essential ideal of $A$. On the other hand, $A/J_\\mathfrak{C}$ is always C*-semi-finite, and if $A$ is C*-semi-finite, then $A/J_\\mathfrak{B}$ is of type $\\mathfrak{A}$.
Let $\\mathcal{M}$ be a $W^*$-algebra and let $LS(\\mathcal{M})$ be the algebra of all locally measurable operators affiliated with $\\mathcal{M}$. It is shown that for any self-adjoint element $a\\in LS(\\mathcal{M})$ there exists a self-adjoint element $c_{_{0}}$ from the center of $LS(\\mathcal{M})$, such that for any $\\epsilon>0$ there exists a unitary element $ u_\\epsilon$ from $\\mathcal{M}$, satisfying $|[a,u_\\epsilon]| \\geq (1-\\epsilon)|a-c_{_{0}}|$. A corollary of this result is that for any derivation $\\delta$ on $\\mathcal{M}$ with the range in a (not necessarily norm-closed) ideal $I\\subseteq\\mathcal{M}$, the derivation $\\delta$ is inner, that is $\\delta(\\cdot)=\\delta_a(\\cdot)=[a,\\cdot]$, and $a\\in I$. Similar results are also obtained for inner derivations on $LS(\\mathcal{M})$.
Counterexamples to classification of purely infinite, nuclear, separable C*-algebras (in the ideal-related bootstrap class) and with primitive ideal space X using ideal-related K-theory occur for infinitely many finite primitive ideal spaces X, the smallest of which having four points. Ideal-related K-theory is known to be strongly complete for such C*-algebras if they have real rank zero and X has at most four points for all but two exceptional spaces: the pseudo-circle and the diamond space. In this article, we close these two remaining cases. We show that ideal-related K-theory is strongly complete for real rank zero, purely infinite, nuclear, separable C*-algebras that have the pseudo-circle as primitive ideal space. In the opposite direction, we construct a Cuntz-Krieger algebra with the diamond space as its primitive ideal space for which an automorphism on ideal-related K-theory does not lift.
One shows that for two C^*-algebras A_1 and A_2 any continuous function on Prim(A_1)\\times Prim(A_2) can be continuously extended to Prim(A_1\\otimes A_2) provided it takes its values in a T_1 topological space. This generalizes a 1977 result of L.G. Brown. A new proof is given for a result of R.J. Archbold about the space of minimal primal ideals of A_1\\otimes A_2. To obtain these two results one makes use of the topological properties of the space of prime ideals of the minimal tensor product.
Franck Lesieur had introduced in his thesis (now published in an expended and revised version in the {\\it M\\ emoires de la SMF} (2007)) a notion of measured quantum groupoid, in the setting of von Neumann algebras and a simplification of Lesieur s axioms is presented in an appendix of this article. We here develop the notions of actions, crossed-product, and obtain a biduality theorem, following what had been done by Stefaan Vaes for locally compact quantum groups. Moreover, we prove that the inclusion of the initial algebra into its crossed-product is depth 2, which gives a converse of a result proved by Jean-Michel Vallin and the author. More precisely, to any action of a measured quantum groupoid, we associate another measured quantum groupoid. In particular, starting from an action of a locally compact quantum group, we obtain a measured quantum groupoid canonically associated to this action; when the action is outer, this measured quantum groupoid is the initial locally compact quantum group
We investigate the normal subgroups of the groups of invertibles and unitaries in the connected component of the identity. By relating normal subgroups to closed two-sided ideals we obtain a \"sandwich condition\" describing all the closed normal subgroups both in the invertible and in the the unitary case. We use this to prove a conjecture by Elliott and Rordam: in a simple C*-algebra, the group of approximately inner automorphisms induced by unitaries in the connected component of the identity is topologically simple. Turning to non-closed subgroups, we show, among other things, that in simple unital C*-algebra the commutator subgroup of the group of invertibles in the connected component of the identity is a simple group modulo its center. A similar result holds for unitaries under a mild extra assumption.
Deep Neural Networks (DNNs) are analyzed via the theoretical framework of the information bottleneck (IB) principle. We first show that any DNN can be quantified by the mutual information between the layers and the input and output variables. Using this representation we can calculate the optimal information theoretic limits of the DNN and obtain finite sample generalization bounds. The advantage of getting closer to the theoretical limit is quantifiable both by the generalization bound and by the network s simplicity. We argue that both the optimal architecture, number of layers and features/connections at each layer, are related to the bifurcation points of the information bottleneck tradeoff, namely, relevant compression of the input layer with respect to the output layer. The hierarchical representations at the layered network naturally correspond to the structural phase transitions along the information curve. We believe that this new insight can lead to new optimality bounds and deep learning algorithms.
Modern distributed cyber-physical systems encounter a large variety of anomalies and in many cases, they are vulnerable to catastrophic fault propagation scenarios due to strong connectivity among the sub-systems. In this regard, root-cause analysis becomes highly intractable due to complex fault propagation mechanisms in combination with diverse operating modes. This paper presents a new data-driven framework for root-cause analysis for addressing such issues. The framework is based on a spatiotemporal feature extraction scheme for multivariate time series built on the concept of symbolic dynamics for discovering and representing causal interactions among subsystems of a complex system. We propose sequential state switching ($S^3$) and artificial anomaly association ($A^3$) methods to implement root-cause analysis in an unsupervised and semi-supervised manner respectively. Synthetic data from cases with failed pattern(s) and anomalous node are simulated to validate the proposed approaches, then compared with the performance of vector autoregressive (VAR) model-based root-cause analysis. The results show that: (1) $S^3$ and $A^3$ approaches can obtain high accuracy in root-cause analysis and successfully handle multiple nominal operation modes, and (2) the proposed tool-chain is shown to be scalable while maintaining high accuracy.
In this paper, we are interested in learning the underlying graph structure behind training data. Solving this basic problem is essential to carry out any graph signal processing or machine learning task. To realize this, we assume that the data is smooth with respect to the graph topology, and we parameterize the graph topology using an edge sampling function. That is, the graph Laplacian is expressed in terms of a sparse edge selection vector, which provides an explicit handle to control the sparsity level of the graph. We solve the sparse graph learning problem given some training data in both the noiseless and noisy settings. Given the true smooth data, the posed sparse graph learning problem can be solved optimally and is based on simple rank ordering. Given the noisy data, we show that the joint sparse graph learning and denoising problem can be simplified to designing only the sparse edge selection vector, which can be solved using convex optimization.
Preserving privacy of continuous and/or high-dimensional data such as images, videos and audios, can be challenging with syntactic anonymization methods which are designed for discrete attributes. Differential privacy, which provides a more formal definition of privacy, has shown more success in sanitizing continuous data. However, both syntactic and differential privacy are susceptible to inference attacks, i.e., an adversary can accurately infer sensitive attributes from sanitized data. The paper proposes a novel filter-based mechanism which preserves privacy of continuous and high-dimensional attributes against inference attacks. Finding the optimal utility-privacy tradeoff is formulated as a min-diff-max optimization problem. The paper provides an ERM-like analysis of the generalization error and also a practical algorithm to perform the optimization. In addition, the paper proposes an extension that combines minimax filter and differentially-private noisy mechanism. Advantages of the method over purely noisy mechanisms is explained and demonstrated with examples. Experiments with several real-world tasks including facial expression classification, speech emotion classification, and activity classification from motion, show that the minimax filter can simultaneously achieve similar or better target task accuracy and lower inference accuracy, often significantly lower than previous methods.
We present a feature learning model that learns to encode relationships between images. The model is defined as a Gated Boltzmann Machine, which is constrained such that hidden units that are nearby in space can gate each other s connections. We show how frequency/orientation \"columns\" as well as topographic filter maps follow naturally from training the model on image pairs. The model also helps explain why square-pooling models yield feature groups with similar grouping properties. Experimental results on synthetic image transformations show that spatially constrained gating is an effective way to reduce the number of parameters and thereby to regularize a transformation-learning model.
This paper explains the DYCOS-Algorithm as it was introduced in by Aggarwal and Li in 2011. It operates on graphs whichs nodes are partially labeled and automatically adds missing labels to nodes. To do so, the DYCOS algorithm makes use of the structure of the graph as well as content which is assigned to the node. Aggarwal and Li measured in an experimental analysis that DYCOS adds the missing labels to a Graph with 19396 nodes of which 14814 are labeled and another Graph with 806635 nodes of which 18999 are labeld on one core of an Intel Xeon 2.5 GHz CPU with 32 G RAM within less than a minute. Additionally, extensions of the DYCOS algorithm are proposed. ----- In dieser Arbeit wird der DYCOS-Algorithmus, wie er 2011 von Aggarwal und Li vorgestellt wurde, erkl\\\"art. Er arbeitet auf Graphen, deren Knoten teilweise mit Beschriftungen versehen sind und erg\\\"anzt automatisch Beschriftungen f\\\"ur Knoten, die bisher noch keine Beschriftung haben. Dieser Vorgang wird \"Klassifizierung\" genannt. Dazu verwendet er die Struktur des Graphen sowie textuelle Informationen, die den Knoten zugeordnet sind. Die von Aggarwal und Li beschriebene experimentelle Analyse ergab, dass er auch auf dynamischen Graphen mit 19396 bzw. 806635 Knoten, von denen nur 14814 bzw. 18999 beschriftet waren, innerhalb von weniger als einer Minute auf einem Kern einer Intel Xeon 2.5 GHz CPU mit 32 G RAM ausgef\\\"uhrt werden kann. Zus\\\"atzlich wird die Ver\\\"offentlichung von Aggarwal und Li kritisch er\\\"ortert und und es werden m\\\"ogliche Erweiterungen des DYCOS-Algorithmus vorgeschlagen.
Data mining practitioners are facing challenges from data with network structure. In this paper, we address a specific class of global-state networks which comprises of a set of network instances sharing a similar structure yet having different values at local nodes. Each instance is associated with a global state which indicates the occurrence of an event. The objective is to uncover a small set of discriminative subnetworks that can optimally classify global network values. Unlike most existing studies which explore an exponential subnetwork space, we address this difficult problem by adopting a space transformation approach. Specifically, we present an algorithm that optimizes a constrained dual-objective function to learn a low-dimensional subspace that is capable of discriminating networks labelled by different global states, while reconciling with common network topology sharing across instances. Our algorithm takes an appealing approach from spectral graph learning and we show that the globally optimum solution can be achieved via matrix eigen-decomposition.
We study three families of online convex optimization algorithms: follow-the-proximally-regularized-leader (FTRL-Proximal), regularized dual averaging (RDA), and composite-objective mirror descent. We first prove equivalence theorems that show all of these algorithms are instantiations of a general FTRL update. This provides theoretical insight on previous experimental observations. In particular, even though the FOBOS composite mirror descent algorithm handles L1 regularization explicitly, it has been observed that RDA is even more effective at producing sparsity. Our results demonstrate that FOBOS uses subgradient approximations to the L1 penalty from previous rounds, leading to less sparsity than RDA, which handles the cumulative penalty in closed form. The FTRL-Proximal algorithm can be seen as a hybrid of these two, and outperforms both on a large, real-world dataset. Our second contribution is a unified analysis which produces regret bounds that match (up to logarithmic terms) or improve the best previously known bounds. This analysis also extends these algorithms in two important ways: we support a more general type of composite objective and we analyze implicit updates, which replace the subgradient approximation of the current loss function with an exact optimization.
In Data Mining, the usefulness of association rules is strongly limited by the huge amount of delivered rules. In this paper we propose a new approach to prune and filter discovered rules. Using Domain Ontologies, we strengthen the integration of user knowledge in the post-processing task. Furthermore, an interactive and iterative framework is designed to assist the user along the analyzing task. On the one hand, we represent user domain knowledge using a Domain Ontology over database. On the other hand, a novel technique is suggested to prune and to filter discovered rules. The proposed framework was applied successfully over the client database provided by Nantes Habitat.
Clinical trial adaptation refers to any adjustment of the trial protocol after the onset of the trial. The main goal is to make the process of introducing new medical interventions to patients more efficient by reducing the cost and the time associated with evaluating their safety and efficacy. The principal question is how should adaptation be performed so as to minimize the chance of distorting the outcome of the trial. We propose a novel method for achieving this. Unlike previous work our approach focuses on trial adaptation by sample size adjustment. We adopt a recently proposed stratification framework based on collected auxiliary data and show that this information together with the primary measured variables can be used to make a probabilistically informed choice of the particular sub-group a sample should be removed from. Experiments on simulated data are used to illustrate the effectiveness of our method and its application in practice.
We study the K-armed dueling bandit problem which is a variation of the classical Multi-Armed Bandit (MAB) problem in which the learner receives only relative feedback about the selected pairs of arms. We propose a new algorithm called Relative Exponential-weight algorithm for Exploration and Exploitation (REX3) to handle the adversarial utility-based formulation of this problem. This algorithm is a non-trivial extension of the Exponential-weight algorithm for Exploration and Exploitation (EXP3) algorithm. We prove a finite time expected regret upper bound of order O(sqrt(K ln(K)T)) for this algorithm and a general lower bound of order omega(sqrt(KT)). At the end, we provide experimental results using real data from information retrieval applications.
Random Forest (RF) is a powerful ensemble method for classification and regression tasks. It consists of decision trees set. Although, a single tree is well interpretable for human, the ensemble of trees is a black-box model. The popular technique to look inside the RF model is to visualize a RF proximity matrix obtained on data samples with Multidimensional Scaling (MDS) method. Herein, we present a novel method based on Self-Organising Maps (SOM) for revealing intrinsic relationships in data that lay inside the RF used for classification tasks. We propose an algorithm to learn the SOM with the proximity matrix obtained from the RF. The visualization of RF proximity matrix with MDS and SOM is compared. What is more, the SOM learned with the RF proximity matrix has better classification accuracy in comparison to SOM learned with Euclidean distance. Presented approach enables better understanding of the RF and additionally improves accuracy of the SOM.
The Manual labeling of data is and will remain a costly endeavor. For this reason, semi-supervised learning remains a topic of practical importance. The recently proposed Ladder Network is one such approach that has proven to be very successful. In addition to the supervised objective, the Ladder Network also adds an unsupervised objective corresponding to the reconstruction costs of a stack of denoising autoencoders. Although the empirical results are impressive, the Ladder Network has many components intertwined, whose contributions are not obvious in such a complex architecture. In order to help elucidate and disentangle the different ingredients in the Ladder Network recipe, this paper presents an extensive experimental investigation of variants of the Ladder Network in which we replace or remove individual components to gain more insight into their relative importance. We find that all of the components are necessary for achieving optimal performance, but they do not contribute equally. For semi-supervised tasks, we conclude that the most important contribution is made by the lateral connection, followed by the application of noise, and finally the choice of what we refer to as the `combinator function  in the decoder path. We also find that as the number of labeled training examples increases, the lateral connections and reconstruction criterion become less important, with most of the improvement in generalization being due to the injection of noise in each layer. Furthermore, we present a new type of combinator function that outperforms the original design in both fully- and semi-supervised tasks, reducing record test error rates on Permutation-Invariant MNIST to 0.57% for the supervised setting, and to 0.97% and 1.0% for semi-supervised settings with 1000 and 100 labeled examples respectively.
In this paper, we consider simple and fast approaches to initialize the Expectation-Maximization algorithm (EM) for multivariate Gaussian mixture models. We present new initialization methods based on the well-known $K$-means++ algorithm and the Gonzalez algorithm. These methods close the gap between simple uniform initialization techniques and complex methods, that have been specifically designed for Gaussian mixture models and depend on the right choice of hyperparameters. In our evaluation we compare our methods with a commonly used random initialization method, an approach based on agglomerative hierarchical clustering, and a known, plain adaption of the Gonzalez algorithm. Our results indicate that algorithms based on $K$-means++ outperform the other methods.
In this paper, we propose an extremely simple deep model for the unsupervised nonlinear dimensionality reduction -- deep distributed random samplings, which performs like a stack of unsupervised bootstrap aggregating. First, its network structure is novel: each layer of the network is a group of mutually independent $k$-centers clusterings. Second, its learning method is extremely simple: the $k$ centers of each clustering are only $k$ randomly selected examples from the training data; for small-scale data sets, the $k$ centers are further randomly reconstructed by a simple cyclic-shift operation. Experimental results on nonlinear dimensionality reduction show that the proposed method can learn abstract representations on both large-scale and small-scale problems, and meanwhile is much faster than deep neural networks on large-scale problems.
Metric learning has been shown to be highly effective to improve the performance of nearest neighbor classification. In this paper, we address the problem of metric learning for Symmetric Positive Definite (SPD) matrices such as covariance matrices, which arise in many real-world applications. Naively using standard Mahalanobis metric learning methods under the Euclidean geometry for SPD matrices is not appropriate, because the difference of SPD matrices can be a non-SPD matrix and thus the obtained solution can be uninterpretable. To cope with this problem, we propose to use a properly parameterized LogEuclidean distance and optimize the metric with respect to kernel-target alignment, which is a supervised criterion for kernel learning. Then the resulting non-trivial optimization problem is solved by utilizing the Riemannian geometry. Finally, we experimentally demonstrate the usefulness of our LogEuclidean metric learning algorithm on real-world classification tasks for EEG signals and texture patches.
We consider the approximation capability of orthogonal super greedy algorithms (OSGA) and its applications in supervised learning. OSGA is concerned with selecting more than one atoms in each iteration step, which, of course, greatly reduces the computational burden when compared with the conventional orthogonal greedy algorithm (OGA). We prove that even for function classes that are not the convex hull of the dictionary, OSGA does not degrade the approximation capability of OGA provided the dictionary is incoherent. Based on this, we deduce a tight generalization error bound for OSGA learning. Our results show that in the realm of supervised learning, OSGA provides a possibility to further reduce the computational burden of OGA in the premise of maintaining its prominent generalization capability.
The explosive growth in big data has attracted much attention in designing efficient indexing and search methods recently. In many critical applications such as large-scale search and pattern matching, finding the nearest neighbors to a query is a fundamental research problem. However, the straightforward solution using exhaustive comparison is infeasible due to the prohibitive computational complexity and memory requirement. In response, Approximate Nearest Neighbor (ANN) search based on hashing techniques has become popular due to its promising performance in both efficiency and accuracy. Prior randomized hashing methods, e.g., Locality-Sensitive Hashing (LSH), explore data-independent hash functions with random projections or permutations. Although having elegant theoretic guarantees on the search quality in certain metric spaces, performance of randomized hashing has been shown insufficient in many real-world applications. As a remedy, new approaches incorporating data-driven learning methods in development of advanced hash functions have emerged. Such learning to hash methods exploit information such as data distributions or class labels when optimizing the hash codes or functions. Importantly, the learned hash codes are able to preserve the proximity of neighboring data in the original feature spaces in the hash code spaces. The goal of this paper is to provide readers with systematic understanding of insights, pros and cons of the emerging techniques. We provide a comprehensive survey of the learning to hash framework and representative techniques of various types, including unsupervised, semi-supervised, and supervised. In addition, we also summarize recent hashing approaches utilizing the deep learning models. Finally, we discuss the future direction and trends of research in this area.
Bounds on the risk play a crucial role in statistical learning theory. They usually involve as capacity measure of the model studied the VC dimension or one of its extensions. In classification, such \"VC dimensions\" exist for models taking values in {0, 1}, {1,..., Q} and R. We introduce the generalizations appropriate for the missing case, the one of models with values in R^Q. This provides us with a new guaranteed risk for M-SVMs which appears superior to the existing one.
Recently there has been much work on selective sampling, an online active learning setting, in which algorithms work in rounds. On each round an algorithm receives an input and makes a prediction. Then, it can decide whether to query a label, and if so to update its model, otherwise the input is discarded. Most of this work is focused on the stationary case, where it is assumed that there is a fixed target model, and the performance of the algorithm is compared to a fixed model. However, in many real-world applications, such as spam prediction, the best target function may drift over time, or have shifts from time to time. We develop a novel selective sampling algorithm for the drifting setting, analyze it under no assumptions on the mechanism generating the sequence of instances, and derive new mistake bounds that depend on the amount of drift in the problem. Simulations on synthetic and real-world datasets demonstrate the superiority of our algorithms as a selective sampling algorithm in the drifting setting.
We study the cost function for hierarchical clusterings introduced by [arXiv:1510.05043] where hierarchies are treated as first-class objects rather than deriving their cost from projections into flat clusters. It was also shown in [arXiv:1510.05043] that a top-down algorithm returns a hierarchical clustering of cost at most $O\\left(\\alpha_n \\log n\\right)$ times the cost of the optimal hierarchical clustering, where $\\alpha_n$ is the approximation ratio of the Sparsest Cut subroutine used. Thus using the best known approximation algorithm for Sparsest Cut due to Arora-Rao-Vazirani, the top down algorithm returns a hierarchical clustering of cost at most $O\\left(\\log^{3/2} n\\right)$ times the cost of the optimal solution. We improve this by giving an $O(\\log{n})$-approximation algorithm for this problem. Our main technical ingredients are a combinatorial characterization of ultrametrics induced by this cost function, deriving an Integer Linear Programming (ILP) formulation for this family of ultrametrics, and showing how to iteratively round an LP relaxation of this formulation by using the idea of \\emph{sphere growing} which has been extensively used in the context of graph partitioning. We also prove that our algorithm returns an $O(\\log{n})$-approximate hierarchical clustering for a generalization of this cost function also studied in [arXiv:1510.05043]. Experiments show that the hierarchies found by using the ILP formulation as well as our rounding algorithm often have better projections into flat clusters than the standard linkage based algorithms. We also give constant factor inapproximability results for this problem.
Although the real reproducing kernels are used in an increasing number of machine learning problems, complex kernels have not, yet, been used, in spite of their potential interest in applications such as communications. In this work, we focus our attention on the complex gaussian kernel and its possible application in the complex Kernel LMS algorithm. In order to derive the gradients needed to develop the complex kernel LMS (CKLMS), we employ the powerful tool of Wirtinger s Calculus, which has recently attracted much attention in the signal processing community. Writinger s calculus simplifies computations and offers an elegant tool for treating complex signals. To this end, the notion of Writinger s calculus is extended to include complex RKHSs. Experiments verify that the CKLMS offers significant performance improvements over the traditional complex LMS or Widely Linear complex LMS (WL-LMS) algorithms, when dealing with nonlinearities.
To achieve acceptable performance for AI tasks, one can either use sophisticated feature extraction methods as the first layer in a two-layered supervised learning model, or learn the features directly using a deep (multi-layered) model. While the first approach is very problem-specific, the second approach has computational overheads in learning multiple layers and fine-tuning of the model. In this paper, we propose an approach called wide learning based on arc-cosine kernels, that learns a single layer of infinite width. We propose exact and inexact learning strategies for wide learning and show that wide learning with single layer outperforms single layer as well as deep architectures of finite width for some benchmark datasets.
The problem of selecting the right state-representation in a reinforcement learning problem is considered. Several models (functions mapping past observations to a finite set) of the observations are given, and it is known that for at least one of these models the resulting state dynamics are indeed Markovian. Without knowing neither which of the models is the correct one, nor what are the probabilistic characteristics of the resulting MDP, it is required to obtain as much reward as the optimal policy for the correct model (or for the best of the correct models, if there are several). We propose an algorithm that achieves that, with a regret of order T^{2/3} where T is the horizon time.
Semi-supervised support vector machines (S3VMs) are a kind of popular approaches which try to improve learning performance by exploiting unlabeled data. Though S3VMs have been found helpful in many situations, they may degenerate performance and the resultant generalization ability may be even worse than using the labeled data only. In this paper, we try to reduce the chance of performance degeneration of S3VMs. Our basic idea is that, rather than exploiting all unlabeled data, the unlabeled instances should be selected such that only the ones which are very likely to be helpful are exploited, while some highly risky unlabeled instances are avoided. We propose the S3VM-\\emph{us} method by using hierarchical clustering to select the unlabeled instances. Experiments on a broad range of data sets over eighty-eight different settings show that the chance of performance degeneration of S3VM-\\emph{us} is much smaller than that of existing S3VMs.
Cross-validation is a useful and generally applicable technique often employed in machine learning, including decision tree induction. An important disadvantage of straightforward implementation of the technique is its computational overhead. In this paper we show that, for decision trees, the computational overhead of cross-validation can be reduced significantly by integrating the cross-validation with the normal decision tree induction process. We discuss how existing decision tree algorithms can be adapted to this aim, and provide an analysis of the speedups these adaptations may yield. The analysis is supported by experimental results.
It has been recognized that the diversity of base learners is of utmost importance to a good ensemble. This paper defines a novel measurement of diversity, termed as exclusivity. With the designed exclusivity, we further propose an ensemble model, namely Exclusivity Regularized Machine (ERM), to jointly suppress the training error of ensemble and enhance the diversity between bases. Moreover, an Augmented Lagrange Multiplier based algorithm is customized to effectively and efficiently seek the optimal solution of ERM. Theoretical analysis on convergence and global optimality of the proposed algorithm, as well as experiments are provided to reveal the efficacy of our method and show its superiority over state-of-the-art alternatives in terms of accuracy and efficiency.
We present and empirically evaluate an efficient algorithm that learns to aggregate the predictions of an ensemble of binary classifiers. The algorithm uses the structure of the ensemble predictions on unlabeled data to yield significant performance improvements. It does this without making assumptions on the structure or origin of the ensemble, without parameters, and as scalably as linear learning. We empirically demonstrate these performance gains with random forests.
We present the Structured Weighted Violations Perceptron (SWVP) algorithm, a new structured prediction algorithm that generalizes the Collins Structured Perceptron (CSP). Unlike CSP, the update rule of SWVP explicitly exploits the internal structure of the predicted labels. We prove the convergence of SWVP for linearly separable training sets, provide mistake and generalization bounds, and show that in the general case these bounds are tighter than those of the CSP special case. In synthetic data experiments with data drawn from an HMM, various variants of SWVP substantially outperform its CSP special case. SWVP also provides encouraging initial dependency parsing results.
In online learning the performance of an algorithm is typically compared to the performance of a fixed function from some class, with a quantity called regret. Forster proposed a last-step min-max algorithm which was somewhat simpler than the algorithm of Vovk, yet with the same regret. In fact the algorithm he analyzed assumed that the choices of the adversary are bounded, yielding artificially only the two extreme cases. We fix this problem by weighing the examples in such a way that the min-max problem will be well defined, and provide analysis with logarithmic regret that may have better multiplicative factor than both bounds of Forster and Vovk. We also derive a new bound that may be sub-logarithmic, as a recent bound of Orabona et.al, but may have better multiplicative factor. Finally, we analyze the algorithm in a weak-type of non-stationary setting, and show a bound that is sub-linear if the non-stationarity is sub-linear as well.
We introduce a novel framework for an approxi- mate recovery of data matrices which are low-rank on graphs, from sampled measurements. The rows and columns of such matrices belong to the span of the first few eigenvectors of the graphs constructed between their rows and columns. We leverage this property to recover the non-linear low-rank structures efficiently from sampled data measurements, with a low cost (linear in n). First, a Resrtricted Isometry Property (RIP) condition is introduced for efficient uniform sampling of the rows and columns of such matrices based on the cumulative coherence of graph eigenvectors. Secondly, a state-of-the-art fast low-rank recovery method is suggested for the sampled data. Finally, several efficient, parallel and parameter-free decoders are presented along with their theoretical analysis for decoding the low-rank and cluster indicators for the full data matrix. Thus, we overcome the computational limitations of the standard linear low-rank recovery methods for big datasets. Our method can also be seen as a major step towards efficient recovery of non- linear low-rank structures. For a matrix of size n X p, on a single core machine, our method gains a speed up of $p^2/k$ over Robust Principal Component Analysis (RPCA), where k << p is the subspace dimension. Numerically, we can recover a low-rank matrix of size 10304 X 1000, 100 times faster than Robust PCA.
The fields of machine learning and mathematical optimization increasingly intertwined. The special topic on supervised learning and convex optimization examines this interplay. The training part of most supervised learning algorithms can usually be reduced to an optimization problem that minimizes a loss between model predictions and training data. While most optimization techniques focus on accuracy and speed of convergence, the qualities of good optimization algorithm from the machine learning perspective can be quite different since machine learning is more than fitting the data. Better optimization algorithms that minimize the training loss can possibly give very poor generalization performance. In this paper, we examine a particular kind of machine learning algorithm, boosting, whose training process can be viewed as functional coordinate descent on the exponential loss. We study the relation between optimization techniques and machine learning by implementing a new boosting algorithm. DABoost, based on dual-averaging scheme and study its generalization performance. We show that DABoost, although slower in reducing the training error, in general enjoys a better generalization error than AdaBoost.
In this paper, we consider a queue-aware distributive resource control algorithm for two-hop MIMO cooperative systems. We shall illustrate that relay buffering is an effective way to reduce the intrinsic half-duplex penalty in cooperative systems. The complex interactions of the queues at the source node and the relays are modeled as an average-cost infinite horizon Markov Decision Process (MDP). The traditional approach solving this MDP problem involves centralized control with huge complexity. To obtain a distributive and low complexity solution, we introduce a linear structure which approximates the value function of the associated Bellman equation by the sum of per-node value functions. We derive a distributive two-stage two-winner auction-based control policy which is a function of the local CSI and local QSI only. Furthermore, to estimate the best fit approximation parameter, we propose a distributive online stochastic learning algorithm using stochastic approximation theory. Finally, we establish technical conditions for almost-sure convergence and show that under heavy traffic, the proposed low complexity distributive control is global optimal.
With the introduction of the Electric Health Records, large amounts of digital data become available for analysis and decision support. When physicians are prescribing treatments to a patient, they need to consider a large range of data variety and volume, making decisions increasingly complex. Machine learning based Clinical Decision Support systems can be a solution to the data challenges. In this work we focus on a class of decision support in which the physicians  decision is directly predicted. Concretely, the model would assign higher probabilities to decisions that it presumes the physician are more likely to make. Thus the CDS system can provide physicians with rational recommendations. We also address the problem of correlation in target features: Often a physician is required to make multiple (sub-)decisions in a block, and that these decisions are mutually dependent. We propose a solution to the target correlation problem using a tensor factorization model. In order to handle the patients  historical information as sequential data, we apply the so-called Encoder-Decoder-Framework which is based on Recurrent Neural Networks (RNN) as encoders and a tensor factorization model as a decoder, a combination which is novel in machine learning. With experiments with real-world datasets we show that the proposed model does achieve better prediction performances.
Applications of non-linear kernel Support Vector Machines (SVMs) to large datasets is seriously hampered by its excessive training time. We propose a modification, called the approximate extreme points support vector machine (AESVM), that is aimed at overcoming this burden. Our approach relies on conducting the SVM optimization over a carefully selected subset, called the representative set, of the training dataset. We present analytical results that indicate the similarity of AESVM and SVM solutions. A linear time algorithm based on convex hulls and extreme points is used to compute the representative set in kernel space. Extensive computational experiments on nine datasets compared AESVM to LIBSVM \\citep{LIBSVM}, CVM \\citep{Tsang05}, BVM \\citep{Tsang07}, LASVM \\citep{Bordes05}, $\\text{SVM}^{\\text{perf}}$ \\citep{Joachims09}, and the random features method \\citep{rahimi07}. Our AESVM implementation was found to train much faster than the other methods, while its classification accuracy was similar to that of LIBSVM in all cases. In particular, for a seizure detection dataset, AESVM training was almost $10^3$ times faster than LIBSVM and LASVM and more than forty times faster than CVM and BVM. Additionally, AESVM also gave competitively fast classification times.
Gaussian processes (GPs) provide a nonparametric representation of functions. However, classical GP inference suffers from high computational cost for big data. In this paper, we propose a new Bayesian approach, EigenGP, that learns both basis dictionary elements--eigenfunctions of a GP prior--and prior precisions in a sparse finite model. It is well known that, among all orthogonal basis functions, eigenfunctions can provide the most compact representation. Unlike other sparse Bayesian finite models where the basis function has a fixed form, our eigenfunctions live in a reproducing kernel Hilbert space as a finite linear combination of kernel functions. We learn the dictionary elements--eigenfunctions--and the prior precisions over these elements as well as all the other hyperparameters from data by maximizing the model marginal likelihood. We explore computational linear algebra to simplify the gradient computation significantly. Our experimental results demonstrate improved predictive performance of EigenGP over alternative sparse GP methods as well as relevance vector machine.
In this paper, we present a computational technique to deal with uncertainty in dynamic continuous models in Social Sciences. Considering data from surveys, the method consists of determining the probability distribution of the survey output and this allows to sample data and fit the model to the sampled data using a goodness-of-fit criterion based on the chi-square-test. Taking the fitted parameters non-rejected by the chi-square-test, substituting them into the model and computing their outputs, we build 95% confidence intervals in each time instant capturing uncertainty of the survey data (probabilistic estimation). Using the same set of obtained model parameters, we also provide a prediction over the next few years with 95% confidence intervals (probabilistic prediction). This technique is applied to a dynamic social model describing the evolution of the attitude of the Basque Country population towards the revolutionary organization ETA.
This paper proposes a new optimization algorithm called Entropy-SGD for training deep neural networks that is motivated by the local geometry of the energy landscape at solutions found by gradient descent. Local extrema with low generalization error have a large proportion of almost-zero eigenvalues in the Hessian with very few positive or negative eigenvalues. We leverage upon this observation to construct a local entropy based objective that favors well-generalizable solutions lying in the flat regions of the energy landscape, while avoiding poorly-generalizable solutions located in the sharp valleys. Our algorithm resembles two nested loops of SGD, where we use Langevin dynamics to compute the gradient of local entropy at each update of the weights. We prove that incorporating local entropy into the objective function results in a smoother energy landscape and use uniform stability to show improved generalization bounds over SGD. Our experiments on competitive baselines demonstrate that Entropy-SGD leads to improved generalization and has the potential to accelerate training.
Traditionally, Multi-task Learning (MTL) models optimize the average of task-related objective functions, which is an intuitive approach and which we will be referring to as Average MTL. However, a more general framework, referred to as Conic MTL, can be formulated by considering conic combinations of the objective functions instead; in this framework, Average MTL arises as a special case, when all combination coefficients equal 1. Although the advantage of Conic MTL over Average MTL has been shown experimentally in previous works, no theoretical justification has been provided to date. In this paper, we derive a generalization bound for the Conic MTL method, and demonstrate that the tightest bound is not necessarily achieved, when all combination coefficients equal 1; hence, Average MTL may not always be the optimal choice, and it is important to consider Conic MTL. As a byproduct of the generalization bound, it also theoretically explains the good experimental results of previous relevant works. Finally, we propose a new Conic MTL model, whose conic combination coefficients minimize the generalization bound, instead of choosing them heuristically as has been done in previous methods. The rationale and advantage of our model is demonstrated and verified via a series of experiments by comparing with several other methods.
Modern mobile devices have access to a wealth of data suitable for learning models, which in turn can greatly improve the user experience on the device. For example, language models can improve speech recognition and text entry, and image models can automatically select good photos. However, this rich data is often privacy sensitive, large in quantity, or both, which may preclude logging to the data center and training there using conventional approaches. We advocate an alternative that leaves the training data distributed on the mobile devices, and learns a shared model by aggregating locally-computed updates. We term this decentralized approach Federated Learning. We present a practical method for the federated learning of deep networks based on iterative model averaging, and conduct an extensive empirical evaluation, considering five different model architectures and four datasets. These experiments demonstrate the approach is robust to the unbalanced and non-IID data distributions that are a defining characteristic of this setting. Communication costs are the principal constraint, and we show a reduction in required communication rounds by 10-100x as compared to synchronized stochastic gradient descent.
Multiple datasets containing different types of features may be available for a given task. For instance, users  profiles can be used to group users for recommendation systems. In addition, a model can also use users  historical behaviors and credit history to group users. Each dataset contains different information and suffices for learning. A number of clustering algorithms on multiple datasets were proposed during the past few years. These algorithms assume that at least one dataset is complete. So far as we know, all the previous methods will not be applicable if there is no complete dataset available. However, in reality, there are many situations where no dataset is complete. As in building a recommendation system, some new users may not have a profile or historical behaviors, while some may not have a credit history. Hence, no available dataset is complete. In order to solve this problem, we propose an approach called Collective Kernel Learning to infer hidden sample similarity from multiple incomplete datasets. The idea is to collectively completes the kernel matrices of incomplete datasets by optimizing the alignment of the shared instances of the datasets. Furthermore, a clustering algorithm is proposed based on the kernel matrix. The experiments on both synthetic and real datasets demonstrate the effectiveness of the proposed approach. The proposed clustering algorithm outperforms the comparison algorithms by as much as two times in normalized mutual information.
The Volterra series can be used to model a large subset of nonlinear, dynamic systems. A major drawback is the number of coefficients required model such systems. In order to reduce the number of required coefficients, Laguerre polynomials are used to estimate the Volterra kernels. Existing literature proposes algorithms for a fixed number of Volterra kernels, and Laguerre series. This paper presents a novel algorithm for generalized calculation of the finite order Volterra-Laguerre (VL) series for a MIMO system. An example addresses the utility of the algorithm in practical application.
In many embedded systems, such as imaging sys- tems, the system has a single designated purpose, and same threads are executed repeatedly. Profiling thread behavior, allows the system to allocate each thread its resources in a way that improves overall system performance. We study an online resource al- locationproblem,wherearesourcemanagersimulta- neously allocates resources (exploration), learns the impact on the different consumers (learning) and im- proves allocation towards optimal performance (ex- ploitation). We build on the rich framework of multi- armed bandits and present online and offline algo- rithms. Through extensive experiments with both synthetic data and real-world cache allocation to threads we show the merits and properties of our al- gorithms
Learning a distance metric from the given training samples plays a crucial role in many machine learning tasks, and various models and optimization algorithms have been proposed in the past decade. In this paper, we generalize several state-of-the-art metric learning methods, such as large margin nearest neighbor (LMNN) and information theoretic metric learning (ITML), into a kernel classification framework. First, doublets and triplets are constructed from the training samples, and a family of degree-2 polynomial kernel functions are proposed for pairs of doublets or triplets. Then, a kernel classification framework is established, which can not only generalize many popular metric learning methods such as LMNN and ITML, but also suggest new metric learning methods, which can be efficiently implemented, interestingly, by using the standard support vector machine (SVM) solvers. Two novel metric learning methods, namely doublet-SVM and triplet-SVM, are then developed under the proposed framework. Experimental results show that doublet-SVM and triplet-SVM achieve competitive classification accuracies with state-of-the-art metric learning methods such as ITML and LMNN but with significantly less training time.
Q-learning is a reliable but inefficient off-policy temporal-difference method, backing up reward only one step at a time. Replacing traces, using a recency heuristic, are more efficient but less reliable. In this work, we introduce model-free, off-policy temporal difference methods that make better use of experience than Watkins  Q(\\lambda). We introduce both Optimistic Q(\\lambda) and the temporal second difference trace (TSDT). TSDT is particularly powerful in deterministic domains. TSDT uses neither recency nor frequency heuristics, storing (s,a,r,s ,\\delta) so that off-policy updates can be performed after apparently suboptimal actions have been taken. There are additional advantages when using state abstraction, as in MAXQ. We demonstrate that TSDT does significantly better than both Q-learning and Watkins  Q(\\lambda) in a deterministic cliff-walking domain. Results in a noisy cliff-walking domain are less advantageous for TSDT, but demonstrate the efficacy of Optimistic Q(\\lambda), a replacing trace with some of the advantages of TSDT.
In many practical applications of supervised learning the task involves the prediction of multiple target variables from a common set of input variables. When the prediction targets are binary the task is called multi-label classification, while when the targets are continuous the task is called multi-target regression. In both tasks, target variables often exhibit statistical dependencies and exploiting them in order to improve predictive accuracy is a core challenge. A family of multi-label classification methods address this challenge by building a separate model for each target on an expanded input space where other targets are treated as additional input variables. Despite the success of these methods in the multi-label classification domain, their applicability and effectiveness in multi-target regression has not been studied until now. In this paper, we introduce two new methods for multi-target regression, called Stacked Single-Target and Ensemble of Regressor Chains, by adapting two popular multi-label classification methods of this family. Furthermore, we highlight an inherent problem of these methods - a discrepancy of the values of the additional input variables between training and prediction - and develop extensions that use out-of-sample estimates of the target variables during training in order to tackle this problem. The results of an extensive experimental evaluation carried out on a large and diverse collection of datasets show that, when the discrepancy is appropriately mitigated, the proposed methods attain consistent improvements over the independent regressions baseline. Moreover, two versions of Ensemble of Regression Chains perform significantly better than four state-of-the-art methods including regularization-based multi-task learning methods and a multi-objective random forest approach.
We present an extensive analysis of relative deviation bounds, including detailed proofs of two-sided inequalities and their implications. We also give detailed proofs of two-sided generalization bounds that hold in the general case of unbounded loss functions, under the assumption that a moment of the loss is bounded. These bounds are useful in the analysis of importance weighting and other learning tasks such as unbounded regression.
The enormous successes have been made by quantum algorithms during the last decade. In this paper, we combine the quantum random walk (QRW) with the problem of data clustering, and develop two clustering algorithms based on the one dimensional QRW. Then, the probability distributions on the positions induced by QRW in these algorithms are investigated, which also indicates the possibility of obtaining better results. Consequently, the experimental results have demonstrated that data points in datasets are clustered reasonably and efficiently, and the clustering algorithms are of fast rates of convergence. Moreover, the comparison with other algorithms also provides an indication of the effectiveness of the proposed approach.
In this paper, a novel pattern classification approach is proposed by regularizing the classifier learning to maximize mutual information between the classification response and the true class label. We argue that, with the learned classifier, the uncertainty of the true class label of a data sample should be reduced by knowing its classification response as much as possible. The reduced uncertainty is measured by the mutual information between the classification response and the true class label. To this end, when learning a linear classifier, we propose to maximize the mutual information between classification responses and true class labels of training samples, besides minimizing the classification error and reduc- ing the classifier complexity. An objective function is constructed by modeling mutual information with entropy estimation, and it is optimized by a gradi- ent descend method in an iterative algorithm. Experiments on two real world pattern classification problems show the significant improvements achieved by maximum mutual information regularization.
Multiple extensions of Recurrent Neural Networks (RNNs) have been proposed recently to address the difficulty of storing information over long time periods. In this paper, we experiment with the capacity of Neural Turing Machines (NTMs) to deal with these long-term dependencies on well-balanced strings of parentheses. We show that not only does the NTM emulate a stack with its heads and learn an algorithm to recognize such words, but it is also capable of strongly generalizing to much longer sequences.
The recruitment of new personnel is one of the most essential business processes which affect the quality of human capital within any company. It is highly essential for the companies to ensure the recruitment of right talent to maintain a competitive edge over the others in the market. However IT companies often face a problem while recruiting new people for their ongoing projects due to lack of a proper framework that defines a criteria for the selection process. In this paper we aim to develop a framework that would allow any project manager to take the right decision for selecting new talent by correlating performance parameters with the other domain-specific attributes of the candidates. Also, another important motivation behind this project is to check the validity of the selection procedure often followed by various big companies in both public and private sectors which focus only on academic scores, GPA/grades of students from colleges and other academic backgrounds. We test if such a decision will produce optimal results in the industry or is there a need for change that offers a more holistic approach to recruitment of new talent in the software companies. The scope of this work extends beyond the IT domain and a similar procedure can be adopted to develop a recruitment framework in other fields as well. Data-mining techniques provide useful information from the historical projects depending on which the hiring-manager can make decisions for recruiting high-quality workforce. This study aims to bridge this hiatus by developing a data-mining framework based on an ensemble-learning technique to refocus on the criteria for personnel selection. The results from this research clearly demonstrated that there is a need to refocus on the selection-criteria for quality objectives.
Principal Component Analysis (PCA) is one of the most important unsupervised methods to handle high-dimensional data. However, due to the high computational complexity of its eigen decomposition solution, it hard to apply PCA to the large-scale data with high dimensionality. Meanwhile, the squared L2-norm based objective makes it sensitive to data outliers. In recent research, the L1-norm maximization based PCA method was proposed for efficient computation and being robust to outliers. However, this work used a greedy strategy to solve the eigen vectors. Moreover, the L1-norm maximization based objective may not be the correct robust PCA formulation, because it loses the theoretical connection to the minimization of data reconstruction error, which is one of the most important intuitions and goals of PCA. In this paper, we propose to maximize the L21-norm based robust PCA objective, which is theoretically connected to the minimization of reconstruction error. More importantly, we propose the efficient non-greedy optimization algorithms to solve our objective and the more general L21-norm maximization problem with theoretically guaranteed convergence. Experimental results on real world data sets show the effectiveness of the proposed method for principal component analysis.
Recommendation systems are emerging as an important business application with significant economic impact. Currently popular systems include Amazon s book recommendations, Netflix s movie recommendations, and Pandora s music recommendations. In this paper we address the problem of estimating probabilities associated with recommendation system data using non-parametric kernel smoothing. In our estimation we interpret missing items as randomly censored observations and obtain efficient computation schemes using combinatorial properties of generating functions. We demonstrate our approach with several case studies involving real world movie recommendation data. The results are comparable with state-of-the-art techniques while also providing probabilistic preference estimates outside the scope of traditional recommender systems.
We provide an algorithm that achieves the optimal regret rate in an unknown weakly communicating Markov Decision Process (MDP). The algorithm proceeds in episodes where, in each episode, it picks a policy using regularization based on the span of the optimal bias vector. For an MDP with S states and A actions whose optimal bias vector has span bounded by H, we show a regret bound of ~O(HSpAT). We also relate the span to various diameter-like quantities associated with the MDP, demonstrating how our results improve on previous regret bounds.
Re-scale boosting (RBoosting) is a variant of boosting which can essentially improve the generalization performance of boosting learning. The key feature of RBoosting lies in introducing a shrinkage degree to re-scale the ensemble estimate in each gradient-descent step. Thus, the shrinkage degree determines the performance of RBoosting. The aim of this paper is to develop a concrete analysis concerning how to determine the shrinkage degree in $L_2$-RBoosting. We propose two feasible ways to select the shrinkage degree. The first one is to parameterize the shrinkage degree and the other one is to develope a data-driven approach of it. After rigorously analyzing the importance of the shrinkage degree in $L_2$-RBoosting learning, we compare the pros and cons of the proposed methods. We find that although these approaches can reach the same learning rates, the structure of the final estimate of the parameterized approach is better, which sometimes yields a better generalization capability when the number of sample is finite. With this, we recommend to parameterize the shrinkage degree of $L_2$-RBoosting. To this end, we present an adaptive parameter-selection strategy for shrinkage degree and verify its feasibility through both theoretical analysis and numerical verification. The obtained results enhance the understanding of RBoosting and further give guidance on how to use $L_2$-RBoosting for regression tasks.
Despite the importance of sparsity in many large-scale applications, there are few methods for distributed optimization of sparsity-inducing objectives. In this paper, we present a communication-efficient framework for L1-regularized optimization in the distributed environment. By viewing classical objectives in a more general primal-dual setting, we develop a new class of methods that can be efficiently distributed and applied to common sparsity-inducing models, such as Lasso, sparse logistic regression, and elastic net-regularized problems. We provide theoretical convergence guarantees for our framework, and demonstrate its efficiency and flexibility with a thorough experimental comparison on Amazon EC2. Our proposed framework yields speedups of up to 50x as compared to current state-of-the-art methods for distributed L1-regularized optimization.
Collectively, lung cancer, breast cancer and melanoma was diagnosed in over 535,340 people out of which, 209,400 deaths were reported [13]. It is estimated that over 600,000 people will be diagnosed with these forms of cancer in 2015. Most of the deaths from lung cancer, breast cancer and melanoma result due to late detection. All of these cancers, if detected early, are 100% curable. In this study, we develop and evaluate algorithms to diagnose Breast cancer, Melanoma, and Lung cancer. In the first part of the study, we employed a normalised Gradient Descent and an Artificial Neural Network to diagnose breast cancer with an overall accuracy of 91% and 95% respectively. In the second part of the study, an artificial neural network coupled with image processing and analysis algorithms was employed to achieve an overall accuracy of 93% A naive mobile based application that allowed people to take diagnostic tests on their phones was developed. Finally, a Support Vector Machine algorithm incorporating image processing and image analysis algorithms was developed to diagnose lung cancer with an accuracy of 94%. All of the aforementioned systems had very low false positive and false negative rates. We are developing an online network that incorporates all of these systems and allows people to collaborate globally.
Although exploratory behaviors are ubiquitous in the animal kingdom, their computational underpinnings are still largely unknown. Behavioral Psychology has identified learning as a primary drive underlying many exploratory behaviors. Exploration is seen as a means for an animal to gather sensory data useful for reducing its ignorance about the environment. While related problems have been addressed in Data Mining and Reinforcement Learning, the computational modeling of learning-driven exploration by embodied agents is largely unrepresented. Here, we propose a computational theory for learning-driven exploration based on the concept of missing information that allows an agent to identify informative actions using Bayesian inference. We demonstrate that when embodiment constraints are high, agents must actively coordinate their actions to learn efficiently. Compared to earlier approaches, our exploration policy yields more efficient learning across a range of worlds with diverse structures. The improved learning in turn affords greater success in general tasks including navigation and reward gathering. We conclude by discussing how the proposed theory relates to previous information-theoretic objectives of behavior, such as predictive information and the free energy principle, and how it might contribute to a general theory of exploratory behavior.
Cluster analysis has attracted more and more attention in the field of machine learning and data mining. Numerous clustering algorithms have been proposed and are being developed due to diverse theories and various requirements of emerging applications. Therefore, it is very worth establishing an unified axiomatic framework for data clustering. In the literature, it is an open problem and has been proved very challenging. In this paper, clustering results are axiomatized by assuming that an proper clustering result should satisfy categorization axioms. The proposed axioms not only introduce classification of clustering results and inequalities of clustering results, but also are consistent with prototype theory and exemplar theory of categorization models in cognitive science. Moreover, the proposed axioms lead to three principles of designing clustering algorithm and cluster validity index, which follow many popular clustering algorithms and cluster validity indices.
Recently Kutin and Niyogi investigated several notions of algorithmic stability--a property of a learning map conceptually similar to continuity--showing that training-stability is sufficient for consistency of Empirical Risk Minimization while distribution-free CV-stability is necessary and sufficient for having finite VC-dimension. This paper concerns a phase transition in the training stability of ERM, conjectured by the same authors. Kutin and Niyogi proved that ERM on finite hypothesis spaces containing a unique risk minimizer has training stability that scales exponentially with sample size, and conjectured that the existence of multiple risk minimizers prevents even super-quadratic convergence. We prove this result for the strictly weaker notion of CV-stability, positively resolving the conjecture.
Using an optimization algorithm to solve a machine learning problem is one of mainstreams in the field of science. In this work, we demonstrate a comprehensive comparison of some state-of-the-art first-order optimization algorithms for convex optimization problems in machine learning. We concentrate on several smooth and non-smooth machine learning problems with a loss function plus a regularizer. The overall experimental results show the superiority of primal-dual algorithms in solving a machine learning problem from the perspectives of the ease to construct, running time and accuracy.
Normalization techniques have only recently begun to be exploited in supervised learning tasks. Batch normalization exploits mini-batch statistics to normalize the activations. This was shown to speed up training and result in better models. However its success has been very limited when dealing with recurrent neural networks. On the other hand, layer normalization normalizes the activations across all activities within a layer. This was shown to work well in the recurrent setting. In this paper we propose a unified view of normalization techniques, as forms of divisive normalization, which includes layer and batch normalization as special cases. Our second contribution is the finding that a small modification to these normalization schemes, in conjunction with a sparse regularizer on the activations, leads to significant benefits over standard normalization techniques. We demonstrate the effectiveness of our unified divisive normalization framework in the context of convolutional neural nets and recurrent neural networks, showing improvements over baselines in image classification, language modeling as well as super-resolution.
In hearing aids, the presence of babble noise degrades hearing intelligibility of human speech greatly. However, removing the babble without creating artifacts in human speech is a challenging task in a low SNR environment. Here, we sought to solve the problem by finding a `mapping  between noisy speech spectra and clean speech spectra via supervised learning. Specifically, we propose using fully Convolutional Neural Networks, which consist of lesser number of parameters than fully connected networks. The proposed network, Redundant Convolutional Encoder Decoder (R-CED), demonstrates that a convolutional network can be 12 times smaller than a recurrent network and yet achieves better performance, which shows its applicability for an embedded system: the hearing aids.
This paper studies the problem of embedding very large information networks into low-dimensional vector spaces, which is useful in many tasks such as visualization, node classification, and link prediction. Most existing graph embedding methods do not scale for real world information networks which usually contain millions of nodes. In this paper, we propose a novel network embedding method called the \"LINE,\" which is suitable for arbitrary types of information networks: undirected, directed, and/or weighted. The method optimizes a carefully designed objective function that preserves both the local and global network structures. An edge-sampling algorithm is proposed that addresses the limitation of the classical stochastic gradient descent and improves both the effectiveness and the efficiency of the inference. Empirical experiments prove the effectiveness of the LINE on a variety of real-world information networks, including language networks, social networks, and citation networks. The algorithm is very efficient, which is able to learn the embedding of a network with millions of vertices and billions of edges in a few hours on a typical single machine. The source code of the LINE is available online.
The Support Vector Machine using Privileged Information (SVM+) has been proposed to train a classifier to utilize the additional privileged information that is only available in the training phase but not available in the test phase. In this work, we propose an efficient solution for SVM+ by simply utilizing the squared hinge loss instead of the hinge loss as in the existing SVM+ formulation, which interestingly leads to a dual form with less variables and in the same form with the dual of the standard SVM. The proposed algorithm is utilized to leverage the additional web knowledge that is only available during training for the image categorization tasks. The extensive experimental results on both Caltech101 andWebQueries datasets show that our proposed method can achieve a factor of up to hundred times speedup with the comparable accuracy when compared with the existing SVM+ method.
In this paper, we describe our approach to the Wikipedia Participation Challenge which aims to predict the number of edits a Wikipedia editor will make in the next 5 months. The best submission from our team, \"zeditor\", achieved 41.7% improvement over WMF s baseline predictive model and the final rank of 3rd place among 96 teams. An interesting characteristic of our approach is that only temporal dynamics features (i.e., how the number of edits changes in recent periods, etc.) are used in a self-supervised learning framework, which makes it easy to be generalised to other application domains.
Positive unlabeled (PU) learning is useful in various practical situations, where there is a need to learn a classifier for a class of interest from an unlabeled data set, which may contain anomalies as well as samples from unknown classes. The learning task can be formulated as an optimization problem under the framework of statistical learning theory. Recent studies have theoretically analyzed its properties and generalization performance, nevertheless, little effort has been made to consider the problem of scalability, especially when large sets of unlabeled data are available. In this work we propose a novel scalable PU learning algorithm that is theoretically proven to provide the optimal solution, while showing superior computational and memory performance. Experimental evaluation confirms the theoretical evidence and shows that the proposed method can be successfully applied to a large variety of real-world problems involving PU learning.
Improving students academic performance is not an easy task for the academic community of higher learning. The academic performance of engineering and science students during their first year at university is a turning point in their educational path and usually encroaches on their General Point Average,GPA in a decisive manner. The students evaluation factors like class quizzes mid and final exam assignment lab work are studied. It is recommended that all these correlated information should be conveyed to the class teacher before the conduction of final exam. This study will help the teachers to reduce the drop out ratio to a significant level and improve the performance of students. In this paper, we present a hybrid procedure based on Decision Tree of Data mining method and Data Clustering that enables academicians to predict students GPA and based on that instructor can take necessary step to improve student academic performance.
The Neural Turing Machine (NTM) is more expressive than all previously considered models because of its external memory. It can be viewed as a broader effort to use abstract external Interfaces and to learn a parametric model that interacts with them. The capabilities of a model can be extended by providing it with proper Interfaces that interact with the world. These external Interfaces include memory, a database, a search engine, or a piece of software such as a theorem verifier. Some of these Interfaces are provided by the developers of the model. However, many important existing Interfaces, such as databases and search engines, are discrete. We examine feasibility of learning models to interact with discrete Interfaces. We investigate the following discrete Interfaces: a memory Tape, an input Tape, and an output Tape. We use a Reinforcement Learning algorithm to train a neural network that interacts with such Interfaces to solve simple algorithmic tasks. Our Interfaces are expressive enough to make our model Turing complete.
We describe and analyze efficient algorithms for learning a linear predictor from examples when the learner can only view a few attributes of each training example. This is the case, for instance, in medical research, where each patient participating in the experiment is only willing to go through a small number of tests. Our analysis bounds the number of additional examples sufficient to compensate for the lack of full information on each training example. We demonstrate the efficiency of our algorithms by showing that when running on digit recognition data, they obtain a high prediction accuracy even when the learner gets to see only four pixels of each image.
Support Vector Machine (SVM) is an effective model for many classification problems. However, SVM needs the solution of a quadratic program which require specialized code. In addition, SVM has many parameters, which affects the performance of SVM classifier. Recently, the Generalized Eigenvalue Proximal SVM (GEPSVM) has been presented to solve the SVM complexity. In real world applications data may affected by error or noise, working with this data is a challenging problem. In this paper, an approach has been proposed to overcome this problem. This method is called DSA-GEPSVM. The main improvements are carried out based on the following: 1) a novel fuzzy values in the linear case. 2) A new Kernel function in the nonlinear case. 3) Differential Search Algorithm (DSA) is reformulated to find near optimal values of the GEPSVM parameters and its kernel parameters. The experimental results show that the proposed approach is able to find the suitable parameter values, and has higher classification accuracy compared with some other algorithms.
Metric learning methods have been shown to perform well on different learning tasks. Many of them rely on target neighborhood relationships that are computed in the original feature space and remain fixed throughout learning. As a result, the learned metric reflects the original neighborhood relations. We propose a novel formulation of the metric learning problem in which, in addition to the metric, the target neighborhood relations are also learned in a two-step iterative approach. The new formulation can be seen as a generalization of many existing metric learning methods. The formulation includes a target neighbor assignment rule that assigns different numbers of neighbors to instances according to their quality; `high quality  instances get more neighbors. We experiment with two of its instantiations that correspond to the metric learning algorithms LMNN and MCML and compare it to other metric learning methods on a number of datasets. The experimental results show state-of-the-art performance and provide evidence that learning the neighborhood relations does improve predictive performance.
We present new excess risk bounds for randomized and deterministic estimators for general unbounded loss functions including log loss and squared loss. Our bounds are expressed in terms of the information complexity and hold under the recently introduced $v$-central condition, allowing for high-probability bounds, and its weakening, the $v$-pseudoprobability convexity condition, allowing for bounds in expectation even under heavy-tailed distributions. The parameter $v$ determines the achievable rate and is akin to the exponent in the Tsybakov margin condition and the Bernstein condition for bounded losses, which the $v$-conditions generalize; favorable $v$ in combination with small information complexity leads to $\\tilde{O}(1/n)$ rates. While these fast rate conditions control the lower tail of the excess loss, the upper tail is controlled by a new type of witness-of-badness condition which allows us to connect the excess risk to a generalized R\\ enyi divergence, generalizing previous results connecting Hellinger distance to KL divergence.
In this paper, we compare three initialization schemes for the KMEANS clustering algorithm: 1) random initialization (KMEANSRAND), 2) KMEANS++, and 3) KMEANSD++. Both KMEANSRAND and KMEANS++ have a major that the value of k needs to be set by the user of the algorithms. (Kang 2013) recently proposed a novel use of determinantal point processes for sampling the initial centroids for the KMEANS algorithm (we call it KMEANSD++). They, however, do not provide any evaluation establishing that KMEANSD++ is better than other algorithms. In this paper, we show that the performance of KMEANSD++ is comparable to KMEANS++ (both of which are better than KMEANSRAND) with KMEANSD++ having an additional that it can automatically approximate the value of k.
Owing to the prevalence of unlabeled data, semisupervised learning has been one of the most prominent machine learning paradigms, and applied successfully in many real-world applications. However, most of existing semi-supervised learning methods are neither computationally efficient nor economic in memory usage. In this paper, we present the Graph-based Semisupervised Kernel Machine (GKM), a method that leverages the generalization ability of kernel-based method with the geometrical and distributive information carried in a spectral graph induced from data for semi-supervised learning purpose. Our proposed GKM can be solved directly in the primal form using the Stochastic Gradient Descent method with the ideal convergence rate $O(\\frac{1}{T})$. Besides, our formulation is suitable for a wide spectrum of important loss functions in the literature of machine learning (e.g., Hinge, smooth Hinge, Logistic, L1, and {\\epsilon}-insensitive) and smoothness functions (i.e., $l_p(t) = |t|^p$ with $p\\ge1$). We note that the well-known Laplacian Support Vector Machine falls into the spectrum of gS3VM corresponding to the combination of the Hinge loss and the smoothness function $l_2(.)$. We further show that the well-known Laplacian Support Vector Machine is a special case of our formulation. We validate our proposed method on several benchmark datasets to demonstrate that GKM is appropriate for the large-scale datasets since it is optimal in memory usage and yields superior classification accuracy whilst simultaneously achieving a significant computation speed-up in comparison with the state-of-the-art baselines.
Structured classification tasks such as sequence labeling and dependency parsing have seen much interest by the Natural Language Processing and the machine learning communities. Several online learning algorithms were adapted for structured tasks such as Perceptron, Passive- Aggressive and the recently introduced Confidence-Weighted learning . These online algorithms are easy to implement, fast to train and yield state-of-the-art performance. However, unlike probabilistic models like Hidden Markov Model and Conditional random fields, these methods generate models that output merely a prediction with no additional information regarding confidence in the correctness of the output. In this work we fill the gap proposing few alternatives to compute the confidence in the output of non-probabilistic algorithms.We show how to compute confidence estimates in the prediction such that the confidence reflects the probability that the word is labeled correctly. We then show how to use our methods to detect mislabeled words, trade recall for precision and active learning. We evaluate our methods on four noun-phrase chunking and named entity recognition sequence labeling tasks, and on dependency parsing for 14 languages.
We propose a new, nonparametric approach to learning and representing transition dynamics in Markov decision processes (MDPs), which can be combined easily with dynamic programming methods for policy optimisation and value estimation. This approach makes use of a recently developed representation of conditional distributions as \\emph{embeddings} in a reproducing kernel Hilbert space (RKHS). Such representations bypass the need for estimating transition probabilities or densities, and apply to any domain on which kernels can be defined. This avoids the need to calculate intractable integrals, since expectations are represented as RKHS inner products whose computation has linear complexity in the number of points used to represent the embedding. We provide guarantees for the proposed applications in MDPs: in the context of a value iteration algorithm, we prove convergence to either the optimal policy, or to the closest projection of the optimal policy in our model class (an RKHS), under reasonable assumptions. In experiments, we investigate a learning task in a typical classical control setting (the under-actuated pendulum), and on a navigation problem where only images from a sensor are observed. For policy optimisation we compare with least-squares policy iteration where a Gaussian process is used for value function estimation. For value estimation we also compare to the NPDP method. Our approach achieves better performance in all experiments.
We propose a new, nonparametric approach to estimating the value function in reinforcement learning. This approach makes use of a recently developed representation of conditional distributions as functions in a reproducing kernel Hilbert space. Such representations bypass the need for estimating transition probabilities, and apply to any domain on which kernels can be defined. Our approach avoids the need to approximate intractable integrals since expectations are represented as RKHS inner products whose computation has linear complexity in the sample size. Thus, we can efficiently perform value function estimation in a wide variety of settings, including finite state spaces, continuous states spaces, and partially observable tasks where only sensor measurements are available. A second advantage of the approach is that we learn the conditional distribution representation from a training sample, and do not require an exhaustive exploration of the state space. We prove convergence of our approach either to the optimal policy, or to the closest projection of the optimal policy in our model class, under reasonable assumptions. In experiments, we demonstrate the performance of our algorithm on a learning task in a continuous state space (the under-actuated pendulum), and on a navigation problem where only images from a sensor are observed. We compare with least-squares policy iteration where a Gaussian process is used for value function estimation. Our algorithm achieves better performance in both tasks.
We propose and analyze a new vantage point for the learning of mixtures of Gaussians: namely, the PAC-style model of learning probability distributions introduced by Kearns et al. Here the task is to construct a hypothesis mixture of Gaussians that is statistically indistinguishable from the actual mixture generating the data; specifically, the KL-divergence should be at most epsilon. In this scenario, we give a poly(n/epsilon)-time algorithm that learns the class of mixtures of any constant number of axis-aligned Gaussians in n-dimensional Euclidean space. Our algorithm makes no assumptions about the separation between the means of the Gaussians, nor does it have any dependence on the minimum mixing weight. This is in contrast to learning results known in the ``clustering   model, where such assumptions are unavoidable. Our algorithm relies on the method of moments, and a subalgorithm developed in previous work by the authors (FOCS 2005) for a discrete mixture-learning problem.
Early diagnosis of treatable diseases is essential for improving healthcare, and many diseases  onsets are predictable from annual lab tests and their temporal trends. We introduce a multi-resolution convolutional neural network for early detection of multiple diseases from irregularly measured sparse lab values. Our novel architecture takes as input both an imputed version of the data and a binary observation matrix. For imputing the temporal sparse observations, we develop a flexible, fast to train method for differentiable multivariate kernel regression. Our experiments on data from 298K individuals over 8 years, 18 common lab measurements, and 171 diseases show that the temporal signatures learned via convolution are significantly more predictive than baselines commonly used for early disease diagnosis.
We present an algorithm that learns representations which explicitly compensate for domain mismatch and which can be efficiently realized as linear classifiers. Specifically, we form a linear transformation that maps features from the target (test) domain to the source (training) domain as part of training the classifier. We optimize both the transformation and classifier parameters jointly, and introduce an efficient cost function based on misclassification loss. Our method combines several features previously unavailable in a single algorithm: multi-class adaptation through representation learning, ability to map across heterogeneous feature spaces, and scalability to large datasets. We present experiments on several image datasets that demonstrate improved accuracy and computational advantages compared to previous approaches.
In this paper, we propose a novel multi-task learning (MTL) framework, called Self-Paced Multi-Task Learning (SPMTL). Different from previous works treating all tasks and instances equally when training, SPMTL attempts to jointly learn the tasks by taking into consideration the complexities of both tasks and instances. This is inspired by the cognitive process of human brain that often learns from the easy to the hard. We construct a compact SPMTL formulation by proposing a new task-oriented regularizer that can jointly prioritize the tasks and the instances. Thus it can be interpreted as a self-paced learner for MTL. A simple yet effective algorithm is designed for optimizing the proposed objective function. An error bound for a simplified formulation is also analyzed theoretically. Experimental results on toy and real-world datasets demonstrate the effectiveness of the proposed approach, compared to the state-of-the-art methods.
Non-negative least-mean-square (NNLMS) algorithm and its variants have been proposed for online estimation under non-negativity constraints. The transient behavior of the NNLMS, Normalized NNLMS, Exponential NNLMS and Sign-Sign NNLMS algorithms have been studied in our previous work. In this technical report, we derive closed-form expressions for the steady-state excess mean-square error (EMSE) for the four algorithms. Simulations results illustrate the accuracy of the theoretical results. This is a complementary material to our previous work.
Sample compression schemes were defined by Littlestone and Warmuth (1986) as an abstraction of the structure underlying many learning algorithms. Roughly speaking, a sample compression scheme of size $k$ means that given an arbitrary list of labeled examples, one can retain only $k$ of them in a way that allows to recover the labels of all other examples in the list. They showed that compression implies PAC learnability for binary-labeled classes, and asked whether the other direction holds. We answer their question and show that every concept class $C$ with VC dimension $d$ has a sample compression scheme of size exponential in $d$. The proof uses an approximate minimax phenomenon for binary matrices of low VC dimension, which may be of interest in the context of game theory.
We introduce two practical properties of hierarchical clustering methods for (possibly asymmetric) network data: excisiveness and linear scale preservation. The latter enforces imperviousness to change in units of measure whereas the former ensures local consistency of the clustering outcome. Algorithmically, excisiveness implies that we can reduce computational complexity by only clustering a data subset of interest while theoretically guaranteeing that the same hierarchical outcome would be observed when clustering the whole dataset. Moreover, we introduce the concept of representability, i.e. a generative model for describing clustering methods through the specification of their action on a collection of networks. We further show that, within a rich set of admissible methods, requiring representability is equivalent to requiring both excisiveness and linear scale preservation. Leveraging this equivalence, we show that all excisive and linear scale preserving methods can be factored into two steps: a transformation of the weights in the input network followed by the application of a canonical clustering method. Furthermore, their factorization can be used to show stability of excisive and linear scale preserving methods in the sense that a bounded perturbation in the input network entails a bounded perturbation in the clustering output.
In this paper, we present two localized graph filtering based methods for interpolating graph signals defined on the vertices of arbitrary graphs from only a partial set of samples. The first method is an extension of previous work on reconstructing bandlimited graph signals from partially observed samples. The iterative graph filtering approach very closely approximates the solution proposed in the that work, while being computationally more efficient. As an alternative, we propose a regularization based framework in which we define the cost of reconstruction to be a combination of smoothness of the graph signal and the reconstruction error with respect to the known samples, and find solutions that minimize this cost. We provide both a closed form solution and a computationally efficient iterative solution of the optimization problem. The experimental results on the recommendation system datasets demonstrate effectiveness of the proposed methods.
Conditional random fields (CRFs) are usually specified by graphical models but in this paper we propose to use probabilistic logic programs and specify them generatively. Our intension is first to provide a unified approach to CRFs for complex modeling through the use of a Turing complete language and second to offer a convenient way of realizing generative-discriminative pairs in machine learning to compare generative and discriminative models and choose the best model. We implemented our approach as the D-PRISM language by modifying PRISM, a logic-based probabilistic modeling language for generative modeling, while exploiting its dynamic programming mechanism for efficient probability computation. We tested D-PRISM with logistic regression, a linear-chain CRF and a CRF-CFG and empirically confirmed their excellent discriminative performance compared to their generative counterparts, i.e.\\ naive Bayes, an HMM and a PCFG. We also introduced new CRF models, CRF-BNCs and CRF-LCGs. They are CRF versions of Bayesian network classifiers and probabilistic left-corner grammars respectively and easily implementable in D-PRISM. We empirically showed that they outperform their generative counterparts as expected.
Policies for complex visual tasks have been successfully learned with deep reinforcement learning, using an approach called deep Q-networks (DQN), but relatively large (task-specific) networks and extensive training are needed to achieve good performance. In this work, we present a novel method called policy distillation that can be used to extract the policy of a reinforcement learning agent and train a new network that performs at the expert level while being dramatically smaller and more efficient. Furthermore, the same method can be used to consolidate multiple task-specific policies into a single policy. We demonstrate these claims using the Atari domain and show that the multi-task distilled agent outperforms the single-task teachers as well as a jointly-trained DQN agent.
We present an efficient distributed online learning scheme to classify data captured from distributed, heterogeneous, and dynamic data sources. Our scheme consists of multiple distributed local learners, that analyze different streams of data that are correlated to a common event that needs to be classified. Each learner uses a local classifier to make a local prediction. The local predictions are then collected by each learner and combined using a weighted majority rule to output the final prediction. We propose a novel online ensemble learning algorithm to update the aggregation rule in order to adapt to the underlying data dynamics. We rigorously determine a bound for the worst case misclassification probability of our algorithm which depends on the misclassification probabilities of the best static aggregation rule, and of the best local classifier. Importantly, the worst case misclassification probability of our algorithm tends asymptotically to 0 if the misclassification probability of the best static aggregation rule or the misclassification probability of the best local classifier tend to 0. Then we extend our algorithm to address challenges specific to the distributed implementation and we prove new bounds that apply to these settings. Finally, we test our scheme by performing an evaluation study on several data sets. When applied to data sets widely used by the literature dealing with dynamic data streams and concept drift, our scheme exhibits performance gains ranging from 34% to 71% with respect to state of the art solutions.
This paper presents the development of a passive infra-red sensor tower platform along with a classification algorithm to distinguish between human intrusion, animal intrusion and clutter arising from wind-blown vegetative movement in an outdoor environment. The research was aimed at exploring the potential use of wireless sensor networks as an early-warning system to help mitigate human-wildlife conflicts occurring at the edge of a forest. There are three important features to the development. Firstly, the sensor platform employs multiple sensors arranged in the form of a two-dimensional array to give it a key spatial-resolution capability that aids in classification. Secondly, given the challenges of collecting data involving animal intrusion, an Animation-based Simulation tool for Passive Infra-Red sEnsor (ASPIRE) was developed that simulates signals corresponding to human and animal intrusion and some limited models of vegetative clutter. This speeded up the process of algorithm development by allowing us to test different hypotheses in a time-efficient manner. Finally, a chirplet-based model for intruder signal was developed that significantly helped boost classification accuracy despite drawing data from a smaller number of sensors. An SVM-based classifier was used which made use of chirplet, energy and signal cross-correlation-based features. The average accuracy obtained for intruder detection and classification on real-world and simulated data sets was in excess of 97%.
We study the problem of how to distribute the training of large-scale deep learning models in the parallel computing environment. We propose a new distributed stochastic optimization method called Elastic Averaging SGD (EASGD). We analyze the convergence rate of the EASGD method in the synchronous scenario and compare its stability condition with the existing ADMM method in the round-robin scheme. An asynchronous and momentum variant of the EASGD method is applied to train deep convolutional neural networks for image classification on the CIFAR and ImageNet datasets. Our approach accelerates the training and furthermore achieves better test accuracy. It also requires a much smaller amount of communication than other common baseline approaches such as the DOWNPOUR method. We then investigate the limit in speedup of the initial and the asymptotic phase of the mini-batch SGD, the momentum SGD, and the EASGD methods. We find that the spread of the input data distribution has a big impact on their initial convergence rate and stability region. We also find a surprising connection between the momentum SGD and the EASGD method with a negative moving average rate. A non-convex case is also studied to understand when EASGD can get trapped by a saddle point. Finally, we scale up the EASGD method by using a tree structured network topology. We show empirically its advantage and challenge. We also establish a connection between the EASGD and the DOWNPOUR method with the classical Jacobi and the Gauss-Seidel method, thus unifying a class of distributed stochastic optimization methods.
We present new methods for multilabel classification, relying on ensemble learning on a collection of random output graphs imposed on the multilabel and a kernel-based structured output learner as the base classifier. For ensemble learning, differences among the output graphs provide the required base classifier diversity and lead to improved performance in the increasing size of the ensemble. We study different methods of forming the ensemble prediction, including majority voting and two methods that perform inferences over the graph structures before or after combining the base models into the ensemble. We compare the methods against the state-of-the-art machine learning approaches on a set of heterogeneous multilabel benchmark problems, including multilabel AdaBoost, convex multitask feature learning, as well as single target learning approaches represented by Bagging and SVM. In our experiments, the random graph ensembles are very competitive and robust, ranking first or second on most of the datasets. Overall, our results show that random graph ensembles are viable alternatives to flat multilabel and multitask learners.
Tree boosting is a highly effective and widely used machine learning method. In this paper, we describe a scalable end-to-end tree boosting system called XGBoost, which is used widely by data scientists to achieve state-of-the-art results on many machine learning challenges. We propose a novel sparsity-aware algorithm for sparse data and weighted quantile sketch for approximate tree learning. More importantly, we provide insights on cache access patterns, data compression and sharding to build a scalable tree boosting system. By combining these insights, XGBoost scales beyond billions of examples using far fewer resources than existing systems.
We present a new probabilistic model of compact commutative Lie groups that produces invariant-equivariant and disentangled representations of data. To define the notion of disentangling, we borrow a fundamental principle from physics that is used to derive the elementary particles of a system from its symmetries. Our model employs a newfound Bayesian conjugacy relation that enables fully tractable probabilistic inference over compact commutative Lie groups -- a class that includes the groups that describe the rotation and cyclic translation of images. We train the model on pairs of transformed image patches, and show that the learned invariant representation is highly effective for classification.
For a classification problem described by the joint density $P(\\omega,x)$, models of $P(\\omega\\eq\\omega |x,x )$ (the ``Bayesian similarity measure  ) have been shown to be an optimal similarity measure for nearest neighbor classification. This paper analyzes demonstrates several additional properties of that conditional distribution. The paper first shows that we can reconstruct, up to class labels, the class posterior distribution $P(\\omega|x)$ given $P(\\omega\\eq\\omega |x,x )$, gives a procedure for recovering the class labels, and gives an asymptotically Bayes-optimal classification procedure. It also shows, given such an optimal similarity measure, how to construct a classifier that outperforms the nearest neighbor classifier and achieves Bayes-optimal classification rates. The paper then analyzes Bayesian similarity in a framework where a classifier faces a number of related classification tasks (multitask learning) and illustrates that reconstruction of the class posterior distribution is not possible in general. Finally, the paper identifies a distinct class of classification problems using $P(\\omega\\eq\\omega |x,x )$ and shows that using $P(\\omega\\eq\\omega |x,x )$ to solve those problems is the Bayes optimal solution.
Diabetes is a major health problem in both developing and developed countries and its incidence is rising dramatically. In this study, we investigate a novel automatic approach to diagnose Diabetes disease based on Feature Weighted Support Vector Machines (FW-SVMs) and Modified Cuckoo Search (MCS). The proposed model consists of three stages: Firstly, PCA is applied to select an optimal subset of features out of set of all the features. Secondly, Mutual Information is employed to construct the FWSVM by weighting different features based on their degree of importance. Finally, since parameter selection plays a vital role in classification accuracy of SVMs, MCS is applied to select the best parameter values. The proposed MI-MCS-FWSVM method obtains 93.58% accuracy on UCI dataset. The experimental results demonstrate that our method outperforms the previous methods by not only giving more accurate results but also significantly speeding up the classification procedure.
We investigate the problem of learning a topic model - the well-known Latent Dirichlet Allocation - in a distributed manner, using a cluster of C processors and dividing the corpus to be learned equally among them. We propose a simple approximated method that can be tuned, trading speed for accuracy according to the task at hand. Our approach is asynchronous, and therefore suitable for clusters of heterogenous machines.
Standard multi-armed bandits model decision problems in which the consequences of each action choice are unknown and independent of each other. But in a wide variety of decision problems - from drug dosage to dynamic pricing - the consequences (rewards) of different actions are correlated, so that selecting one action provides information about the consequences (rewards) of other actions as well. We propose and analyze a class of models of such decision problems; we call this class of models global bandits. When rewards across actions (arms) are sufficiently correlated we construct a greedy policy that achieves bounded regret, with a bound that depends on the true parameters of the problem. In the special case in which rewards of all arms are deterministic functions of a single unknown parameter, we construct a (more sophisticated) greedy policy that achieves bounded regret, with a bound that depends on the single true parameter of the problem. For this special case we also obtain a bound on regret that is independent of the true parameter; this bound is sub-linear, with an exponent that depends on the informativeness of the arms (which measures the strength of correlation between arm rewards).
We propose a novel problem formulation of learning a single task when the data are provided in different feature spaces. Each such space is called an outlook, and is assumed to contain both labeled and unlabeled data. The objective is to take advantage of the data from all the outlooks to better classify each of the outlooks. We devise an algorithm that computes optimal affine mappings from different outlooks to a target outlook by matching moments of the empirical distributions. We further derive a probabilistic interpretation of the resulting algorithm and a sample complexity bound indicating how many samples are needed to adequately find the mapping. We report the results of extensive experiments on activity recognition tasks that show the value of the proposed approach in boosting performance.
We propose a batchwise monotone algorithm for dictionary learning. Unlike the state-of-the-art dictionary learning algorithms which impose sparsity constraints on a sample-by-sample basis, we instead treat the samples as a batch, and impose the sparsity constraint on the whole. The benefit of batchwise optimization is that the non-zeros can be better allocated across the samples, leading to a better approximation of the whole. To accomplish this, we propose procedures to switch non-zeros in both rows and columns in the support of the coefficient matrix to reduce the reconstruction error. We prove in the proposed support switching procedure the objective of the algorithm, i.e., the reconstruction error, decreases monotonically and converges. Furthermore, we introduce a block orthogonal matching pursuit algorithm that also operates on sample batches to provide a warm start. Experiments on both natural image patches and UCI data sets show that the proposed algorithm produces a better approximation with the same sparsity levels compared to the state-of-the-art algorithms.
The author studies the Smarandache Fuzzy Algebra, which, like its predecessor Fuzzy Algebra, arose from the need to define structures that were more compatible with the real world where the grey areas mattered, not only black or white. This book has seven chapters, which are divided into two parts. Part I contains the first chapter, and Part II encloses the remaining six chapters. In the first chapter (which also forms the first part), which is subdivided into twelve sections, we deal with eleven distinct fuzzy algebraic concepts and in the concluding section list the miscellaneous properties of fuzzy algebra. The eleven fuzzy algebraic concepts which we analyze are fuzzy sets, fuzzy subgroups, fuzzy sub-bigroups, fuzzy rings, fuzzy birings, fuzzy fields, fuzzy semirings, fuzzy near-rings, fuzzy vector spaces, fuzzy semigroups and fuzzy half-groupoids. The results used in these sections are extensive and we have succeeded in presenting new concepts defined by several researchers.
Goodstein sequences are numerical sequences in which a natural number m, expressed as the complete normal form to a given base a, is modified by increasing the value of the base a by one unit and subtracting one unit from the resulting expression. As initially defined, the first term of the Goodstein sequence is the complete normal form of m to base 2. Goodstein s Theorem states that, for all natural numbers, the Goodstein sequence eventually terminates at zero. Goodstein s Theorem was originally proved using the well-ordered properties of transfinite ordinals. The theorem was also shown to be unprovable-in-PA (Peano Arithmetic) using transfinite induction and Godel s Second Incompleteness Theorem. This article describes a proof of Goodstein s Theorem in first-order arithmetic that contradicts the theorem s unprovability-in-PA. The proof uses mathematical induction and is applied (via the super-exponential function) to a generalized version of the Goodstein sequences. Such a proof demonstrates the inconsistency of classical set theory, more precisely the combination of the Zermelo-Fraenkel axioms and the axiom of choice (ZFC).
The non-zero integer solution set is derived for C^n = A^n + B^n. The non-zero integer solution set for n = 2 is [C - (a + b)]^2 = 2ab. The variables a and b equal (C - A) and (C - B) respectively and are nonzero integer factors of 2M^2 where M is a non-zero integer. C is greater than (a + b) since the square root of 2ab is an imaginary number when C is less than (a + b). C is equal or greater than (a + b + 1) since we are only considering whole numbers. The derivation of the solution set for n = 2 is applied to n = 3, n = 4, and generalized to n. The solution set for n = n is [C - (a + b)]^n = ab([n:2]C^(n-2)*(2) - [n:3]C^(n-3)*(3a + 3b)+ ... + [n:n] {[n:1]a^(n-2) + [n:2]a^(n-3)*b^1 + [n:3]a^(n-4)*b^2 +... + [n:n-1]b^(n-2)}). Where the binomial coefficient [n:r] = n!/[(n - r)!r!] is the coefficient of the x^r term in the polynomial expansion of the binomial power (1 + x)^n and [n:r] = 0 if r > n. Divide this equation by [C-(a + b)]^(n-2) to obtain [C-(a + b)]^2. The solution set for [C - (a + b)]^2 equals 2ab. The nth solution set equals 2ab only when n equals 2. [C - (a + b)]^2 (I.e., [C - (a + b)]^n divided by [C - (a + b)]^(n-2)) is always greater than 2ab when n is greater than 2. Non-zero integer solutions exist only for n = 2.
We give an optical physicist view of the problem of the trajectories in a polygonal billiard using only basic facts of Optics and the theory of functions of a complex variable. This approach allow us to stablish a certain correspondence between n-gon billiards and one-holed 2n-punctured tori. Therefore the existence of periodic trajectories in a certain polygon becomes the problem of the existence of closed geodesics in its associated torus.
Driessel [\"Computing canonical forms using flows\", Linear Algebra and Its Applications 2004] introduced the notion of quasi-projection onto the range of a linear transformation from one inner product space into another inner product space. Here we introduce the notion of quasi-projection onto the intersection of the ranges of two linear transformations from two inner product spaces into a third inner product space. As an application, we design a new family of iso-spectral flows on the space of symmetric matrices that preserves zero patterns. We discuss the equilibrium points of these flows. We conjecture that these flows generically converge to diagonal matrices. We perform some numerical experiments with these flows which support this conjecture. We also compare our zero preserving flows with the Toda flow.
Often some interesting or simply curious points are left out when developing a theory. It seems that one of them is the existence of an upper bound for the fraction of area of a convex and closed plane area lying outside a circle with which it shares a diameter, a problem stemming from the theory of isoperimetric inequalities. In this paper such a bound is constructed and shown to be attained for a particular area. It is also shown that convexity is a necessary condition in order to avoid the whole area lying outside the circle.
The subset of quadratic primes {p = an^2 + bn + c : n => 1} generated by an irreducible polynomial f(x) = ax^2 + bx + c over the integers is widely believed to be an unbounded subset of prime numbers. This note provides the details of a possible proof for some of these quadratic polynomials. In particular, it is shown that the cardinality of the simplest subset of quadratic primes {p = n^2 + 1 : n => 1} is infinite.
In this paper, we introduce the notion of expanding topological space. We define the topological expansion of a topological space via local multi-homeomorphism over coproduct topology, and we prove that the coproduct family associated to any fractal family of topological spaces is expanding. In particular, we prove that the more a topological space expands, the finer the topology of its indexed states is. Using multi-homeomorphisms over associated coproduct topological spaces, we define a locally expandable topological space and we prove that a locally expandable topological space has a topological expansion. Specifically, we prove that the expanding fractal manifold is locally expandable and has a natural topological expansion.
In this paper the concept of Q-fuzzification of ideals of gamma-semigroups has been introduced and some important properties have been investigated. A characterization of regular gamma-semigroup in terms of Q-fuzzy ideals has been obtained. Operator semigroups of a gamma-semigroup has been made to work by obtaining various relationships between Q-fuzzy ideals of a gamma-semigroup and that of its operator semigroups.
In this article we present evaluations of continued fractions studied by Ramanujan. More precisely we give the complete polynomial equations of Rogers-Ramanujan and other continued fractions, using tools from the elementary theory of the Elliptic functions. We see that all these fractions are roots of polynomials with coeficients depending only on the inverse elliptic nome-q and in some cases the Elliptic Integral-K. In most of simplifications of formulas we use Mathematica.
We show that the generic $1/f$ spectrum problem acquires a natural explanation in a class of scale free solutions to the ordinary differential equations. We prove the existence and uniqueness of this class of solutions and show how this leads to a nonstandard, fuzzy extension of the ordinary framework of calculus, and hence, that of the classical dynamics and quantum mechanics. The exceptional role of the golden mean irrational number is also explained.
The notion of intuitionistic fuzzy set was introduced by Atanassov as a generalization of the notion of fuzzy set. In this paper we apply this concept of Atanassov to ideals, prime ideals and semiprime ideals of gamma semigroups in order to obtain some characterization theorems. We also introduce the notion of Atanassov s intuitionistic fuzzy ideal extension in a gamma semigroup and investigate some of their important properties. A regular gamma semigroup has been characterized in terms of Atanasov s intutionistic fuzzy ideal. Characterization of prime ideal of a gamma semigroup has also been obtained in terms of Atanassov s intutionistic fuzzy ideal extension.
The Riemann Hypothesis is a famous hypothesis about distribution of non-trivial zeros of zeta function. The non-trivial zeros of zeta function is related to prime number theorem. Based on the prime number theorem, we introduce a functional integral that is related to all non-trivial zeros of zeta function; furthermore, we use variational method to prove the Riemann Hypothesis. Variational method is commonly used to determine extreme values of functional or some extremal functions. According to variational principle, if this functional reaches some extreme values, all non-trivial zeros of zeta function will satisfy Euler equations. Combing some boundary condition, we could deduce that all non-trivial zeros of zeta function lie on the critical line. Therefore, the Riemann Hypothesis is true.
The eventological theory of decision-making, the theory of eventfull decision-making is a theory of decision-making based on eventological principles and using results of mathematical eventology; a theoretical basis of the practical eventology. The beginnings of this theory which have arisen from eventfull representation of the reasonable subject and his decisions in the form of eventological distributions (E-distributions) of sets of events and which are based on the eventological H-theorem are offered. The illustrative example of the eventological decision-making by the reasonable subject on his own eventfull behaviour in the financial or share market is considered.
A new kind of numbers called Hyper Space Complex Numbers and its algebras are defined and proved. It is with good properties as the classic Complex Numbers, such as expressed in coordinates, triangular and exponent forms and following the associative and commutative laws of addition and multiplication. So the classic Complex Number is developed from in complex plane with two dimensions to in complex space with N dimensions and the number system is enlarged also.
Using the similar formulas of the preference relation and the utility function, we propose the confidence relations and the corresponding influence functions that represent various interacting strengths of different families, cliques and systems of organization. Since they can affect products, profit and prices, etc., in an economic system, and are usually independent of economic results, therefore, the system can produce a multiply connected topological economics. If the political economy is an economy chaperoned polity, it will produce consequentially a binary economy. When the changes of the product and the influence are independent one another, they may be a node or saddle point. When the influence function large enough achieves a certain threshold value, it will form a wormhole with loss of capital. Various powers produce usually the economic wormhole and various corruptions.
We show essentially that the differential equation $\\frac{\\partial (P,Q)}{\\partial (x,y)} =c \\in {\\mathbb C}$, for $P,,Q \\in {\\mathbb C}[x,y]$, may be \"integrated\", in the sense that it is equivalent to an algebraic system of equations involving the homogeneous components of $P$ and $Q$. Furthermore, the first equations in this system give explicitly the homogeneous components of $Q$ in terms of those of $P$. The remaining equations involve only the homogeneous components of $P$.
In this book, we introduce the notion of Smarandache special definite algebraic structures. We can also call them equivalently as Smarandache definite special algebraic structures. These new structures are defined as those strong algebraic structures which have in them a proper subset which is a weak algebraic structure. For instance, the existence of a semigroup in a group or a semifield in a field or a semiring in a ring. It is interesting to note that these concepts cannot be defined when the algebraic structure has finite cardinality i.e., when the algebraic structure has finite number of elements in it. This book has four chapters. Chapter one is introductory in nature. In chapter two, the notion of Smarandache special definite groups and Smarandache special definite fields are introduced and several interesting properties are derived. The notion of Smarandache definite special rings, vector spaces and linear algebras are introduced and analyzed in chapter three. The final chapter suggests over 200 problems.
To each 4x4 matrix of reals another 4x4 matrix is constructed, the so-called associate matrix. This associate matrix is shown to have rank 1 and norm 1 (considered as a 16D vector) if and only if the original matrix is a 4D rotation matrix. This rank-1 matrix is the dyadic product of a pair of 4D unit vectors, which are determined as a pair up to their signs. The leftmost factor (the column vector) consists of the components of the left quaternion and represents the left-isoclinic part of the 4D rotation. The rightmost factor (the row vector) likewise represents the right quaternion and the right-isoclinic part of the 4D rotation. Finally the intrinsic geometrical meaning of this matrix-based proof is established by means of the usual similarity transformations.
This article proves the Riemann hypothesis, which states that all non-trivial zeros of the zeta function have a real part equal to 1/2. We inspect in detail the integral form of the (symmetrized) completed zeta function, which is a product between the zeta and gamma functions. It is known that two integral lines, expressing the completed zeta function, rotated from the real axis in the opposite directions, can be shifted without affecting the completed zeta function owing to the residue theorem. The completed zeta function is regular in the region of the complex plane under consideration. For convenience in the subsequent singularity analysis of the above integral, we first transform (convert) this integral to that along the line parallel to the real axis. We then investigate the singularities of the composite elements (caused by polynomial integrals in opposite directions), which appear only in the case for which the distance between the contours and the origin of the coordinates approaches zero. The real part of the zeros of the zeta function is determined to be 1/2 along a symmetry line from the singularity removal condition. (In the other points, the singularities are adequately cancelled as a whole to lead to a finite value.)
For a partially ordered set P, we denote by Co(P) the lattice of order-convex subsets of P. We find three new lattice identities, (S), (U), and (B), such that the following result holds. Theorem. Let L be a lattice. Then L embeds into some lattice of the form Co(P) iff L satisfies (S), (U), and (B). Furthermore, if L has an embedding into some Co(P), then it has such an embedding that preserves the existing bounds. If L is finite, then one can take P finite, of cardinality at most $2n^2-5n+4$, where n is the number of join-irreducible elements of L. On the other hand, the partially ordered set P can be chosen in such a way that there are no infinite bounded chains in P and the undirected graph of the predecessor relation of P is a tree.
This paper attempts to look for a mathematical method of composing music by incorporating Schonbergs idea of tone rows and matrix theory from linear algebra. The elements of a note set S are considered as the integer values for the natural notes based on the C Major Scale and rational numbers for semitones. The elements of S are effectively mapped by a polynomial function to another note set T. To accomplish this, S is treated as a column vector, applied to the matrix equation Ax equals b, where x denotes the vector S, b denotes the resulting set T, and A represents a square matrix. This method yields functions capable of mapping input note sets to others, thereby creating collections of sets that can be permuted in any order to form musical harmonies.
Quasi-invariant and pseudo-differentiable measures on a Banach space $X$ over a non-Archimedean locally compact infinite field with a non-trivial valuation are defined and constructed. Measures are considered with values in $\\bf R$. Theorems and criteria are formulated and proved about quasi-invariance and pseudo-differentiability of measures relative to linear and non-linear operators on $X$. Characteristic functionals of measures are studied. Moreover, the non-Archimedean analogs of the Bochner-Kolmogorov and Minlos-Sazonov theorems are investigated. Infinite products of measures also are considered. Convergence of quasi-invariant and pseudo-differentiable measures in the corresponding spaces of measures is investigated.
This paper provides some counterexamples to Cantor s contributions to the foundations of Set Theory. The first counterexample forces Cantor s Diagonal Method (DM) to yield one of the numbers in the target list. To study this anomaly, and given that for the DM to work the list of numbers have to be written down, the set of numbers that can be represented using positional fractional notation, $\\mathbb{W}$, is properly characterized. It is then shown that $\\mathbb{W}$ is not isomorphic to $\\mathbb{R}$, meaning that results obtained from the application of the DM to $\\mathbb{W}$ in order to derive properties of $\\mathbb{R}$ are not valid. It is then shown that Cantor s DM for a generic list of reals can be forced to yield one of the numbers of the list, thus invalidating Cantor s result that infers the non-denumerability of $\\mathbb{R}$ from the application of the DM to $\\mathbb{W}$. Cantor s Theorem about the different cardinalities of a set and its power set is then questioned, and by means of another counterexample we show that the theorem does not actually hold for infinite sets. After analyzing all these results, it is shown that the current notion of cardinality for infinite sets does not depend on the size of the sets, but rather on the representation chosen for them. Following this line of thought, the concept of model as a framework for the construction of the representation of a set is introduced, and a theorem showing that an infinite set can be well-ordered if there is a proper model for it is proven. To reiterate that the cardinality of a set does not determine whether the set can be well-ordered, a set of cardinality $\\aleph_{0}^{\\aleph_{0}}$ is proven to be equipollent to the set of natural numbers $\\mathbb{N}$. The paper concludes with an analysis of the cardinality of the ordinal numbers, for which a representation of cardinality $\\aleph_{0}^{\\aleph_{0}}$ is proposed.
In this report, the explicit probability density functions of the random Euclidean distances associated with equilateral triangles are given, when the two endpoints of a link are randomly distributed in 1) the same triangle, 2) two adjacent triangles sharing a side, 3) two parallel triangles sharing a vertex, and 4) two diagonal triangles sharing a vertex, respectively. The density function for 1) is based on the most recent work by Basel [1]. 2)-4) are based on 1) and our previous work in [2], [3]. Simulation results show the accuracy of the obtained closed-form distance distribution functions, which are important in the theory of geometrical probability. The first two statistical moments of the random distances and the polynomial fits of the density functions are also given in this report for practical uses.
If o and * are two binary operations in a number system, then three elements a,b,c in that number system are said to satisfy the distributive property of the operation o over the operation * if, ao(b*c)= (aob)*(aoc) Now, suppose that the number system is the rationals,and the operations o and * are among the four usual operations of addition, multiplication, subtraction, and division. If we allow for o and * to be the same operation, then there are precisely 16 combinations with the operation o being one of the four usual operations in Q; and likewise for the operation *. Two of these 16 combinations are when o is the multiplication operationand * being the addition operation; and when is o is multiplication and * is subtraction. For these two combinations, the above stated distributive property is universally satisfied; that is, for ane three rational numbers a,b,and c. In this work, we examine the other fourteen combinations, to find out when the distributive property is satisfied. Of these 14 combinations or cases, eleven are easy/straightforward, in that almost always, one of the three rational numbers a, b, c; must be zero or 1. The remaining three cases or combinations are much more complicated, and number theory is involved.
After certain subsets of Natural numbers called Range and Row are defined, we assume (1) there is a function that can produce prime numbers and (2) each even number greater than 2, like A, can be represented as the sum of n prime numbers. We show this by DC(A)less than or equal to n. Each Row is similar to each other in properties,(so is each Range). It is proven that in an arbitrary Row for any even number greater than 2, DC(A)=2, that is to say, each prime number greater than two is the sum of two prime numbers. So Goldbach s conjecture is proved.
In this paper we propose a classification scheme to isolate truly benign tumors from those that initially start off as benign but subsequently show metastases. A non-parametric artificial neural network methodology has been chosen because of the analytical difficulties associated with extraction of closed-form stochastic-likelihood parameters given the extremely complicated and possibly non-linear behavior of the state variables.
We prove that for any free lattice F with at least $\\aleph\\_2$ generators in any non-distributive variety of lattices, there exists no sectionally complemented lattice L with congruence lattice isomorphic to the one of F. This solves a question formulated by Gr\\\"{a}tzer and Schmidt in 1962. This yields in turn further examples of simply constructed distributive semilattices that are not isomorphic to the semilattice of &#64257;nitely generated two-sided ideals in any von Neumann regular ring.
The article presents a new approach to euclidean plane geometry based on projective geometric algebra (PGA). It is designed for anyone with an interest in plane geometry, or who wishes to familiarize themselves with PGA. After a brief review of PGA, the article focuses on $\\mathbf{P}(\\mathbb{R}^*_{2,0,1})$, the PGA for euclidean plane geometry. It first explores the geometric product involving pairs and triples of basic elements (points and lines), establishing a wealth of fundamental metric and non-metric properties. It then applies the algebra to a variety of familiar topics in plane euclidean geometry and shows that it compares favorably with other approaches in regard to completeness, compactness, practicality, and elegance. The seamless integration of euclidean and ideal (aka infinite) elements forms an essential and novel feature of the treatment. Numerous figures accompany the text. For readers with the requisite mathematical background, a self-contained coordinate-free introduction to the algebra is provided in an appendix.
The transformation of the partial fractional derivatives under spatial rotation in $R^2$ are derived for the Riemann-Liouville and Caputo definitions. These transformation properties link the observation of physical quantities, expressed through fractional derivatives, with respect to different coordinate systems (observers). It is the hope that such understanding could shed light on the physical interpretation of fractional derivatives. Also it is necessary to able to construct interaction terms that are invariant with respect to equivalent observers.
In this paper, the notion of the interval valued neutrosophic soft sets ($ivn-$soft sets) is defined which is a combination of an interval valued neutrosophic sets \\cite{wan-05} and a soft sets \\cite{mol-99}. Our $ivn-$soft sets generalizes the concept of the soft set, fuzzy soft set, interval valued fuzzy soft set, intuitionistic fuzzy soft set, interval valued intuitionistic fuzzy soft set and neutrosophic soft set. Then, we introduce some definitions and operations on $ivn-$soft sets sets. Some properties of $ivn-$soft sets which are connected to operations have been established. Also, the aim of this paper is to investigate the decision making based on $ivn-$soft sets by level soft sets. Therefore, we develop a decision making methods and then give a example to illustrate the developed approach.
One considers the monistic conception of a geometry, where there is only one fundamental quantity (world function). All other geometrical quantities a derivative quantities (functions of the world function). The monisitc conception of a geometry is compared with pluralistic conceptions of a geometry, where there are several independent fundamental geometrical quantities. A generalization of a pluralistic conception of the proper Euclidean geometry appears to be inconsistent, if the generalized geometry is inhomogeneous. In particular, the Riemannian geometry appears to be inconsistent, in general, if it is obtained as a generalization of the pluralistic conception of the Euclidean geometry.
An anomaly in electrical circuit theory is the disappearance of some of the energy when two capacitors, one charged and the other uncharged, are connected together through resistanceless wires. Nonstandard analysis shows that, when the wires are taken to have infinitesimally small but nonzero resistance, the energy dissipated in the wires equals that substantial amount of enregy that had disappeared, and that all but an infinitesimal amount of this dissipation occurs during an infinitesimal initial time period.
Properties of the logical reloading in the Euclidean geometry are considered. The logical reloading is a logical operation which replaces one system of basic concepts of a conception by another system of basic concepts of the same conception. The logical reloading does not change propositions of the conception. However, generalizations of the conception are different for different systems of basic concepts. It is conditioned by the fact, that some systems of basic concepts contain not only propositions of the conception, but also some attributes of this conception description. Properties of the logical reloading are demonstrated in the example of the proper Euclidean geometry, whose generalization leads to different results for different system of basic concepts.
All sieve methods for the Goldbach problem sift out all the composite numbers; even though, strictly speaking, it is not necessary to do so and which is, in general, very difficult. Some new methods introduced in this paper show that the Goldbach problem can be solved under sifting out only some composite numbers. In fact, in order to prove the Goldbach conjecture, it is only necessary to show that there are prime numbers left in the residual integers after the initial sifting! This idea can be implemented by using one of the three methods called sifting function partition by integer sort, sifting function partition by intervals and comparative sieve method, respectively. These are feasible methods for solving both the Goldbach problem and the problem of twin primes. An added bonus of the above methods is the elimination of the indeterminacy of the sifting functions brought about by their upper and lower bounds.
Let K be a self-similar or self-affine set in R^d, let \\mu be a self-similar or self-affine measure on it, and let G be the group of affine maps, similitudes, isometries or translations of R^d. Under various assumptions (such as separation conditions or we assume that the transformations are small perturbations or that K is a so called Sierpinski sponge) we prove theorems of the following types, which are closely related to each other; Non-stability: There exists a constant c<1 such that for every g\\in G we have either \\mu(K\\cap g(K)) <c \\mu(K) or K\\subset g(K). Measure and topology: For every g\\in G we have \\mu(K\\cap g(K)) > 0 \\iff int_K (K\\cap g(K)) is nonempty (where int_K is interior relative to K). Extension: The measure \\mu has a G-invariant extension to R^d. Moreover, in many situations we characterize those g s for which \\mu(K\\cap g(K) > 0, and we also get results about those $g$ s for which $g(K)\\su K$ or $g(K)\\supset K$ holds.
A fuzzy subset $f$ of an ordered semigroup (or semigroup) $S$ is called fuzzy semiprime if $f(x)\\ge f(x^2)$ for every $x\\in S$ (Definition 1). Following the terminology of semiprime subsets of ordered semigroups (semigroups), the terminology of ideal elements of $poe$-semigroups (: ordered semigroups possessing a greatest element), and the terminology of ordered semigroups, in general, a fuzzy subset $f$ of an ordered semigroups (semigroup) should be called fuzzy semiprime if for every fuzzy subset $g$ of $S$ such that $g^2:=g\\circ g\\preceq f$, we have $g\\preceq f$ (Definition 2). And this is because if $S$ is a semigroup or ordered semigroup, then the set of all fuzzy subsets of $S$ is a semigroup (ordered semigroup) as well. What is the relation between these two definitions? that is between the usual definition (Definition 1) we always use and the definition we give in the present paper (Definition 2) saying that that definition should actually be the correct one? The present paper gives the related answer.
All the spaces considered are over $\\bbc$. $Z$ represents any Banach space, $L(Z)$ the space of all the bounded operators on $Z$, and $H$ any Hilbert space. We will prove that for any unital proper weakly closed subalgebra (upwcsa) $R\\subsetneq L(Z)$, the algebra $R^\\p=\\{A^* \\st A\\in R\\}$ has nontrivial invariant subspaces (ntinvss). This solves in \\lb particular, the three most famous long standing open problems in operator theory, (1) the transitive algebra problem, (2) the hyperinvariant subspace problem, and (3) the invariant subspace problem. The transitive algebra problem was raised by R. V. Kadison in 1955 and it asks if every upwcsa of $L(H)$ has ntinvss. This proves also a conjecture of P. Enflo, that every operator on a reflexive space has ntinvss and a conjecture of V. I. Lomonosov, that the adjoint of any Banach space operator has ntinvss.
The major part of this thesis deals with fuzzy geometric logic and fuzzy geometric logic with graded consequence. The first chapter mainly contains the concept of topological system introduced by S. Vickers in 1989. In Chapter 2 the notion of fuzzy topological system is introduced and categorical relationship with fuzzy topology and frame is discussed in detail. Also this chapter contains some methodology to make new fuzzy topological systems from the old one.Chapter 3 provides a generalization of fuzzy topological system which shall be called L topological system and categorical relationships with appropriate topological space and frame. Furthermore, two ways of constructing subspaces and subsystems of an L topological space and an L topological system are respectively provided.Chapter 4 deals with the concept of variable basis fuzzy topological space on fuzzy sets and contains a new notion of variable basis fuzzy topological systems whose underlying sets are fuzzy sets. In this chapter categorical relationship between space and system is established. Chapter 5 contains a different proof of one kind of generalized stone duality, which was done directly by Maruyama, introducing a notion of n fuzzy Boolean system. The last two chapters, Chapter 6 and Chapter 7 deal the ultimate objective. Chapter 6 deals with the question- From which logic fuzzy topology can be studied?. To answer this, the notion of fuzzy geometric logic is invented.
For integers x and k, let T(x;2k) denote the number of twin prime pairs (p,p+2k) with a distance 2k<=2x**0.5 and p<=x (not p+2k<=x). Let Tg(x;2x**0.5) denote the average of T(x;2k) for all 2k<=2x**0.5. Logically, T(x;2k) should be a function of Tg(x;2x**0.5). We first, propose a sliding model to estimate Tg(x;2x**0.5). Second, derive the relations between T(x;2k) and Tg(x;2x**0.5) from the sieve structure. Third, settle the errors caused by the dependence of primes.
From the Rhind Papyrus and other extant sources, we know that the ancient Egyptians were very iterested in expressing a given fraction into a sum of unit fractions, that is fractions whose numerators are equal to 1. One of the problems that has come down to us in the last 60 years, is known as the Erdos- Strauss conjecture which states that for each positive integer n>1; the fraction 4/n can be decomposed into a sum of three distinct unit fractions. Since 1950, a numberof partial results have been achieved, see references [1]- [8]; and also [10] and[11]. In this work we contribute four theorems. In Theorem 2, we prove that if the fraction 4/n is not equal to a sum of three distinct unit fractions, then each prime divisor of n; must be congruent to 1 modulo24. Moreover, if n contains a divisor noncongruent to 1mod24; then such a decomposition does exist and it is explicitly given.
A question is identified with a topology on a given set of irreducible assertions. It is shown that there are three types of a question. Type-I question generates sub-question, type-II question has a definite answer and type-III question is irrelevant. We suggest that the most intelligent machine asks type-II questions. We also claim that a truly intelligent machine cannot be desireless. This work may prove useful in machine learning and may open up new ways to understand mind.
In this paper, the definition of fuzzy rough relation on a set will be introduced and then it would be proved that the collection of such relations is closed under different binary compositions such as, algebraic sum, algebraic product etc. Also the definitions of reflexive, symmetric and transitive fuzzy rough relations on a set are given and a few properties of them will be investigated. Lastly, we define a operation, which is a composition of two fuzzy rough relations, with the help of maxmin relation and thereafter it is shown that the collection of such relations is closed under the operation.
In respect of the definition of intuitionistic fuzzy n-norm \\cite{Vijayabalaji}, the definition of generalised intuitionistic fuzzy $\\psi$ norm (, in short GIF$\\psi$N ,) is introduced over a linear space and there after a few results on generalized intuitionistic fuzzy $\\psi$ normed linear space and finite dimensional generalized intuitionistic fuzzy $\\psi$ normed linear space have been developed. Lastly, we have introduced the definitions of generalised intuitionistic fuzzy $\\psi$ continuity , sequentially intuitionistic fuzzy $\\psi$ continuity and it is proved that they are equivalent.
This paper introduces the concept of a generic finite set, and points out that a consistent and significant interpretation of the grossone notation of Yarolslav D. Sergeyev is that of a generic natural number. This means that the grossone is not itself a natural number, yet it can be treated as one and used in the generic expression of finite sets and finite formulas, giving a new power to algebra and algorithms that embody this usage. We further consider the concept of infinity in categories. An object A in a given category C is said to be infinite relative to that category if and only if there is a injection from A to A in C that is not a surjection. In the category of sets this recovers the usual notion of infinity. In other categories, an object may be non-infinite (whence finite) while its underlying set (if it has one) is infinite. The computational methodology due to Yarolslav D. Sergeyev for executing numerical calculations with infinities and infinitesimals is considered from this categorical point of view.
In this paper, we introduce notion of fuzzy soft number. Here defined fuzzy soft number and four arithmetric operations $ \\tilde{+}, \\tilde{-}, \\tilde{\\times}, \\tilde{\\div} $ and related properties. Also introduce Hausdorff distance, Fuzzy soft metric space, convergence sequence, Cauchy sequence, Continuity and uniform continuity of fuzzy soft numbers. At starting of this paper, we study convex and concave fuzzy soft sets and some of their properties.
We give formulas for the number of representations of non negative integers by various quadratic forms. We also give evaluations in the case of sum of two cubes (cubic case) and the quintic case, as well. We introduce a class of generalized triangular numbers and give several evaluations. Finally, we present a mean value asymptotic formula for the number of representations of an integer as sum of two squares known as the Gauss circle problem.
A Smarandache geometry is a geometry which has at least one Smarandachely denied axiom(1969), i.e., an axiom behaves in at least two different ways within the same space, i.e., validated and invalided, or only invalided but in multiple distinct ways and a Smarandache n-manifold is a n-manifold that support a Smarandache geometry. Iseri provided a construction for Smarandache 2-manifolds by equilateral triangular disks on a plane and a more general way for Smarandache 2-manifolds on surfaces, called map geometries was presented by the author in [9]-[10] and [12]. However, few observations for cases of n>=3 are found on the journals. As a kind of Smarandache geometries, a general way for constructing dimensional n pseudo-manifolds are presented for any integer n>=2 in this paper. Connection and principal fiber bundles are also defined on these manifolds. Following these constructions, nearly all existent geometries, such as those of Euclid geometry, Lobachevshy-Bolyai geometry, Riemann geometry, Weyl geometry, Kahler geometry and Finsler geometry, ...,etc., are their sub-geometries.
Nicolas  criterion for the Riemann Hypothesis (RH) is an inequality based on primorials and the Euler totient function. The aim of this paper is to reformulate Nicolas  criterion and prove the equivalent statement. I will show that the reformulation is bounded and montonic using Chebyshev s function and results on prime numbers. I will then show this equivalent statement does not contradict Cramer s conjecture, which arises naturally when one would prove a specific sequence related to that bound is strictly decreasing.
The paper presents a fresh new start on the neutrality of neutrosophy in that \"both A and Non-A\" as an alternative to describe Neuter-A in that we conceptualize things in both intentional and unintentional background. This unity of opposites constitutes both objective world and subjective world. The whole induction of such argument is based on the intensive study on Buddhism and Daoism including I-ching. In addition, a framework of contradiction oriented learning philosophy inspired from the Later Trigrams of King Wen in I-ching is meanwhile presented. It is shown that although A and Non-A are logically inconsistent, but they are philosophically consistent in the sense that Non-A can be the unintentionally instead of negation that leads to confusion. It is also shown that Buddhism and Daoism play an important role in neutrosophy, and should be extended in the way of neutrosophy to all sciences according to the original intention of neutrosophy.
This paper treats about one of the most remarkable achievements by Riemann, that is the symmetric form of the functional equation for {\\zeta}(s). We present here, after showing the first proof of Riemann, a new, simple and direct proof of the symmetric form of the functional equation for both the Eulerian Zeta function and the alternating Zeta function, connected with odd numbers. A proof that Euler himself could have arranged with a little step at the end of his paper \"Remarques sur un beau rapport entre les s\\ eries des puissances tant direct que r\\ eciproches\". This more general functional equation gives origin to a special function, here named {\\cyr \\E}(s), which we prove that it can be continued analytically to an entire function over the whole complex plane using techniques similar to those of the second proof of Riemann. Moreover we are able to obtain a connection between Jacobi s imaginary transformation and an infinite series identity of Ramanujan. Finally, after studying the analytical properties of the function {\\cyr \\E}(s), we complete and extend the proof of a Fundamental Theorem, both on the zeros of Riemann Zeta function and on the zeros of Dirichlet Beta function, using also the Euler-Boole summation formula.
In this paper, we presents a characterization of compact subsets of the fuzzy number space equipped with the level convergence topology. Based on this, it is shown that compactness is equivalent to sequential compactness on the fuzzy number space equipped with the level convergence topology. Diamond and Kloeden gave a characterization of compact sets in fuzzy number spaces equipped with the supremum metric, Fang and Xue also gave a characterization of compact sets in one-dimensional fuzzy number spaces equipped with supremum metric. The latter characterization is just the one-dimensional case of the former characterization. There exists conflict between the characterization given by us and the characterizations given by the above mentioned authors. We point out the characterizations gave by them is incorrect by a counterexample.
In this paper we present a method to deal with divergences in perturbation theory using the method of the Zeta regularization, first of all we use the Euler-Mc Laurin Sum formula to associate the divergent integral to a divergent sum in the form 1+2^{m}+3^{m}+... After that we find a recurrence formula for the integrals and apply zeta regularization techniques to obtain finite results for the divergent series. (Through all the paper we use the notation m, for the power of the modulus of p, so we must not confuse it with the value of the mass of the quantum particle) changes: added Bibliography about ramanujan Resummation and references of Zeta regularization in Hardy,s Book \"divergent series\".
In this article using the theory of Eisenstein series, we give rise to the complete evaluation of two Gauss hypergeometric functions. Moreover we evaluate the modulus of each of these functions and the values of the functions in terms of the complete elliptic integral of the first kind. As application we give way of how to evaluate the parameters, in a closed-well posed form, of a general Ramanujan type $1/\\pi$ formula. The result is a formula of 110 digits per term.
Although the categorical arithmetic is not effectively axiomatizable, the belief that the incompleteness Theorems can be apply to it is fairly common. Furthermore, the so-called \"essential\" (or \"inherent\") semantic incompleteness of the second-order Logic that can be deduced by these same Theorems does not imply the standard semantic incompleteness that can be derived using the Loewenheim-Skolem or the compactness Theorem. This state of affairs has its origins in an incorrect and misinterpreted Goedel s comment at the Koenigsberg congress of 1930 and has consolidated due to different circumstances. This paper aims to clear up these questions and proposes an alternative interpretation for the Goedel s statement.
The concept of weighted $\\beta\\gamma$ - summability of order $\\theta$ in case of fuzzy functions is introduced and classified into ordinary and absolute sense. Several inclusion relations among the sets are investigated. Also we have found some suitable conditions to get its relation with the generalized statistical convergence. Finally we have proved a generalized version of Tauberian theorem.
A manifold $M^n$ inherits a labeled $n$-dimensional graph $\\widetilde{M}[G^L]$ structure consisting of its charts. This structure enables one to characterize fundamental groups of manifolds, classify those of locally compact manifolds with finite non-homotopic loops by that of labeled graphs $G^L$. As a by-product, this approach also concludes that {\\it every homotopy $n$-sphere is homeomorphic to the sphere $S^n$ for an integer $n\\geq 1$}, particularly, the Perelman s result for $n=3$.
There are many fuzzy models like Fuzzy matrices, Fuzzy Cognitive Maps, Fuzzy relational Maps, Fuzzy Associative Memories, Bidirectional Associative memories and so on. But almost all these models can give only one sided solution like hidden pattern or a resultant output vector dependent on the input vector depending in the problem at hand. So for the first time we have defined a n-adaptive fuzzy model which can view or analyze the problem in n ways (n >=2) Though we have defined these n- adaptive fuzzy models theorectically we are not in a position to get a n-adaptive fuzzy model for n > 2 for practical real world problems. The highlight of this model is its capacity to analyze the same problem in different ways thereby arriving at various solutions that mirror multiple perspectives. We have used the 2-adaptive fuzzy model having the two fuzzy models, fuzzy matrices model and BAMs viz. model to analyze the views of public about HIV/ AIDS disease, patient and the awareness program. This book has five chapters and 6 appendices. The first chapter just recalls the definition of four fuzzy models used in this book and gives illustration of some of them. Chapter two introduces the new n-adaptive fuzzy models. Chapter three uses for the first time 2 adaptive fuzzy models to study psychological and sociological problems about HIV/AIDS. Chapter four gives an outline of the interviews. Chapter five gives the suggestions and conclusion based on our study. Of the 6 appendices four of them are C-program made to make the working of the fuzzy model simple.
A real function $f$ is ward continuous if $f$ preserves quasi-Cauchyness, i.e. $(f(x_{n}))$ is a quasi-Cauchy sequence whenever $(x_{n})$ is quasi-Cauchy; and a subset $E$ of $\\textbf{R}$ is quasi-Cauchy compact if any sequence $\\textbf{x}=(x_{n})$ of points in $E$ has a quasi-Cauchy subsequence where $\\textbf{R}$ is the set of real numbers. These known results suggest to us introducing a concept of upward (respectively, downward) half quasi-Cauchy continuity in the sense that a function $f$ is upward (respectively, downward) half quasi-Cauchy continuous if it preserves upward (respectively, downward) half quasi-Cauchy sequences, and a concept of upward (respectively, downward) half quasi-Cauchy compactness in the sense that a subset $E$ of $\\textbf{R}$ is upward (respectively, downward) half quasi-Cauchy compact if any sequence of points in $E$ has an upward (respectively, downward) half quasi-Cauchy subsequence. We investigate upward(respectively, downward) half quasi-Cauchy continuity and upward (respectively, downward) half quasi-Cauchy compactness, and prove related theorems.
In the present study, we derive the problem of constructing a hypersurface family from a given isogeodesic curve in the 4D Galilean space $\\mathbf{G}_{4}.$ We obtain the hypersurface as a linear combination of the Frenet frame in $\\mathbf{G}_{4}$ and examine the necessary and sufficient conditions for the curve as a geodesic curve$.$ Finally, some examples related to our method are given for the sake of clarity.
A \\textit{primitive hole} of a graph $G$ is a cycle of length $3$ in $G$. The number of primitive holes in a given graph $G$ is called the primitive hole number of that graph $G$. The primitive degree of a vertex $v$ of a given graph $G$ is the number of primitive holes incident on the vertex $v$. In this paper, we introduce the notion of set-graphs and study the properties and characteristics of set-graphs. We also check the primitive hole number and primitive degree of set-graphs. Interesting introductory results on the nature of order of set-graphs, degree of the vertices corresponding to subsets of equal cardinality, the number of largest complete subgraphs in a set-graph etc. are discussed in this study. A recursive formula to determine the primitive hole number of a set-graph is also derived in this paper.
In this paper, we first discussed multiplicative metric mapping by giving some topological properties of the relevant multiplicative metric space. As an interesting result of our discussions, we observed that the set of positive real numbers $\\mathbb{R}_+$ is a complete multiplicative metric space with respect to the multiplicative absolute value function. Furthermore, we introduced concept of multiplicative contraction mapping and proved some fixed point theorems of such mappings on complete multiplicative metric spaces
Every quasigroup $(L,\\cdot)$ belongs to a set of 6 quasigroups, called parastrophes denoted by $(L,\\pi_i)$, $i\\in \\{1,2,3,4,5,6\\}$. It is shown that $(L,\\pi_i)$ is a Smarandache quasigroup with associative subquasigroup $(S,\\pi_i) \\forall i\\in \\{1,2,3,4,5,6\\}$ if and only if for any of some four $j\\in \\{1,2,3,4,5,6\\}$, $(S,\\pi_j)$ is an isotope of $(S,\\pi_i)$ or $(S,\\pi_k)$ for one $k\\in \\{1,2,3,4,5,6\\}$ such that $i\\ne j\\ne k$. Hence, $(L,\\pi_i)$ is a Smarandache quasigroup with associative subquasigroup $(S,\\pi_i) \\forall i\\in \\{1,2,3,4,5,6\\}$ if and only if any of the six Khalil conditions is true for any of some four of $(S,\\pi_i)$.
The prime detecting function (PDF) approach can be effective instrument in the investigation of numbers. The PDF is constructed by recurrence sequence - each successive prime adds a sieving factor in the form of PDF. With built-in prime sieving features and properties such as simplicity, integro-differentiability and configurable capability for a wide variety of problems, the application of PDF leads to new interesting results. As an example, in this exposition we present proofs of the infinitude of twin primes and the first Hardy-Littlewood conjecture for prime pairs (the twin prime number theorem). On this example one can see that application of PDF is especially effective in investigation of asymptotic problems in combination with the proposed method of test and probe functions.
It is shown that the pillars of transfinite set theory, namely the uncountability proofs, do not hold. (1) Cantor s first proof of the uncountability of the set of all real numbers does not apply to the set of irrational numbers alone, and, therefore, as it stands, supplies no distinction between the uncountable set of irrational numbers and the countable set of rational numbers. (2) As Cantor s second uncount-ability proof, his famous second diagonalization method, is an impossibility proof, a simple counter-example suffices to prove its failure. (3) The contradiction of any bijection between a set and its power set is a consequence of the impredicative definition involved. (4) In an appendix it is shown, by a less important proof of Cantor, how transfinite set theory can veil simple structures.
In this paper I introduce a model which allows one to prove Goldbachs hypothesis. The model is produced by studying Goldbach partitions as displayed by an inverted mirror image of all the primes up to some even number equal to the last prime plus three. The bottom half of the model is then moved to the right in steps of two which exhibit the Goldbach partitions for the next even number. As long as the model contains all the primes up to the resulting even number minus three, then Goldbachs hypothesis can be proven if it can be shown that each move must produce a Goldbach partition until one reaches the next prime plus one. I show that this must be the case.
Conjecture: The quadratic Diophantine equation system $q^2 = a^2\\alpha-b^2\\beta-c^2\\gamma,$ $pq = (ad)^2\\alpha-(be)^2\\beta-(cf)^2\\gamma,$ $p^2 = (ad^2)^2\\alpha-(be^2)^2\\beta-(cf^2)^2\\gamma,$ has no nontrivial integer solution for $d\\neq e\\neq f\\neq 0$, if there is $\\alpha=\\beta=\\gamma=1$, or $|\\alpha|\\neq|\\beta|\\neq|\\gamma|\\neq 0$ with $\\alpha|a,\\;\\beta|b,\\;\\gamma|c\\;$ and $|\\alpha|\\neq a,\\;|\\beta|\\neq b,\\;|\\gamma|\\neq c$. Fermat s Last Theorem states that the Diophantine equation $x^n+y^n=z^n$ has no nontrivial integer solution (x,y,z) for all n>2. A proof was published in 1995 by Andrew Wiles. It is shown that a proof of the above conjecture proves Fermat s Last Theorem for all n>5.
It is a generalization of Pell s equation $x^2-Dy^2=0$. Here, we show that: if our Diophantine equation has a particular integer solution and $ab$ is not a perfect square, then the equation has an infinite number of solutions; in this case we find a close expression for $(x_n,y_n)$, the general positive integer solution, by an original method. More, we generalize it for any Diophantine equation of second degree and with two unknowns $f(x,y)=0$.
We show that main results of rational trigonometry (as developed by NJ Wildberger, \"Divine Proportions\", 2005) can be succinctly expressed using projective (aka homogeneous) geometric algebra (PGA). In fact, the PGA representation exhibits distinct advantages over the original vector-based approach. These include the advantages intrinsic to geometric algebra: it is coordinate-free, treats lines and points in a unified framework, and handles many special cases in a uniform and seamless fashion. It also reveals structural patterns not visible in the original formulation, for example, the exact duality of spread and quadrance. The current article handles only a representative (euclidean) subset of the full content of Wildberger s work, but enough to establish the value of this approach for further development. The metric-neutral framework of PGA makes it especially promising also to handle universal geometry, which extends rational trigonometry to the hyperbolic plane.
This book introduces several new classes of groupoid, like polynomial groupoids, matrix groupoids, interval groupoids,polynomial interval groupoids, matrix interval groupoids and their neutrosophic analogues. Interval groupoid happens to be the first non-associative structure constructed using intervals built using Zn or Z or Q or R or Z+ \\cup {0} or Q+ \\cup {0} and so on. This book has five chapters. Chapter one is introductory in nature. In chapter two new classes of groupoids and interval groupoids are defined and described. The analogous neutrosophic study is carried out in chapter three. The applications of this new structure is given in chapter four. The final chapter suggests more than 200 problems. This book has given 77 new definitions, 426 examples of these new notions and over 150 theorems.
The objective of this paper is to present an approximation formula for the Katugampola fractional integral, that allows us to solve fractional problems with dependence on this type of fractional operator. The formula only depends on first-order derivatives, and thus we convert the fractional problem into a standard one. With some examples we show the accuracy of the method, and then we present the utility of the method by solving a fractional integral equation.
We prove that for given integers b and c, the diophantine equation x^2+bx+c=y^2, has finitely many integer solutions(i.e. pairs in ZxZ),in fact an even number of such solutions(including the zero or no solutions case).We also offer an explicit description of the solution set. Such a description depends on the form of the integer b^2-4c. Some Corollaries do follow. Furthermore, we show that the said equation has exactly two integer solutions, precisely when b^2-4c= 1,4,16,-4,or-16. In each case we list the two solutions in terms of the coefficients b and c.
Let ABC be a triangle with a,b,and c being its three sidelengths. In a 1976 article by Wynne William Wilson in the Mathematical Gazette(see reference[2]), the author showed that angleB is twice angleA, if and only if b^2=a(a+c). We offer our own proof of this result in Proposition1.Using Proposition1 and Lemma2, we establish Proposition 2: Let a,b,c be positive reals. Then a triangle ABC having a,b,c as its sidelengths can be formed if,and onlyif, b^2=a(a+c) and either c<(or equal to)a; or alternatively a<c<3a. Now, consider the case of integral triangles, that is; a,b, and c bieng positive integers.In 2002, in a paper published in the Mathematical Gazette(see[2]), author M.N.Deshpande provided two-parameter formulas that describe some integral triangles with (angle)B=2(angle)A. In Result2 in Section5, we offer 3-parameter formulas that describe the entire family of integral triangles ABC with angleA=2angleB. Using Result1, we then parametrically describe the entire family of integral triangles with angle A=2angleB; and with the bisector of angleB also of integral length. This is done in Reult2 in Section6. In Section7, we conclude this article with two closing remarks.
We prove among other things that the omega-limit set of a bounded solution of a Hamilton system \\[\\left\\{\\begin{aligned} & \\mathbf{\\dot{p}}=\\frac{\\partial H}{\\partial \\mathbf{q}} & \\mathbf{\\dot{q}}=-\\frac{\\partial H}{\\partial \\mathbf{p}} \\\\ \\end{aligned} \\right.\\] is containing a full-time solution so there are the limits of $\\frac 1t\\int_0^t {\\mathbf p}(s)ds$ and $\\frac 1t\\int_0^t {\\mathbf q}(s)ds$ as $t\\to\\infty$ for any bounded solution $(\\mathbf {p,q})$ of the Hamilton system. These limits are stationary points of the Hamilton system so if a Hamilton system has no stationary point then every solution of this system is unbounded.
Recently uncovered second derivative discontinuous solutions of the simplest linear ordinary differential equation define not only an nonstandard extension of the framework of the ordinary calculus, but also provide a dynamical representation of the ordinary real number system. Every real number can be visualized as a living cell -like structure, endowed with a definite evolutionary arrow. We discuss the relevance of this extended calculus in the study of living systems. We also present an intelligent version of the Newton s first law of motion.
In a recent paper, the authors have proved that for lattices A and B with zero, the isomorphism $Conc(A \\otimes B)\\cong Conc A \\otimes Conc B$, holds, provided that the tensor product satis&#64257;es a very natural condition (of being capped) implying that $A\\otimes B$ is a lattice. In general, $A \\otimes B$ is not a lattice; for instance, we proved that $M\\_3\\otimes F(3)$ is not a lattice. In this paper, we introduce a new lattice construction, the box product for arbitrary lattices. The tensor product construction for complete lattices introduced by G. N. Raney in 1960 and by R. Wille in 1985 and the tensor product construction of A. Fraser in 1978 for semilattices bear some formal resemblance to the new construction. For lattices A and B, while their tensor product $A\\otimes B$ (as semilattices) is not always a lattice, the box product, $A \\bp B$, is always a lattice. Furthermore, the box product and some of its ideals behave like an improved tensor product. For example, if A and B are lattices with unit, then the isomorphism $Conc(A $\\bp$ B) \\cong Conc A \\otimes Conc B$ holds. There are analogous results for lattices A and B with zero and for a bounded lattice A and an arbitrary lattice B. A join-semilattice S with zero is called {0}-representable, if there exists a lattice L with zero such that $Conc L \\cong S$. The above isomorphism results yield the following consequence: The tensor product of two {0}-representable semilattices is {0}-representable.
An algebraic structure underlying the quantity calculus is proposed consisting in an algebraic fiber bundle, that is, a base structure which is a free Abelian group together with fibers which are one dimensional vector spaces, all of them bound by algebraic restrictions. Subspaces, tensor product and quotient spaces are considered as well as homomorphisms to end with a classification theorem of these structures. The new structure provides an axiomatic foundation for quantity calculus and gives complete justification within its framework of the way that quantity calculus is actually performed. It is hoped that this exposition helps to clarify the role of the interviening concepts of quantity, quantity value, quantity dimension and their relation with a system of units, particularly, the SI.
In this paper, at first two new functions are given then three new functions are developed based on the first two functions. Using these functions accompanied by a novel method, we make a conjecture to prove \"every even integer greater than 2 can be represented by the sum of two prime numbers\".In order to make the proof, firstly a simple function as $h(n)=n-\\Sigma_{j=0}^{k-1}(r_{1}^{j})^2+f(k)$ is made for each even integer $n$ and is then extended as function $\\hat{h}(n)=n-\\Sigma_{j=0}^{k-1}\\prod_{i=1}^{i=m}(r_{i}^{j})^{x_{i}}+f(k)$ where $h(n)$ and $\\hat{h}(n)$ denote evens whichever are equal to the sum of two primes. After this extending, it is proved that $\\hat{h}(n)$ is a surjective and one to one function onto $2\\Bbb N-\\{2\\}$,and is finally concluded where $\\hat{h}(n)$ is an identity function from $n$ to $n$.Hence every even integer $>2$ as $n$ will be the sum of two primes.During the proof, we prove an explicit formula for computing the number of primes in a certain interval by the Riemann Zeta Function. We then define a special sum on $\\pi(n)$ where is called $sum(n)=n-2\\phi(n)-2D(n)+2+2\\pi(n)$.Using $sum(n)$,the number of the primes are obtained by the new functions,$K(n,m)$,$L(n)$,and $M(n,m)$ on the primes.The functions $\\hat{h}(n),sum(n),L(n),M(n,m)$ and $K(n,m)$ are called \"Sabihi s functions\". Here is also created a novel conjecture (Sabihi s conjecture) by the functions $K(N(k),m)$ and $L(N(k))$. If Sabihi s conjecture is true, then Goldbach s conjecture would also be true.
Ranking of intuitionsitic fuzzy number plays a vital role in decision making and other intuitionistic fuzzy applications. In this paper, we propose a new ranking method of intuitionistic fuzzy number based on distance measure. We first define a distance measure for interval numbers based on Lp metric and further generalize the idea for intuitionistic fuzzy number by forming interval with their respective value and ambiguity indices. Finally, some comparative results are given in tabular form.
This article critically reappraises arguments in support of Cantor s theory of transfinite numbers. The following results are reported: i) Cantor s proofs of nondenumerability are refuted by analyzing the logical inconsistencies in implementation of the reductio method of proof and by identifying errors. Particular attention is given to the diagonalization argument and to the interpretation of the axiom of infinity. ii) Three constructive proofs have been designed that support the denumerability of the power set of the natural numbers, P(N), thus implying the denumerability of the set of the real numbers R. These results lead to a Theorem of the Continuum that supersedes Cantor s Continuum Hypothesis and establishes the countable nature of the real number line, suggesting that all infinite sets are denumerable. Some immediate implications of denumerability are discussed: i) Valid proofs should not include inconceivable statements, defined as statements that can be found to be false and always lead to contradiction. This is formalized in a Principle of Conceivable Proof. ii) Substantial simplification of the axiomatic principles of set theory can be achieved by excluding transfinite numbers. To facilitate the comparison of sets, infinite as well as finite, the concept of relative cardinality is introduced. iii) Proofs of incompleteness that use diagonal arguments (e.g. those used in Godel s Theorems) are refuted. A constructive proof, based on the denumerability of P(N), is presented to demonstrate the existence of a theory of first-order arithmetic that is consistent, sound, negation-complete, decidable and (assumed p.r. adequate) able to prove its own consistency. Such a result reinstates Hilbert s Programme and brings arithmetic completeness to the forefront of mathematics.
1. This paper shows how the universals of category theory in mathematics provide a model (in the Platonic Heaven of mathematics) for the self-predicative strand of Plato s Theory of Forms as well as for the idea of a \"concrete universal\" in Hegel and similar ideas of paradigmatic exemplars in ordinary thought. 2. The paper also shows how the always-self-predicative universals of category theory provide the \"opposite bookend\" to the never-self-predicative universals of iterative set theory and thus that the paradoxes arose from having one theory (e.g., Frege s Paradise) where universals could be either self-predicative or non-self-predicative (instead of being always one or the other). 3. Moreover the paper considers one of the most important examples of self-predicative universals in pure mathematics, namely adjoint functors or adjunctions. It gives a parsing of adjunctions into two halves (left and right semi-adjunctions) using the heterodox notion of heteromorphisms, and then shows that the parts can be recombined in a new way to define the cognate-to-adjoints notion of a brain functor that provides an abstract conceptual model of a brain. 4. Finally the paper argues that at least one way category theory has foundational relevance is that it isolates the universal concepts and structures that are important throughout mathematics.
It is known that a graph isomorphism testing algorithm is polynomially equivalent to a detecting of a graph non-trivial automorphism algorithm. The polynomiality of the latter algorithm, is obtained by consideration of symmetry properties of regular $k$-partitions that, on one hand, generalize automorphic $k$-partitions (=systems of $k$-orbits of permutation groups), and, on other hand, schemes of relations (strongly regular 2-partitions or regular 3-partitions), that are a subject of the algebraic combinatorics. It is shown that the stabilization of a graph by quadrangles detects the triviality of the graph automorphism group. The result is obtained by lineariation of the algebraic combinatorics. Keywords: $k$-partitions, symmetry, algebraic combinatorics
A method to obtain all possible graceful spanning trees in a complete graph is proposed. An algorithm to generate all the labeled spanning trees in a complete graph is developed and modified to generate all graceful spanning trees. The count of all possible graceful graphs in a complete graph is obtained. An upper bound on the count of gracefully labeled trees in a complete graph is obtained. We settle Graceful Tree Conjecture in the affirmative in two ways: 1) We show that all trees can be gracefully labeled by assigning the lowest label 1 to the so called special vertices of trees, i.e. prependant vertices or pendant vertices adjacent to prependant vertices. 2) We establish the existence of graceful labeling for all trees by associating distinct lattice paths with trees and by showing the existence of a lattice path for a tree of each isomorphism type by showing how to construct a lattice path recursively by starting from the lattice path for its pendant vertex deleted subtree, which is assumed to exists by induction, and carrying out appropriate modification of this lattice path. 3) We propose a crisp algorithm to gracefully label tree of every isomorphism type with the help of novel representation for any tree in terms of juxtaposition of paths. Lastly, we discuss an algorithm to find arbitrarily degree constrained graceful spanning tree and propose some problems for further investigation.
Additive relations are defined over additive monoids and additive operation is introduced over these new relations then we build algebraic system of equations. We can generate profuse equations by additive relations of two variables. To give an equation with several known parameters is to give an additive relation taking these known parameters as its variables or value and the solution of the equation is just the reverse of this relation which always exists. We show a core result in this paper that any additive relation of many variables and their inverse can be expressed in the form of the superposition of additive relations of one variable in an algebraic system of equations if the system satisfies some conditions. This result means that there is always a formula solution expressed in the superposition of additive relations of one variable for any equation in this system. We get algebraic equations if elements of the additive monoid are numbers and get operator equations if they are functions.
In this work we investigate Plancherel-Rotach type asymptotics for some $q$-series as $q\\to1$. These $q$-series generalize Ramanujan function $A_{q}(z)$ ($q$-Airy function), Jackson s $q$-Bessel function $J_{\\nu}^{(2)}$(z;q), Ismail-Masson orthogonal polynomials($q^{-1}$-Hermite polynomials) $h_{n}(x|q)$, Stieltjes-Wigert orthogonal polynomials $S_{n}(x;q)$, $q$-Laguerre orthogonal polynomials $L_{n}^{(\\alpha)}(x;q)$ and confluent basic hypergeometric series.
Let $\\varphi(x, u, s)$ denote the Lerch zeta-function defined for $\\text{Re}(s) > 1$ and $x, u \\in (0, 1)$ by the series $\\varphi(x, u, s) := \\sum_{n \\geq 0}\\exp[2 \\pi i n x](n + u)^{-s}$, and let $\\varphi^{*}(x, u, s) := \\varphi(x, u, s) - u^{-s}$. Furthermore, let $[a, b]$ denote the straight line in the complex plane from the point $a$ to $b$ and $\\gamma$ be any real number in $(0, \\pi)$. In this paper, we investigate integrals of the form $\\int_{[e^{i \\gamma}, 0] + [0, 1]} \\varphi^{*}(x, u, 1/2 + \\beta - it) u^{-1 + \\epsilon} du$, where $\\beta \\in (0, 1/2)$, $\\epsilon > 0$, and $a_{1}, x \\in (0, 1)$.
In this paper we present a set transformation of points in a line of the Desargues affine plane in a additive group. For this, the first stop on the meaning of the Desargues affine plane, formulating first axiom of his that show proposition D1. Afterwards we show that little Pappus theorem, which we use in the construction of group proofs in additions of points on a line on desargues plane, also applies in the Desargues affine plane.
In this paper we discuss reconstruction problems for graphs. We develop some new ideas like isomorphic extension of isomorphic graphs, partitioning of vertex sets into sets of equivalent points, subdeck property, etc. and develop an approach to deal with reconstruction problem. We then discuss complete sets of invariants for graphs and reconstruction conjecture. We then begin with development of few equivalent formulations of reconstruction conjecture. In the last section we briefly elaborate the formulation due to Harary its exact demand and finally proceed to give a different proof of reconstruction conjecture using reconstructibility of graph from its spanning trees and reconstructibility of tree from its pendant point deleted deck of subtrees. This last proof can be used to develop a systematic procedure to reconstruct unique graph from its deck.
I propose two simple ways of generating the partitions of (n+1) from the partitions of n. A recurrence relation for P(n+1), the number of partitions of (n+1), in terms of P(n) and Q(n), where Q(n) denotes the number of partitions of n having strictly different last two parts is obtained. Also a generating function for Q(n) is given. The other method for generating the partitions of (n+1) from the partitions of n is discussed at the end.
Objective of this paper is to introduce a new type of calculus which will be called G-Calculus based on non-Newtonian calculus introduced by Grossman and Katz \\cite{GrossmanKatz}. The basic difference between geometric calculus defined by Grossman and Katz and the present G-calculus is that Grossman took the values of the argument as $x, x+ h, x+2h,...$ but here in G-calculus we take the values as $x, x\\oplus h, x\\oplus e^2\\odot h, x\\oplus e^3\\odot h....$ This calculus will have great deal with numerical analysis which are discussed in the last section of this paper.
The problem of the least prime number in an arithmetic progression is one of the most important topics in Number Theory. In [11], we are the first to study the relations between this problem and Goldbach s conjecture. In this paper, we further consider its applications to Goldbach s conjecture and refine the result in [11]. Moreover, we also try to generalize the problem of the least prime number in an arithmetic progression and give an analogy of Goldbach s conjecture.
In 1918 S. Ramanujan defined a family of trigonometric sum now known as Ramanujan sums. In the last few years, Ramanujan sums have inspired the signal processing community. In this paper, we have defined an operator termed here as Ramanujan operator. In this paper it has been proved that these operator possesses properties of first derivative and second derivative with a particular shift. Generalised multiplicative property and new method of computing Ramanujan sums are also derived in terms of interpolation.
Nonstandard analysis and electromagnetic propagation properties are used to derive all of the fundamental results for the Special Theory of Relativity. Infinitesimal modeling via infinitesimal light-clocks is used to derive two general line-elements (metrics) without the use of Riemannian geometry. By substituting potential velocities, the Schwarzschild, quasi and modified Schwarzschild, de Sitter, Robertson-Walker and similar line-elements are derived. New black hole and quasi-white hole investigations are presented. A new fixed method using separating operators is used to obtain the major predictions for the relativistic alterations in natural-system behavior. The major conclusion is that all such changes are related to electromagnetic properties and that Riemannian geometry is but an analogue model for natural-system behavior.
In 1891 Cantor presented two proofs with the purpose to establish a general theorem that any set can be replaced by a set of greater power. Cantor s power set theorem can be considered to be an extension of Cantor s 1891 second proof and its argument makes use of a well-known self-referring statement. In this article it is shown that, defining the relative complement of the self-referring statement, Cantor s power set theorem cannot be derived. Moreover, it is given a refutation of the first proof, the so-called Cantor s diagonal argument.
In general, the tensor product, $A\\otimes B$, of the lattices A and B with zero is not a lattice (it is only a join-semilattice with zero). If $A \\otimes B$ is a capped tensor product, then $A \\otimes B$ is a lattice (the converse is not known). In this paper, we investigate lattices A with zero enjoying the property that $A \\otimes B$ is a capped tensor product, for every lattice B with zero; we shall call such lattices amenable. The &#64257;rst author introduced in 1966 the concept of a sharply transferable lattice. In 1972, H. Gaskill [5] de&#64257;ned, similarly, sharply transferable semilattices, and characterized them by a very e&#64256;ective condition (T). We prove that a &#64257;nite lattice A is amenable iff it is sharply transferable as a join-semilattice. For a general lattice A with zero, we obtain the result: A is amenable iff A is locally &#64257;nite and every &#64257;nite sublattice of A is transferable as a join-semilattice. This yields, for example, that a &#64257;nite lattice A is amenable iff $A\\otimes F(3)$ is a lattice iff A satis&#64257;es (T), with respect to $\\jj$. In particular, $M3 \\otimes F(3)$ is not a lattice. This solves a problem raised by R. W. Quackenbush in 1985 whether the tensor product of lattices with zero is always a lattice.
Rough set theory is an important mathematical tool for dealing with uncertain or vague information. This paper studies some new topologies induced by a binary relation on universe with respect to neighborhood opera- tors. Moreover, the relations among them are studied. In additionally, lower and upper approximations of rough sets using the binary relation with respect to neighborhood operators are studied and examples are given.
Classical interpretations of Goedel s formal reasoning imply that the truth of some arithmetical propositions of any formal mathematical language, under any interpretation, is essentially unverifiable. However, a language of general, scientific, discourse cannot allow its mathematical propositions to be interpreted ambiguously. Such a language must, therefore, define mathematical truth verifiably. We consider a constructive interpretation of classical, Tarskian, truth, and of Goedel s reasoning, under which any formal system of Peano Arithmetic is verifiably complete. We show how some paradoxical concepts of Quantum mechanics can be expressed, and interpreted, naturally under a constructive definition of mathematical truth.
Following the definition of intuitionistic fuzzy n-norm [ 3 ], we have introduced the definition of intuitionistic fuzzy norm (in short IFN) over a linear space and there after a few results on intuitionistic fuzzy normed linear space and finite dimensional intuitionistic fuzzy normed linear space. Lastly, we have introduced the definitions of intuitionistic fuzzy continuity and sequentially intuitionistic fuzzy continuity and proved that they are equivalen
In this article, we study coupled fixed point theorems in newly appeared JS-metric spaces. It is important to note that the class of JS-metric spaces includes standard metric space, dislocated metric space, b-metric space etc. The purpose of this paper is to present several coupled fixed point results in a more general way. Moreover, the techniques used in our proofs are indeed different from the comparable existing literature. Finally, we present a non- trivial example to validate our main result.
We study generalised prime systems $\\mathcal{P}$ $(1<p_1\\leq p_2\\leq...,$ with $p_j\\in\\R$ tending to infinity) and the associated Beurling zeta function $\\zeta_{\\mathcal{P}}(s) =\\prod_{j=1}^{\\infty} (1-p_j^{-s})^{-1}$. Under appropriate assumptions, we establish various analytic properties of $\\zeta_{\\mathcal{P}}(s)$, including its analytic continuation and we characterise the existence of a suitable generalised functional equation. In particular, we examine the relationship between a counterpart of the Prime Number Theorem (with error term) and the properties of the analytic continuation of $\\zeta_{\\mathcal{P}}(s)$. Further we study `well-behaved  g-prime systems, namely, systems for which both the prime and integer counting function are asymptotically well-behaved. Finally, we show that there exists a natural correspondence between generalised prime systems and suitable orders on $\\N^2$. Some of the above results may be relevant to the second author s theory of `fractal membranes , whose spectral partition functions are precisely given by Beurling zeta functions.
We focus on the generating series for the rational special values of Pellarin s $L$-series in $1 \\leq s \\leq 2(q-1)$ indeterminates, and using interpolation polynomials we prove a closed form formula relating this generating series to the Carlitz exponential, the Anderson-Thakur function, and the Anderson generating functions for the Carlitz module. We draw several corollaries, including explicit formulae and recursive relations for Pellarin s $L$-series in the same range of $s$, and divisibility results on the numerators of the Bernoulli-Carlitz numbers by monic irreducibles of degrees one and two.
In 2007, Jarden and Narkiewicz raised the following question: Is it true that each algebraic number field has a finite extension L such that the ring of integers of L is generated by its units (as a ring)? In this article, we answer the analogous question in the function field case. More precisely, it is shown that for every finite non-empty set S of places of an algebraic function field F | K over a perfect field K, there exists a finite extension F  | F, such that the integral closure of the ring of S-integers of F in F  is generated by its units (as a ring).
For g,n coprime integers, let l_g(n) denote the multiplicative order of g modulo n. Motivated by a conjecture of Arnold, we study the average of l_g(n) as n <= x ranges over integers coprime to g, and x tending to infinity. Assuming the Generalized Riemann Hypothesis, we show that this average is essentially as large as the average of the Carmichael lambda function. We also determine the asymptotics of the average of l_g(p) as p <= x ranges over primes.
We extend the list of Picard curves of CM-type given by Koike and Weng. In particular, our list includes defining equations for the complete list of Picard curves of CM-type defined over $\\mathbb{Q}$ up to isomorphism. To this end, we improve their algorithm in some aspects: one needs to precise a root of unity in an accurate application of a Thomae-like formula well-suited for the Picard case, and also use an optimized strategy to evaluate the Riemann theta-series involved.
Let $C$ be a smooth projective curve of genus $g \\ge 1$ over a finite field $\\F$ of cardinality $q$. In this paper, we first study $\\#\\J_C$, the size of the Jacobian of $C$ over $\\F$ in case that $\\F(C)/\\F(X)$ is a geometric Galois extension. This improves results of Shparlinski \\cite{shp}. Then we study fluctuations of the quantity $\\log \\#\\J_C-g \\log q$ as the curve $C$ varies over a large family of hyperelliptic curves of genus $g$. For fixed genus and growing $q$, Katz and Sarnak showed that $\\sqrt{q}\\left(\\log \\# \\J_C-g \\log q\\right)$ is distributed as the trace of a random $2g \\times 2g$ unitary symplectic matrix. When the finite field is fixed and the genus grows, we find the limiting distribution of $\\log \\#\\J_C-g \\log q$ in terms of the characteristic function. When both the genus and the finite field grow, we find that $\\sqrt{q}\\left(\\log \\# \\J_C-g \\log q\\right)$ has a standard Gaussian distribution.
We consider the analogue of the Andr\\ e-Oort conjecture for Drinfeld modular varieties which was formulated by Breuer. We prove this analogue for special points with separable reflex field over the base field by adapting methods which were used by Klingler and Yafaev to prove the Andr\\ e-Oort conjecture under the generalized Riemann hypothesis in the classical case. Our result extends results of Breuer showing the correctness of the analogue for special points lying in a curve and for special points having a certain behaviour at a fixed set of primes.
We study a variant of Waring s problem for $\\mathbb{Z}_n$, the ring of integers modulo $n$: For a fixed integer $k \\geq 2$, what is the minimum number $m$ of $k$th powers necessary such that $x \\equiv x_1^k + \\dots + x_m^k \\pmod{n}$ has a solution for every $x \\in \\mathbb{Z}_n$? Using only elementary methods, we answer fully this question for exponents $k \\leq 10$, and we further discuss some intermediary cases such as categorizing the values of $n$ such that every element in $\\mathbb{Z}_n$ can be written as a sum of three squares. Hensel s Theorem for $p$-adic integers plays a key role. Finally, we give an application of this problem to the Erd\\H os-Falconer distance problem for rings $\\mathbb{Z}_n^d$.
A major difficult problem in Galois theory is the characterization of profinite groups which are realizable as absolute Galois groups of fields. Recently the Kernel $n$-Unipotent Conjecture and the Vanishing $n$-Massey Conjecture for $n\\geq 3$ were formulated. These conjectures evolved in the last forty years as a byproduct of the application of topological methods to Galois cohomology. We show that both of these conjectures are true for odd rigid fields. This is the first case of a significant family of fields where both of the conjectures are verified besides fields whose Galois groups of $p$-maximal extensions are free pro-$p$-groups. We also prove the Kernel Unipotent Conjecture for Demushkin groups of rank 2, and establish a number of further related results.
This paper studies the interplay between probability, number theory, and geometry in the context of relatively prime integers in the ring of integers of a number field. In particular, probabilistic ideas are coupled together with integer lattices and the theory of zeta functions over number fields in order to show that $$P(\\gcd(z_{1},z_{2})=1) = \\frac{1}{\\zeta_{\\Q(i)}(2)}$$ where $z_{1},z_{2} \\in \\mathbb{Z}[i]$ are randomly chosen and $\\zeta_{\\Q(i)}(s)$ is the Dedekind zeta function over the Gaussian integers. Our proof outlines a lattice-theoretic approach to proving the generalization of this theorem to arbitrary number fields that are principal ideal domains.
We show that reciprocity laws for generalized Dedekind sums can be deduced from a concrete realization of the bounded Euler class for lattices in $\\mathrm{SL}_2(\\mathbb{R})$. Asai observed that the reciprocity law for Dedekind sums follows from a certain \"splitting\" of the central extension $$ 0 \\to \\mathbb{Z} \\to \\widetilde{\\mathrm{SL}(2,\\mathbb{R})} \\to \\mathrm{SL}(2,\\mathbb{Z}) \\to 1. $$ We develop and extend this point of view. First, to highlight that the splitting is provided by the explicit construction of a bounded representative of the Euler class. Then, to deduce the reciprocity of Dedekind symbols, which are natural generalizations of the Dedekind sums for lattices in $\\mathrm{SL}_2(\\mathbb{R})$. In doing so, we demonstrate that the reciprocity of Dedekind sums goes well beyond any arithmetical aspect of the associated group. As an application of our results, we prove combinatorial formulas for the Dedekind symbol for Hecke triangle groups.
We study the problem of minimizing the supremum norm by monic polynomials with integer coefficients. Let ${\\M}_n({\\Z})$ denote the monic polynomials of degree $n$ with integer coefficients. A {\\it monic integer Chebyshev polynomial} $M_n \\in {\\M}_n({\\Z})$ satisfies $$ \\| M_n \\|_{E} = \\inf_{P_n \\in{\\M}_n ({\\Z})} \\| P_n \\|_{E}. $$ and the {\\it monic integer Chebyshev constant} is then defined by $$ t_M(E) := \\lim_{n \\rightarrow \\infty} \\| M_n \\|_{E}^{1/n}. $$ This is the obvious analogue of the more usual {\\it integer Chebyshev constant} that has been much studied. We compute $t_M(E)$ for various sets including all finite sets of rationals and make the following conjecture, which we prove in many cases. \\medskip\\noindent {\\bf Conjecture.} {\\it Suppose $[{a_2}/{b_2},{a_1}/{b_1}]$ is an interval whose endpoints are consecutive Farey fractions. This is characterized by $a_1b_2-a_2b_1=1.$ Then} $$t_M[{a_2}/{b_2},{a_1}/{b_1}] = \\max(1/b_1,1/b_2).$$ This should be contrasted with the non-monic integer Chebyshev constant case where the only intervals where the constant is exactly computed are intervals of length 4 or greater.
We prove that in the backward orbit of a non-preperiodic point under the action of a Drinfeld module of generic characteristic there exist at most finitely many points S-integral with respect to another nonpreperiodic point. This provides the answer (in positive characteristic) to a question raised by Sookdeo. We also prove that for each nontorsion point z, there exist at most finitely many torsion points which are S-integral with respect to z. This proves a question raised by Tucker and the author, and it gives the analogue of Ih s conjecture for Drinfeld modules.
In 1984, G. Robin proved that the Riemann hypothesis is true if and only if the Robin inequality $\\sigma(n)<e^\\gamma n\\log\\log n$ holds for every integer $n>5040$, where $\\sigma(n)$ is the sum of divisors function, and $\\gamma$ is the Euler-Mascheroni constant. We exhibit a broad class of subsets $\\cS$ of the natural numbers such that the Robin inequality holds for all but finitely many $n\\in\\cS$. As a special case, we determine the finitely many numbers of the form $n=a^2+b^2$ that do not satisfy the Robin inequality. In fact, we prove our assertions with the Nicolas inequality $n/\\phi(n)<e^{\\gamma}\\log \\log n$; since $\\sigma(n)/n<n/\\phi(n)$ for $n>1$ our results for the Robin inequality follow at once.
Let ${\\mathbb K}={\\mathbb Q}(\\sqrt{m})$ be a real quadratic number field, where $m>1$ is a squarefree integer. Suppose that $0 < \\theta< \\pi $ has rational cosine, say $\\cos (\\theta)=s/r$ with $0< |s|<r$ and $\\gcd(r,s)=1$. A positive integer $n$ is called a $(\\mathbb K,\\theta)$-congruent number if there is a triangle, called the $(\\mathbb K,\\theta, n)$-triangles, with sides in $\\mathbb K$ having $\\theta$ as an angle and $n\\alpha_\\theta$ as area, where ${\\alpha_\\theta}=\\sqrt{r^2-s^2}$. Consider the $(\\mathbb K,\\theta)$-congruent number elliptic curve $E_{n,\\theta}: y^2=x(x+(r+s)n)(x-(r-s)n)$ defined over $\\mathbb K$. Denote the squarefree part of positive integer $t$ by ${\\rm sqf}(t)$. In this work, it is proved that if $m\\neq {\\rm sqf}(2r(r-s))$ and $mn\\neq 2, 3, 6$, then $n$ is a $(\\mathbb K,\\theta)$-congruent number if and only if the Mordell-Weil group $E_{n,\\theta}(\\mathbb K)$ has positive rank, and all of the $(\\mathbb K,\\theta, n)$-triangles are classified in four types.
We present a method for computing complete lists of number fields in cases where the Galois group, as an abstract group, appears as a Galois group in smaller degree. We apply this method to find the twenty-five octic fields with Galois group $\\textrm{PSL}_2(7)$ and smallest absolute discriminant. We carry out a number of related computations, including determining the octic field with Galois group $2^3{:}\\textrm{GL}_3(2)$ of smallest absolute discriminant.
Gyarmati, Mauduit and S\\ ark\\\"ozy introduced the \\textit{cross-correlation measure} $\\Phi_k(\\mathcal{F})$ to measure the randomness of families of binary sequences $\\mathcal{F} \\subset \\{-1,1\\}^N$. In this paper we study the order of magnitude of the cross-correlation measure $\\Phi_k(\\mathcal{F})$ for typical families. We prove that, for most families $\\mathcal{F} \\subset \\{-1,1\\}^N$ of size $2\\leq |\\mathcal{F}|<2^{N/12}$, $\\Phi_k(\\mathcal{F})$ is of order $\\sqrt{N\\log \\binom{N}{k}+k\\log |\\mathcal{F}|}$ for any given $2\\leq k \\leq N/(6\\log_2 |\\mathcal{F}|)$.
Let $T_{\\mathrm{CM}}(d)$ denote the maximum size of a torsion subgroup of a CM elliptic curve over a degree $d$ number field. We initiate a systematic study of the asymptotic behavior of $T_{\\mathrm{CM}}(d)$ as an \"arithmetic function\". Whereas a recent result of the last two authors computes the upper order of $T_{\\mathrm{CM}}(d)$, here we determine the lower order, the typical order and the average order of $T_{\\mathrm{CM}}(d)$ as well as study the number of isomorphism classes of groups $G$ of order $T_{\\mathrm{CM}}(d)$ which arise as the torsion subgroup of a CM elliptic curve over a degree $d$ number field. To establish these analytic results we need to extend some prior algebraic results. Especially, if $E_{/F}$ is a CM elliptic curve over a degree $d$ number field, we show that $d$ is divisible by a certain function of $\\# E(F)[\\mathrm{tors}]$, and we give a complete characterization of all degrees $d$ such that every torsion subgroup of a CM elliptic curve defined over a degree $d$ number field already occurs over $\\mathbb{Q}$.
We present a hypergeometric construction of rational approximations to $\\zeta(2)$ and $\\zeta(3)$ which allows one to demonstrate simultaneously the irrationality of each of the zeta values, as well as to estimate from below certain linear forms in 1, $\\zeta(2)$ and $\\zeta(3)$ with rational coefficients. A new notion of (simultaneous) diophantine exponent is introduced to formalise the arithmetic structure of these specific linear forms. Finally, the properties of this newer concept are studied and linked to the classical irrationality exponent and its generalisations given recently by S. Fischler.
For any natural number $\\ell $ and any prime $p\\equiv 1 \\pmod{4}$ not dividing $\\ell $ there is a Hermitian modular form of arbitrary genus $n$ over $L:=\\Q [\\sqrt{-\\ell}]$ that is congruent to 1 modulo $p$ which is a Hermitian theta series of an $O_L$-lattice of rank $p-1$ admitting a fixed point free automorphism of order $p$. It is shown that also for non-free lattices such theta series are modular forms.
In this paper, we prove an unconditionnal bound for the analytic rank (i.e the order of vanishing at the critical point of the $L$ function) of the new part $J^n_0(q)$, of the jacobian of the modular curve $X_0(q)$. Our main resultis the following upper bound: for $q$ prime, one has $$rank_a(J_0^n(q))\\ll \\dim J_0^n(q)$$ where the implied constant is absolute. All previously known non trivials bounds of $rank_a(J_0^n(q))$ assumed the generalized Riemann hypothesis; here, our proof is unconditionnal, and is based firstly on the construction by Perelli and Pomykala of a new test function in the context of Riemann-Weil explicit formulas, and secondly on a density theorem for the zeros of $L$ functions attached to new forms.
We bound Selmer groups attached to Grossencharacters of CM elliptic curves by the appropriate $L$-value. Our method is to use Kato s explicit reciprocity law and the Main Conjecture as proved by Rubin. These results are then used together with work of Han and fundamental results of Nekovar to bound the torsion in the image of the $p$-adic cycle class map for self products of CM elliptic curves. Our results are valid for Chow groups of arbitrary codimension for almost all $p$.
New congruences are found for Andrews  smallest parts partition function spt(n). The generating function for spt(n) is related to the holomorphic part alpha(24z) of a certain weak Maass form M(z) of weight 3/2. We show that a normalized form of the generating function for spt(n) is an eigenform modulo 72 for the Hecke operators T(p^2) for primes p > 3, and an eigenform modulo t for t = 5, 7 or 13 provided that (t, 6p) = 1. The result for the modulus 3 was observed earlier by the author and considered by Ono and Folsom. Similar congruences for higher powers of t (namely 5^6, 7^4 and 13^2) occur for the coefficients of the function alpha(z). Analogous results for the partition function were found by Atkin in 1966. Our results depend on the recent result of Ono that M[p](z/24) is a weakly holomorphic modular form of weight 3/2 for the full modular group where M[p](z) = M(z)|T(p^2) - chi(p)(1 + p)M(z).
The modified Bernoulli numbers \\begin{equation*} B_{n}^{*} = \\sum_{r=0}^{n} \\binom{n+r}{2r} \\frac{B_{r}}{n+r}, \\quad n > 0 \\end{equation*} introduced by D. Zagier in 1998 were recently extended to the polynomial case by replacing $B_{r}$ by the Bernoulli polynomials $B_{r}(x)$. Arithmetic properties of the coefficients of these polynomials are established. In particular, the 2-adic valuation of the modified Bernoulli numbers is determined. A variety of analytic, umbral, and asymptotic methods is used to analyze these polynomials.
In this paper we prove an upper bound on the \"size\" of the set of multiplicatively $\\psi$-approximable points in $\\mathbb R^d$ for $d>1$ in terms of $f$-dimensional Hausdorff measure. This upper bound exactly complements the known lower bound, providing a \"zero-full\" law which relates the Hausdorff measure to the convergence/divergence of a certain series in both the homogeneous and inhomogeneous settings. This zero-full law resolves a question posed by Beresnevich and Velani (2015) regarding the \"log factor\" discrepancy in the convergent/divergent sum conditions of their theorem. We further prove the analogous result for the multiplicative doubly metric setup.
Based on the first 25 known values of Pi(10^n), the number of primes less than 10^n, with n integer between 1 and 25, we propose a conjectured value range of Pi(10^26) calculated by using polynomial interpolations with two corrective functions obtained by Thiele interpolations on relative differences of exact and interpolated values of Pi(10^n). The conjectured range value is in agreement with values obtained by the Eulerian logarithmic integral and with the Riemann functions.
We study the integral points on $\\mathbb P_ n\\setminus D$, where $D$ is the branch locus of a projection from an hypersurface in $\\mathbb P_{n+1}$ to a hyperplane $H\\simeq\\mathbb P_n$. In doing that we follow the approach proposed in a paper by Zannier but we prove a more general result that also gives a sharper bound that may lead to prove the finiteness of integral points and has more applications. The proofs we present in this paper are effective and they provide a way to actually construct a set containing all the integral points in question. Our results find a concrete application to Diophantine equations, more specifically to the problem of finding integral solutions to equations $F(x_0,\\dots,x_n)=c$, where $c$ is a given nonzero value and $F$ is a homogeneous form defining the branch locus $D$.
In this paper we refine Ball-Rivoal s theorem by proving that for any odd integer $a$ sufficiently large in terms of $\\epsilon>0$, there exist $[ \\frac{(1-\\epsilon)\\log a}{1+\\log 2}]$ odd integers $s$ between 3 and $a$, with distance at least $a^{\\epsilon}$ from one another, at which Riemann zeta function takes $\\Q$-linearly independent values. As a consequence, if there are very few integers $s$ such that $\\zeta(s)$ is irrational, then they are rather evenly distributed. The proof involves series of hypergeometric type estimated by the saddle point method, and the generalization to vectors of Nesterenko s linear independence criterion.
We extend Norton-Borcherds-Koike s replication formulae to super-replicable ones by working with the congruence groups $\\Gamma_1(N)$ and find the product identities which characterize super-replicable functions. These will provide a clue for constructing certain new infinite dimensional Lie superalgebras whose denominator identities coincide with the above product identities. Therefore it could be one way to find a connection between modular functions and infinite dimensional Lie algebras.
We describe a procedure for determining the existence, or non-existence, of an algebraic variety of a given conductor via an analytic calculation involving L-functions. The procedure assumes that the Hasse-Weil L-function of the variety satisfies its conjectured functional equation, but there is no assumption of an associated automorphic object or Galois representation. We demonstrate the method by finding the Hasse-Weil L-functions of all hyperelliptic curves of conductor less than 500.
Catalan conjecture/Mihailescu theorem is a theorem in number theory that was conjectured by Mathematician Eugene Charles Catalan in 1844 and was proved completely by Preda Mihailescu in 2005. Some form of problem dates back atleast to Gersonides who seems to have proved a special case of the conjecture in 1343. The note stating the problem was not given the due imprtance at the begining and appeared among errata to papers which had appeared in the earlier volume of Crelle journal, however the problem got its due considration after work of Cassles and Ko Chao in 1960s. The Catalan problem asks that the equation $x^m-y^n=1$ has no solution for x,y,m,n in +ve integers other than the trivial solution $ 3^2-2^3=1 $. An important and first ingredient for the proof is Cassles criteria which says that whenever we have a solution of $x^p-y^q=1$ with p,q primes then $q|x$ and $p|y$ . Here we look a generalization of the problem, namely we will consider the equation $x^p-y^q=1$ where x,y takes value in ring of integers ${O}_K$ of a number field K and p,q are rational primes. In this article we supply a possible formulation of Cassles criterion and a proof for that in some particular cases of number fields. After this work one can expect to follow Mihailescu and Characterize solutions of Catalan over number fields.
The Calkin-Wilf tree is an infinite binary tree whose vertices are the positive rational numbers. Each number occurs in the tree exactly once and in the form $a/b$, where are $a$ and $b$ are relatively prime positive integers. In this paper, certain subsemigroups of the modular group are used to construct similar trees in the set $\\mathcal{D}_0$ of positive complex numbers. Associated to each semigroup is a forest of trees that partitions $\\mathcal{D}_0$. The set of cusps and the fundamental domain of the semigroup are defined and computed.
We observe that five polynomial families have all of their zeros on the unit circle. We prove the statements explicitly for four of the polynomial families. The polynomials have coefficients which involve Bernoulli numbers, Euler numbers, and the odd values of the Riemann zeta function. These polynomials are closely related to the Ramanujan polynomials, which were recently introduced by Murty, Smyth and Wang. Our proofs rely upon theorems of Schinzel, and Lakatos and Losonczi and some generalizations.
Ramanujan s congruence $p(5k+4) \\equiv 0 \\pmod 5$ led Dyson \\cite{dyson} to conjecture the existence of a measure \"rank\" such that $p(5k+4)$ partitions of $5k+4$ could be divided into sub-classes with equal cardinality to give a direct proof of Ramanujan s congruence. The notion of rank was extended to rank differences by Atkin and Swinnerton-Dyer \\cite{atkin}, who proved Dyson s conjecture. More recently, Mao proved several equalities and inequalities, leaving some as conjectures, for rank differences for partitions modulo 10 \\cite{mao10} and for $M_2$ rank differences for partitions with no repeated odd parts modulo $6$ and $10$ \\cite{maom2}. Alwaise et. al. proved four of Mao s conjectured inequalities \\cite{swisher}, while leaving three open. Here, we prove a limited version of one of the inequalities conjectured by Mao.
This paper is about the arithmetic of Kudla-Rapoport divisors on Shimura varieties of type GU(n-1,1). In the first part of the paper we construct a toroidal compactification of N. Kramer s integral model of the Shimura variety. This extends work of K.-W. Lan, who constructed a compactification at unramified primes. In the second, and main, part of the paper we use ideas of Kudla to construct Green functions for the Kudla-Rapoport divisors on the open Shimura variety, and analyze the behavior of these functions near the boundary of the compactification. The Green functions turn out to have logarithmic singularities along certain components of the boundary, up to log-log error terms. Thus, by adding a prescribed linear combination of boundary components to a Kudla-Rapoport divisor one obtains a class in the arithmetic Chow group of Burgos-Kramer-Kuhn. In the third and final part of the paper we compute the arithmetic intersection of each of these divisors with a cycle of complex multiplication points. The computation is quickly reduced to the calculations of the author s earlier work Complex multiplication cycles and Kudla-Rapoport divisors. The arithmetic intersection multiplicities are shown to appear as Fourier coefficients of the diagonal restriction of the central derivative of a Hilbert modular Eisenstein series.
Let $Q(x,y,z)$ be an integral quadratic form with determinant coprime to some modulus $q$. We show that $q\\mid Q$ for some non-zero integer vector $(x,y,z)$ of length $O(q^{5/8+\\varepsilon})$, for any fixed $\\varepsilon>0$. Without the coprimality condition on the determinant one could not achieve an exponent below $2/3$. The proof uses a bound for short character sums involving binary quadratic forms, which extends a result of Chang.
We give a lower bound for the sup-norm of an $L^2$-normalized newform in an irreducible, unitary, cuspidal representation $\\pi$ of $GL_2$ over a number field. When the central character of $\\pi$ is sufficiently ramified, this bound improves upon the trivial bound by a positive power of $N$ where $N$ is the norm of the conductor of $\\pi$. This generalizes a result of Templier, who dealt with the special case when the conductor of the central character equals the conductor of the representation. We also make a conjecture about the true size of the sup-norm in the $N$-aspect that takes into account this central character phenomenon. Our results depend upon some explicit formulas and bounds for the Whittaker newvector over a non-archimedean local field, which may be of independent interest.
We determine the mean number of 3-torsion elements in the class groups of quadratic orders, where the quadratic orders are ordered by their absolute discriminants. Moreover, for a quadratic order $\\mathcal{O}$ we distinguish between the two groups: $\\mathrm{Cl}_3(\\mathcal{O})$, the group of ideal classes of order $3$; and $\\mathcal{I}_3(\\mathcal{O})$, the group of ideals of order $3$. We determine the mean values of both $|\\mathrm{Cl}_3(\\mathcal{O})|$ and $|\\mathcal{I}_3(\\mathcal{O})|$, as $\\mathcal{O}$ ranges over any family of orders defined by finitely many (or in suitable cases, even infinitely many) local conditions. As a consequence, we prove the surprising fact that the mean value of the difference $|\\mathrm{Cl}_3(\\mathcal{O})|-|\\mathcal{I}_3(\\mathcal{O})|$ is equal to $1$, regardless of whether one averages over the maximal orders in complex quadratic fields or over all orders in such fields or, indeed, over any family of complex quadratic orders defined by local conditions. For any family of real quadratic orders defined by local conditions, we prove similarly that the mean value of the difference $|\\mathrm{Cl}_3(\\mathcal{O})|-\\frac13|\\mathcal{I}_3(\\mathcal{O})|$ is always equal to $1$, independent of the family.
Let $\\lambda$ denote the Liouville function. A well known conjecture of Chowla asserts that for any distinct natural numbers $h_1,\\dots,h_k$, one has $\\sum_{1 \\leq n \\leq X} \\lambda(n+h_1) \\dotsm \\lambda(n+h_k) = o(X)$ as $X \\to \\infty$. This conjecture remains unproven for any $h_1,\\dots,h_k$ with $k \\geq 2$. In this paper, using the recent results of the first two authors on mean values of multiplicative functions in short intervals, combined with an argument of Katai and Bourgain-Sarnak-Ziegler, we establish an averaged version of this conjecture, namely $$\\sum_{h_1,\\dots,h_k \\leq H} \\left|\\sum_{1 \\leq n \\leq X} \\lambda(n+h_1) \\dotsm \\lambda(n+h_k)\\right| = o(H^kX)$$ as $X \\to \\infty$ whenever $H = H(X) \\leq X$ goes to infinity as $X \\to \\infty$, and $k$ is fixed. Related to this, we give the exponential sum estimate $$ \\int_0^X \\left|\\sum_{x \\leq n \\leq x+H} \\lambda(n) e(\\alpha n)\\right| dx = o( HX )$$ as $X \\to \\infty$ uniformly for all $\\alpha \\in \\mathbb{R}$, with $H$ as before. Our arguments in fact give quantitative bounds on the decay rate (roughly on the order of $\\frac{\\log\\log H}{\\log H}$), and extend to more general bounded multiplicative functions than the Liouville function, yielding an averaged form of a (corrected) conjecture of Elliott.
We show that there exist arbitrarily large sets $S$ of $s$ prime numbers such that the equation $a+b=c$ has more than $\\exp(s^{2-\\sqrt{2}-\\epsilon})$ solutions in coprime integers $a$, $b$, $c$ all of whose prime factors lie in the set $S$. We also show that there exist sets $S$ for which the equation $a+1=c$ has more than $\\exp(s^{\\frac 1{16}})$ solutions with all prime factors of $a$ and $c$ lying in $S$.
We describe various properties of continued fraction expansions of complex numbers in terms of Gaussian integers. Numerous distinct such expansions are possible for a complex number. They can be arrived at through various algorithms, as also in a more general way from what we call \"iteration sequences\". We consider in this broader context the analogues of the Lagrange theorem characterizing quadratic surds, the growth properties of the denominators of the convergents, and the overall relation between sequences satisfying certain conditions, in terms of nonoccurrence of certain finite blocks, and the sequences involved in continued fraction expansions. The results are also applied to describe a class of binary quadratic forms with complex coefficients whose values over the set of pairs of Gaussian integers form a dense set of complex numbers.
We prove a universal coefficients theorem for the overconvergent cohomology modules introduced by Ash and Stevens, and give several applications. In particular, we sketch a very simple construction of eigenvarieties using overconvergent cohomology and prove many instances of a conjecture of Urban on the dimensions of these spaces. For example, when the underlying reductive group is an inner form of GL(2) over a quadratic imaginary extension of the rationals, the cuspidal component of the eigenvariety is a rigid analytic curve.
We compute syntomic cohomology of semistable affinoids in terms of cohomology of $(\\varphi,\\Gamma)$-modules which, thanks to work of Fontaine-Herr, Andreatta-Iovita, and Kedlaya-Liu, is known to compute Galois cohomology of these affinoids. For a semistable scheme over a mixed characteristic local ring this implies a comparison isomorphism, up to some universal constants, between truncated sheaves of $p$-adic nearby cycles and syntomic cohomology sheaves. This generalizes the comparison results of Kato, Kurihara, and Tsuji for small Tate twists (where no constants are necessary) as well as the comparison result of Tsuji that holds over the algebraic closure of the field. As an application, we combine this local comparison isomorphism with the theory of finite dimensional Banach Spaces and finitness of \\ etale cohomology of rigid analytic spaces proved by Scholze to prove a Semistable conjecture for formal schemes with semistable reduction.
We compute the arithmetic L-invariants (of Greenberg-Benois) of twists of symmetric powers of p-adic Galois representations attached to Iwahori level Hilbert modular forms (under some technical conditions). Our method uses the automorphy of symmetric powers and the study of analytic Galois representations on p-adic families of automorphic forms over symplectic and unitary groups. Combining these families with some explicit plethysm in the representation theory of GL(2), we construct global Galois cohomology classes with coefficients in the symmetric powers and provide formulae for the L-invariants in terms of logarithmic derivatives of Hecke eigenvalues.
Let $K_i$ be a number field for all $i \\in \\mathbb{Z}_{> 0}$ and let $\\mathcal{E}$ be a family of elliptic curves containing infinitely many members defined over $K_i$ for all $i$. Fix a rational prime $p$. We give sufficient conditions for the existence of an integer $i_0$ such that, for all $i > i_0$ and all elliptic curve $E \\in \\mathcal{E}$ having good reduction at all $\\mathfrak{p} \\mid p$ in $K_i$, we have that $E$ has good ordinary reduction at all primes $\\mathfrak{p} \\mid p$.
For a Riemann integrable function on an interval and for a point therein,we define  Fourier series at the point on the interval  and bring out how and when the function element becomes expressible as Fourier series.In this process,we also generalise the theory by bringing in such concepts as finite Fourier series,right/left hand Fourier series.We also sum up subseries corresponding to terms in an arithmetic progression,of the basic Fourier series.
We investigate the relation between the Riesz and the Baez-Duarte criterion for the Riemann Hypothesis. In particular we present the relation between the function $R(x)$ appearing in the Riesz criterion and the sequence $c_k$ appearing in the Baez-Duarte formulation. It is shown that $R(x)$ can expressed by $c_k$ and vice versa the sequence $c_k$ can be obtained from the values of $R(x)$ at integer arguments. We give also some relations involving $c_k$ and $R(x)$, in particular value of the alternating sum of $c_k$.
The aim of this paper is to study certain family of elliptic curves $\\{\\mathscr{X}_H\\}_H$ defined over a number field $F$ arising from hyperplane sections of some cubic surface $\\mathscr{X}/F$ associated to a cyclic cubic extension $K/F$. We show that each $\\mathscr{X}_H$ admits a 3-isogeny $\\phi$ over $F$ and the dual Selmer group $S^{(\\hat{\\phi})}(\\hat{\\mathscr{X}_H}/F)$ is bounded by a kind of unit/class groups attached to $K/F$. This is proven via certain rational function on the elliptic curve $\\mathscr{X}_H$ with nice property. We also prove that the Shafarevich-Tate group $\\text{\\cyr X} (\\hat{\\mathscr{X}_H}/\\rat)[\\hat{\\phi}]$ coincides with a class group of $K$ as a special case.
Let $f$ be a positive definite ternary quadratic form. We assume that $f$ is non-classic integral, that is, the norm ideal of $f$ is $\\z$. We say $f$ is {\\it strongly $s$-regular } if the number of representations of squares of integers by $f$ satisfies the condition in Cooper and Lam s conjecture in \\cite {cl}. In this article, we prove that there are only finitely many strongly $s$-regular ternary forms up to equivalence if the minimum of the non zero squares that are represented by the form is fixed. In particular, we show that there are exactly $207$ non-classic integral strongly $s$-regular ternary forms that represent one (see Tables 1 and 2). This result might be considered as a complete answer to a natural extension of Cooper and Lam s conjecture.
Given an arithmetical function $f$, by $f(a, b)$ and $f[a, b]$ we denote the function $f$ evaluated at the greatest common divisor $(a, b)$ of positive integers $a$ and $b$ and evaluated at the least common multiple $[a, b]$ respectively. A positive semi-definite matrix $A=(a_{ij})$ with $a_{ij}\\ge 0$ for all $i$ and $j$ is called infinitely divisible if the fractional Hadamard power $A^{\\circ r}=(a_{ij}^r)$ is positive semi-definite for every nonnegative real number $r$. Let $S=\\{x_1, ..., x_n\\}$ be a set of $n$ distinct positive integers. In this paper, we show that if $f$ is a multiplicative function such that $(f*\\mu)(d)\\ge 0$ whenever $d|x$ for any $x\\in S$, then the $n\\times n$ matrices $(f(x_i, x_j))$, $(\\frac{1}{f[x_i, x_j]})$ and $(\\frac{f(x_i, x_j)}{f[x_i, x_j]})$ are infinitely divisible. Finally we extend these results to the Dirichlet convolution case which produces infinitely many examples of infinitely divisible matrices. Our results extend the results obtained previously by Bourque, Ligh, Bhatia, Hong, Lee, Lindqvist and Seip.
In Iwaniec-Sarnak [IS] the percentages of nonvanishing of central values of families of GL_2 automorphic L-functions was investigated. In this paper we examine the distribution of zeros which are at or neat s=1/2 (that is the central point) for such families of L-functions. Unlike [IS], most of the results in this paper are conditional, depending on the Generalized Riemann Hypothesis (GRH). It is by no means obvious, but on the other hand not surprising, that this allows us to obtain sharper results on nonvanishing.
We describe an explicit generalized Lucasian test to determine the primality of numbers $h\\cdot2^n\\pm1$ when $h\\nequiv0\\pmod{17}$. This test is by means of fixed seeds which depend only on $h$. In particular when $h=16^m-1$ with $m$ odd, our paper gives a primality test with some fixed seeds depending only on $h$. Comparing the results of W. Bosma(1993) and P. Berrizbeitia and T. G. Berry(2004), our result adds new values of $h$ along with this line. Octic and bioctic reciprocity are used to deduce our result.
We propose a conjecture, similar to Skolem s conjecture, on a Hasse-type principle for exponential diophantine equations. We prove that in a sense the principle is valid for \"almost all\" equations. Based upon this we propose a general method for the solution of exponential diophantine equations. Using a generalization of a result of Erd\\H{o}s, Pomerance and Schmutz concerning Carmichael s $\\lambda$ function, we can make our search systematic for certain moduli needed in the method.
In this paper, we derive eight basic identities of symmetry in three variables related to generalized Bernoulli polynomials and generalized power sums. All of these are new, since there have been results only about identities of symmetry in two variables. The derivations of identities are based on the $p$-adic integral expression of the generating function for the generalized Bernoulli polynomials and the quotient of $p$-adic integrals that can be expressed as the exponential generating function for the generalized power sums.
Let $k$ be a field of characteristic $0$, and let $\\alpha_{1}$, $\\alpha_{2}$, ..., $\\alpha_{5}$ be algebraically independent and transcendental over $k$. Let $K$ be the transcendental extension of $k$ obtained by adjoining the elementary symmetric functions of the $\\alpha_{i}$ s. Let $J$ be the Jacobian of the hyperelliptic curve defined over $K$ which is given by the equation $y^{2} = \\prod_{i = 1}^{5} (x - \\alpha_{i})$. We define a tower of field extensions $K = K_{0}  \\subset K_{1}  \\subset K_{2}  \\subset ...$ by giving recursive formulas for the generators of each $K_{n} $ over $K_{n - 1} $, and let $K_{\\infty}  = \\bigcup_{n = 0}^{\\infty} K_{n} $. We show that $K_{\\infty} (\\mu_{2})$ is the subextension of the field $K(J[2^{\\infty}]) := \\bigcup_{n = 0}^{\\infty} K(E[2^{n}])$ corresponding to a central order-$2$ Galois subgroup of $\\mathrm{Gal}(K(J[2^{\\infty}]) / K(\\mu_{2}))$, and a generator of $K(J[2^{\\infty}])$ over $K_{\\infty} (\\mu_{2})$ is given.
We propose the formula for the number of pairs of consecutive primes $p_n, p_{n+1}<x$ separated by gap $d=p_{n+1}-p_n$ expressed directly by the number of all primes $<x$, i.e. by $\\pi(x)$. As the application of this formula we formulate 7 conjectures, among others for the maximal gap between two consecutive primes smaller than $x$, for the generalized Brun s constants and the first occurrence of a given gap $d$. Also the leading term $\\log \\log(x)$ in the prime harmonic sum is reproduced from our guesses correctly. These conjectures are supported by the computer data.
We give continued fraction algorithms for a particular class of Fuchsian triangle groups. In particular, we give an explicit form of each such group that is a subgroup of the Hilbert modular group of its trace field and provide an interval map that is piecewise linear fractional, given in terms of group elements. Using natural extensions, we find an ergodic invariant measure for the interval map. We also study diophantine properties of approximation in terms of the continued fractions; and furthermore show that these continued fractions are appropriate to obtain transcendence results.
We prove a function field analogue of the Herbrand-Ribet theorem on cyclotomic number fields. The Herbrand-Ribet theorem can be interpreted as a result about cohomology with $\\mu_p$-coefficients over the splitting field of $\\mu_p$, and in our analogue both occurrences of $\\mu_p$ are replaced with the $\\mathfrak{p}$-torsion scheme of the Carlitz module for a prime $\\mathfrak{p}$ in $\\F_q[t]$.
Let $\\mathbb{F}_q$ be a finite field with $q$ elements, $\\psi$ a non-zero element of $\\mathbb{F}_q$, and $n$ an integer $\\geq 3$ prime to $q$. The aim of this article is to show that the zeta function of the projective variety over $\\mathbb{F}_q$ defined by $X_\\psi \\colon x_1^n+...+x_n^n - n \\psi x_1... x_n=0$ has, when $n$ is prime and $X_\\psi$ is non singular (i.e. when $\\psi^n \\neq 1$), an explicit decomposition in factors coming from affine varieties of odd dimension $\\leq n-4$ which are of hypergeometric type. The method we use consists in counting separately the number of points of $X_\\psi$ and of some varieties of the preceding type and then compare them. This article answers, at least when $n$ is prime, a question asked by D. Wan in his article \"Mirror Symmetry for Zeta Functions\".
Let $\\k$ be a global function field in 1-variable over a finite extension of $\\Fp$, $p$ prime, $\\infty$ a fixed place of $\\k$, and $\\A$ the ring of functions of $\\k$ regular outside of $\\infty$. Let $E$ be a Drinfeld module or $T$-module. Then, as in \\cite{go1}, one can construct associated characteristic $p$ $L$-functions based on the classical model of abelian varieties {\\it once} certain auxiliary choices are made. Our purpose in this paper is to show how the well-known concept of ``maximal separable (over the completion $\\k_\\infty$) subfield   allows one to construct from such $L$-functions certain separable extensions which are independent of these choices. These fields will then depend only on the isogeny class of the original $T$-module or Drinfeld module and $y\\in \\Zp$, and should presumably be describable in these terms. Moreover, they give a very useful framework in which to view the ``Riemann hypothesis   evidence of \\cite{w1}, \\cite{dv1}, \\cite{sh1}. We also establish that an element which is {\\it separably} algebraic over $\\k_\\infty$ can be realized as a ``multi-valued operator   on general $T$-modules. This is very similar to realizing 1/2 as the multi-valued operator $x\\mapsto \\sqrt{x}$ on $\\C^\\ast$. Simple examples show that this result is false for non-separable elements. This result may eventually allow a ``two $T$ s   interpretation of the above extensions in terms of multi-valued operators on $E$ and certain tensor twists.
A simple geometric construction on the moduli spaces $\\mathcal{M}_{0,n}$ of curves of genus $0$ with $n$ ordered marked points is described which gives a common framework for many irrationality proofs for zeta values. This construction yields Ap\\ ery s approximations to $\\zeta(2)$ and $\\zeta(3)$, and for larger $n$, an infinite family of small linear forms in multiple zeta values with an interesting algebraic structure. It also contains a generalisation of the linear forms used by Ball and Rivoal to prove that infinitely many odd zeta values are irrational.
We consider the linear vector space formed by the elements of the finite fields $\\mathbb{F}_q$ with $q=p^r$ over $\\mathbb{F}_p$. Let $\\{a_1,\\ldots,a_r\\}$ be a basis of this space. Then the elements $x$ of $\\mathbb{F}_q$ have a unique representation in the form $\\sum_{j=1}^r c_ja_j$ with $c_j\\in\\mathbb{F}_p$. Let $D_1,\\ldots,D_r$ be subsets of $\\mathbb{F}_p$. We consider the set $W=W(D_1,\\ldots,D_r)$ of elements of $\\mathbb{F}_q$ such that $c_j \\in D_j$ for all $j=1,\\ldots,r$. We give an estimate for the number of squares in the set $W$ which implies an asymptotic formula for this quantity in the case when the sets $D_1,\\ldots,D_r$ are \"large on average\" and a sufficient condition for the existence of squares in the set $W$.
For any periodic function $f:{\\mathbb N} \\to {\\mathbb C}$ with period $q$, we study the Dirichlet series $L(s,f):=\\sum_{n\\geq 1} f(n)/n^s.$ It is well-known that this admits an analytic continuation to the entire complex plane except at $s=1$, where it has a simple pole with residue $$\\rho:= q^{-1}\\sum_{1\\leq a\\leq q} f(a).$$ Thus, the function is analytic at $s=1$ when $\\rho=0$ and in this case, we study its non-vanishing using the theory of linear forms in logarithms and Dirichlet $L$-series. In this way, we give new proofs of an old criterion of Okada for the non-vanishing of $L(1,f)$ as well as a classical theorem of Baker, Birch and Wirsing. We also give some new necessary and sufficient conditions for the non-vanishing of $L(1,f)$.
The central result of this paper is a refinement of Hida s duality theorem between ordinary Lambda-adic modular forms and the universal ordinary Hecke algebra. Specifically, we give a necessary condition for this duality to be integral with respect to particular submodules of the space ordinary Lambda-adic modular forms. This refinement allows us to give a simple proof that the universal ordinary cuspidal Hecke algebra modulo Eisenstein ideal is isomorphic to the Iwasawa algebra modulo an ideal related to the Kubota-Leopoldt p-adic L-function. The motivation behind these results stems from Ohta s proof of the Iwasawa main conjecture over Q. Specifically, the most general application of this argument, which employs results on congruence modules and requires one to make some restrictive hypotheses. Using our results we are able to extend Ohta s argument and remove these hypotheses.
We investigate the problem of best simultaneous Diophantine approximation under a constraint on the denominator, as proposed by Jurkat. New lower estimates for optimal approximation constants are given in terms of critical determinants of suitable star bodies. Tools are results on simultaneous Diophantine approximation of rationals by rationals with smaller denominator. Finally, the approximation results are applied to the decomposition of integer vectors.
In this note, we consider an l-isogeny descent on a pair of elliptic curves over Q. We assume that l > 3 is a prime. The main result expresses the relevant Selmer groups as kernels of simple explicit maps between finite- dimensional F_l-vector spaces defined in terms of the splitting fields of the kernels of the two isogenies. We give examples of proving the l-part of the Birch and Swinnerton-Dyer conjectural formula for certain curves of small conductor.
A sequence of rational numbers as a generalization of the sequence of Bernoulli numbers is introduced. Sums of products involving the terms of this generalized sequence are then obtained using an application of the Fa\\`a di Bruno s formula. These sums of products are analogous to the higher order Bernoulli numbers and are used to develop the closed form expressions for the sums of products involving the power sums $\\displaystyle \\Psi_k(x,n):=\\sum_{d|n}\\mu(d)d^k S_k(\\frac{x}{d}), n\\in\\mathbb{Z}^+$ which are defined via the M\\\"obius function $\\mu$ and the usual power sum $S_k(x)$ of a real or complex variable $x.$ The power sum $S_k(x)$ is expressible in terms of the well known Bernoulli polynomials by $\\displaystyle S_k(x):=\\frac{B_{k+1}(x+1)-B_{k+1}(0)}{k+1}.$
In this survey we give an overview of recent developments on the Quantitative Subspace Theorem. In particular, we discuss a new upper bound for the number of subspaces containing the \"large\" solutions, obtained jointly with Roberto Ferretti, and sketch the proof of the latter. Further, we prove a new gap principle to handle the \"small\" solutions in the system of inequalities considered in the Subspace Theorem. Finally, we go into the refinement of the Subspace Theorem by Faltings and Wuestholz, which states that the system of inequalities considered has only finitely many solutions outside some effectively determinable proper linear subspace of the ambient solution space. Estimating the number of these solutions is still an open problem. We give some motivation that this problem is very hard.
Let $F$ be a quadratic form in $N \\geq 2$ variables defined on a vector space $V \\subseteq K^N$ over a global field $K$, and $\\Z \\subseteq K^N$ be a finite union of varieties defined by families of homogeneous polynomials over $K$. We show that if $V \\setminus \\Z$ contains a nontrivial zero of $F$, then there exists a linearly independent collection of small-height zeros of $F$ in $V\\setminus \\Z$, where the height bound does not depend on the height of $\\Z$, only on the degrees of its defining polynomials. As a corollary of this result, we show that there exists a small-height maximal totally isotropic subspace $W$ of the quadratic space $(V,F)$ such that $W$ is not contained in $\\Z$. Our investigation extends previous results on small zeros of quadratic forms, including Cassels  theorem and its various generalizations. The paper also contains an appendix with two variations of Siegel s lemma. All bounds on height are explicit.
We present a number of results about (finite) multiple harmonic sums modulo a prime, which provide interesting parallels to known results about multiple zeta values (i.e., infinite multiple harmonic series). In particular, we prove a \"duality\" result for mod p multiple harmonic sums similar to (but distinct from) that for multiple zeta values. We also exploit the Hopf algebra structure of the quasi-symmetric functions to do calculations with multiple harmonic sums mod p, and obtain, for each weight through 9, a set of generators for the space of weight-n multiple harmonic sums mod p. When combined with recent work, the results of this paper offer significant evidence that the number of quantities needed to generate the weight-n multiple harmonic series mod p is the n-th Padovan number (OEIS sequence A000931).
We study the growth of the Galois invariants of the $p$-Selmer group of an elliptic curve in a degree $p$ Galois extension. We show that this growth is determined by certain local cohomology groups and determine necessary and sufficient conditions for these groups to be trivial. Under certain hypotheses this allows us to give necessary and sufficient conditions for there to be growth in the full $p$-Selmer group in a degree $p$ Galois extension.
For a fixed integer a>1, we suggest that the probability of nullity of the p-Fermat quotient q(p,a) is much lower than 1/p for any arbitrary large prime number p. For this we use various heuristics, justified by means of numerical computations and analytical results, which may imply the finiteness of the q(p,a) equal to 0 and the existence of integers a such that q(p,a) is different from 0 for all p. However no proofs are obtained concerning these heuristics.
In 1947 Mills proved that there exists a constant $A$ such that $\\lfloor A^{3^n} \\rfloor$ is a prime for every positive integer $n$. Determining $A$ requires determining an effective Hoheisel type result on the primes in short intervals - though most books ignore this difficulty. Under the Riemann Hypothesis, we show that there exists at least one prime between every pair of consecutive cubes and determine (given RH) that the least possible value of Mills  constant $A$ does begin with 1.3063778838. We calculate this value to 6850 decimal places by determining the associated primes to over 6000 digits and probable primes (PRPs) to over 60000 digits. We also apply the Cram\\ er-Granville Conjecture to Honaker s problem in a related context.
Let $K$ be a local field whose residue field has characteristic $p$ and let $L/K$ be a finite separable totally ramified extension of degree $n=ap^{\\nu}$. The indices of inseparability $i_0,i_1,...,i_{\\nu}$ of $L/K$ were defined by Fried in the case char$(K)=p$ and by Heiermann in the case char$(K)=0$; they give a refinement of the usual ramification data for $L/K$. The indices of inseparability can be used to construct \"generalized Hasse-Herbrand functions\" $\\phi_{L/K}^j$ for $0\\le j\\le\\nu$. In this paper we give an interpretation of the values $\\phi_{L/K}^j(c)$ for natural numbers $c$. We use this interpretation to study the behavior of generalized Hasse-Herbrand functions in towers of field extensions.
We show that for every fixed $A>0$ and $\\theta>0$ there is a $\\vartheta=\\vartheta(A,\\theta)>0$ with the following property. Let $n$ be odd and sufficiently large, and let $Q_{1}=Q_{2}:=n^{\\h}(\\log n)^{-\\vartheta}$ and $Q_{3}:=(\\log n)^{\\theta}$. Then for all $q_{3}\\leq Q_{3}$, all reduced residues $a_{3}$ mod $q_{3}$, almost all $q_{2}\\leq Q_{2}$, all admissible residues $a_{2}$ mod $q_{2}$, almost all $q_{1}\\leq Q_{1}$ and all admissible residues $a_{1}$ mod $q_{1}$, there exists a representation $n=p_{1}+p_{2}+p_{3}$ with primes $p_{i}\\equiv a_{i} (q_{i})$, $i=1,2,3$.
Four mutually tangent spheres form two gaps. In each of these, one can inscribe in a unique way four mutually tangent spheres such that each one of these spheres is tangent to exactly three of the original spheres. Repeating the process gives rise to a generalized Apollonian sphere packing. These packings have remarkable properties. One of them is the local to global principle and will be proven in this paper.
Generalizing and unifying prior results, we solve the subconvexity problem for the $L$-functions of $\\GL_{1}$ and $\\GL_{2}$ automorphic representations over a fixed number field, uniformly in all aspects. A novel feature of the present method is the softness of our arguments; this is largely due to a consistent use of canonically normalized period relations, such as those supplied by the work of Waldspurger and Ichino--Ikeda.
The Gauss-Kuzmin statistics for the triangle map (a type of multidimensional continued fraction algorithm) are derived by examining the leading eigenfunction of the triangle map s transfer operator. The technical difficulty is finding the appropriate Banach space of functions. We also show that, by thinking of the triangle map s transfer operator as acting on a one-dimensional family of Hilbert spaces, the transfer can be thought of as a family of nuclear operators of trace class zero.
These are the expanded notes of a mini-course of four lectures by the same title given in the workshop \"p-adic aspects of modular forms\" held at IISER Pune, in June, 2014. We give a brief introduction of p-adic L-functions attached to certain types of automorphic forms on GL(n) with the specific aim of understanding the p-adic symmetric cube L-function attached to a cusp form on GL(2) over rational numbers.
For fixed integer $a\\ge3$, we study the binary Diophantine equation $\\frac{a}n=\\frac1x+\\frac1y$ and in particular the number $E_a(N)$ of $n\\le N$ for which the equation has no positive integer solutions in $x, y$. The asymptotic formula $$E_a(N)\\sim C(a) \\frac{N(\\log\\log N)^{2^{m-1}-1}}{(\\log N)^{1-1/2^m}}$$ as $N$ goes to infinity, is established in this article, and this improves the best result in the literature dramatically. The proof depends on a very delicate analysis of the underlying group structure.
It is well-known that if $E$ is an elliptic curve over the finite field $\\mathbb{F}_p$, then $E(\\mathbb{F}_p)\\simeq\\mathbb{Z}/m\\mathbb{Z}\\times\\mathbb{Z}/mk\\mathbb{Z}$ for some positive integers $m, k$. Let $S(M,K)$ denote the set of pairs $(m,k)$ with $m\\le M$ and $k\\le K$ such that there exists an elliptic curve over some prime finite field whose group of points is isomorphic to $\\mathbb{Z}/m\\mathbb{Z}\\times\\mathbb{Z}/mk\\mathbb{Z}$. Banks, Pappalardi and Shparlinski recently conjectured that if $K\\le (\\log M)^{2-\\epsilon}$, then a density zero proportion of the groups in question actually arise as the group of points on some elliptic curve over some prime finite field. On the other hand, if $K\\ge (\\log M)^{2+\\epsilon}$, they conjectured that a density one proportion of the groups in question arise as the group of points on some elliptic curve over some prime finite field. We prove that the first part of their conjecture holds in the full range $K\\le (\\log M)^{2-\\epsilon}$, and we prove that the second part of their conjecture holds in the limited range $K\\ge M^{4+\\epsilon}$. In the wider range $K\\ge M^2$, we show that a positive density of the groups in question actually occur.
We define, and obtain the meromorphic continuation of, shifted Rankin-Selberg convolutions in one and two variables. As sample applications, this continuation is used to obtain estimates for single and double shifted sums and a Burgess-type bound for $L$-series associated to modular forms of arbitrary central character. Further applications are furnished by subsequent works by the authors and their colleagues.
Let V be a crystalline p-adic representation of the absolute Galois group G_K of an finite unramified extension K of Q_p and T a lattice of V stable by G_K. We prove the following result: Let Fil^1 V be the maximal sub-representation of V with Hodge-Tate weights strictly positive and Fil^1 T=T \\cap Fil^1 V. Then, the projective limit of the H^1_g(K(\\mu_{p^n}), T) is equal up to torsion to the projective limit of the H^1(K(\\mu_{p^n}), Fil^1 T). So its rank over the Iwasawa algebra is [K:Q_p] dim Fil^1 V.
Kurepa s conjecture states that there is no odd prime $p$ that divides $!p=0!+1!+\\cdots+(p-1)!$. We search for a counterexample to this conjecture for all $p<2^{34}$. We introduce new optimization techniques and perform the computation using graphics processing units. Additionally, we consider the generalized Kurepa s left factorial given by $!^{k}n=(0!)^k +(1!)^k +\\cdots+((n-1)!)^{k}$, and show that for all integers $1<k<100$ there exists an odd prime $p$ such that $p\\mid !^k p$.
For each of the functions $f \\in \\{\\phi, \\sigma, \\omega, \\tau\\}$ and every natural number $k$, we show that there are infinitely many solutions to the inequalities $f(p_n-1) < f(p_{n+1}-1) < \\dots < f(p_{n+k}-1)$, and similarly for $f(p_n-1) > f(p_{n+1}-1) > \\dots > f(p_{n+k}-1)$. We also answer some questions of Sierpi\\ nski on the digit sums of consecutive primes. The arguments make essential use of Maynard and Tao s method for producing many primes in intervals of bounded length.
An isogeny class of elliptic curves over a finite field is determined by a quadratic Weil polynomial. Gekeler has given a product formula, in terms of congruence considerations involving that polynomial, for the size of such an isogeny class. In this paper, we give a new, transparent proof of this formula; it turns out that this product actually computes an adelic orbital integral which visibly counts the desired cardinality. This answers a question posed by N. Katz.
The Stickelberger elements attached to an abelian extension of number fields conjecturally participate, under certain conditions, in annihilator relations involving higher algebraic K-groups. In [Victor P. Snaith, Stark s conjecture and new Stickelberger phenomena, Canad. J. Math. 58 (2) (2006) 419--448], Snaith introduces canonical Galois modules hoped to appear in annihilator relations generalising and improving those involving Stickelberger elements. In this paper we study the first of these modules, corresponding to the classical Stickelberger element, and prove a connection with the Stark units in a special case.
Let $E$ be an elliptic curve defined over the rational numbers and $r$ a fixed integer. Using a probabilistic model consistent with the Chebotarev theorem for the division fields of $E$ and the Sato-Tate distribution, Lang and Trotter conjectured an asymptotic formula for the number of primes up to $x$ which have Frobenius trace equal to $r$, where $r$ is a {\\it fixed} integer. However, as shown in this note, this asymptotic estimate cannot hold for {\\it all} $r$ in the interval $|r|\\le 2\\sqrt{x}$ with a uniform bound for the error term, because an estimate of this kind would contradict the Chebotarev density theorem as well as the Sato-Tate conjecture. The purpose of this note is to refine the Lang-Trotter conjecture, by taking into account the \"semicircular law\", to an asymptotic formula that conjecturally holds for arbitrary integers $r$ in the interval $|r|\\le 2\\sqrt{x}$, with a uniform error term. We demonstrate consistency of our refinement with the Chebotarev theorem for a fixed division field, and with the Sato-Tate conjecture. We also present numerical evidence for the refined conjecture.
We consider the geometric generalization of ordinary continued fraction to the multidimensional case introduced by F. Klein in 1895. A multidimensional periodic continued fraction is the union of sails with some special group acting freely on these sails. This group transposes the faces. In this article, we present a method of constructing \"approximate\" fundamental domains of algebraic multidimensional continued fractions and an algorithm testing whether this domain is indeed fundamental or not. We give some polynomial estimates on number of the operations for the algorithm. In conclusion we present an example of fundamental domains calculation for a two-dimensional series of two-dimensional periodic continued fractions.
We prove that the Riemann zeta-function $\\zeta(\\sigma + it)$ has no zeros in the region $\\sigma \\geq 1 - 1/(5.573412 \\log|t|)$ for $|t|\\geq 2$. This represents the largest known zero-free region within the critical strip for $3.06\\cdot10^{10} < |t|<\\exp(10151.5)$. Our improvements result from determining some favorable trigonometric polynomials having particular properties, and from analyzing the error term in the method of Kadiri. We also improve an upper bound in a question of Landau regarding nonnegative trigonometric polynomials.
There has been a recent coming together of the Converse Theorem for $\\gln$ and the Langlands-Shahidi method of controlling the analytic properties of automorphic $L$-functions which has allowed us to establish a number of new cases of functoriality, or the lifting of automorphic forms. In this article we would like to present the current state of the Converse Theorem and outline the method one uses to apply the Converse Theorem to obtain liftings. We will then turn to an exposition of the new liftings and some of their applications.
A well known result of Newman says that upto a limit, multiples of $3$ with even number of 1 s in binary representation always exceed multiples of $3$ with odd number of 1 s. The phenomenon of preponderance of even number of 1 s is now known as Newman s phenomenon. We show that this phenomenon exists for higher bases. Let $b$ be a positive integer($\\geq 2$). Let $A_{b}$ be the set of all natural numbers which contain only 0 s and 1 s in b-ary expansion and $S^{(b)}_{q,i}(n)$ be the difference between the corresponding number of $k_e<n$, $k_e\\equiv i \\mod q$, $k_e\\in A_{b}$ and $k_e$ has even number of 1 s in b-ary expansion and the number of $k_o$ $k_o<n$, $k_o\\equiv i \\mod q$, $k_o\\in A_{b}$ and $k_o$ has odd number of 1 s in b-ary expansion. Let $q$ be a multiple or divisor of $b+1$ which is relatively prime to $b$ then we show that $S^{(b)}_{q,0}(n)>0$ for sufficiently large $n$. We show that there is a stronger Newman s phenomenon in $A_b$ in the following sense. If $b>2$ and $n=\\sum_{i=0}^{k-1}b_i2^i$ with $b_i\\in \\{0,1\\}$, let $b(n)=\\sum_{i=0}^{k-1}b_ib^i$ then $\\lim_{n\\rightarrow \\infty} \\frac{S^{(2)}_{3,0}(n)}{S^{(b)}_{b+1,0}(b(n))}=0$. That is, for the same number of terms there is stronger preponderance in $A_b$ than in $A_2=\\mathbb{N}$. In the last section we show that number of primes $p\\leq x$ for which $S_{p,0}^{(b)}(n)>0$ for sufficiently large $n$ is $o\\left(\\frac{x}{\\log x}\\right)$.
To determine the global root number of an elliptic curve defined over a number field, one needs to understand all the local root numbers. These have been classified except at places above 2, and in this paper we attempt to complete the classification. At places above 2, we express the local root numbers in terms of norm residue symbols (resp. root numbers of explicit 1-dimensional characters) in case when wild inertia acts through a cyclic (resp. quaternionic) quotient.
We consider series of the form $$ \\frac{p}{q} +\\sum_{j=2}^\\infty \\frac{1}{x_j}, $$ where $x_1=q$ and the integer sequence $(x_n)$ satisfies a certain non-autonomous recurrence of second order, which entails that $x_n|x_{n+1}$ for $n\\geq 1$. It is shown that the terms of the sequence, and multiples of the ratios of successive terms, appear interlaced in the continued fraction expansion of the sum of the series, which is a transcendental number.
It is conjectured that the regularized double shuffle relations give all algebraic relations among multiple zeta values. Hence all other algebraic relations should be deduced from the regularized double shuffle relations. In this paper, we reformulate and prove some such relations, for example, the weighted sum formula of L. Guo and B. Xie, some evaluation formulas with even arguments and the restricted sum formulas of M. E. Hoffman and their generalizations.
We present a new and elegant integral approach to computing the Gardner-Fisher trigonometric power sum, which is given by $$ S_{m,v}=\\left(\\frac \\pi{2m}\\right)^{2v}\\sum_{k=1}^{m-1}\\cos^{-2v}\\left(\\frac{k\\pi}{2m}\\right), , $$ We present a new and elegant integral approach to computing the Gardner-Fisher trigonometric power sum, which is given by $$ S_{m,v}=\\left(\\frac \\pi{2m}\\right)^{2v}\\sum_{k=1}^{m-1}\\cos^{-2v}\\left(\\frac{k\\pi}{2m}\\right), , $$ where $m$ and $v$ are positive integers. This method not only confirms the results obtained earlier by an empirical method, but it is also much more expedient from a computational point of view. By comparing the formulas from both methods, we derive several new interesting number theoretic results involving symmetric polynomials over the set of quadratic powers up to $(v-1)^2$ and the generalized cosecant numbers. The method is then extended to other related trigonometric power sums including the untwisted Dowker sum. By comparing both forms for this important sum, we derive new formulas for specific values of the N\\\"{o}rlund polynomials. Finally, by using the results appearing in the tables, we consider more advanced sums involving the product of powers of cotangent and tangent with powers of cosecant and secant respectively.
Let $\\theta_3(\\tau)=1+2\\sum_{\\nu=1}^{\\infty} q^{\\nu^2}$ with $q=e^{i\\pi \\tau}$ denote the Thetanullwert of the Jacobi theta function \\[\\theta(z|\\tau) ,=,\\sum_{\\nu=-\\infty}^{\\infty} e^{\\pi i\\nu^2\\tau + 2\\pi i\\nu z} ,.\\] Moreover, let $\\theta_2(\\tau)=2\\sum_{\\nu=0}^{\\infty} q^{{(\\nu+1/2)}^2}$ and $\\theta_4(\\tau)=1+2\\sum_{\\nu=1}^{\\infty} {(-1)}^{\\nu}q^{\\nu^2}$. For algebraic numbers $q$ with $0<|q|<1$ and for any $j\\in \\{ 2,3,4\\}$ we prove the algebraic independence over $\\mathbb{Q}$ of the numbers $\\theta_j(n\\tau)$ and $\\theta_j(\\tau)$ for all odd integers $n\\geq 3$. Assuming the same conditions on $q$ and $\\tau$ as above, we obtain sufficient conditions by use of a criterion involving resultants in order to decide on the algebraic independence over $\\mathbb{Q}$ of $\\theta_j(2m\\tau)$ and $\\theta_j(\\tau)$ $(j=2,3,4)$ and of $\\theta_3(4m\\tau)$ and $\\theta_3(\\tau)$ with odd positive integers $m$. In particular, we prove the algebraic independence of $\\theta_3(n\\tau)$ and $\\theta_3(\\tau)$ for even integers $n$ with $2\\leq n\\leq 22$. The paper continues the work of the first-mentioned author, who already proved the algebraic independence of $\\theta_3(2^m\\tau)$ and $\\theta_3(\\tau)$ for $m=1,2,\\dots$.
In this paper we describe the general theory of constructing toroidal compactifications of locally symmetric spaces and using these to compute dimension formulas for spaces of modular forms. We focus explicitly on the case of the orthogonal locally symmetric spaces arising from quadratic forms of signature $(2,n)$, giving explicit details of the constructions, structures and results in these cases. This article does not give explicit cone decompositions, compute explicit intersection pairings, or count cusps and thus does not give any complete formulas for the dimensions. This article is still `in preparation .
In Part I we gave a polynomial growth lower-bound for the number of nodal domains of a Hecke-Maass cuspform in a compact part of the modular surface, assuming a Lindel\\\"of hypothesis. That was a consequence of a topological argument and known subconvexity estimates, together with new sharp lower-bound restriction theorems for the Maass forms. This paper deals with the same question for general (compact or not) arithmetic surfaces which have a reflective symmetry. The topological argument is extended and representation theoretic methods are needed for the restriction theorems, together with results of Waldspurger. Various explicit examples are given and studied.
It is known that infinitely many number fields and function fields of any degree $m$ have class number divisible by a given integer $n$. However, significantly less is known about the indivisibility of class numbers of such fields. While it s known that there exist infinitely many quadratic number fields with class number indivisible by a given prime, the fields are not constructed explicitly, and nothing appears to be known for higher degree extensions. In \\cite{Pacelli-Rosen}, Pacelli and Rosen explicitly constructed an infinite class of function fields of any degree $m$, $3 \\nmid m$, over $\\F_q(T)$ with class number indivisible by 3, generalizing a result of Ichimura for quadratic extensions. Here we generalize that result, constructing, for an arbitrary prime $\\ell$, and positive integer $m > 1$, infinitely many function fields of degree $m$ over the rational function field, with class number indivisible by $\\ell$.
In this paper we focus on a certain self-distributive multiplication on coalgebras, which leads to so-called rack bialgebra. Inspired by semi-group theory (adapting the Suschkewitsch theorem), we do some structure theory for rack bialgebras and cocommutative Hopf dialgebras. We also construct canonical rack bialgebras (some kind of enveloping algebras) for any Leibniz algebra and compare to the existing constructions. We are motivated by a differential geometric procedure which we call the Serre functor: To a pointed differentible manifold with multiplication is associated its distribution space supported in the chosen point. For Lie groups, it is well-known that this leads to the universal enveloping algebra of the Lie algebra. For Lie racks, we get rack-bialgebras, for Lie digroups, we obtain cocommutative Hopf dialgebras. The canonical rack bialgebras we have constructed for any Leibniz algebra lead then to a simple explicit formula of the rack-star-product on the dual of a Leibniz algebra recently constructed by Dherin and Wagemann in 2013. We clarify this framework doing some deformation theory.
This paper proposes a new notion of smoothness of algebras, termed differential smoothness, that combines the existence of a top form in a differential calculus over an algebra together with a strong version of the Poincar\\ e duality realized as an isomorphism between complexes of differential and integral forms. The quantum two- and three-spheres, disc, plane and the noncommutative torus are all smooth in this sense. Noncommutative coordinate algebras of deformations of several examples of classical orbifolds such as the pillow orbifold, singular cones and lens spaces are also differentially smooth. Although surprising this is not fully unexpected as these algebras are known to be homologically smooth. The study of Riemannian aspects of the noncommutative pillow and Moyal deformations of cones leads to spectral triples that satisfy the orientability condition that is known to be broken for classical orbifolds.
For every element w in the Weyl group of a simple Lie algebra g, De Concini, Kac, and Procesi defined a subalgebra U_q^w of the quantized universal enveloping algebra U_q(g). The algebra U_q^w is a deformation of the universal enveloping algebra U(n_+\\cap w.n_-). We construct smash products of certain finite-type De Concini-Kac-Procesi algebras to obtain ones of affine type; we have analogous constructions in types A_n and D_n. We show that the multiplication in the affine type De Concini-Kac-Procesi algebras arising from this smash product construction can be twisted by a cocycle to produce certain subalgebras related to the corresponding Faddeev-Reshetikhin-Takhtajan bialgebras.
In the paper, we introduce $q$-deformations of the Riemann zeta function, extend them to the whole complex plane, and establish certain estimates of the number of roots. The construction is based on the recent difference generalization of the Harish-Chandra theory of zonal spherical functions. We also discuss numerical results, which indicate that the location of the zeros of the $q$-zeta functions is far from random.
We show that the Newton polygon of a linear q-difference equation depends only on the corresponding q-difference module. We interpret the classical results of convergent factorisation of Adams-Birkhoff-Guenther in terms of the existence of a canonical filtration. Moreover, the associated graded module has excellent functorial (resp. tensorial) properties, whence its interest for classification (resp. for Galois theory).
Nichols algebras are a fundamental building block of pointed Hopf algebras. Part of the classification program of finite-dimensional pointed Hopf algebras with the lifting method of Andruskiewitsch and Schneider is the determination of the liftings, i.e., all possible deformations of a given Nichols algebra. Based on recent work of Heckenberger about Nichols algebras of diagonal type we compute explicitly the liftings of all Nichols algebras with Cartan matrix of type A_2, some Nichols algebras with Cartan matrix of type B_2, and some Nichols algebras of two Weyl equivalence classes of non-standard type, giving new classes of finite-dimensional pointed Hopf algebras.
This is a survey on the state-of-the-art of the classification of finite-dimensional complex Hopf algebras. This general question is addressed through the consideration of different classes of such Hopf algebras. Pointed Hopf algebras constitute the class best understood; the classification of those with abelian group is expected to be completed soon and there is substantial progress in the non-abelian case.
G-equivariant modular categories provide the input for a standard method to construct 3d homotopy field theories. Virelizier constructed a G-equivariant category from the action of a group G on a Hopf algebra H by Hopf algebra automorphisms. The neutral component of his category is the Drinfeld center of the category of H-modules. We generalize this construction to weak actions of a group G on an arbitrary monoidal category C by (possibly non-strict) monoidal auto-equivalences and obtain a G-equivariant category with neutral component the Drinfeld center of C.
This paper is concerned by the concept of algebra up to homotopy for a structure defined by two operations $.$ and [,]. An important example of such a structure is the Gerstenhaber algebra (commutatitve and Lie). The notion of Gerstenhaber algebra up to homotopy ($G_\\infty$ algebra) is known. Here, we give a definition of pre-Gerstenhaber algebra (pre-commutative and pre-Lie) allowing the construction of $\\hbox{pre}G_\\infty$ algebra. Given a structure of pre-commutative (Zinbiel) and pre-Lie algebra and working over the corresponding dual operads, we will give an explicit construction of the associated pre-Gerstenhaber algebra up to homotopy, this is a bicogebra (Leibniz and permutative) equipped with a codifferential which is a coderivation for the two coproducts.
We study the dynamical analogue of the matrix algebra M(n), constructed from a dynamical R-matrix given by Etingof and Varchenko. A left and a right corepresentation of this algebra, which can be seen as analogues of the exterior algebra representation, are defined and this defines dynamical quantum minor determinants as the matrix elements of these corepresentations. These elements are studied in more detail, especially the action of the comultiplication and Laplace expansions. Using the Laplace expansions we can prove that the dynamical quantum determinant is almost central, and adjoining an inverse the antipode can be defined. This results in the dynamical GL(n) quantum group associated to the dynamical R-matrix. We study a *-structure leading to the dynamical U(n) quantum group, and we obtain results for the canonical pairing arising from the R-matrix.
We consider principal subspaces $W_{L(k\\Lambda_0)}$ and $W_{N(k\\Lambda_0)}$ of standard module $L(k\\Lambda_0)$ and generalized Verma module $N(k\\Lambda_0)$ at level $k\\geq 1$ for affine Lie algebra of type $B_2^{(1)}$. By using the theory of vertex operator algebras, we find combinatorial bases of principal ubspaces in terms of quasi-particles. From quasi-particle bases, we obtain character formulas for $W_{L(k\\Lambda_0)}$ and $W_{N(k\\Lambda_0)}$.
We prove that the Shimizu L-function of a real quadratic field is obtained from a (Lorentzian) spectral triple on a noncommutative torus with real multiplication, as an adiabatic limit of the Dirac operator on a 3-dimensional solvmanifold. The Dirac operator on this 3-dimensional geometry gives, via the Connes-Landi isospectral deformations, a spectral triple for the noncommutative tori obtained by deforming the fiber tori to noncommutative spaces. The 3-dimensional solvmanifold is the homotopy quotient in the sense of Baum--Connes of the noncommutative space obtained as the crossed product of the noncommutative torus by the action of the units of the real quadratic field. This noncommutative space is identified with the twisted group C*-algebra of the fundamental group of the 3-manifold. The twisting can be interpreted as the cocycle arising from a magnetic field, as in the theory of the quantum Hall effect. We prove a twisted index theorem that computes the range of the trace on the K-theory of this noncommutative space and gives an estimate on the gaps in the spectrum of the associated Harper operator.
This is a sequel paper of arXiv:1306.1466 in which we study the comodules over a regular weak multiplier bialgebra over a field, with a full comultiplication. Replacing the usual notion of coassociative coaction over a (weak) bialgebra, a comodule is defined via a pair of compatible linear maps. Both the total algebra and the base (co)algebra of a regular weak multiplier bialgebra with a full comultiplication are shown to carry comodule structures. Kahng and Van Daele s integrals are interpreted as comodule maps from the total to the base algebra. Generalizing the counitality of a comodule to the multiplier setting, we consider the particular class of so-called full comodules. They are shown to carry bi(co)module structures over the base (co)algebra and constitute a monoidal category via the (co)module tensor product over the base (co)algebra. If a regular weak multiplier bialgebra with a full comultiplication possesses an antipode, then finite dimensional full comodules are shown to possess duals in the monoidal category of full comodules. Hopf modules are introduced over regular weak multiplier bialgebras with a full comultiplication. Whenever there is an antipode, the Fundamental Theorem of Hopf Modules is proven. It asserts that the category of Hopf modules is equivalent to the category of firm modules over the base algebra.
Nichols algebras naturally appear in the classification of finite dimensional pointed Hopf algebras. Assuming only that the base field has characteristic zero several new finite dimensional rank 2 Nichols algebras of diagonal type are listed. Each of them is described in terms of generators and relations. A Poincar\\ e--Birkhoff--Witt basis of all of these Nichols algebras is given and their dimension is computed. Together with the continuation of this paper this gives an answer to a question of Andruskiewitsch. Key Words: Hopf algebra, Lyndon words, full binary tree
Let p be a prime, and denote the class of radically graded finite dimensional quasi-Hopf algebras over C, whose radical has codimension p, by RG(p). The purpose of this paper is to continue the structure theory of finite dimensional quasi-Hopf algebras started in math.QA/0310253 (p=2) and math.QA/0402159 (p>2). More specifically, we completely describe the class RG(p) for p>2. Namely, we show that if H\\in RG(p) has a nontrivial associator, then the rank of H[1] over H[0] is \\le 1. This yields the following classification of H\\in RG(p), p>2, up to twist equivalence: (a) Duals of pointed Hopf algebras with p grouplike elements, classified in math.QA/9806074. (b) Group algebra of Z_p with associator defined by a 3-cocycle. (c) The algebras A(q), introduced in math.QA/0402159. This result implies, in particular, that if p>2 is a prime then any finite tensor category over C with exactly p simple objects which are all invertible must have Frobenius-Perron dimension p^N, N=1,2,3,4,5 or 7. In the second half of the paper we construct new examples of finite dimensional quasi-Hopf algebras H, which are not twist equivalent to a Hopf algebra. They are radically graded, and H/Rad(H)=C[Z_n^m], with a nontrivial associator. For instance, to every finite dimensional simple Lie algebra g and an odd integer n, coprime to 3 if g=G_2, we attach a quasi-Hopf algebra of dimension n^{dim(g)}.
In this article we prove that the full automorphism group of the baby-monster vertex operator superalgebra constructed by Hoehn is isomorphic to 2xB, where B is the baby-monster sporadic finite simple group and determine irreducible modules for the baby-monster vertex operator algebra. Our result has many corollaries. In particular, we can prove that the Z_2-orbifold construction with respect to a 2A-involution of the Monster applied to the moonshine vertex operator algebra yields the moonshine vertex operator algebra itself again.
We describe, for a few small examples, the Kauffman bracket skein algebra of a surface crossed with an interval. If the surface is a punctured torus the result is a quantization of the symmetric algebra in three variables (and an algebra closely related to a cyclic quantization of $U(so_3$). For a torus without boundary we obtain a quantization of \"the symmetric homologies\" of a torus (equivalently, the coordinate ring of the $SL_2(C)$-character variety of $Z \\oplus Z$). Presentations are also given for the four punctured sphere and twice punctured torus. We conclude with an investigation of central elements and zero divisors.
Jacobi polynomials are polynomials whose zeros form the unique solution of the Bethe Ansatz equation associated with two sl_2 irreducible modules. We study sequences of r polynomials whose zeros form the unique solution of the Bethe Ansatz equation associated with two highest weight sl_{r+1} irreducible modules, with the restriction that the highest weight of one of the modules is a multiple of the first fundamental weight. We describe the recursion which can be used to compute these polynomials. Moreover, we show that the first polynomial in the sequence coincides with the Jacobi-Pi\\~neiro multiple orthogonal polynomial and others are given by Wronskian type determinants of Jacobi-Pi\\~neiro polynomials. As a byproduct we obtain a counterexample to the Bethe Ansatz Conjecture for the Gaudin model.
We present a divisibility relation for the dimensions and Hilbert series of certain classes of Nichols algebras of non-abelian group type, which generalizes Nichols algebras over Coxeter groups with constant cocycle -1. For this we introduce three groups of isomorphisms acting on Nichols algebras, which generalize the exchange operator introduced by Milinski and Schneider for Coxeter groups in \"Pointed indecomposable Hopf algebras over Coxeter groups\".
We study the properties of one-dimensional hypergeometric integral solutions of the q-difference (\"quantum\") analogue of the Knizhnik-Zamolodchikov-Bernard equations on tori. We show that they also obey a difference KZB heat equation in the modular parameter, give formulae for modular transformations, and prove a completeness result, by showing that the associated Fourier transform is invertible. These results are based on SL(3,Z) transformation properties parallel to those of elliptic gamma functions.
This is a survey on the current status of the study of finite type invariants of integral homology 3-spheres based on lectures given in the workshop on knot theory at Banach International Center of Mathematics, Warsaw, July 1995. As a new result, we show that the space of finite type invariants of integral homology 3-spheres is a graded polynomial algebra generated by invariants additive under the connected sum. We also discuss some open questions on this subject.
A 1-qubit gate is defined as an element of the unitary group $U(2)$, the group of complex valued matrices whose conjugate transposes equal their inverses. In quantum computing, it is important to be able to find good approximations of 1-qubit gates by using a dense group generated by a universal subset of the projective special unitary group $G=PSU(2)$. Here, $PSU(2)$ is the group formed by taking all elements of $U(2)$ with determinant 1 and taking the quotient of this subgroup by the group $\\{I,-I\\}$ where $I$ is the identity matrix. In this http URL [1], Sarnak recently studied this problem motivated by developing a continued fraction type algorithm for this problem. The continued fraction algorithm is the fastest known algorithm to approximate real numbers by the dense subset of rational numbers. In this report, we study the efficiency of the approximation of $G$ by using a dense group generated by a universal subset of $G$. The measure of the efficiency $K(g)$ of an arbitrary universal subset $g$ is defined in [1] and satisfies $K(g)\\geqslant 1$. $g$ is more efficient when $K(g)$ is closer to $1$. We address some open problems posed by Sarnak in [1]. This report forms the basis of the shorter preprint [LD].
For $A$ a Hopf algebra of arbitrary dimension over a field $K$, it is well-known that if $A$ has nonzero integrals, or, in other words, if the coalgebra $A$ is co-Frobenius, then the space of integrals is one-dimensional and the antipode of $A$ is bijective. Bulacu and Caenepeel recently showed that if $H$ is a dual quasi-Hopf algebra with nonzero integrals, then the space of integrals is one-dimensional, and the antipode is injective. In this short note we show that the antipode is bijective.
A very well known result by Harish-Chandra claims that any Hermitian symmetric space of non-compact type admits a canonical embedding into a complex vector space $V$. The image of this embedding is a bounded symmetric domain in $V$. This work provides a construction of q-analogues of a polynomial algebra on $V$ and the differential algebra of exterior forms on $V$. A way of producing a q-analogue of the bounded function algebra in a bounded symmetric domain is described. All the constructions are illustrated by detailed calculations in the case of the simplest Hermitian symmetric space $SU(1,1)/U(1)$. The development of these ideas can be found in math.QA/9803110 and math.QA/9809038 .
In order to obtain a classification of all possible quantum deformations of the two-photon algebra $h_6$, we introduce its corresponding general Lie bialgebra, which is a coboundary one. Two non-standard quantum deformations of $h_6$, together with their associated quantum universal R-matrix, are presented; each of them contains either a quantum harmonic oscillator subalgebra or a quantum gl(2) subalgebra. One-boson representations for these quantum two-photon algebras are derived and translated into Fock--Bargmann realizations. In this way, a systematic study of `deformed  states of light in quantum optics can be developed.
Let $H$ be a Hopf algebra. Any finite-dimensional lifting of $V\\in {}^{H}_{H}\\mathcal{YD}$ arising as a cocycle deformation of $A=\\mathfrak{B}(V)\\#H$ defines a twist in the Hopf algebra $A^*$, via dualization. We follow this recipe to write down explicit examples and show that it extends known techniques for defining twists. We also contribute with a detailed survey about twists in braided categories.
In this paper we define a new class of the quantum integrable systems associated with the quantization of the cotangent bundle $T^*(GL(N))$ to the Lie algebra $\\frak{gl}_N$. The construction is based on the Gelfand-Zetlin maximal commuting subalgebra in $U(\\frak{gl}_N)$. We discuss the connection with the other known integrable systems based on $T^*GL(N)$. The construction of the spectral tower associated with the proposed integrable theory is given. This spectral tower appears as a generalization of the standard spectral curve for integrable system.
We present a formalism within which the relationship (discovered by Drinfel d) between associators (for quasi-triangular quasi-Hopf algebras) and (a variant of) the Grothendieck-Teichmuller group becomes simple and natural, leading to a simplification of Drinfel d s original work. In particular, we re-prove that rational associators exist and can be constructed iteratively, though the proof itself still depends on the apriori knowledge that a not-necessarily-rational associator exists.
The level 1 highest weight modules of the quantum affine algebra $U_q(\\widehat{\\frak{sl}}_n)$ can be described as spaces of certain semi-infinite wedges. Using a $q$-antisymmetrization procedure, these semi-infinite wedges can be realized inside an infinite tensor product of evaluation modules. This realization gives rise to simple descriptions of vertex operators and (up to a scalar function) their compositions.
With any skew Young diagram one can associate a one parameter family of \"elementary\" modules over the Yangian $\\Yg(\\g\\l_N)$. Consider the twisted Yangian $\\Yg(\\g_N)\\subset \\Yg(\\g\\l_N)$ associated with a classical matrix Lie algebra $\\g_N\\subset\\g\\l_N$. Regard the tensor product of elementary Yangian modules as a module over $\\Yg(\\g_N)$ by restriction. We prove its irreducibility for generic values of the parameters.
We show Koszulness of the prop governing involutive Lie bialgebras and also of the props governing non-unital and unital-counital Frobenius algebras, solving a long-standing problem. This gives us minimal models for their deformation complexes, and for deformation complexes of their algebras which are discussed in detail. Using an operad of graph complexes we prove, with the help of an earlier result of one of the authors, that there is a highly non-trivial action of the Grothendieck-Teichm\\\"uller group $GRT_1$ on (completed versions of) the minimal models of the properads governing Lie bialgebras and involutive Lie bialgebras by automorphisms. As a corollary one obtains a large class of universal deformations of any (involutive) Lie bialgebra and any Frobenius algebra, parameterized by elements of the Grothendieck-Teichm\\\"uller Lie algebra. We also prove that, for any given homotopy involutive Lie bialgebra structure in a vector space, there is an associated homotopy Batalin-Vilkovisky algebra structure on the associated Chevalley-Eilenberg complex.
We study graded nonlocal $\\underline{\\mathsf{q}}$-vertex algebras and we prove that they can be generated by certain sets of vertex operators. As an application, we consider the family of graded nonlocal $\\underline{\\mathsf{q}}$-vertex algebras $V_{c,1}$, $c\\geq 1$, associated with the principal subspaces $W(c\\Lambda_0)$ of the integrable highest weight $U_q (\\hat{\\mathfrak{sl}}_2)$-modules $L(c\\Lambda_0)$. Using quantum integrability, we derive combinatorial bases for $V_{c,1}$ and compute the corresponding character formulae.
Let H be a finite-dimensional quasibialgebra. We show that H is a quasi-Hopf algebra if and only if the category of its finite-dimensional left modules is rigid if and only if a structure theorem for Hopf modules over H holds. We also show that a dual structure theorem for Hopf modules over a coquasibialgebra H holds if and only if the category of finite-dimensional right H-comodules is rigid; this is not equivalent to H being a coquasi-Hopf algebra.
We define generalized bialgebras and Hopf algebras and on this basis we introduce quantum categories and quantum groupoids. The quantization of the category of linear (super)spaces is constructed. We establish a criterion for the classical value of the dimension of the polynomial function algebra on the full subcategory of this quantum category specified by Sudbery type commutation relations for quantum vector spaces (the ``Poincare -- Birkhoff -- Witt property  ). The criterion is the equality of the ``quantum constants   $c_\\a=c_\\b^{\\pm 1}$ of the quantum vector spaces. (These constants appeared in earlier works on PBW for the multiparameter quantization of the general linear group.) Links with the Yang-Baxter equation and the Yang -- Baxter structures of quantum linear spaces are established. The role of categories as a generalization of groups is discussed.
The construction of a quantum groupoid out of a double groupoid satisfying a filling condition and a perturbation datum is given. This extends previous work that appeared in math.QA/0308228. Several important classes of examples of tensor categories are shown to fit into this construction. Certain invariants such as a pivotal group-like element and quantum and Frobenius-Perron dimensions of simple objects are computed.
The trace of intertwining operators over the level one irreducible highest weight modules of the quantum affine algebra of type A_{N-1} is studied. It is proved that the trace function gives a basis of the solution space of the qKZ equation at a generic level. The highest-highest matrix element of the composition of intertwining operators is explicitly calculated. The integral formula for the trace is presented.
A rational Ansatz is proposed for the generating function $\\sum_{j,k} \\beta_{2j+k,2j}x^j y^k$, where $\\beta_{m,u}$ is the number of primitive chinese character diagrams with $u$ univalent and $2m-u$ trivalent vertices. For $P_m:=\\sum_{u\\ge2}\\beta_{m,u}$, the conjecture leads to the sequence $$1,1,1,2,3,5,8,12,18,27,39,55,\\underline{78,108,150,207,284,388,532,726}$$ for primitive chord diagrams of degrees $m\\le20$, with predictions underlined. The asymptotic behaviour $\\lim_{m\\to\\infty}P_m/r^m= 1.06260548918755$ results, with $r=1.38027756909761$ solving $r^4=r^3+1$. Vassiliev invariants of knots are then enumerated by $$0,1,1,3,4,9,14,27,44, 80,132,232,\\underline{384,659,1095,1851,3065,5128,8461,14031}$$ and Vassiliev invariants of framed knots by $$1,2,3,6,10,19,33,60,104,184,316, 548,\\underline{932,1591,2686,4537,7602,12730,21191,35222}$$ These conjectures are motivated by successful enumerations of irreducible Euler sums. Predictions for $\\beta_{15,10}$, $\\beta_{16,12}$ and $\\beta_{19,16}$ suggest that the action of sl and osp Lie algebras, on baguette diagrams with ladder insertions, fails to detect an invariant in each case.
Let V be a simple vertex operator algebra and G a finite automorphism group. Then there is a natural right G-action on the set of all inequivalent irreducible V-modules. Let S be a finite set of inequivalent irreducible V-modules which is closed under the action of G. There is a finite dimensional semisimple associative algebra A_{\\alpha}(G,S) for a suitable 2-cocycle \\alpha naturally determined by the G-action on S such that A_{\\alpha}(G,S) and the vertex operator algebra V^G form a dual pair on the sum of V-modules in S in the sense of Howe. In particular, every irreducible V-module is completely reducible V^G-module.
We unify parastatistics, defined as triple operator algebras represented on Fock space, in a simple way using the transition number operators. We express them as a normal ordered expansion of creation and annihilation operators. We discuss several examples of parastatistics, particularly Okubo s and Palev s parastatistics connected to many-body Wigner quantum systems. We relate them to the notion of extended Haldane statistics.
Let $V$ be a vertex algebra and $M$ a $V$-module. We define the first and second cohomology of $V$ with coefficients in $M$, and we show that the second cohomology $H^{2}(V, M)$ corresponds bijectively to the set of equivalence classes of square-zero extensions of $V$ by $M$. In the case that $M=V$, we show that the second cohomology $H^{2}(V, V)$ corresponds bijectively to the set of equivalence classes of first order deformations of $V$.
Using the recently developed theory of finite type invariants of integral homology 3-spheres we study the structure of the Torelli group of a closed surface. Explicitly, we construct (a) natural cocycles of the Torelli group (with coefficients in a space of trivalent graphs) and cohomology classes of the abelianized Torelli group; (b) group homomorphisms that detect (rationally) the nontriviality of the lower central series of the Torelli group. Our results are motivated by the appearance of trivalent graphs in topology and in representation theory and the dual role played by the Casson invariant in the theory of finite type invariants of integral homology 3-spheres and in Morita s study of the structure of the Torelli group Our results generalize those of S. Morita {Mo1,Mo2} and complement the recent calculation, due to R. Hain, of the I-adic completion of the rational group ring of the Torelli group. We also give analogous results for two other subgroups of the mapping class group.
The interaction of a Lie algebra $\\LL,$ having a weight space decomposition with respect to a nonzero toral subalgebra, with its corresponding root system forms a powerful tool in the study of the structure of $\\LL.$ This, in particular, suggests a systematic study of the root system apart from its connection with the Lie algebra. Although there have been a lot of researches in this regard on Lie algebra level, such an approach has not been considered on Lie superalgebra level. In this work, we introduce and study extended affine root supersystems which are a generalization of both affine reflection systems and locally finite root supersystems. Extended affine root supersystems appear as the root systems of the super version of extended affine Lie algebras and invariant affine reflection algebras including affine Lie superalgebras. This work provides a framework to study the structure of this kind of Lie superalgebras refereed to as extended affine Lie superalgebras.
We show that all possible categories of Yetter-Drinfeld modules over a quasi-Hopf algebra $H$ are isomorphic. We prove also that the category $\\yd^{\\rm fd}$ of finite dimensional left Yetter-Drinfeld modules is rigid and then we compute explicitly the canonical isomorphisms in $\\yd^{\\rm fd}$. Finally, we show that certain duals of $H_0$, the braided Hopf algebra introduced in \\cite{bn,bpv}, are isomorphic as braided Hopf algebras if $H$ is a finite dimensional triangular quasi-Hopf algebra.
We give a complete classification of the 32-dimensional pointed Hopf algebras over an algebraically closed field k with characteristic different from 2. It turns out that there are infinite families of isomorphism classes of pointed Hopf algebras of dimension 32. In [Andruskiewitsch-Schneider, J. Alg 209], [Beattie-Dascalescu-Grunenfelder, Invent. Math. 136 (1)] and [Gelaki, J. Alg 209] are given families of counterexamples for the tenth Kaplansky conjecture. Up to now, 32 is the lowest dimension where Kaplansky conjecture fails.
We consider new class of classical r-matrices for D=3 and D=4 conformal Lie algebras. These r-matrices do satisfy the classical Yang-Baxter equation and as two-tensors belong to the tensor product of Borel subalgebra. In such a way we generalize the lowest order of known nonstandard quantum deformation of sl(2) to the Lie algebras sp(4) = so(5) and sl(4) = so(6). As an exercise we interpret nonstandard deformation of sl(2) as describing quantum D=1 conformal algebra with fundamental mass parameter. Further we describe the D=3 and D=4 conformal bialgebras with deformation parameters equal to the inverse of fundamental masses. It appears that for D=4 the deformation of the Poincare algebra sector coincides with \"null plane\" quantum Poincare algebra.
The Kauffman bracket skein module $K(M)$ of a 3-manifold $M$ is defined over formal power series in the variable $h$ by letting $A=e^{h/4}$. For a compact oriented surface $F$, it is shown that $K(F \\times I)$ is a quantization of the $\\g$-characters of the fundamental group of $F$, corresponding to a geometrically defined Poisson bracket. Finite type invariants for unoriented knots and links are defined. Topologically free Kauffman bracket modules are shown to generate finite type invariants. It is shown for compact $M$ that $K(M)$ can be generated as a module by cables on a finite set of knots. Moreover, if $M$ contains no incompressible surfaces, the module is finitely generated.
We consider a central extension of the mapping class group of a surface with a collection of framed colored points. The Witten-Reshetikhin-Turaev TQFTs associated to SU(2) and SO(3) induce linear representations of this group. We show that the denominators of matrices which describe these representation over a cyclotomic field can be restricted in many cases. In this way, we give a proof of the known result that if the surface is a torus and there are no colored points, the representations have finite image.
In \\cite{Kreimer1,Connes,Broadhurst,Kreimer2}, a commutative, non cocommutative Hopf algebra H_R of (decorated) rooted trees was introduced. It is related to the Hopf algebra H_CM introduced in \\cite{Moscovici}. Its dual Hopf algebra is the enveloping algebra of the Lie algebra of rooted trees L^1. In this paper, we introduce a non commutative, non cocommutative Hopf algebra H_PR of decorated planar rooted trees. We first show that H_PR is self dual. We then use this result to construct a non degenerate bilinear form (,) on H_PR, which respects the Hopf algebra structure of H_PR. Moreover, we give a combinatorial expression for the bilinear form (,). This allows us to give a direct formula for a basis of the primitive elements of H_PR. In the next sections, we show that H_PR is isomorphic to the Hopf algebra of planar binary trees introduced in \\cite{Frabetti, Brouder}, and construct a subalgebra of formal non commutative diffeomorphisms. We then classify the Hopf algebra endomorphisms and coalgebra endomorphisms of H_PR. In the last sections, we give results about tensorial coalgebras and apply them to H_PR and H_R. We show how to construct the primitive elements of H_R from the primitive elements of H_PR and finally prove that L^1 is a free Lie algebra.
The theory of Nichols algebras of diagonal type is known to be closely related to that of semisimple Lie algebras. In this paper the connection between both theories is made closer. For any Nichols algebra of diagonal type invertible transformations are introduced, which remind one of the action of the Weyl group on the root system associated to a semisimple Lie algebra. They give rise to the definition of a Brandt groupoid. As an application an alternative proof of classification results of Rosso, Andruskiewitsch, and Schneider is obtained without using any technical assumptions on the braiding. Key Words: Brandt groupoid, Hopf algebra, pseudo-reflections, Weyl group
We introduce and study the new notion of an {\\em exact factorization} $\\mathcal{B}=\\mathcal{A}\\bullet \\mathcal{C}$ of a fusion category $\\mathcal{B}$ into a product of two fusion subcategories $\\mathcal{A},\\mathcal{C}\\subseteq \\mathcal{B}$ of $\\mathcal{B}$. This is a categorical generalization of the well known notion of an exact factorization of a finite group into a product of two subgroups. We then relate exact factorizations of fusion categories to exact sequences of fusion categories with respect to an indecomposable module category, which was introduced and studied by P. Etingof and the author in \\cite{EG}. We also apply our results to study extensions of a group-theoretical fusion category by another one, provide some examples, and propose a few natural questions.
We study the group of group-like elements of a weak Hopf algebra and derive an analogue of Radford s formula for the fourth power of the antipode S, which implies that the antipode has a finite order modulo a trivial automorphism. We find a sufficient condition in terms of Tr(S^2) for a weak Hopf algebra to be semisimple, discuss relation between semisimplicity and cosemisimplicity, and apply our results to show that a dynamical twisting deformation of a semisimple Hopf algebra is cosemisimple.
The double quantum groups are the Hopf algebras underlying the complex quantum groups of which the simplest example is the quantum Lorentz group. They are non- standard quantizations of the double group $G \\times G$. We construct a corresponding quantized universal enveloping algebra (QUE) and prove that the pairing between a quantum double group and its QUE is nondegenerate. We analyze the representation theory of these double quantum groups, give a detailed version of the Iwasawa decomposition proved by Podles and Woronowicz for the quantum Lorentz group, and show that they are noetherian algebras. Finally we outline a construction of more general non-standard quantum groups using quantum double groups and their generalizations.
We present a quantum version of the construction of the KZ system of equations as a flat connection on the spaces of coinvariants of representations of tensor products of Kac-Moody algebras. We consider here representations of a tensor product of Yangian doubles and compute the coinvariants of a deformation of the subalgebra generated by the regular functions of a rational curve with marked points. We observe that Drinfeld s quantum Casimir element can be viewed as a deformation of the zero-mode of the Sugawara tensor in the Yangian double. These ingredients serve to define a compatible system of difference equations, which we identify with the quantum KZ equations introduced by I. Frenkel and N. Reshetikhin.
We put the known results on the antipode of a usual quasitriangular Hopf algebra into the framework of multiplier Hopf algebras. We illustrate with examples which can not be obtained using classical Hopf Algebras. The focus of the present paper lies on the class of the so-called group cograded multiplier Hopf algebras. By doing so, we bring the results of quasitriangular Hopf group-coalgebras (as introduced by Turaev) to the more general framework of multiplier Hopf algebras.
Algebras of functions on quantum weighted projective spaces are introduced, and the structure of quantum weighted projective lines or quantum teardrops are described in detail. In particular the presentation of the coordinate algebra of the quantum teardrop in terms of generators and relations and classification of irreducible *-representations are derived. The algebras are then analysed from the point of view of Hopf-Galois theory or the theory of quantum principal bundles. Fredholm modules and associated traces are constructed. C*-algebras of continuous functions on quantum weighted projective lines are described and their K-groups computed.
Manin associated to a quadratic algebra (quantum space) the quantum matrix group of its automorphisms. This Talk aims to demonstrate that Manin s construction can be extended for quantum spaces which are non-quadratic homogeneous algebras. Here given a regular Artin-Schelter algebra of dimension 3 we construct the quantum group of its symmetries, i.e., the Hopf algebra of its automorphisms. For quadratic Artin-Schelter algebras these quantum groups are contained in the the classification of the GL(3) quantum matrix groups due to Ewen and Ogievetsky. For cubic Artin-Schelter algebras we obtain new quantum groups which are automorphisms of cubic quantum spaces.
Given a polynomial P of partial derivatives of the Kahler metric, expressed as a linear combination of directed multigraphs, we prove a simple criterion in terms of the coefficients for $P$ to be an invariant polynomial, i.e. invariant under the transformation of coordinates. As applications, we prove an explicit composition formula for covariant differential operators under a canonical basis, also known as invariant differential operators in the case of bounded symmetric domains. We also prove a general explicit formula of star products on Kahler manifolds.
Using the concept of mixable shuffles, we formulate explicitly the quantum quasi-shuffle product. We also provide a desirable description of the subalgebra generated by the set of primitive elements of the quantum quasi-shuffle bialgebra. A braided coalgebra structure which is dual to the quantum quasi-shuffle in some sense is constructed as well. We use quantum quasi-shuffle algebras to provide examples of Rota-Baxter algebras and tridendriform algebras.
Series of finite dimensional representations of the superalgebras spl(p,q) can be formulated in terms of linear differential operators acting on a suitable space of polynomials. We sketch the general ingredients necessary to construct these representations and present examples related to spl(2,1) and spl(2,2). By revisiting the products of projectivised representations of sl(2), we are able to construct new sets of differential operators preserving some space of polynomials in two or more variables. In particular, this allows to express the representation of spl(2,1) in terms of matrix differential operators in two variables. The corresponding operators provide the building blocks for the construction of quasi exactly solvable systems of two and four equations in two variables. We also present a quommutator deformation of spl(2,1) which, by construction, provides an appropriate basis for analyzing the quasi exactly solvable systems of finite difference equations.
We study various aspects of Fedosov star-products on symplectic manifolds. By introducing the notion of \"quantum exponential maps\", we give a criterion characterizing Fedosov connections. As a consequence, a geometric realization is obtained for the equivalence between an arbitrary *-product and a Fedosov one. Every Fedosov *-product is shown to be a Vey *-product. Consequently, one obtains that every *-product is equivalent to a Vey * -product, a classical result of Lichnerowicz. Quantization of a hamiltonian G-space, and in particular, quantum momentum maps are studied. Lagrangian submanifolds are also studied under a deformation quantization.
We study a particular category ${\\cal{C}}$ of $\\gl_{\\infty}$-modules and a subcategory ${\\cal{C}}_{int}$ of integrable $\\gl_{\\infty}$-modules. As the main results, we classify the irreducible modules in these two categories and we show that every module in category ${\\cal{C}}_{int}$ is semi-simple. Furthermore, we determine the decomposition of the tensor products of irreducible modules in category ${\\cal{C}}_{int}$.
Let V be a simple vertex operator algebra and let G be a finite automorphism group of V. In [DY], it was shown that any irreducible V-module is a completely reducible V^G-module where V^G is the G-invariant sub-vertex operator algebra of V. In this paper, we give an alternative proof of this fact using the theory of skew group algebras. We also extend this result to any irreducible g-twisted V-module when g is in the center of G and V is a g-rational vertex operator algebra.
Motivated by the theory of unitary representations of finite dimensional Lie supergroups, we describe those Lie superalgebras which have a faithful finite dimensional unitary representation. We call these Lie superalgebras unitary. This is achieved by describing the classification of real finite dimensional compact simple Lie superalgebras, and analyzing, in a rather elementary and direct way, the decomposition of reductive Lie superalgebras ($\\g$ is a semisimple $\\g_{\\bar 0}$-module) over fields of characteristic zero into ideals.
We introduce and study the triple of a quasitriangular Lie bialgebra as a natural extension of the Drinfeld double. The triple is itself a quasitriangular Lie bialgebra. We prove several results about the algebraic structure of the triple, analogous to known results for the double. Among them, we prove that in the factorisable case the triple is isomorphic to a twisting of $g \\oplus g \\oplus g$ by a certain cocycle. We also consider real forms of the triple and the triangular case.
Using the quantum Fourier transform F, we describe the block decomposition and multiplicative structure of a subalgebra Z + F(Z) in the center of the small quantum group u_l at a root of unity. It contains the previously known subalgebra Z, which is isomorphic to the algebra of characters of finite dimensional modules over u_l. We prove that the intersection $Z \\cap F(Z)$ coincides with the annihilator of the radical of Z. The whole center of u_l coincides with the obtained subalgebra Z + F(Z) in case of sl_2, and is bigger than that in general.
Simplicial formal maps were introduced in the first paper, (math.QA/0512032), of this series as a tool for studying Homotopy Quantum Field Theories with background a general homotopy 2-type. Here we continue their study, showing how a natural generalisation can handle much more general backgrounds. The question of the geometric interpretation of these formal maps is partially answered in terms of combinatorial bundles. This suggests new interpretations of HQFTs.
In the paper \"On some unsolved problems in quantum group theory\", V.Drinfeld formulated the problem of the existence of a universal quantization for Lie bialgebras. When the paper \"Tensor structures arising from affine Lie algebras, III\", by Kazhdan and Lusztig, appeared, Drinfeld asked whether its methods could be useful for the problem of universal quantization of Lie bialgebras. In this paper we use these methods to construct the universal quantization, which gives a positive answer to Drinfeld s question. We also show the existence of universal quantization of classical r-matrices, unitary r-matrices, and quasitriangular Lie bialgebras, which answers the corresponding questions of Drinfeld.
In this paper, we study formal deformations of Poisson structures, especially for three families of Poisson varieties in dimensions two and three. For these families of Poisson structures, using an explicit basis of the second Poisson cohomology space, we solve the deformation equations at each step and obtain a large family of formal deformations for each Poisson structure which we consider. With the help of an explicit formula, we show that this family contains, modulo equivalence, all possible formal deformations. We show moreover that, when the Poisson structure is generic, all members of the family are non-equivalent.
We introduce a noncommutative and noncocommutative Hopf algebra which takes for certain Hopf categories (and therefore braided monoidal bicategories) a similar role as the Grothendieck- Teichmueller group for quasitensor categories. We also give a result which highly restricts the possibility for similar structures for even higher weak n-categories than bicategories by showing that these structures would not allow for any nontrivial deformations. Finally, we give an explicit description of the elements of this Hopf algebra.
We prove that the knot invariant induced by a $\\Bbb Z$-homology 3-sphere invariant of order $\\leq k$ in Ohtsuki s sense, where $k\\geq 4$, is of order $\\leq k-2$. The method developed in our computation shows that there is no $\\Bbb Z$-homology 3-sphere invariant of order 5. This result agrees with a conjecture of Rozansky based on physical predictions about the asymptotic behavior of Witten s Chern-Simons path integral.
The q-character is a strong tool to study finite-dimensional representations of quantum affine algebras. However, the explicit formula of the q-character of a given representation has not been known so far. Frenkel and Mukhin proposed the iterative algorithm which generates the q-character of a given irreducible representation starting from its highest weight monomial. The algorithm is known to work for various classes of representations. In this note, however, we give an example in which the algorithm fails to generate the q-character.
We propose the following principle to study pointed Hopf algebras, or more generally, Hopf algebras whose coradical is a Hopf subalgebra. Given such a Hopf algebra A, consider its coradical filtration and the associated graded coalgebra grad(A). Then grad(A) is a graded Hopf algebra, since the coradical A_0 of A is a Hopf subalgebra. In addition, there is a projection \\pi: grad(A) \\to A_0; let R be the algebra of coinvariants of \\pi. Then, by a result of Radford and Majid, R is a braided Hopf algebra and grad(A) is the bosonization (or biproduct) of R and A_0: grad(A) is isomorphic to (R # A_0). The principle we propose to study A is first to study R, then to transfer the information to grad(A) via bosonization, and finally to lift to A. In this article, we apply this principle to the situation when R is the simplest braided Hopf algebra: a quantum linear space. As consequences of our technique, we obtain the classification of pointed Hopf algebras of order p^3 (p an odd prime) over an algebraically closed field of characteristic zero; with the same hypothesis, the characterization of the pointed Hopf algebras whose coradical is abelian and has index p or p^2; and an infinite family of pointed, non-isomorphic, Hopf algebras of the same dimension. This last result gives a negative answer to a conjecture of I. Kaplansky.
An algebraic analysis framework for quantum calculus is proposed. The quantum derivative operator $D_{\\tau ,\\sigma}$ is based on two commuting bijections $\\tau$ and $\\sigma$ defined on an arbitrary set $M$ equipped with a tension structure determined by a single tension function $\\theta$, i.e. a 1-dimensional case is analyzed here. The well known cases, i.e. $h$- and $q$-calculi together with their symmetric versions, can be obtained owing to special choice of mappings $\\tau$ and $\\sigma$.
We introduce the notion of Gamma-Lie bialgebra, where Gamma is a group. These objects give rise to cocommutative co-Poisson algebras, for which we construct quantization functors. This enlarges the class of co-Poisson algebras for which a quantization is known. Our result relies on our earlier work, where we showed that twists of Lie bialgebras can be quantized; we complement this work by studying the behavior of this quantization under compositions of twists.
We study monoidal categories that enjoy a certain weakening of the rigidity property, namely, the existence of a dualizing object in the sense of Grothendieck and Verdier. We call them Grothendieck-Verdier categories. Notable examples include the derived category of constructible sheaves on a scheme (with respect to tensor product) as well as the derived and equivariant derived categories of constructible sheaves on an algebraic group (with respect to convolution). We show that the notions of pivotal category and ribbon category, which are well known in the setting of rigid monoidal categories, as well as certain standard results associated with these notions, have natural analogues in the world of Grothendieck-Verdier categories.
Noncommutative (NC) sphere is introduced as a quotient of the enveloping algebra of the Lie algebra su(2). Using the Cayley-Hamilton identities we introduce projective modules which are analogues of line bundles on the usual sphere (we call them quantum line bundles) and define a multiplicative structure in their family. Also, we compute a pairing between certain quantum line bundles and finite dimensional representations of the NC sphere in the spirit of the NC index theorem. A new approach to constructing the differential calculus on a NC sphere is suggested. The approach makes use of the projective modules in question and gives rise to a NC de Rham complex being a deformation of the classical one.
Aspects of the algebraic structure and representation theory of the quantum affine superalgebras with symmetrizable Cartan matrices are studied. The irreducible integrable highest weight representations are classified, and shown to be deformations of their classical counterparts. It is also shown that Jimbo type quantum affine superalgebras can be obtained by deforming universal enveloping algebras of ordinary (i.e., non-graded) affine algebras supplemented by certain parity operators.
We introduce a new family of symmetric functions, which are $q$-analogues of products of Schur functions defined in terms of ribbon tableaux. These functions can be interpreted in terms of the Fock space representation of the quantum affine algebra of type $A_{n-1}^{(1)}$ and are related to Hall-Littlewood functions via the geometry of flag varieties. We present a series of conjectures, and prove them in special cases. The essential step in proving that these functions are actually symmetric consists in the calculation of a basis of highest weight vectors of the $q$-Fock space using ribbon tableaux.
Previous work has shown that certain leading orders of arbitrary Vassiliev invariants are generically in the algebra of the coefficients of the Alexander-Conway polynomial \\cite{KSA}. Here we illustrate this for a large class of examples, exposing the simple logic behind several existing results in the literature \\cite{FKV,BNG}. This approach facilitates an extension to a large class of Lie (super)algebras.
A modular category is a braided category with some additional algebraic features. The interest of this concept is that it provides a Topological Quantum Field Theory in dimension 3. The Verlinde formulas associated with a modular category are the dimensions of the TQFT modules. We compute this formulas and discuss reductions and refinements for modular categories related with SU(N).Our main result is a splitting of the Verlinde formula, corresponding to a brick decomposition of the TQFT modules whose summands are indexed by spin structures modulo an even integer.We introduce the notion of a spin modular category, and give the proof of the decomposition theorem in this general context.
We present some results concerning the generalized homologies associated with nilpotent endomorphisms $d$ such that $d^N=0$ for some integer $N\\geq 2$. We then introduce the notion of graded $q$-differential algebra and describe some examples. In particular we construct the $q$-analog of the simplicial differential on forms, the $q$-analog of the Hochschild differential and the $q$-analog of the universal differential envelope of an associative unital algebra.
The goal of the present paper is to classify an interesting class of elementary quasi-Hopf algebras, or equivalently, finite-dimensional pointed Majid algebras. By a Tannaka-Krein type duality, this determines a big class of pointed finite tensor categories. Based on some interesting observations of normalized 3-cocycles on finite abelian groups, we elucidate an explicit connection between our objective pointed Majid algebras and finite-dimensional pointed Hopf algebras over finite abelian groups. With a help of this connection and the successful theory of diagonal Nichols algebras over abelian groups, we provide a conceptual classification of finite-dimensional graded pointed Majid algebras of diagonal type. Some efficient methods of construction are also given.
The concept of arithmetic root systems is introduced. It is shown that there is a one-to-one correspondence between arithmetic root systems and Nichols algebras of diagonal type having a finite set of (restricted) Poincare -Birkhoff-Witt generators. This has strong consequences for both objects. As an application all rank 2 Nichols algebras of diagonal type having a finite set of (restricted) Poincare -Birkhoff-Witt generators are determined. Key Words: Brandt groupoid, Hopf algebra, pseudo-reflections, Weyl group
Let $O$ be a closed Poisson conjugacy class of the complex algebraic Poisson group GL(n) relative to the Drinfeld-Jimbo factorizable classical r-matrix. Denote by $T$ the maximal torus of diagonal matrices in GL(n). With every $a\\in O\\cap T$ we associate a highest weight module $M_a$ over the quantum group $U_q(gl(n))$ and an equivariant quantization $C_{h,a}[O]$ of the polynomial ring $C[O]$ realized by operators on $M_a$. All quantizations $C_{h,a}[O]$ are isomorphic and can be regarded as different exact representations of the same algebra, $C_{h}[O]$. Similar results are obtained for semisimple adjoint orbits in $gl(n)$ equipped with the canonical GL(n)-invariant Poisson structure.
Certain combinatorial bases of Feigin-Stoyanovsky s type subspaces of level k standard modules for affine Lie algebra sl(r,C)\\sptilde are parametrized by (k,r)-admissible configurations. In this note we use Capparelli-Lepowsky-Milas  method to give a new proof of linear independence of these bases, the main ingredient in the proof being the use of Dong-Lepowsky s intertwining operators for fundamental sl(r,C)\\sptilde-modules.
In this paper, we study the minimal affinizations over the quantum affine algebras of type $C_n$ by using the theory of cluster algebras. We show that the $q$-characters of a large family of minimal affinizations of type $C_n$ satisfy some systems of equations. These equations correspond to mutation equations of some cluster algebras. Furthermore, we show that the minimal affinizations in these equations correspond to cluster variables in these cluster algebras.
We introduce twists by Cartan elements of conformal blocks on a curve X, corresponding to a Lie algebra g. We show that these twists define holomorphic functions, with theta-like behaviour, on a product of copies of its Jacobian J(X)^r. We then parametrise the conformal blocks by their twisted correlation functions of nilpotent currents, in the spirit of Feigin-Stoyanovsky. We compute the action of the Sugawara tensor in terms of these correlation functions. The result is a family of operators acting on forms on the product J(X)^r \\times \\prod_{i} S^{n_i}X of the Jacobian of X with its symmetric powers. These operators act by differentiation in the Jacobian directions, and evaluations and residues in the variables of the symmetric powers. They serve to express the KZB connection, which we view as a connection on the space of curves with marked a-cycles. These operators also make sense when the level is critical. In that case, they commute with each other. We explain their connection with the Beilinson-Drinfeld operators. In a sequel to this paper, we will do a similar computation in the q-deformed case, replacing the inclusion of the enveloping algebras of the Lie algebra of regular functions on X in that of functions on the formal disc by some inclusion of quasi-Hopf algebras, which were introduced in work of one of us and V. Rubtsov. The outcome is a commuting family of difference-evaluation operators, which may be viewed in the rational case as the Bethe ansatz formulation of the qKZ operators.
One of the most fundamental problems in the theory of finite- dimensional Hopf algebras is their classification over an algebraically closed field k of characteristic 0. This problem is extremely difficult, hence people restrict it to certain classes of Hopf algebras, e.g. to semisimple ones. Semisimple Hopf algebras deserve to be considered as \"quantum\" analogue of finite groups, but even so, the problem remains extremely hard (even in low dimensions) and very little is known. A great boost to the theory of Hopf algebras was given by Drinfeld who invented the fundamental class of (quasi)triangular Hopf algebras (A,R). Thus, it is natural to first try to classify semisimple triangular Hopf algebras (A,R) over k (i.e. R is unitary). The theory of such Hopf algebras is now essentially closed by a sequence of works by P. Etingof and the author. The key theorem in this theory states that A is obtained from a group algebra of a unique (up to isomorphism) finite group by twisting its usual comultiplication. The proof of this theorem relies on Deligne s theorem on Tannakian categories in an essentail way. The purpose of this paper is to explain the proof in full details. In particular, to discuss all the necessary background from category theory (e.g. symmetric, rigid, and Tannakian categories), and the properties of the category of representations of triangular (semisimple) Hopf algebras.
We study generalised differential structures $\\Omega^1,d$ on an algebra $A$, where $A\\tens A\\to \\Omega^1$ given by $a\\tens b\\to a d b$ need not be surjective. The finite set case corresponds to quivers with embedded digraphs, the Hopf algebra left covariant case to pairs $(\\Lambda^1,\\omega)$ where $\\Lambda^1$ is a right module and $\\omega$ a right module map, and the Hopf algebra bicovariant case corresponds to morphisms $\\omega:A^+\\to \\Lambda^1$ in the category of right crossed (or Drinfeld-Radford-Yetter) modules over $A$. When $A=U(g)$ the generalised left-covariant differential structures are classified by cocycles $\\omega\\in Z^1(g,\\Lambda^1)$. We then introduce and study the dual notion of a codifferential structure $(\\Omega^1,i)$ on a coalgebra and for Hopf algebras the self-dual notion of a strongly bicovariant differential graded algebra $(\\Omega,d)$ augmented by a codifferential $i$ of degree -1. Here $\\Omega$ is a graded super-Hopf algebra extending the Hopf algebra $\\Omega^0=A$ and, where applicable, the dual super-Hopf algebra gives the same structure on the dual Hopf algebra. We show how to construct such objects from first order data, with both a minimal construction using braided-antisymmetrizes and a maximal one using braided tensor algebras and with dual given via braided-shuffle algebras. The theory is applied to quantum groups with $\\Omega^1(C_q(G))$ dually paired to $\\Omega^1(U_q(g))$, and to finite groups in relation to (super) Hopf quivers.
An attempt is made to conceptualize the derivation as well as to facilitate the computation of Ohtsuki s rational invariants $\\lambda_n$ of integral homology 3-spheres extracted from Reshetikhin-Turaev SU(2) quantum invariants. Several interesting consequences will follow from our computation of $\\lambda_2$. One of them says that $\\lambda_2$ is always an integer divisible by 3. It seems interesting to compare this result with the fact shown by Murakami that $\\lambda_{1}$ is 6 times the Casson invariant. Other consequences include some general criteria for distinguishing homology 3-spheres obtained from surgery on knots by using the Jones polynomial.
The generic Hecke algebra for the hyperoctahedral group, i.e. the Weyl group of type B, contains the generic Hecke algebra for the symmetric group, i.e. the Weyl group of type A, as a subalgebra. Inducing the index representation of the subalgebra gives a Hecke algebra module, which splits multiplicity free. The corresponding zonal spherical functions are calculated in terms of q-Krawtchouk polynomials. The result covers a number of previously established interpretations of (q-)Krawtchouk polynomials on the hyperoctahedral group, finite groups of Lie type, hypergroups and the quantum SU(2) group. Jimbo s analogue of the Frobenius-Schur-Weyl duality is a key ingredient in the proof.
For each skein module we describe a homology theory which, for any three manifold recovers the skein module at its zero level. The theory measures skein-like relations among skein relations, mimicking Hilbert s theory of syzygies. We work explicit examples for the homology groups corresponding to the Kauffman bracket. It is shown, in particular, that for every manifold most of the groups are non-trivial.
A new definition of the elliptic algebra U_{q,p}(g^) associated with an untwisted affine Lie algebra g^ is given as a topological algebra over the ring of formal power series in p. We also introduce a quantum dynamical analogue of Lepowsky-Wilson s Z-algebras. The Z-algebra governs the irreducibility of the infinite dimensional U_{q,p}(g^)-modules. Some level-1 examples indicate a direct connection of the irreducible U_{q,p}(g^)-modules to those of the W-algebras associated with the coset g^ \\oplus g^ \\supset (g^)_{diag} with level (r-g-1,1) (g:the dual Coxeter number), which includes Fateev- Lukyanov s WB_l-algebra.
A technique is developed to reduce the investigation of Nichols algebras of integrable U_q(g)-modules to the investigation of Nichols algebras of braided vector spaces with diagonal braiding. The results are applied to obtain information on the Gelfan d-Kirillov dimension of these Nichols algebras and their defining relations if the braiding is of a special type and q is not a root of unity. For simple g the cases of finite Gelfand-Kirillov dimension are determined completely.
Supersymmetric gauge theories have played a central role in applications of quantum field theory to mathematics. Topologically twisted supersymmetric gauge theories often admit a rigorous mathematical description: for example, the Donaldson invariants of a 4-manifold can be interpreted as the correlation functions of a topologically twisted N=2 gauge theory. The aim of these lectures is to describe a mathematical formulation of partially-twisted supersymmetric gauge theories (in perturbation theory). These partially twisted theories are intermediate in complexity between the physical theory and the topologically twisted theories. Moreover, we will sketch how the operators of such a theory form a two complex dimensional analog of a vertex algebra. Finally, we will consider a deformation of the N=1 theory and discuss its relation to the Yangian, as explained in arXiv:1308.0370 and arXiv:1303.2632.
Motivated by the work of Koornwinder, Macdonald, Cherednik, Noumi, and van Diejen we define a 6-parameter double affine Hecke algebra and establish its basic structural properties, including the existence of an involution. We relate the algebra to (symmetric and nonsymmetric) Koornwinder polynomials via the method of intertwiners and, as a consequence, obtain a proof of Macdonald s duality conjecture for Koornwinder polynomials. Combined with earlier work of van Diejen this completely settles all the outstanding conjectures of Macdonald and Koornwinder about these polynomials.
This is the first of two papers in which we study the modular invariance of pseudotraces of logarithmic intertwining operators. We construct and study genus-one correlation functions for logarithmic intertwining operators among generalized modules over a positive-energy and $C_2$-cofinite vertex operator algebra $V$. We consider grading-restricted generalized $V$-modules which admit a right action of some associative algebra $P$, and intertwining operators among such modules which commute with the action of $P$ ($P$-intertwining operators). We obtain duality properties, i.e., suitable associativity and commutativity properties, for $P$-intertwining operators. Using pseudotraces introduced by Miyamoto and studied by Arike, we define formal $q$-traces of products of $P$-intertwining operators, and obtain certain identities for these formal series. This allows us to show that the formal $q$-traces satisfy a system of differential equations with regular singular points, and therefore are absolutely convergent in a suitable region and can be extended to yield multivalued analytic functions, called genus-one correlation functions. Furthermore, we show that the space of solutions of these differential equations is invariant under the action of the modular group.
We prove that categorified quantum sl(2) is an inverse limit of Flag 2-categories defined using cohomology rings of iterated flag varieties. This inverse limit is an instance of a 2-limit in a bicategory giving rise to a universal property that characterizes the categorification of quantum sl(2) uniquely up to equivalence. As an application we characterize all bimodule homomorphisms in the Flag 2-category and prove that the categorified quantum Casimir of sl(2) acts appropriately on these 2-representations.
Modified braid equations satisfied by generalized ${\\hat R}$ matrices (for a {\\em given} set of group relations obeyed by the elements of ${\\sf T}$ matrices ) are constructed for q-deformed quantum groups $GL_q (N), SO_q (N)$ and $Sp_q (N)$ with arbitrary values of $N$. The Baxterization of ${\\hat R}$ matrices, treated as an aspect complementary to the {\\em modification} of the braid equation, is obtained for all these cases in particularly elegant forms. A new class of braid matrices is discovered for the quantum groups $SO_{q}(N)$ and $Sp_{q}(N)$. The ${\\hat R}$ matrices of this class, while being distinct from restrictions of the universal ${\\hat{\\cal R}}$ matrix to the corresponding vector representations, satisfy the standard braid equation. The modified braid equation and the Baxterization are obtained for this new class of ${\\hat R}$ matrices. Diagonalization of the generalized ${\\hat R}$ matrices is studied. The diagonalizers are obtained explicitly for some lower dimensional cases in a convenient way, giving directly the eigenvalues of the corresponding ${\\hat R}$ matrices. Applications of such diagonalization are then studied in the context of associated covariantly quantized noncommutative spaces.
We consider a special category of Hopf algebras, depending on parameters $\\Sigma$ which possess properties similar to the category of representations of simple Lie group with highest weight $\\lambda$. We connect quantum groups to minimal objects in this categories---they correspond to irreducible representations in the category of representations with highest weight $\\lambda$. Moreover, we want to correspond quantum groups only to finite dimensional irreducible representations. This gives us a condition for $\\lambda$: $\\lambda$--- is dominant means the minimal object in the category of representations with highest weight $\\lambda$ is finite dimensional. We put similar condition for $\\Sigma$. We call $\\Sigma$ dominant if the minimal object in corresponding category has polynomial growth. Now we propose to define quantum groups starting from dominant parameters $\\Sigma$.
We present an efficient approach to evaluate two-center two-electron integrals with exponential functions and with an arbitrary polynomial in electron-nucleus and electron-electron distances. We show that the master integral with the single negative power of all distances can be obtained from the second order differential equation in $r$, the distance between nuclei. For particular values of nonlinear parameters corresponding to the James-Coolidge basis, we find a fully analytic expression. For integrals with arbitrary powers of all distances, we construct recursion relations which starts from the master integral. The presented approach opens a window for the high precision calculations of relativistic effects in diatomic molecules.
The strength of hydrogen bonding in water is stronger than that of van der waals interaction, therefore water may play an important role in the process of hydrophobic effects. When a hydrophobic solute is dissolved into water, an interface appears between the solute and water. To understand the mechanism of hydrophobic effects, it is necessary to study the structure of water and solute/water interface. In this study, based on the structural studies on water and air/water interface, the hydration free energy is derived, and utilized to investigate the physical origin of hydrophobic effects. According to the discussion on hydration free energy, with increasing solute size, it can be divided into the initial and hydrophobic solvation processes, respectively. In the initial solvation process, hydration free energy is dominated by the hydrogen bonding in interfacial water (topmost water layer at the solute/water interface). However, in the hydrophobic solvation process, the hydration free energy is related to hydrogen bondings of both bulk water and interfacial water. Additionally, various dissolved behaviors of solutes can be expected for different solvation processes. From this, hydrophobic effects can be ascribed to the competition between the hydrogen bondings in bulk water and those in interfacial water.
In the distributed nucleus approximation we represent the singular nucleus as smeared over a smallportion of a Cartesian grid. Delocalizing the nucleus allows us to solve the Poisson equation for theoverall electrostatic potential using a linear scaling multigrid algorithm.This work is done in the context of minimizing the Kohn-Sham energy functionaldirectly in real space with a multiscale approach. The efficacy of the approximation is illustrated bylocating the ground state density of simple one electron atoms and moleculesand more complicated multiorbital systems.
Explicit molecular dynamics simulations were applied to a pair of amorphous silica nanoparticles of diameter 3.2 nm immersed in a background electrolyte. Mean forces acting between the pair of silica nanoparticles were extracted at four different background electrolyte concentrations. Dependence of the inter-particle potential of mean force on the separation and the silicon to sodium ratio, as well as on the background electrolyte concentration, are demonstrated. The pH was indirectly accounted for via the ratio of silicon to sodium used in the simulations. The nature of the interaction of the counter-ions with charged silica surface sites (deprotonated silanols) was also investigated. The effect of the sodium double layer on the water ordering was investigated for three Si:Na+ ratios. The number of water molecules trapped inside the nanoparticles was investigated as the Si:Na+ ratio was varied. Differences in this number between the two nanoparticles in the simulations are attributed to differences in the calculated electric dipole moment. The implications of the form of the potentials for aggregation are also discussed.
Mobius graphene nanoribbons have only one edge topologically. How the magnetic structures, previously associated with the two edges of zigzag-edged flat nanoribbons or cyclic nanorings, would change for their Mobius counterparts is an intriguing question. Using spin-polarized density functional theory, we shed light on this question. We examine spin states of zigzag-edged Mobius graphene nanoribbons (ZMGNRs) with different widths and lengths. We find a triplet ground state for a Mobius cyclacene, while the corresponding two-edged cyclacene has an open-shell singlet ground state. For wider ZMGNRs, the total magnetization of the ground state is found to increase with the ribbon length. For example, a quintet ground state is found for a ZMGNR. Local magnetic moments on the edge carbon atoms form domains of majority and minor spins along the edge. Spins at the domain boundaries are found to be frustrated. Our findings show that the Mobius topology (i.e., only one edge) causes ZMGNRs to favor one spin over the other, leading to a ground state with non-zero total magnetization.
In order to better understand the importance of the different channels leading to the first aromatic ring, we have investigated, the structure of a laminar rich premixed methane flame doped with several unsaturated hydrocarbons: allene and propyne, as they are precursors of propargyl radicals, which are well known as having an important role in forming benzene, 1,3-butadiene, to put in evidence a possible production of benzene due to reactions of C4 compounds, and, finally, cyclopentene, which is a source of cyclopentadienyl methylene radicals which are supposed to easily isomerizes to give benzene. A ratio additive / CH4 of 16 % and an equivalence ratio of 1.79 have been used. These flames have been stabilized on a burner at a pressure of 6.7 kPa using argon as dilutant. A new mechanism for the oxidation of allene, propyne, 1,3 butadiene and cyclopentene has been proposed including the formation and decomposition of benzene and toluene. The main reaction pathways of formation of aromatics have been derived from flow rate analyses and have been compared for the three types of additives.
In this work, the zero-temperature limit of the thermodynamic spin-density functional theory is investigated. The coarse-grained approach to the equilibrium density operator is used to describe the equilibrium state. The characteristic functions of a macrostate are introduced and their zero-temperature limits are investigated. A detailed discussion of the spin-grand-canonical ensemble in the entropy and energy representations is performed. The maps between the state function variables at 0K limit are rigorously studied for both representations. In the spin-canonical ensemble, the energy surface and the discontinuity pattern are investigated. Finally, based on the maps between the state function variables at 0K limit, the Hohenberg-Kohn theorem for the systems with non-integer electron and spin numbers at zero-temperature limit is formulated.
Vibrational coupling is relevant not only for dissipation of excess energy after chemical reactions but also for elucidating molecular structure and dynamics. It is particularly important for OH stretch vibrational spectra of water, for which it is known that in bulk both intra- and intermolecular coupling alter the intensity and line shape of the spectra. In contrast with bulk, the unified picture of the inter/intra-molecular coupling of OH groups at the water-air interface has been lacking. Here, combining sum-frequency generation experiments and simulation for isotopically diluted water and alcohols, we unveil effects of inter- and intramolecular coupling on the vibrational spectra of interfacial water. Our results show that both inter- and intramolecular coupling contribute to the OH stretch vibrational response of the neat H2O surface, with intramolecular coupling generating a double-peak feature, while the intermolecular coupling induces a significant red shift in the OH stretch response.
Recent studies of the hydration of micro- and nanoscale solutes have demonstrated a strong {\\it coupling} between hydrophobic, dispersion and electrostatic contributions, a fact not accounted for in current implicit solvent models. We present a theoretical formalism which accounts for coupling by minimizing the Gibbs free energy with respect to a solvent volume exclusion function. The solvent accessible surface is output of our theory. Our method is illustrated with the hydration of alkane-assembled solutes on different length scales, and captures the strong sensitivity to the particular form of the solute-solvent interactions in agreement with recent computer simulations.
We develop a model of molecular binding based on the Bohr-Sommerfeld description of atoms together with a constraint taken from conventional quantum mechanics. The model can describe the binding energy curves of H2, H3 and other molecules with striking accuracy. Our approach treats electrons as point particles with positions determined by extrema of an algebraic energy function. Our constrained model provides a physically appealing, accurate description of multi-electron chemical bonds.
A new approach to simulating rotational cooling using a direct simulation Monte Carlo (DSMC) method is described and applied to the rotational cooling of ammonia seeded into a helium supersonic jet. The method makes use of ab initio rotational state changing cross sections calculated as a function of collision energy. Each particle in the DSMC simulations is labelled with a vector of rotational populations that evolves with time. Transfer of energy into translation is calculated from the mean energy transfer for this population at the specified collision energy. The simulations are compared with a continuum model for the on-axis density, temperature and velocity; rotational temperature as a function of distance from the nozzle is in accord with expectations from experimental measurements. The method could be applied to other types of gas mixture dynamics under non-uniform conditions, such as buffer gas cooling of NH$_3$ by He.
The protein chemical shifts holds a large amount of information about the 3-dimensional structure of the protein. A number of chemical shift predictors based on the relationship between structures resolved with X-ray crystallography and the corresponding experimental chemical shifts have been developed. These empirical predictors are very accurate on X-ray structures but tends to be insensitive to small structural changes. To overcome this limitation it has been suggested to make chemical shift predictors based on quantum mechanical(QM) calculations. In this thesis the development of the QM derived chemical shift predictor Procs14 is presented. Procs14 is based on 2.35 million density functional theory(DFT) calculations on tripeptides and contains corrections for hydrogen bonding, ring current and the effect of the previous and following residue. Procs14 is capable at performing predictions for the 13CA, 13CB, 13CO, 15NH, 1HN and 1HA backbone atoms. In order to benchmark Procs14, a number of QM NMR calculations are performed on full protein structures. Of the tested empirical and QM derived predictors, Procs14 reproduced the QM chemical shifts with the highest accuracy. A comparison with the QM derived predictor CheShift-2 on X-ray structures and NMR ensembles with experimental chemical shift data, showed that Procs14 predicted the chemical shifts with the best accuracy. The predictions on the NMR ensembles exhibited the best performance. This suggests that future work might benefit from using ensemble sampling when performing simulations of protein folding with chemical shifts. Procs14 is implemented in the markov chain monte carlo protein folding framework PHAISTOS. The computational efficient implementation of Procs14 allows for rapid predictions and therefore potential use in refinement and folding of protein structures.
Quantum molecular dynamics requires an accurate representation of the molecular potential energy surface from a minimal number of electronic structure calculations, particularly for nonadiabatic dynamics where excited states are required. In this paper, we employ pseudospectral sampling of time-dependent Gaussian basis functions for the simulation of non-adiabatic dynamics. Unlike other methods, the pseudospectral Gaussian molecular dynamics tests the Schr\\\"{o}dinger equation with $N$ Dirac delta functions located at the centers of the Gaussian functions reducing the scaling of potential energy evaluations from $\\mathcal{O}(N^2)$ to $\\mathcal{O}(N)$. By projecting the Gaussian basis onto discrete points in space, the method is capable of efficiently and quantitatively describing nonadiabatic population transfer and intra-surface quantum coherence. We investigate three model systems; the photodissociation of three coupled Morse oscillators, the bound state dynamics of two coupled Morse oscillators, and a two-dimensional model for collinear triatomic vibrational dynamics. In all cases, the pseudospectral Gaussian method is in quantitative agreement with numerically exact calculations. The results are promising for nonadiabatic molecular dynamics in molecular systems where strongly correlated ground or excited states require expensive electronic structure calculations.
A Poisson-Fermi model is proposed for calculating activity coefficients of single ions in strong electrolyte solutions based on the experimental Born radii and hydration shells of ions in aqueous solutions. The steric effect of water molecules and interstitial voids in the first and second hydration shells play an important role in our model. The screening and polarization effects of water are also included in the model that can thus describe spatial variations of dielectric permittivity, water density, void volume, and ionic concentration. The activity coefficients obtained by the Poisson-Fermi model with only one adjustable parameter are shown to agree with experimental data, which vary nonmonotonically with salt concentrations.
Differential cross sections are computed for the title polar molecule using static interaction, exchange forces and correlation-polarisation effects as described in detail in the main text. The dipole effect is also reported via the dipole Born correction procedure and the final angular distributions are compared with existing experimental data. The shape and location of the prominent low-energy resonance are computed and compared with experiments. The comparison shows that the present treatment of the interaction forces and of the quantum dynamics can indeed afford good agreement between measured and computed quantities for a multielectron target as OCS.
We present elastic and inelastic spin-changing cross sections for cold and ultracold NH($X,^3\\Sigma^-$) + NH($X,^3\\Sigma^-$) collisions, obtained from full quantum scattering calculations on an accurate \\textit{ab initio} quintet potential-energy surface. Although we consider only collisions in zero field, we focus on the cross sections relevant for magnetic trapping experiments. It is shown that evaporative cooling of both fermionic $^{14}$NH and bosonic $^{15}$NH is likely to be successful for hyperfine states that allow for s-wave collisions. The calculated cross sections are very sensitive to the details of the interaction potential, due to the presence of (quasi-)bound state resonances. The remaining inaccuracy of the \\textit{ab initio} potential-energy surface therefore gives rise to an uncertainty in the numerical cross-section values. However, based on a sampling of the uncertainty range of the \\textit{ab initio} calculations, we conclude that the exact potential is likely to be such that the elastic-to-inelastic cross-section ratio is sufficiently large to achieve efficient evaporative cooling. This likelihood is only weakly dependent on the size of the channel basis set used in the scattering calculations.
A new scheme for enantiomer differentiation of chiral molecules using a pair of linearly polarized intense ultrashort laser pulses with skewed mutual polarization is presented. The technique relies on the fact that the off-diagonal anisotropic contributions to the electric polarizability tensor for two enantiomers have different signs. Exploiting this property, we are able to excite a coherent unidirectional rotation of two enantiomers with a {\\pi} phase difference in the molecular electric dipole moment. The approach is robust and suitable for relatively high temperatures of molecular samples, making it applicable for selective chiral analysis of mixtures, and to chiral molecules with low barriers between enantiomers. As an illustration, we present nanosecond laser-driven dynamics of a tetratomic non-rigid chiral molecule with short-lived chirality. The ultrafast time scale of the proposed technique is well suited to study parity violation in molecular systems in short-lived chiral states.
In the given paper the algorithm describing original and universal principles of a triangulation of a smooth molecular surface: solvent excluding solvent (SES), received by primary and secondary rolling, and solvent accessible surface (SAS) is presented. These surfaces are a boundary between molecule and solvent. Originality of the given paper consists in creation of the universal and adaptive algorithm of a triangulation. Universality of algorithm of a triangulation consists that it is suitable for not only for a surface, received by rolling and consisting of fragments of torus and sphere, but for any smooth surface, including any level surface. Adaptability of this algorithm consists in facts that the mesh size of a triangulation can vary depending on its location; reflecting even small, but smooth features of a surface; preventing \"jump\" to close, but not neighbor sites of the surface, excepting \"cut off\" of narrow necks and channels. It is reached by either decreasing triangulation lattice step to value smaller than two principal radiuses of curvature of the molecular surface or decreasing triangulation lattice step close to the active centre - closed, but not neighbor sites of the surface. The received triangulated surface can be used for the demonstration purposes in molecular editors (the algorithm is applicable for a triangulation of any smooth surface, for example, level surfaces) together with for calculation of solvation energy and its gradients for continual models of solvent.
To gain some insight into the structure and physical significance of the multiple solutions to the coupled-cluster doubles (CCD) equations corresponding to the Pariser-Parr-Pople (PPP) model of cyclic polyenes, complete solutions to the CCD equations for the A^{-}_{1g} states of benzene are obtained by means of the homotopy method. By varying the value of the resonance integral beta from -5.0 eV to -0.5 eV, we cover the so-called weakly, moderately, and strongly correlated regimes of the model. For each value of beta 230 CCD solutions are obtained. It turned out, however, that only for a few solutions a correspondence with some physical states can be established. It has also been demonstrated that, unlike for the standard methods of solving CCD equations, some of the multiple solutions to the CCD equations can be attained by means of the iterative process based on Pulay s direct inversion in the iterative subspace (DIIS) approach.
This paper presents a detailed analysis of the pseudocontact shift (PCS) field induced by a mobile spin label that is viewed as a probability density distribution with an associated effective magnetic susceptibility anisotropy. It is demonstrated that non-spherically-symmetric density can lead to significant deviations from the commonly used point dipole approximation for PCS. Analytical and numerical solutions are presented for the general partial differential equation that describes the non-point case. It is also demonstrated that it is possible, with some reasonable approximations, to reconstruct paramagnetic centre probability distributions from the experimental PCS data.
The study combines DFT calculations and CPMD simulations to investigate the structures of phenylalanine-copper (II) ([Phe-Cu]2+) complexes and the micro-solvation processes. ....It is found that the phenylalanine moiety appears to be in the neutral form in isolated and mono-hydrated complexes, but in the zwitterionic form in other hydrated complexes (with n no less than 2). .... The present CPMD simulations reveal that the maximum coordination of Cu2+ in the presence of the Phe ligand does not exceed four: the oxygen atoms from three water molecules and one carboxyl oxygen atom of Phe. Any excess water molecules will migrate to the second solvation shell. Moreover a unique structural motif is present in the lowest energy complexes, which is recognized to be significant in stabilizing the structures of the complexes. .....
Herein, we present a series of isomerically pure, peripherically alkyl substituted, soluble and low aggregating azaphthalocyanines as well as their new, smaller hybrid homologues, the azasubphthalocyanines. The focus lies on the effect of the systematically increasing number of aza building blocks [-N=] replacing the non peripheral [-CH=] units and its influence on physical and photophysical properties of these chromophores. The absolute and relative HOMO-LUMO energies of azaphthalocyanines was analyzed using UV-Vis, CV and compared to density functional theory calculations (B3LYP, TD-DFT). Crystals of substituted subphthalocyanine, N2-Pc*H2 and N4-[Pc*Zn$\\cdot$H2O] were obtained out of DCM. For the synthesis of the valuable tetramethyltetraline phthalocyanine building block a new highly efficient synthesis involving a nearly quantitative CoII catalyzed aerobic autoxidation step is introduced replacing inefficient KMnO4/pyridine as oxidant. The lowering of the HOMO level is revealed as the determining factor for the trend in the adsorption energies by electronic structure analysis.
The coupled exciton-vibrational dynamics of a 3-site FMO model is investigated using the numerically exact multilayer multiconfiguration time-dependent Hartree approach. Thereby the vibrational mode specific coupling to local electronic transitions is adapted from a discretized experimental spectral density. The solution of the resulting time-dependent Schr\\\"odinger equation including three electronic and 450 vibrational degrees of freedom is analyzed in terms of excitonic populations and coherences. Emphasis is put onto the role of specific ranges of vibrational frequencies. It is observed that modes between 160 and 300 cm$^{-1}$ are responsible for the subpicosecond population and coherence decay. Further, it is found that a mean-field approach with respect to the vibrational degrees of freedom is not applicable.
Though often considered as one of the main driving process of the complexation of species of opposite charges, the release of counterions has never been experimentally directly measured on polyelectrolyte/proteins complexes. We present here the first structural determination of such a release by Small Angle Neutron Scattering in complexes made of lysozyme, a positively charged protein and of PSS, a negatively charged polyelectrolyte. Both components have the same neutron density length, so their scattering can be switched off simultaneously in an appropriate \"matching\" solvent; this enables determination of the spatial distribution of the single counterions within the complexes. The counterions (including the one subjected to Manning condensation) are expelled from the cores where the species are at electrostatic stoichiometry.
Self-consistent field extrapolation methods play a pivotal role in quantum chemistry and electronic structure theory. We here demonstrate the mathematical equivalence between the recently proposed family of LIST methods [J. Chem. Phys. 134, 241103 (2011); J. Chem. Theory Comput. 7, 3045 (2011)] with Pulay s DIIS [Chem. Phys. Lett. 73, 393 (1980)]. Our results also explain the differences in performance among the various LIST methods.
We perform a systematic investigation of the resonance and vibrational properties of naphthyl-terminated sp carbon chains (dinaphthylpolyynes) by combined multi-wavelength resonant Raman (MWRR) spectroscopy, ultraviolet-visible spectroscopy, and Fourier-transform infrared (FT-IR) spectroscopy, plus ab initio density functional theory (DFT) calculations. We show that the MWWR and FT-IR spectroscopies are particularly suited to identify chains of different lengths and different terminations, respectively. By DFT calculations, we further extend those findings to sp carbon chains end-capped by other organic structures. The present analysis shows that combined MWRR and FT-IR provide a powerful tool to draw a complete picture of chemically stabilized sp carbon chains.
We report that gold thermally deposited onto n-layer graphenes interacts differently with these substrates depending on the number layer, indicating the different surface properties of graphenes. This results in thickness-dependent morphologies of gold on n-layer graphenes, which can be used to identify and distinguish graphenes with high throughput and spatial resolution. This technique may play an important role in checking if n-layer graphenes are mixed with different layer numbers of graphene with a smaller size, which cannot be found by Raman spectra. The possible mechanisms for these observations are discussed.
The absorption of ultraviolet light creates excitations in DNA, which subsequently start moving in the helix. Their fate is important for an understanding of photo damage, and is determined by the interplay of electronic couplings between bases and the structure of the DNA environment. We model the effect of dynamical fluctuations in the environment and study correlation, which is present when multiple base pairs interact with the same mode in the environment. We find that the correlations strongly affect the exciton dynamics, and show how they are observed in the decay of the anisotropy as a function of a coherence and a population time in a non-linear optical experiment.
Four diabatic states are used to construct a simple model for double proton transfer in hydrogen bonded complexes. Key parameters in the model are the proton donor-acceptor separation R and the ratio, D_1/D_2, between the proton affinity of a donor with one and two protons. Depending on the values of these two parameters the model describes four qualitatively different ground state potential energy surfaces, having zero, one, two, or four saddle points. In the limit D_2=D_1 the model reduces to two decoupled hydrogen bonds. As R decreases a transition can occur from a concerted to a sequential mechanism for double proton transfer.
We study model one-dimensional chemical systems (representative of their three-dimensional counterparts) using the strictly-correlated electrons (SCE) functional, which, by construction, becomes asymptotically exact in the limit of infinite coupling strength. The SCE functional has a highly non-local dependence on the density and is able to capture strong correlation within Kohn- Sham theory without introducing any symmetry breaking. Chemical systems, however, are not close enough to the strong-interaction limit so that, while ionization energies and the stretched H2 molecule are accurately described, total energies are in general way too low. A correction based on the exact next leading order in the expansion at infinite coupling strength of the Hohenberg-Kohn functional largely improves the results.
A numerical procedure is presented for mapping the vicinity of the null-space of the spin relaxation superoperator. The states populating this space, i.e. those with near-zero eigenvalues, of which the two-spin singlet is a well-studied example, are long-lived compared to the conventional T1 and T2 spin-relaxation times. The analysis of larger spin systems described herein reveals the presence of a significant number of other slowly relaxing states. A study of coupling topologies for n-spin systems (n = 4 - 8) suggests the symmetry requirements for maximising the number of long-lived states.
We report a benchmark theoretical investigation of both adiabatic and vertical electron affinities of five DNA and RNA nucleobases: adenine, guanine, cytosine, thymine and uracil using state-of-the-art equation of motion coupled cluster (EOMCC) method. We have calculated the vertical electron affinity values of first five electron attached states of the DNA and RNA nucleobases and only the first electron attached state is found to be energetically accessible in gas phase. An analysis of the natural orbitals shows that the first electron attached states of uracil and thymine are valence-bound type and undergo significant structural changes on attachment of excess electron, which is reflected in the deviation of the adiabatic electron affinity from the vertical one. On the other hand, the first electron attached state of cytosine, adenine and guanine are dipole-bound type and their structure remain unaffected on attachment of an extra electron, which results in small deviation of adiabatic electron affinity from that of the vertical one. Vertical and adiabatic electron affinity values of all the DNA and RNA nucleobases are negative implying that the first electron attached state are not stable, but rather resonance states. Previously, reported theoretical studies had shown scattered results for electron affinities of DNA and RNA bases, with large deviations from experimental values. Our EOMCC computed values are in very good agreement with experimental values and can be used as a reliable benchmark for calibrating new theoretical methods.
We report internally contracted relativistic multireference configuration interaction (ic-MRCI), complete active space second-order perturbation (CASPT2), and strongly contracted n-electron valence state perturbation theory (NEVPT2) on the basis of the four-component Dirac Hamiltonian, enabling accurate simulations of relativistic, quasi-degenerate electronic structure of molecules containing transition-metal and heavy elements. Our derivation and implementation of ic-MRCI and CASPT2 are based on an automatic code generator that translates second-quantized ansatze to tensor-based equations, and to efficient computer code. NEVPT2 is derived and implemented manually. The rovibrational transition energies and absorption spectra of HI and TlH are presented to demonstrate the accuracy of these methods.
In this study Fe2O3/Co3O4 nanocomposites were synthesized by using a simple hydrothermal route. The X-ray diffraction analysis results showed that synthesized powders were pure, and nanocrystalline in nature. Moreover, Scanning electron microscopy revealed that Fe2O3 nanoparticles had spherical shapes while Co3O4 particles had a rod-like morphology. Ethanol sensing properties of Fe2O3/Co3O4 nanocomposites were examined and compared with those of pristine Fe2O3 nanoparticles. It was shown that the gas sensing properties of Fe2O3/Co3O4 nanocomposites were superior to those of pristine Fe2O3 nanoparticles and for all concentrations of ethanol, the response of the nanocomposite sensor was higher than the pristine Fe2O3 nanoparticle sensor. In detail, the response of Fe2O3/Co3O4 nanocomposite sensor to 200 ppm of ethanol at 300{\\deg}C was about 3 times higher than pristine one. Also in general, the response and recovery times of Fe2O3/Co3O4 nanocomposite sensor were shorter than those of the pristine one. The improved sensing characteristics of the Fe2O3/Co3O4 sensor were attributed to a combination of several effects: the formation of a potential barrier at the Fe2O3-Co3O4 interface, the enhanced modulation of the conduction channel width accompanying the adsorption and desorption of ethanol gas, the catalytic activity of Co3O4 for the oxidation of ethanol, the stronger oxygen adsorption of p-type Co3O4, and the formation of preferential adsorption sites.
The energy transfer processes and coherent phenomena in the fucoxanthin-chlorophyll protein complex, which is responsible for the light harvesting function in marine algae diatoms, were investigated at 77 K by using two-dimensional electronic spectroscopy. Experiments performed on the femtosecond and picosecond timescales led to separation of spectral dynamics, witnessing evolutions of coherence and population states of the system in the spectral region of ${\\rm Q}_{y}$ transitions of chlorophylls $a$ and $c$. Analysis of the coherence dynamics allowed us to identify chlorophyll (Chl) $a$ and fucoxanthin intramolecular vibrations dominating over the first few picoseconds. Closer inspection of the spectral region of the ${\\rm Q}_{y}$ transition of Chl $c$ revealed previously not identified mutually non-interacting chlorophyll $c$ states participating in femtosecond or picosecond energy transfer to the Chl $a$ molecules. Consideration of separated coherent and incoherent dynamics allowed us to hypothesize the vibrations-assisted coherent energy transfer between Chl $c$ and Chl $a$ and the overall spatial arrangement of chlorophyll molecules.
A new estimator for three-center two-particle Coulomb integrals is presented. Our estimator is exact for some classes of integrals and is much more efficient than the standard Schwartz counterpart due to the proper account of distance decay. Although it is not a rigorous upper bound, the maximum degree of underestimation can be controlled by two adjustable parameters. We also give numerical evidence of the excellent tightness of the estimator. The use of the estimator will lead to increased efficiency in reduced-scaling one- and many-body electronic structure theories.
The paper presents a theoretical study of the dynamics of the H + HCl system on the potential energy surface (PES) of Bian and Werner (Bian, W.; Werner, H. -J., J. Chem. Phys. 2000, 112, 220). A time-dependent wave packet approach was employed to calculate state-to-state reaction probabilities for the exchanged and abstraction channels. The most recent PES for the system has been used in the calculations. Reaction probabilities have also been calculated for several values of the total angular momentum J > 0. Those have then been used to estimate cross sections and rate constants for both channels. The calculated cross sections can be compared with the results of previous quasiclassical trajectory calculations and reaction dynamics experimental on the abstraction channel. In addition, the calculated rate constants are in the reasonably good agreement with experimental measurement.
We provide conclusive demonstration of vibrational pumping under Surface Enhanced Raman Scattering (SERS) conditions by performing anti-Stokes/Stokes ratio measurements down to 10 K using dried silver colloids, the dye rhodamine 6G and 676 nm laser excitation. The method we propose allows the measurement of the SERS cross sections for different modes and the determination of the asymmetry between the anti-Stokes and Stokes SERS cross sections.
The quantum reprojection method within the standard adiabatic Born-Oppenheimer approach is derived for multielectron collision systems. The method takes nonvanishing asymptotic nonadiabatic couplings into account and distinguishes asymptotic currents in molecular state and in atomic state channels, leading to physically consistent and reliable results. The method is demonstrated for the example of low-energy inelastic Li+Na collisions, for which the conventional application of the standard adiabatic Born-Oppenheimer approach fails and leads to paradoxes such as infinite inelastic cross sections.
A simple and non-destructive method for identification of a single molecular ion sympathetically cooled by a single laser cooled atomic ion in a linear Paul trap is demonstrated. The technique is based on a precise determination of the molecular ion mass through a measurement of the eigenfrequency of a common motional mode of the two ions. The demonstrated mass resolution is sufficiently high that a particular molecular ion species can be distinguished from other equally charged atomic or molecular ions having the same total number of nucleons.
A complete theoretical model of the nuclear spin conversion in 13CH3F induced by intramolecular ortho-para state mixing is proposed. The model contains parameters determined from the level-crossing spectra of the 13CH3F spin conversion. This set of parameters includes the ortho-para decoherence rate, the magnitude of the hyperfine spin-spin interaction between the molecular nuclei and the energy gap between the mixed ortho and para states. These parameters are found to be in a good agreement with their theoretical estimates.
Inter- or intramolecular coupling processes between chromophores such as excimer formation or H- and J-aggregation are crucial to describing the photophysics of closely packed films of conjugated polymers. Such coupling is highly distance dependent, and should be sensitive to both fluctuations in the spacing between chromophores as well as the actual position on the chromophore where the exciton localizes. Single-molecule spectroscopy reveals these intrinsic fluctuations in well-defined bi-chromophoric model systems of cofacial oligomers. Signatures of interchromophoric interactions in the excited state - spectral red-shifting and broadening, and a slowing of photoluminescence decay - correlate with each other but scatter strongly between single molecules, implying an extraordinary distribution in coupling strengths. Furthermore, these excimer-like spectral fingerprints vary with time, revealing intrinsic dynamics in the coupling strength within one single dimer molecule, which constitutes the starting point for describing a molecular solid. Such spectral sensitivity to sub-Angstrom molecular dynamics could prove complementary to conventional FRET-based molecular rulers.
We present a brief review of the classical density functional theory of atomic and molecular fluids. We focus on the application of the theory to the determination of the solvation properties of arbitrary molecular solutes in arbitrary molecular solvent. This includes the prediction of the solvation free energies, as well as the characterization of the microscopic, three-dimensional solvent structure.
Control of chain length and morphology in combination with single-molecule spectroscopy techniques provide a comprehensive photophysical picture of excited-state losses in the prototypical conjugated polymer poly(3-hexylthiophene) (P3HT). A universal self-quenching mechanism is revealed, based on singlet-triplet exciton annihilation, which accounts for the dramatic loss in fluorescence quantum yield of a single P3HT chain between its solution (unfolded) and bulk-like (folded) state. Triplet excitons fundamentally limit the fluorescence of organic photovoltaic materials, which impacts on the conversion of singlet excitons to separated charge carriers, decreasing the efficiency of energy harvesting at high excitation densities. Interexcitonic interactions are so effective that a single P3HT chain of >100 kDa weight behaves like a two-level system, exhibiting perfect photon-antibunching.
Photoinduced charge-transfer processes play a key role for novel photovoltaic phenomena and devices. Thus, the development of ab initio methods that allow for an accurate and computationally inexpensive treatment of charge-transfer excitations is a topic that nowadays attracts a lot of scientific attention. In this paper we extend an approach recently introduced for the description of single and double excitations (M. Tassi, I. Theophilou and S. Thanos, Int. J. Quantum Chem., (113), 690 (2013), M. Tassi, I. Theophilou and S. Thanos, J. Chem. Phys. (138), 124107 (2013)) to allow for the description of intermolecular charge-transfer excitations. We describe an excitation where an electron is transferred from a donor system to an acceptor one, keeping the excited state orthogonal to the ground state and avoiding variational collapse. These conditions are achieved by decomposing the space spanned by the Hartree-Fock (HF) ground state orbitals into four subspaces: The subspace spanned by the occupied orbitals that are localized in the region of the donor molecule, the corresponding for the acceptor ones and two more subspaces containing the virtual orbitals that are localized in the neighborhood of the donor and the acceptor, respectively. Next, we create a Slater determinant with a hole in the subspace of occupied orbitals of the donor and a particle in the virtual subspace of the acceptor. Subsequently we optimize both the hole and the particle by minimizing the HF energy functional in the corresponding subspaces. Finally, we test our approach by calculating the lowest charge-transfer excitation energies for a set of tetracyanoethylene-hydrocarbon complexes, that have been used earlier as a test set for such kind of excitations.
An approximation to the many-body London dispersion energy in molecular systems is expressed as a functional of the occupied orbitals only. The method is based on the local-RPA theory. The occupied orbitals are localized molecular orbitals and the virtual space is described by projected oscillator orbitals, i.e. functions obtained by multiplying occupied localized orbitals with solid spherical harmonic polynomials having their origin at the orbital centroids. Since we are interested in the long-range part of the correlation energy, responsible for dispersion forces, the electron repulsion is approximated by its multipolar expansion. This procedure leads to a fully non-empirical long-range correlation energy expression. Molecular dispersion coefficients calculated from determinant wave functions obtained by a range-separated hybrid method reproduce experimental values with less than 15% error.
We extend the localized operator partitioning method (LOPM) [J. Nagesh, A.F. Izmaylov, and P. Brumer, J. Chem. Phys. 142, 084114 (2015)] to the time-dependent density functional theory (TD-DFT) framework to partition molecular electronic energies of excited states in a rigorous manner. A molecular fragment is defined as a collection of atoms using Stratman-Scuseria-Frisch atomic partitioning. A numerically efficient scheme for evaluating the fragment excitation energy is derived employing a resolution of the identity to preserve standard one- and two-electron integrals in the final expressions. The utility of this partitioning approach is demonstrated by examining several excited states of two bichromophoric compounds: 9-((1-naphthyl)-methyl)-anthracene and 4-((2-naphthyl)-methyl)-benzaldehyde. The LOPM is found to provide nontrivial insights into the nature of electronic energy localization that are not accessible using simple density difference analysis.
We extend the effective fragment molecular orbital method (EFMO) into treating fragments connected by covalent bonds. The accuracy of EFMO is compared to FMO and conventional ab initio electronic structure methods for polypeptides including proteins. Errors in energy for RHF and MP2 are within 2 kcal/mol for neutral polypeptides and 6 kcal/mol for charged polypeptides similar to FMO but obtained two to five times faster. For proteins, the errors are also within a few kcal/mol of the FMO results. We developed both the RHF and MP2 gradient for EFMO. Compared to ab initio, the EFMO optimized structures had an RMSD of 0.40 and 0.44 {\\AA} for RHF and MP2, respectively.
Conductive organic polymers can be formulated with polymers that incorporate fine dispersed metallic particles. In this work, we present a general model for ferrogels which are chemically cross-linked polymer networks swollen with a ferrofluid. Our aim is to study the effect of the shape and/or material (conductivity) anisotropy on the effective electrical conductivity of the ferrogel in the presence of an external magnetic field. Our theory can reproduce the known results, and provides a link between the particle property and orientation distribution and the effective electrical conductivity. To this end, we find that material (conductivity) anisotropies are more important to yield a high effective electrical conductivity than shape anisotropies, while magnetic fields can offer a correction.
A novel implementation for the skeletal reduction of large detailed reaction mechanisms using the directed relation graph with error propagation and sensitivity analysis (DRGEPSA) is developed and presented with examples for three hydrocarbon components, n-heptane, iso-octane, and n-decane, relevant to surrogate fuel development. DRGEPSA integrates two previously developed methods, directed relation graph-aided sensitivity analysis (DRGASA) and directed relation graph with error propagation (DRGEP), by first applying DRGEP to efficiently remove many unimportant species prior to sensitivity analysis to further remove unimportant species, producing an optimally small skeletal mechanism for a given error limit. It is illustrated that the combination of the DRGEP and DRGASA methods allows the DRGEPSA approach to overcome the weaknesses of each, specifically that DRGEP cannot identify all unimportant species and that DRGASA shields unimportant species from removal. Skeletal mechanisms for n-heptane and iso-octane generated using the DRGEP, DRGASA, and DRGEPSA methods are presented and compared to illustrate the improvement of DRGEPSA. From a detailed reaction mechanism for n-alkanes covering n-octane to n-hexadecane with 2115 species and 8157 reactions, two skeletal mechanisms for n-decane generated using DRGEPSA, one covering a comprehensive range of temperature, pressure, and equivalence ratio conditions for autoignition and the other limited to high temperatures, are presented and validated. The comprehensive skeletal mechanism consists of 202 species and 846 reactions and the high-temperature skeletal mechanism consists of 51 species and 256 reactions. Both mechanisms are further demonstrated to well reproduce the results of the detailed mechanism in perfectly-stirred reactor and laminar flame simulations over a wide range of conditions.
A quantum-mechanical Gaussian wave-packet approach to the theoretical description of nuclear motions in a condensed-phase environment is developed. General expressions for the time-dependent reduced density matrix are given for a harmonic potential surface, and the exact quantum dynamics is found for a microscopic system-plus-bath model. Particular attention is devoted to the influence of initial correlations between system and bath for the outcome of a pump-probe experiment. We show that the standard factorized preparation, compared to a more realistic correlated preparation, leads to significantly different stimulated emission spectra at high temperatures. Recent experiments for the reaction center are analyzed using this formalism.
NPzzT and MuPzzT simulations of K-montmorillonite hydrates were performed employing hybrid Monte Carlo simulations. Two condition sets were studied, P=1 atm and T= 300 K (ground level conditions), and P=600 atm and T= 394 K; this last condition mimics a burial depth close to 4 km. For these conditions, swelling curves as a function of the reservoir water vapor pressure were built. We found the single layer K-montmorillonite hydrate stable for high vapor pressures for both, burial and ground level conditions. A simple explanation for this high stability is given.
We present semiclassical approximations to Green s functions of multidimensional systems, extending Gutzwiller s work to the classically forbidden region. Based on steepest-descent integrals over these functions, we derive an instanton method for computing the rate of nonadiabatic reactions, such as electron transfer, in the weak-coupling limit, where Fermi s golden-rule can be employed. This generalizes Marcus theory to systems for which the environment free-energy curves are not harmonic and where nuclear tunnelling plays a role. The derivation avoids using the Im F method or short-time approximations to real-time correlation functions. A clear physical interpretation of the nuclear tunnelling processes involved in an electron-transfer reaction is thus provided. In the following paper, we discuss numerical evaluation of the formulae.
Rotational transitions in molecular hydrogen collisions are computed. The two most recently developed potential energy surfaces for the H2-H2 system are used from the following works: 1) A.I. Boothroyd, P.G. Martin, W.J. Keogh, M.J. Peterson, J. Chem. Phys., 116 (2002) 666, and 2) P. Diep, J.K. Johnson, J. Chem. Phys., 113 (2000) 3480; ibid. 112, 4465. Cross sections for rotational transitions 00->20, 22, 40, 42, 44 and corresponding rate coefficients are calculated using a quantum-mechanical approach. Results are compared for a wide range of kinetic temperatures 300 K < T < 3000 K.
The accuracy at which total energies of open-shell atoms and organic radicals may be calculated is assessed for selected coupled cluster perturbative triples expansions, all of which augment the coupled cluster singles and doubles (CCSD) energy by a non-iterative correction for the effect of triple excitations. Namely, the second- through sixth-order models of the recently proposed CCSD(T-n) triples series [J. Chem. Phys. 140, 064108 (2014)] are compared to the acclaimed CCSD(T) model for both unrestricted as well as restricted open-shell Hartree-Fock (UHF/ROHF) reference determinants. By comparing UHF- and ROHF-based statistical results for a test set of 18 modest-sized open-shell species with comparable RHF-based results, no behavioral differences are observed for the higher-order models of the CCSD(T-n) series in their correlated descriptions of closed- and open-shell species. In particular, we find that the convergence rate throughout the series towards the coupled cluster singles, doubles, and triples (CCSDT) solution is identical for the two cases. For the CCSD(T) model, on the other hand, not only its numerical consistency, but also its established, yet fortuitous cancellation of errors breaks down in the transition from closed- to open-shell systems. The higher-order CCSD(T-n) models (orders n>3) thus offer a consistent and significant improvement in accuracy relative to CCSDT over the CCSD(T) model, equally for RHF, UHF, and ROHF reference determinants, albeit at an increased computational cost.
Oxygen ($O_2$) is one of the most important elements required to sustain life. The concentration of $O_2$ on Earth has been accumulated over millions of years and has a direct connection with that of $CO_2$. Further, $CO_2$ plays an important role in many other planetary atmospheres. Therefore, molecular reactions involving $CO_2$ are critical for studying the atmospheres of such planets. Existing studies on the dissociation of $CO_2$ are exclusively focused on the C--O bond breakage. Here we report first experiments on the direct observation of molecular Oxygen formation from $CO_2$ in strong laser fields with a reaction microscope. Our accompanying simulations suggest that $CO_2$ molecules may undergo bending motion during and after strong-field ionization which supports the molecular Oxygen formation process. The observation of the molecular Oxygen formation from $CO_2$ may trigger further experimental and theoretical studies on such processes with laser pulses, and provide hints in studies of the $O_2$ and $CO_2^+$ abundance in $CO_2$-dominated planetary atmospheres.
Coupled-cluster calculations of static electronic dipole polarizabilities for 145 organic molecules are performed to create a reference data set. The molecules are composed from carbon, hydrogen, nitrogen, oxygen, fluorine, sulfur, chlorine, and bromine atoms. They range in size from triatomics to 14 atoms. The Hartree-Fock and 2nd-order M{\\o}ller-Plesset methods and 34 density functionals, including local functionals, global hybrid functionals, and range-separated functionals of the long-range-corrected and screened-exchange varieties, are tested against this data set. On the basis of the test results, detailed recommendations are made for selecting density functionals for polarizability computations on relatively small organic molecules.
Nonadiabatic quantum interferences emerge whenever nuclear wavefunctions in different electronic states meet and interact in a nonadiabatic region. In this work, we analyze how nonadiabatic quantum interferences translate in the context of the exact factorization of the molecular wavefunction. In particular, we focus our attention on the shape of the time-dependent potential energy surface - the exact surface on which the nuclear dynamics takes place. We use a one-dimensional exactly-solvable model to reproduce different conditions for quantum interferences, whose characteristic features already appear in one-dimension. The time-dependent potential energy surface develops complex features when strong interferences are present, in clear contrast to the observed behavior in simple nonadiabatic crossing cases. Nevertheless, independent classical trajectories propagated on the exact time-dependent potential energy surface reasonably conserve a distribution in configuration space that mimics the one of the exact nuclear probability density.
Ornstein and his coauthors, who constructed a dynamical theory of Brownian motion, taking the equation $mdv/dt =-\\zeta v+X$ as their starting point, usually named the equation after Einstein alone or after both Einstein and Langevin; furthermore, Ornstein, who was the first to extract from this equation the correct expression for $\\bar{\\Delta^2}$, the mean-squared distance covered by a Brownian particle, credited de Haas-Lorentz, rather than Langevin, for finding the stationary limit of $\\bar{\\Delta^2}$. A glance at Einstein s 1907 paper, titled ``Theoretical remarks on Brownian motion  , should suffice to convince one that it is not unfair to attribute the {\\it conception} of the above equation, now universally known as the Langevin equation, to Einstein. Langevin s avowed aim in his 1908 article was to recover, through a route that was `infinitely more simple , Einstein s 1905 expression for the diffusion coefficient, but a careful reading of Langevin s paper shows that--depending on how one interprets his description of the statistical behavior of the random force $X$ appearing in the above equation--his analysis is at best incomplete, and at worst a mere tautology. Since textbook accounts are based on the interpretation that renders the proof fallacious, alternative derivations, which are adaptations of those given by de Haas-Lorentz and Ornstein, are presented here. Some neglected aspects of the contents of Ornstein s early papers on Brownian motion are also brought to light.
We report the method of LC/ESI-MS analysis of underivatized amino acids with corresponding mass spectrum and fragmentation patterns. Diagnostic product ions determined by mass spectrometry can support the qualitative identification and quantitative estimation of individual amino acids. Therefore, the optimization of chromatographic separation using the ion-pairing reagent (i.e., Nonafluoropentanoic acid, NFPA) is useful for the evaluation of target amino acid and for further compound-specific nitrogen isotope studies of amino acids.
Two exemplary exothermic processes, synthesis of nitroglycerine in a continuous stirred tank reactor (CSTR) and synthesis of the explosive RDX in a CSTR, are used to demonstrate the dangers of ignoring the system dynamics when defining criteria for thermal criticality or runaway. Stability analyses are necessary to prescribe such criteria, and for these systems prove the presence of dangerous oscillatory thermal instability which cannot be detected using the steady state thermal balances.
An extension of the CCS-method [Chem. Phys. 2004, 304, p. 103-120] for simulating non-adiabatic dynamics with quantum effects of the nuclei is put forward. The time-dependent Schr\\\"{o}dinger equation for the motion of the nuclei is solved in a moving basis set. The basis set is guided by classical trajectories, which can hop stochastically between different electronic potential energy surfaces. The non-adiabatic transitions are modelled by a modified version of Tully s fewest switches algorithm. The trajectories consist of Gaussians in the phase space of the nuclei (coherent states) combined with amplitudes for an electronic wave function. The time-dependent matrix elements between different coherent states determine the amplitude of each trajectory in the total multistate wave function; the diagonal matrix elements determine the hopping probabilities and gradients. In this way, both intereference effects and non-adiabatic transitions can be described in a very compact fashion, leading to the exact solution if convergence with respect to the number of trajectories is achieved and the potential energy surfaces are known globally. The method is tested on a 2D model for a conical intersection [J. Chem. Phys., 1996, 104, p. 5517], where a nuclear wavepacket encircles the point of degeneracy between two potential energy surfaces and intereferes with itself. These intereference effects are absent in classical trajectory-based molecular dynamics but can be fully incorporated if trajectories are replaced by surface hopping coupled coherent states.
Long-lived singlet states hold the potential to drastically extend the lifetime of hyperpolarization in molecular tracers for in-vivo magnetic resonance imaging (MRI). Such long lived hyperpolarization can be used for elucidation of fundamental metabolic pathways, early diagnosis, and optimization of clinical tests for new medication. All previous measurements of 13C singlet state lifetimes rely on costly and time consuming syntheses of 13C labeled compounds. Here we show that it is possible to determine 13C singlet state lifetimes by detecting the naturally abundant doubly-labeled species. This approach allows for rapid and low cost screening of potential molecular biomarkers bearing long-lived singlet states.
We have performed self-consistent calculations for first and second row atoms using a variant of density-functional theory, the optimized effective potential method, with an approximation due to Krieger, Li and Iafrate and a correlation-energy functional developed by Colle and Salvetti. The mean absolute deviation of first-row atomic ground-state energies from the exact non-relativistic values is 4.7 mH in our scheme, as compared to 4.5 mH in a recent configuration-interaction calculation. The proposed scheme is significantly more accurate than the conventional Kohn-Sham method while the numerical effort involved is about the same as for an ordinary Hartree-Fock calculation.
We show that Full Configuration Interaction Quantum Monte Carlo (FCIQMC) is a Markov Chain in its present form. We construct the Markov matrix of FCIQMC for a two determinant system and hence compute the stationary distribution. These solutions are used to quantify the dependence of the population dynamics on the parameters defining the Markov chain. Despite the simplicity of a system with only two determinants, it still reveals a population control bias inherent to the FCIQMC algorithm. We investigate the effect of simulation parameters on the population control bias for the neon atom and suggest simulation setups to in general minimise the bias. We show a reweighting scheme to remove the bias caused by population control commonly used in Diffusion Monte Carlo [J. Chem. Phys. 99, 2865 (1993)] is effective and recommend its use as a post processing step.
This paper presents an approach for obtaining accurate interaction energies at the DFT level for systems where dispersion interactions are important. This approach combines Becke and Johnson s [J. Chem. Phys. 127, 154108 (2007)] method for the evaluation of dispersion energy corrections and a Hirshfeld method for partitioning of molecular polarizability tensors into atomic contributions. Due to the availability of atomic polarizability tensors, the method is extended to incorporate anisotropic contributions, which prove to be important for complexes of lower symmetry. The method is validated for a set of eighteen complexes, for which interaction energies were obtained with the B3LYP, PBE and TPSS functionals combined with the aug-cc-pVTZ basis set and compared with the values obtained at CCSD(T) level extrapolated to a complete basis set limit. It is shown that very good quality interaction energies can be obtained by the proposed method for each of the examined functionals, the overall performance of the TPSS functional being the best, which with a slope of 1.00 in the linear regression equation and a constant term of only 0.1 kcal/mol allows to obtain accurate interaction energies without any need of a damping function for complexes close to their exact equilibrium geometry.
This paper describes a mixed direct-iterative method for boundary integral formulations of dielectric solvation models. We give an example for which a direct solution at thermal accuracy is nontrivial and for which Gauss-Seidel iteration diverges in rare but reproducible cases. This difficulty is analyzed by obtaining the eigenvalues and the spectral radius of the iteration matrix. This establishes that the nonconvergence is due to inaccuracies of the asymptotic approximations for the matrix elements for accidentally close boundary element pairs on different spheres. This difficulty is cured by checking for boundary element pairs closer than the typical spatial extent of the boundary elements and for those pairs performing an `in-line  Monte Carlo integration to evaluate the required matrix elements. This difficulty are not expected and have not been observed when only a direct solution is sought. Finally, we give an example application of these methods to deprotonation of monosilicic acid in water.
We propose the multi-state complete-active-space second-order perturbation theory spin-orbit method (MS-CASPT2-SO) for electronic structure calculations. It is a two-step spin-orbit coupling method that does not make use of energy shifts and that intrinsically guarantees the correct characters of the small space wave functions that are used to calculate the spin-orbit couplings, in contrast with previous two-step methods.
Reported here are theoretical calculations on the triflic acid and water, establishing molecular scale information necessary to modeling of the structure, thermodynamics, and ionic transport of Nafion membranes. To characterize side chain flexibility and accessibility of the acid proton, free energies for rotation of both carbon-sulfur and sulfur-oxygen (hydroxyl) bonds are presented. The energetic barrier to rotation of the acid proton away from the sulfonic acid oxygen plane is substantially flattened, with barrier less than one kcal/mol, by electrostatic solvation. The activation free energy for acid-water proton interchange is about 4.7 kcal/mol.
The heat capacity and isomer distributions of the 38 atom Lennard-Jones cluster have been calculated in the canonical ensemble using parallel tempering Monte Carlo methods. A distinct region of temperature is identified that corresponds to equilibrium between the global minimum structure and the icosahedral basin of structures. This region of temperatures occurs below the melting peak of the heat capacity and is accompanied by a peak in the derivative of the heat capacity with temperature. Parallel tempering is shown to introduce correlations between results at different temperatures. A discussion is given that compares parallel tempering with other related approaches that ensure ergodic simulations.
The Runge-Gross [E. Runge, and E. K. U. Gross, Phys. Rev. Lett., 52, 997 (1984)] action functional of time-dependent density-functional theory leads to a well-known causality paradox, i.e., a perturbation of the electronic density in the future affects the response of the system in the present. This paradox is known to be caused by an inconsistent application of the Dirac-Frenkel variational principle. In view of the recent solutions to this problem, the action functional employed by Runge and Gross in their formulation of time-dependent density functional theory is analyzed in the context of the Keldysh contour technique. The time-dependent electronic density, as well as the concept of causality, are extended to the contour. We derive a variational equation that obeys causality and relates the exchange-correlation potential with its kernel, and the functional derivative of the exchange-correlation action functional with respect to the density. It is shown that the adiabatic local-density approximation is a consistent solution of this equation and that the time-dependent optimized potential method can also be derived from it. The formalism presented here can be used to find new approximations methods to the exchange-correlation potential and avoid the causality dilemma.
Nuclear resonant forward scattering (NFS) and nuclear inelastic scattering (NIS) of synchrotron radiation are fairly recent spectroscopic methods for the investigation of complexes containing M\\\"ossbauer-active transition metal ions. NFS, which can be regarded as M\\\"ossbauer spectroscopy in the time domain, overcomes some limitations of conventional M\\\"ossbauer spectroscopy as has been demonstrated especially for bioinorganic compounds. NIS extends the energy range of conventional M\\\"ossbauer spectroscopy to the range of molecular vibrations. Since NIS is sensitive only to the mean-square displacement of M\\\"ossbauer nuclei it can be used as site-selective vibrational spectroscopy. It complements usefully comparable techniques such as IR or Raman spectroscopy. Examples are given for applications to spin crossover complexes, nitroprusside compounds, heme model complexes and myoglobin.
The voltammetry for the reduction of oxygen at a microdisc electrode is reported in two room temperature ionic liquids: 1-butyl-1-methylpyyrolidinium bis(trifluoromethylsulfonyl) imide ([Bmpyrr][NTf2]) and trihexyltetradecylphosphonium bis9trifluoromethylsulfonyl) imide ([P14,6,6,6][NTf2]) at 298 K. Simulated voltammograms using Butler-Volmer theory and Symmetric Marcus-Hush (SMH) theory were compared with experimental data. Butler-Volmer theory consistently provided experimental parameters with a higher level of certainty than SMH theory. A value of solvent reorganisation energy for oxygen reduction in ionic liquids was inferred for the first time as 0.4-0.5 eV, which is attributable to inner-sphere reorganisation with a negligible contribution from solvent reorganisation. The developed Butler-Volmer and Symmetric Marcus-Hush programs are also used to theoretically study the possibility of kinetically limited steady state currents, and to establish an approximate equivalence relationship between microdisc electrodes and spherical electrodes resting on a surface for steady state voltammetry for both Butler-Volmer and Symmetric Marcus-Hush theory.
One-electron self-interaction and an incorrect asymptotic behavior of the Kohn-Sham exchange-correlation potential are among the most prominent limitations of many present-day density functionals. However, a one-electron self-interaction-free energy does not necessarily lead to the correct long-range potential. This is here shown explicitly for local hybrid functionals. Furthermore, carefully studying the ratio of the von Weizs\\\"acker kinetic energy density to the (positive) Kohn-Sham kinetic energy density, $\\tau_\\mathrm{W}/\\tau$, reveals that this ratio, which frequently serves as an iso-orbital indicator and is used to eliminate one-electron self-interaction effects in meta-generalized-gradient approximations and local hybrid functionals, can fail to approach its expected value in the vicinity of orbital nodal planes. This perspective article suggests that the nature and consequences of one-electron self-interaction and some of the strategies for its correction need to be reconsidered.
I describe a method for generating \"shim pulses\" for NMR spectroscopy and imaging (MRI) by taking advantage of the inherent inhomogeneity in the static and radiofrequency (RF) fields of a one-sided NMR system. The RF inhomogeneity here is assumed, without loss of generality, to be a linear gradient. General polynomials in the spatial variables can be generated using x, y and z RF gradients using trains of hard pulses which result in linear combinations of monomials xy, y^2, xz etc., and any desired scalings of these monomials. The basic shim pulse is constructed using small tip angle approximations.
We introduce property-independent kernels for machine learning modeling of arbitrarily many molecular properties. The kernels encode molecular structures for training sets of varying size, as well as similarity measures sufficiently diffuse in chemical space to sample over all training molecules. Corresponding molecular reference properties provided, they enable the instantaneous generation of ML models which can systematically be improved through the addition of more data. This idea is exemplified for single kernel based modeling of internal energy, enthalpy, free energy, heat capacity, polarizability, electronic spread, zero-point vibrational energy, energies of frontier orbitals, HOMO-LUMO gap, and the highest fundamental vibrational wavenumber. Models of these properties are trained and tested using 112 kilo organic molecules of similar size. Resulting models are discussed as well as the kernels  use for generating and using other property models.
The purpose of this study is to determine the nature of the oxidation products of FeII-III hydroxycarbonate FeII4FeIII2(OH)12CO3~3H2O (green rust GR(CO32-)) by using the miniaturised M\\\"ossbauer spectrometer MIMOS II. Two M\\\"ossbauer measurements methods are used: method (i) with green rust pastes coated with glycerol and spread into Plexiglas sample holders, and method (ii) with green rust pastes in the same sample holders but introduced into a gas-tight cell with a beryllium window under a continuous nitrogen flow. Method (ii) allows us to follow the continuous deprotonation of GR(CO32-) into the fully ferric deprotonated form FeIII6O4(OH)8CO3~3H2O by adding the correct amount of H2O2, without any further oxidation or degradation of the samples.
Vibrational optical activity (VOA) spectra, such as vibrational circular dichroism (VCD) and Raman optical activity (ROA) spectra, of aliphatic amino acids are simulated using density functional theory (DFT) methods in both gas phase (neutral form) and solution (zwitterionic form), together with their respective infrared (IR) and Raman spectra of the amino acids. The DFT models, which are validated by excellent agreements with the available experimental Raman and ROA spectra of alanine in solution, are employed to study other aliphatic amino acids. The inferred (IR) intensive region (below 2000 cm-1) reveals the signature of alkyl side chains, whereas the Raman intensive region (above 3000 cm-1) contains the information of the functional groups in the amino acids. Furthermore, the chiral carbons of the amino acids (except for glycine) dominate the VCD and ROA spectra in the gas phase, but the methyl group vibrations produce stronger VCD and ROA signals in solution. The C-H related asymmetric vibrations dominate the VOA spectra (i.e., VCD and ROA) > 3000 cm-1 reflecting the side chain structures of the amino acids. Finally the carboxyl and the C(2)H modes of aliphatic amino acids, together with the side chain vibrations, are very active in the VCD/IR and ROA/Raman spectra, which makes such the vibrational spectroscopic methods a very attractive means to study biomolecules.
The formation of ice affects many aspects of our everyday life as well as technologies such as cryotherapy and cryopreservation. Foreign substances almost always aid water freezing through heterogeneous ice nucleation, but the molecular details of this process remain largely unknown. In fact, insight into the microscopic mechanism of ice formation on different substrates is difficult to obtain even via state-of-the-art experimental techniques. At the same time, atomistic simulations of heterogeneous ice nucleation frequently face extraordinary challenges due to the complexity of the water-substrate interaction and the long timescales that characterize nucleation events. Here, we have investigated several aspects of molecular dynamics simulations of heterogeneous ice nucleation considering as a prototypical ice nucleating material the clay mineral kaolinite, which is of relevance in atmospheric science. We show via seeded molecular dynamics simulations that ice nucleation on the hydroxylated (001) face of kaolinite proceeds exclusively via the formation of the hexagonal ice polytype. The critical nucleus size is two times smaller than that obtained for homogeneous nucleation at the same supercooling. Previous findings suggested that the flexibility of the kaolinite surface can alter the time scale for ice nucleation within molecular dynamics simulations. However, we here demonstrate that equally flexible (or non flexible) kaolinite surfaces can lead to very different outcomes in terms of ice formation, according to whether or not the surface relaxation of the clay is taken into account. We show that very small structural changes upon relaxation dramatically alter the ability of kaolinite to provide a template for the formation of a hexagonal overlayer of water molecules at the water-kaolinite interface, and that this relaxation therefore determines the nucleation ability of this mineral.
At non-zero temperature and when a system has low-lying excited electronic states, the ground-state Born--Oppenheimer approximation breaks down and the low-lying electronic states are involved in any chemical process. In this work, we use a temperature-dependent effective potential for the nuclei which can accomodate the influence of an arbitrary number of electronic states in a simple way, while at the same time producing the correct Boltzmann equibrium distribution for the electronic part. With the help of this effective potential, we show that thermally-activated low-lying electronic states can have a significant effect in molecular properties for which electronic excitations are oftentimes ignored. We study the thermal expansion of the Manganese dimer, Mn$_2$, where we find that the average bond length experiences a change larger than the present experimental accuracy upon the inclusion of the excited states into the picture. We also show that, when these states are taken into account, reaction rate constants are modified. In particular, we study the opening of the ozone molecule, O$_3$, and show that in this case the rate is modified as much as a 20% with respect to the ground-state Born--Oppenheimer prediction.
We present a detailed analysis of the role of the magnetic dipole-dipole interaction in cold and ultracold collisions. We focus on collisions between magnetically trapped NH molecules, but the theory is general for any two paramagnetic species for which the electronic spin and its space-fixed projection are (approximately) good quantum numbers. It is shown that dipolar spin relaxation is directly associated with magnetic-dipole induced avoided crossings that occur between different adiabatic potential curves. For a given collision energy and magnetic field strength, the cross-section contributions from different scattering channels depend strongly on whether or not the corresponding avoided crossings are energetically accessible. We find that the crossings become lower in energy as the magnetic field decreases, so that higher partial-wave scattering becomes increasingly important \\textit{below} a certain magnetic field strength. In addition, we derive analytical cross-section expressions for dipolar spin relaxation based on the Born approximation and distorted-wave Born approximation. The validity regions of these analytical expressions are determined by comparison with the NH + NH cross sections obtained from full coupled-channel calculations. We find that the Born approximation is accurate over a wide range of energies and field strengths, but breaks down at high energies and high magnetic fields. The analytical distorted-wave Born approximation gives more accurate results in the case of s-wave scattering, but shows some significant discrepancies for the higher partial-wave channels. We thus conclude that the Born approximation gives generally more meaningful results than the distorted-wave Born approximation at the collision energies and fields considered in this work.
We report experimental observation of a kind of fast spontaneous movements of water drops on surfaces of cones with diameters from 0.1 to 1.5 mm. The observed maximum speed (0.22 m/s) under ambient conditions were at least two orders of magnitude higher than that resulting from any known single spontaneous movement mechanism, for example, Marangoni effect due to gradient of surface tension. We trapped even higher spontaneous movement speeds (up to 125 m/s) in virtual experiments for drops on nanoscale cones by using molecular dynamics simulations. The underlying mechanism is found to be universally effective - drops on any surface either hydrophilic or hydrophobic with varying mean curvature are subject to driving forces toward the gradient direction of the mean curvature. The larger the mean curvature of the surface and the lower the contact angle of the liquid are, the stronger the driving force will be. This discovery can lead to more effective techniques for transporting droplets.
To avoid the combinatorial computational cost of configuration interaction (CI), we have previously introduced the symmetric tensor decomposition CI (STD-CI) method, where we take advantage of the antisymmetric nature of the electronic wave function and express the CI coefficients compactly as a series of Kronecker product states (STD series) [W. Uemura and O. Sugino, Phys. Rev. Lett. 109, 253001 (2012)]. Here we extend the variational degrees of freedom by using different molecular orbitals for different terms in the STD series. This scheme is equivalent to the linear combination of the Hartree-Fock-Bogoliubov state or the antisymmetrized geminal powers (AGP). The total energy converges very rapidly within 0.72 $\\mu$Hartree taking only 10 terms for the water molecule, and the convergence is likewise fast for Hubbard tetramers. The computational cost scales as the fifth power of the number of electrons and the square of the number of terms in the STD series, indicating the promise of this AGP-based scheme for highly accurate and efficient computation of quantum systems.
We develop a Feynman rule for energy-level diagrams emphasizing their connections to the double-sided Feynman diagrams and physical processes in the Liouville space. Thereby we completely identify such diagrams and processes contributing to the two-dimensional response function in the Brownian oscillator model. We classify such diagrams or processes in quartet and numerically present signals separately from each quartet of diagrams or Liouville-space processes. We find that the signal from each quartet is distinctly different from the others; we can identify each peaks in frequency domain with a certain quartet. This offers the basis for analyzing and assigning actual two-dimensional peaks and suggests the possibility of Liouville-space-path selective spectroscopy. As an application we demonstrate an example in which two familiar homogeneous mechanisms of relaxation are distinguished by existence or non-existence of certain peaks on the two-dimensional map; appearance or disappearance of certain peak is sensitive to the coupling mechanism. We also point out some confusion in the literature with regard to inclusion of relaxation effects.
We study transfer of coherent nuclear oscillations between an excitation energy donor and an acceptor in a simple dimeric electronic system coupled to an unstructured thermodynamic bath and some pronounced vibrational intramolecular mode. Our focus is on the non-linear optical response of such a system, i.e. we study both excited state energy transfer and the compensation of the so-called ground state bleach signal. The response function formalism enables us to investigate a heterodimer with monomers coupled strongly to the bath and by a weak resonance coupling to each other (F\\\"{o}rster rate limit). Our work is motivated by recent observation of various vibrational signatures in 2D coherent spectra of energy transferring systems including large structures with a fast energy diffusion. We find that the vibrational coherence can be transferred from donor to acceptor molecules provided the transfer rate is sufficiently fast. The ground state bleach signal of the acceptor molecules does not show any oscillatory signatures, and oscillations in ground state bleaching signal of the donor prevail with the amplitude which is not decreasing with the relaxation rate.
Generalized relativistic effective core potential (GRECP) calculations of spectroscopic constants of the HgH molecule ground and low excited states and the HgH+ cation ground state are carried out, with correlation included by the Fock-space relativistic coupled cluster (RCC) method. Basis set superposition errors (BSSE) are estimated and discussed. It is demonstrated that connected triple excitations of the 13 outermost electrons are necessary to obtain accurate results for mercury hydride. Spectroscopic constants derived from potential curves which include these terms are in very good agreement with experiment, with errors of a few mbohr in Re, tens of wavenumbers in excitation energies and vibrational frequencies, and proportionately for other properties. Comparison with previous calculations is also presented.
Given the difficulty of obtaining compact analytical solutions for diffusion of interacting geminate pairs (such as electron-hole pairs generated by ionization of liquid) it is common, following the original method of Mozumder, to \"prescribe\" this diffusion. With this approach, the survival probability of the pair is represented as a product of the survival probability for a freely diffusing pair and a suitably defined weighting function. This approach gives the correct limiting survival probability for a pair in the Coulomb field. The same approach was used for simulation of reaction dynamics in radiolytic spurs (\"independent reaction times\" approach of Pimblott) and solve other vexing diffusion problems that do not have analytical solution. A reasonable question is, can the same method be used for any other interaction potential than Coulomb? Here we demonstrate that such a prescription is generally impossible. The correct result given by the prescribed diffusion approach for the Coulomb potential is, actually, purely accidental. The method is inherently contradictory and it should be used with caution.
The metal oxide polymeric methyltrioxorhenium [(CH3)xReO3] is an unique epresentative of a layered inherent conducting organometallic polymer which adopts the structural motifs of classical perovskites in two dimensions (2D) in form of methyl-deficient, corner-sharing ReO5(CH3) octahedra. In order to improve the characteristics of polymeric methyltrioxorhenium with respect to its physical properties and potential usage as an inherentconducting polymer we tried to optimise the synthetic routes of polymeric modifications of 1 to obtain a sintered ceramic material, denoted ceramic MTO. Ceramic MTO formed in a solvent-free synthesis via auto-polymerisation and subsequent sintering processing displays clearly different mechanical and physical properties from polymeric MTO synthesised in aqueous solution. Ceramic MTO is shown to display activated Re-C and Re=O bonds relative to MTO. These electronic and structural characteristics of ceramic MTO are also reflected by a different chemical reactivity compared with its monomeric parent compound. First examples of the unprecedented reactivity of ceramic MTO in the field of amine oxidations are shown - results which warrant further exploitation.
Recent predictions of absolute binding free energies of host-guest complexes in aqueous solution using electronic structure theory have been encouraging for some systems, while other systems remain problematic for others. In paper I summarize some of the many factors that could easily contribute 1-3 kcal/mol errors at 298 K: three-body dispersion effects, molecular symmetry, anharmonicity, spurious imaginary frequencies, insufficient conformational sampling, wrong or changing ionization states, errors in the solvation free energy of ions, and explicit solvent (and ion) effects that are not well-represented by continuum models. While I focus on binding free energies in aqueous solution the approach also applies (with minor adjustments) to any free energy difference such as conformational or reaction free energy differences or activation free energies in any solvent.
Finding a proper local measure of chemical hardness has been a long-standing aim of density functional theory. The traditional approach to defining a local hardness index, by the derivative of the chemical potential with respect to the electron density subject to the constraint of a fixed external potential, has raised several questions, and its chemical applicability has proved to be limited. Here, we point out that the only actual possibility to obtain a local hardness measure in the traditional approach emerges if the external potential constraint is dropped; consequently, utilizing the ambiguity of a restricted chemical potential derivative is not an option to gain alternative definitions of local hardness. At the same time, however, the arising local hardness concept turns out to be fatally undermined by its inherent connection with the asymptotic value of the second derivative of the universal density functional. The only other local hardness concept one may deduce from the traditional definition is the one that gives a constant value, the global hardness itself, throughout an electron system in its ground state. Consequently, the traditional approach is in principle incapable of delivering a local hardness indicator. The parallel case of defining a local version of the chemical potential itself is also outlined, arriving at a similar conclusion. Namely, the only local chemical potential concept that can be gained from a definition dE[n]/dn(r)|v is the one that gives a constant, mu itself, for electron systems in their ground state.
Converting CO$_2$ to useful compounds through the solar photocatalytic reduction has been one of the most promising strategies for artificial carbon recycling. The highly relevant photocatalytic substrate for CO$_2$ conversion has been the popular TiO$_2$ surfaces. However, the lack of accurate fundamental parameters that determine the CO$_2$ reduction on TiO$_2$ has limited our ability to control these complicated photocatalysis processes. We have systematically studied the reduction of CO2 at specific sites of the rutile TiO$_2$(110)-1x1 surface using scanning tunneling microscopy at 80 K. The dissociation of CO2 molecules is found to be activated by one electron attachment process and its energy threshold, corresponding to the CO$_2^{\\dot-}$/CO$_2$ redox potential, is unambiguously determined to be 2.3 eV higher than the onset of the TiO$_2$ conduction band. The dissociation rate as a function of electron injection energy is also provided. Such information can be used as practical guidelines for the design of effective catalysts for CO$_2$ photoreduction.
Electronic structure of HCl+ and HBr+ molecular ions is calculated using the symmetry-adapted-cluster configuration interaction (SAC-CI) method. In this paper, we analyse dipole moments (DM) for a series of low-lying six 2Pi-states and transition dipole moments (TDM for transitions from the ground state X2Pi to the excited 2Pi-series. Behavior of DMs with change of interatomic distances is different for these ions for the excited 2Pi-states in correspondence with different dissociation paths. TDMs reveal the pronounced maxima at the beginning steps of dissociation.
The values of molecular polarizabilities and softnesses of the twenty amino acids were computed ab initio (MP2). By using the iterative Hirshfeld scheme to partition the molecular electronic properties, we demonstrate that the values of the softness of the side chain of the twenty amino acid are clustered in groups reflecting their biochemical classification, namely: aliphatic, basic, acidic, sulfur containing, and aromatic amino acids . The present findings are in agreement with previous results using different approximations and partitioning schemes [P. Senet and F. Aparicio, J. Chem. Phys. 126,145105 (2007)]. In addition, we show that the polarizability of the side chain of an amino acid depends mainly on its number of electrons (reflecting its size) and consequently cannot be used to cluster the amino acids in different biochemical groups, in contrast to the local softness. Our results also demonstrate that the global softness is not simply proportional to the global polarizability in disagreement with the intuition that \"a softer moiety is also more polarizable\". Amino acids with the same softness may have a polarizability differing by a factor as large as 1.7. This discrepancy can be understood from first principles as we show that the molecular polarizability depends on a \"softness dipole vector\" and not simply on the global softness.
In the present study, dissociative electron attachment (DEA) measurements with gas phase HMX, octahydro-1,3,5,7-tetranitro-1,3,5,7-tetrazocine, $C_4H_8N_8O_8$, have been performed by means of a crossed electron-molecular beam experiment. The most intense signals are observed at 46 and 176u and assigned to $NO_{2}^{-}$ and $C_3H_6N_5O_{4}^{-}$, respectively. Anion efficiency curves for 15 negatively charged fragments have been measured in the electron energy region from about 0-20 eV with an energy resolution of ~0.7 eV. Product anions are observed mainly in the low energy region, near 0 eV, arising from surprisingly complex reactions associated with multiple bond cleavages and structural and electronic rearrangement. The remarkable instability of HMX towards electron attachment with virtually zero kinetic energy reflects the highly explosive nature of this compound. Substantially different intensity ratios of resonances for common fragment anions allow distinguishing the nitroamines HMX and royal demolition explosive molecule (RDX) in negative ion mass spectrometry based on free electron capture.
We analyze a decomposition of the Coulomb electron-electron interaction into a long-range and a short-range part in the framework of density functional theory, deriving some scaling relations and the corresponding virial theorem. We study the behavior of the local density approximation in the high-density limit for the long-range and the short-range functionals by carrying out a detailed analysis of the correlation energy of a uniform electron gas interacting via a long-range only electron-electron repulsion. Possible definitions of exchange and correlation energy densities are discussed and clarified with some examples.
The standard classical expression of the state-resolved photo-dissociation cross section is not consistent with an efficient Bohr quantization of product internal motions. A new and strictly equivalent expression not suffering from this drawback is proposed. This expression opens the way to more realistic classical simulations of direct polyatomic photo-dissociations in the quantum regime where only a few states are available to the products.
We propose a simple yet effective route to the design of superalkalis, by successive alkali metal substitution in borazine (B3N3H6). Using Li atoms, our density functional calculations demonstrate that the vertical ionization energy (VIE) of B3N3H6-xLix decreases with the increase in x for x equals 1-6. For x equals 4, the VIE of B3N3H6-xLix becomes lower than that of Li atom, thereby indicating their superalkali nature. More interestingly, all these species are planar such that NICSzz value at the rings center is reduced. These novel superalkalis are expected to stimulate further interests in this field.
Explicit molecular dynamics simulations were applied to a pair of amorphous silica nanoparticles in aqueous solution, of diameter 4.4 nm with four different background electrolyte concentrations, to extract the mean force acting between the pair of silica nanoparticles. Dependences of the interparticle forces with separation and the background electrolyte concentration were demonstrated. The nature of the interaction of the counter-ions with charged silica surface sites (deprotonated silanols) was investigated. A  patchy  double layer of adsorbed sodium counter-ions. was observed. Dependences of the interparticle potential of mean force with separation and the background electrolyte concentration were demonstrated. Direct evidence of the solvation forces is presented in terms of changes of the water ordering at the surfaces of the isolated and double nanoparticles. The nature of the interaction of the counter-ions with charged silica surface sites (deprotonated silanols) was investigated in terms of quantifying the effects of the number of water molecules separately inside each of the pair of nanoparticles by defining an impermeability measure. A direct correlation was found between impermeability (related to the silica surface  hairiness ) and the disruption of water ordering. Differences in the impermeability between the two nanoparticles are attributed to differences in the calculated electric dipole moment.
For closed-shell systems, the local density approximation (LDA) and the LYP, BLYP, and B3LYP functionals are shown to be compatible with reference-state one-particle density-matrix theory, where this recently introduced formalism is based on Brueckner-orbital theory and an energy functional that includes exact exchange and a non-universal correlation-energy functional. The method is demonstrated to reduce to a density functional theory when the exchange-correlation energy-functional has a simplified form, i.e., its integrand contains only the coordinates of two electron, say r1 and r2, and it has a Dirac delta function -- delta(r1 - r2) -- as a factor. Since Brueckner and Hartree--Fock orbitals are often very similar, any local exchange functional that works well with Hartree--Fock theory is a reasonable approximation with reference-state one-particle density-matrix theory. The LDA approximation is also a reasonable approximation. However, the Colle--Salvetti correlation-energy functional, and the LYP variant, are not ideal for the method, since these are universal functionals. Nevertheless, they appear to provide reasonable approximations. The B3LYP functional is derived using a linear combination of two functionals: One is the BLYP functional; the other uses exact exchange and a correlation-energy functional from the LDA.
The local structures and optical absorption characteristic of Fe doped TiO2 nanoparticles synthesized by the sol-gel method were characterized by X-ray Diffraction (XRD), X-ray absorption fine structure spectroscopy (XAFS) and UV-Vis absorption spectroscopy (UV-Vis). XRD patterns show that all Fe-doped TiO2 samples have the characteristic anatase structure. Accurate Fe and Ti K-edge EXAFS analysis further reveal that all Fe atoms replace Ti atoms in the anatase lattice. The analysis of UV-Vis data shows a red shift to the visible range. According to the above results, we claim that substitutional Fe atoms lead to the formation of structural defects and new intermediate energy levels appear, narrowing the band gap and extending the optical absorption edge towards the visible region.
While application software does the real work, domain-specific languages (DSLs) are tools to help produce it efficiently, and language design assistants in turn are meta-tools to help produce DSLs quickly. DSLs are already in wide use (HTML for web pages, Excel macros for spreadsheet applications, VHDL for hardware design, ...), but many more will be needed for both new as well as existing application domains. Language design assistants to help develop them currently exist only in the basic form of language development systems. After a quick look at domain-specific languages, and especially their relationship to application libraries, we survey existing language development systems and give an outline of future language design assistants.
Typical JavaScript (JS) programs feature a large number of object property accesses. Hence, fast property reads and writes are crucial for good performance. Unfortunately, many (often redundant) dynamic checks are implied in each property access and the semantic complexity of JS makes it difficult to optimize away these tests through program analysis. We introduce two techniques to effectively eliminate a large proportion of dynamic checks related to object property accesses. Typed shapes enable code specialization based on object property types without potentially complex and expensive analyses. Shape propagation allows the elimination of redundant shape checks in inline caches. These two techniques combine particularly well with Basic Block Versioning (BBV), but should be easily adaptable to tracing Just-In-Time (JIT) compilers and method JITs with type feedback. To assess the effectiveness of the techniques presented, we have implemented them in Higgs, a type-specializing JIT compiler for JS. The techniques are compared to a baseline using polymorphic Inline Caches (PICs), as well as commercial JS implementations. Empirical results show that across the 26 benchmarks tested, these techniques eliminate on average 48% of type tests, reduce code size by 17% and reduce execution time by 25%. On several benchmarks, Higgs performs better than current production JS virtual machines
Given a program and a time deadline, does the program finish before the deadline when executed on a given platform? With the requirement to produce a test case when such a violation can occur, we refer to this problem as the worst-case execution-time testing (WCETT) problem. In this paper, we present an approach for solving the WCETT problem for loop-free programs by timing the execution of a program on a small number of carefully calculated inputs. We then create a sequence of integer linear programs the solutions of which encode the best timing model consistent with the measurements. By solving the programs we can find the worst-case input as well as estimate execution time of any other input. Our solution is more accurate than previous approaches and, unlikely previous work, by increasing the number of measurements we can produce WCETT bounds up to any desired accuracy. Timing of a program depends on the properties of the platform it executes on. We further show how our approach can be used to quantify the timing repeatability of the underlying platform.
Program behavior may depend on parameters, which are either configured before compilation time, or provided at run-time, e.g., by sensors or other input devices. Parametric program analysis explores how different parameter settings may affect the program behavior. In order to infer invariants depending on parameters, we introduce parametric strategy iteration. This algorithm determines the precise least solution of systems of integer equations depending on surplus parameters. Conceptually, our algorithm performs ordinary strategy iteration on the given integer system for all possible parameter settings in parallel. This is made possible by means of region trees to represent the occurring piecewise affine functions. We indicate that each required operation on these trees is polynomial-time if only constantly many parameters are involved. Parametric strategy iteration for systems of integer equations allows to construct parametric integer interval analysis as well as parametric analysis of differences of integer variables. It thus provides a general technique to realize precise parametric program analysis if numerical properties of integer variables are of concern.
We present a formal framework for repairing infinite-state, imperative, sequential programs, with (possibly recursive) procedures and multiple assertions; the framework can generate repaired programs by modifying the original erroneous program in multiple program locations, and can ensure the readability of the repaired program using user-defined expression templates; the framework also generates a set of inductive assertions that serve as a proof of correctness of the repaired program. As a step toward integrating programmer intent and intuition in automated program repair, we present a \" cost-aware\" formulation - given a cost function associated with permissible statement modifications, the goal is to ensure that the total program modification cost does not exceed a given repair budget. As part of our predicate abstraction-based solution framework, we present a sound and complete algorithm for repair of Boolean programs. We have developed a prototype tool based on SMT solving and used it successfully to repair diverse errors in benchmark C programs.
Scala s type system unifies ML modules, object-oriented, and functional programming. The Dependent Object Types (DOT) family of calculi has been proposed as a new foundation for Scala and similar languages. Unfortunately, it is not clear how DOT relates to any well-known type systems, and type soundness has only been established for very restricted subsets. In fact, important Scala features are known to break at least one key metatheoretic property such as environment narrowing or subtyping transitivity, which are usually required for a type soundness proof. First, and, perhaps surprisingly, we show how rich DOT calculi can still be proved sound. The key insight is that narrowing and subtyping transitivity only need to hold for runtime objects, but not for code that is never executed. Alas, the dominant method of proving type soundness, Wright and Felleisen s syntactic approach, is based on term rewriting, which does not a priori make a distinction between runtime and type assignment time. Second, we demonstrate how type soundness can be proved for advanced, polymorphic, type systems with respect to high-level, definitional interpreters, implemented in Coq. We present the first mechanized soundness proof in this style for System F<: and several extensions, including mutable references. Our proofs use only simple induction: another surprising result, as the combination of big-step semantics, mutable references, and polymorphism is commonly believed to require co-inductive proof techniques. Third, we show how DOT-like calculi emerge as generalizations of F<:, exposing a rich design space of calculi with path-dependent types which we collectively call System D. Armed with insights from the definitional interpreter semantics, we also show how equivalent small-step semantics and soundness proofs in Wright-Felleisen-style can be derived for these systems.
This paper is aimed to present the importance and implementation of an incremental call graph plugin. An algorithm is proposed for the call graph implementation which has better overall performance than the algorithm that has been proposed previously. In addition to this, the algorithm has been empirically proved to have excellent performance on recursive codes. The algorithm also readily checks for function skip and returns exceptions.
We present algorithms for checking and enforcing robustness of concurrent programs against the Total Store Ordering (TSO) memory model. A program is robust if all its TSO computations correspond to computations under the Sequential Consistency (SC) semantics. We provide a complete characterization of non-robustness in terms of so-called attacks: a restricted form of (harmful) out-of-program-order executions. Then, we show that detecting attacks can be parallelized, and can be solved using state reachability queries under SC semantics in a suitably instrumented program obtained by a linear size source-to-source translation. Importantly, the construction is valid for an arbitrary number of addresses and an arbitrary number of parallel threads, and it is independent from the data domain and from the size of store buffers in the TSO semantics. In particular, when the data domain is finite and the number of addresses is fixed, we obtain decidability and complexity results for robustness, even for an arbitrary number of threads. As a second contribution, we provide an algorithm for computing an optimal set of fences that enforce robustness. We consider two criteria of optimality: minimization of program size and maximization of its performance. The algorithms we define are implemented, and we successfully applied them to analyzing and correcting several concurrent algorithms.
This paper is a short tutorial introduction to online partial evaluation. We show how to write a simple online partial evaluator for a simple, pure, first-order, functional programming language. In particular, we show that the partial evaluator can be derived as a variation on a compositionally defined interpreter. We demonstrate the use of the resulting partial evaluator for program optimization in the context of model-driven development.
Stencil computations, involving operations over the elements of an array, are a common programming pattern in scientific computing, games, and image processing. As a programming pattern, stencil computations are highly regular and amenable to optimisation and parallelisation. However, general-purpose languages obscure this regular pattern from the compiler, and even the programmer, preventing optimisation and obfuscating (in)correctness. This paper furthers our work on the Ypnos domain-specific language for stencil computations embedded in Haskell. Ypnos allows declarative, abstract specification of stencil computations, exposing the structure of a problem to the compiler and to the programmer via specialised syntax. In this paper we show the decidable safety guarantee that well-formed, well-typed Ypnos programs cannot index outside of array boundaries. Thus indexing in Ypnos is safe and run-time bounds checking can be eliminated. Program information is encoded as types, using the advanced type-system features of the Glasgow Haskell Compiler, with the safe-indexing invariant enforced at compile time via type checking.
We investigate a technique from the literature, called the phantom-types technique, that uses parametric polymorphism, type constraints, and unification of polymorphic types to model a subtyping hierarchy. Hindley-Milner type systems, such as the one found in Standard ML, can be used to enforce the subtyping relation, at least for first-order values. We show that this technique can be used to encode any finite subtyping hierarchy (including hierarchies arising from multiple interface inheritance). We formally demonstrate the suitability of the phantom-types technique for capturing first-order subtyping by exhibiting a type-preserving translation from a simple calculus with bounded polymorphism to a calculus embodying the type system of SML.
Reductionism is a viable strategy for designing and implementing practical programming languages, leading to solutions which are easier to extend, experiment with and formally analyze. We formally specify and implement an extensible programming language, based on a minimalistic first-order imperative core language plus strong abstraction mechanisms, reflection and self-modification features. The language can be extended to very high levels: by using Lisp-style macros and code-to-code transforms which automatically rewrite high-level expressions into core forms, we define closures and first-class continuations on top of the core. Non-self-modifying programs can be analyzed and formally reasoned upon, thanks to the language simple semantics. We formally develop a static analysis and prove a soundness property with respect to the dynamic semantics. We develop a parallel garbage collector suitable to multi-core machines to permit efficient execution of parallel programs.
A proxy object is a surrogate or placeholder that controls access to another target object. Proxy objects are a widely used solution for different scenarios such as remote method invocation, future objects, behavioral reflection, object databases, inter-languages communications and bindings, access control, lazy or parallel evaluation, security, among others. Most proxy implementations support proxies for regular objects but are unable to create proxies for objects with an important role in the runtime infrastructure such as classes or methods. Proxies can be complex to install, they can have a significant overhead, they can be limited to certain kind of classes, etc. Moreover, proxy implementations are often not stratified and they do not have a clear separation between proxies (the objects intercepting messages) and handlers (the objects handling interceptions). In this paper, we present Ghost: a uniform and general-purpose proxy implementation for the Pharo programming language. Ghost provides low memory consuming proxies for regular objects as well as for classes and methods. When a proxy takes the place of a class, it intercepts both the messages received by the class and the lookup of methods for messages received by its instances. Similarly, if a proxy takes the place of a method, then the method execution is intercepted too.
A novel language system has given rise to promising alternatives to standard formal and processor network models of computation. An interstring linked with a abstract machine environment, shares sub-expressions, transfers data, and spatially allocates resources for the parallel evaluation of dataflow. Formal models called the a-Ram family are introduced, designed to support interstring programming languages (interlanguages). Distinct from dataflow, graph rewriting, and FPGA models, a-Ram instructions are bit level and execute in situ. They support sequential and parallel languages without the space/time overheads associated with the Turing Machine and l-calculus, enabling massive programs to be simulated. The devices of one a-Ram model, called the Synchronic A-Ram, are fully connected and simpler than FPGA LUT s. A compiler for an interlanguage called Space, has been developed for the Synchronic A-Ram. Space is MIMD. strictly typed, and deterministic. Barring memory allocation and compilation, modules are referentially transparent. At a high level of abstraction, modules exhibit a state transition system, aiding verification. Data structures and parallel iteration are straightforward to implement, and allocations of sub-processes and data transfers to resources are implicit. Space points towards highly connected architectures called Synchronic Engines, that scale in a GALS manner. Synchronic Engines are more general purpose than systolic arrays and GPUs, and bypass programmability and conflict issues associated with multicores.
The aim of this work is to define and implement an extended C++ language to support the SIMD programming paradigm. The C++ programming language has been extended to express all the potentiality of an abstract SIMD machine consisting of a central Control Processor and a N-dimensional toroidal array of Numeric Processors. Very few extensions have been added to the standard C++ with the goal of minimising the effort for the programmer in learning a new language and to keep very high the performance of the compiled code. The proposed language has been implemented as a porting of the GNU C++ Compiler on a SIMD supercomputer.
We report on a transformation from Sequential Function Charts of the IEC 61131-3 standard to BIP. Our presentation features a description of formal syntax and semantics representation of the involved languages and transformation rules. Furthermore, we present a formalism for describing invariants of IEC 61131-3 systems and establish a notion of invariant preservation between the two languages. For a subset of our transformation rules we sketch a proof showing invariant preservation during the transformation of IEC 61131-3 to BIP and vice versa.
The statements `inheritance is not subtyping  and `mainstream OO languages unnecessarily place restrictions over inheritance  have rippled as mantras through the PL research community for years. Many mainstream OO developers and OO language designers however do not accept these statements. In \\emph{nominally-typed} OO languages that these developers and language designers are dearly familiar with, inheritance simply is subtyping; and they believe OO type inheritance is an inherently nominal notion not a structural one. Nominally-typed OO languages are among the most used programming languages today. However, the value of nominal typing to mainstream OO developers, as a means for designing robust OO software, seems to be in wait for full appreciation among PL researchers--thereby perpetuating an unnecessary schism between many OO developers and language designers and many OO PL researchers, with each side discounting, if not even disregarding, the views of the other. In this essay we strengthen earlier efforts to demonstrate the semantic value of nominal typing by presenting a technical comparison between nominal OO type systems and structural OO type systems. Recently, a domain-theoretic model of nominally-typed OOP was compared to well-known models of structurally-typed OOP. Combined, these comparisons provide a clear and deep account for the relation between nominal and structural OO type systems that has not been presented before, and they help demonstrate the key value of nominal typing and nominal subtyping to OO developers and language designers. We believe a clearer understanding of the key semantic advantage of pure nominal OO typing over pure structural OO typing can help remedy the existing schism. We believe future foundational OO PL research, to further its relevance to mainstream OOP, should be based less on structural models of OOP and more on nominal ones instead.
The C Object System (Cos) is a small C library which implements high-level concepts available in Clos, Objc and other object-oriented programming languages: uniform object model (class, meta-class and property-metaclass), generic functions, multi-methods, delegation, properties, exceptions, contracts and closures. Cos relies on the programmable capabilities of the C programming language to extend its syntax and to implement the aforementioned concepts as first-class objects. Cos aims at satisfying several general principles like simplicity, extensibility, reusability, efficiency and portability which are rarely met in a single programming language. Its design is tuned to provide efficient and portable implementation of message multi-dispatch and message multi-forwarding which are the heart of code extensibility and reusability. With COS features in hand, software should become as flexible and extensible as with scripting languages and as efficient and portable as expected with C programming. Likewise, Cos concepts should significantly simplify adaptive and aspect-oriented programming as well as distributed and service-oriented computing
A multitude of different probabilistic programming languages exists today, all extending a traditional programming language with primitives to support modeling of complex, structured probability distributions. Each of these languages employs its own probabilistic primitives, and comes with a particular syntax, semantics and inference procedure. This makes it hard to understand the underlying programming concepts and appreciate the differences between the different languages. To obtain a better understanding of probabilistic programming, we identify a number of core programming concepts underlying the primitives used by various probabilistic languages, discuss the execution mechanisms that they require and use these to position state-of-the-art probabilistic languages and their implementation. While doing so, we focus on probabilistic extensions of logic programming languages such as Prolog, which have been developed since more than 20 years.
Constraint Handling Rules (CHR) is a declarative committed-choice programming language with a strong relationship to linear logic. Its generalization CHR with Disjunction (CHRv) is a multi-paradigm declarative programming language that allows the embedding of horn programs. We analyse the assets and the limitations of the classical declarative semantics of CHR before we motivate and develop a linear-logic declarative semantics for CHR and CHRv. We show how to apply the linear-logic semantics to decide program properties and to prove operational equivalence of CHRv programs across the boundaries of language paradigms.
We introduce streaming data string transducers that map input data strings to output data strings in a single left-to-right pass in linear time. Data strings are (unbounded) sequences of data values, tagged with symbols from a finite set, over a potentially infinite data domain that supports only the operations of equality and ordering. The transducer uses a finite set of states, a finite set of variables ranging over the data domain, and a finite set of variables ranging over data strings. At every step, it can make decisions based on the next input symbol, updating its state, remembering the input data value in its data variables, and updating data-string variables by concatenating data-string variables and new symbols formed from data variables, while avoiding duplication. We establish that the problems of checking functional equivalence of two streaming transducers, and of checking whether a streaming transducer satisfies pre/post verification conditions specified by streaming acceptors over input/output data-strings, are in PSPACE. We identify a class of imperative and a class of functional programs, manipulating lists of data items, which can be effectively translated to streaming data-string transducers. The imperative programs dynamically modify a singly-linked heap by changing next-pointers of heap-nodes and by adding new nodes. The main restriction specifies how the next-pointers can be used for traversal. We also identify an expressively equivalent fragment of functional programs that traverse a list using syntactically restricted recursive calls. Our results lead to algorithms for assertion checking and for checking functional equivalence of two programs, written possibly in different programming styles, for commonly used routines such as insert, delete, and reverse.
C++ does not support run-time resolution of template type arguments. To circumvent this restriction, we can instantiate a template for all possible combinations of type arguments at compile time and then select the proper instance at run time by evaluation of some provided conditions. However, for templates with multiple type parameters such a solution may easily result in a branching code bloat. We present a template metaprogramming algorithm called for_id that allows the user to select the proper template instance at run time with theoretical minimum sustained complexity of the branching code.
PGA (ProGram Algebra) is an algebra of programs which concerns programs in their simplest form: sequences of instructions. Molecular dynamics is a simple model of computation developed in the setting of PGA, which bears on the use of dynamic data structures in programming. We consider the programming of an interpreter for a program notation that is close to existing assembly languages using PGA with the primitives of molecular dynamics as basic instructions. It happens that, although primarily meant for explaining programming language features relating to the use of dynamic data structures, the collection of primitives of molecular dynamics in itself is suited to our programming wants.
Logic programming has traditionally lacked devices for expressing mutually exclusive modules. We address this limitation by adopting choice-conjunctive modules of the form $D_0 \\& D_1$ where $D_0, D_1$ are a conjunction of Horn clauses and $\\&$ is a linear logic connective. Solving a goal $G$ using $D_0 \\& D_1$ -- $exec(D_0 \\& D_1,G)$ -- has the following operational semantics: $choose$ a successful one between $exec(D_0,G)$ and $exec(D_1,G)$. In other words, if $D_0$ is chosen in the course of solving $G$, then $D_1$ will be discarded and vice versa. Hence, the class of choice-conjunctive modules can capture the notion of mutually exclusive modules.
Forty years ago Dijkstra introduced the current conventional execution of routines. It places activation frames onto a stack. Each frame is the internal state of an executing routine. The resulting application execution is not easily helped by an external system. This presentation proposes an alternative execution of routines. It places task frames onto the stack. A task frame is the call of a routine to be executed. The feasibility of the alternative execution is demonstrated by a crude implementation. As described elsewhere, an application which executes in terms of tasks can be provided by an external system with a transparent reliable, distributed, heterogeneous, adaptive, dynamic, real-time, parallel, secure or other execution. By extending the crude implementation, this presentation outlines a simple transparent parallel execution.
Data-flow analyses usually associate information with control flow regions. Informally, if these regions are too small, like a point between two consecutive statements, we call the analysis dense. On the other hand, if these regions include many such points, then we call it sparse. This paper presents a systematic method to build program representations that support sparse analyses. To pave the way to this framework we clarify the bibliography about well-known intermediate program representations. We show that our approach, up to parameter choice, subsumes many of these representations, such as the SSA, SSI and e-SSA forms. In particular, our algorithms are faster, simpler and more frugal than the previous techniques used to construct SSI - Static Single Information - form programs. We produce intermediate representations isomorphic to Choi et al. s Sparse Evaluation Graphs (SEG) for the family of data-flow problems that can be partitioned per variables. However, contrary to SEGs, we can handle - sparsely - problems that are not in this family.
The static estimation of the energy consumed by program executions is an important challenge, which has applications in program optimization and verification, and is instrumental in energy-aware software development. Our objective is to estimate such energy consumption in the form of functions on the input data sizes of programs. We have developed a tool for experimentation with static analysis which infers such energy functions at two levels, the instruction set architecture (ISA) and the intermediate code (LLVM IR) levels, and reflects it upwards to the higher source code level. This required the development of a translation from LLVM IR to an intermediate representation and its integration with existing components, a translation from ISA to the same representation, a resource analyzer, an ISA-level energy model, and a mapping from this model to LLVM IR. The approach has been applied to programs written in the XC language running on XCore architectures, but is general enough to be applied to other languages. Experimental results show that our LLVM IR level analysis is reasonably accurate (less than 6.4% average error vs. hardware measurements) and more powerful than analysis at the ISA level. This paper provides insights into the trade-off of precision versus analyzability at these levels.
A range of methodologies and techniques are available to guide the design and implementation of language extensions and domain-specific languages. A simple yet powerful technique is based on source-to-source transformations interleaved across the compilation passes of a base language. Despite being a successful approach, it has the main drawback that the input source code is lost in the process. When considering the whole workflow of program development (warning and error reporting, debugging, or even program analysis), program translations are no more powerful than a glorified macro language. In this paper, we propose an augmented approach to language extensions for Prolog, where symbolic annotations are included in the target program. These annotations allow selectively reversing the translated code. We illustrate the approach by showing that coupling it with minimal extensions to a generic Prolog debugger allows us to provide users with a familiar, source-level view during the debugging of programs which use a variety of language extensions, such as functional notation, DCGs, or CLP{Q,R}.
Program transformation is an appealing technique which allows to improve run-time efficiency, space-consumption, and more generally to optimize a given program. Essentially, it consists of a sequence of syntactic program manipulations which preserves some kind of semantic equivalence. Unfolding is one of the basic operations which is used by most program transformation systems and which consists in the replacement of a procedure call by its definition. While there is a large body of literature on transformation and unfolding of sequential programs, very few papers have addressed this issue for concurrent languages. This paper defines an unfolding system for CHR programs. We define an unfolding rule, show its correctness and discuss some conditions which can be used to delete an unfolded rule while preserving the program meaning. We also prove that, under some suitable conditions, confluence and termination are preserved by the above transformation. To appear in Theory and Practice of Logic Programming (TPLP)
We present a full-spectrum dependently typed core language which includes both nontermination and computational irrelevance (a.k.a. erasure), a combination which has not been studied before. The two features interact: to protect type safety we must be careful to only erase terminating expressions. Our language design is strongly influenced by the choice of CBV evaluation, and by our novel treatment of propositional equality which has a heterogeneous, completely erased elimination form.
Register allocation has long been formulated as a graph coloring problem, coloring the conflict graph with physical registers. Such a formulation does not fully capture the goal of the allocation, which is to minimize the traffic between registers and memory. Linear scan has been proposed as an alternative to graph coloring, but in essence, it can be viewed as a greedy algorithm for graph coloring: coloring the vertices not in the order of their degrees, but in the order of their occurence in the program. Thus it suffers from almost the same constraints as graph coloring. In this article, I propose a new method of register allocation based on the ideas of model transformer semantics (MTS) and static cache replacement (SCR). Model transformer semantics captures the semantics of registers and the stack. Static cache replacement relaxes the assumptions made by graph coloring and linear scan, aiming directly at reducing register-memory traffic. The method explores a much larger solution space than that of graph coloring and linear scan, thus providing more opportunities of optimization. It seamlessly performs live range splitting, an optimization found in extensions to graph coloring and linear scan. Also, it simplifies the compiler, and its semantics-based approach provides possibilities of simplifying the formal verification of compilers.
We present a linear functional calculus with both the safety guarantees expressible with linear types and the rich language of combinators and composition provided by functional programming. Unlike previous combinations of linear typing and functional programming, we compromise neither the linear side (for example, our linear values are first-class citizens of the language) nor the functional side (for example, we do not require duplicate definitions of compositions for linear and unrestricted functions). To do so, we must generalize abstraction and application to encompass both linear and unrestricted functions. We capture the typing of the generalized constructs with a novel use of qualified types. Our system maintains the metatheoretic properties of the theory of qualified types, including principal types and decidable type inference. Finally, we give a formal basis for our claims of expressiveness, by showing that evaluation respects linearity, and that our language is a conservative extension of existing functional calculi.
The most prominent proposals of subtyping for asynchronous session types are by Mostrous and Yoshida for binary sessions, by Chen et al. for binary sessions under the assumption that every message emitted is eventually consumed, and by Mostrous et al. for multiparty session types. We prove that, differently from what stated or conjectured in the proposals above, all of these three subtyping relations are undecidable.
Software synthesis - the process of generating complete, general-purpose programs from specifications - has become a hot research topic in the past few years. For decades the problem was thought to be insurmountable: the search space of possible programs is far too massive to efficiently traverse. Advances in efficient constraint solving have overcome this barrier, enabling a new generation of effective synthesis systems. Most existing systems compile synthesis tasks down to low-level SMT instances, sacrificing high-level semantic information while solving only first-order problems (i.e., filling integer holes). Recent work takes an alternative approach, using the Curry-Howard isomorphism and techniques from automated theorem proving to construct higher-order programs with algebraic datatypes. My thesis involved extending this type-directed synthesis engine to handle product types, which required significant modifications to both the underlying theory and the tool itself. Product types streamline other language features, eliminating variable-arity constructors among other workarounds employed in the original synthesis system. A form of logical conjunction, products are invertible, making it possible to equip the synthesis system with an efficient theorem-proving technique called focusing that eliminates many of the nondeterministic choices inherent in proof search. These theoretical enhancements informed a new version of the type-directed synthesis prototype implementation, which remained performance-competitive with the original synthesizer. A significant advantage of the type-directed synthesis framework is its extensibility; this thesis is a roadmap for future such efforts to increase the expressive power of the system.
Numerical software, common in scientific computing or embedded systems, inevitably uses an approximation of the real arithmetic in which most algorithms are designed. In many domains, roundoff errors are not the only source of inaccuracy and measurement and other input errors further increase the uncertainty of the computed results. Adequate tools are needed to help users select suitable approximations, especially for safety-critical applications. We present the source-to-source compiler Rosa which takes as input a real-valued program with error specifications and synthesizes code over an appropriate floating-point or fixed-point data type. The main challenge of such a compiler is a fully automated, sound and yet accurate enough numerical error estimation. We present a unified technique for floating-point and fixed-point arithmetic of various precisions which can handle nonlinear arithmetic, determine closed- form symbolic invariants for unbounded loops and quantify the effects of discontinuities on numerical errors. We evaluate Rosa on a number of benchmarks from scientific computing and embedded systems and, comparing it to state-of-the-art in automated error estimation, show it presents an interesting trade-off between accuracy and performance.
In this paper we examine how concurrency has been embodied in mainstream programming languages. In particular, we rely on the evolutionary talking borrowed from biology to discuss major historical landmarks and crucial concepts that shaped the development of programming languages. We examine the general development process, occasionally deepening into some language, trying to uncover evolutionary lineages related to specific programming traits. We mainly focus on concurrency, discussing the different abstraction levels involved in present-day concurrent programming and emphasizing the fact that they correspond to different levels of explanation. We then comment on the role of theoretical research on the quest for suitable programming abstractions, recalling the importance of changing the working framework and the way of looking every so often. This paper is not meant to be a survey of modern mainstream programming languages: it would be very incomplete in that sense. It aims instead at pointing out a number of remarks and connect them under an evolutionary perspective, in order to grasp a unifying, but not simplistic, view of the programming languages development process.
This note illustrates theoretical worst-case scenarios for groundness analyses obtained through abstract interpretation over the abstract domains of definite (Def) and positive (Pos) Boolean functions. For Def, an example is given for which any Def-based abstract interpretation for groundness analysis follows a chain which is exponential in the number of argument positions as well as in the number of clauses but sub-exponential in the size of the program. For Pos, we strengthen a previous result by illustrating an example for which any Pos-based abstract interpretation for groundness analysis follows a chain which is exponential in the size of the program. It remains an open problem to determine if the worst case for Def is really as bad as that for Pos.
There are many programming languages in the world today.Each language has their advantage and disavantage. In this paper, we will discuss ten programming languages: C++, C#, Java, Groovy, JavaScript, PHP, Schalar, Scheme, Haskell and AspectJ. We summarize and compare these ten languages on ten different criterion. For example, Default more secure programming practices, Web applications development, OO-based abstraction and etc. At the end, we will give our conclusion that which languages are suitable and which are not for using in some cases. We will also provide evidence and our analysis on why some language are better than other or have advantages over the other on some criterion.
Recent constraint logic programming (CLP) languages, such as HAL and Mercury, require type, mode and determinism declarations for predicates. This information allows the generation of efficient target code and the detection of many errors at compile-time. Unfortunately, mode checking in such languages is difficult. One of the main reasons is that, for each predicate mode declaration, the compiler is required to appropriately re-order literals in the predicate s definition. The task is further complicated by the need to handle complex instantiations (which interact with type declarations and higher-order predicates) and automatic initialization of solver variables. Here we define mode checking for strongly typed CLP languages which require reordering of clause body literals. In addition, we show how to handle a simple case of polymorphic modes by using the corresponding polymorphic types.
Tabled Constraint Logic Programming is a powerful execution mechanism for dealing with Constraint Logic Programming without worrying about fixpoint computation. Various applications, e.g in the fields of program analysis and model checking, have been proposed. Unfortunately, a high-level system for developing new applications is lacking, and programmers are forced to resort to complicated ad hoc solutions. This papers presents TCHR, a high-level framework for tabled Constraint Logic Programming. It integrates in a light-weight manner Constraint Handling Rules (CHR), a high-level language for constraint solvers, with tabled Logic Programming. The framework is easily instantiated with new application-specific constraint domains. Various high-level operations can be instantiated to control performance. In particular, we propose a novel, generalized technique for compacting answer sets.
Calculational abstract interpretation, long advocated by Cousot, is a technique for deriving correct-by-construction abstract interpreters from the formal semantics of programming languages. This paper addresses the problem of deriving correct-by-verified-construction abstract interpreters with the use of a proof assistant. We identify several technical challenges to overcome with the aim of supporting verified calculational abstract interpretation that is faithful to existing pencil-and-paper proofs, supports calculation with Galois connections generally, and enables the extraction of verified static analyzers from these proofs. To meet these challenges, we develop a theory of Galois connections in monadic style that include a specification effect. Effectful calculations may reason classically, while pure calculations have extractable computational content. Moving between the worlds of specification and implementation is enabled by our metatheory. To validate our approach, we give the first mechanically verified proof of correctness for Cousot s \"Calculational design of a generic abstract interpreter.\" Our proof \"by calculus\" closely follows the original paper-and-pencil proof and supports the extraction of a verified static analyzer.
Logic languages based on the theory of rational, possibly infinite, trees have much appeal in that rational trees allow for faster unification (due to the safe omission of the occurs-check) and increased expressivity (cyclic terms can provide very efficient representations of grammars and other useful objects). Unfortunately, the use of infinite rational trees has problems. For instance, many of the built-in and library predicates are ill-defined for such trees and need to be supplemented by run-time checks whose cost may be significant. Moreover, some widely-used program analysis and manipulation techniques are correct only for those parts of programs working over finite trees. It is thus important to obtain, automatically, a knowledge of the program variables (the finite variables) that, at the program points of interest, will always be bound to finite terms. For these reasons, we propose here a new data-flow analysis, based on abstract interpretation, that captures such information.
PLACES 2013 (full title: Programming Language Approaches to Concurrency- and Communication-cEntric Software) was the sixth edition of the PLACES workshop series. After the first PLACES, which was affiliated to DisCoTec in 2008, the workshop has been part of ETAPS every year since 2009 and is now an established part of the ETAPS satellite events. This year, PLACES was the best attended workshop at ETAPS 2013. The workshop series was started in order to promote the application of novel programming language ideas to the increasingly important problem of developing software for systems in which concurrency and communication are intrinsic aspects. This includes software for multi- and many-core systems, accelerators and large-scale distributed and/or service-oriented systems. The scope of PLACES includes new programming language features, whole new programming language designs, new type systems, new semantic approaches, new program analysis techniques, and new implementation mechanisms.
Given a specification and a set of candidate programs (program space), the program synthesis problem is to find a candidate program that satisfies the specification. We present the synthesis through unification (STUN) approach, which is an extension of the counter-example guided inductive synthesis (CEGIS) approach. In CEGIS, the synthesizer maintains a subset S of inputs and a candidate program Prog that is correct for S. The synthesizer repeatedly checks if there exists a counter-example input c such that the execution of Prog is incorrect on c. If so, the synthesizer enlarges S to include c, and picks a program from the program space that is correct for the new set S. The STUN approach extends CEGIS with the idea that given a program Prog that is correct for a subset of inputs, the synthesizer can try to find a program Prog  that is correct for the rest of the inputs. If Prog and Prog  can be unified into a program in the program space, then a solution has been found. We present a generic synthesis procedure based on the STUN approach and specialize it for three different domains by providing the appropriate unification operators. We implemented these specializations in prototype tools, and we show that our tools often per- forms significantly better on standard benchmarks than a tool based on a pure CEGIS approach.
In this tutorial I will present how a combination of linear and dependent type can be useful to describe different properties about higher order programs. Linear types have been proved particularly useful to express properties of functions; dependent types are useful to describe the behavior of the program in terms of its control flow. This two ideas fits together well when one is interested in analyze properties of functions depending on the control flow of the program. I will present these ideas with example taken by complexity analysis and sensitivity analysis. I will conclude the tutorial by arguing about the generality of this approach.
We study, formally and experimentally, the trade-off in temporal and spatial overhead when managing contiguous blocks of memory using the explicit, dynamic and real-time heap management system Compact-fit (CF). The key property of CF is that temporal and spatial overhead can be bounded, related, and predicted in constant time through the notion of partial and incremental compaction. Partial compaction determines the maximally tolerated degree of memory fragmentation. Incremental compaction of objects, introduced here, determines the maximal amount of memory involved in any, logically atomic, portion of a compaction operation. We explore CF s potential application space on (1) multiprocessor and multicore systems as well as on (2) memory-constrained uniprocessor systems. For (1), we argue that little or no compaction is likely to avoid the worst case in temporal as well as spatial overhead but also observe that scalability only improves by a constant factor. Scalability can be further improved significantly by reducing overall data sharing through separate instances of Compact-fit. For (2), we observe that incremental compaction can effectively trade-off throughput and memory fragmentation for lower latency.
While generalized abstract datatypes (GADT) are now considered well-understood, adding them to a language with a notion of subtyping comes with a few surprises. What does it mean for a GADT parameter to be covariant? The answer turns out to be quite subtle. It involves fine-grained properties of the subtyping relation that raise interesting design questions. We allow variance annotations in GADT definitions, study their soundness, and present a sound and complete algorithm to check them. Our work may be applied to real-world ML-like languages with explicit subtyping such as OCaml, or to languages with general subtyping constraints.
Two sinks drain precision from higher-order flow analyses: (1) merging of argument values upon procedure call and (2) merging of return values upon procedure return. To combat the loss of precision, these two sinks have been addressed independently. In the case of procedure calls, abstract garbage collection reduces argument merging; while in the case of procedure returns, context-free approaches eliminate return value merging. It is natural to expect a combined analysis could enjoy the mutually beneficial interaction between the two approaches. The central contribution of this work is a direct product of abstract garbage collection with context-free analysis. The central challenge to overcome is the conflict between the core constraint of a pushdown system and the needs of garbage collection: a pushdown system can only see the top of the stack, yet garbage collection needs to see the entire stack during a collection. To make the direct product computable, we develop \"stack summaries,\" a method for tracking stack properties at each control state in a pushdown analysis of higher-order programs.
Linear logic Concurrent Constraint programming (LCC) is an extension of concurrent constraint programming (CC) where the constraint system is based on Girard s linear logic instead of the classical logic. In this paper we address the problem of program equivalence for this programming framework. For this purpose, we present a structural operational semantics for LCC based on a label transition system and investigate different notions of observational equivalences inspired by the state of art of process algebras. Then, we demonstrate that the asynchronous \\pi-calculus can be viewed as simple syntactical restrictions of LCC. Finally we show LCC observational equivalences can be transposed straightforwardly to classical Concurrent Constraint languages and Constraint Handling Rules, and investigate the resulting equivalences.
Standard higher-order contract monitoring breaks tail recursion and leads to space leaks that can change a program s asymptotic complexity. Space efficient semantics restore tail recursion and bound the amount of space used by contacts. Space efficient contract monitoring for contracts enforcing simple types are well studied. Prior work establishes a space-efficient semantics in a manifest setting (Greenberg 2015); we adapt that work to a latent calculus and extend it work with dependent contracts in contract PCF (CPCF; see Dimoulas et al. 2011).
To deal with failures as simply as possible, we propose a new foun- dation for the core (untyped) C, which is based on a new logic called task logic or imperative logic. We then introduce a sequential-disjunctive statement of the form S : R. This statement has the following semantics: execute S and R sequentially. It is considered a success if at least one of S;R is a success. This statement is useful for dealing with inessential errors without explicitly catching them.
To appear in Theory and Practice of Logic Programming (TPLP). Tabling is a commonly used technique in logic programming for avoiding cyclic behavior of logic programs and enabling more declarative program definitions. Furthermore, tabling often improves computational performance. Rational term are terms with one or more infinite sub-terms but with a finite representation. Rational terms can be generated in Prolog by omitting the occurs check when unifying two terms. Applications of rational terms include definite clause grammars, constraint handling systems, and coinduction. In this paper, we report our extension of YAP s Prolog tabling mechanism to support rational terms. We describe the internal representation of rational terms within the table space and prove its correctness. We then use this extension to implement a tabling based approach to coinduction. We compare our approach with current coinductive transformations and describe the implementation. In addition, we present an algorithm that ensures a canonical representation for rational terms.
Matthes and Uustalu (TCS 327(1-2):155-174, 2004) presented a categorical description of substitution systems capable of capturing syntax involving binding which is independent of whether the syntax is made up from least or greatest fixed points. We extend this work in two directions: we continue the analysis by creating more categorical structure, in particular by organizing substitution systems into a category and studying its properties, and we develop the proofs of the results of the cited paper and our new ones in UniMath, a recent library of univalent mathematics formalized in the Coq theorem prover.
Structural operational semantic specifications come in different styles: small-step and big-step. A problem with the big-step style is that specifying divergence and abrupt termination gives rise to annoying duplication. We present a novel approach to representing divergence and abrupt termination in big-step semantics using status flags. This avoids the duplication problem, and uses fewer rules and premises for representing divergence than previous approaches in the literature.
The paper describes a mechanism for indirect object representation and access (ORA) in programming languages. The mechanism is based on using a new programming construct which is referred to as concept. Concept consists of one object class and one reference class both having their fields and methods. The object class is the conventional class as defined in OOP with instances passed by reference. Instances of the reference class are passed by value and are intended to represent objects. The reference classes are used to describe how objects have to be represented and accessed by providing custom format for their identifiers and custom access procedures. Such an approach to programming where concepts are used instead of classes is referred to as concept-oriented programming. It generalizes OOP and its main advantage is that it allows the programmer to describe not only the functionality of target objects but also intermediate functions which are executed behind the scenes as an object is being accessed.
The aggressive application of scalar replacement to array references substantially reduces the number of memory operations at the expense of a possibly very large number of registers. In this paper we describe a register allocation algorithm that assigns registers to scalar replaced array references along the critical paths of a computation, in many cases exploiting the opportunity for concurrent memory accesses. Experimental results, for a set of image/signal processing code kernels, reveal that the proposed algorithm leads to a substantial reduction of the number of execution cycles for the corresponding hardware implementation on a contemporary Field-Programmable-Gate-Array (FPGA) when compared to other greedy allocation algorithms, in some cases, using even fewer number of registers.
Purl is a language to be used for modular definition and verification of knitting patterns. The syntax is similar to the standard knitting pattern notation provided by the Craft Yarn Council. Purl provides constructs not available in the standard notation to allow reuse of segments of patterns. This report describes the basics of knitting and hand-knitting patterns. A knitting pattern language more terse than the standard notation is presented with the implementation of a compiler to this standard.
We introduce a new programming language for expressing reversibility, Energy-Efficient Language (Eel), geared toward algorithm design and implementation. Eel is the first language to take advantage of a partially reversible computation model, where programs can be composed of both reversible and irreversible operations. In this model, irreversible operations cost energy for every bit of information created or destroyed. To handle programs of varying degrees of reversibility, Eel supports a log stack to automatically trade energy costs for space costs, and introduces many powerful control logic operators including protected conditional, general conditional, protected loops, and general loops. In this paper, we present the design and compiler for the three language levels of Eel along with an interpreter to simulate and annotate incurred energy costs of a program.
Robustness is a standard correctness property which intuitively means that if the input to the program changes less than a fixed small amount then the output changes only slightly. This notion is useful in the analysis of rounding error for floating point programs because it helps to establish bounds on output errors introduced by both measurement errors and by floating point computation. Compositional methods often do not work since key constructs---like the conditional and the while-loop---are not robust. We propose a method for proving the robustness of a while-loop. This method is non-local in the sense that instead of breaking the analysis down to single lines of code, it checks certain global properties of its structure. We show the applicability of our method on two standard algorithms: the CORDIC computation of the cosine and Dijkstra s shortest path algorithm.
With the dissemination of affordable parallel and distributed hardware, parallel and distributed constraint solving has lately been the focus of some attention. To effectually apply the power of distributed computational systems, there must be an effective sharing of the work involved in the search for a solution to a Constraint Satisfaction Problem (CSP) between all the participating agents, and it must happen dynamically, since it is hard to predict the effort associated with the exploration of some part of the search space. We describe and provide an initial experimental assessment of an implementation of a work stealing-based approach to distributed CSP solving.
The idea of functional programming has played a big role in shaping today s landscape of mainstream programming languages. Another concept that dominates the current programming style is Dijkstra s structured programming. Both concepts have been successfully married, for example in the programming language Scala. This paper proposes how the same can be achieved for structured programming and PURELY functional programming via the notion of LINEAR SCOPE. One advantage of this proposal is that mainstream programmers can reap the benefits of purely functional programming like easily exploitable parallelism while using familiar structured programming syntax and without knowing concepts like monads. A second advantage is that professional purely functional programmers can often avoid hard to read functional code by using structured programming syntax that is often easier to parse mentally.
Gradual typing combines static and dynamic typing in the same language, offering the benefits of both to programmers. Static typing provides error detection and strong guarantees while dynamic typing enables rapid prototyping and flexible programming idioms. For programmers to fully take advantage of a gradual type system, however, they must be able to trust their type annotations, and so runtime checks must be performed at the boundaries of static and dynamic code to ensure that static types are respected. Higher order and mutable values cannot be completely checked at these boundaries, and so additional checks must be performed at their use sites. Traditionally, this has been achieved by installing wrappers or proxies on such values that moderate the flow of data between static and dynamic, but these can cause problems if the language supports comparison of object identity or has a foreign function interface. Reticulated Python is a gradually typed variant of Python implemented via a source-to-source translator for Python 3. It implements a proxy-free alternative design named transient casts. This paper presents a formal semantics for transient casts and shows that not only are they sound, but they work in an open-world setting in which the Reticulated translator has only been applied to some of the program; the rest is untranslated Python. We formalize this open world soundness property and use Coq to prove that it holds for Anthill Python, a calculus that models Reticulated Python.
Compilers are used to run programs that are written in a range of designs from text to executable formats. With the advent of the internet, studies related to the development of cloud based compilers are being carried out. There is a considerable increase of on-line compilers enabling on-line compilation of user programs without any mandate to. This study is specific to on-line C compilers to investigate the correctness, issues and limitations.
The Curry-Howard correspondence is about a relationship between types and programs on the one hand and propositions and proofs on the other. The implications for programming language design and program verification is an active field of research. Transformer-like semantics of internal definitions that combine a defining computation and an application will be presented. By specialisation for a given defining computation one can derive inference rules for applications of defined operations. With semantics of that kind for every operation, each application identifies an axiom in a logic defined by the programming language, so a language can be considered a theory.
We describe the BinProlog system s compilation technology, runtime system and its extensions supporting first-class Logic Engines while providing a short history of its development, details of some of its newer re-implementations as well as an overview of the most important architectural choices involved in their design. With focus on its differences with conventional WAM implementations, we explain key details of BinProlog s compilation technique, which replaces the WAM with a simplified continuation passing runtime system (the \"BinWAM\"), based on a mapping of full Prolog to binary logic programs. This is followed by a description of a term compression technique using a \"tag-on-data\" representation. Later derivatives, the Java-based Jinni Prolog compiler and the recently developed Lean Prolog system refine the BinProlog architecture with first-class Logic Engines, made generic through the use of an Interactor interface. An overview of their applications with focus on the ability to express at source level a wide variety of Prolog built-ins and extensions, covers these newer developments.
Some recent approaches for scalable offline partial evaluation of logic programs include a size-change analysis for ensuring both so called local and global termination. In this work|inspired by experimental evaluation|we introduce several improvements that may increase the accuracy of the analysis and, thus, the quality of the associated specialized programs. We aim to achieve this while maintaining the same complexity and scalability of the recent works.
We propose a novel notion of pointer race for concurrent programs manipulating a shared heap. A pointer race is an access to a memory address which was freed, and it is out of the accessor s control whether or not the cell has been re-allocated. We establish two results. (1) Under the assumption of pointer race freedom, it is sound to verify a program running under explicit memory management as if it was running with garbage collection. (2) Even the requirement of pointer race freedom itself can be verified under the garbage-collected semantics. We then prove analogues of the theorems for a stronger notion of pointer race needed to cope with performance-critical code purposely using racy comparisons and even racy dereferences of pointers. As a practical contribution, we apply our results to optimize a thread-modular analysis under explicit memory management. Our experiments confirm a speed-up of up to two orders of magnitude.
How can one recognize coordination languages and technologies? As this report shows, the common approach that contrasts coordination with computation is intellectually unsound: depending on the selected understanding of the word \"computation\", it either captures too many or too few programming languages. Instead, we argue for objective criteria that can be used to evaluate how well programming technologies offer coordination services. Of the various criteria commonly used in this community, we are able to isolate three that are strongly characterizing: black-box componentization, which we had identified previously, but also interface extensibility and customizability of run-time optimization goals. These criteria are well matched by Intel s Concurrent Collections and AstraKahn, and also by OpenCL, POSIX and VMWare ESX.
Traditionally, each party in a (dyadic or multiparty) session implements exactly one role specified in the type of the session. We refer to this kind of session as an individual session (i-session). As a generalization of i-session, a group session (g-session) is one in which each party may implement a group of roles based on one channel. In particular, each of the two parties involved in a dyadic g-session implements either a group of roles or its complement. In this paper, we present a formalization of g-sessions in a multi-threaded lambda-calculus (MTLC) equipped with a linear type system, establishing for the MTLC both type preservation and global progress. As this formulated MTLC can be readily embedded into ATS, a full-fledged language with a functional programming core that supports both dependent types (of DML-style) and linear types, we obtain a direct implementation of linearly typed g-sessions in ATS. The primary contribution of the paper lies in both of the identification of g-sessions as a fundamental building block for multiparty sessions and the theoretical development in support of this identification.
This volume collects the extended versions of selected papers originally presented at the two ACM SIGPLAN workshops: ML Family Workshop 2014 and OCaml 2014. Both were affiliated with ICFP 2014 and took place on two consecutive days, on September 4 and 5, 2014 in Gothenburg, Sweden. The ML Family workshop aims to recognize the entire extended family of ML and ML-like languages: languages that are Higher-order, Typed, Inferred, and Strict. It provides the forum to discuss common issues, both practical (compilation techniques, implementations of concurrency and parallelism, programming for the Web) and theoretical (fancy types, module systems, metaprogramming). The scope of the workshop includes all aspects of the design, semantics, theory, application, implementation, and teaching of the members of the ML family. The OCaml workshop is more specifically targeted at the OCaml community, with an emphasis on new proposals and tools aiming to improve OCaml, its environment, and the functioning of the community. As such, it is interested in works on the type system, language extensions, compiler and optimizations, applications, tools, and experience reports of exciting uses.
We develop a model of concurrent imperative programming with threads. We focus on a small imperative language with cooperative threads which execute without interruption until they terminate or explicitly yield control. We define and study a trace-based denotational semantics for this language; this semantics is fully abstract but mathematically elementary. We also give an equational theory for the computational effects that underlie the language, including thread spawning. We then analyze threads in terms of the free algebra monad for this theory.
Intersection and union types denote conjunctions and disjunctions of properties. Using bidirectional typechecking, intersection types are relatively straightforward, but union types present challenges. For union types, we can case-analyze a subterm of union type when it appears in evaluation position (replacing the subterm with a variable, and checking that term twice under appropriate assumptions). This technique preserves soundness in a call-by-value semantics. Sadly, there are so many choices of subterms that a direct implementation is not practical. But carefully transforming programs into let-normal form drastically reduces the number of choices. The key results are soundness and completeness: a typing derivation (in the system with too many subterm choices) exists for a program if and only if a derivation exists for the let-normalized program.
Peephole optimizations are a common source of compiler bugs. Compiler developers typically transform an incorrect peephole optimization into a valid one by strengthening the precondition. This process is challenging and tedious. This paper proposes PInfer, a data-driven approach for inferring preconditions for peephole optimizations expressed in Alive. PInfer generates positive and negatives examples for an optimization, enumerates predicates on-demand, and learns a set of predicates that separate the positive and negative examples. PInfer repeats this process until it finds a precondition that ensures the validity of the optimization. PInfer reports both the weakest precondition and a set of succinct partial preconditions to the developer. The PInfer prototype successfully generates either the partial precondition or the weakest precondition for 164 out of 174 peephole optimizations in the Alive suite. It also generates preconditions that are weaker than LLVM s precondition for 73 optimizations. We also demonstrate the applicability of this technique to generalize 54 concrete expression directed acyclic graphs generated by an LLVM IR-based super optimizer.
We propose a method that transforms a C program manipulating containers using low-level pointer statements into an equivalent program where the containers are manipulated via calls of standard high-level container operations like push_back or pop_front. The input of our method is a C program annotated by a special form of shape invariants which can be obtained from current automatic shape analysers after a slight modification. The resulting program where the low-level pointer statements are summarized into high-level container operations is more understandable and (among other possible benefits) better suitable for program analysis. We have implemented our approach and successfully tested it through a number of experiments with list-based containers, including experiments with simplification of program analysis by separating shape analysis from analysing data-related properties.
Programming for Mobile and Touch (PRoMoTo 13) was held at the 2013 ACM SIGPLAN conference on Systems, Programming, Languages and Applications (SPLASH 2013), October 2013 in Indianapolis, USA. Submissions for this event were invited in the general area of mobile and touch-oriented programming languages and programming environments, and teaching of programming for mobile devices. These are proceedings of the PRoMoTo 13.
Carrying Code (ACC) has recently been proposed as a framework for mobile code safety in which the code supplier provides a program together with an abstraction (or abstract model of the program) whose validity entails compliance with a predefined safety policy. The advantage of providing a (fixpoint) abstraction to the code consumer is that its validity is checked in a single pass (i.e., one iteration) of an abstract interpretation-based checker. A main challenge to make ACC useful in practice is to reduce the size of certificates as much as possible while at the same time not increasing checking time. The intuitive idea is to only include in the certificate information that the checker is unable to reproduce without iterating. We introduce the notion of reduced certificate which characterizes the subset of the abstraction which a checker needs in order to validate (and re-construct) the full certificate in a single pass. Based on this notion, we instrument a generic analysis algorithm with the necessary extensions in order to identify the information relevant to the checker. Interestingly, the fact that the reduced certificate omits (parts of) the abstraction has implications in the design of the checker. We provide the sufficient conditions which allow us to ensure that 1) if the checker succeeds in validating the certificate, then the certificate is valid for the program (correctness) and 2) the checker will succeed for any reduced certificate which is valid (completeness). Our approach has been implemented and benchmarked within the ciaopp system. The experimental results show that our proposal is able to greatly reduce the size of certificates in practice.To appear in Theory and Practice of Logic Programming (TPLP).
Semantics of logic programs has been given by proof theory, model theory and by fixpoint of the immediate-consequence operator. If clausal logic is a programming language, then it should also have a compositional semantics. Compositional semantics for programming languages follows the abstract syntax of programs, composing the meaning of a unit by a mathematical operation on the meanings of its constituent units. The procedural interpretation of logic has only yielded an incomplete abstract syntax for logic programs. We complete it and use the result as basis of a compositional semantics. We present for comparison Tarski s algebraization of first-order predicate logic, which is in substance the compositional semantics for his choice of syntax. We characterize our semantics by equivalence with the immediate-consequence operator.
Global Value Numbering (GVN) is an important static analysis to detect equivalent expressions in a program. We present an iterative data-flow analysis GVN algorithm in SSA for the purpose of detecting total redundancies. The central challenge is defining a join operation to detect equivalences at a join point in polynomial time such that later occurrences of redundant expressions could be detected. For this purpose, we introduce the novel concept of value $\\phi$-function. We claim the algorithm is precise and takes only polynomial time.
We propose a light-weight client-server model of communication between program analyses. Clients are individual analyses and the server mediates their communication. A client cannot see properties of any other and the communication is anonymous. There is no central algorithm standing above clients which would tell them when to communicate what information. Clients communicate with others spontaneously, according to their actual personal needs. The model is based on our observation that a piece of information provided to an analysis at a right place may (substantially) improve its result. We evaluated the proposed communication model for all possible combinations of three clients on more than 400 benchmarks and the results show that the communication model performs well in practice.
We present our approach to teaching functional programming to First Year Computer Science students at Middlesex University through projects in robotics. A holistic approach is taken to the curriculum, emphasising the connections between different subject areas. A key part of the students  learning is through practical projects that draw upon and integrate the taught material. To support these, we developed the Middlesex Robotic plaTfOrm (MIRTO), an open-source platform built using Raspberry Pi, Arduino, HUB-ee wheels and running Racket (a LISP dialect). In this paper we present the motivations for our choices and explain how a number of concepts of functional programming may be employed when programming robotic applications. We present some students  work with robotics projects: we consider the use of robotics projects to have been a success, both for their value in reinforcing students  understanding of programming concepts and for their value in motivating the students.
In this paper we investigate XSB-Prolog as a static analysis engine for data represented by medium-sized graphs. We use XSB-Prolog to automatically identify function dependencies in the Linux Kernel---queries that are difficult to implement efficiently in a commodity database and that developers often have to identify manually. This project illustrates that Prolog systems are ideal for building tools for use in other disciplines that require sophisticated inferences, because Prolog is both declarative and can efficiently implement complex problem specifications through tabling and indexing.
We propose a type system for a calculus of contracting processes. Processes can establish sessions by stipulating contracts, and then can interact either by keeping the promises made, or not. Type safety guarantees that a typeable process is honest - that is, it abides by the contracts it has stipulated in all possible contexts, even in presence of dishonest adversaries. Type inference is decidable, and it allows to safely approximate the honesty of processes using either synchronous or asynchronous communication.
Arrays are such a rich and fundamental data type that they tend to be built into a language, either in the compiler or in a large low-level library. Defining this functionality at the user level instead provides greater flexibility for application domains not envisioned by the language designer. Only a few languages, such as C++ and Haskell, provide the necessary power to define $n$-dimensional arrays, but these systems rely on compile-time abstraction, sacrificing some flexibility. In contrast, dynamic languages make it straightforward for the user to define any behavior they might want, but at the possible expense of performance. As part of the Julia language project, we have developed an approach that yields a novel trade-off between flexibility and compile-time analysis. The core abstraction we use is multiple dispatch. We have come to believe that while multiple dispatch has not been especially popular in most kinds of programming, technical computing is its killer application. By expressing key functions such as array indexing using multi-method signatures, a surprising range of behaviors can be obtained, in a way that is both relatively easy to write and amenable to compiler analysis. The compact factoring of concerns provided by these methods makes it easier for user-defined types to behave consistently with types in the standard library.
Constraint Handling Rules (CHR) is a high-level programming language based on multi-headed multiset rewrite rules. Originally designed for writing user-defined constraint solvers, it is now recognized as an elegant general purpose language. CHR-related research has surged during the decade following the previous survey by Fruehwirth. Covering more than 180 publications, this new survey provides an overview of recent results in a wide range of research areas, from semantics and analysis to systems, extensions and applications.
Dynamic languages are praised for their flexibility and expressiveness, but static analysis often yields many false positives and verification is cumbersome for lack of structure. Hence, unit testing is the prevalent incomplete method for validating programs in such languages. Falsification is an alternative approach that uncovers definite errors in programs. A falsifier computes a set of inputs that definitely crash a program. Success typing is a type-based approach to document programs in dynamic languages. We demonstrate that success typing is, in fact, an instance of falsification by mapping success (input) types into suitable logic formulae. Output types are represented by recursive types. We prove the correctness of our mapping (which establishes that success typing is falsification) and we report some experiences with a prototype implementation.
Garbage collectors are notoriously hard to verify, due to their low-level interaction with the underlying system and the general difficulty in reasoning about reachability in graphs. Several papers have presented verified collectors, but either the proofs were hand-written or the collectors were too simplistic to use on practical applications. In this work, we present two mechanically verified garbage collectors, both practical enough to use for real-world C# benchmarks. The collectors and their associated allocators consist of x86 assembly language instructions and macro instructions, annotated with preconditions, postconditions, invariants, and assertions. We used the Boogie verification generator and the Z3 automated theorem prover to verify this assembly language code mechanically. We provide measurements comparing the performance of the verified collector with that of the standard Bartok collectors on off-the-shelf C# benchmarks, demonstrating their competitiveness.
We define focus-method interfaces and some connections between such interfaces and instruction sequences, giving rise to instruction sequence components. We provide a flexible and practical notation for interfaces using an abstract datatype specification comparable to that of basic process algebra with deadlock. The structures thus defined are called progression rings. We also define thread and service components. Two types of composition of instruction sequences or threads and services (called `use  and `apply ) are lifted to the level of components.
We develop the operational semantics of an untyped probabilistic lambda-calculus with continuous distributions, as a foundation for universal probabilistic programming languages such as Church, Anglican, and Venture. Our first contribution is to adapt the classic operational semantics of lambda-calculus to a continuous setting via creating a measure space on terms and defining step-indexed approximations. We prove equivalence of big-step and small-step formulations of this distribution-based semantics. To move closer to inference techniques, we also define the sampling-based semantics of a term as a function from a trace of random samples to a value. We show that the distribution induced by integrating over all traces equals the distribution-based semantics. Our second contribution is to formalize the implementation technique of trace Markov chain Monte Carlo (MCMC) for our calculus and to show its correctness. A key step is defining sufficient conditions for the distribution induced by trace MCMC to converge to the distribution-based semantics. To the best of our knowledge, this is the first rigorous correctness proof for trace MCMC for a higher-order functional language.
CHR is a declarative, concurrent and committed choice rule-based constraint programming language. We extend CHR with multiset comprehension patterns, providing the programmer with the ability to write multiset rewriting rules that can match a variable number of constraints in the store. This enables writing more readable, concise and declarative code for algorithms that coordinate large amounts of data or require aggregate operations. We call this extension $\\mathit{CHR}^\\mathit{cp}$. We give a high-level abstract semantics of $\\mathit{CHR}^\\mathit{cp}$, followed by a lower-level operational semantics. We then show the soundness of this operational semantics with respect to the abstract semantics.
Probabilistic transition system specifications (PTSSs) in the ntmufnu/ntmuxnu format provide structural operational semantics for Segala-type systems that exhibit both probabilistic and nondeterministic behavior and guarantee that isimilarity is a congruence.Similar to the nondeterministic case of rule format tyft/tyxt, we show that the well-foundedness requirement is unnecessary in the probabilistic setting. To achieve this, we first define an extended version of the ntmufnu/ntmuxnu format in which quantitative premises and conclusions include nested convex combinations of distributions. This format also guarantees that bisimilarity is a congruence. Then, for a given (possibly non-well-founded) PTSS in the new format, we construct an equivalent well-founded transition system consisting of only rules of the simpler (well-founded) probabilistic ntree format. Furthermore, we develop a proof-theoretic notion for these PTSSs that coincides with the existing stratification-based meaning in case the PTSS is stratifiable. This continues the line of research lifting structural operational semantic results from the nondeterministic setting to systems with both probabilistic and nondeterministic behavior.
Homogeneous generative meta-programming (HGMP) enables the generation of program fragments at compile-time or run-time. We present the first foundational calculus which can model powerful HGMP languages such as Template Haskell. The calculus is designed such that we can gradually enhance it with the features needed to model many of the advanced features of real languages. As a demonstration of the flexibility of our approach, we also provide a simple type system for the calculus.
The C++ Standard Template Library is the flagship example for libraries based on the generic programming paradigm. The usage of this library is intended to minimize the number of classical C/C++ errors, but does not warrant bug-free programs. Furthermore, many new kinds of errors may arise from the inaccurate use of the generic programming paradigm, like dereferencing invalid iterators or misunderstanding remove-like algorithms. In this paper we present some typical scenarios that may cause runtime or portability problems. We emit warnings and errors while these risky constructs are used. We also present a general approach to emit \"customized\" warnings. We support the so-called \"believe-me marks\" to disable warnings. We present another typical usage of our technique, when classes become deprecated during the software lifecycle.
We present AIOCJ, a framework for programming distributed adaptive applications. Applications are programmed using AIOC, a choreographic language suited for expressing patterns of interaction from a global point of view. AIOC allows the programmer to specify which parts of the application can be adapted. Adaptation takes place at runtime by means of rules, which can change during the execution to tackle possibly unforeseen adaptation needs. AIOCJ relies on a solid theory that ensures applications to be deadlock-free by construction also after adaptation. We describe the architecture of AIOCJ, the design of the AIOC language, and an empirical validation of the framework.
The definitional equality of an intensional type theory is its test of type compatibility. Today s systems rely on ordinary evaluation semantics to compare expressions in types, frustrating users with type errors arising when evaluation fails to identify two `obviously  equal terms. If only the machine could decide a richer theory! We propose a way to decide theories which supplement evaluation with `$\\nu$-rules , rearranging the neutral parts of normal forms, and report a successful initial experiment. We study a simple -calculus with primitive fold, map and append operations on lists and develop in Agda a sound and complete decision procedure for an equational theory enriched with monoid, functor and fusion laws.
We present a calculus that models a form of process interaction based on copyless message passing, in the style of Singularity OS. The calculus is equipped with a type system ensuring that well-typed processes are free from memory faults, memory leaks, and communication errors. The type system is essentially linear, but we show that linearity alone is inadequate, because it leaves room for scenarios where well-typed processes leak significant amounts of memory. We address these problems basing the type system upon an original variant of session types.
This paper concerns instruction sequences that contain probabilistic instructions, i.e. instructions that are themselves probabilistic by nature. We propose several kinds of probabilistic instructions, provide an informal operational meaning for each of them, and discuss related work. On purpose, we refrain from providing an ad hoc formal meaning for the proposed kinds of instructions. We also discuss the approach of projection semantics, which was introduced in earlier work on instruction sequences, in the light of probabilistic instruction sequences.
In the Object-Oriented Programming Systems (OOPS), these two concepts namely function overloading and function overriding are a bit confusing to the programmers. In this article this confusion is tried to be removed. Both of these are the concepts which come under the polymorphism (poly means many and morph mean forms). In the article the comparison is done in between them. For the new programmers and the learners, it is important to understand them. The function overloading [1] is achieved at the time of the compile and the function overriding is achieved at the run time. The function overriding always takes place in inheritance, but the function overloading can also take place without inheritance.
We show how logic programs with \"delays\" can be transformed to programs without delays in a way which preserves information concerning floundering (also known as deadlock). This allows a declarative (model-theoretic), bottom-up or goal independent approach to be used for analysis and debugging of properties related to floundering. We rely on some previously introduced restrictions on delay primitives and a key observation which allows properties such as groundness to be analysed by approximating the (ground) success set. This paper is to appear in Theory and Practice of Logic Programming (TPLP). Keywords: Floundering, delays, coroutining, program analysis, abstract interpretation, program transformation, declarative debugging
We present cTI, the first system for universal left-termination inference of logic programs. Termination inference generalizes termination analysis and checking. Traditionally, a termination analyzer tries to prove that a given class of queries terminates. This class must be provided to the system, for instance by means of user annotations. Moreover, the analysis must be redone every time the class of queries of interest is updated. Termination inference, in contrast, requires neither user annotations nor recomputation. In this approach, terminating classes for all predicates are inferred at once. We describe the architecture of cTI and report an extensive experimental evaluation of the system covering many classical examples from the logic programming termination literature and several Prolog programs of respectable size and complexity.
We propose a special-purpose class of compression algorithms for efficient compression of Prolog programs. It is a dictionary-based compression method, specially designed for the compression of Prolog code, and therefore we name it PCA (Prolog Compression Algorithm). According to the experimental results this method provides better compression than state-of-the-art general-purpose compression algorithms. Since the algorithm works with Prolog syntactic entities (e.g. atoms, terms, etc.) the implementation of a Prolog prototype is straightforward and very easy to use in any Prolog application that needs compression. Although the algorithm is designed for Prolog programs, the idea can be easily applied for the compression of programs written in other (logic) languages.
The classical Gelfand-Tsetlin formulas provide a basis in terms of tableaux and an explicit action of the generators of $\\mathfrak{gl} (n)$ for every irreducible finite-dimensional $\\mathfrak{gl} (n)$-module. These formulas can be used to define a $\\mathfrak{gl} (n)$-module structure on some infinite-dimensional modules - the so-called generic Gelfand-Tsetlin modules. The generic Gelfand-Tsetlin modules are convenient to work with since for every generic tableau there exists a unique irreducible generic Gelfand-Tsetlin module containing this tableau as a basis element. In this paper we initiate the systematic study of a large class of non-generic Gelfand-Tsetlin modules - the class of $1$-singular Gelfand-Tsetlin modules. An explicit tableaux realization and the action of $\\mathfrak{gl} (n)$ on these modules is provided using a new construction which we call derivative tableaux. Our construction of $1$-singular modules provides a large family of new irreducible Gelfand-Tsetlin modules of $\\mathfrak{gl} (n)$, and is a part of the classification of all such irreducible modules for $n=3$.
We give a complete description of the graded multiplicity space which appears in the Feigin-Loktev fusion product [FL99] of graded Kirillov-Reshetikhin modules for all simple Lie algebras. This construction is used to obtain an upper bound formula for the fusion coefficients in these cases. The formula generalizes the case of g=A_r [AKS06], where the multiplicities are generalized Kostka polynomials [SW99,KS02]. In the case of other Lie algebras, the formula is the the fermionic side of the X=M conjecture [HKO+99]. In the cases where the Kirillov-Reshetikhin conjecture, regarding the decomposition formula for tensor products of KR-modules, has been been proven in its original, restricted form, our result provides a proof of the conjectures of Feigin and Loktev regarding the fusion product multiplicites.
We construct a special embedding of the translation quiver $\\mathbb{Z}Q$ in the three-dimensional affine space $\\mathbb{R}^{3}$ where $Q$ is a finite connected acyclic quiver and $\\mathbb{Z}Q$ contains a local slice whose quiver is isomorphic to the opposite quiver $Q^{op}$ of $Q.$ Via this embedding, we show that there exists an involutive anti-automorphism of the translation quiver $\\mathbb{Z}Q.$ As an immediate consequence, we characterize explicitly the group of cluster automorphisms of the cluster algebras of seed $(X,Q)$, where $Q$ and $Q^{op}$ are mutation equivalent.
The main result of this paper is a new parameterization of the orbits of a symmetric subgroup on a partial flag variety. The parameterization is in terms of certain Spaltenstein varieties, on one hand, and certain nilpotent orbits, on the other. One of the motivations is related to enumerating special unipotent representations of real reductive groups. Another motivation is understanding (a portion of) the closure order on the set of nilpotent coadjoint orbits.
Following a scheme suggested by B. Feigon, we investigate a local relative trace formula in the situation of a reductive $p$ -adic group $G$ relative to a symmetric subgroup $H= \\underline{H}(F)$ where $\\underline{H}$ is split over the local field $F$ of characteristic zero and $G = \\underline{G} (F)$ is the restriction of scalars of $\\underline{H} _{I E}$ relative to a quadratic unramified extension $E$ of $F$. We adapt techniques of the proof of the local trace formula by J. Arthur in order to get a geometric expansion of the integral over $H \\times H$ of a truncated kernel associated to the regular representation of $G$.
This paper concerns regular connections on trivial algebraic G-principal fiber bundles over the infinitesimal punctured disc, where G is a connected reductive linear algebraic group over an algebraically closed field of characteristic zero. We show that the pull-back of every regular connection to an appropriate covering of the infinitesimal punctured disc is gauge equivalent to a connection of the form X z^{-1}dz for some X in the Lie algebra of G. We may even arrange that the only rational eigenvalue of ad X is zero. Our results allow a classification of regular SL_n-connections up to gauge equivalence.
Using the geometry of the projective plane over the finite field F_q, we construct a Hermitian Lorentzian lattice L_q of dimension (q^2 + q + 2) defined over a certain number ring $\\cO$ that depends on q. We show that infinitely many of these lattices are p-modular, that is, p L _q = L_q, where p is some prime in $\\cO$ such that |p|^2 = q. The reflection group of the Lorentzian lattice obtained for q = 3 seems to be closely related to the monster simple group via the presentation of the bimonster as a quotient of the Coxeter group on the incidence graph of P^2(F_3). The Lorentzian lattices L_q sometimes lead to construction of interesting positive definite lattices. In particular, if q is a rational prime that is 3 mod 4, and (q^2 + q + 1) is norm of some element in Q[\\sqrt{-q}], then we find a 2q(q+1) dimensional even unimodular positive definite integer lattice M_q such that Aut(M_q) contains PGL(3,F_q). We find that M_3 is the Leech lattice.
Let $A$ be a Nakayama algebra. We give a description of the singularity category of $A$ inside its stable module category. We prove that there is a duality between the singularity category of $A$ and the singularity category of its opposite algebra. As a consequence, the resolution quiver of $A$ and the resolution quiver of its opposite algebra have the same number of cycles and the same number of cyclic vertices.
We consider the finite W-superalgebras for a basic classical Lie superalgebra g associated with an even nilpotent element in g both over the field of complex numbers field and and over a filed of positive characteristic. We present the PBW theorem for these finite W-superalgebrfas. Then we formulate a conjecture about the minimal dimensional representations of of complex finite W-superalgebras, and demonstrate it with some examples. Under the assumption that the conjecture holds, we finally show that the lower bound of dimensions predicted in the super version of Kac-Weisfeiler conjecture formulated and proved by Wang-Zhao in [40] for the modular representations of the basic classical Lie superalgebra with any p-characters can be reached.
We classify blocks of categories of weight and generalized weight modules of algebras of twisted differential operators on P^n. Necessary and sufficient conditions for these blocks to be tame and proofs that some of the blocks are Koszul are provided. We also establish equivalences of categories between these blocks and categories of bounded and generalized bounded weight sl(n+1)-modules in the cases of nonintegral and singular central character.
Consider the character of an irreducible admissible representation of a p-adic reductive group. The Harish-Chandra-Howe local expansion expresses this character near a semisimple element as a linear combination of Fourier transforms of nilpotent orbital integrals. Under mild hypotheses, we describe an explicit region on which the local character expansion is valid. We assume neither that the group is connected nor that the underlying field has characteristic zero.
Let $G$ be a connected, simple algebraic group over an algebraically closed field. There is a partition of the wonderful compactification $\\bar{G}$ of $G$ into finite many $G$-stable pieces, which were introduced by Lusztig. In this paper, we will investigate the closure of any $G$-stable piece in $\\bar{G}$. We will show that the closure is a disjoint union of some $G$-stable pieces, which was first conjectured by Lusztig. We will also prove the existence of cellular decomposition if the closure contains finitely many $G$-orbits.
We give a basis of bideterminants for the coordinate ring K[O(n)] of the orthogonal group O(n,K), where K is an infinite field of characteristic not 2. The bideterminants are indexed by pairs of Young tableaux which are O(n)-standard in the sense of King-Welsh. We also give an explicit filtration of K[O(n)] as an O(n,K)-bimodule, whose factors are isormorphic to the tensor product of orthogonal analogues of left and right Schur modules.
We study a family of complex representations of the group GL(n,O), where O is the ring of integers of a non-archimedean local field F. These representations occur in the restriction of the Grassmann representation of GL(n,F) to its maximal compact subgroup GL(n,O). We compute explicitly the transition matrix between a geometric basis of the Hecke algebra associated with the representation and an algebraic basis which consists of its minimal idempotents. The transition matrix involves combinatorial invariants of lattices of submodules of finite O-modules. The idempotents are p-adic analogs of the multivariable Jacobi polynomials.
We define Lie subalgebras of the group algebra of a finite pseudo-reflection group that are involved in the definition of the Cherednik KZ-systems, and determine their structure. We provide applications for computing the Zariski closure of the image of generalized (pure) braid group B inside the representations of the corresponding Hecke algebras. We also get unitarizability results for the representations of B originating from Hecke algebras for suitable parameters, and relate our Lie algebras with the topological closure of B in these compact cases.
We investigate how the higher almost split sequences over a tensor product of algebras are related to those over each factor. Herschend and Iyama gave a precise criterion for when the tensor product of an $n$-representation finite algebra and an $m$-representation finite algebra is $(n+m)$-representation finite. In this case we give a complete description of the higher almost split sequences over the tensor product by expressing every higher almost split sequence as the mapping cone of a suitable chain map and using a natural notion of tensor product for chain maps.
We show that the algebras describing blocks of the category of cuspidal weight (respectively generalized weight) $\\mathfrak{sl}_n$-modules are one-parameter (respectively multi-parameter) deformations of certain Brauer tree algebras. We explicitly determine these deformations both graded and ungraded. The algebras we deform also appear as special centralizer subalgebras of Temperley-Lieb algebras or as generalized Khovanov algebras. They show up in the context of highest weight representations of the Virasoro algebra, in the context of rational representations of the general linear group and Schur algebras and in the study of the Milnor fiber of Kleinian singularities.
In this article, we give a new method for proving Howe correspondence in the case of dual pairs of type $({\\rm GL}_n, {\\rm GL}_m)$ over a non-Archimedean locally compact field $F$. The proof consists in combining a study on Kudla s filtration with the results of a previous article of the autor about the irreducibility of a parabolically induced representation. The proof is valid for $F$ of any characteristic and allows us to make the correspondence explicit in terms of Langlands parameters.
We show that there exists a natural non-degenerate pairing of the homomorphism space between two neighbor standard modules over a quasi-hereditary algebra with the first extension space between the corresponding costandard modules and vise versa. Investigation of this phenomenon leads to a family of pairings involving standard, costandard and tilting modules. In the graded case, under some \"Koszul-like\" assumptions (which we prove are satisfied for example for the blocks of the category $\\mathcal{O}$), we obtain a non-degenerate pairing between certain graded homomorphism and graded extension spaces. This motivates the study of the category of linear tilting complexes for graded quasi-hereditary algebras. We show that, under assumptions, similar to those mentioned above, this category realizes the module category for the Koszul dual of the Ringel dual of the original algebra. As a corollary we obtain that under these assumptions the Ringel and Koszul dualities commute.
In this paper we explore relationship between representations of a Jordan algebra $\\J$ and the Lie algebra $\\g$ obtained from $\\J$ by the Tits-Kantor-Koecher construction. More precisely, we construct two adjoint functors $Lie :\\JJ\\to \\ggm$ and $Jor:\\ggm\\to\\JJ$, where $\\JJ$ is the category of unital $\\J$-bimodules and $\\ggm$ is the category of $\\g$-modules admitting a short grading. Using these functors we classify $\\J$ such that its semisimple part is of Clifford type and the category $\\JJ$ is tame.
We introduce a linear algebraic object called a bidiagonal triple. A bidiagonal triple consists of three diagonalizable linear transformations on a finite-dimensional vector space, each of which acts in a bidiagonal fashion on the eigenspaces of the other two. The concept of bidiagonal triple is a generalization of the previously studied and similarly defined concept of bidiagonal pair. We show that every bidiagonal pair extends to a bidiagonal triple, and we describe the sense in which this extension is unique. In addition we generalize a number of theorems about bidiagonal pairs to the case of bidiagonal triples. In particular we use the concept of a parameter array to classify bidiagonal triples up to isomorphism. We also describe the close relationship between bidiagonal triples and the representation theory of the Lie algebra $sl_2$ and the quantum algebra $U_q(sl_2)$.
Let C be a connected noetherian hereditary abelian Ext-finite category with Serre functor over an algebraically closed field k, with finite dimensional homomorphism and extension spaces. Using the classification of such categories from math.RT/9911242, we prove that if C has some object of infinite length, then the Grothendieck group of C is finitely generated if and only if C has a tilting object.
If $\\mathscr{J}$ is a finite-dimensional nilpotent algebra over a finite field $\\Bbbk$, the algebra group $P = 1+\\mathscr{J}$ admits a (standard) supercharacter theory as defined by Diaconis and Isaacs. If $\\mathscr{J}$ is endowed with an involution $\\widehat{\\varsigma}$, then $\\widehat{\\varsigma}$ naturally defines a group automorphism of $P = 1+\\mathscr{J}$, and we may consider the fixed point subgroup $C_{P}(\\widehat{\\varsigma}) = \\{x\\in P : \\widehat{\\varsigma}(x) = x^{-1}\\}$. Assuming that $\\Bbbk$ has odd characteristic $p$, we use the standard supercharacter theory for $P$ to construct a supercharacter theory for $C_{P}(\\widehat{\\varsigma})$. In particular, we obtain a supercharacter theory for the Sylow $p$-subgroups of the finite classical groups of Lie type, and thus extend in a uniform way the construction given by Andr\\ e and Neto for the special case of the symplectic and orthogonal groups.
Our starting point is Mumford s conjecture, on representations of Chevalley groups over fields, as it is phrased in the preface of \"Geometric Invariant Theory\". After extending the conjecture appropriately, we show that it holds over an arbitrary commutative base ring. We thus obtain the first fundamental theorem of invariant theory (often referred to as Hilbert s fourteenth problem) over an arbitrary Noetherian ring. We also prove results on the Grosshans graded deformation of an algebra in the same generality. We end with tentative finiteness results for rational cohomology over the integers.
If one restricts an irreducible representation $V_{\\lambda}$ of $Gl_{2n}$ to the orthogonal group (respectively the symplectic group), the trivial representation appears with multiplicity one if and only if all parts of $\\lambda$ are even (resp. the conjugate partition $\\lambda $ is even). One can rephrase this statement as an integral identity involving Schur functions, the corresponding characters. Rains and Vazirani considered $q,t$-generalizations of such integral identities, and proved them using affine Hecke algebra techniques. In a recent paper, we investigated the $q=0$ limit (Hall-Littlewood), and provided direct combinatorial arguments for these identities; this approach led to various generalizations and a finite-dimensional analog of a recent summation identity of Warnaar. In this paper, we reformulate some of these results using $p$-adic representation theory; this parallels the representation-theoretic interpretation in the Schur case. The nonzero values of the identities are interpreted as certain $p$-adic measure counts. This approach provides a $p$-adic interpretation of these identities (and a new identity), as well as independent proofs. As an application, we obtain a new Littlewood summation identity that generalizes a classical result due to Littlewood and Macdonald. Finally, our $p$-adic method also leads to a generalized integral identity in terms of Littlewood-Richardson coefficients and Hall polynomials.
Let $\\Pi_0$ be a representation of a group $H$. We say that a representation $\\tau$ is $(H,\\Pi_0)$-distinguished, if it is a quotient of $\\Pi_0$. It is natural to ask whether this notion \"inflates\" to larger groups, in the sense that a representation $\\mathrm{I}(\\tau)$ induced from $\\tau$ and $H$ to a group $G$, is $(G,\\Pi)$-distinguished. We study representations distinguished by theta representations: $H=GL_n$, $\\Pi_0$ is a pair of the exceptional representations of Kazhdan and Patterson, $G=GSpin_{2n+1}$ and $\\Pi$ is a pair of the small representations of Bump, Friedberg and Ginzburg. We prove a Rodier-type hereditary property: a tempered representation $\\tau$ is distinguished if and only if $\\mathrm{I}(\\tau)$ is distinguished, and the multiplicity in each model is the same. If $\\tau$ is supercuspidal and distinguished, we prove that the Langlands quotient of $\\mathrm{I}(\\tau)$ is distinguished. As a corollary, we characterize supercuspidal distinguished representations, in terms of the pole of the local symmetric square $L$-function at $s=0$.
In math.RT/0304173 the derived category of the principal block in modules over the Lusztig quantum algebra at a root of unity is related to the derived category of equivariant coherent sheaves on the Springer resolution. In the present paper we deduce a similar relation between the derived category of the principal block for the {\\em small (reduced) quantum algebra} and the derived category of (non-equivariant) coherent sheaves on the Springer resolution. As an application we get a geometric description of Hochschild cohomology (in particular, the center) of the regular block for the small quantum group, and use it to give an explicit description of a certain subalgebra in the center (obtained previously by another method and under more restrictive assumptions in math.QA/0107098. We also briefly explain the relation of our result to the geometric description math.RT/0407048 of the derived category of modules over the De Concini -- Kac quantum algebra.
We consider a see-saw pair consisting of a Hermitian symmetric pair (G_R, K_R) and a compact symmetric pair (M_R, H_R), where (G_R, H_R) and (K_R, M_R) form real reductive dual pairs in a large symplectic group. In this setting, we get Capelli identities which explicitly represent certain K_C-invariant elements in U(Lie(G)_C) in terms of H_C-invariant elements in U(Lie(M)_C). The corresponding H_C-invariant elements are called Capelli elements. We also give a decomposition of the intersection of O_{2n}-harmonics and Sp_{2n}-harmonics as a module of GL_n = O_{2n} \\cap Sp_{2n}, and construct a basis for the GL_n highest weight vectors. This intersection is in the kernel of our Capelli elements.
Given a quiver, a fixed dimension vector, and a positive integer n, we construct a functor from the category of D-modules on the space of representations of the quiver to the category of modules over a corresponding Gan-Ginzburg algebra of rank n. When the quiver is affine Dynkin we obtain an explicit construction of representations of the corresponding wreath-product symplectic reflection algebra of rank n. When the quiver is star-shaped, but not finite Dynkin, we use this functor to obtain a Lie theoretic construction of representations of a \"spherical\" subalgebra of the Gan-Ginzburg algebra isomorphic to a rational generalized double affine Hecke algebra of rank n. Our functors are a generalization of the type A and type BC functors from arXiv:math/0702670 and arXiv:0801.1530 respectively.
We study the homomorphism spaces between Specht modules for the Hecke algebras $\\h$ of type $A$. We prove a cellular analogue of the kernel intersection theorem and a $q$-analogue of a theorem of Fayers and Martin and apply these results to give an algorithm which computes the homomorphism spaces $\\Hom_{\\h}(S^\\mu,S^\\lambda)$ for certain pairs of partitions $\\lambda$ and $\\mu$. We give an explicit description of the homomorphism spaces $\\Hom_\\h(S^\\mu,S^\\lambda)$ where $\\h$ is an algebra over the complex numbers, $\\lambda=(\\lambda_1,\\lambda_2)$ and $\\mu$ is an arbitrary partition with $\\mu_1 \\geq \\lambda_2$.
Representation theory of $p$-adic groups naturally comes in the study of automorphic forms and one way to understand representations of a group is by restricting to its nice subgroups. D. Prasad studied the restriction for pairs $({\\rm GL}_{2}(E), {\\rm GL}_{2}(F))$ and $({\\rm GL}_{2}(E), D_{F}^{\\times})$ where $E/F$ is a quadratic equation and $D_{F}$ is the unique quaternion division algebra, and $D_{F}^{\\times} \\hookrightarrow {\\rm GL}_{2}(E)$. Prasad proved a multiplicity one result and a `dichotomy  relating the restriction for the pairs $({\\rm GL}_{2}(E), {\\rm GL}_{2}(F))$ and $({\\rm GL}_{2}(E), D_{F}^{\\times})$ involving the Jacquet-Langlands correspondence. We study a restriction problem involving covering groups. In an analogy to the case of Prasad, we consider pairs $(\\widetilde{{\\rm GL}_{2}(E)}, {\\rm GL}_{2}(F))$ and $(\\widetilde{{\\rm GL}_{2}(E)}, D_{F}^{\\times})$ where $\\widetilde{{\\rm GL}_{2}(E)}$ is the $\\mathbb{C}^{\\times}$-metaplectic covering of ${\\rm GL}_{2}(E)$. We do not have multiplicity one in this case but there is an analogue of dichotomy.
Let p be an odd prime, and A_n the alternating group of degree n. We determine which ordinary irreducible representations of A_n remain irreducible in characteristic p, verifying the author s conjecture from [Represent. Theory 14, 601-626]. Given the preparatory work done in [op. cit.], our task is to determine which self-conjugate partitions label Specht modules for the symmetric group in characteristic p having exactly two composition factors. This is accomplished through the use of the Robinson-Brundan-Kleshchev  i-restriction  functors, together with known results on decomposition numbers for the symmetric group and additional results on the Mullineux map and homomorphisms between Specht modules.
We define the Iwahori-Hecke algebra for an almost split Kac-Moody group over a local non-archimedean field. We use the hovel associated to this situation, which is the analogue of the Bruhat-Tits building for a reductive group. The fixer K of some chamber in the standard apartment plays the role of the Iwahori subgroup. We can define the Iwahori-Hecke algebra as the algebra of some K-bi-invariant functions on the group with support consisting of a finite union of double classes. As two chambers in the hovel are not always in a same apartment, this support has to be in some large subsemigroup of the Kac-Moody group. In the split case, we prove that the structure constants of the multiplication in this algebra are polynomials in the cardinality of the residue field, with integer coefficients depending on the geometry of the standard apartment. We give a presentation of this algebra, similar to the Bernstein-Lusztig presentation in the reductive case, and embed it in a greater algebra, algebraically defined by the Bernstein-Lusztig presentation. In the affine case, this algebra contains the Cherednik s double affine Hecke algebra. Actually, our results apply to abstract \"locally finite\" hovels, so that we can define the Iwahori-Hecke algebra with unequal parameters.
This paper studies nilpotent orbits in complex simple Lie algebras from the viewpoint of strongly visible actions in the sense of T. Kobayashi. We prove that the action of a maximal compact group consisting of inner automorphisms on a nilpotent orbit is strongly visible if and only if it is spherical, namely, admitting an open orbit of a Borel subgroup. Further, we find a concrete description of a slice in the strongly visible action. As a corollary, we clarify a relationship among different notions of complex nilpotent orbits: actions of Borel subgroups (sphericity); multiplicity-free representations in regular functions; momentum maps; and actions of compact subgroups (strongly visible actions).
We compute explicitly up to Morita-equivalence the skew group algebra of a finite group acting on the path algebra of a quiver and the skew group algebra of a finite group acting on a preprojective algebra. These results generalize previous results of Reiten and Riedtmann for a cyclic group acting on the path algebra of a quiver and of Reiten and Van den Bergh for a finite subgroup of $\\SL(\\C X \\oplus \\C Y)$ acting on $\\C[X, Y]$.
Every two seeds in a field of fractions $\\mathcal{F}$ together with a symmetric group element gives rise to an automorphism of $\\mathcal{F}$ called an exchange automorphism. For positive cluster algebras, we provide equivalent conditions for exchange automorphisms to be cluster isomorphisms of the corresponding cluster algebras. The equivalent conditions are given in terms of a symmetric group action on the set of seeds, which is also studied. Presentations of groups of cluster automorphisms of some seeds of ranks 1 and 2 are given.
We shall give a uniform expression and a uniform calculation for the b-functions of prehomogeneous vector spaces of commutative parabolic type, which were previously calculated by case-by-case analysis. Our method is a generalization of Kashiwara s approach using the universal Verma modules. We shall also give a new proof for the criterion of the irreducibility of the generalized Verma module in terms of b-functions due to Suga, Gyoja, Wachi.
Howe s duality is considered from a unifying point of view based on Lie superalgebras. New examples are offered. In particular, we construct several simplest spinor-oscillator representations and compute their highest weights for the  stringy  Lie superalgebras (i.e., Lie superalgebras of complex vector fields (or their nontrivial central extensions) on the supercircle $S^{1|n}$ and its two-sheeted cover associated with the M\\\"obius bundle).
For a representation of a connected compact Lie group G in a finite dimensional real vector space U and a subspace V of U, invariant under a maximal torus of G, we obtain a sufficient condition for V to meet all G-orbits in U, which is also necessary in certain cases. The proof makes use of the cohomology of flag manifolds and the invariant theory of Weyl groups. Then we apply our condition to the conjugation representations of U(n), Sp(n), and SO(n) in the space of $n\\times n$ matrices over C, H, and R, respectively. In particular, we obtain an interesting generalization of Schur s triangularization theorem.
The problem of decomposing the Kronecker product of $S_n$ characters is one of the last major open problems in the ordinary representation theory of the symmetric group $S_n$. Here we prove upper and lower polynomial bounds for the multiplicities of the Kronecker product $\\chi^\\lm\\otimes\\chi^\\mu$, where for some fixed $k$ and $\\ell$ both partitions $\\lm$ and $\\mu$ are in the $(k,\\ell)$ hook, $\\lm$ and $\\mu$ are partitions of $n$, and $n$ goes to infinity.
If $\\Lambda $ is an indecomposable, non maximal, symmetric order, then the idealizer of the radical $\\Gamma := \\Id(J(\\Lambda)) = J(\\Lambda)^{#} $ is the dual of the radical. If $\\Gamma $ is hereditary then $\\Lambda $ has a Brauer tree (under modest additional assumptions). Otherwise $\\Delta := \\Id(J(\\Gamma)) = (J(\\Gamma)^2)^{#} $. If $\\Lambda = \\Z_p G$ for a $p$-group $G\\neq 1$, then $\\Gamma $ is hereditary iff $G\\cong C_p$ and otherwise $[\\Delta : \\Lambda ] = p^2 | G/(G G^p)| $. For Abelian groups $G$, the length of the radical idealizer chain of $\\Z_pG$ is $(n-a)(p^{a} - p^{a-1})+p^{a-1}$, where $p^n$ is the order and $p^a$ the exponent of the Sylow $p$-subgroup of $G$.
Let G be a reductive p-adic group and let H(G)^s be a Bernstein block of the Hecke algebra of G. We consider two important topological completions of H(G)^s: a direct summand S(G)^s of the Harish-Chandra--Schwartz algebra of G and a two-sided ideal C*_r (G)^s of the reduced C*-algebra of G. These are useful for the study of all tempered smooth G-representations. We suppose that H(G)^s is Morita equivalent to an affine Hecke algebra H(R,q) -- as is known in many cases. The latter algebra also has a Schwartz completion S(R,q) and a C*-completion C*_r (R,q), both defined in terms of the underlying root datum R and the parameters q. We prove that, under some mild conditions, a Morita equivalence between H(G)^s and H(R,q) extends to Morita equivalences between S(G)^s and S(R,q), and between C*_r (G)^s and C*_r (R,q). We also check that our conditions are fulfilled in all known cases of such Morita equivalences between Hecke algebras.
Let n_n(C) be the algebra of strictly upper-triangular n x n matrices over the field of complex numbers and X_2 the subset of matrices of nilpotent order 2. Let B_n(C) be the group of invertible upper-triangular matrices acting on n_n(C) by conjugation. Let B(u) be the orbit of u in X_2 with respect to this action. Let S_n^2 be the subset of involutions in the symmetric group S_n. We define a new partial order on S_n^2 which gives the combinatorial description of the closure of B(u). We also construct an ideal I(B(u)) in symmetric algebra S(n_n(C)^* whose variety V(I(B(u))) equals the closure of B(u) (in Zariski topology). We apply these results to orbital varieties of nilpotent order 2 in sl_n(C) in order to give a complete combinatorial description of the closure of such an orbital variety in terms of Young tableaux. We also construct the ideal of definition of such an orbital variety up to taking the radical.
In this paper we study $\\mathbb{C}^*$-actions on generalized Calogero-Moser spaces and Hilbert schemes. The spectrum of the centre of the rational Cherednik algebra associated to the complex reflection group $(\\mathbb{Z}/l\\mathbb{Z}) \\wr S_n$ at $t=0$ is isomorphic, via the Etingof-Ginzburg map, to a certain Nakajima quiver variety. Assuming smoothness, reflection functors yield a hyper-K\\\"{a}hler isometry between this quiver variety and a subvariety of a Hilbert scheme. We show that the induced map on the labelling sets of $\\mathbb{C}^*$-fixed points is given by a version of the classical bijection between $l$-multipartitions and partitions with a certain fixed core depending on the choice of parameters, as claimed by Gordon in [10]. We apply this result to obtain a new proof and a generalization of the $q$-hook formula.
Let $F$ be either $\\mathbb{R}$ or a finite extension of $\\mathbb{Q}_p$, and let $G$ be a finite central extension of the group of $F$-points of a reductive group defined over $F$. Also let $\\pi$ be a smooth representation of $G$ (Frechet of moderate growth if $F=\\mathbb{R}$). For each nilpotent orbit $\\mathcal{O}$ we consider a certain Whittaker quotient $\\pi_{\\mathcal{O}}$ of $\\pi$. We define the Whittaker support WS$(\\pi)$ to be the set of maximal $\\mathcal{O}$ among those for which $\\pi_{\\mathcal{O}}\\neq 0$. In this paper we prove that all $\\mathcal{O}\\in\\mathrm{WS}(\\pi)$ are quasi-admissible nilpotent orbits, generalizing some of the results in [Moe96,JLS]. If $F$ is $p$-adic and $\\pi$ is quasi-cuspidal then we show that all $\\mathcal{O}\\in\\mathrm{WS}(\\pi)$ are $F$-distinguished, i.e. do not intersect the Lie algebra of any proper Levi subgroup of $G$ defined over $F$. We also give an adaptation of our argument to automorphic representations, generalizing some results from [GRS03,Shen16,JLS,Cai] and confirming a conjecture from [Ginz06]. Our methods are a synergy of the methods of the above-mentioned papers, and of our preceding paper [GGS].
We study branching laws for a classical group $G$ and a symmetric subgroup $H$. Our approach is through the {\\it branching algebra}, the algebra of covariants for $H$ in the regular functions on the natural torus bundle over the flag manifold for $G$. We give concrete descriptions of (natural subalgebras of) the branching algebra using classical invariant theory. In this context, it turns out that the ten classes of classical symmetric pairs $(G,H)$ are associated in pairs, $(G,H)$ and $(H ,G )$, and that the (partial) branching algebra for $(G,H)$ also describes a branching law from $H $ to $G $. (However, the second branching law may involve certain infinite-dimensional highest weight modules for $H $.) To highlight the fact that these algebras describe two branching laws simultaneously, we call them {\\it reciprocity algebras}. Our description of the reciprocity algebras reveals that they all are related to the tensor product algebra for $GL_n$. This relation is especially strong in the {\\it stable range}. We give quite explicit descriptions of reciprocity algebras in the stable range in terms of the tensor product algebra for $GL_n$. This is the structure lying behind formulas for branching multiplicities in terms of Littlewood-Richardson coefficients.
We introduce the notion of a spectral character for finite-dimensional representations of affine algebras. These can be viewed as a suitable q=1 limit of the elliptic characters defined by Etingof and Moura for quantum affine algebras. We show that these characters determine blocks of the category of finite-dimensional modules for affine algebras. To do this we use the Weyl modules defined by Chari and Pressley and some indecomposable reducible quotient of the Weyl modules.
Let $ \\pi $ be an irreducible Harish-Chandra $ (\\mathfrak{g}, K) $-module, and denote its associated variety by $ AV(\\pi) $. If $ AV(\\pi) $ is reducible, then each irreducible component must contain codimension one boundary component. Thus we are interested in the codimension one adjacency of nilpotent orbits for a symmetric pair $ (G, K) $. We define the notion of orbit graph and associated graph for $ \\pi $, and study its structure for classical symmetric pairs; number of vertices, edges, connected components, etc. As a result, we prove that the orbit graph is connecetd for even nilpotent orbits. Finally, for indefinite unitary group $ U(p, q) $, we prove that for each connected component of the orbit graph $ \\Gamma_K(O_{\\lambda}) $ thus defined, there is an irreducible Harish-Chandra module $ \\pi $ whose associated graph is exactly equal to the connceted component.
Let $A = \\bigoplus_{i \\geqslant 0} A_i$ be a graded locally finite $k$-algebra such that $A_0$ is an arbitrary finite-dimensional algebra satisfying a certain splitting condition. In this paper we develop a generalized Koszul theory preserving many classical results. Moreover, we define a quotient graded algebra $\\bar{A} = \\bigoplus_{i \\geqslant 0} \\bar{A}_i$ and show that $A$ is a generalized Koszul algebra if and only if $\\bar{A}$ is a classical Koszul algebra and a projective $A_0$-module. We also describe an application of this theory to the extension algebras of standard modules of standardly stratified algebras.
Let (g,[p]) be a finite-dimensional restricted Lie algebra, defined over an algebraically closed field k of characteristic p>0. The scheme of tori of maximal dimension of g gives rise to a finite group S(g) that coincides with the Weyl group of g in case g is a Lie algebra of classical type. In this paper, we compute the group S(g) for Lie algebras of Cartan type and provide applications concerning weight space decompositions, the existence of generic tori and polynomial invariants.
We show that the definition of unipotent (resp. nilpotent) pieces for classical groups given by Lusztig (resp. Lusztig and the author) coincides with the combinatorial definition using closure relations on unipotent (resp. nilpotent) classes. Moreover we give a closed formula for a map from the set of unipotent (resp. nilpotent) classes in characteristic 2 to the set of unipotent classes in characteristic 0 such that the fibers are the unipotent (resp. nilpotent) pieces.
We show that the partially spherical cyclotomic rational Cherednik algebra (obtained from the full rational Cherednik algebra by averaging out the cyclotomic part of the underlying reflection group) has four other descriptions: (1) as a subalgebra of the degenerate DAHA of type A given by generators; (2) as an algebra given by generators and relations; (3) as an algebra of differential-reflection operators preserving some spaces of functions; (4) as equivariant Borel-Moore homology of a certain variety. Also, we define a new $q$-deformation of this algebra, which we call cyclotomic DAHA. Namely, we give a $q$-deformation of each of the above four descriptions of the partially spherical rational Cherednik algebra, replacing differential operators with difference operators, degenerate DAHA with DAHA, and homology with K-theory, and show that they give the same algebra. In addition, we show that spherical cyclotomic DAHA are quantizations of certain multiplicative quiver and bow varieties, which may be interpreted as K-theoretic Coulomb branches of a framed quiver gauge theory. Finally, we apply cyclotomic DAHA to prove new flatness results for various kinds of spaces of $q$-deformed quasiinvariants.
Let $H$ be the fixed point group of a rational involution $\\si$ of a reductive $p$-adic group of charactersistic different from 2(this new version allows to remove the hypothesis on the characteristic of the residue field, see Proposition 2.3 and section 10). Let $P$ be a $\\si$-parabolic subgroup of $G $ i.e. such that $\\si(P)$ is opposite to $P$. We denote by $M$ the intersection with $\\si(P)$. Kato and Takano on one hand, Lagier on the other hand associated canonically to an $H$-form, i.e. an $H$-fixed linear form, $\\xi$, on a smooth admissible $G$-module, $V$, a linear form on the Jacquet module $j_P(V)$ of $V$ along $P$ which is fixed by $M\\cap H$. We call this operation constant term of $H$-fixed linear forms. This constant term is linked to the asymptotic behaviour of the generalized coefficients with respect to $\\xi$. P. Blanc and the second author defined a family of $H$-fixed linear forms on certain parabolically induced representations, associated to an $M\\cap H$-fixed linear form, $\\eta$, on the space of the inducing representation. The purpose of this article is to describe the constant term of these $H$-fixed linear forms. Also it is shown that when $\\eta$ is square integrable, i.e. when the generalized coefficients of $\\eta$ are square integrable, the corresponding family of $H$-fixed linear forms on the induced representations is a family of tempered, in a suitable sense, of $H$-fixed linear forms.
To a finite group G one can associate a tower of wreath products S_n[G]. It is well known that the graded direct sum of the Grothendieck groups of the categories of finite dimensional complex representations of these groups can be given the structure of a graded Hopf algebra, and in fact a positive self-adjoint Hopf algebra in the sense of Zelevinsky [1], using the induction product and restriction coproduct. This paper introduces and explores an analogously defined algebra/coalgebra structure associated to a more general class of towers of groups, obtained as a certain family of subgroups of wreath products in the case G is abelian. We call these groups restricted wreath products, and they include the infinite family of complex reflection groups G(m, p, n). It is known that in the case of full wreath products the associated Hopf algebra decomposes as a tensor power of the Hopf algebra of integral symmetric functions. In the case of restricted wreath products, the associated algebra/coalgebra is no longer a Hopf algebra, but here we see that it contains an algebra containing every irreducible representation as a constituent and which is isomorphic to a tensor power of such an algebra/coalgebra associated to a smaller restricted wreath product, generalizing the tensor product decomposition for the full wreath products. We closely follow the approach of [1].
We give a counterexample to the most optimistic analogue (due to Kleshchev and Ram) of the James conjecture for Khovanov-Lauda-Rouquier algebras associated to simply-laced Dynkin diagrams. The first counterexample occurs in type A_5 for p = 2 and involves the same singularity used by Kashiwara and Saito to show the reducibility of the characteristic variety of an intersection cohomology D-module on a quiver variety. Using recent results of Polo one can give counterexamples in type A in all characteristics.
The aim of the present paper is to obtain a classification of all the irreducible modular representations of the symmetric group on $n$ letters of dimension at most $n^3$, including dimension formulae. This is achieved by improving an idea, originally due to G. James, to get hands on dimension bounds, by building on the current knowledge about decomposition numbers of symmetric groups and their associated Iwahori-Hecke algebras, and by employing a mixture of theory and computation.
Intrigued by a well-known theorem of Mathieu s on Harish-Chandra modules over the Virasoro algebra, we give an analogous result for a class of Block type Lie algebras $\\BB$, where the parameter $q$ is a nonzero complex number. We also classify quasifinite irreducible highest weight $\\BB$-modules and irreducible $\\BB$-modules of the intermediate series. In particular, we obtain that an irreducible $\\BB$-module of the intermediate series may be a nontrivial extension of a $\\Vir$-module of the intermediate series if $q$ is half of a negative integer, where $\\Vir$ is a subalgebra of $\\BB$ isomorphic to the Virasoro algebra.
Let $N$ be a simply connected, connected nilpotent Lie group with the following assumptions. Its Lie Lie algebra $\\mathfrak{n}$ is an $n$-dimensional vector space over the reals. Moreover, $\\mathfrak{n=z}\\oplus\\mathfrak{b}\\oplus\\mathfrak{a}$, $\\mathfrak{z}$ is the center of $\\mathfrak{n}$, $\\mathfrak{z} =\\mathbb{R}Z_{n-2d}\\oplus\\mathbb{R}Z_{n-2d-1}\\oplus\\cdots\\oplus \\mathbb{R}Z_{1}, \\mathfrak{b} =\\mathbb{R}Y_{d}\\oplus\\mathbb{R} Y_{d-1}\\oplus\\cdots\\oplus\\mathbb{R}Y_{1}, \\mathfrak{a} =\\mathbb{R}X_{d}\\oplus\\mathbb{R}X_{d-1}\\oplus\\cdots\\oplus \\mathbb{R}X_{1}.$ Next, assume $\\mathfrak{z}\\oplus\\mathfrak{b}$ is a maximal commutative ideal of $\\mathfrak{n},$ $\\left[ \\mathfrak{a,b}\\right] \\subseteq\\mathfrak{z},$ and $\\mathrm{det}\\left([X_i,Y_j]\\right)_{1\\leq i,j\\leq d}$ is a non-trivial homogeneous polynomial defined over the ideal $\\left[ \\mathfrak{n,n}\\right] \\subseteq\\mathfrak{z}.$ We do not assume that $[\\mathfrak{a},\\mathfrak{a}]$ is generally trivial. We obtain some precise description of band-limited spaces which are sampling subspaces of $L^2(N)$ with respect to some discrete set $\\Gamma$. The set $\\Gamma$ is explicitly constructed by fixing a Jordan-H\\\"{o}lder basis for $\\mathfrak{n}.$ We provide sufficient conditions for which a function $f$ is determined from its sampled values on $(f(\\gamma))_{\\gamma \\in\\Gamma}.$ We also provide an explicit formula for the corresponding sinc-type functions. Several examples are also computed in the paper.
Let $\\Bbbk$ be a commutative ring and $I$ a category. As a generalization of a $\\Bbbk$-category with a (pseudo) action of a group we consider a family of $\\Bbbk$-categories with a (pseudo, lax, or oplax) action of $I$, namely an oplax functor from $I$ to the 2-category of small $\\Bbbk$-categories. We investigate derived equivalences of those oplax functors, and establish a Morita type theorem for them. This gives a base of investigations of derived equivalences of Grothendieck constructions of those oplax functors.
In previous work of Gow, Ohmori, Lusztig and the author, the Schur indices of all unipotent characters of finite groups of Lie type have been explicitly determined except for six cases in groups of type $F_4$, $E_7$ and $E_8$. In this paper, we show that the Schur indices of all cuspidal unipotent characters for type $F_4$ and $E_8$ are~1, assuming that the group is defined over a field of ``good   characteristic. This settles four out of the six open cases. For type $E_7$, we show that the Schur indices are at most~2.
For a finite group G one may consider the associated tower S_n[G] of wreath product groups. Zelevinsky associates to such a tower a positive self-adjoint Hopf algebra (PSH-algebra) R(G) as the infinite direct sum of the Grothendieck groups of the categories of complex representations of these groups. In this paper, we study the interaction via induction and restriction of the PSH-algebras R(G) and R(H) for subgroups H of G. A class of Hopf modules over PSH-algebras with a compatibility between the comultiplication and multiplication involving the Hopf k^{th}-power map arise naturally and are studied independently. We also give an explicit formula for the natural PSH-algebra morphisms between R(H) and R(G) arising from induction and restriction. In an appendix, we consider the more general family of restricted wreath products, which are subgroups of wreath product groups analogous to the subgroups G(m, p, n) of the wreath product cyclotomic complex reflection groups G(m, 1, n).
We call a symmetric pair of reductive groups $(G,H)$ stable if every closed double coset of $H$ in $G$ is preserved by the corresponding anti-involution. In the first part of the paper we develop a method to verify the stability property of symmetric pairs over local fields of characteristic 0, using non-abelian group cohomologies. In the second part we apply our methods to several specific pairs and check their stability. Combining our calculations with results of Aizenbud and Gourevitch, we classify the Gelfand pairs among the pairs $(SL_n(F), (GL_k(F) \\times GL_{n - k}(F)) \\cap SL_n(F))$, $(O(B_1 \\oplus B_2),O(B_1) \\times O(B_2))$, $(U(B_1 \\oplus B_2),U(B_1) \\times U(B_2))$, $(GL_n(F),O(B))$, $(GL_n(F),U(B))$, $(GL_{2n}(F), GL_n(E))$ and $(SL_{2n}(F), SL_n(E))$.
Casimir operators -- the generators of the center of the enveloping algebra -- are described for simple or close to them ``classical   finite dimensional Lie superalgebras with nondegenerate symmetric even bilinear form in Sergeev A., The invariant polynomials on simple Lie superalgebras. Represent. Theory 3 (1999), 250--280; math-RT/9810111 and for the ``queer   series in Sergeev A., The centre of enveloping algebra for Lie superalgebra Q(n, C). Lett. Math. Phys. 7, no. 3, 1983, 177--179. Here we consider the remaining cases, and state conjectures proved for small values of parameter. Under deformation (quantization) the Poisson Lie superalgebra po(0|2n) on purely odd superspace turns into gl(2^{n-1}|2^{n-1}) and, conjecturally, the lowest terms of the Taylor series expansion with respect to the deformation parameter (Planck s constant) of the Casimir operators for gl(2^{n-1}|2^{n-1}) are the Casimir operators for po(0|2n). Similarly, quantization sends po(0|2n-1) into q(2^{n-1}) and the above procedure makes Casimir operators for q(2^{n-1}) into same for po(0|2n-1). Casimir operators for the Lie superalgebra vect(0|m) of vector fields on purely odd superspace are only constants for m>2. Conjecturally, same is true for the Lie superalgebra svect(0|m) of divergence free vector fields, and its deform, for m>3. Invariant polynomials on po(0|2n-1) are also described. They do not correspond to Casimir operators.
A representation of a specialization of a q-deformed class one lattice gl(\\ell+1}-Whittaker function in terms of cohomology groups of line bundles on the space QM_d(P^{\\ell}) of quasi-maps P^1 to P^{\\ell} of degree d is proposed. For \\ell=1, this provides an interpretation of non-specialized q-deformed gl(2)-Whittaker function in terms of QM_d(\\IP^1). In particular the (q-version of) Mellin-Barnes representation of gl(2)-Whittaker function is realized as a semi-infinite period map. The explicit form of the period map manifests an important role of q-version of Gamma-function as a substitute of topological genus in semi-infinite geometry. A relation with Givental-Lee universal solution (J-function) of q-deformed gl(2)-Toda chain is also discussed.
If $G$ is a Lie group, $H\\subset G$ is a closed subgroup, and $\\tau$ is a unitary representation of $H$, then the authors give a sufficient condition on $\\xi\\in i\\mathfrak{g}^*$ to be in the wave front set of $\\operatorname{Ind}_H^G\\tau$. In the special case where $\\tau$ is the trivial representation, this result was conjectured by Howe. If $G$ is a real, reductive algebraic group and $\\pi$ is a unitary representation of $G$ that is weakly contained in the regular representation, then the authors give a geometric description of $\\operatorname{WF}(\\pi)$ in terms of the direct integral decomposition of $\\pi$ into irreducibles. Special cases of this result were previously obtained by Kashiwara-Vergne, Howe, and Rossmann. The authors give applications to harmonic analysis problems and branching problems.
A well-known theorem of Mathieu s states that a Harish-chandra module over the Virasoro algebra is either a highest weight module, a lowest weight module or a module of the intermediate series. It is proved in this paper that an analogous result also holds for the Lie algebra $\\BB$ related to Block type, with basis {L_{\\a,i},C|a,i\\in\\Z, i\\ge0} and relations [L_{\\a,i},L_{\\b,j}]=((i+1)\\b-(j+1)\\a)L_{\\a+\\b,i+j}+\\d_{\\a+\\b,0}\\d_{i+j,0}\\frac{\\a^3-\\a}{6}C, [C,L_{\\a,i}]=0.Namely, an irreducible quasifinite $\\BB$-module is either a highest weight module, a lowest weight module or a module of the intermediate series.
By Tits  deformation argument, a generic Iwahori--Hecke algebra $H$ associated to a finite Coxeter group $W$ is abstractly isomorphic to the group algebra of $W$. Lusztig has shown how one can construct an explicit isomorphism, provided that the Kazhdan--Lusztig basis of $H$ satisfies certain deep properties. If $W$ is crystallographic and $H$ is a one-parameter algebra, then these properties are known to hold thanks to a geometric interpretation. In this paper, we develop some new general methods for verifying these properties, and we do verify them for two-parameter algebras of type $I_2(m)$ and $F_4$ (where no geometric interpretation is available in general). Combined with previous work by Alvis, Bonnaf\\ e, DuCloux, Iancu and the author, we can then extend Lusztig s construction of an explicit isomorphism to all types of $W$, without any restriction on the parameters of $H$.
The purpose of the paper is to derive formulas that describe the structure of the induced supermodule H^0_G(\\la) for the general linear supergroup G=GL(m|n) over an algebraically closed field K of characteristic p\\neq 2. Using these formulas we determine primitive G_{ev}=GL(m)\\times GL(n)-vectors in H^0_G(\\lambda). We conclude with remarks related to the linkage principle in positive characteristic.
The Adams operations $\\psi_\\Lambda^n$ and $\\psi_S^n$ on the Green ring of a group $G$ over a field $K$ provide a framework for the study of the exterior powers and symmetric powers of $KG$-modules. When $G$ is finite and $K$ has prime characteristic $p$ we show that $\\psi_\\Lambda^n$ and $\\psi_S^n$ are periodic in $n$ if and only if the Sylow $p$-subgroups of $G$ are cyclic. In the case where $G$ is a cyclic $p$-group we find the minimum periods and use recent work of Symonds to express $\\psi_S^n$ in terms of $\\psi_\\Lambda^n$.
We study the relative Lie algebra cohomology of $\\mathfrak{so}(p,q)$ with values in the Weil representation $\\varpi$ of the dual pair $\\mathrm{Sp}(2k, \\mathbb{R}) \\times \\mathrm{O}(p,q)$. Using the Fock model we filter this complex and construct the associated spectral sequence. We then prove that the resulting spectral sequence converges to the relative Lie algebra cohomology and has $E_0$ term, the associated graded complex, isomorphic to a Koszul complex. It is immediate that the construction of the spectral sequence of Chapter 3 can be applied to any reductive subalgebra $\\mathfrak{g} \\subset \\mathfrak{sp}(2k(p+q), \\mathbb{R})$. In case the symplectic group is large relative to the orthogonal group ($k \\geq pq$), the $E_0$ term is isomorphic to a Koszul complex defined by a regular sequence, see 3.4. Thus, the cohomology vanishes except in top degree. This result is obtained without calculating the space of cochains and hence without using any representation theory. On the other hand, in case $k < p$, we know the Koszul complex is not that of a regular sequence from the existence of the class $\\varphi_{kq}$ of Kudla and Millson, see [KM2], a nonzero element of the relative Lie algebra cohomology of degree $kq$. For the case of $\\mathrm{SO}_0(p,1)$ we compute the cohomology groups in these remaining cases, namely $k < p$. We do this by first computing a basis for the relative Lie algebra cochains and then splitting the complex into a sum of two complexes, each of whose $E_0$ term is then isomorphic to a Koszul complex defined by a regular sequence. This thesis is adapted from the paper, [BMR], this author wrote with his advisor John Millson and Nicolas Bergeron of the University of Paris.
We develop a theory of group actions and coverings on Brauer graphs that parallels the theory of group actions and coverings of algebras. In particular, we show that any Brauer graph can be covered by a tower of coverings of Brauer graphs such that the topmost covering has multiplicity function identically one, no loops, and no multiple edges. Furthermore, we classify the coverings of Brauer graph algebras that are again Brauer graph algebras.
In a previous paper, the authors studied the radical filtration of a Weyl module $\\Delta_\\zeta(\\lambda)$ for quantum enveloping algebras $U_\\zeta(\\overset\\circ{\\mathfrak g})$ associated to a finite dimensional complex semisimple Lie algebra $\\overset\\circ{\\mathfrak g}$. There $\\zeta^2=\\sqrt[e]{1}$ and $\\lambda$ was, initially, required to be $e$-regular. Some additional restrictions on $e$ were required---e.g., $e>h$, the Coxeter number, and $e$ odd. Translation to a facet gave an explicit semisimple series for all quantum Weyl modules with singular, as well as regular, weights. That is, the sections of the filtration are explicit semisimple modules with computable multiplicities of irreducible constituents. However, in the singular case, the filtration conceivably might not be the radical filtration. This paper shows how a similar semisimple series result can be obtained for all positive integers $e$ in case $\\overset\\circ{\\mathfrak g}$ has type $A$, and for all positive integes $e\\geq 3$ in type $D$. One application describes semisimple series (with computable multiplicities) on $q$-Specht modules. We also discuss an analogue for Weyl modules for classical Schur algebras and Specht modules for symmetric group algebras in positive characteristic $p$. Here we assume the James Conjecture and a version of the Bipartite Conjecture.
We prove that there is a natural grading-preserving isomorphism of $\\sl$-modules between the basic module of the affine Lie algebra $\\widehat\\sl$ (with the homogeneous grading) and a Schur--Weyl module of the infinite symmetric group $\\sinf$ with a grading defined through the combinatorial notion of the major index of a Young tableau, and study the properties of this isomorphism. The results reveal new and deep interrelations between the representation theory of $\\widehat\\sl$ and the Virasoro algebra on the one hand, and the representation theory of $\\sinf$ and the related combinatorics on the other hand.
We study $t$-analogs of string functions for integrable highest weight representations of the affine Kac-Moody algebra $A_1^{(1)}$. We obtain closed form formulas for certain $t$-string functions of levels 2 and 4. As corollaries, we obtain explicit identities for the corresponding affine Hall-Littlewood functions, as well as higher-level generalizations of Cherednik s Macdonald and Macdonald-Mehta constant term identities.
Let G be a quasisimple algebraic group over an algebraically closed field of characteristic p>0. We suppose that p is very good for G; since p is good, there is a bijection between the nilpotent orbits in the Lie algebra and the unipotent classes in G. If the nilpotent X in Lie(G) and the unipotent u in G correspond under this bijection, and if u has order p, we show that the partitions of ad(X) and Ad(u) are the same. When G is classical or of type G_2, we prove this result with no assumption on the order of u. In the cases where u has order p, the result is achieved through an application of results of Seitz concerning good A_1 subgroups of G. For classical groups, the techniques are more elementary, and they lead also to a new proof of the following result of Fossum: the structure constants of the representation ring of a 1-dimensional formal group law F are independent of F.
The unipotent variety of a reductive algebraic group $G$ plays an important role in the representation theory. In this paper, we will consider the closure $\\bar{\\Cal U}$ of the unipotent variety in the De Concini-Procesi compactification $\\bar{G}$ of a connected simple algebraic group $G$. We will prove that $\\bar{\\Cal U}-\\Cal U$ is a union of some $G$-stable pieces introduced by Lusztig in \\cite{L4}. This was first conjectured by Lusztig. We will also give an explicit description of $\\bar{\\Cal U}$. It turns out that similar results hold for the closure of any Steinberg fiber in $\\bar{G}$.
A Lie theoretic interpretation is given to a pattern with five-fold symmetry occurring in aperiodic Penrose tiling based on isosceles triangles with length ratios equal to the Golden Section. Specifically a $B(\\infty)$ crystal based on that of Kashiwara is constructed exhibiting this five-fold symmetry. It is shown that it can be represented as a Kashiwara $B(\\infty)$ crystal in type $A_4$. Similar crystals with $(2n+1)$-fold symmetry are represented as Kashiwara crystals in type $A_{2n}$. The weight diagrams of the latter inspire higher aperiodic tiling. In another approach alcove packing is seen to give aperiodic tiling in type $A_4$. Finally $2m$-fold symmetry is related to type $B_m$.
We study the degree of irreducible morphisms in any Auslander-Reiten component of a finite dimensional algebra over an algebraically closed field. We give a characterization for an irreducible morphism to have finite left (or right) degree. This is used to prove our main theorem: An algebra is of finite representation type if and only if for every indecomposable projective the inclusion of the radical in the projective has finite right degree, which is equivalent to require that for every indecomposable injective the epimorphism from the injective to its quotient by its socle has finite left degree. We also apply the techniques that we develop: We study when the non-zero composite of a path of $n$ irreducible morphisms between indecomposable modules lies in the $n+1$-th power of the radical; and we study the same problem for sums of such paths when they are sectional, thus proving a generalisation of a pioneer result of Igusa and Todorov on the composite of a sectional path.
Derived functors (or Zuckerman functors) play a very important role in the study of unitary representations of real reductive groups. These functors are usually applied on highest weight modules in the so-called good range and the theory is well-understood. On the other hand, there were several studies on the irreducibility and unitarizability, in which derived functors are applied to singular modules. See Enright et al. (Acta. Math. 1985), for example. In this article, we apply derived functors to certain modules arising from the formalism of local theta lifting, and investigate the irreducible sub-quotients of resulting modules. The key technique is to understand $U(\\mathfrak{g})^K$-actions in the setting of a see-saw pair. Our results strongly suggest that derived functor constructions are compatible with local theta lifting.
Interchanging character and co-character groups of a torus $T$ over a field $k$ introduces a contravariant functor $T \\rightarrow \\widehat{T}$. Interpreting $\\rho:T\\rightarrow {\\mathbb C}^\\times$, half the sum of positive roots for $T$ a maximal torus in a simply connected semi-simple group $G$ (over ${\\mathbb C}$) using this duality, we get a co-character $\\widehat{\\rho}: {\\mathbb C}^\\times \\rightarrow \\widehat{T}$ whose value at $e^{\\frac{2 \\pi i}{h}}$ ($h$ the Coxeter number) is the Coxeter conjugacy class of the dual group $\\widehat{G}$. This point of view gives a rather transparent proof of a theorem of Kostant on the character values of irreducible finite dimensional representations of $G$ at the Coxeter element: the proof amounting to the fact that in $\\widehat{G}_{sc}$, the simply connected cover of $\\widehat{G}$, there is a unique regular conjugacy class whose image in $\\widehat{G}$ has order $h$ (which is the Coxeter conjugacy class).
In this paper branching rules for the fundamental representations of the symplectic groups in positive characteristic are found. The submodule structure of the restrictions of the fundamental modules for the group $Sp_{2n}(K)$ to the naturally embedded subgroup $Sp_{2n-2}(K)$ is determined. As a corollary, inductive systems of fundamental representations for $Sp_{\\infty}(K)$ are classified. The submodule structure of the fundamental Weyl modules is refined.
Let $G$ be a simple simply connected algebraic group scheme defined over an algebraically closed field of characteristic $p > 0$. Let $T$ be a maximal split torus in $G$, $B \\supset T$ be a Borel subgroup of $G$ and $U$ its unipotent radical. Let $F: G \\rightarrow G$ be the Frobenius morphism. For $r \\geq 1$ define the Frobenius kernel, $G_r$, to be the kernel of $F$ iterated with itself $r$ times. Define $U_r$ (respectively $B_r$) to be the kernel of the Frobenius map restricted to $U$ (respectively $B$). Let $X(T)$ be the integral weight lattice and $X(T)_+$ be the dominant integral weights. The computations of particular importance are $\\h^2(U_1,k)$, $\\h^2(B_r,\\la)$ for $\\la \\in X(T)$, $\\h^2(G_r,H^0(\\la))$ for $\\la \\in X(T)_+$, and $\\h^2(B,\\la)$ for $\\la \\in X(T)$. The above cohomology groups for the case when the field has characteristic 2 one computed in this paper. These computations complete the picture started by Bendel, Nakano, and Pillen for $p \\geq 3$ \\cite{BNP2}.
Finite dimensional modular Lie superalgebras over algebraically closed fields with indecomposable Cartan matrices are classified under some technical, most probably inessential, hypotheses. If the Cartan matrix is invertible, the corresponding Lie superalgebra is simple otherwise the quotient of the derived Lie superalgebra modulo center is simple (if its rank is greater than 1). Eleven new exceptional simple modular Lie superalgebras are discovered. Several features of classic notions, or notions themselves, are clarified or introduced, e.g., Cartan matrix, several versions of restrictedness in characteristic 2, Dynkin diagram, Chevalley generators, and even the notion of Lie superalgebra if the characteristic is equal to 2. Interesting phenomena in characteristic 2: (1) all simple Lie superalgebras with Cartan matrix are obtained from simple Lie algebras with Cartan matrix by declaring several (any) of its Chevalley generators odd; (2) there exist simple Lie superalgebras whose even parts are solvable. The Lie superalgebras of fixed points of automorphisms corresponding to the symmetries of Dynkin diagrams are also listed and their simple subquotients described.
The theory of Caldero-Chapoton algebras of Cerulli-Irelli, Labardini-Fragoso and Schroer leads to a refinement of the notions of cluster variables and clusters, via so called component clusters. In this paper we compare component clusters to classical clusters for the cluster algebra of an acyclic quiver. We propose a definition of mutation between component clusters and determine the mutation relations of component clusters for affine quivers. In the case of a wild quiver, we provide bounds for the size of component clusters.
Remarks on the Kostant Dirac operator In 1999, Kostant [Kos99] indroduces a Dirac operator D_g/h associated to any triple (g, h,B), where g is a complex Lie algebra provided with an ad g-invariant non degenerate nsymetric bilinear form B, and h is a Lie subalgebra of g such that the bilinear form B is non degenerate on h. Kostant then shows that the square of this operator safisties a formula that generalizes the so-called Parthasarathy formula [Par72]. We give here a new proof of this formula. First we use an induction by stage argument to reduce the proof of the formula to the particular case where h = 0. In this case we show that the vanishing of the first ordrer term in the Kostant formula for D2_g/h is a consequence of classic properties related to Lie algebra cohomology, and the fact that the square of the cubic term is a scalar follows from such considerations, together with the Jacobi identity.
We study maximal $m$-rigid objects in the $m$-cluster category $\\mathcal C_H^m$ associated with a finite dimensional hereditary algebra $H$ with $n$ nonisomorphic simple modules. We show that all maximal $m$-rigid objects in these categories have exactly $n$ nonisomorphic indecomposable summands, and that any almost complete $m$-rigid object in $\\mathcal C_H^m$ has exactly $m+1$ nonisomorphic complements. We also show that the maximal $m$-rigid objects and the $m$-cluster tilting objects in these categories coincide, and that the class of finite dimensional algebras associated with maximal $m$-rigid objects is closed under certain factor algebras.
In this paper, we extend the notion of Shintani descent to general (possibly disconnected) algebraic groups defined over a finite field $\\mathbb{F}_q$. For this, it is essential to treat all the pure inner $\\mathbb{F}_q$-rational forms of the algebraic group at the same time. We prove that the notion of almost characters (introduced by T. Shoji using Shintani descent) is well defined for any neutrally unipotent algebraic group, i.e. an algebraic group whose neutral connected component is a unipotent group. We also prove that these almost characters coincide with the \"trace of Frobenius\" functions associated with Frobenius-stable character sheaves on neutrally unipotent groups. In the course of the proof, we also prove that the modular categories that arise from Boyarchenko-Drinfeld s theory of character sheaves on neutrally unipotent are in fact positive integral confirming a conjecture due to Drinfeld.
We study equivalences for category O_p of the rational Cherednik algebras H_p of type G_l(n) = \\mu_l^n\\rtimes S_n: a highest weight equivalence between O_p and O_{\\sigma(p)} for \\sigma\\in S_l and an action of S_l on a non-empty Zariski open set of parameters p; a derived equivalence between O_p and O_{p } whenever p and p  have integral difference; a highest weight equivalence between O_p and a parabolic category O for the general linear group, under a non-rationality assumption on the parameter p. As a consequence, we confirm special cases of conjectures of Etingof and of Rouquier.
We show, in full generality, that Lusztig s $\\mathbf{a}$-function describes the projective dimension of both indecomposable tilting modules and indecomposable injective modules in the regular block of the BGG category $\\mathcal{O}$, proving a conjecture from the first paper. On the way we show that the images of simple modules under projective functors can be represented in the derived category by linear complexes of tilting modules. These complexes, in turn, can be interpreted as the images of simple modules under projective functors in the Koszul dual of the category $\\mathcal{O}$. Finally, we describe the dominant projective module and also projective-injective modules in some subcategories of $\\mathcal{O}$ and show how one can use categorification to decompose the regular representation of the Weyl group into a direct sum of cell modules, extending the results known for the symmetric group (type $A$).
We introduce partially ordered sets (posets) with an additional structure given by a collection of vector subspaces of an algebra $A$. We call them algebraically equipped posets. Some particular cases of these, are generalized equipped posets and $p$-equipped posets, for a prime number $p$. We study their categories of representations and establish equivalences with some module categories, categories of morphisms and a subcategory of representations of a differential tensor algebra. Through this, we obtain matrix representations and its corresponding matrix classification problem.
In this series of papers we want to discuss the highest weight ${\\frak k}_r$-finite representations of the pair $({\\frak g}_r,{\\frak k}_r)$ consisting of ${\\frak g}_r$, a real form of a complex basic Lie superalgebra of classical type ${\\frak g}$ (${\\frak g}\\neq A(n,n)$), and the maximal compact subalgebra ${\\frak k}_r$ of ${\\frak} g_{r,0}$. These representations will be concretely realized through spaces of sections of holomorphic vector bundles on the associated Hermitian superspaces. In this part we shall discuss only the infinitesimal theory of the pair $({\\frak g}_r, {\\frak k}_r)$. We treat the global theory in subsequent papers of the series.
In this paper we use A-infinity modules to study the derived category of a finite dimensional algebra over an algebraically closed field. We study varieties parameterising A-infinity modules. These varieties carry an action of an algebraic group such that orbits correspond to quasi-isomorphism classes of complexes in the derived category. We describe orbit closures in these varieties, generalising a result of Zwara and Riedtmann for modules.
In the present paper we start consideration of anti de Sitter holography in the general case of the (q+1)-dimensional anti de Sitter bulk with boundary q-dimensional Minkowski space-time. We present the group-theoretic foundations that are necessary in our approach. Comparing what is done for q=3 the new element in the present paper is the presentation of the bulk space as the homogeneous space G/H = SO(q,2)/SO(q,1), which homogeneous space was studied by Sekiguchi.
Given a simple Lie algebra $\\mathfrak{g}$ and an element $\\mu\\in\\mathfrak{g}^*$, the corresponding shift of argument subalgebra of $\\text{S}(\\mathfrak{g})$ is Poisson commutative. In the case where $\\mu$ is regular, this subalgebra is known to admit a quantization, that is, it can be lifted to a commutative subalgebra of $\\text{U}(\\mathfrak{g})$. We show that if $\\mathfrak{g}$ is of type $A$, then this property extends to arbitrary $\\mu$, thus proving a conjecture of Feigin, Frenkel and Toledano Laredo. The proof relies on an explicit construction of generators of the center of the affine vertex algebra at the critical level.
We describe tilting modules of the deformed category O over a semisimple Lie algebra as certain sheaves on a moment graph associated to the corresponding block of category O. We prove that they map to Braden-MacPherson sheaves constructed along the reversed Bruhat order under Fiebig s localization functor. By this means, we get character formulas for tilting modules and explain how Soergel s result about the Andersen filtration gives a Koszul dual proof of the semisimplicity of subquotients of the Jantzen filtration.
Bloch and Okounkov s correlation function on the infinite wedge space has connections to Gromov-Witten theory, Hilbert schemes, symmetric groups, and certain character functions of $\\hgl_\\infty$-modules of level one. Recent works have calculated these character functions for higher levels for $\\hgl_\\infty$ and its Lie subalgebras of classical type. Here we obtain these functions for the subalgebra of type $D$ of half-integral levels and as a byproduct, obtain $q$-dimension formulas for integral modules of type $D$ at half-integral level.
The space D(k,p) of differential operators of order at most k, from the differential forms of degree p of a smooth manifold M into the functions of M, is a module over the Lie algebra of vector fields of M, when it s equipped with the natural Lie derivative. In this paper, we compute all equivariant i.e. intertwining operators from D(k,p) into D(k ,p ) and conclude that the preceding modules of differential operators are never isomorphic. We also answer a question of P. Lecomte, who observed that the restriction to D(k,p) of some homotopy operator, introduced in one of his works, is equivariant for small values of k and p.
We introduce some modified forms for the degenerate and non-degenerate affine Hecke algebras of type $A$ such that their finite dimensional module categories are equivalent to the finite dimensional modules categories over the original affine Hecke algebras. Many classical results (including faithful polynomial representations, standard bases and description of the centers) for the original affine Hecke algebras are generalized to these modified affine Hecke algebras. We construct some explicit algebra isomorphisms between some generalized Ore localizations of the modified forms of affine Hecke algebras and of the quiver Hecke algebras of type $A$, which generalize Brundan--Kleshchev s isomorphisms between the cyclotomic Hecke algebras and the cyclotomic quiver Hecke algebras of type $A$. As applications, we give a categorical equivalence for quiver Hecke algebras, a simplicity result for the convolution products of simple modules and prove a conjecture for the center of cyclotomic quiver Hecke algebras in the cases of linear quivers and of some special cyclic quivers.
We say that a finite dimensional Lie algebra is quasi-reductive if it has a linear form whose stabilizer for the coadjoint representation, modulo the center, is a reductive Lie algebra with a center consisting of semisimple elements. Parabolic subalgebras of a semisimple Lie algebra are not always quasi-reductive (except in types A or C by work of Panyushev). The classification of quasi-reductive parabolic subalgebras in the classical case has been recently achieved in unpublished work of Duflo, Khalgui and Torasso. In this paper, we investigate the quasi-reductivity of biparabolic subalgebras of reductive Lie algebras. Biparabolic (or seaweed) subalgebras are the intersection of two parabolic subalgebras whose sum is the total Lie algebra. As a main result, we complete the classification of quasi-reductive parabolic subalgebras of reductive Lie algebras by considering the exceptional cases.
We show that the $p$-power maps in the first Hochschild cohomology space of finite-dimensional selfinjective algebras over a field of prime characteristic $p$ commute with stable equivalences of Morita type on the subgroup of classes represented by integrable derivations. We show, by giving an example, that the $p$-power maps do not necessarily commute with arbitrary transfer maps in the Hochschild cohomology of symmetric algebras.
Techniques based on randomized response enable the collection of potentially sensitive data from clients in a privacy-preserving manner with strong local differential privacy guarantees. One of the latest such technologies, RAPPOR, allows the marginal frequencies of an arbitrary set of strings to be estimated via privacy-preserving crowdsourcing. However, this original estimation process requires a known set of possible strings; in practice, this dictionary can often be extremely large and sometimes completely unknown. In this paper, we propose a novel decoding algorithm for the RAPPOR mechanism that enables the estimation of \"unknown unknowns,\" i.e., strings we do not even know we should be estimating. To enable learning without explicit knowledge of the dictionary, we develop methodology for estimating the joint distribution of two or more variables collected with RAPPOR. This is a critical step towards understanding relationships between multiple variables collected in a privacy-preserving manner.
A security policy states the acceptable actions of an information system, as the actions bear on security. There is a pressing need for organizations to declare their security policies, even informal statements would be better than the current practice. But, formal policy statements are preferable to support (1) reasoning about policies, e.g., for consistency and completeness, (2) automated enforcement of the policy, e.g., using wrappers around legacy systems or after the fact with an intrusion detection system, and (3) other formal manipulation of policies, e.g., the composition of policies. We present LaSCO, the Language for Security Constraints on Objects, in which a policy consists of two parts: the domain (assumptions about the system) and the requirement (what is allowed assuming the domain is satisfied). Thus policies defined in LaSCO have the appearance of conditional access control statements. LaSCO policies are specified as expressions in logic and as directed graphs, giving a visual view of policy. LaSCO has a simple semantics in first order logic (which we provide), thus permitting policies we write, even for complex policies, to be very perspicuous. LaSCO has syntax to express many of the situations we have found to be useful on policies or, more interesting, the composition of policies. LaSCO has an object-oriented structure, permitting it to be useful to describe policies on the objects and methods of an application written in an object-oriented language, in addition to the traditional policies on operating system objects. A LaSCO specification can be automatically translated into executable code that checks an invocation of a program with respect to a policy. The implementation of LaSCO is in Java, and generates wrappers to check Java programs with respect to a policy.
Since the first publication of the \"OWASP Top 10\" (2004), cross-site scripting (XSS) vulnerabilities have always been among the top 5 web application security bugs. Black-box vulnerability scanners are widely used in the industry to reproduce (XSS) attacks automatically. In spite of the technical sophistication and advancement, previous work showed that black-box scanners miss a non-negligible portion of vulnerabilities, and report non-existing, non-exploitable or uninteresting vulnerabilities. Unfortunately, these results hold true even for XSS vulnerabilities, which are relatively simple to trigger if compared, for instance, to logic flaws. Black-box scanners have not been studied in depth on this vertical: knowing precisely how scanners try to detect XSS can provide useful insights to understand their limitations, to design better detection methods. In this paper, we present and discuss the results of a detailed and systematic study on 6 black-box web scanners (both proprietary and open source) that we conducted in coordination with the respective vendors. To this end, we developed an automated tool to (1) extract the payloads used by each scanner, (2) distill the \"templates\" that have originated each payload, (3) evaluate them according to quality indicators, and (4) perform a cross-scanner analysis. Unlike previous work, our testbed application, which contains a large set of XSS vulnerabilities, including DOM XSS, was gradually retrofitted to accomodate for the payloads that triggered no vulnerabilities. Our analysis reveals a highly fragmented scenario. Scanners exhibit a wide variety of distinct payloads, a non-uniform approach to fuzzing and mutating the payloads, and a very diverse detection effectiveness.
Steganography is the technique of hiding confidential information within any media. Steganography is often confused with cryptography because the two are similar in the way that they both are used to protect confidential information. The difference between the two is in the appearance in the processed output; the output of steganography operation is not apparently visible but in cryptography the output is scrambled so that it can draw attention. Steganlysis is process to detect of presence of steganography. In this article we have tried to elucidate the different approaches towards implementation of steganography using  multimedia  file (text, static image, audio and video) and Network IP datagram as cover. Also some methods of steganalysis will be discussed.
Rijndael was standardized in 2001 by National Institute of Standard and Technology as the Advanced Encryption Standard (AES). AES is still being used to encrypt financial, military and even government confidential data. In 2005, Bernstein illustrated a remote cache timing attack on AES using the client-server architecture and therefore proved a side channel in its software implementation. Over the years, a number of countermeasures have been proposed against cache timing attacks both using hardware and software. Although the software based countermeasures are flexible and easy to deploy, most of such countermeasures are vulnerable to statistical analysis. In this paper, we propose a novel software based countermeasure against cache timing attacks, known as constant time encryption, which we believe is secure against statistical analysis. The countermeasure we proposed performs rescheduling of instructions such that the encryption rounds will consume constant time independent of the cache hits and misses. Through experiments, we prove that our countermeasure is secure against Bernstein s cache timing attack.
In [3], the authors proposed a highly efficient secure and privacy-preserving scheme for secure vehicular communications. The proposed scheme consists of four protocols: system setup, protocol for STP and STK distribution, protocol for common string synchronization, and protocol for vehicular communications. Here we define the security models for the protocol for STP and STK distribution, and the protocol for vehicular communications,respectively. We then prove that these two protocols are secure in our models.
We study linking attacks on communication protocols. We show that an active attacker is strictly more powerful in this setting than previously-considered passive attackers. We introduce a formal model to reason about active linkability attacks, formally define security against these attacks and give very general conditions for both security and insecurity of protocols. In addition, we introduce a composition-like technique that allows to obtain security proofs by only studying small components of a protocol.
We study and develop a robust control framework for malware filtering and network security. We investigate the malware filtering problem by capturing the tradeoff between increased security on one hand and continued usability of the network on the other. We analyze the problem using a linear control system model with a quadratic cost structure and develop algorithms based on H infinity-optimal control theory. A dynamic feedback filter is derived and shown via numerical analysis to be an improvement over various heuristic approaches to malware filtering. The results are verified and demonstrated with packet level simulations on the Ns-2 network simulator.
In this paper, we propose a Directed threshold multisignature scheme without SDC. This signature scheme is applicable when the message is sensitive to the signature receiver; and the signatures are generated by the cooperation of a number of people from a given group of senders. In this scheme, any malicious set of signers cannot impersonate any other set of signers to forge the signatures. In case of forgery, it is possible to trace the signing set.
Important document are being kept encrypted in remote servers. In order to retrieve these encrypted data, efficient search methods needed to enable the retrieval of the document without knowing the content of the documents In this paper a technique called a global heuristic search on encrypted data (GHSED) technique will be described for search in an encrypted files using public key encryption stored on an untrusted server and retrieve the files that satisfy a certain search pattern without revealing any information about the original files. GHSED technique would satisfy the following: (1) Provably secure, the untrusted server cannot learn anything about the plaintext given only the cipher text. (2) Provide controlled searching, so that the untrusted server cannot search for a word without the user s authorization. (3) Support hidden queries, so that the user may ask the untrusted server to search for a secret word without revealing the word to the server. (4) Support query isolation, so the untrusted server learns nothing more than the search result about the plaintext.
We propose a general approach to construct cryptographic significant Boolean functions of $(r+1)m$ variables based on the additive decomposition $\\mathbb{F}_{2^{rm}}\\times\\mathbb{F}_{2^m}$ of the finite field $\\mathbb{F}_{2^{(r+1)m}}$, where $r$ is odd and $m\\geq3$. A class of unbalanced functions are constructed first via this approach, which coincides with a variant of the unbalanced class of generalized Tu-Deng functions in the case $r=1$. This class of functions have high algebraic degree, but their algebraic immunity does not exceeds $m$, which is impossible to be optimal when $r>1$. By modifying these unbalanced functions, we obtain a class of balanced functions which have optimal algebraic degree and high nonlinearity (shown by a lower bound we prove). These functions have optimal algebraic immunity provided a combinatorial conjecture on binary strings which generalizes the Tu-Deng conjecture is true. Computer investigations show that, at least for small values of number of variables, functions from this class also behave well against fast algebraic attacks.
The location-based services provide an interesting combination of cyber and physical worlds. However, they can also threaten the users  privacy. Existing privacy preserving protocols require trusted nodes, with serious security and computational bottlenecks. In this paper, we propose a novel distributed anonymizing protocol based on peer-to-peer architecture. Each mobile node is responsible for anonymizing a specific zone. The mobile nodes collaborate in anonymizing their queries, without the need not get access to any information about each other. In the proposed protocol, each request will be sent with a randomly chosen ticket. The encrypted response produced by the server is sent to a particular mobile node (called broker node) over the network, based on the hash value of this ticket. The user will query the broker to get the response. All parts of the messages are encrypted except the fields required for the anonymizer and the broker. This will secure the packet exchange over the P2P network. The proposed protocol was implemented and tested successfully, and the experimental results showed that it could be deployed efficiently to achieve user privacy in location-based services.
Adversaries are abusing Internet security and privacy services to execute cyber attacks. To cope with these threats, network operators utilize various security tools and techniques to monitor the cyber space. An efficient way to infer Internet threat activities is to collect information from trap-based monitoring sensors. As such, this chapter primarily defines the cyberspace trap-based monitoring systems and their taxonomies. Moreover, it presents the state-of-the-art in terms of research contributions and techniques, tools and technologies. Furthermore, it identifies gaps in terms of science and technology. Additionally, it presents some case studies and practical approaches corresponding to large-scale cyber monitoring systems such as Nicter. We further present some related security policies and legal issues for network monitoring. This chapter provides an overview on Internet monitoring and offers a guideline for readers to help them understand the concepts of observing, detecting and analyzing cyber attacks through computer network traps.
AsicBoost is a method to speed up Bitcoin mining by a factor of approximately 20%. The performance gain is achieved through a high-level optimization of the Bitcoin mining algorithm which allows for drastic reduction in gate count on the mining chip. AsicBoost is applicable to all types of mining hardware and chip designs. This paper presents the idea behind the method and describes the information flow in implementations of AsicBoost.
We propose a new approach to practical two-party computation secure against an active adversary. All prior practical protocols were based on Yao s garbled circuits. We use an OT-based approach and get efficiency via OT extension in the random oracle model. To get a practical protocol we introduce a number of novel techniques for relating the outputs and inputs of OTs in a larger construction. We also report on an implementation of this approach, that shows that our protocol is more efficient than any previous one: For big enough circuits, we can evaluate more than 20000 Boolean gates per second. As an example, evaluating one oblivious AES encryption (~34000 gates) takes 64 seconds, but when repeating the task 27 times it only takes less than 3 seconds per instance.
To study how to design steganographic algorithm more efficiently, a new coding problem -- steganographic codes (abbreviated stego-codes) -- is presented in this paper. The stego-codes are defined over the field with $q(q\\ge2)$ elements. Firstly a method of constructing linear stego-codes is proposed by using the direct sum of vector subspaces. And then the problem of linear stego-codes is converted to an algebraic problem by introducing the concept of $t$th dimension of vector space. And some bounds on the length of stego-codes are obtained, from which the maximum length embeddable (MLE) code is brought up. It is shown that there is a corresponding relation between MLE codes and perfect error-correcting codes. Furthermore the classification of all MLE codes and a lower bound on the number of binary MLE codes are obtained based on the corresponding results on perfect codes. Finally hiding redundancy is defined to value the performance of stego-codes.
(U.S) Rule-based policies to mitigate software risk suggest to use the CVSS score to measure the individual vulnerability risk and act accordingly: an HIGH CVSS score according to the NVD (National (U.S.) Vulnerability Database) is therefore translated into a \"Yes\". A key issue is whether such rule is economically sensible, in particular if reported vulnerabilities have been actually exploited in the wild, and whether the risk score do actually match the risk of actual exploitation. We compare the NVD dataset with two additional datasets, the EDB for the white market of vulnerabilities (such as those present in Metasploit), and the EKITS for the exploits traded in the black market. We benchmark them against Symantec s threat explorer dataset (SYM) of actual exploit in the wild. We analyze the whole spectrum of CVSS submetrics and use these characteristics to perform a case-controlled analysis of CVSS scores (similar to those used to link lung cancer and smoking) to test its reliability as a risk factor for actual exploitation. We conclude that (a) fixing just because a high CVSS score in NVD only yields negligible risk reduction, (b) the additional existence of proof of concepts exploits (e.g. in EDB) may yield some additional but not large risk reduction, (c) fixing in response to presence in black markets yields the equivalent risk reduction of wearing safety belt in cars (you might also die but still..). On the negative side, our study shows that as industry we miss a metric with high specificity (ruling out vulns for which we shouldn t worry). In order to address the feedback from BlackHat 2013 s audience, the final revision (V3) provides additional data in Appendix A detailing how the control variables in the study affect the results.
Mobile Internet is becoming the norm. With more personalized mobile devices in hand, many services choose to offer alternative, usually more convenient, approaches to authenticating and delivering the content between mobile users and service providers. One main option is to use SMS (i.e., short messaging service). Such carrier-grade text service has been widely used to assist versatile mobile services, including social networking, banking, to name a few. Though the text service can be spoofed via certain Internet text service providers which cooperated with carriers, such attacks haven well studied and defended by industry due to the efforts of research community. However, as cellular network technology advances to the latest IP-based 4G LTE, we find that these mobile services are somehow exposed to new threats raised by this change, particularly on 4G LTE Text service (via brand-new distributed Mobile-Initiated Spoofed SMS attack which is not available in legacy 2G/3G systems). The reason is that messaging service over LTE shifts from the circuit-switched (CS) design to the packet-switched (PS) paradigm as 4G LTE supports PS only. Due to this change, 4G LTE Text Service becomes open to access. However, its shields to messaging integrity and user authentication are not in place. As a consequence, such weaknesses can be exploited to launch attacks (e.g., hijack Facebook accounts) against a targeted individual, a large scale of mobile users and even service providers, from mobile devices. Current defenses for Internet-Initiated Spoofed SMS attacks cannot defend the unprecedented attack. Our study shows that 53 of 64 mobile services over 27 industries are vulnerable to at least one threat. We validate these proof-of-concept attacks in one major US carrier which supports more than 100 million users. We finally propose quick fixes and discuss security insights and lessons we have learnt.
We propose a novel hierarchical online intrusion detection system (HOIDS) for supervisory control and data acquisition (SCADA) networks based on machine learning algorithms. By utilizing the server-client topology while keeping clients distributed for global protection, high detection rate is achieved with minimum network impact. We implement accurate models of normal-abnormal binary detection and multi-attack identification based on logistic regression and quasi-Newton optimization algorithm using the Broyden-Fletcher-Goldfarb-Shanno approach. The detection system is capable of accelerating detection by information gain based feature selection or principle component analysis based dimension reduction. By evaluating our system using the KDD99 dataset and the industrial control system dataset, we demonstrate that HOIDS is highly scalable, efficient and cost effective for securing SCADA infrastructures.
In security protocol analysis, the traditional choice to consider a single Dolev-Yao attacker is supported by the fact that models with multiple collaborating Dolev-Yao attackers have been shown to be reducible to models with one Dolev-Yao attacker. In this paper, we take a fundamentally different approach and investigate the case of multiple non-collaborating attackers. After formalizing the framework for multi-attacker scenarios, we show with a case study that concurrent competitive attacks can interfere with each other. We then present a new strategy to defend security protocols, based on active exploitation of attack interference. The paper can be seen as providing two proof-of-concept results: (i) it is possible to exploit interference to mitigate protocol vulnerabilities, thus providing a form of protection to protocols; (ii) the search for defense strategies requires scenarios with at least two attackers.
In wiretap model of secure communication the goal is to provide (asymptotic) perfect secrecy and reliable communication over a noisy channel that is eavesdropped by an adversary with unlimited computational power. This goal is achieved by taking advantage of the channel noise and without requiring a shared key. The model has attracted attention in recent years because it captures eavesdropping attack in wireless communication. The wiretap adversary is a passive eavesdropping adversary at the physical layer of communication. In this paper we propose a model for adversarial wiretap (AWTP) channel that models active adversaries at this layer. We consider a $(\\rho_r, \\rho_w)$ wiretap adversary who can see a fraction $\\rho_r$, and modify a fraction $\\rho_w$, of the sent codeword. The code components that are read and/or modified can be chosen adaptively, and the subsets of read and modified components in general, can be different. AWTP codes provide secrecy and reliability for communication over these channels. We give security and reliability definitions and measures for these codes, and define secrecy capacity of an AWTP channel that represents the secrecy potential of the channel. The paper has two main contributions. First, we prove a tight upper bound on the rate of AWTP codes with perfect secrecy for $(\\rho_r, \\rho_w)$-AWTP channels, and use the bound to derive the secrecy capacity of the channel. We prove a similar bound for $\\epsilon$-secure codes also, but in this case the bound is not tight. Second, we give an explicit construction for a capacity achieving AWTP code family, and prove its security and efficiency properties. We show that AWTP model is a natural generalization of Wyner s wiretap models and somewhat surprisingly, also provides a direct generalization for a seemingly unrelated cryptographic primitive, Secure Message Transmission (SMT).
Recently there has been much interest in performing search queries over encrypted data to enable functionality while protecting sensitive data. One particularly efficient mechanism for executing such queries is order-preserving encryption/encoding (OPE) which results in ciphertexts that preserve the relative order of the underlying plaintexts thus allowing range and comparison queries to be performed directly on ciphertexts. In this paper, we propose an alternative approach to range queries over encrypted data that is optimized to support insert-heavy workloads as are common in \"big data\" applications while still maintaining search functionality and achieving stronger security. Specifically, we propose a new primitive called partial order preserving encoding (POPE) that achieves ideal OPE security with frequency hiding and also leaves a sizable fraction of the data pairwise incomparable. Using only O(1) persistent and $O(n^\\epsilon)$ non-persistent client storage for $0<\\epsilon<1$, our POPE scheme provides extremely fast batch insertion consisting of a single round, and efficient search with O(1) amortized cost for up to $O(n^{1-\\epsilon})$ search queries. This improved security and performance makes our scheme better suited for today s insert-heavy databases.
We present a new idea to design perfectly secure information exchange protocol, based on so called Deep Randomness, which means randomness relying on hidden probability distribution. Such idea drives us to introduce a new axiom in probability theory, thanks to which we can design a protocol, beyond Shannon limit, enabling two legitimate partners, sharing originally no common private information, to exchange secret information with accuracy as close as desired from perfection, and knowledge as close as desired from zero by any unlimitedly powered opponent. V4: we provide a major update of the article. The logic foundation of Deep Random assumption is highly strengthened by avoiding the inconsistency attached to rare events. Such inconsistency could lead to security flaws in previous proposition. At the same time, several variants of the protocol are presented and the performances are significantly improved.
Chaotic behavior arises from very simple non-linear dynamical equation of logistic map which makes it was used often in designing chaotic image encryption schemes. However, some properties of chaotic maps can also facilitate cryptanalysis especially when they are implemented in digital domain. Utilizing stable distribution of the chaotic states generated by iterating the logistic map, this paper presents a typical example to show insecurity of an image encryption scheme using chaotic logistic map. This work will push encryption and chaos be combined in a more effective way.
As the cost of information processing and Internet accessibility falls, most organizations are becoming increasingly vulnerable to potential cyber threats which its rate has been dramatically increasing every year in recent times. In this paper, we study, discuss and classify the most significant malicious software: viruses, Trojans, worms, adware and pornware which have made step forward in the science of Virology.
Recently, a colour image encryption algorithm based on chaos was proposed by cascading two position permutation operations and one substitution operation, which are all determined by some pseudo-random number sequences generated by iterating the Logistic map. This paper evaluates the security level of the encryption algorithm and finds that the position permutation-only part and the substitution part can be separately broken with only $\\lceil (\\log_2(3MN))/8 \\rceil$ and 2 chosen plain-images, respectively, where $MN$ is the size of the plain-image. Concise theoretical analyses are provided to support the chosen-plaintext attack, which are verified by experimental results also.
Unsolicited bulk email (aka. spam) is a major problem on the Internet. To counter spam, several techniques, ranging from spam filters to mail protocol extensions like hashcash, have been proposed. In this paper we investigate the effectiveness of several spam filtering techniques and technologies. Our analysis was performed by simulating email traffic under different conditions. We show that genetic algorithm based spam filters perform best at server level and naive Bayesian filters are the most appropriate for filtering at user level.
The rise in popularity of the Android platform has resulted in an explosion of malware threats targeting it. As both Android malware and the operating system itself constantly evolve, it is very challenging to design robust malware mitigation techniques that can operate for long periods of time without the need for modifications or costly re-training. In this paper, we present MaMaDroid, an Android malware detection system that relies on app behavior. MaMaDroid builds a behavioral model, in the form of a Markov chain, from the sequence of abstracted API calls performed by an app, and uses it to extract features and perform classification. By abstracting calls to their packages or families, MaMaDroid maintains resilience to API changes and keeps the feature set size manageable. We evaluate its accuracy on a dataset of 8.5K benign and 35.5K malicious apps collected over a period of six years, showing that it not only effectively detects malware (with up to 99% F-measure), but also that the model built by the system keeps its detection capabilities for long periods of time (on average, 86% and 75% F-measure, respectively, one and two years after training). Finally, we compare against DroidAPIMiner, a state-of-the-art system that relies on the frequency of API calls performed by apps, showing that MaMaDroid significantly outperforms it.
Due to the convergence of various mobile access technologies like UMTS, WLAN, and WiMax the need for a new supporting infrastructure arises. This infrastructure should be able to support more efficient ways to authenticate users and devices, potentially enabling novel services based on the security provided by the infrastructure. In this paper we exhibit some usage scenarios from the mobile domain integrating trusted computing, which show that trusted computing offers new paradigms for implementing trust and by this enables new technical applications and business scenarios. The scenarios show how the traditional boundaries between technical and authentication domains become permeable while a high security level is maintained.
Recently, XACML is a popular access control policy language that is used widely in many applications. Policies in XACML are built based on many components over distributed resources. Due to the expressiveness of XACML, it is not trivial for policy administrators to understand the overall effect and consequences of XACML policies they have written. In this paper we show a mechanism and a tool how to analyses big access control policies sets such as (i) incompleteness policies, (ii) conflicting policies, and (iii) unreachable policies. To detect these problems we present a method using Answer Set Programming (ASP) in the context of XACML 3.0.
We analyse the complexity of the computation of the class group structure, regulator, and a system of fundamental units of a certain class of number fields. Our approach differs from Buchmann s, who proved a complexity bound of L(1/2,O(1)) when the discriminant tends to infinity with fixed degree. We achieve a subexponential complexity in O(L(1/3,O(1))) when both the discriminant and the degree of the extension tend to infinity by using techniques due to Enge and Gaudry in the context of algebraic curves over finite fields.
In recent years, several protocols for password-based authenticated key exchange have been proposed. These protocols aim to be secure even though the sample space of passwords may be small enough to be enumerated by an off-line adversary. In Eurocrypt 2000, Bellare, Pointcheval and Rogaway (BPR) presented a model and security definition for authenticated key exchange. They claimed that in the ideal-cipher model (random oracles), the two-flow protocol at the core of Encrypted Key Exchange (EKE) is secure. Bellare and Rogaway suggested several instantiations of the ideal cipher in their proposal to the IEEE P1363.2 working group. Since then there has been an increased interest in proving the security of password-based protocols in the ideal-cipher model. For example, Bresson, Chevassut, and Pointcheval have recently showed that the One-Encryption-Key-Exchange (OEKE) protocol is secure in the ideal cipher model. In this paper, we present examples of real (NOT ideal) ciphers (including naive implementations of the instantiations proposed to IEEE P1363.2) that would result in broken instantiations of the idealised AuthA protocol and OEKE protocol. Our result shows that the AuthA protocol can be instantiated in an insecure way, and that there are no well defined (let alone rigorous) ways to distinguish between secure and insecure instantiations. Thus, without a rigorous metric for ideal-ciphers, the value of provable security in ideal cipher model is limited.
The secure instantiation of the random oracle is one of the major open problems in modern cryptography. We investigate this problem using concepts and methods of algorithmic randomness. In modern cryptography, the random oracle model is widely used as an imaginary framework in which the security of a cryptographic scheme is discussed. In the random oracle model, the cryptographic hash function used in a cryptographic scheme is formulated as a random variable uniformly distributed over all possibility of the function, called the random oracle. The main result of this paper is to show that, for any secure signature scheme in the random oracle model, there exists a specific computable function which can instantiate the random oracle while keeping the security originally proved in the random oracle model. In modern cryptography the generic group model is used also for a similar purpose to the random oracle model. We show that the same results hold for the generic group model. In the process of proving the results, we introduce the notion of effective security, demonstrating the importance of this notion in modern cryptography.
The Diophantine Equation Hard Problem (DEHP) is a potential cryptographic problem on the Diophantine equation $U=\\sum \\limits_{i=1}^n {V_i x_{i}}$. A proper implementation of DEHP would render an attacker to search for private parameters amongst the exponentially many solutions. However, an improper implementation would provide an attacker exponentially many choices to solve the DEHP. The AA,$_{\\beta}$-cryptosystem is an asymmetric cryptographic scheme that utilizes this concept together with the factorization problem of two large primes and is implemented only by using the multiplication operation for both encryption and decryption. With this simple mathematical structure, it would have low computational requirements and would enable communication devices with low computing power to deploy secure communication procedures efficiently.
As ATM applications deploy for a banking system, the need to secure communications will become critical. However, multicast protocols do not fit the point-to-point model of most network security protocols which were designed with unicast communications in mind. In recent years, we have seen the emergence and the growing of ATMs (Automatic Teller Machines) in banking systems. Many banks are extending their activity and increasing transactions by using ATMs. ATM will allow them to reach more customers in a cost effective way and to make their transactions fast and efficient. However, communicating in the network must satisfy integrity, privacy, confidentiality, authentication and non-repudiation. Many frameworks have been implemented to provide security in communication and transactions. In this paper, we analyze ATM communication protocol and propose a novel framework for ATM systems that allows entities communicate in a secure way without using a lot of storage. We describe the architecture and operation of SFAMSS in detail. Our framework is implemented with Java and the software architecture, and its components are studied in detailed.
Tardos codes are currently the state-of-the-art in the design of practical collusion-resistant fingerprinting codes. Tardos codes rely on a secret vector drawn from a publicly known probability distribution in order to generate each Buyer s fingerprint. For security purposes, this secret vector must not be revealed to the Buyers. To prevent an untrustworthy Provider forging a copy of a Work with an innocent Buyer s fingerprint, previous asymmetric fingerprinting algorithms enforce the idea of the Buyers generating their own fingerprint. Applying this concept to Tardos codes is challenging since the fingerprint must be based on this vector secret. This paper provides the first solution for an asymmetric fingerprinting protocol dedicated to Tardos codes. The motivations come from a new attack, in which an untrustworthy Provider by modifying his secret vector frames an innocent Buyer.
In this paper, we propose a light-weight provably-secure authentication protocol called the NLHB protocol, which is a variant of the HB protocol. The HB protocol uses the complexity of decoding linear codes for security against passive attacks. In contrast, security for the NLHB protocol is proved by reducing passive attacks to the problem of decoding a class of non-linear codes that are provably hard. We demonstrate that the existing passive attacks on the HB protocol family, which have contributed to considerable reduction in its effective key-size, are ineffective against the NLHB protocol. From the evidence, we conclude that smaller-key sizes are sufficient for the NLHB protocol to achieve the same level of passive attack security as the HB Protocol. Further, for this choice of parameters, we provide an implementation instance for the NLHB protocol for which the Prover/Verifier complexity is lower than the HB protocol, enabling authentication on very low-cost devices like RFID tags. Finally, in the spirit of the HB$^{+}$ protocol, we extend the NLHB protocol to the NLHB$^{+}$ protocol and prove security against the class of active attacks defined in the DET Model.
We present the Waterfilling circuit selection method, which we designed in order to mitigate the risks of a successful end-to-end traffic correlation attack. Waterfilling proceeds by balancing the Tor network load as evenly as possible on endpoints of user paths. We simulate the use of Waterfilling thanks to the TorPS and Shadow tools. Applying several security metrics, we show that the adoption of Waterfilling considerably increases the number of nodes that an adversary needs to control in order to be able to mount a successful attack, while somewhat decreasing the minimum amount of bandwidth required to do so. Moreover, we evaluate Waterfilling into Shadow and show that it does not impact significantly the performance of the network. Furthermore, Waterfilling reduces the benefits that an attacker could obtain by hacking into a top bandwidth Tor relay, hence limiting the risks raised by such relays.
At Eurocrypt 99, Paillier presented a public-key cryptosystem based on a novel computational problem. It has interested many researchers because it was additively homomorphic. In this paper, we show that there is a big difference between the original Paillier s encryption and some variants. The Paillier s encryption can be naturally transformed into a signature scheme but these variants miss the feature. In particular, we simplify the alternative decryption procedure of Bresson-Catalano-Pointcheval encryption scheme proposed at Asiacrypt 03. The new version is more applicable to cloud computing because of its double trapdoor decryption mechanism and its flexibility to be integrated into other cryptographic schemes. It captures a new feature that its two groups of secret keys can be distributed to different users so as to enhance the robustness of key management.
A novel approach to analyze statistically the network traffic raw data is proposed. The huge amount of raw data of actual network traffic from the Intrusion Detection System is analyzed to determine if a traffic is a normal or harmful one. Using the active ports in each host in a network as sensors, the system continuously monitors the incoming packets, and generates its average behaviors at different time scales including its variances. The average region of behaviors at certain time scale is then being used as the baseline of normal traffic. Deploying the exhaustive search based decission system, the system detects the incoming threats to the whole network under supervision.
Goldreich-Goldwasser-Halevi (GGH) public key cryptosystem is an instance of lattice-based cryptosystems whose security is based on the hardness of lattice problems. In fact, GGH cryptosystem is the lattice version of the first code-based cryptosystem, proposed by McEliece. However, it has a number of drawbacks such as; large public key length and low security level. On the other hand, Low Density Lattice Codes (LDLCs) are the practical classes of lattice codes which can achieve capacity on the additive white Gaussian noise (AWGN) channel with low complexity decoding algorithm. This paper introduces a public key cryptosystem based on LDLCs to withdraw the drawbacks of GGH cryptosystem. To reduce the key length, we employ the generator matrix of the used LDLC in Hermite normal form (HNF) as the public key. Also, by exploiting the linear decoding complexity of the used LDLC, the decryption complexity is decreased compared with GGH cryptosystem. These increased efficiencies allow us to use the bigger values of security parameters. Moreover, we exploit the special Gaussian vector whose variance is upper bounded by the Poltyrev limit as the perturbation vector. These techniques can resist the proposed scheme against the most efficient attacks to the GGH-like cryptosystems.
This paper proposes to exploit the so-called {\\it reciprocity parameters} (modelling non-reciprocal communication hardware) to use them as decision metric for binary hypothesis testing based authentication framework at a receiver node Bob. Specifically, Bob first learns the reciprocity parameters of the legitimate sender Alice via initial training. Then, during the test phase, Bob first obtains a measurement of reciprocity parameters of channel occupier (Alice, or, the intruder Eve). Then, with ground truth and current measurement both in hand, Bob carries out the hypothesis testing to automatically accept (reject) the packets sent by Alice (Eve). For the proposed scheme, we provide its success rate (the detection probability of Eve), and its performance comparison with other schemes.
Vehicular Communication (VC) systems will greatly enhance intelligent transportation systems. But their security and the protection of their users  privacy are a prerequisite for deployment. Efforts in industry and academia brought forth a multitude of diverse proposals. These have now converged to a common view, notably on the design of a security infrastructure, a Vehicular Public Key Infrastructure (VPKI) that shall enable secure conditionally anonymous VC. Standardization efforts and industry readiness to adopt this approach hint to its maturity. However, there are several open questions remaining, and it is paramount to have conclusive answers before deployment. In this article, we distill and critically survey the state of the art for identity and credential management in VC systems, and we sketch a roadmap for addressing a set of critical remaining security and privacy challenges.
Spin Transfer Torque RAM (STTRAM) is a promising candidate for Last Level Cache (LLC) due to high endurance, high density and low leakage. One of the major disadvantages of STTRAM is high write latency and write current. Additionally, the latency and current depends on the polarity of the data being written. These features introduce major security vulnerabilities and expose the cache memory to side channel attacks. In this paper we propose a novel side channel attack model where the adversary can monitor the supply current of the memory array to partially identify the sensitive cache data that is being read or written. We propose several low cost solutions such as short retention STTRAM, 1-bit parity, multi-bit random write and constant current write driver to mitigate the attack. 1-bit parity reduces the number of distinct write current states by 30% for 32-bit word and the current signature is further obfuscated by multi-bit random writes. The constant current write makes it more challenging for the attacker to extract the entire word using a single supply current signature.
In todays world of technology and gadgets almost every person is having a portable device, be it a laptop or the smart phones. The user would like to have all the services at his fingertips and access them through the portable device he owns. Maybe he wants some data from the fellow user or from the service provider or maybe he wants to control his smart devices at home from wherever he is. In the present era of mobile environments, interactions between the user device and the service provider must be secure enough regardless of the type of device used to access or utilize the services. In this paper we propose a \"Secure Three Way Authentication (STWA)\" technique intended to preserve the user privacy and to accomplish ownership authentication in order to securely deliver the services to the user devices. This technique will also help the users or the service providers to check if the device is compromised or not with the help of the encrypted pass-phrases that are being exchanged.
Personal Identification Numbers (PINs) are commonly used as an authentication mechanism. An important security requirement is that PINs should be hard to guess for an attacker. On the other hand, remembering several random PINs can be difficult task for an individual. We evaluate several dictionary-based methods of choosing a PIN. We experimentally show that these methods are far from ideal with respect to expected covering of the PIN space and the entropy of PINs. We also discuss two methods for constructing easy to memorize PIN words for randomly chosen PINs.
A recent IEEE Access Paper by Gunn, Allison and Abbott (GAA) proposed a new transient attack against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system. The attack is valid, but it is easy to build a defense for the KLJN system. Here we note that GAA s paper contains several invalid statements regarding security measures and the continuity of functions in classical physics. These deficiencies are clarified in our present paper, wherein we also emphasize that a new version of the KLJN system is immune against all existing attacks, including the one by GAA.
Over the recent months it has become clear that the current generation of cryptographic hashing algorithms are insufficient to meet future needs. The ASH family of algorithms provides modifications to the existing SHA-2 family. These modifications are designed with two main goals: 1) Providing increased collision resistance. 2) Increasing mitigation of security risks post-collision. The unique public/private sections and salt/pepper design elements provide increased flexibility for a broad range of applications. The ASH family is a new generation of cryptographic hashing algorithms.
Users often wish to participate in online groups anonymously, but misbehaving users may abuse this anonymity to spam or disrupt the group. Messaging protocols such as Mix-nets and DC-nets leave online groups vulnerable to denial-of-service and Sybil attacks, while accountable voting protocols are unusable or inefficient for general anonymous messaging. We present the first general messaging protocol that offers provable anonymity with accountability for moderate-size groups, and efficiently handles unbalanced loads where few members have much data to transmit in a given round. The N group members first cooperatively shuffle an NxN matrix of pseudorandom seeds, then use these seeds in N \"pre-planned\" DC-nets protocol runs. Each DC-nets run transmits the variable-length bulk data comprising one member s message, using the minimum number of bits required for anonymity under our attack model. The protocol preserves message integrity and one-to-one correspondence between members and messages, makes denial-of-service attacks by members traceable to the culprit, and efficiently handles large and unbalanced message loads. A working prototype demonstrates the protocol s practicality for anonymous messaging in groups of 40+ member nodes.
There are many scenarios in which inferring the type of a client browser is desirable, for instance to fight against session stealing. This is known as browser fingerprinting. This paper presents and evaluates a novel fingerprinting technique to determine the exact nature (browser type and version, eg Firefox 15) of a web-browser, exploiting HTML parser quirks exercised through XSS. Our experiments show that the exact version of a web browser can be determined with 71% of accuracy, and that only 6 tests are sufficient to quickly determine the exact family a web browser belongs to.
In today s business environment, it is difficult to imagine a workplace without access to the web, yet a variety of email born viruses, spyware, adware, Trojan horses, phishing attacks, directory harvest attacks, DoS attacks, and other threats combine to attack businesses and customers. This paper is an attempt to review phishing - a constantly growing and evolving threat to Internet based commercial transactions. Various phishing approaches that include vishing, spear phishng, pharming, keyloggers, malware, web Trojans, and others will be discussed. This paper also highlights the latest phishing analysis made by Anti-Phishing Working Group (APWG) and Korean Internet Security Center.
The increased growth in the use of transmission of multimedia medical contents over unsecured and open networks provides insecurity for confidential patient information over these networks. Digital encryption of medical images before transmission and storage is proposed as a way to effectively provide protection of patient information. Encryption before watermarking of these images is necessary in order to ensure inaccessibility of information to unauthorized personnel with patient. This paper presented a visual cryptographic technique for encrypting of medical images before transmission or storage of them. This will make such images inaccessible by unauthorized personnel and also ensures confidentiality. The process made use of an encryption technique that is based on pixel shuffling and a secret key generated from the image.
Steganography is an emerging area which is used for secured data transmission over any public media.Steganography is a process that involves hiding a message in an appropriate carrier like image or audio. It is of Greek origin and means \"covered or hidden writing\". The carrier can be sent to a receiver without any one except the authenticated receiver knowing the existence of this information. In this paper, a specific image based steganography technique for communicating information more securely between two locations is proposed. The author incorporated the idea of secret key and password security features for authentication at both ends in order to achieve high level of security. As a further improvement of security level, the information has been permuted, encoded and then finally embedded on an image to form the stego image. In addition segmented objects extraction and reassembly of the stego image through normalized cut method has been carried out at the sender side and receiver side respectively in order to prevent distortion of the Stego image during transmission.
National Root CAs enable legally binding E-Business and E-Government transactions. This is a report about the development, the evaluation and the certification of the new certification services system for the German National Root CA. We illustrate why a new certification services system was necessary, and which requirements to the new system existed. Then we derive the tasks to be done from the mentioned requirements. After that we introduce the initial situation at the beginning of the project. We report about the very process and talk about some unfamiliar situations, special approaches and remarkable experiences. Finally we present the ready IT system and its impact to E-Business and E-Government.
Simplified verifiable re-encryption mix-net (SVRM) is revised and a scheme for e-voting systems is developed based on it. The developed scheme enables e-voting systems to satisfy all essential requirements of elections. Namely, they satisfy requirements about privacy, verifiability, fairness and robustness. It also successfully protects voters from coercers except cases where the coercers force voters to abstain from elections. In detail, voters can conceal correspondences between them and their votes, anyone can verify the accuracy of election results, and interim election results are concealed from any entity. About incoercibility, provided that erasable-state voting booths which disable voters to memorize complete information exchanged between them and election authorities for constructing votes are available, coercer C cannot know candidates that voters coerced by C had chosen even if the candidates are unique to the voters. In addition, elections can be completed without reelections even when votes were handled illegitimately.
Using cryptography to protect information and communication has bacically two major drawbacks. First, the specific entropy profile of encrypted data makes their detection very easy. Second, the use of cryptography can be more or less regulated, not to say forbidden, according to the countries. If the right to freely protect our personal and private data is a fundamental right, it must not hinder the action of Nation States with respect to National security. Allowing encryption to citizens holds for bad guys as well. In this paper we propose a new approach in information and communication security that may solve all these issues, thus representing a rather interesting trade-off between apparently opposite security needs. We introduce the concept of scalable security based on computationnally hard problem of coding theory with the PERSEUS technology. The core idea is to encode date with variable punctured convolutional codes in such a way that any cryptanalytic attempt will require a time-consuming encoder reconstruction in order to decode. By adding noise in a suitable way, that reconstruction becomes untractable in practice except for Intelligence services that however must use supercomputers during a significant, scalable amount of time. Hence it limits naturally any will to unduly performs such attacks (eg. against citizens  privacy). On the users  side, encoder and noise parameters are first exchanged through an initial, short HTTPS session. The principles behind that approach have been mathematically validated in 1997 and 2007. We present the PERSEUS library we have developed under the triple GPL/LGPL/MPL licences. This library can be used to protect any kind of data.
Conventional approaches for ensuring the security of application software at run-time, through monitoring, either produce (high rates of) false alarms (e.g. intrusion detection systems) or limit application performance (e.g. run-time verification). We present a runtime security monitor that detects both known and unknown cyber attacks by checking that the run-time behavior of the application is consistent with the expected behavior modeled in application specification. This is crucial because, even if the implementation is consistent with its specification, the application may still be vulnerable due to flaws in the supporting infrastructure (e.g. the language runtime system, libraries and operating system). This runtime security monitor is sound and complete, eliminating false alarms, as well as efficient, so that it does not limit runtime application performance and so that it supports real-time systems. The security monitor takes as input the application specification and the application implementation, which may be expressed in different languages. The specification language of the application software is formalized based on monadic second order logic and event calculus interpreted over algebraic data structures. This language allows us to express behavior of an application at any desired (and practical) level of abstraction as well as with high degree of modularity. The security monitor detects every attack by systematically comparing the application execution and specification behaviors at runtime, even though they operate at two different levels of abstraction. We define the denotational semantics of the specification language and prove that the monitor is sound and complete. Furthermore, the monitor is efficient because of the modular application specification at appropriate level(s) of abstraction.
The Discrete Logarithm Problem is well-known among cryptographers, for its computational hardness that grants security to some of the most commonly used cryptosystems these days. Still, many of these are limited to a small number of candidate algebraic structures which permit implementing the algorithms. In order to extend the applicability of discrete-logarithm-based cryptosystems to a much richer class of algebraic structures, we present a generalized form of exponential function. Our extension relaxes some assumptions on the exponent, which is no longer required to be an integer. Using an axiomatic characterization of the exponential function, we show how to construct mappings that obey the same rules as exponentials, but can raise vectors to the power of other vectors in an algebraically sound manner. At the same time, computational hardness is not affected (in fact, the problem could possibly be strengthened). Setting up standard cryptosystems in terms of our generalized exponential function is simple and requires no change to the existing security proofs. This opens the field for building much more general schemes than the ones known so far.
A silicon physically unclonable function (PUF) is considered to be one of the key security system solutions for local devices in an era in which the internet is pervasive. Among many proposals, a PUF using ring oscillators (RO-PUF) has the advantage of easy application to FPGA. In the conventional RO-PUF, frequency difference between two ROs is used as one bit of ID. Thus, in order to obtain an ID of long bit length, the corresponding number of RO pairs are required and consequently power consumption is large, leading to difficulty in implementing RO-PUF in local devices. Here, we provide a RO-PUF using the initial waveform of the ROs. Because a waveform constitutes a part of the ID, the number of ROs is greatly reduced and the time needed to generate the ID is finished in a couple of system clocks. We also propose a solution to a change of PUF performance attributable to temperature or voltage change.
NVD is one of the most popular databases used by researchers to conduct empirical research on data sets of vulnerabilities. Our recent analysis on Chrome vulnerability data reported by NVD has revealed an abnormally phenomenon in the data where almost vulnerabilities were originated from the first versions. This inspires our experiment to validate the reliability of the NVD vulnerable version data. In this experiment, we verify for each version of Chrome that NVD claims vulnerable is actually vulnerable. The experiment revealed several errors in the vulnerability data of Chrome. Furthermore, we have also analyzed how these errors might impact the conclusions of an empirical study on foundational vulnerability. Our results show that different conclusions could be obtained due to the data errors.
We propose a new, efficient non-deterministic decoding algorithm for square-free Goppa codes over $\\F_p$ for any prime $p$. If the code in question has degree $t$ and the average distance to the closest codeword is at least $(4/p)t + 1$, the proposed decoder can uniquely correct up to $(2/p)t$ errors with high probability. The correction capability is higher if the distribution of error magnitudes is not uniform, approaching or reaching $t$ errors when any particular error value occurs much more often than others or exclusively. This makes the method interesting for (semantically secure) cryptosystems based on the decoding problem for permuted and punctured Goppa codes.
In wireless sensor networks (WSNs), security has a vital importance. Recently, there was a huge interest to propose security solutions in WSNs because of their applications in both civilian and military domains. Adversaries can launch different types of attacks, and cryptography is used to countering these attacks. This paper presents challenges of security and a classification of the different possible attacks in WSNs. The problems of security in each layer of the network s OSI model are discussed.
With the advent of mobile computing, location-based services have recently gained popularity. Many applications use the location provenance of users, i.e., the chronological history of the users  location for purposes ranging from access control, authentication, information sharing, and evaluation of policies. However, location provenance is subject to tampering and collusion attacks by malicious users. In this paper, we examine the secure location provenance problem. We introduce a witness-endorsed scheme for generating collusion-resistant location proofs. We also describe two efficient and privacy-preserving schemes for protecting the integrity of the chronological order of location proofs. These schemes, based on hash chains and Bloom filters respectively, allow users to prove the order of any arbitrary subsequence of their location history to auditors. Finally, we present experimental results from our proof-of-concept implementation on the Android platform and show that our schemes are practical in today s mobile devices.
In this paper, we present a comprehensive survey of privacy-preserving schemes for Smart Grid communications. Specifically, we select and in-detail examine thirty privacy preserving schemes developed for or applied in the context of Smart Grids. Based on the communication and system models, we classify these schemes that are published between 2013 and 2016, in five categories, including, 1) Smart grid with the advanced metering infrastructure, 2) Data aggregation communications, 3) Smart grid marketing architecture, 4) Smart community of home gateways, and 5) Vehicle-to grid architecture. For each scheme, we survey the attacks of leaking privacy, countermeasures, and game theoretic approaches. In addition, we review the survey articles published in the recent years that deal with Smart Grids communications, applications, standardization, and security. Based on the current survey, several recommendations for further research are discussed at the end of this paper.
In this paper we propose a multi-map orbit hopping chaotic stream cipher that utilizes the idea of spread spectrum mechanism for secure digital communications and fundamental chaos characteristics of mixing, unpredictable, and extremely sensitive to initial conditions. The design, key and subkeys, and detail implementation of the system are addressed. A variable number of well studied chaotic maps form a map bank. And the key determines how the system hops between multiple orbits, and it also determines the number of maps, the number of orbits for each map, and the number of sample points for each orbits. A detailed example is provided.
In this paper, we propose a session based bit level symmetric key cryptographic technique and it is termed as Spiral Matrix Based Bit Orientation Technique (SMBBOT). SMBBOT consider the input plain text as binary bit stream. During encryption this stream is chopped into manageable sized blocks with variable lengths. Bits of these blocks are taken from MSB to LSB to fit into a square matrix of suitable order following the concept of Spiral matrix. This square matrix splits into 2x2 sub-matrices. Bits are taken column-wise from all 2x2 sub-matrices to form the encrypted binary string. Cipher text is generated from this encrypted binary string. Combination of values of block length and no. of blocks of a session generates the session key for SMBBOT. For decryption the cipher text is considered as binary bit string. Processing the session key information, this binary string is broken down into predefined blocks. Bits of these blocks are taken from MSB to LSB to fit column-wise into 2x2 square matrices. Using these sub-matrices a single square matrix with suitable order is formed. The decrypted binary string is formed after taking the bits from the square matrix following the reverse concept of Spiral Matrix. The plain text is regenerated from decrypted binary string. A comparison of SMBBOT with existing and industrially accepted TDES and AES has been done.
As physical and information security boundaries have become increasingly blurry many organizations are experiencing challenges with how to effectively and efficiently manage security within the corporate. There is no current standard or best practice offered by the security community regarding convergence; however many organizations such as the Alliance for Enterprise Security Risk Management (AESRM) offer some excellent suggestions for integrating a converged security program. This paper reports on how organizations have traditionally managed asset protection, why that is changing and how to establish convergence to optimize security value to the business within an enterprise.
A few years ago, wireless sensor networks (WSNs) used by only military. Now, we have seen many of organizations use WSNs for some purposes such as weather, pollution, traffic control, and healthcare. Security is becoming on these days a major concern for wireless sensor network. In this paper I focus on the security types of attacks and their detection. This paper anatomizes the security requirements and security attacks in wireless sensor networks. Also, indicate to the benchmarks for the security in WSNs.
Virtualization started to gain traction in the domain of information technology in the early 2000s when managing resource distribution was becoming an uphill task for developers. As a result, tools like VMWare, Hyper V (hypervisor) started making inroads into the software repository on different operating systems. VMWare and Hyper V could support multiple virtual machines running on them with each having their own isolated environment. Due to this isolation, the security aspects of virtual machines (VMs) did not differ much from that of physical machines (having a dedicated operating system on hardware). The advancement made in the domain of linux containers (LXC) has taken virtualization to an altogether different level where resource utilization by various applications has been further optimized. But the container security has assumed primary importance amongst the researchers today and this paper is inclined towards providing a brief overview about comparisons between security of container and VMs.
Cryptographic mechanisms are used in a wide range of applications, including email clients, web browsers, document and asset management systems, where typical users are not cryptography experts. A number of empirical studies have demonstrated that explicit, user-visible cryptographic mechanisms are not widely used by non-expert users, and as a result arguments have been made that cryptographic mechanisms need to be better hidden or embedded in end-user processes and tools. Other mechanisms, such as HTTPS, have cryptography built-in and only become visible to the user when a dialogue appears due to a (potential) problem. This paper surveys deployed and potential technologies in use, examines the social and legal context of broad classes of users, and from there, assesses the value and issues for those users.
Human memory is not perfect - people constantly memorize new facts and forget old ones. One example is forgetting a password, a common problem raised at IT help desks. We present several protocols that allow a user to automatically recover a password from a server using partial knowledge of the password. These protocols can be easily adapted to the personal entropy setting, where a user can recover a password only if he can answer a large enough subset of personal questions. We introduce client-server password recovery methods, in which the recovery data are stored at the server, and the recovery procedures are integrated into the login procedures. These methods apply to two of the most common types of password based authentication systems. The security of these solutions is significantly better than the security of presently proposed password recovery schemes. Our protocols are based on a variation of threshold encryption that may be of independent interest.
Motivated by the effectiveness of correlation attacks against Tor, the censorship arms race, and observations of malicious relays in Tor, we propose that Tor users capture their trust in network elements using probability distributions over the sets of elements observed by network adversaries. We present a modular system that allows users to efficiently and conveniently create such distributions and use them to improve their security. The major components of this system are (i) an ontology of network-element types that represents the main threats to and vulnerabilities of anonymous communication over Tor, (ii) a formal language that allows users to naturally express trust beliefs about network elements, and (iii) a conversion procedure that takes the ontology, public information about the network, and user beliefs written in the trust language and produce a Bayesian Belief Network that represents the probability distribution in a way that is concise and easily sampleable. We also present preliminary experimental results that show the distribution produced by our system can improve security when employed by users; further improvement is seen when the system is employed by both users and services.
This paper presents a spatial encryption technique for secured transmission of data in networks. The algorithm is designed to break the ciphered data packets into multiple data which are to be packaged into a spatial template. A secure and efficient mechanism is provided to convey the information that is necessary for obtaining the original data at the receiver-end from its parts in the packets. An authentication code (MAC) is also used to ensure authenticity of every packet.
The MIFARE Classic is the most widely used contactless smart card in the market. Its design and implementation details are kept secret by its manufacturer. This paper studies the architecture of the card and the communication protocol between card and reader. Then it gives a practical, low-cost, attack that recovers secret information from the memory of the card. Due to a weakness in the pseudo-random generator, we are able to recover the keystream generated by the CRYPTO1 stream cipher. We exploit the malleability of the stream cipher to read all memory blocks of the first sector of the card. Moreover, we are able to read any sector of the memory of the card, provided that we know one memory block within this sector. Finally, and perhaps more damaging, the same holds for modifying memory blocks.
Privacy by design will become a legal obligation in the European Community if the Data Protection Regulation eventually gets adopted. However, taking into account privacy requirements in the design of a system is a challenging task. We propose an approach based on the specification of privacy architectures and focus on a key aspect of privacy, data minimisation, and its tension with integrity requirements. We illustrate our formal framework through a smart metering case study.
In cryptography, the Cipher Block Chaining (CBC), one of the most commonly used mode in recent years, is a mode of operation that uses a block cipher to provide confidentiality or authenticity. In our previous research work, we have shown that this mode of operation exhibits, under some conditions, a chaotic behaviour. We have studied this behaviour by evaluating both its level of sensibility and expansivity. In this paper, we intend to deepen the topological study of the CBC mode of operation and evaluate its property of topological mixing. Additionally, other quantitative evaluations are performed, and the level of topological entropy has been evaluated too.
In 2004, Muzereau et al. showed how to use a reduction algorithm of the discrete logarithm problem to Diffie-Hellman problem in order to estimate lower bound on Diffie-Hellman problem on elliptic curves. They presented their estimates for various elliptic curves that are used in practical applications. In this paper, we show that a much tighter lower bound for Diffie-Hellman problem on those curves can be achieved, if one uses the multiplicative group of a finite field as an auxiliary group. Moreover, improved lower bound estimates on Diffie-Hellman problem for various recommended curves are also given which are the tightest; thus, leading us towards the equivalence of Diffie-Hellman problem and the discrete logarithm problem for these recommended elliptic curves.
Untraceable communication is about hiding the identity of the sender or the recipient of a message. Currently most systems used in practice (e.g., TOR) rely on the principle that a message is routed via several relays to obfuscate its path through the network. However, as this increases the end-to-end latency it is not ideal for applications like Voice-over-IP (VoIP) communication, where participants will notice annoying delays if the data does not arrive fast enough. We propose an approach based on the paradigm of Dining Cryptographer networks (DC-nets) that can be used to realize untraceable communication within small groups. The main features of our approach are low latency and resilience to packet-loss and fault packets sent by malicious players. We consider the special case of VoIP communication and propose techniques for a P2P implementation. We expose existing problems and sketch possible future large-scale systems composed of multiple groups.
In this paper we present an image retrieval system based on Gabor texture features, steganography, and mobile agents.. By employing the information hiding technique, the image attributes can be hidden in an image without degrading the image quality. Thus the image retrieval process becomes simple. Java based mobile agents manage the query phase of the system. Based on the simulation results, the proposed system not only shows the efficiency in hiding the attributes but also provides other advantages such as: (1) fast transmission of the retrieval image to the receiver, (2) searching made easy.
In the almost 20 years since GSM was deployed several security problems have been found, both in the protocols and in the - originally secret - cryptography. However, practical exploits of these weaknesses are complicated because of all the signal processing involved and have not been seen much outside of their use by law enforcement agencies. This could change due to recently developed open-source equipment and software that can capture and digitize signals from the GSM frequencies. This might make practical attacks against GSM much simpler to perform. Indeed, several claims have recently appeared in the media on successfully eavesdropping on GSM. When looking at these claims in depth the conclusion is often that more is claimed than what they are actually capable of. However, it is undeniable that these claims herald the possibilities to eavesdrop on GSM using publicly available equipment. This paper evaluates the claims and practical possibilities when it comes to eavesdropping on GSM, using relatively cheap hardware and open source initiatives which have generated many headlines over the past year. The basis of the paper is extensive experiments with the USRP (Universal Software Radio Peripheral) and software projects for this hardware.
Due to resource constraints of the sensor nodes, traditional public key cryptographic techniques are not feasible in most sensor network architectures. Several symmetric key distribution mechanisms are proposed for establishing pairwise keys between sensor nodes in sensor networks, but most of them are not scalable and also are not much suited for mobile sensor networks because they incur much communication as well as computational overheads. Moreover, these schemes are either vulnerable to a small number of compromised sensor nodes or involve expensive protocols for establishing keys. In this paper, we introduce a new scheme for establishing keys between sensor nodes with the help of additional high-end sensor nodes, called the auxiliary nodes. Our scheme provides unconditional security against sensor node captures and high network connectivity. In addition, our scheme requires minimal storage requirement for storing keys mainly due to only a single key before deployment in each node in the sensor network, supports efficiently addition of new nodes after initial deployment and also works for any deployment topology.
Hiding information in network traffic may lead to leakage of confidential information. In this paper we introduce a new steganographic system: the PadSteg (Padding Steganography). To authors  best knowledge it is the first information hiding solution which represents inter-protocol steganography i.e. usage of relation between two or more protocols from the TCP/IP stack to enable secret communication. PadSteg utilizes ARP and TCP protocols together with an Etherleak vulnerability (improper Ethernet frame padding) to facilitate secret communication for hidden groups in LANs (Local Area Networks). Basing on real network traces we confirm that PadSteg is feasible in today s networks and we estimate what steganographic bandwidth is achievable while limiting the chance of disclosure. We also point at possible countermeasures against PadSteg.
Information is the key asset of all organizations and can exist in many forms. It can be printed or written on paper, stored electronically, transmitted by mail or by electronic means, shown in films, or spoken in conversation. In today s competitive business environment, such information is constantly under threat from many sources, which can be internal, external, accidental, or malicious. Joomla is a very popular Content Management System (CMS) used for web page maintenance. This highly versatile software has found itself in both large corporate web portals, and simple web pages such as blogs. Such popularity increases its vulnerability to potential attacks and therefore needs an appropriate security management. ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) created the series of standards aimed at providing a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an Information Security Management System (ISMS). This paper shows how principles set in ISO/IEC 27000 series of standards can be used to improve security of Joomla based web portals.
The design and verification of cryptographic protocols is a notoriously difficult task, even in symbolic models which take an abstract view of cryptography. This is mainly due to the fact that protocols may interact with an arbitrary attacker which yields a verification problem that has several sources of unboundedness (size of messages, number of sessions, etc. In this paper, we characterize a class of protocols for which deciding security for an unbounded number of sessions is decidable. More precisely, we present a simple transformation which maps a protocol that is secure for a bounded number of protocol sessions (a decidable problem) to a protocol that is secure for an unbounded number of sessions. The precise number of sessions that need to be considered is a function of the security property and we show that for several classical security properties a single session is sufficient. Therefore, in many cases our results yields a design strategy for security protocols: (i) design a protocol intended to be secure for a {single session}; and (ii) apply our transformation to obtain a protocol which is secure for an unbounded number of sessions.
Baldi et \\textit{al.} proposed a variant of McEliece s cryptosystem. The main idea is to replace its permutation matrix by adding to it a rank 1 matrix. The motivation for this change is twofold: it would allow the use of codes that were shown to be insecure in the original McEliece s cryptosystem, and it would reduce the key size while keeping the same security against generic decoding attacks. The authors suggest to use generalized Reed-Solomon codes instead of Goppa codes. The public code built with this method is not anymore a generalized Reed-Solomon code. On the other hand, it contains a very large secret generalized Reed-Solomon code. In this paper we present an attack that is built upon a distinguisher which is able to identify elements of this secret code. The distinguisher is constructed by considering the code generated by component-wise products of codewords of the public code (the so-called \"square code\"). By using square-code dimension considerations, the initial generalized Reed-Solomon code can be recovered which permits to decode any ciphertext. A similar technique has already been successful for mounting an attack against a homomorphic encryption scheme suggested by Bogdanoc et \\textit{al.}. This work can be viewed as another illustration of how a distinguisher of Reed-Solomon codes can be used to devise an attack on cryptosystems based on them.
Recently, a RGB image encryption algorithm based on DNA encoding and chaos map has been proposed. It was reported that the encryption algorithm can be broken with four pairs of chosen plain-images and the corresponding cipher-images. This paper re-evaluates the security of the encryption algorithm, and finds that the encryption algorithm can be broken efficiently with only one known plain-image. The effectiveness of the proposed known-plaintext attack is supported by both rigorous theoretical analysis and experimental results. In addition, two other security defects are also reported.
We present Tracking Protection in the Mozilla Firefox web browser. Tracking Protection is a new privacy technology to mitigate invasive tracking of users  online activity by blocking requests to tracking domains. We evaluate our approach and demonstrate a 67.5% reduction in the number of HTTP cookies set during a crawl of the Alexa top 200 news sites. Since Firefox does not download and render content from tracking domains, Tracking Protection also enjoys performance benefits of a 44% median reduction in page load time and 39% reduction in data usage in the Alexa top 200 news sites.
Go to the cloud, has always been the dream of man. Cloud Computing offers a number of benefits and services to its customers who pay the use of hardware and software resources (servers hosted in data centers, applications, software...) on demand which they can access via internet without the need of expensive computers or a large storage system capacity and without paying any equipment maintenance fees. But these cloud providers must provide guarantees on the protection of privacy and sensitive data stored in their data centers shared between multiple clients using the concept of virtualization.
Hardware and software of secured embedded systems are prone to physical attacks. In particular, fault injection attacks revealed vulnerabilities on the data and the control flow allowing an attacker to break cryptographic or secured algorithms implementations. While many research studies concentrated on successful attacks on the data flow, only a few targets the instruction flow. In this paper, we focus on electromagnetic fault injection (EMFI) on the control flow, especially on the instruction cache. We target the very widespread (smartphones, tablets, settop-boxes, health-industry monitors and sensors, etc.) ARMv7-M architecture. We describe a practical EMFI platform and present a methodology providing high control level and high reproducibility over fault injections. Indeed, we observe that a precise fault model occurs in up to 96% of the cases. We then characterize and exhibit this practical fault model on the cache that is not yet considered in the literature. We comprehensively describe its effects and show how it can be used to reproduce well known fault attacks. Finally, we describe how it can benefits attackers to mount new powerful attacks or simplify existing ones.
Android has always been about connectivity and providing great browsing experience. Web-based content can be embedded into the Android application using WebView. It is a User Interface component that displays webpages. It can either display a remote webpage or can also load static HTML data. This encompasses the functionality of a browser that can be integrated to application. WebView provides a number of APIs which enables the applications to interact with the web content inside WebView. In the current paper Cross site request forgery or XSRF attack specific to android WebView is investigated. In XSRF attack the trusts of a web application in its authenticated users is exploited by letting the attacker make arbitrary HTTP requests on behalf of a victim user. When the user is logged into the trusted site through the WebView the site authenticates the WebView and not application. The application can launch attacks on the behalf of user with the APIs of Webview exploiting user credentials resulting in Cross site request forgery. Attacks can also be launched by setting cookies as HTTP headers and making malicious HTTP Request on behalf of victim.
Methods are presented to derive with the aid of the computer mathematics software system SageMath the Multivariate Quadratic equation systems (MQ) for the input and output bit variables of a cryptographic S-box starting from its algebraic expressions. Motivation to this work were the results of recent articles which we have verified and extended in an original way, to our knowledge, not yet published elsewhere. At the same time we present results contrary to the published ones which cast serious doubts on the suitability of previously presented formulas, supposed to quantify the resistance of S-boxes against algebraic attacks.
Address clustering tries to construct the one-to-many mapping from entities to addresses in the Bitcoin system. Simple heuristics based on the micro-structure of transactions have proved very effective in practice. In this paper we describe the primary reasons behind this effectiveness: address reuse, avoidable merging, super-clusters with high centrality, and the incremental growth of address clusters. We quantify their impact during Bitcoin s first seven years of existence.
Current low-latency anonymity systems use complex overlay networks to conceal a user s IP address, introducing significant latency and network efficiency penalties compared to normal Internet usage. Rather than obfuscating network identity through higher level protocols, we propose a more direct solution: a routing protocol that allows communication without exposing network identity, providing a strong foundation for Internet privacy, while allowing identity to be defined in those higher level protocols where it adds value. Given current research initiatives advocating \"clean slate\" Internet designs, an opportunity exists to design an internetwork layer routing protocol that decouples identity from network location and thereby simplifies the anonymity problem. Recently, Hsiao et al. proposed such a protocol (LAP), but it does not protect the user against a local eavesdropper or an untrusted ISP, which will not be acceptable for many users. Thus, we propose Dovetail, a next-generation Internet routing protocol that provides anonymity against an active attacker located at any single point within the network, including the user s ISP. A major design challenge is to provide this protection without including an application-layer proxy in data transmission. We address this challenge in path construction by using a matchmaker node (an end host) to overlap two path segments at a dovetail node (a router). The dovetail then trims away part of the path so that data transmission bypasses the matchmaker. Additional design features include the choice of many different paths through the network and the joining of path segments without requiring a trusted third party. We develop a systematic mechanism to measure the topological anonymity of our designs, and we demonstrate the privacy and efficiency of our proposal by simulation, using a model of the complete Internet at the AS-level.
It is well recognised that data mining and statistical analysis pose a serious treat to privacy. This is true for financial, medical, criminal and marketing research. Numerous techniques have been proposed to protect privacy, including restriction and data modification. Recently proposed privacy models such as differential privacy and k-anonymity received a lot of attention and for the latter there are now several improvements of the original scheme, each removing some security shortcomings of the previous one. However, the challenge lies in evaluating and comparing privacy provided by various techniques. In this paper we propose a novel entropy based security measure that can be applied to any generalisation, restriction or data modification technique. We use our measure to empirically evaluate and compare a few popular methods, namely query restriction, sampling and noise addition.
With the success of Web applications, most of our data is now stored on various third-party servers where they are processed to deliver personalized services. Naturally we must be authenticated to access this personal information, but the use of personalized services only restricted by identification could indirectly and silently leak sensitive data. We analyzed Google Web Search access mechanisms and found that the current policy applied to session cookies could be used to retrieve users  personal data. We describe an attack scheme leveraging the search personalization (based on the same SID cookie) to retrieve a part of the victim s click history and even some of her contacts. We implemented a proof of concept of this attack on Firefox and Chrome Web browsers and conducted an experiment with ten volunteers. Thanks to this prototype we were able to recover up to 80% of the user s search click history.
In 1998 [8], Patarin proposed an efficient cryptosystem called Little Dragon which was a variant a variant of Matsumoto Imai cryptosystem C*. However Patarin latter found that Little Dragon cryptosystem is not secure [8], [3]. In this paper we propose a cryptosystem Little Dragon Two which is as efficient as Little Dragon cryptosystem but secure against all the known attacks. Like Little Dragon cryptosystem the public key of Little Dragon Two is mixed type that is quadratic in plaintext and cipher text variables. So the public key size of Little Dragon Two is equal to Little Dragon Cryptosystem. Our public key algorithm is bijective and can be used for both encryption and signatures.
Homomorphic encryption has largely been studied in context of public key cryptosystems. But there are applications which inherently would require symmetric keys. We propose a symmetric key encryption scheme with fully homomorphic evaluation capabilities. The operations are matrix based, that is the scheme consists of mapping the operations on integers to operations on matrix. We also include a protocol which uses the proposed scheme for private data processing in clouds.
Authentication proxies, which store users  secret credentials and submit them to servers on their behalf, offer benefits with respect to security of the authentication and usability of credential management. However, as being a service that is not in control of users, one important problem they suffer is the trust problem; how users trust that their secrets are handled securely in the proxy and not revealed to third parties. In this paper, we present a solution called Trust-in-the-Middle, a TPM based proxy system which ensures that user credentials are securely stored and submitted without disclosing them even if the proxy is compromised. We build our architecture on a trust chain bootstrapped by TPM DRTM and prevent access to credentials if any entity in the chain is maliciously modified. We use remote attestation to guarantee that all critical operations on the proxy are performed securely and credentials are cryptographically protected when they are not in DRTM-supported isolation.
Cloud storage services like Dropbox and Google Drive are widely used by individuals and businesses. Two attractive features of these services are 1) the automatic synchronization of files between multiple client devices and 2) the possibility to share files with other users. However, privacy of cloud data is a growing concern for both individuals and businesses. Encrypting data on the client-side before uploading it is an effective privacy safeguard, but it requires all client devices to have the decryption key. Current solutions derive these keys solely from user-chosen passwords, which have low entropy and are easily guessed. We present OmniShare, the first scheme to allow client-side encryption with high-entropy keys whilst providing an intuitive key distribution mechanism to enable access from multiple client devices. Instead of passwords, we use low bandwidth uni-directional out-of-band (OOB) channels, such as QR codes, to authenticate new devices. To complement these OOB channels, the cloud storage itself is used as a communication channel between devices in our protocols. We rely on a directory-based key hierarchy with individual file keys to limit the consequences of key compromise and allow efficient sharing of files without requiring re-encryption. OmniShare is open source software and currently available for Android and Windows with other platforms in development. We describe the design and implementation of OmniShare, and explain how we evaluated its security using formal methods, its performance via real-world benchmarks, and its usability through a cognitive walkthrough.
While a number of data privacy techniques have been proposed in the recent years, a few frameworks have been suggested for the implementation of the data privacy process. Most of the proposed approaches are tailored towards implementing a specific data privacy algorithm but not the overall data privacy engineering and design process. Therefore, as a contribution, this study proposes SIED (Specification, Implementation, Evaluation, and Dissemination), a conceptual framework that takes a holistic approach to the data privacy engineering procedure by looking at the specifications, implementation, evaluation, and finally, dissemination of the privatized data sets.
As Internet is changing from network of data into network of functionalities, a federated Internet of applications, that every application can cooperate with each other smoothly, is a natural trending topic. However, existing integration techniques did not pay enough attention to multiple control domains for participants, i.e. application providers and end-users. In this study, we advocate a global cooperation model for all the participants counts. In particular, we propose a hybrid model to manage the cooperation among applications to achieve more optimized allocation of efforts, which means users perform lighter actions and application providers concerning less uncontrollable information. In addition, we implement the required system and show a case study which demonstrates the effectiveness of this model.
Fake websites have emerged as a major source of online fraud, accounting for billions of dollars of loss by Internet users. We explore the process by which salient design elements could increase the use of protective tools, thus reducing the success rate of fake websites. Using the protection motivation theory, we conceptualize a model to investigate how salient design elements of detection tools could influence user perceptions of the tools, efficacy in dealing with threats, and use of such tools. The research method was a controlled lab experiment with a novel and extensive experimental design and protocol. We found that trust in the detector is the pivotal coping mechanism in dealing with security threats and is a major conduit for transforming salient design elements into increased use. We also found that design elements have profound and unexpected impacts on self-efficacy. The significant theoretical and empirical implications of findings are discussed.
With the explosion of social media sites and proliferation of digital computing devices and Internet access, massive amounts of public data is being generated on a daily basis. Efficient techniques/ algorithms to analyze this massive amount of data can provide near real-time information about emerging trends and provide early warning in case of an imminent emergency (such as the outbreak of a viral disease). In addition, careful mining of these data can reveal many useful indicators of socioeconomic and political events, which can help in establishing effective public policies. The focus of this study is to review the application of big data analytics for the purpose of human development. The emerging ability to use big data techniques for development (BD4D) promises to revolutionalize healthcare, education, and agriculture; facilitate the alleviation of poverty; and help to deal with humanitarian crises and violent conflicts. Besides all the benefits, the large-scale deployment of BD4D is beset with several challenges due to the massive size, fast-changing and diverse nature of big data. The most pressing concerns relate to efficient data acquisition and sharing, establishing of context (e.g., geolocation and time) and veracity of a dataset, and ensuring appropriate privacy. In this study, we provide a review of existing BD4D work to study the impact of big data on the development of society. In addition to reviewing the important works, we also highlight important challenges and open issues.
The paper describes user behavior as a result of introducing monetization in the freemium educational online platform. Monetization resulted in alternative system growth mechanisms causing viral increase in the number of users. System metrics in terms of the $K$-factor was utilized as an indicator of the system user base growth. The weekly $K$-factor doubled as a result of monetization introduction.
The ability to estimate College Campus Occupancy for Classrooms and Labs in real time has become one of the major concerns for various Academicians, authorities and administrators,where still a manual attendance marking system is being followed. Using a low budget multiple sensor setup installed in a college auditorium, the goal is to build a real-time occupancy detector. This paper presents an Inductive real time Decision tree based classifier using multiple sensor dataset to detect occupancy. Using simple feature based thresholds, Reverberation time which comes out to be a novel as well as most distinguishing feature sampled at various frequencies over a given time interval was used to detect the occupancy with an accuracy of %.Addition of various other sensor data, decreased the accuracy of classification results. The detector setup can be used in various college buildings to provide real time centralised occupancy status thus automating the manual attendance system being used.
Based on a conceptual model, this paper aims to explore the background of the decision-making process leading to the introduction of business information systems among enterprises in Hungary. Together with presenting the problems arising in the course of the implementation of such systems, their usage patterns are also investigated. A strong correlation is established between the size of an enterprise, the scope of its business activities and the range of the business information systems it applies.
The sustainable development strategy in the management of information and communication technology (ICT) is an advanced research sector which provides a theoretical framework for integrating social and environmental responsibilities of business in the development and implementation of the management strategy. This article offers an original management model that integrates the Corporate Social Responsibility (CSR) approach and Green IT, which enables decision makers, governance and strategic alignment of ICT, business and sustainability. The model offers a new vision of decision making through economic opportunities and increasing pressure from stakeholders. This paper reveals the strategic relevance of the model, on the basis of a literature review, and provides guidelines for sustainable business development of effective management systems, and improvement of the economic, social and environmental performance of companies. The proposed framework provides a new generation managerial approach to ICT management strategy that we call \"Eco-Strategy\".
HIV/AIDs Regimen specification one of many problems for which bioinformaticians have implemented and trained machine learning methods such as neural networks. Predicting HIV resistance would be much easier, but unfortunately we rarely have enough structural information available to train a neural network. To network model designed to predict how long the HIV patient can prolong his/her life time with certain regimen specification. To learn this model 300 patient s details have taken as a training set to train the network and 100 patients medical history has taken to test this model. This network model is trained using MAT lab implementation.
In today s instant communication era, mobile phones play an important role in the efficient communication with respect to both individual and official communication strata. With the drastic explosion in the quantity of calls received and made, there is a need for analyses of patterns in these call logs to assist the user of the mobile device in the optimal utilization. This paper proposes a model termed \"LogMin\" (Log Mining of Calls in Mobile devices) which is aimed towards mining of call log in mobile phones to discover patterns and keep the user informed about the trends in the log. The logging of calls would facilitate the user to get an insight into patterns based on the six different parameters identified by the proposed LogMin model. The proposed model is validated with a prototype implementation in the Android platform and various experiments were conducted on it. The results of the experiments in the LogMin Android implementation validate the efficiency of the proposed model with respect to user s relevancy metric which is computed as 96.52%.
The social news aggregator Digg allows users to submit and moderate stories by voting on (digging) them. As is true of most social sites, user participation on Digg is non-uniformly distributed, with few users contributing a disproportionate fraction of content. We studied user participation on Digg, to see whether it is motivated by competition, fueled by user ranking, or social factors, such as community acceptance. For our study we collected activity data of the top users weekly over the course of a year. We computed the number of stories users submitted, dugg or commented on weekly. We report a spike in user activity in September 2006, followed by a gradual decline, which seems unaffected by the elimination of user ranking. The spike can be explained by a controversy that broke out at the beginning of September 2006. We believe that the lasting acrimony that this incident has created led to a decline of top user participation on Digg.
Under the background of the new media era with the rapid development of interactive advertising, this paper used case study method based on the summary of the research of the communication effect of interactive advertising from both domestic and foreign academia. This paper divided interactive advertising into three types to examine ---- interactive ads on official website, interactive ads based on SNS and interactive ads based on mobile media. Furthermore, this paper induced and summarized a self-enhanced dissemination mechanism of the interactive advertising, including three parts which are micro level, meso level and macro level mechanism, micro level embodies core interaction, inner interaction and outer interaction which reveal the whole process of interact with contents, with people and with computer, and the communication approach and spread speed shown in meso level which is self-fission-type spread, finally in macro level the communication effect of IA achieved the spiral increasing. In a word, this article enriches research procedure of the interactive advertising communication effects.
The concern about sustainability has arisen due to the overuse of natural resources and the increased use of energy consumption over the last decades. Information communication technologies (ICT) has the potential to address the three main aspects of sustainability (people, planet, profit) and therefore, several organizations have initiated a sustainable development by integrating ICT within their business activities. However, the roles of ICT in supporting sustainability initiatives have only been discussed in a limited number of studies and there is a lack of practical examples that demonstrate how the different roles of ICT are played out in an organization s environment. Therefore, this research aims to explore how ICT can be used by organizations to support sustainability initiatives. In particular, in this research-in-progress paper, we examine how a leading organization deploys Internet-of-Things as an example of an ICT application to support various sustainability initiatives. The study findings enhance the current understanding of how ICT can support sustainability practices of organizations.
The present paper describes a live project study carried out for the universities located in the western Himalayan region of India in the year 2009. The objective of this study is to undertake the task of assessment regarding initiative, utilization of ICT resources, its performance and impact in these higher educational institutions/universities. In order to answer these, initially basic four- tier framework was prepared. Followed by a questionnaire containing different ICT components 18 different groups like vision, planning, implementation, ICT infrastructure and related activities exhibiting performance. Primary data in the form of feedback on the five point scale, of the questionnaire, was gathered from six universities of the region. A simple statistical analysis was undertaken using weighted mean, to assess the ICT initiative, status and performance of various universities. In the process, a question related to Performance Indicator was identified from each group, whose Coefficient of Correlation was calculated. This study suggests that a progressive vision, planning and initiative regarding academic syllabi, ICT infrastructure, used in training the skilled human resource, is going to have a favourable impact through actual placement, research and play a dominant role at the National and International level.
An introductory programming course (CS1) is an integral part of any undergraduate curriculum. Due to large number and diverse programming background of students, providing timely and personalised feedback to individual students is a challenging task for any CS1 instructor. The help provided by teaching assistants (typically senior students) is not sufficient as it suffers from unintentional bias and, most of the time, not quick enough. In this paper, we present Prutor, a tutoring system platform to conduct introductory programming courses. Prutor is a cloud-based web application that provides instant and useful feedback to students while solving programming problems. Prutor stores, at regular intervals, the snapshots of students  attempts to solve programming problems. These intermediate versions of the student programs provide the instructors (and data analysts) a view of the students  approach to solving programming problems. Since Prutor is accessible through any standard web browser, students do not need to worry about dependencies external to the programming course, viz. Operating Systems, Editors, Compilers, Compiler Options, etc.. This enables the students to focus on solving only the programming problems. Apart from the code snapshots at regular intervals, Prutor also collects other valuable data such as the time taken by the students to solve the problems, the number of compile and execution events, and the errors made. We have used this data in developing intelligent tools for giving feedback to students, some of which are described briefly in this paper. This system thus serves as a platform for tutoring as well as data collection for researchers.
A look at how big data is transforming telemedicine to provide better care by tapping into a larger source of patient information. Telemedicine will have a profound impact on patient care, increase access and quality, and represent an opportunity to keep health care costs down. Data generated by smart devices will enable the real-time monitoring of chronic diseases, allowing optimal dosage of drugs and improve patient outcomes.
Due to widespread demand of E-governance and exponentially increasing size of data, new technologies like Open source solutions and cloud computing need to be incorporated. In this paper, the latest trends of technology that the government of most of the country has adopted have been discussed. While working on this project we have concluded that E-Governance has made the working of government more efficient and more transparent to its citizens We have also presented an exhaustive list of E-Governance projects which is currently being used in India and in international scenario. We have provided a mechanism for improving E-Governance by including technologies such as Open Source and Cloud Computing.
We argue that there already exists de facto artificial intelligence policy - a patchwork of policies impacting the field of AI s development in myriad ways. The key question related to AI policy, then, is not whether AI should be governed at all, but how it is currently being governed, and how that governance might become more informed, integrated, effective, and anticipatory. We describe the main components of de facto AI policy and make some recommendations for how AI policy can be improved, drawing on lessons from other scientific and technological domains.
The popular conception is that data traffic nearly, if not already, exceeds voice traffic on backbone networks. However, the results of research reported in this paper imply that voice traffic greatly exceeds data traffic when real users are asked to estimate their usage of a wide variety of media. Media usage was surveyed for students in New York City and in Los Angeles. Other than significant differences in radio listening, e-mails, and downloads, the usage was quite similar. Telephone usage (wired and wireless) was nearly an hour per day. When converted to bits, the telephone traffic was much greater than the data traffic over the Internet. This paper reports on the details of the two user studies. The traffic implications of the results are estimated. The finding that voice exceeds data will then be reconciled with the popular opposite conception.
Smart city [1] planning is crucial as it should balance among resources and the needs of the city .It allows to achieve good eco-friendly industries, there by supporting both the nature and the stake holders. Setting up an industry is a difficult problem, because it should optimize the resources and allocating it in an effective manner. Weighted sum approach [2] uses the spatial data for finding appropriate places to set up the industry based on the weight assigned to each constraint. The user can predict the possible places in the search space, where the industry can be set with low time complexity using spatial data. Diversity being introduced by using multipoint crossover and mutation operations. It will help to bring exploration in the search space, thereby bring the diversity factor into the solution space. The prediction approach will help to avoid the human exploitation on nature for resources. This in turn helps the investors to maximize the Return on Investment (ROI).
To date, much research has been conducted on the positive and negative effects of online social networking (OSN). However, how users perceive others and themselves being subject to these effects and the consequences of users  perceptions are understudied. Drawing from the third-person effect theory, this study examines the self-other perceptual gap for positive and negative effects of OSN and the consequences of perceptions for negative effects. Findings from our online survey (N=187) and interviews (N=8) suggested a significant difference between the perceived positive and negative effects on self and on others. Furthermore, the link between the third-person perception for usage risks of OSN and support for taking privacy protection actions was confirmed. We also found that the self-other discrepant perceptions were not influenced by age, time spent on OSN, number of OSN friends. However, gender emerged as a key difference in the third-person effects gap for privacy risks.
The focus of this paper is on wearable technologies which are increasingly being employed in the medical field. From smart watches to smart glasses, from electronic textile to data gloves; several gadgets are playing important roles in diagnosis and treatment of various medical conditions. The threats posed by these technologies are another matter of concern that must be seriously taken into account. Numerous threats ranging from data privacy to big data problems are facing us as adverse effects of these technologies. The paper analyses the application areas and challenges of wearable technologies from a technical and ethical point of view and presents solutions to possible threats.
Math is the backbone of any field. Still its a night mare for many. Recent survey proves that many students become dropouts from their higher education due to math courses. ICT is an enchanted word in the contemporary educational environment. It made the learning process more entertaining and almost made the knowledge loss negligible. Adopting the ICT in math courses are still in the infant level. Hence its a challenge placed in front of the IT and academic professionals teaching math to make a suitable ICT tools for math courses to make the learning an amusing experience. In this paper we have highlighted three main concepts which make the math classes in a fascinating way. The first method is introducing revolutionary hybrid ebooks which make the reading with both audio and video facilities. The second method is facilitating the flip class room so that student may have anywhere-anytime learning experience. Finally the recent trends in m-learning are using apps for math courses. We have highlighted the improvement showed by the students based on the survey conducted with two groups of students with m-learning tools and without m-learning tools. Even though there are good improvements showed by the students, we the researchers feel that few more improvements are required in these methodologies. The suggestions for the same are made in the recommendations and conclusion section.
The area of Learning Analytics has developed enormously since the first International Conference on Learning Analytics and Knowledge (LAK) in 2011. It is a field that combines different disciplines such as computer science, statistics, psychology and pedagogy to achieve its intended objectives. The main goals illustrate in creating convenient interventions on learning as well as its environment and the final optimization about learning domain stakeholders. Because the field matures and is now adapted in diverse educational settings, we believe there is a pressing need to list its own research methods and specify its objectives and dilemmas. This paper surveys publications from Learning Analytics and Knowledge conference from 2013 to 2015 and lists the significant research areas in this sphere. We consider the method profile and classify them into seven different categories with a brief description on each. Furthermore, we show the most cited method categories using Google scholar. Finally, the authors raise the challenges and constraints that affect its ethical approach through the meta-analysis study. It is believed that this paper will help researchers to identify the common methods used in Learning Analytics, and it will assist by establishing a future forecast towards new research work taking into account the privacy and ethical issues of this strongly emerged field.
Despite actionable insight is widely recognized as the outcome of data analytics, there is a lack of a systematic and commonly-shared definition for the term. More importantly, existing definitions are generally too abstract for informing the design of data analytics systems. This study proposes a definition for actionable insight in data analytics. For this purpose, this study conceptualizes actionable insight as a multi-component concept. The components, namely analytics insight, synergic insight, and prognostic insights are grounded in theories from multiple disciplines. Collectively, the components provide a holistic definition for actionable insight. Based on the multi-component view, a conceptual framework is introduced to actionable insight in detail, at both the concept-level and component-level. Each component s analytical, cognitive, and computational requirements are explained and relevant design considerations are suggested. We hope this study could be a rudimentary step toward the realization of data-centric data analytics that can deliver the promised actionable insight.
In 2013-2014, Tanzania embarked on a major revamp of the management of its public health supply chains for medicines and other health supplies. These upgrades include the establishment of a national electronic logistics management information system (eLMIS) and the introduction of a Logistics Management Unit (LMU) to use the eLMIS for managing all key public health commodities. This paper describes results from the \"round one\" evaluation of the impact of those key management upgrades roughly one year after their introduction. The study has three main components: (1) analysis of reporting, data use, management practices, and supply chain outcomes; (2) a cost and cost-effectiveness analysis and (3) a return on investment analysis to measure savings generated by the new systems. The study used a non-experimental pre- and post-design to compare the previous system with the upgraded management system. The quantitative analysis found that stock out rates for all product goods dropped from 32% to 23%, with the frequency of stock-outs greater than 7 days dropping from 24% to 15%. Annual supply chain costs increased from $66million to $76million. Performance improved from the 2014 baseline findings of 68% to 77%, but cost per value of commodities adjusted for performance decreased from 58% at baseline to 50% in year 1.
Knowing that an enterprise is a complex reality, it is necessary to develop a modeling framework allowing the description of system structure and dynamics that alter the structure. The concept of enterprise modeling addresses this need and many techniques have emerged. Our goal is to provide leaders of Algerian enterprise an overview of modeling techniques. Thus these managers may elect, in collaboration with the University, the modeling technique best suited to their requirements. TWe believe that this could be a step towards an effective reorganization of the enterprise leading. TThis article proposes a domain ontology and multi-criteria analysis in the frame of modeling enterprise. Our approach is based on two stages using the Prot\\ eg\\ e tool for the technique representation and the PROMETHEE method for their evaluation. The result is a ranking between the different techniques, which allows selecting the most appropriate methodology according to the criteria for a given Tenterprise.
Film and television play an important role in popular culture, however studies that require watching and annotating video are time-consuming and expensive to run at scale. We explore information mined from media database cast lists to explore onscreen gender depictions and how they change over time. We find differences between web-mediated onscreen gender proportions and those from US Census data. We propose these methodologies are a useful adjunct to traditional analysis that allow researchers to explore the relationship between online and onscreen gender depictions.
The social conventions and expectations around the appropriate use of imaging and video has been transformed by the availability of video cameras in our pockets. The impact on law enforcement can easily be seen by watching the nightly news; more and more arrests, interventions, or even routine stops are being caught on cell phones or surveillance video, with both positive and negative consequences. This proliferation of the use of video has led law enforcement to look at the potential benefits of incorporating video capture systematically in their day to day operations. At the same time, recognition of the inevitability of widespread use of video for police operations has caused a rush to deploy all types of cameras, including body worn cameras. However, the vast majority of police agencies have limited experience in utilizing video to its full advantage, and thus do not have the capability to fully realize the value of expanding their video capabilities. In this white paper, we highlight some of the technology needs and challenges of body-worn cameras, and we relate these needs to the relevant state of the art in computer vision and multimedia research. We conclude with a set of recommendations.
Bubble Sort is simple. Yet, it seems a bit difficult for high school students. This paper presents a pedagogical methodology: Using Design Sketch to visualize the concepts in Bubble Sort, and to evaluate how this approach assists students to understand the pseudo code of Bubble Sort. An experiment is conducted in Wu-Ling Senior High School with 250 students taking part. The statistical analysis of experimental results shows that, for relatively high abstraction concepts, such as iteration number, Design Sketch helps significantly. However, it is not so for low abstraction concepts such as compare, swap, and iteration.
Using time series of US patents per million inhabitants, knowledge-generating cycles can be distinguished. These cycles partly coincide with Kondratieff long waves. The changes in the slopes between them indicate discontinuities in the knowledge-generating paradigms. The knowledge-generating paradigms can be modeled in terms of interacting dimensions (for example, in university-industry-government relations) that set limits to the maximal efficiency of innovation systems. The maximum values of the parameters in the model are of the same order as the regression coefficients of the empirical waves. The mechanism of the increase in the dimensionality is specified as self-organization which leads to the breaking of existing relations into the more diversified structure of a fractal-like network. This breaking can be modeled in analogy to 2D and 3D (Koch) snowflakes. The boost of knowledge generation leads to newly emerging technologies that can be expected to be more diversified and show shorter life cycles than before. Time spans of the knowledge-generating cycles can also be analyzed in terms of Fibonacci numbers. This perspective allows for forecasting expected dates of future possible paradigm changes. In terms of policy implications, this suggests a shift in focus from the manufacturing technologies to developing new organizational technologies and formats of human interactions
What would you teach if you had only one course to help students grasp the essence of computation and perhaps inspire a few of them to make computing a subject of further study? Assume they have the standard college prep background. This would include basic algebra, but not necessarily more advanced mathematics. They would have written a few term papers, but would not have written computer programs. They could surf and twitter, but could not exclusive-or and nand. What about computers would interest them or help them place their experience in context? This paper provides one possible answer to this question by discussing a course that has completed its second iteration. Grounded in classical logic, elucidated in digital circuits and computer software, it expands into areas such as CPU components and massive databases. The course has succeeded in garnering the enthusiastic attention of students with a broad range of interests, exercising their problem solving skills, and introducing them to computational thinking.
Interest in computer science is growing. As a result, computer science (CS) and related departments are experiencing an explosive increase in undergraduate enrollments and unprecedented demand from other disciplines for learning computing. According to the 2014 CRA Taulbee Survey, the number of undergraduates declaring a computing major at Ph.D. granting departments in the US has increased 60% from 2011-2014 and the number of degrees granted has increased by 34% from 2008-2013. However, this growth is not limited to higher education. New York City, San Francisco and Oakland public schools will soon be offering computer science to all students at all schools from preschool to 12th grade, although it will be an elective for high school students. This unprecedented demand means that CS departments are likely to teach not only more students in the coming decades, but more diverse students, with more varied backgrounds, motivations, preparations, and abilities. This growth is an unparalleled opportunity to expand the reach of computing education. However, this growth is also a unique research challenge, as we know very little about how best to teach our current students, let alone the students soon to arrive. The burgeoning field of Computing Education Research (CER) is positioned to address this challenge by answering research questions such as, how should we teach computer science, from programming to advanced principles, to a broader and more diverse audience? We argue that computer science departments should lead the way in establishing CER as a foundational research area of computer science, discovering the best ways to teach CS, and inventing the best technologies with which to teach it. This white paper provides a snapshot of the current state of CER and makes actionable recommendations for academic leaders to grow CER as a successful research area in their departments.
This study is to investigate the Critical Success Factors (CSFs) of the Business to Customer (B2C) e-commerce system. These factors should be considered comprehensively and expanded to all parties concerned to create and provide the electronic service and ensure that the CSFs are satisfied. In order to give an organized and inclusive view of the CSFs, an enterprise architecture framework will be adopted to systemize this investigation.
Map matching has been used to reduce the noisiness of the location estimates by aligning them to the road network on a digital map. A growing number of applications, e.g. energy-efficient localization and cellular provider side localization, depend on the availability of only sparse and coarse-grained positioning data; leading to a challenging map matching process. In this paper, we present semMatch: a system that can provide accurate HMM-based map matching for challenging positioning traces. semMatch leverages the smartphone s inertial sensors to detect different road semantics; such as speed bumps, tunnels, and turns; and uses them in a mathe-matically-principled way as hints to overcome the sparse, noisy, and coarse-grained input positioning data, improving the HMM map matching accuracy and efficiency. To do that, semMatch applies a series of preprocessing modules to handle the noisy locations. The filtered location data is then processed by the core of semMatch system using a novel incremental HMM algorithm that combines a semantics-enriched digital map and the car s ambient road semantics in its estimation process. We have evaluated semMatch using traces collected from different cities covering more than 150km under different harsh scenarios including coarse-grained cellular-based positioning data, sparse GPS traces with extremely low sampling rate, and noisy traces with a large number of back-and-force transitions. The results show that semMatch significantly outperforms traditional map matching algorithms under all scenarios, with an enhancement of at least 416% and 894% in precision and recall respectively in the most difficult cases. This highlights its promise as a next generation map matching algorithm for challenging environments.
Devices and sensors for identification of fallers can be used to implement actions to prevent falls and to allow the elderly to live an independent life while reducing the long-term care costs. In this study we aimed to investigate the accuracy of Timed Up and Go test, for fallers  identification, using fusion of features extracted from accelerometer data. Single and dual tasks TUG (manual and cognitive) were performed by a final sample (94% power) of 36 community dwelling healthy older persons (18 fallers paired with 18 non-fallers) while they wear a single triaxial accelerometer at waist with sampling rate of 200Hz. The segmentation of the TUG different trials and its comparative analysis allows to better discriminate fallers from non-fallers, while conventional functional tests fail to do so. In addition, we show that the fusion of features improve the discrimination power, achieving AUC of 0.84 (Sensitivity=Specificity=0.83, 95% CI 0.62-0.91), and demonstrating the clinical relevance of the study. We concluded that features extracted from segmented TUG trials acquired with dual tasks has potential to improve performance when identifying fallers via accelerometer sensors, which can improve TUG accuracy for clinical and epidemiological applications.
This paper contributes to a better understanding of ethical concerns regarding the deployment of complex public sector IT systems and the information flows they instigate. The paper aims to reveal how different views on IT and IT-enabled information flows allow us to see differently their social implications and to construe different ethical questions. This is achieved by i) defining two opposing views on IT-enabled information flows as  intermediaries  and  mediators ; ii) by analysing the controversial case of My School - a web portal that provides performance data of 9,500 Australian schools - that introduces new information flows in the education sector; and iii) by revealing and explaining how some unintended negative social implications emerge and how the articulation of ethical concerns depends on the view on My School-enabled information flows. The paper concludes with theoretical and practical implications, with particular emphasis on responsibilities of all involved, setting up foundations for an important area of future IS research.
Land use classification is essential for urban planning. Urban land use types can be differentiated either by their physical characteristics (such as reflectivity and texture) or social functions. Remote sensing techniques have been recognized as a vital method for urban land use classification because of their ability to capture the physical characteristics of land use. Although significant progress has been achieved in remote sensing methods designed for urban land use classification, most techniques focus on physical characteristics, whereas knowledge of social functions is not adequately used. Owing to the wide usage of mobile phones, the activities of residents, which can be retrieved from the mobile phone data, can be determined in order to indicate the social function of land use. This could bring about the opportunity to derive land use information from mobile phone data. To verify the application of this new data source to urban land use classification, we first construct a time series of aggregated mobile phone data to characterize land use types. This time series is composed of two aspects: the hourly relative pattern, and the total call volume. A semi-supervised fuzzy c-means clustering approach is then applied to infer the land use types. The method is validated using mobile phone data collected in Singapore. Land use is determined with a detection rate of 58.03%. An analysis of the land use classification results shows that the accuracy decreases as the heterogeneity of land use increases, and increases as the density of cell phone towers increases.
The outpatients department in a developing country is typically understaffed and inadequately equipped to handle a large numbers of patients filing through on an average day. The use of electronic medical record (EMR) systems can resolve some of the longstanding medical inefficiencies common in developing countries. This paper presents the design and implementation of a proposed outpatient management system that enables efficient management of a patient s medical details. We present a system to create appointments with medical practitioners by integrating a proposed Android-based mobile application with a selected open source EMR system. The application allows both the patient and the medical practitioners to manage appointments and make use of the electronic messaging facility to send reminders when the appointed time is approaching in real-time. A mobile application prototype is developed and the road map for implementation is also discussed.
The Australian government, to remind job seekers of appointments with employment services providers in order to cut costs and free up human resources, is using technologies such as Short Messaging Services (SMS). However, the technologies in-use are but one side of this equation the specifics of how these technologies are used is the other side, and these specifics are highly under-theorized, particularly in regard to the views of the people to which these technologies are directed. The purpose of this paper is to provide a theoretical framing for this phenomenon as well as to introduce an emerging methodological direction that may allow for a better understanding of demographic-specific values and thereby better valence framing. The paper also theorizes reactions to information that could be applicable elsewhere, not just in e-government or with SMS, thereby contributing to discussions surrounding the Big Data debate.
As far as many consumers and businessmen and women are concerned, increasingly wireline and wireless services, including those provided by terrestrial and satellite systems, are considered to be substitutes and sometimes complements, regardless of the laws and regulations applicable to them. At the same time, many writers and even government agencies (such as the FCC) have suggested that users of the spectrum should be given more property-like rights in the use of the spectrum and at a minimum should be given much more flexibility in how they may use the spectrum. Two recent developments have important implications with respect to \"convergence,\" spectrum property rights and flexible use of the spectrum. The first development involves several proposals to provide terrestrial wireless services within spectrum in use or planned to be used to provide satellite services. The second development is the passage of the 2000 ORBIT Act which specifically forbids the use of license auctions to select among mutually exclusive applicants to provide international or global satellite communications service. The purpose of this paper is to discuss some of the questions raised by these two events, but not necessarily to provide definitive answers or solutions.
In this paper, we would like to propose our web-based application for Islamic history learning system, named Digitory-Digital History. There are two main navigations to browse historical stories on the web. One is location-based navigation using on-line map which gives users access to understand events during Islamic introduction to Indonesia based on the location. Alternatively, users can browse on time base using sliding navigation marked timely, so they can comprehend history in time sequence. Implementing semantic web, this web-app can suggest users related articles, either based on time series, location similarities, or time-domain similarities, and also suggest pictures related to the articles. AJAX strengthen the real-time access and interactivity as users navigate around the web. By the end of this research, we will have the web-app prototype completed with its fundamental location-based navigation, semantic relationship among articles and pictures, and time- based navigation system. As the web-app deployed, we have some volunteers to try our application so that we can evaluate its result, particularly its effectiveness.
This paper analyses changes in public opinion by tracking political discussions in which people voluntarily engage online. Unlike polls or surveys, our approach does not elicit opinions but approximates what the public thinks by analysing the discussions in which they decide to take part. We measure the emotional content of online discussions in three dimensions (valence, arousal and dominance), paying special attention to deviation around average values, which we use as a proxy for disagreement and polarisation. We show that this measurement of public opinion helps predict presidential approval rates, suggesting that there is a point of connection between online discussions (often deemed not representative of the overall population) and offline polls. We also show that this measurement provides a deeper understanding of the individual mechanisms that drive aggregated shifts in public opinion. Our data spans a period that includes two US presidential elections, the attacks of September 11, and the start of military action in Afghanistan and Iraq.
As the mobile telecommunication systems are growing tremendously all over the world, the numbers of handheld and base stations are also rapidly growing and it became very popular to see these base stations distributed everywhere in the neighborhood and on roof tops which has caused a considerable amount of panic to the public in Palestine concerning wither the radiated electromagnetic fields from these base stations may cause any health effect or hazard. Recently UP High Court in India ordered for removal of BTS towers from residential area, it has created panic among cellular communication network designers too. Green cellular networks could be a solution for the above problem. This paper deals with green cellular networks with the help of multi-layer overlaid hierarchical structure (macro / micro / pico / femto cells). Macrocell for area coverage, micro for pedestrian and a slow moving traffic while pico for indoor use and femto for individual high capacity users. This could be the answer of the problem of energy conservation and enhancement of spectral density also.
Strategic alignment is a conviction that is considered extremely important in understanding how organizations can apply their arrangement of information technology (IT) into substantial boosts in achievement. To attain alignment advantage, Information Technology Infrastructure Library (ITIL) prepares a framework of best practice approach for IT Service Management in all countries and Control Objectives for Information and Related Technology (COBIT) is an IT governance framework and aiding toolset that permits managers to stretch the gap between control prerequisites, technical matters and business risks. The purpose of this paper is to recognize how COBIT can complement ITIL to attain Business-IT Alignment.
In this paper we argue that Massively Multiplayer Online Games (MMOGs), also known as Large Games are an interesting research tool for policy experimentation. One of the major problems with lawmaking is that testing the laws is a difficult enterprise. Here we show that the concept of an MMOG can be used to experiment with environmental laws on a large scale, provided that the MMOG is a real game, i.e., it is fun, addictive, presents challenges that last, etc.. We present a detailed game concept as an initial step.
Many large-scale, complex systems consist of interactions between humans, human-made systems and the environment. The approach developed in this paper is to partition the problem space into two fundamental layers and identify, parameterize and model the main dimensions of each layer and interactions across and in between layers. One layer is the key actors or major organization or human decision makers who influence the state of the world. The other layer includes the domains or fields of knowledge relevant to the problem being addressed. These domains include elements such as the physical earth and its atmosphere, world demography, world economy, level of globalization, and politics. Key parameters for each of the actor types and domains will be extracted and assessed using existing data sources. Novel systems, uncertainty modeling and analysis techniques are combined with advanced computational technologies to determine a spectrum of likely future system states and conduct ifthen scenario analyses.
E-government services aims to provide citizens with more accessible, accurate, real-time and high quality services and information. Although the public sectors in Kingdom of Saudi Arabia (KSA) have promoted their e-Government services for many years, its uses and achievements are few. Therefore, this paper explores the key factors of Saudi citizens acceptance through a research survey and by gathering empirical evidence based on the Unified Theory of Acceptance and the Use of Technology (UTAUT). Survey Data collected from 400 respondents was examined using structural equation modelling (SEM) technique and utilized AMOS tools. The study results explored the factors that affect the acceptance of e-government services in KSA based on UTAUT model. Moreover, as a result of this study an amended UTAUT model was proposed. Such a model contributes to the discussion and development of adoption models for technology.
Today s cities face many challenges due to population growth, aging population, pedestrian and vehicular traffic congestion, water usage increase, increased electricity demands, crumbling physical infrastructure of buildings, roads, water sewage, power grid, and declining health care services. Moreover, major trends indicate the global urbanization of society, and the associated pressures it brings, will continue to accelerate. One of the approaches to assist in solving some of the challenges is to deploy extensive IT technology. It has been recognized that cyber-technology plays a key role in improving quality of people s lives, strengthening business and helping government agencies serve citizens better. In this white paper, we discuss the benefits and challenges of cyber-technologies within \"Smart Cities\", especially the IoT (Internet of Things) for smart communities, which means considering the benefits and challenges of IoT cyber-technologies on smart cities physical infrastructures and their human stakeholders. To point out the IoT challenges, we will first present the framework within which IoT lives, and then proceed with the challenges, conclusions and recommendations.
Many people expect the Internet to change American politics, most likely in the direction of increasing direct citizen participation and forcing government officials to respond more quickly to voter concerns. A recent California initiative with these objectives would authorize use of encrypted digital signatures over the Internet to qualify candidates, initiatives, and other ballot measures. Proponents of Internet signature gathering say it will significantly lower the cost of qualifying initiatives and thereby reduce the influence of organized, well-financed interest groups. They also believe it will increase both public participation in the political process and public understanding about specific measures. However, opponents question whether Internet security is adequate to prevent widespread abuse and argue that the measure would create disadvantages for those who lack access to the Internet. Beyond issues of security, cost, and access lie larger questions about the effects of Internet signature gathering on direct democracy. Would it encourage greater and more informed public participation in the political process? Or would it flood voters with ballot measures and generally worsen current problems with the initiative process itself? Because we lack good data on these questions, answers to them today are largely conjectural. We can be fairly sure, however, that Internet petition signing, like Internet voting, will have unintended consequences.
Students  satisfaction plays a vital role in success of an educational institute. Hence, many educational institutes continuously improve their service to produce a supportive learning environment to satisfy the student need. For this reason, educational institutions collect student satisfaction data to make decision about institutional quality, but till now it cannot be determined because student satisfaction is a complex matter which is influenced by variety of characteristics of students and institutions. There are many studies have been performed to inspect student satisfaction in the form of college services, programs, student accommodation facility, student-faculty interaction, consulting hours etc. So, still we cannot have a standard method to know what is going on about satisfaction in the case of a core course. In this research we determined the attributes that heavily affect student satisfaction in a core course of computer science and the current status of other attributes as well.
Real Industry Projects and team work can have a great impact on student learning but providing these activities requires significant commitment from academics. It requires several years planning implementing to create a collaborative learning environment that mimics the real world ICT (Information and Communication Technology) industry workplace. In this project, staff from all the three faculties, namely the Faculty of Health, Engineering and Science, Faculty of Arts, Education and Human Development, and Faculty of Business and Law in higher education work together to establish a detailed project management plan and to develop the unit guidelines for participating students. The proposed project brings together students from business, multimedia and computer science degrees studying their three project-based units within each faculty to work on a relatively large IT project with our industry partner, Melbourne Zoo. This paper presents one multimedia software project accomplished by one of the multi-discipline student project teams. The project was called  Interactive ZooOz Guide  and developed on a GPS-enabled PDA device in 2007. The developed program allows its users to navigate through the Zoo via an interactive map and provides multimedia information of animals on hotspots at the  Big Cats  section of the Zoo so that it enriches user experience at the Zoo. A recent development in zoo applications is also reviewed. This paper is also intended to encourage academia to break boundaries to enhance students  learning beyond classroom.
Very old people accumulate the \"handicaps\": social, physical, psychological or cognitive. Various research thus developed to determine there waiting and needs and also to see the benefit possibly produced by technologies (called ?gerontechnology?) on their living conditions. The object of this article is to present the numerical service offer to very old perople and to see how it takes part in a social justice according to the definition of Rawls (principle of equal freedom, principle of equal opportunity in the access). The adoption, the use and the benefit of technology are analyzed in a theoretical way through a state of the art and in an experimental way through a qualitative and quantitative investigation carried out with a population of very old people. We propose to identify dynamic technological acceptance of old people according to the TAM S (Technology Acceptance Model) of Davis adapted by (Hamner and Qazi, 2008).
Usually the first course in mathematics is calculus. Its a core course in the curriculum of the Business, Engineering and the Sciences. However many students face difficulties to learn calculus. These difficulties are often caused by the prior fear of mathematics. The students today cant live without using computer technology. The uses of computer for teaching and learning can transform the boring traditional methodology of teach to more active and attractive method. In this paper, we will show how we can use Excel in teaching calculus to improve our students learning and understanding through different types of applications ranging from Business to Engineering. The effectiveness of the proposed methodology was tested on a random sample of 45 students from different majors over a period of two semesters.
Project management education programmes are often proposed in higher education to give students competences in project planning (Gantt s chart), project organizing, human and technical resource management, quality control and also social competences (collaboration, communication), emotional ones (empathy, consideration of the other, humour, ethics), and organizational ones (leadership, political vision, and so on). This training is often given according a training-by-project type of learning with case studies. This article presents one course characterized by a pedagogical organization based upon Knowledge Management (KM) concepts: knowledge transfer and construction throughout a learning circle and social interactions. The course is supported by a rich and complex tutor organization. We have observed this course by using another KM method inspired from KADS with various return of experience formalized into cards and charts. Our intention is, according to the model of Argyris and Sch\\\"on (Smith, 2001), to gain feedback information about local and global processes and about actors  experience in order to improve the course. This paper describes precisely the course (pedagogical method and tutor activity) and the KM observation method permitting to identify problem to solve. In our case, we observe problem of pedacogical coordination and skills acquisition. We propose to design a metacognitive tool for tutors and students, usable for improving knowledge construction and learning process organisation
This paper presents the results of a study carried out to identify the factors that influence the further education desires of Sri Lankan youth. Statistical modeling has been initially used to infer the desires of the youth and then a decision support tool has been developed based on the statistical model developed. In order to carry out the analysis and the development of the model, data collected as part of the National Youth Survey has been used. The accuracy of the model and the decision support tool has been tested by using a random data sets and the accuracy was found to be well above 80 percent, which is sufficient for any policy related decision making.
This study provides details on the motivational factors for using blogs as an essential tool to promote students writing skills in ESL classrooms. The study aims to discuss how using blogs may be integrated into classroom activities to promote students writing skills as well as polishing their skills. It would also illustrate the features offered in blogs as well as the motivational essence that is attached to the blogs. To achieve the aim of the study, a semi-structured interview protocol was used to collect the required qualitative data. The findings of the study would serve as an insistent reminder that the blogs which have been clearly underlined in the curriculum should be re-orchestrated more effectively again by the teachers of English as a Second Language (ESL).
This paper proposes a design tool to investigate the properties and emergent behaviours of a special class of Ambient Assisted Living systems, namely mutual assistance communities where the dwellers contribute to each other s well being. Purpose of our system is to understand how mutual assistance communities work, what consequences a design decision could ultimately bring about, and how to construct care communities providing timely and cost-effective service for elderly and disabled people. We prove that mutual assistance between dwellers can provide care in time, and decrease the requirement for professional medical service. The simulation results show that with the existing rules most of the requirements for help can be solved or promptly initiated inside the community before their members resort to external professionals.
Poor software quality can adversely affect application security by increasing the potential for a malicious breach of a system. Because computer security and cybersecurity are becoming such relevant topics for practicing software engineers, the need for educational opportunities in this area is steadily increasing. Universities and colleges have recognized this, and have started to offer programs in cybersecurity. At face value, these new programs may not appear controversial, but developing their curriculum requires answering a complex ethical question: Should programs teach hacking to their students? Even though there are different types of hackers, media reports of cybersecurity incidents tend to reserve the \"hacker\" label for cyber criminals, which overlooks the value in hacking (and, by extension, teaching students to hack). This article examines the full spectrum of hacking behavior, as well as arguments for and against including hacking in education programs, and recommends that hacking skills be considered an essential component of an education and practice in software quality assurance.
Can we move beyond simply networking creative individuals to establishing diverse communities of practice for innovation through discursive methods. Furthermore, can we digitise their creativity activities within an integrative socio-cultural collaborative technology platform that could then support distributed innovation. First, we consider the complexity of creative cultures from the perspective of design innovation, including how to nurture creativity activities in what we call Creative Gardens. Specifically, how they could grow, diverge, and combine, be- ing cultivated to nurture emergent, disruptive, collaborative innovation. Then, we consider the digitisation of Creative Gardens from the perspective of digital culture. Specifically, the tenets of Creative Gardens as dynamic and innovative communities. This includes considering the challenges and opportunities around digitisation, the influences around the connectivity with knowledge cultivation, and the potential for distributed innovation as collective intelligence to utilise diverse expertise. We conclude be considering the importance of the issues and questions raised, and their potential for the future.
The main aim of this paper is to provide a deep analysis on the research field of healthcare data analytics. This paper is analyzing the previous studies and works in this research area, as well as highlighting some of guidelines and gaps. This study has used seven popular databases and selected most relevant papers, in order to conduct this paper. The paper has listed some data analytics tools and techniques that have been used to improve healthcare performance in many areas such as: medical operations, reports, decision making, and prediction and prevention system. Moreover, the systematic review has showed an interesting demographic of fields of publication, research approaches, as well as outlined some of the possible reasons and issues associated with healthcare data analytics, based on geographical distribution theme.
Education today is becoming completely associated with the Information Technology on the content delivery, communication and collaboration. The need for servers, storage and software are highly demanding in the universities, colleges and schools. Cloud Computing is an Internet based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Currently, IaaS (Infrastructure as a Service), PaaS (Platform as a Service) and SaaS (Software as a Service) are used as business model for Cloud Computing. The paper also introduces the cloud computing infrastructure provided by Microsoft, Google and Amazon Web Service. In this paper we will review the features the educational institutions can use from the cloud computing providers to increase the benefits of students and teachers.
The aim of this study is to investigate the style of Facebook usage between undergraduate students and the impact on their academics performance. Also, this paper was evaluated in the view of student the using of Facebook. A questioner was design for collecting data from a sample of 480 undergraduate students in Irbid National University. The survey revealed that 77% of the students have an account on Facebook. One of the main findings is that there was a significant relationship between gender and Facebook usage. Moreover, the survey revealed that whenever the less time spent on Facebook, the higher the performance will be in grade point average. This was conducted by the negative correlation between time spent on Facebook and the performance of undergraduate student. Statistically speaking, the study has seven hypotheses; two of them were rejecting against five acceptable hypotheses.
The information era is the time when information is not only largely generated, but also vastly processed in order to extract and generated more information. The complex nature of modern living is represented by the various kind of data. Data can be in the forms of signals, images, texts, or manifolds resembling the horizon of observation. The task of the emerging data sciences are to extract information from the data, for people gain new insights of the complex world. The insights may came from the new way of the data representation, be it a visualizations, mapping, or other. The insights may also come from the implementation of mathematical analysis and or computational processing giving new insights of what the states of the nature represented by the data. Both ways implement the methodologies reducing the dimensionality of the data. The relations between the two functions, representation and analysis are the heart of how information in data is transformed mathematically and computationally into new information. The paper discusses some practices, along with various data coming from the social life in Indonesia to gain new insights about Indonesia in the emerging data sciences. The data sciences in Indonesia has made Indonesian Data Cartograms, Indonesian Celebrity Sentiment Mapping, Ethno-Clustering Maps, social media community detection, and a lot more to come, become possible. All of these are depicted as the exemplifications on how Data Science has become integral part of the technology bringing data closer to people.
The purpose of this study is to reflect on some questions concerning the evaluation in information literacy. It is discussed some elements such as scenarios, objects and methods in the evaluation of information literacy programs. It is highlighted the need to influence in the context of such programs as the result of student learning. Some notions emerged from the educational field are taken into account to solidify the ideas presented here. It is argued the implications of this type of assessment practices for information professionals, who serve as trainers of information skills.
The main focus of the requirements engineering (RE) literature has been on the technical aspects related to the RE projects. Furthermore, research has mainly focused on the specific methods for collecting the requirements for an information system. To fill this gap, this paper studies the contribution of social factors, such as social ties, knowledge sharing and flexibility, to successful collaboration in RE teams. Data were collected from a successful RE and development project in a public sector company in Finland. The results suggest that human-related issues, such as flexibility and transactive memory, were important for collaborative work in the RE team studied. The paper concludes by discussing the implications for theory and suggesting practical guidelines to enhance collaborative work in RE teams.
While the 1996 Telecommunications Act requires all incumbent local telephone companies to cooperate with local entrants, section 271 of the Act provides the Bell companies (but not GTE) additional incentives to cooperate. Using an original data set, I compare the negotiations of AT&T, as a local entrant, with GTE and with the Bell companies in states where both operate. My results suggest that the differential incentives matter: The Bells accommodate entry more than does GTE, as evidenced in quicker agreements, less litigation, and more favorable prices offered for network access. Consistent with this, there is more entry into Bell territories
Online Behavioural targeted Advertising (OBA) has risen in prominence as a method to increase the effectiveness of online advertising. OBA operates by associating tags or labels to users based on their online activity and then using these labels to target them. This rise has been accompanied by privacy concerns from researchers, regulators and the press. In this paper, we present a novel methodology for measuring and understanding OBA in the online advertising market. We rely on training artificial online personas representing behavioural traits like  cooking ,  movies ,  motor sports , etc. and build a measurement system that is automated, scalable and supports testing of multiple configurations. We observe that OBA is a frequent practice and notice that categories valued more by advertisers are more intensely targeted. In addition, we provide evidences showing that the advertising market targets sensitive topics (e.g, religion or health) despite the existence of regulation that bans such practices. We also compare the volume of OBA advertising for our personas in two different geographical locations (US and Spain) and see little geographic bias in terms of intensity of OBA targeting. Finally, we check for targeting with do-not-track (DNT) enabled and discovered that DNT is not yet enforced in the web.
Dating apps for mobile devices, one popular GeoSocial app category, are growing increasingly popular. These apps encourage the sharing of more personal information than conventional social media apps, including continuous location data. However, recent high profile incidents have highlighted the privacy risks inherent in using these apps. In this paper, we present a case study utilizing forensic techniques on nine popular proximity-based dating apps in order to determine the types of data that can be recovered from user devices. We recover a number of data types from these apps that raise concerns about user privacy. For example, we determine that chat messages could be recovered in at least half of the apps examined and, in some cases, the details of any users that had been discovered nearby could also be extracted.
The purpose of the current study is to systematically review the crowdsourcing literature, extract the activities which have been cited, and synthesise these activities into a general process model. For this to happen, we reviewed the related literature on crowdsourcing methods as well as relevant case studies and extracted the activities which they referred to as part of crowdsourcing projects. The systematic review of the related literature and an in-depth analysis of the steps in those papers were followed by a synthesis of the extracted activities resulting in an eleven-phase process model. This process model covers all of the activities suggested by the literature. This paper then briefly discusses activities in each phase and concludes with a number of implications for both academics and practitioners.
Prezi is a Hungarian software company, producing a cloud-based presentation software and storytelling tool for presenting ideas on a virtual canvas (Prezi.com). Prezi is one of the teaching materials that help students in learning process. This study aims to explore the effectiveness of using Prezi in Islamic education subject among secondary schools under the topic of marriage in Islam: polygamy. Specifically its aims to identify students interest and second examine their attitude towards the uses of Prezi in learning Islamic educations. A total of 22 students participated in the survey, employing a 22-item questionnaire. The data was analyzed quantitatively using Statistical Package for the Social Sciences (SPSS). Result from this study revealed that student shows their interest in learning Islamic Educations when teachers uses Prezi. In additions students also show positive attitude towards uses of Prezi in Classroom. As conclusions, the uses of Prezi presentation is easy and its technique for developing a more creative and innovative approach in teaching strategies among Islamic educators.
Social software solutions in enterprises such as IBM Connections are said to have the potential to support communication and collaboration among employees. However, companies are faced to manage the adoption of such collaborative tools and therefore need to raise the employees  acceptance and motivation. To solve these problems, developers started to implement Gamification elements in social software tools, which aim to increase users  motivation. In this paper, we critically examine the status quo of the current market of leading social software solutions and seek to find out which Gamification approaches are implementated in these collaborative tools. Our findings show, that most of the major social collaboration solutions do not offer Gamification features by default, but leave the integration to a various number of third party plug-in vendors. Furthermore we identify a trend in which Gamification solutions majorly focus on rewarding quantitative improvement of work activities, neglecting qualitative performance. Subsequently, current solutions do not match recent findings in research and ignore risks that can lower the employees  motivation and work performance in the long run.
This paper presents the Erasmus Mundus Joint Master Degree in Pervasive Computing and Communications for Sustainable Development (PERCCOM). This program brings together 11 academic partners and 8 industry partners to combine advanced Information and Communication Technologies (ICT) with environmental awareness to enable world-class education and unique competences for ICT professionals who can build cleaner, greener, more resource and energy efficient cyber-physical systems. First, this paper describes the rationale and motivations for ICT education for sustainability challenges. It then details the structure and contents of the programs including the courses offered at the three teaching locations (Nancy France, Lappeenranta Finland, and Lulea Sweden). The ways that the program has been running as well as students selection, their thesis works, involvement of industry, are also discussed. The program was built and managed using a solid academic standards and strategies student-centered learning.
In asserting a competitive market environment as a justification for regulatory forbearance, the Telecommunications Act of 1996 finally articulated a clear standard for the FCC s public interest standard, one of the most protean concepts in communications. This seeming clarity has not, however, inhibited intense political conflict over the term. This paper examines public and regulatory debate over the AOL Time Warner merger as an example of the way in which the linkage between competitions and commons policy becomes relevant to communications policy, particularly in relation to mass media, and discusses interpretations of the public interest in the current FCC. The paper proposes that the Telecom Act s goal of fostering economic competition among information service providers, and the democratic ideal of nurturing public relationships and behaviors can be linked. Competition policy that creates the opportunity for untrammeled interactivity also provides a sine qua non to nurture the social phenomenon of the commons. The linked concepts of competition and commons could also provide useful ways to interpret the public interest in policy arenas as spectrum allocation and intellectual property.
This paper intends to introduce a game-based 3D Virtual Learning Environment (VLE) to second graders. The impetus arose from the need to make learning in mathematics more effective and interesting through multimedia. Applied in a game, the basic mathematical operations such as addition, subtraction, multiplication, and division are expected to performed by learners as they represent themselves as avatars while they immerse in a quest of digital objects in the VLE called Math World. Educational attributes such as mentality change, emotional fulfillment, knowledge enhancement, thinking skills development, and bodily coordination are evaluated to ensure learning effectiveness. Also, game playability measured in terms of game plays, story, mechanics and interface usability are examined for its educative design. With an aggregate of these enhanced indices, results attest that objectives were met while making mathematics an interesting, motivating and enjoyable subject, hence VLE a significant tool to complement the conventional approaches of teaching.
We study the response to the Charlie Hebdo shootings of January 7, 2015 on Twitter across the globe. We ask whether the stances on the issue of freedom of speech can be modeled using established sociological theories, including Huntington s culturalist Clash of Civilizations, and those taking into consideration social context, including Density and Interdependence theories. We find support for Huntington s culturalist explanation, in that the established traditions and norms of one s \"civilization\" predetermine some of one s opinion. However, at an individual level, we also find social context to play a significant role, with non-Arabs living in Arab countries using #JeSuisAhmed (\"I am Ahmed\") five times more often when they are embedded in a mixed Arab/non-Arab (mention) network. Among Arabs living in the West, we find a great variety of responses, not altogether associated with the size of their expatriate community, suggesting other variables to be at play.
Studies have shown that the application of Self-Regulated Learning (SRL) increases the effectiveness of education. However, this is quite challenging to be facilitated with learning technologies like Learning Management Systems (LMS) that lack an individualised approach as well as a right balance between the learner s freedom and guidance. Personalisation and adaptive technologies have a high potential to support SRL in Personal Learning Environments (PLE), which enable customisation and guidance of various strengths and at various levels with SRL widgets. The main contribution of our paper is a framework that integrates guidance and reflection support for SRL in PLEs. Therefore, we have elaborated an operational SRL model. On that basis we have implemented a system with a learner model, SRL widgets, monitoring and analytic tools, as well as recommendation functionalities. We present concrete examples from both informal and formal learning settings. Moreover, we present analytic results from our SRL system - lab experiments and a public installation. With such a complex setting we are coming close to the realisation of Responsive Open Learning Environments (ROLE).
Android devices continue to grow in popularity and capability meaning the need for a forensically sound evidence collection methodology for these devices also increases. This chapter proposes a methodology for evidence collection and analysis for Android devices that is, as far as practical, device agnostic. Android devices may contain a significant amount of evidential data that could be essential to a forensic practitioner in their investigations. However, the retrieval of this data requires that the practitioner understand and utilize techniques to analyze information collected from the device. The major contribution of this research is an in-depth evidence collection and analysis methodology for forensic practitioners.
Currently, experts from IT industry are closely monitoring the soaring total volume of digital data. Moreover the problem is not purely technical, it directly affects human civilization as a whole. The growth rate of the all increasing and is already very large. Began is actively appear apocalyptic scenarios of development IT technology, and humanity as a whole. In this paper we propose a constructive alternative to these emotional ideas. Invited to consider the digital industry as a complete system that is developing in close connection with human civilization. Moreover, system self-organizing and essentially nonlinear in its behavior. To study this system is applied system-cybernetic approach. The mathematical model is developed, shows that in the future rate of production of digital data is stabilize at 13.2 ZB per year.
The paper considers the level of the extremely low-frequency magnetic field, which is produced by laptop computers. The magnetic field, which is characterized by extremely low frequencies up to 300 Hz is measured due to its hazardous effects to the laptop user s health. The experiment consists of testing 13 different laptop computers in normal operation conditions. The measuring of the magnetic field is performed in the adjacent neighborhood of the laptop computers. The measured data are presented and then classified. The classification is performed by the K-Medians method in order to determine the critical positions of the laptop. At the end, the measured magnetic field values are compared with the critical values suggested by different safety standards. It is shown that some of the laptop computers emit a very strong magnetic field. Hence, they must be used with extreme caution.
This paper presents data analysis from a course on Software Engineering in an effort to identify metrics and techniques that would allow instructor to act proactively and identify patterns of low engagement and inefficient peer collaboration. Over the last two terms, 106 students in their second year of studies formed 20 groups and worked collaboratively to develop video games. Throughout the lab, students have to use a variety of tools for managing and developing their projects, such as software version control, static analysis tools, wikis, mailing lists, etc. The students are also supported by weekly meetings with teaching assistants and instructors regarding group progress, code quality, and management issues. Through these meetings and their interactions with the software tools, students leave a detailed trace of data related to their individual engagement and their collaboration behavior in their groups. The paper provides discussion on the different source of data that can be monitored, and present preliminary results on how these data can be used to analyze students  activity.
This paper is to obtain a simple dividing-diagram of the congressional districts, where the only limit is that each district should contain the same population if possibly. In order to solve this problem, we introduce three different standards of the \"simple\" shape. The first standard is that the final shape of the congressional districts should be of a simplest figure and we apply a modified \"shortest split line algorithm\" where the factor of the same population is considered only. The second standard is that the gerrymandering should ensure the integrity of the current administrative area as the convenience for management. Thus we combine the factor of the administrative area with the first standard, and generate an improved model resulting in the new diagram in which the perimeters of the districts are along the boundaries of some current counties. Moreover, the gerrymandering should consider the geographic features.The third standard is introduced to describe this situation. Finally, it can be proved that the difference between the supporting ratio of a certain party in each district and the average supporting ratio of that particular party in the whole state obeys the Chi-square distribution approximately. Consequently, we can obtain an archetypal formula to check whether the gerrymandering we propose is fair.
There is no doubt that Search Engines are playing a great role in Internet usage. But all the top search engines Google, Yahoo and Bing are having a critical flaw called \"Openness of a Search Engine\". An Internet user should be allowed to get the search results only when requested through Search engine s web page but the user must not be allowed to get the search results when requested through any web page that does not belong to the Search Engine. Only results of a search engine should be available to the Internet user but not the Search Engine. This paper explains the critical flaw called \"Openness of Search Engine\" with a case study on top 3 search engines  Google ,  Yahoo  and  Bing . This paper conducts an attack based test using J2EE framework and proves that  Google  passed the test and it strongly protects its Critical Search System, where  Yahoo  and  Bing  are failed to protect their Search Engines. But previously  Google  also had other high severity issues with the Openness of search engine; this paper reveals those issues also. Finally this paper appeals strongly to the all top Search Engines to fix their critical flaws of \"Openness of Search Engine\".
Among the various types of online language learner collective types, we analyze in this contribution Web 2.0 communities featuring an explicit progression. We use three analysis angles (user roles, pedagogical progression and content) in order to provides leads towards expressing the interrelations between the implementation choices regarding the concepts linked to Web 2.0 and the learning experience of the users.
Pervasive social computing is a promising approach that promises to empower both the individual and the whole and thus candidates itself as a foundation to the \"smarter\" social organizations that our new turbulent and resource-scarce worlds so urgently requires. In this contribution we first identify those that we consider as the major requirements to be fulfilled in order to realize an effective pervasive social computing infrastructure. We then conjecture that our service-oriented community and fractal social organization fulfill those requirements and therefore constitute an effective strategy to design pervasive social computing infrastructures. In order to motivate our conjecture, in this paper we discuss a model of social translucence and discuss fractal social organization as a referral service empowering a social system s parts and whole.
This is the era of Information and Communication Technology (ICT). Nowadays, there is no limit to learn, people can learn anywhere and anytime with the enhancement of technology. Electronic Learning (E-learning) and Mobile Learning (M-learning) are the two vital buzz terms in modern education particularly in Education Enhanced Technology and Technologies Supported Learning. E-learning is defined as the instructional content or learning experience delivered or enabled by electronic technologies whereas, M-learning is defined simply as learning via mobile devices such as cell phones, smart phones, palmtops, and handheld computers. There are many similarities between the two technologies as both are modern learning tools. Moreover, the latter is an extension and a subset of the former. However, there are few limitations or differences still exist in mobile learning tools, especially in the design, development and the technology usability. In this paper we have mainly focused on how the digital content is administrated (Content Management) in these two technologies. Additionally, the content management in E and Mlearning are compared and their similarities and differences are figured out.
Cloud Computing is a paradigm in which information is permanently stored in servers on the Internet and temporarily stored on the user s computer (client) including the desktop. This study aims to design an online sales application based cloud computing technology to help the artisans Palembang songket and do not rule out the possibility for other small medium enterprises (SMEs) to manage assets and market their products online so it can be accessed anytime and anywhere via personal computer, laptop, tabblet, mobile phone or smartphone. Cloud infrastructure used in this study is a Software-as-a-service (SaaS) that enables cloud users to exploit online sales application without having to install on your local computer, set up a dedicated server, operator labor, maintenance costs and other support resources that can make savings in terms of cost.
Mutual information in three (or more) dimensions can be considered as a Triple-Helix indicator of synergy in university-industry-government relations. An open-source routine th4.exe makes the computation of this indicator interactively available at the Internet, and thus applicable to large sets of data. Th4.exe computes all probabilistic entropies and mutual information in two, three, and, if available in the data, four dimensions among, for example, classes such as geographical addresses (cities, regions), technological codes (e.g., OECD s NACE codes), and size categories; or, alternatively, among institutional addresses (academic, industrial, public sector) in document sets. The relations between the Triple-Helix indicator -- as an indicator of synergy -- and the Triple-Helix model that specifies the possibility of feedback by an overlay of communications, are also discussed.
Social and collaborative services have widely spread within the enterprises as they play a part in improving productivity and business outcomes. However, the deployment of these services fluctuates between success and failure. This paper intends to assess their deployment and how they can contribute to value creation in different industries. We investigate the relationship between the services  functionalities and the organizational requirement of these services represented by the coordination. We also consider the organizational transformation driven by servitization and emphasize its impact on the act of coordination. We highlight the tight correlation between the functionalities and the requirement in organic forms which suggests a successful deployment in such enterprises. We nonetheless find that, when the servitization is a strategic intent in organizations with mechanistic characteristics, deploying social and collaborative services can contribute to achieving this aim.
The concept of local self-governance is not new as it has its roots in ancient time even before the era of Mauryan emperors. This paper depicts the journey of local self-governance from antediluvian time to 21st century. Further, in the current scenario Information and Communication Technology (ICT) has emerged as a successful tool for dissemination of various e-governance services and in this regard the Government of India has formulated NeGP with adequate service delivery mechanism. With the inculcation of ICT, various applications were designed by central as well as state governments which lead towards strengthening of PRIs for rural reform. This paper also throws some light on necessity of ICT in self-governance along with some case studies.
This study aimed at identifying the issue, challenges and opportunities from the health consumers in Tanzania towards interoperability of electronic health records. Recognizing that we conducted a study to identify the challenges, issues and opportunities towards health information exchange. The study was conducted in three major cities of Tanzania. This was in order to come up with a clear picture of how to implement some EHRs that will be trusted by health consumers. The participants (n=240) were surveyed on computer usage, EHRs knowledge, demographics, security and privacy issues. A total of 200 surveys were completed and returned (83.3% response rate). 67.5% were women, 62.6% had not heard of EHRs, 73% highly concerned about privacy and security of their information. 75% believed that introduction of various security mechanisms will make EHRs more secure. A number of chi-square tests (p<0.05) showed there was a strong relationship among the variable of age, computer use, EHRs knowledge and concerns for privacy and security. The study showed that there was a small difference of 8.5% between those who think EHRs are safer than paper records and those who think otherwise. The general observation of the study was that in order to make EHRs successful, then the issue of security, and health consumer involvement were two key towards the road of successful EHRs in our hospitals practices and that will make consumers more willing to allow their records to be shared.
E-Commerce challenges traditional approaches to assessing monopolistic practices due to the rapid rate of growth, rapid change in technology, difficulty in assessing market share for information products like web sites, and high degree of interconnectivity and alliance formation among corporations. This paper has provided a fundamental framework that integrates a network and economic perspective to the search engine market. The findings indicate that (1) despite an increasing number of search engines, barriers to entry seem high, largely due to the exponential growth in the number of web sites and the non-scalability of the current search technology and collective switching costs; (2) older search engine sites tend typically to have more features to lock in users. Using standard economic indicators (CR4=58% and HHI=1163), the industry looks close to being plagued by anticompetitive practices. But based on a network adjusted HHI constructed in this paper, its value, 870, suggests that there is less cause for concern. Based on all indicators, it suggests that Yahoo would be a contender. Other possible contenders are MSN and Netscape. On the basis of results to date, some search engines keep increasing their audience reach while others don t. The trend shows that some search engines may dominate the search engine market. We suggest conducting research in the coverage performance of search engines and investigate \"information search cost\" as a performance indicator of search techniques. In addition, we suggest paying attention to any anticompetitive conduct (e.g. product bundling) that may lesson competition and reduce consumer welfare. The combination of network theory and economic theory to study the search engine market is a particularly powerful approach for E-Commerce.
Small and Medium size Enterprises (SME) are considered as a backbone of many developing and developed economies of the world; they are the driving force to any major economy across the globe. Through Cloud Computing firms outsource their entire information technology (IT) process while concentrating more on their core business. It allows businesses to cut down heavy cost incurred over IT infrastructure without losing focus on customer needs. However, Cloud industry to an extent has struggled to grow among SMEs due to the reluctance and concerns expressed by them. Throughout the course of this study several interviews were conducted and the literature was reviewed to understand how cloud providers offer services and what challenges SMEs are facing. The study identified issues like cloud knowledge, interoperability, security and contractual concerns to be hindering SMEs adoption of cloud services. From the interviews common practices followed by cloud vendors and what concerns SMEs have were identified as a basis for a cloud framework which will bridge gaps between cloud vendors and SMEs. A stepwise framework for cloud adoption is formulated which identifies and provides recommendation to four most predominant challenges which are hurting cloud industry and taking SMEs away from cloud computing, as well as guide SMEs aiding in successful cloud adoption. Moreover, this framework streamlines the cloud adoption process for SMEs by removing ambiguity in regards to fundamentals associated with their organisation and cloud adoption process.
Cloud computing in eHealth is an emerging area for only few years. There needs to identify the state of the art and pinpoint challenges and possible directions for researchers and applications developers. Based on this need, we have conducted a systematic review of cloud computing in eHealth. We searched ACM Digital Library, IEEE Xplore, Inspec, ISI Web of Science and Springer as well as relevant open-access journals for relevant articles. A total of 237 studies were first searched, of which 44 papers met the Include Criteria. The studies identified three types of studied areas about cloud computing in eHealth, namely (1) cloud-based eHealth framework design (n=13); (2) applications of cloud computing (n=17); and (3) security or privacy control mechanisms of healthcare data in the cloud (n=14). Most of the studies in the review were about designs and concept-proof. Only very few studies have evaluated their research in the real world, which may indicate that the application of cloud computing in eHealth is still very immature. However, our presented review could pinpoint that a hybrid cloud platform with mixed access control and security protection mechanisms will be a main research area for developing citizen centred home-based healthcare applications.
Researchers look for new virtual instruments that can improve and maximize traditional forms of teaching and learning. In this paper, we present the ARG system, a virtual tool developed to help the teaching/learning process in argumentation theory, especially in the field of Law. ARG was developed based on Araucaria by Reed and Rowe, Room 5 by Ronald P. Loui, as well on systems such as Argue!-System and ArguMed by Bart Verheij. ARG is a platform for online collaboration and applies the theory of Stephen Toulmin to produce arguments that are more concise, precise, minimally structured and more resistant to criticism.
For the past two decades, the discussion regarding the effect of ICT on health systems is becoming apparent. However, past studies have mainly focused on ICT impact on specific social-economic phenomena. Little empirical research on ICT and health systems exists. Many African countries have invested in ICT and there is a need to examine if such investments have impacted on health system of these countries. Using a multi-method approach, data for 27 African countries were analysed. We employed Data Envelopment Analysis, Cluster Analysis and Partial Least Squares to examine the impact. The findings indicate that the 27 countries can be grouped into three clusters based on their relative efficiency scores of ICT and health systems. More compelling, the findings indicate that countries that performed efficiently in ICT inputs also do so in their health systems. Further, findings indicate that ICT significantly improves life expectancy at birth and reduces infant mortality rate. African countries must significantly invest in ICT to improve their health systems so as to achieve socio-economic development. The current study has theoretical, methodological and policy implications.
E-mental health is an area within e-health in which the key role of IS/IT has not been well established. Both clinicians and scholars are uncertain as to the role of IS/IT and its potential benefits. This research review is introduced to assist in understanding the enabling role in e-mental health and it focused on one area of mental health, Attention Deficit Hyperactivity Disorder (ADHD) in university students. ADHD is estimated to affect approximately 6% of university students by negatively impacting students  academic performance and social life; hence, fewer of these students complete their degrees as compared to their peers. This review outlines the potentials of using IS/IT in the treatment of ADHD in university students. It also serves to greatly contribute to e-mental health development and thereby to help to uncover further possibilities of IT/IT to support broad areas within mental health disorders and services.
This paper describes the process of the conception of a software tool of TELE management. The proposed management tool combines information from two sources: i) the automatic reports produced by the Learning Content Management System (LCMS) Blackboard and ii) the views of students and teachers on the use of the LCMS in the process of teaching and learning. The results show that the architecture of the proposed management tool has the features of a management tool, since its potential to control, to reset and to enhance the use of an LCMS in the process of teaching and learning and teacher training, is shown.
This study proposes a conceptual model to link IT capabilities, industry types, and value implications. We attempt to use a contingency analysis to theorize that which types of IT capabilities (e.g., externally-focused, internally-focused, and aggregate IT capability) should a firm develop and then what benefits (e.g., firm value and firm performance) it will gain according to its industry s value creation logic (e.g., value chain-based, value shop-based, and value network-based industry). The empirical findings show that a value network-based firm should develop externally-focused IT capabilities to create its firm value and a value chain-based firm should develop aggregate IT capabilities to improve its firm performance and create its firm value.
There is a multitude of licenses out there for a software developer to choose from, but a lot of programmers would prefer to not have to have a legal degree in order to understand them and would rather just have their code out in the public being used. This paper examines a few of the more popular and common software licenses available and compares their conditions from the perspective that a developer wanted to scratch their proverbial itch, have their code be used and maybe even get credit for it. This paper attempts to clarify which license a developer would benefit from the most if they just want to have their code used, have their name out there and not be sued if anything breaks.
E-learning has been an important policy for education planners for many years in developed countries. This policy has been adopted by education in some developing countries; it is therefore expedient to study its emergence in the Nigerian education system. The birth of contemporary technology shows that there is higher requirement for education even in the work force. This has been an eye opener to importance of Education which conveniently can be achieved through E-learning. This work presents CITADEL E-learning approach to Nigeria institutions; its ubiquity, its implementations, its flexibility, portability, ease of use and feature that are synonymous to the standard of education in Nigeria and how it can be enhanced to improve learning for both educators and learners to help them in their learning endeavour.
We consider the classical mathematical economics problem of {\\em Bayesian optimal mechanism design} where a principal aims to optimize expected revenue when allocating resources to self-interested agents with preferences drawn from a known distribution. In single-parameter settings (i.e., where each agent s preference is given by a single private value for being served and zero for not being served) this problem is solved [Myerson  81]. Unfortunately, these single parameter optimal mechanisms are impractical and rarely employed [Ausubel and Milgrom  06], and furthermore the underlying economic theory fails to generalize to the important, relevant, and unsolved multi-dimensional setting (i.e., where each agent s preference is given by multiple values for each of the multiple services available) [Manelli and Vincent  07]. In contrast to the theory of optimal mechanisms we develop a theory of sequential posted price mechanisms, where agents in sequence are offered take-it-or-leave-it prices. These mechanisms are approximately optimal in single-dimensional settings, and avoid many of the properties that make optimal mechanisms impractical. Furthermore, these mechanisms generalize naturally to give the first known approximations to the elusive optimal multi-dimensional mechanism design problem. In particular, we solve multi-dimensional multi-unit auction problems and generalizations to matroid feasibility constraints. The constant approximations we obtain range from 1.5 to 8. For all but one case, our posted price sequences can be computed in polynomial time.
Internet and graphs are very much related. The graphical structure of internet has been studied extensively to provide efficient solutions to routing and other problems. But most of these studies assume a central authority which controls and manages the internet. In the recent years game theoretic models have been proposed which do not require a central authority and the users are assumed to be routing their flows selfishly. The existence of Nash Equilibria, congestion and the amount of inefficiency caused by this selfish routing is a major concern in this field. A type of paradox in the selfish routing networks, Braess  Paradox, first discovered by Braess, is a major contributor to inefficiency. Several pricing mechanisms have also been provided which give a game theoretical model between users(consumers) and ISPs ({Internet Service Providers} or sellers) for the internet. We propose a novel pricing mechanism, based on real world Internet network architecture, which reduces the severity of Braess  Paradox in selfish routing game theoretic networks. It s a pricing mechanism between combinatorial users and ISPs. We prove that Nash equilibria exists in this network and provide bounds on inefficiency . We use graphical properties of internet to prove our result. Several interesting extensions and future work have also been discussed.
We consider auctions in which greedy algorithms, paired with first-price or critical-price payment rules, are used to resolve multi-parameter combinatorial allocation problems. We study the price of anarchy for social welfare in such auctions. We show for a variety of equilibrium concepts, including Bayes-Nash equilibrium and correlated equilibrium, the resulting price of anarchy bound is close to the approximation factor of the underlying greedy algorithm.
We conducted an experiment where participants played a perfect-information game against a computer, which was programmed to deviate often from its backward induction strategy right at the beginning of the game. Participants knew that in each game, the computer was nevertheless optimizing against some belief about the participant s future strategy. It turned out that in the aggregate, participants were likely to respond in a way which is optimal with respect to their best-rationalization extensive form rationalizability conjecture - namely the conjecture that the computer is after a larger prize than the one it has foregone, even when this necessarily meant that the computer has attributed future irrationality to the participant when the computer made the first move in the game. Thus, it appeared that participants applied forward induction. However, there exist alternative explanations for the choices of most participants; for example, choices could be based on the extent of risk aversion that participants attributed to the computer in the remainder of the game, rather than to the sunk outside option that the computer has already foregone at the beginning of the game. For this reason, the results of the experiment do not yet provide conclusive evidence for Forward Induction reasoning on the part of the participants.
In the framework of finite games in extensive form with perfect information and strict preferences, this paper introduces a new equilibrium concept: the Perfect Prediction Equilibrium (PPE). In the Nash paradigm, rational players consider that the opponent s strategy is fixed while maximizing their payoff. The PPE, on the other hand, models the behavior of agents with an alternate form of rationality that involves a Stackelberg competition with the past. Agents with this form of rationality integrate in their reasoning that they have such accurate logical and predictive skills, that the world is fully transparent: all players share the same knowledge and know as much as an omniscient external observer. In particular, there is common knowledge of the solution of the game including the reached outcome and the thought process leading to it. The PPE is stable given each player s knowledge of its actual outcome and uses no assumptions at unreached nodes. This paper gives the general definition and construction of the PPE as a fixpoint problem, proves its existence, uniqueness and Pareto optimality, and presents two algorithms to compute it. Finally, the PPE is put in perspective with existing literature (Newcomb s Problem, Superrationality, Nash Equilibrium, Subgame Perfect Equilibrium, Backward Induction Paradox, Forward Induction).
We study new classes of games, called zero-sum equivalent games and zero-sum equivalent potential games, and prove decomposition theorems involving these classes of games. We say that two games are \"strategically equivalent\" if, for every player, the payoff differences between two strategies (holding other players  strategies fixed) are identical. A zero-sum equivalent game is a game that is strategically equivalent to a zero-sum game; a zero-sum equivalent potential game is a zero-sum equivalent game that is strategically equivalent to a common interest game. We also call a game \"normalized\" if the sum of one player s payoffs, given the other players  strategies, is always zero. We show that any normal form game can be uniquely decomposed into either (i) a zero-sum equivalent game and a normalized common interest game, or (ii) a zero-sum equivalent potential game, a normalized zero-sum game, and a normalized common interest game, each with distinctive equilibrium properties. For example, we show that two-player zero-sum equivalent games with finite strategy sets generically have a unique Nash equilibrium and that two-player zero-sum equivalent potential games with finite strategy sets generically have a strictly dominant Nash equilibrium.
We study Monte Carlo tree search (MCTS) in zero-sum extensive-form games with perfect information and simultaneous moves. We present a general template of MCTS algorithms for these games, which can be instantiated by various selection methods. We formally prove that if a selection method is $\\epsilon$-Hannan consistent in a matrix game and satisfies additional requirements on exploration, then the MCTS algorithm eventually converges to an approximate Nash equilibrium (NE) of the extensive-form game. We empirically evaluate this claim using regret matching and Exp3 as the selection methods on randomly generated games and empirically selected worst case games. We confirm the formal result and show that additional MCTS variants also converge to approximate NE on the evaluated games.
One of the main results shown through Roughgarden s notions of smooth games and robust price of anarchy is that, for any sum-bounded utilitarian social function, the worst-case price of anarchy of coarse correlated equilibria coincides with that of pure Nash equilibria in the class of weighted congestion games with non-negative and non-decreasing latency functions and that such a value can always be derived through the, so called, smoothness argument. We significantly extend this result by proving that, for a variety of (even non-sum-bounded) utilitarian and egalitarian social functions and for a broad generalization of the class of weighted congestion games with non-negative (and possibly decreasing) latency functions, the worst-case price of anarchy of $\\epsilon$-approximate coarse correlated equilibria still coincides with that of $\\epsilon$-approximate pure Nash equilibria, for any $\\epsilon\\geq 0$. As a byproduct of our proof, it also follows that such a value can always be determined by making use of the primal-dual method we introduced in a previous work. It is important to note that our scenario of investigation is beyond the scope of application of the robust price of anarchy (for as it is currently defined), so that our result seems unlikely to be alternatively proved via the smoothness framework.
A common objective in mechanism design is to choose the outcome (for example, allocation of resources) that maximizes the sum of the agents  valuations, without introducing incentives for agents to misreport their preferences. The class of Groves mechanisms achieves this; however, these mechanisms require the agents to make payments, thereby reducing the agents  total welfare. In this paper we introduce a measure for comparing two mechanisms with respect to the final welfare they generate. This measure induces a partial order on mechanisms and we study the question of finding minimal elements with respect to this partial order. In particular, we say a non-deficit Groves mechanism is welfare undominated if there exists no other non-deficit Groves mechanism that always has a smaller or equal sum of payments. We focus on two domains: (i) auctions with multiple identical units and unit-demand bidders, and (ii) mechanisms for public project problems. In the first domain we analytically characterize all welfare undominated Groves mechanisms that are anonymous and have linear payment functions, by showing that the family of optimal-in-expectation linear redistribution mechanisms, which were introduced in [6] and include the Bailey-Cavallo mechanism [1,2], coincides with the family of welfare undominated Groves mechanisms that are anonymous and linear in the setting we study. In the second domain we show that the classic VCG (Clarke) mechanism is welfare undominated for the class of public project problems with equal participation costs, but is not undominated for a more general class.
In this work we apply methods from cryptography to enable any number of mutually distrusting players to implement broad classes of mediated equilibria of strategic games without the need for trusted mediation. Our implementation makes use of a (standard) pre-play \"cheap talk\" phase, in which players engage in free and non-binding communication prior to playing in the original game. In our cheap talk phase, the players execute a secure multi-party computation protocol to sample an action profile from an equilibrium of a \"cryptographically blinded\" version of the original game, in which actions are encrypted. The essence of our approach is to exploit the power of encryption to selectively restrict the information available to players about sampled action profiles, such that these desirable equilibria can be stably achieved. In contrast to previous applications of cryptography to game theory, this work is the first to employ the paradigm of using encryption to allow players to benefit from hiding information \\emph{from themselves}, rather than from others; and we stress that rational players would \\emph{choose} to hide the information from themselves.
In this paper we study the optimal placement and optimal number of active relay nodes through the traffic density in mobile sensor ad-hoc networks. We consider a setting in which a set of mobile sensor sources is creating data and a set of mobile sensor destinations receiving that data. We make the assumption that the network is massively dense, i.e., there are so many sources, destinations, and relay nodes, that it is best to describe the network in terms of macroscopic parameters, such as their spatial density, rather than in terms of microscopic parameters, such as their individual placements. We focus on a particular physical layer model that is characterized by the following assumptions: i) the nodes must only transport the data from the sources to the destinations, and do not need to sense the data at the sources, or deliver them at the destinations once the data arrive at their physical locations, and ii) the nodes have limited bandwidth available to them, but they use it optimally to locally achieve the network capacity. In this setting, the optimal distribution of nodes induces a traffic density that resembles the electric displacement that will be created if we substitute the sources and destinations with positive and negative charges respectively. The analogy between the two settings is very tight and have a direct interpretation in wireless sensor networks.
We provide a duality-based framework for revenue maximization in a multiple-good monopoly. Our framework shows that every optimal mechanism has a certificate of optimality, taking the form of an optimal transportation map between measures. Using our framework, we prove that grand-bundling mechanisms are optimal if and only if two stochastic dominance conditions hold between specific measures induced by the buyer s type distribution. This result strengthens several results in the literature, where only sufficient conditions for grand-bundling optimality have been provided. As a corollary of our tight characterization of grand-bundling optimality, we show that the optimal mechanism for $n$ independent uniform items each supported on $[c,c+1]$ is a grand-bundling mechanism, as long as $c$ is sufficiently large, extending Pavlov s result for 2 items [Pavlov11]. In contrast, our characterization also implies that, for all $c$ and for all sufficiently large $n$, the optimal mechanism for $n$ independent uniform items supported on $[c,c+1]$ is not a grand bundling mechanism. The necessary and sufficient condition for grand bundling optimality is a special case of our more general characterization result that provides necessary and sufficient conditions for the optimality of an arbitrary mechanism (with a finite menu size) for an arbitrary type distribution.
We consider a selfish variant of the knapsack problem. In our version, the items are owned by agents, and each agent can misrepresent the set of items she owns---either by avoiding reporting some of them (understating), or by reporting additional ones that do not exist (overstating). Each agent s objective is to maximize, within the items chosen for inclusion in the knapsack, the total valuation of her own chosen items. The knapsack problem, in this context, seeks to minimize the worst-case approximation ratio for social welfare at equilibrium. We show that a randomized greedy mechanism has attractive strategic properties: in general, it has a correlated price of anarchy of $2$ (subject to a mild assumption). For overstating-only agents, it becomes strategyproof; we also provide a matching lower bound of $2$ on the (worst-case) approximation ratio attainable by randomized strategyproof mechanisms, and show that no deterministic strategyproof mechanism can provide any constant approximation ratio. We also deal with more specialized environments. For the case of $2$ understating-only agents, we provide a randomized strategyproof $\\frac{5+4\\sqrt{2}}{7} \\approx 1.522$-approximate mechanism, and a lower bound of $\\frac{5\\sqrt{5}-9}{2} \\approx 1.09$. When all agents but one are honest, we provide a deterministic strategyproof $\\frac{1+\\sqrt{5}}{2} \\approx 1.618$-approximate mechanism with a matching lower bound. Finally, we consider a model where agents can misreport their items  properties rather than existence. Specifically, each agent owns a single item, whose value-to-size ratio is publicly known, but whose actual value and size are not. We show that an adaptation of the greedy mechanism is strategyproof and $2$-approximate, and provide a matching lower bound; we also show that no deterministic strategyproof mechanism can provide a constant approximation ratio.
Risk is a well-known turn based board game where the primary objective is nothing less than the world domination. Gameplay is based on battles between armies located in adjacent territories on the map of Earth. The combat s outcome is decided by rolling dice, and therefore a probabilistic approach can be taken. Although several results are derived, the conclusions suggest that the gameplay is highly depending on luck.
In the design and analysis of revenue-maximizing auctions, auction performance is typically measured with respect to a prior distribution over inputs. The most obvious source for such a distribution is past data. The goal is to understand how much data is necessary and sufficient to guarantee near-optimal expected revenue. Our basic model is a single-item auction in which bidders  valuations are drawn independently from unknown and non-identical distributions. The seller is given $m$ samples from each of these distributions \"for free\" and chooses an auction to run on a fresh sample. How large does m need to be, as a function of the number k of bidders and eps > 0, so that a (1 - eps)-approximation of the optimal revenue is achievable? We prove that, under standard tail conditions on the underlying distributions, m = poly(k, 1/eps) samples are necessary and sufficient. Our lower bound stands in contrast to many recent results on simple and prior-independent auctions and fundamentally involves the interplay between bidder competition, non-identical distributions, and a very close (but still constant) approximation of the optimal revenue. It effectively shows that the only way to achieve a sufficiently good constant approximation of the optimal revenue is through a detailed understanding of bidders  valuation distributions. Our upper bound is constructive and applies in particular to a variant of the empirical Myerson auction, the natural auction that runs the revenue-maximizing auction with respect to the empirical distributions of the samples. Our sample complexity lower bound depends on the set of allowable distributions, and to capture this we introduce alpha-strongly regular distributions, which interpolate between the well-studied classes of regular (alpha = 0) and MHR (alpha = 1) distributions. We give evidence that this definition is of independent interest.
We study the classic setting of envy-free pricing, in which a single seller chooses prices for its many items, with the goal of maximizing revenue once the items are allocated. Despite the large body of work addressing such settings, most versions of this problem have resisted good approximation factors for maximizing revenue; this is true even for the classic unit-demand case. In this paper we study envy-free pricing with unit-demand buyers, but unlike previous work we focus on large markets: ones in which the demand of each buyer is infinitesimally small compared to the size of the overall market. We assume that the buyer valuations for the items they desire have a nice (although reasonable) structure, i.e., that the aggregate buyer demand has a monotone hazard rate and that the values of every buyer type come from the same support. For such large markets, our main contribution is a 1.88 approximation algorithm for maximizing revenue, showing that good pricing schemes can be computed when the number of buyers is large. We also give a (e,2)-bicriteria algorithm that simultaneously approximates both maximum revenue and welfare, thus showing that it is possible to obtain both good revenue and welfare at the same time. We further generalize our results by relaxing some of our assumptions, and quantify the necessary tradeoffs between revenue and welfare in our setting. Our results are the first known approximations for large markets, and crucially rely on new lower bounds which we prove for the revenue-maximizing prices.
Vickrey-Clarke-Groves (VCG) mechanisms are often used to allocate tasks to selfish and rational agents. VCG mechanisms are incentive compatible, direct mechanisms that are efficient (i.e., maximise social utility) and individually rational (i.e., agents prefer to join rather than opt out). However, an important assumption of these mechanisms is that the agents will \"always\" successfully complete their allocated tasks. Clearly, this assumption is unrealistic in many real-world applications, where agents can, and often do, fail in their endeavours. Moreover, whether an agent is deemed to have failed may be perceived differently by different agents. Such subjective perceptions about an agents probability of succeeding at a given task are often captured and reasoned about using the notion of \"trust\". Given this background, in this paper we investigate the design of novel mechanisms that take into account the trust between agents when allocating tasks. Specifically, we develop a new class of mechanisms, called \"trust-based mechanisms\", that can take into account multiple subjective measures of the probability of an agent succeeding at a given task and produce allocations that maximise social utility, whilst ensuring that no agent obtains a negative utility. We then show that such mechanisms pose a challenging new combinatorial optimisation problem (that is NP-complete), devise a novel representation for solving the problem, and develop an effective integer programming solution (that can solve instances with about 2x10^5 possible allocations in 40 seconds).
We study the problem of selling a resource through an auction mechanism. The winning buyer in turn develops this resource to generate profit. Two forms of payment are considered: charging the winning buyer a one-time payment, or an initial payment plus a profit sharing contract (PSC). We consider a symmetric interdependent values model with risk averse or risk neutral buyers and a risk neutral seller. For the second price auction and the English auction, we show that the seller s expected total revenue from the auction where he also takes a fraction of the positive profit is higher than the expected revenue from the auction with only a one-time payment. Moreover, the seller can generate an even higher expected total revenue if, in addition to taking a fraction of the positive profit, he also takes the same fraction of any loss incurred from developing the resource. Moving beyond simple PSCs, we show that the auction with a PSC from a very general class generates higher expected total revenue than the auction with only a one-time payment. Finally, we show that suitable PSCs provide higher expected total revenue than a one-time payment even when the incentives of the winning buyer to develop the resource must be addressed by the seller.
Given a rank-1 bimatrix game (A,B), i.e., where rank(A+B)=1, we construct a suitable linear subspace of the rank-1 game space and show that this subspace is homeomorphic to its Nash equilibrium correspondence. Using this homeomorphism, we give the first polynomial time algorithm for computing an exact Nash equilibrium of a rank-1 bimatrix game. This settles an open question posed in Kannan and Theobald (SODA 2007) and Theobald (2007). In addition, we give a novel algorithm to enumerate all the Nash equilibria of a rank-1 game and show that a similar technique may also be applied for finding a Nash equilibrium of any bimatrix game. This technique also proves the existence, oddness and the index theorem of Nash equilibria in a bimatrix game. Further, we extend the rank-1 homeomorphism result to a fixed rank game space, and give a fixed point formulation on $[0,1]^k$ for solving a rank-k game. The homeomorphism and the fixed point formulation are piece-wise linear and considerably simpler than the classical constructions.
Assignment games represent a tractable yet versatile model of two-sided markets with transfers. We study the likely properties of the core of randomly generated assignment games. If the joint productivities of every firm and worker are i.i.d bounded random variables, then with high probability all workers are paid roughly equal wages, and all firms make similar profits. This implies that core allocations vary significantly in balanced markets, but that there is core convergence in even slightly unbalanced markets. For the benchmark case of uniform distribution, we provide a tight bound for the workers  share of the surplus under the firm-optimal core allocation. We present simulation results suggesting that the phenomena analyzed appear even in medium-sized markets. Finally, we briefly discuss the effects of unbounded distributions and the ways in which they may affect wage dispersion.
Recent work has constructed economic mechanisms that are both truthful and differentially private. In these mechanisms, privacy is treated separately from the truthfulness; it is not incorporated in players  utility functions (and doing so has been shown to lead to non-truthfulness in some cases). In this work, we propose a new, general way of modelling privacy in players  utility functions. Specifically, we only assume that if an outcome $o$ has the property that any report of player $i$ would have led to $o$ with approximately the same probability, then $o$ has small privacy cost to player $i$. We give three mechanisms that are truthful with respect to our modelling of privacy: for an election between two candidates, for a discrete version of the facility location problem, and for a general social choice problem with discrete utilities (via a VCG-like mechanism). As the number $n$ of players increases, the social welfare achieved by our mechanisms approaches optimal (as a fraction of $n$).
We consider Pareto-optimal matchings (POMs) in a many-to-many market of applicants and courses where applicants have preferences, which may include ties, over individual courses and lexicographic preferences over sets of courses. Since this is the most general setting examined so far in the literature, our work unifies and generalizes several known results. Specifically, we characterize POMs and introduce the \\emph{Generalized Serial Dictatorship Mechanism with Ties (GSDT)} that effectively handles ties via properties of network flows. We show that GSDT can generate all POMs using different priority orderings over the applicants, but it satisfies truthfulness only for certain such orderings. This shortcoming is not specific to our mechanism; we show that any mechanism generating all POMs in our setting is prone to strategic manipulation. This is in contrast to the one-to-one case (with or without ties), for which truthful mechanisms generating all POMs do exist.
We investigate the complexity of bounding the uncertainty of graphical games, and we provide new insight into the intrinsic difficulty of computing Nash equilibria. In particular, we show that, if one adds very simple and natural additional requirements to a graphical game, the existence of Nash equilibria is no longer guaranteed, and computing an equilibrium is an intractable problem. Moreover, if stronger equilibrium conditions are required for the game, we get hardness results for the second level of the polynomial hierarchy. Our results offer a clear picture of the complexity of mixed Nash equilibria in graphical games, and answer some open research questions posed by Conitzer and Sandholm (2003).
Nash equilibrium (NE) assumes that players always make a best response. However, this is not always true; sometimes people cooperate even it is not a best response to do so. For example, in the Prisoner s Dilemma, people often cooperate. Are there rules underlying cooperative behavior? In an effort to answer this question, we propose a new equilibrium concept: perfect cooperative equilibrium (PCE), and two related variants: max-PCE and cooperative equilibrium. PCE may help explain players  behavior in games where cooperation is observed in practice. A player s payoff in a PCE is at least as high as in any NE. However, a PCE does not always exist. We thus consider {\\alpha}-PCE, where {\\alpha} takes into account the degree of cooperation; a PCE is a 0-PCE. Every game has a Pareto-optimal max-PCE (M-PCE); that is, an {\\alpha}-PCE for a maximum {\\alpha}. We show that M-PCE does well at predicting behavior in quite a few games of interest. We also consider cooperative equilibrium (CE), another generalization of PCE that takes punishment into account. Interestingly, all Pareto-optimal M-PCE are CE. We prove that, in 2-player games, a PCE (if it exists), a M-PCE, and a CE can all be found in polynomial time using bilinear programming. This is a contrast to Nash equilibrium, which is PPAD complete even in 2-player games [Chen, Deng, and Teng 2009]. We compare M-PCE to the coco value [Kalai and Kalai 2009], another solution concept that tries to capture cooperation, both axiomatically and in terms of an algebraic characterization, and show that the two are closely related, despite their very different definitions.
Blackwell approachability, regret minimization and calibration are three criteria evaluating a strategy (or an algorithm) in different sequential decision problems, or repeated games between a player and Nature. Although they have at first sight nothing in common, links between have been discovered: both consistent and calibrated strategies can be constructed by following, in some auxiliary game, an approachability strategy. We gathered famous or recent results and provide new ones in order to develop and generalize Blackwell s elegant theory. The final goal is to show how it can be used as a basic powerful tool to exhibit a new class of intuitive algorithms, based on simple geometric properties. In order to be complete, we also prove that approachability can be seen as a byproduct of the very existence of consistent or calibrated strategies.
We consider bargaining problems which involve two participants, with a nonempty closed, bounded convex bargaining set of points in the real plane representing all realizable bargains. We also assume that there is no definite threat or disagreement point which will provide the default bargain if the players cannot agree on some point in the bargaining set. However, there is a nondeterministic threat: if the players fail to agree on a bargain, one of them will be chosen at random with equal probability, and that chosen player will select any realizable bargain as the solution, subject to a reasonable restriction.
We consider the problem of budget feasible mechanism design proposed by Singer (2010), but in a Bayesian setting. A principal has a public value for hiring a subset of the agents and a budget, while the agents have private costs for being hired. We consider both additive and submodular value functions of the principal. We show that there are simple, practical, ex post budget balanced posted pricing mechanisms that approximate the value obtained by the Bayesian optimal mechanism that is budget balanced only in expectation. A main motivating application for this work is the crowdsourcing large projects, e.g., on Mechanical Turk, where workers are drawn from a large population and posted pricing is standard. Our analysis methods relate to contention resolution schemes in submodular optimization of Vondrak et al. (2011) and the correlation gap analysis of Yan (2011).
Sponsored search involves running an auction among advertisers who bid in order to have their ad shown next to search results for specific keywords. Currently, the most popular auction for sponsored search is the \"Generalized Second Price\" (GSP) auction in which advertisers are assigned to slots in the decreasing order of their \"score,\" which is defined as the product of their bid and click-through rate. In the past few years, there has been significant research on the game-theoretic issues that arise in an advertiser s interaction with the mechanism as well as possible redesigns of the mechanism, but this ranking order has remained standard. From a search engine s perspective, the fundamental question is: what is the best assignment of advertisers to slots? Here \"best\" could mean \"maximizing user satisfaction,\" \"most efficient,\" \"revenue-maximizing,\" \"simplest to interact with,\" or a combination of these. To answer this question we need to understand the behavior of a search engine user when she sees the displayed ads, since that defines the commodity the advertisers are bidding on, and its value. Most prior work has assumed that the probability of a user clicking on an ad is independent of the other ads shown on the page. We propose a simple Markovian user model that does not make this assumption. We then present an algorithm to determine the most efficient assignment under this model, which turns out to be different than that of GSP. A truthful auction then follows from an application of the Vickrey-Clarke-Groves (VCG) mechanism. Further, we show that our assignment has many of the desirable properties of GSP that makes bidding intuitive. At the technical core of our result are a number of insights about the structure of the optimal assignment.
We consider the multi-unit random assignment problem in which agents express preferences over objects and objects are allocated to agents randomly based on the preferences. The most well-established preference relation to compare random allocations of objects is stochastic dominance (SD) which also leads to corresponding notions of envy-freeness, efficiency, and weak strategyproofness. We show that there exists no rule that is anonymous, neutral, efficient and weak strategyproof. For single-unit random assignment, we show that there exists no rule that is anonymous, neutral, efficient and weak group-strategyproof. We then study a generalization of the PS (probabilistic serial) rule called multi-unit-eating PS and prove that multi-unit-eating PS satisfies envy-freeness, weak strategyproofness, and unanimity.
We analyze cooperative Cournot games with boundedly rational firms. Due to cogni- tive constraints, the members of a coalition cannot accurately predict the coalitional structure of the non-members. Thus, they compute their value using simple heuris- tics. In particular, they assign various non-equilibrium probability distributions over the outsiders  set of partitions. We construct the characteristic function of a coalition in such an environment and we analyze the core of the corresponding games. We show that the core is non-empty provided the number of firms in the market is sufficiently large. Moreover, we show that if two distributions over the set of partitions are related via first-order dominance, then the core of the game under the dominated distribution is a subset of the core under the dominant distribution.
In considering the college admissions problem, almost fifty years ago, Gale and Shapley came up with a simple abstraction based on preferences of students and colleges. They introduced the concept of stability and optimality; and proposed the deferred acceptance (DA) algorithm that is proven to lead to a stable and optimal solution. This algorithm is simple and computationally efficient. Furthermore, in subsequent studies it is shown that the DA algorithm is also strategy-proof, which means, when the algorithm is played out as a mechanism for matching two sides (e.g. colleges and students), the parties (colleges or students) have no incentives to act other than according to their true preferences. Yet, in practical college admission systems, the DA algorithm is often not adopted. Instead, an algorithm known as the Boston Mechanism (BM) or its variants are widely adopted. In BM, colleges accept students without deferral (considering other colleges  decisions), which is exactly the opposite of Gale-Shapley s DA algorithm. To explain and rationalize this reality, we introduce the notion of reciprocating preference to capture the influence of a student s interest on a college s decision. This model is inspired by the actual mechanism used to match students to universities in Hong Kong. The notion of reciprocating preference defines a class of matching algorithms, allowing different degrees of reciprocating preferences by the students and colleges. DA and BM are but two extreme cases (with zero and a hundred percent reciprocation) of this set. This model extends the notion of stability and optimality as well. As in Gale-Shapley s original paper, we discuss how the analogy can be carried over to the stable marriage problem, thus demonstrating the model s general applicability.
We consider turn-based game arenas for which we investigate uniformity properties of strategies. These properties involve bundles of plays, that arise from some semantical motive. Typically, we can represent constraints on allowed strategies, such as being observation-based. We propose a formal language to specify uniformity properties and demonstrate its relevance by rephrasing various known problems from the literature. Note that the ability to correlate different plays cannot be achieved by any branching-time logic if not equipped with an additional modality, so-called R in this contribution. We also study an automated procedure to synthesize strategies subject to a uniformity property, which strictly extends existing results based on, say standard temporal logics. We exhibit a generic solution for the synthesis problem provided the bundles of plays rely on any binary relation definable by a finite state transducer. This solution yields a non-elementary procedure.
In this paper we study variations of the standard Hotelling-Downs model of spatial competition, where each agent attracts the clients in a restricted neighborhood, each client randomly picks one attractive agent for service. Two utility functions for agents are considered: support utility and winner utility. We generalize the results by Feldman et al. to the case where the clients are distributed arbitrarily. In the support utility setting, we show that a pure Nash equilibrium always exists by formulating the game as a potential game. In the winner utility setting, we show that there exists a Nash equilibrium in two cases: when there are at most 3 agents and when the size of attraction area is at least half of the entire space. We also consider the price of anarchy and the fairness of equilibria and give tight bounds on these criteria.
Sponsored Search Auctions (SSAs) arguably represent the problem at the intersection of computer science and economics with the deepest applications in real life. Within the realm of SSAs, the study of the effects that showing one ad has on the other ads, a.k.a. externalities in economics, is of utmost importance and has so far attracted the attention of much research. However, even the basic question of modeling the problem has so far escaped a definitive answer. The popular cascade model is arguably too idealized to really describe the phenomenon yet it allows a good comprehension of the problem. Other models, instead, describe the setting more adequately but are too complex to permit a satisfactory theoretical analysis. In this work, we attempt to get the best of both approaches: firstly, we define a number of general mathematical formulations for the problem in the attempt to have a rich description of externalities in SSAs and, secondly, prove a host of results drawing a nearly complete picture about the computational complexity of the problem. We complement these approximability results with some considerations about mechanism design in our context.
We study the problem of a buyer (aka auctioneer) who gains stochastic rewards by procuring multiple units of a service or item from a pool of heterogeneous strategic agents. The reward obtained for a single unit from an allocated agent depends on the inherent quality of the agent; the agent s quality is fixed but unknown. Each agent can only supply a limited number of units (capacity of the agent). The costs incurred per unit and capacities are private information of the agents. The auctioneer is required to elicit costs as well as capacities (making the mechanism design bidimensional) and further, learn the qualities of the agents as well, with a view to maximize her utility. Motivated by this, we design a bidimensional multi-armed bandit procurement auction that seeks to maximize the expected utility of the auctioneer subject to incentive compatibility and individual rationality while simultaneously learning the unknown qualities of the agents. We first assume that the qualities are known and propose an optimal, truthful mechanism 2D-OPT for the auctioneer to elicit costs and capacities. Next, in order to learn the qualities of the agents in addition, we provide sufficient conditions for a learning algorithm to be Bayesian incentive compatible and individually rational. We finally design a novel learning mechanism, 2D-UCB that is stochastic Bayesian incentive compatible and individually rational.
We study an abstract optimal auction problem for a single good or service. This problem includes environments where agents have budgets, risk preferences, or multi-dimensional preferences over several possible configurations of the good (furthermore, it allows an agent s budget and risk preference to be known only privately to the agent). These are the main challenge areas for auction theory. A single-agent problem is to optimize a given objective subject to a constraint on the maximum probability with which each type is allocated, a.k.a., an allocation rule. Our approach is a reduction from multi-agent mechanism design problem to collection of single-agent problems. We focus on maximizing revenue, but our results can be applied to other objectives (e.g., welfare). An optimal multi-agent mechanism can be computed by a linear/convex program on interim allocation rules by simultaneously optimizing several single-agent mechanisms subject to joint feasibility of the allocation rules. For single-unit auctions, Border \\citeyearpar{B91} showed that the space of all jointly feasible interim allocation rules for $n$ agents is a $\\NumTypes$-dimensional convex polytope which can be specified by $2^\\NumTypes$ linear constraints, where $\\NumTypes$ is the total number of all agents  types. Consequently, efficiently solving the mechanism design problem requires a separation oracle for the feasibility conditions and also an algorithm for ex-post implementation of the interim allocation rules. We show that the polytope of jointly feasible interim allocation rules is the projection of a higher dimensional polytope which can be specified by only $O(\\NumTypes^2)$ linear constraints. Furthermore, our proof shows that finding a preimage of the interim allocation rules in the higher dimensional polytope immediately gives an ex-post implementation.
Online double auctions (DAs) model a dynamic two-sided matching problem with private information and self-interest, and are relevant for dynamic resource and task allocation problems. We present a general method to design truthful DAs, such that no agent can benefit from misreporting its arrival time, duration, or value. The family of DAs is parameterized by a pricing rule, and includes a generalization of McAfee s truthful DA to this dynamic setting. We present an empirical study, in which we study the allocative-surplus and agent surplus for a number of different DAs. Our results illustrate that dynamic pricing rules are important to provide good market efficiency for markets with high volatility or low volume.
A single advertisement often benefits many parties, for example, an ad for a Samsung laptop benefits Microsoft. We study this phenomenon in search advertising auctions and show that standard solutions, including the status quo ignorance of mutual benefit and a benefit-aware Vickrey-Clarke-Groves mechanism, perform poorly. In contrast, we show that an appropriate first-price auction has nice equilibria in a single-slot ad auction --- all equilibria that satisfy a natural cooperative envy-freeness condition select the welfare-maximizing ad and satisfy an intuitive lower-bound on revenue.
We consider the general problem of resource sharing in societal networks, consisting of interconnected communication, transportation, energy and other networks important to the functioning of society. Participants in such network need to take decisions daily, both on the quantity of resources to use as well as the periods of usage. With this in mind we discuss the problem of incentivizing users to behave in such a way that society as a whole benefits. In order to perceive societal level impact such incentives may take the form of rewarding users with lottery tickets based on good behavior, and periodically conducting a lottery to translate these tickets into real rewards. We will pose the user decision problem as a mean field game (MFG), and the incentives question as one of trying to select a good mean field equilibrium (MFE). In such a framework, each agent (a participant in the societal network) takes a decision based on an assumed distribution of actions of his/her competitors, and the incentives provided by the social planner. The system is said to be at MFE if the agent s action is a sample drawn from the assumed distribution. We will show the existence of such an MFE under different settings, and also illustrate how to choose an attractive equilibrium using as an example demand-response in energy networks.
We consider reallocation problems in settings where the initial endowment of each agent consists of a subset of the resources. The private information of the players is their value for every possible subset of the resources. The goal is to redistribute resources among agents to maximize efficiency. Monetary transfers are allowed, but participation is voluntary. We develop incentive-compatible, individually-rational and budget balanced mechanisms for several classic settings, including bilateral trade, partnership dissolving, Arrow-Debreu markets, and combinatorial exchanges. All our mechanisms (except one) provide a constant approximation to the optimal efficiency in these settings, even in ones where the preferences of the agents are complex multi-parameter functions.
Recently, Apt and Markakis introduced a model for product adoption in social networks with multiple products, where the agents, influenced by their neighbours, can adopt one out of several alternatives (products). To analyze these networks we introduce social network games in which product adoption is obligatory. We show that when the underlying graph is a simple cycle, there is a polynomial time algorithm allowing us to determine whether the game has a Nash equilibrium. In contrast, in the arbitrary case this problem is NP-complete. We also show that the problem of determining whether the game is weakly acyclic is co-NP hard. Using these games we analyze various types of paradoxes that can arise in the considered networks. One of them corresponds to the well-known Braess paradox in congestion games. In particular, we show that social networks exist with the property that by adding an additional product to a specific node, the choices of the nodes will unavoidably evolve in such a way that everybody is strictly worse off.
We study a generalisation of sabotage games, a model of dynamic network games introduced by van Benthem. The original definition of the game is inherently finite and therefore does not allow one to model infinite processes. We propose an extension of the sabotage games in which the first player (Runner) traverses an arena with dynamic weights determined by the second player (Saboteur). In our model of quantitative sabotage games, Saboteur is now given a budget that he can distribute amongst the edges of the graph, whilst Runner attempts to minimise the quantity of budget witnessed while completing his task. We show that, on the one hand, for most of the classical cost functions considered in the literature, the problem of determining if Runner has a strategy to ensure a cost below some threshold is EXPTIME-complete. On the other hand, if the budget of Saboteur is fixed a priori, then the problem is in PTIME for most cost functions. Finally, we show that restricting the dynamics of the game also leads to better complexity.
We give an example of a three person chess-like game that has no Nash equilibrium in pure stationary strategies. The game has seven positions, four outcomes (a unique cycle and three terminal positions), and its normal form is of size 2 x 2 x 4 only. Thus, our example strengthens significantly the one obtained in 2014 by Gurvich and Oudalov, which has four players, five terminals, and 2 x 4 x 6 x 8 normal form. Due to its small size, we can strengthen our new example further, by showing that it has no Nash equilibrium not only in pure but also in independently mixed strategies, for both Markov and a priori realizations.
The $\\varepsilon$-well-supported Nash equilibrium is a strong notion of approximation of a Nash equilibrium, where no player has an incentive greater than $\\varepsilon$ to deviate from any of the pure strategies that she uses in her mixed strategy. The smallest constant $\\varepsilon$ currently known for which there is a polynomial-time algorithm that computes an $\\varepsilon$-well-supported Nash equilibrium in bimatrix games is slightly below $2/3$. In this paper we study this problem for symmetric bimatrix games and we provide a polynomial-time algorithm that gives a $(1/2+\\delta)$-well-supported Nash equilibrium, for an arbitrarily small positive constant $\\delta$.
Quantization becomes a new way to study classical game theory since quantum strategies and quantum games have been proposed. In previous studies, many typical game models, such as prisoner s dilemma, battle of the sexes, Hawk-Dove game, have been investigated by using quantization approaches. In this paper, several game models of opinion formations have been quantized based on the Marinatto-Weber quantum game scheme, a frequently used scheme to convert classical games to quantum versions. Our results show that the quantization can change fascinatingly the properties of some classical opinion formation game models so as to generate win-win outcomes.
In quasi-proportional auctions, each bidder receives a fraction of the allocation equal to the weight of their bid divided by the sum of weights of all bids, where each bid s weight is determined by a weight function. We study the relationship between the weight function, bidders  private values, number of bidders, and the seller s revenue in equilibrium. It has been shown that if one bidder has a much higher private value than the others, then a nearly flat weight function maximizes revenue. Essentially, threatening the bidder who has the highest valuation with having to share the allocation maximizes the revenue. We show that as bidder private values approach parity, steeper weight functions maximize revenue by making the quasi-proportional auction more like a winner-take-all auction. We also show that steeper weight functions maximize revenue as the number of bidders increases. For flatter weight functions, there is known to be a unique pure-strategy Nash equilibrium. We show that a pure-strategy Nash equilibrium also exists for steeper weight functions, and we give lower bounds for bids at an equilibrium. For a special case that includes the two-bidder auction, we show that the pure-strategy Nash equilibrium is unique, and we show how to compute the revenue at equilibrium. We also show that selecting a weight function based on private value ratios and number of bidders is necessary for a quasi-proportional auction to produce more revenue than a second-price auction.
Peer-To-Peer (P2P) networks are self-organizing, distributed systems, with no centralized authority or infrastructure. Because of the voluntary participation, the availability of resources in a P2P system can be highly variable and unpredictable. In this paper, we use ideas from Game Theory to study the interaction of strategic and rational peers, and propose a differential service-based incentive scheme to improve the system s performance.
Optimal stopping theory is a powerful tool for analyzing scenarios such as online auctions in which we generally require optimizing an objective function over the space of stopping rules for an allocation process under uncertainty. Perhaps the most classic problems of stopping theory are the prophet inequality problem and the secretary problem. The classical prophet inequality states that by choosing the same threshold OPT/2 for every step, one can achieve the tight competitive ratio of 0.5. On the other hand, for the basic secretary problem, the optimal strategy achieves the tight competitive ratio of 1/e. In this paper, we introduce Prophet Secretary, a natural combination of the prophet inequality and the secretary problems. An example motivation for our problem is as follows. Consider a seller that has an item to sell on the market to a set of arriving customers. The seller knows the types of customers that may be interested in the item and he has a price distribution for each type: the price offered by a customer of a type is anticipated to be drawn from the corresponding distribution. However, the customers arrive in a random order. Upon the arrival of a customer, the seller makes an irrevocable decision whether to sell the item at the offered price. We address the question of finding a strategy for selling the item at a high price. We show that by using a uniform threshold one cannot break the 0.5 barrier. However, we show that i) using n distinct non-adaptive thresholds one can obtain a competitive ratio that goes to (1-1/e) as n grows; and ii) no online algorithm can achieve a competitive ratio better than 0.75. Our results improve the (asymptotic) approximation guarantee of single-item sequential posted pricing mechanisms from 0.5 to (1-1/e) when the order of agents (customers) is chosen randomly.
Prediction markets are often used as mechanisms to aggregate information about a future event, for example, whether a candidate will win an election. The event is typically assumed to be exogenous. In reality, participants may influence the outcome, and therefore (1) running the prediction market could change the incentives of participants in the process that creates the outcome (for example, agents may want to change their vote in an election), and (2) simple results such as the myopic incentive compatibility of proper scoring rules no longer hold in the prediction market itself. We introduce a model of games of this kind, where agents first trade in a prediction market and then take an action that influences the market outcome. Our two-stage two-player model, despite its simplicity, captures two aspects of real-world prediction markets: (1) agents may directly influence the outcome, (2) some of the agents instrumental in deciding the outcome may not take part in the prediction market. We show that this game has two different types of perfect Bayesian equilibria, which we term LPP and HPP, depending on the values of the belief parameters: in the LPP domain, equilibrium prices reveal expected market outcomes conditional on the participants  private information, whereas HPP equilibria are collusive -- participants effectively coordinate in an uninformative and untruthful way.
We consider the assignment problem in which agents express ordinal preferences over $m$ objects and the objects are allocated to the agents based on the preferences. In a recent paper, Brams, Kilgour, and Klamler (2014) presented the AL method to compute an envy-free assignment for two agents. The AL method crucially depends on the assumption that agents have strict preferences over objects. We generalize the AL method to the case where agents may express indifferences and prove the axiomatic properties satisfied by the algorithm. As a result of the generalization, we also get a $O(m)$ speedup on previous algorithms to check whether a complete envy-free assignment exists or not. Finally, we show that unless P=NP, there can be no polynomial-time extension of GAL to the case of arbitrary number of agents.
People often interact repeatedly: with relatives, through file sharing, in politics, etc. Many such interactions are reciprocal: reacting to the actions of the other. In order to facilitate decisions regarding reciprocal interactions, we analyze the development of reciprocation over time. To this end, we propose a model for such interactions that is simple enough to enable formal analysis, but is sufficient to predict how such interactions will evolve. Inspired by existing models of international interactions and arguments between spouses, we suggest a model with two reciprocating attitudes where an agent s action is a weighted combination of the others  last actions (reacting) and either i) her innate kindness, or ii) her own last action (inertia). We analyze a network of repeatedly interacting agents, each having one of these attitudes, and prove that their actions converge to specific limits. Convergence means that the interaction stabilizes, and the limits indicate the behavior after the stabilization. For two agents, we describe the interaction process and find the limit values. For a general connected network, we find these limit values if all the agents employ the second attitude, and show that the agents  actions then all become equal. In the other cases, we study the limit values using simulations. We discuss how these results predict the development of the interaction and can be used to help agents decide on their behavior.
As we show by using notions of equilibrium in infinite sequential games, crashes or financial escalations are rational for economic or environmental agents, who have a vision of an infinite world. This contradicts a picture of a self-regulating, wise and pacific economic world. In other words, in this context, equilibrium is not synonymous of stability. We try to draw, from this statement, methodological consequences and new ways of thinking, especially in economic game theory. Among those new paths, coinduction is the basis of our reasoning in infinite games.
Considering congestion games with uncertain delays, we compute the inefficiency introduced in network routing by risk-averse agents. At equilibrium, agents may select paths that do not minimize the expected latency so as to obtain lower variability. A social planner, who is likely to be more risk neutral than agents because it operates at a longer time-scale, quantifies social cost with the total expected delay along routes. From that perspective, agents may make suboptimal decisions that degrade long-term quality. We define the {\\em price of risk aversion} (PRA) as the worst-case ratio of the social cost at a risk-averse Wardrop equilibrium to that where agents are risk-neutral. For networks with general delay functions and a single source-sink pair, we show that the PRA depends linearly on the agents  risk tolerance and on the degree of variability present in the network. In contrast to the {\\em price of anarchy}, in general the PRA increases when the network gets larger but it does not depend on the shape of the delay functions. To get this result we rely on a combinatorial proof that employs alternating paths that are reminiscent of those used in max-flow algorithms. For {\\em series-parallel} (SP) graphs, the PRA becomes independent of the network topology and its size. As a result of independent interest, we prove that for SP networks with deterministic delays, Wardrop equilibria {\\em maximize} the shortest-path objective among all feasible flows.
Demand-side management (DSM) has emerged as an important smart grid feature that allows utility companies to maintain desirable grid loads. However, the success of DSM is contingent on active customer participation. Indeed, most existing DSM studies are based on game-theoretic models that assume customers will act rationally and will voluntarily participate in DSM. In contrast, in this paper, the impact of customers  subjective behavior on each other s DSM decisions is explicitly accounted for. In particular, a noncooperative game is formulated between grid customers in which each customer can decide on whether to participate in DSM or not. In this game, customers seek to minimize a cost function that reflects their total payment for electricity. Unlike classical game-theoretic DSM studies which assume that customers are rational in their decision-making, a novel approach is proposed, based on the framework of prospect theory (PT), to explicitly incorporate the impact of customer behavior on DSM decisions. To solve the proposed game under both conventional game theory and PT, a new algorithm based on fictitious player is proposed using which the game will reach an epsilon-mixed Nash equilibrium. Simulation results assess the impact of customer behavior on demand-side management. In particular, the overall participation level and grid load can depend significantly on the rationality level of the players and their risk aversion tendency.
Computational and economic results suggest that social welfare maximization and combinatorial auction design are much easier when bidders  valuations satisfy the \"gross substitutes\" condition. The goal of this paper is to evaluate rigorously the folklore belief that the main take-aways from these results remain valid in settings where the gross substitutes condition holds only approximately. We show that for valuations that pointwise approximate a gross substitutes valuation (in fact even a linear valuation), optimal social welfare cannot be approximated to within a subpolynomial factor and demand oracles cannot be simulated using a subexponential number of value queries. We then provide several positive results by imposing additional structure on the valuations (beyond gross substitutes), using a more stringent notion of approximation, and/or using more powerful oracle access to the valuations. For example, we prove that the performance of the greedy algorithm degrades gracefully for near-linear valuations with approximately decreasing marginal values, that with demand queries, approximate welfare guarantees for XOS valuations degrade gracefully for valuations that are pointwise close to XOS, and that the performance of the Kelso-Crawford auction degrades gracefully for valuations that are close to various subclasses of gross substitutes valuations.
In this paper we study resource allocation in decentralized information local public good networks. A network is a local public good network if each user s actions directly affect the utility of an arbitrary subset of network users. We consider networks where each user knows only that part of the network that either affects or is affected by it. Furthermore, each user s utility and action space are its private information, and each user is a self utility maximizer. This network model is motivated by several applications including wireless communications and online advertising. For this network model we formulate a decentralized resource allocation problem and develop a decentralized resource allocation mechanism (game form) that possesses the following properties: (i) All Nash equilibria of the game induced by the mechanism result in allocations that are optimal solutions of the corresponding centralized resource allocation problem (Nash implementation). (ii) All users voluntarily participate in the allocation process specified by the mechanism (individual rationality). (iii) The mechanism results in budget balance at all Nash equilibria and off equilibrium.
We study probabilistic single-item second-price auctions where the item is characterized by a set of attributes. The auctioneer knows the actual instantiation of all the attributes, but he may choose to reveal only a subset of these attributes to the bidders. Our model is an abstraction of the following Ad auction scenario. The website (auctioneer) knows the demographic information of its impressions, and this information is in terms of a list of attributes (e.g., age, gender, country of location). The website may hide certain attributes from its advertisers (bidders) in order to create thicker market, which may lead to higher revenue. We study how to hide attributes in an optimal way. We show that it is NP-hard to solve for the optimal attribute hiding scheme. We then derive a polynomial-time solvable upper bound on the optimal revenue. Finally, we propose two heuristic-based attribute hiding schemes. Experiments show that revenue achieved by these schemes is close to the upper bound.
A traditional assumption in game theory is that players are opaque to one another---if a player changes strategies, then this change in strategies does not affect the choice of other players  strategies. In many situations this is an unrealistic assumption. We develop a framework for reasoning about games where the players may be translucent to one another; in particular, a player may believe that if she were to change strategies, then the other player would also change strategies. Translucent players may achieve significantly more efficient outcomes than opaque ones. Our main result is a characterization of strategies consistent with appropriate analogues of common belief of rationality. Common Counterfactual Belief of Rationality (CCBR) holds if (1) everyone is rational, (2) everyone counterfactually believes that everyone else is rational (i.e., all players i believe that everyone else would still be rational even if $i$ were to switch strategies), (3) everyone counterfactually believes that everyone else is rational, and counterfactually believes that everyone else is rational, and so on. CCBR characterizes the set of strategies surviving iterated removal of minimax dominated strategies, where a strategy s for player i is minimax dominated by s  if the worst-case payoff for i using s  is better than the best possible payoff using s.
We study online auction settings in which agents arrive and depart dynamically in a random (secretary) order, and each agent s private type consists of the agent s arrival and departure times, value and budget. We consider multi-unit auctions with additive agents for the allocation of both divisible and indivisible items. For both settings, we devise truthful mechanisms that give a constant approximation with respect to the auctioneer s revenue, under a large market assumption. For divisible items, we devise in addition a truthful mechanism that gives a constant approximation with respect to the liquid welfare --- a natural efficiency measure for budgeted settings introduced by Dobzinski and Paes Leme [ICALP 14]. Our techniques provide high-level principles for transforming offline truthful mechanisms into online ones, with or without budget constraints. To the best of our knowledge, this is the first work that addresses the non-trivial challenge of combining online settings with budgeted agents.
Data centers have emerged as promising resources for demand response, particularly for emergency demand response (EDR), which saves the power grid from incurring blackouts during emergency situations. However, currently, data centers typically participate in EDR by turning on backup (diesel) generators, which is both expensive and environmentally unfriendly. In this paper, we focus on \"greening\" demand response in multi-tenant data centers, i.e., colocation data centers, by designing a pricing mechanism through which the data center operator can efficiently extract load reductions from tenants during emergency periods to fulfill energy reduction requirement for EDR. In particular, we propose a pricing mechanism for both mandatory and voluntary EDR programs, ColoEDR, that is based on parameterized supply function bidding and provides provably near-optimal efficiency guarantees, both when tenants are price-taking and when they are price-anticipating. In addition to analytic results, we extend the literature on supply function mechanism design, and evaluate ColoEDR using trace-based simulation studies. These validate the efficiency analysis and conclude that the pricing mechanism is both beneficial to the environment and to the data center operator (by decreasing the need for backup diesel generation), while also aiding tenants (by providing payments for load reductions).
We consider the menu size of auctions as a measure of auction complexity and study how it affects revenue. Our setting has a single revenue-maximizing seller selling two or more heterogeneous items to a single buyer whose private values for the items are drawn from a (possibly correlated) known distribution, and whose valuation is additive over the items. We show that the revenue may increase arbitrarily with menu size and that a bounded menu size can not ensure any positive fraction of the optimal revenue. The menu size turns out to \"nail down\" the revenue properties of deterministic auctions: their menu size may be at most exponential in the number of items and indeed their revenue may be larger than that achievable by the simplest types of auctions by a factor that is exponential in the number of items but no larger. Our model is related to a previously studied \"unit-demand\" model and our results also answer an open problem in that model.
The auction theory literature has so far focused mostly on the design of mechanisms that takes the revenue or the efficiency as a yardstick. However, scenarios where the {\\it capacity}, which we define as \\textit{``the number of bidders the auctioneer wants to have a positive probability of getting the item  }, is a fundamental concern are ubiquitous in the information economy. For instance, in sponsored search auctions (SSA s) or in online ad-exchanges, the true value of an ad-slot for an advertiser is inherently derived from the conversion-rate, which in turn depends on whether the advertiser actually obtained the ad-slot or not; thus, unless the capacity of the underlying auction is large, key parameters, such as true valuations and advertiser-specific conversion rates, will remain unknown or uncertain leading to inherent inefficiencies in the system. In general, the same holds true for all information goods/digital goods. We initiate a study of mechanisms, which take capacity as a yardstick, in addition to revenue/efficiency. We show that in the case of a single indivisible item one simple way to incorporate capacity constraints is via designing mechanisms to sell probability distributions, and that under certain conditions, such optimal probability distributions could be identified using a Linear programming approach. We define a quantity called {\\it price of capacity} to capture the tradeoff between capacity and revenue/efficiency. We also study the case of sponsored search auctions. Finally, we discuss how general such an approach via probability spikes can be made, and potential directions for future investigations.
We investigate the power of randomness in the context of a fundamental Bayesian optimal mechanism design problem--a single seller aims to maximize expected revenue by allocating multiple kinds of resources to \"unit-demand\" agents with preferences drawn from a known distribution. When the agents  preferences are single-dimensional Myerson s seminal work [Myerson  81] shows that randomness offers no benefit--the optimal mechanism is always deterministic. In the multi-dimensional case, where each agent s preferences are given by different values for each of the available services, Briest et al. [Briest, Chawla, Kleinberg, and Weinberg  10] recently showed that the gap between the expected revenue obtained by an optimal randomized mechanism and an optimal deterministic mechanism can be unbounded even when a single agent is offered only 4 services. However, this large gap is attained through unnatural instances where values of the agent for different services are correlated in a specific way. We show that when the agent s values involve no correlation or a specific kind of positive correlation, the benefit of randomness is only a small constant factor (4 and 8 respectively). Our model of positively correlated values (that we call additive values) is a natural model for unit-demand agents and items that are substitutes. Our results extend to multiple agent settings as well.
We investigate the design of mechanisms to incentivize high quality in crowdsourcing environments with strategic agents, when entry is an endogenous, strategic choice. Modeling endogenous entry in crowdsourcing is important because there is a nonzero cost to making a contribution of any quality which can be avoided by not participating, and indeed many sites based on crowdsourced content do not have adequate participation. We use a mechanism with monotone, rank-based, rewards in a model where agents strategically make participation and quality choices to capture a wide variety of crowdsourcing environments, ranging from conventional crowdsourcing contests to crowdsourced content as in online Q&A forums. We first explicitly construct the unique mixed-strategy equilibrium for such monotone rank-order mechanisms, and use these participation probabilities and quality distribution to address the design of incentives for two kinds of rewards that arise in crowdsourcing. We first show that for attention rewards as in crowdsourced content, the entire equilibrium distribution improves when the rewards for every rank but the last are as high as possible. In particular, when producing the lowest quality content has low cost, the optimal mechanism displays all but the worst contribution. We next investigate settings where there is a total reward that can be arbitrarily distributed amongst all participants, as in crowdsourcing contests. Unlike with exogenous entry, here the expected number of participants can be increased by subsidizing entry, which could potentially improve the expected quality of the best contribution. However, we show that free entry is dominated by taxing entry- making all entrants pay a small fee, which is rebated to the winner along with whatever rewards were already assigned, can improve the quality of the best contribution over a winner-take-all contest with no taxes.
In the network design game with $n$ players, every player chooses a path in an edge-weighted graph to connect her pair of terminals, sharing costs of the edges on her path with all other players fairly. We study the price of stability of the game, i.e., the ratio of the social costs of a best Nash equilibrium (with respect to the social cost) and of an optimal play. It has been shown that the price of stability of any network design game is at most $H_n$, the $n$-th harmonic number. This bound is tight for directed graphs. For undirected graphs, the situation is dramatically different, and tight bounds are not known. It has only recently been shown that the price of stability is at most $H_n \\left(1-\\frac{1}{\\Theta(n^4)} \\right)$, while the worst-case known example has price of stability around 2.25. In this paper we improve the upper bound considerably by showing that the price of stability is at most $H_{n/2} + \\epsilon$ for any $\\epsilon$ starting from some suitable $n \\geq n(\\epsilon)$.
Voting is a general method for aggregating the preferences of multiple agents. Each agent ranks all the possible alternatives, and based on this, an aggregate ranking of the alternatives (or at least a winning alternative) is produced. However, when there are many alternatives, it is impractical to simply ask agents to report their complete preferences. Rather, the agents preferences, or at least the relevant parts thereof, need to be elicited. This is done by asking the agents a (hopefully small) number of simple queries about their preferences, such as comparison queries, which ask an agent to compare two of the alternatives. Prior work on preference elicitation in voting has focused on the case of unrestricted preferences. It has been shown that in this setting, it is sometimes necessary to ask each agent (almost) as many queries as would be required to determine an arbitrary ranking of the alternatives. In contrast, in this paper, we focus on single-peaked preferences. We show that such preferences can be elicited using only a linear number of comparison queries, if either the order with respect to which preferences are single-peaked is known, or at least one other agents complete preferences are known. We show that using a sublinear number of queries does not suffice. We also consider the case of cardinally single-peaked preferences. For this case, we show that if the alternatives cardinal positions are known, then an agents preferences can be elicited using only a logarithmic number of queries; however, we also show that if the cardinal positions are not known, then a sublinear number of queries does not suffice. We present experimental results for all elicitation algorithms. We also consider the problem of only eliciting enough information to determine the aggregate ranking, and show that even for this more modest objective, a sublinear number of queries per agent does not suffice for known ordinal or unknown cardinal positions. Finally, we discuss whether and how these techniques can be applied when preferences are almost single-peaked.
We consider the problem of a revenue-maximizing seller with m items for sale to n additive bidders with hard budget constraints, assuming that the seller has some prior distribution over bidder values and budgets. The prior may be correlated across items and budgets of the same bidder, but is assumed independent across bidders. We target mechanisms that are Bayesian Incentive Compatible, but that are ex-post Individually Rational and ex-post budget respecting. Virtually no such mechanisms are known that satisfy all these conditions and guarantee any revenue approximation, even with just a single item. We provide a computationally efficient mechanism that is a $3$-approximation with respect to all BIC, ex-post IR, and ex-post budget respecting mechanisms. Note that the problem is NP-hard to approximate better than a factor of 16/15, even in the case where the prior is a point mass \\cite{ChakrabartyGoel}. We further characterize the optimal mechanism in this setting, showing that it can be interpreted as a distribution over virtual welfare maximizers. We prove our results by making use of a black-box reduction from mechanism to algorithm design developed by \\cite{CaiDW13b}. Our main technical contribution is a computationally efficient $3$-approximation algorithm for the algorithmic problem that results by an application of their framework to this problem. The algorithmic problem has a mixed-sign objective and is NP-hard to optimize exactly, so it is surprising that a computationally efficient approximation is possible at all. In the case of a single item ($m=1$), the algorithmic problem can be solved exactly via exhaustive search, leading to a computationally efficient exact algorithm and a stronger characterization of the optimal mechanism as a distribution over virtual value maximizers.
We present a systematic study of Plurality elections with strategic voters who, in addition to having preferences over election winners, have secondary preferences, which govern their behavior when their vote cannot affect the election outcome. Specifically, we study two models that have been recently considered in the literature: lazy voters, who prefer to abstain when they are not pivotal, and truth-biased voters, who prefer to vote truthfully when they are not pivotal. We extend prior work by investigating the behavior of both lazy and truth-biased voters under different tie-breaking rules (lexicographic rule, random voter rule, random candidate rule). Two of these six combinations of secondary preferences and a tie-breaking rule have been studied in prior work. In order to understand the impact of different secondary preferences and tie-breaking rules on the election outcomes, we study the remaining four combinations. We characterize pure Nash equilibria (PNE) of the resulting strategic games and study the complexity of related computational problems. Our results extend to settings where some of the voters may be non-strategic.
Attack detection is usually approached as a classification problem. However, standard classification tools often perform poorly because an adaptive attacker can shape his attacks in response to the algorithm. This has led to the recent interest in developing methods for adversarial classification, but, to the best of our knowledge, there has not been a prior study that takes into account the attacker s tradeoff between adapting to the classifier being used against him with his desire to maintain the efficacy of his attack. Including this effect is key to derive solutions that perform well in practice. In this investigation we model the interaction as a game between a defender who chooses a classifier to distinguish between attacks and normal behavior based on a set of observed features and an attacker who chooses his attack features (class 1 data). Normal behavior (class 0 data) is random and exogenous. The attacker s objective balances the benefit from attacks and the cost of being detected while the defender s objective balances the benefit of a correct attack detection and the cost of false alarm. We provide an efficient algorithm to compute all Nash equilibria and a compact characterization of the possible forms of a Nash equilibrium that reveals intuitive messages on how to perform classification in the presence of an attacker. We also explore qualitatively and quantitatively the impact of the non-attacker and underlying parameters on the equilibrium strategies.
We study combinatorial auctions where each item is sold separately but simultaneously via a second price auction. We ask whether it is possible to efficiently compute in this game a pure Nash equilibrium with social welfare close to the optimal one. We show that when the valuations of the bidders are submodular, in many interesting settings (e.g., constant number of bidders, budget additive bidders) computing an equilibrium with good welfare is essentially as easy as computing, completely ignoring incentives issues, an allocation with good welfare. On the other hand, for subadditive valuations, we show that computing an equilibrium requires exponential communication. Finally, for XOS (a.k.a. fractionally subadditive) valuations, we show that if there exists an efficient algorithm that finds an equilibrium, it must use techniques that are very different from our current ones.
We consider a resource allocation problem where individual users wish to send data across a network to maximize their utility, and a cost is incurred at each link that depends on the total rate sent through the link. It is known that as long as users do not anticipate the effect of their actions on prices, a simple proportional pricing mechanism can maximize the sum of users  utilities minus the cost (called aggregate surplus). Continuing previous efforts to quantify the effects of selfish behavior in network pricing mechanisms, we consider the possibility that users anticipate the effect of their actions on link prices. Under the assumption that the links  marginal cost functions are convex, we establish existence of a Nash equilibrium. We show that the aggregate surplus at a Nash equilibrium is no worse than a factor of 4*sqrt{2} - 5 times the optimal aggregate surplus; thus, the efficiency loss when users are selfish is no more than approximately 34%.
We consider a multiagent system consisting of selfish and heterogeneous agents. Its behavior is modeled by multipopulation replicator dynamics, where payoff functions of populations are different from each other. In general, there exist several equilibrium points in the replicator dynamics. In order to stabilize a desirable equilibrium point, we introduce a controller called a government which controls the behaviors of agents by offering them subsidies. In previous work, it is assumed that the government determines the subsidies based on the populations the agents belong to. In general, however, the government cannot identify the members of each population. In this paper, we assume that the government observes the action of each agent and determines the subsidies based on the observed action profile. Then, we model the controlled behaviors of the agents using replicator dynamics with feedback. We derive a stabilization condition of the target equilibrium point in the replicator dynamics.
We study the strategic purchasing of priorities in a time-dependent accumulating priority M/G/$1$ queue. We formulate a non-cooperative game in which customers purchase priority coefficients with the goal of reducing waiting costs in exchange. The priority of each customer in the queue is a linear function of the individual waiting time, with the purchased coefficient being the slope. The unique pure Nash equilibrium is solved explicitly for the case with homogeneous customers. A general characterisation of the Nash equilibrium is provided for the heterogeneous case. It is shown that both avoid the crowd and follow the crowd behaviours are prevalent, within class types and between them. We further present a pricing mechanism that ensures the order of the accumulating priority rates in equilibrium follows a $C\\mu$ type rule and improves overall efficiency.
In a seminal paper, McAfee (1992) presented the first dominant strategy truthful mechanism for double auction. His mechanism attains nearly optimal gain-from-trade when the market is sufficiently large. However, his mechanism may leave money on the table, since the price paid by the buyers may be higher than the price paid to the sellers. This money is included in the gain-from-trade and in some cases it accounts for almost all the gain-from-trade, leaving almost no gain-from-trade to the traders. We present SBBA: a variant of McAfee s mechanism which is strongly budget-balanced. There is a single price, all money is exchanged between buyers and sellers and no money is left on the table. This means that all gain-from-trade is enjoyed by the traders. We generalize this variant to spatially-distributed markets with transit costs.
In Amazon EC2, cloud resources are sold through a combination of an on-demand market, in which customers buy resources at a fixed price, and a spot market, in which customers bid for an uncertain supply of excess resources. Standard market environments suggest that an optimal design uses just one type of market. We show the prevalence of a dual market system can be explained by heterogeneous risk attitudes of customers. In our stylized model, we consider unit demand risk-averse bidders. We show the model admits a unique equilibrium, with higher revenue and higher welfare than using only spot markets. Furthermore, as risk aversion increases, the usage of the on-demand market increases. We conclude that risk attitudes are an important factor in cloud resource allocation and should be incorporated into models of cloud markets.
One of the fundamental questions of Algorithmic Mechanism Design is whether there exists an inherent clash between truthfulness and computational tractability: in particular, whether polynomial-time truthful mechanisms for combinatorial auctions are provably weaker in terms of approximation ratio than non-truthful ones. This question was very recently answered for universally truthful mechanisms for combinatorial auctions \\cite{D11}, and even for truthful-in-expectation mechanisms \\cite{DughmiV11}. However, both of these results are based on information-theoretic arguments for valuations given by a value oracle, and leave open the possibility of polynomial-time truthful mechanisms for succinctly described classes of valuations. This paper is the first to prove {\\em computational hardness} results for truthful mechanisms for combinatorial auctions with succinctly described valuations. We prove that there is a class of succinctly represented submodular valuations for which no deterministic truthful mechanism provides an $m^{1/2-\\epsilon}$-approximation for a constant $\\epsilon>0$, unless $NP=RP$ ($m$ denotes the number of items). Furthermore, we prove that even truthful-in-expectation mechanisms cannot approximate combinatorial auctions with certain succinctly described submodular valuations better than within $n^\\gamma$, where $n$ is the number of bidders and $\\gamma>0$ some absolute constant, unless $NP \\subseteq P/poly$. In addition, we prove computational hardness results for two related problems.
This paper develops a game-theoretic framework for the design and analysis of a new class of incentive schemes called intervention schemes. We formulate intervention games, propose a solution concept of intervention equilibrium, and prove its existence in a finite intervention game. We apply our framework to resource sharing scenarios in wireless communications, whose non-cooperative outcomes without intervention yield suboptimal performance. We derive analytical results and analyze illustrative examples in the cases of imperfect and perfect monitoring. In the case of imperfect monitoring, intervention schemes can improve the suboptimal performance of non-cooperative equilibrium when the intervention device has a sufficiently accurate monitoring technology, although it may not be possible to achieve the best feasible performance. In the case of perfect monitoring, the best feasible performance can be obtained with an intervention scheme when the intervention device has a sufficiently strong intervention capability.
We construct prior-free auctions with constant-factor approximation guarantees with ordered bidders, in both unlimited and limited supply settings. We compare the expected revenue of our auctions on a bid vector to the monotone price benchmark, the maximum revenue that can be obtained from a bid vector using supply-respecting prices that are nonincreasing in the bidder ordering and bounded above by the second-highest bid. As a consequence, our auctions are simultaneously near-optimal in a wide range of Bayesian multi-unit environments.
We consider the budget optimization problem faced by an advertiser participating in repeated sponsored search auctions, seeking to maximize the number of clicks attained under that budget. We cast the budget optimization problem as a Markov Decision Process (MDP) with censored observations, and propose a learning algorithm based on the wellknown Kaplan-Meier or product-limit estimator. We validate the performance of this algorithm by comparing it to several others on a large set of search auction data from Microsoft adCenter, demonstrating fast convergence to optimal performance.
MiBoard (Multiplayer Interactive Board Game) is an online, turnbased board game that was developed to assess the integration of game characteristics (point rewards, game-like interaction, and peer feedback) and how that might affect student engagement and learning efficacy. This online board game was designed to fit within the Extended Practice module of iSTART (Interactive Strategy Training for Active Reading and Thinking). Unfortunately, preliminary research shows that MiBoard actually reduces engagement and does not benefit the quality of student self-explanations when compared to the original Extended Practice module. Consequently the MiBoard framework has been revamped to create Self-Explanation Showdown, a faster-paced, less analytically oriented game that adds competition to the creation of self-explanations. Students are evaluated on the quality of their self-explanations using the same assessment algorithms from iSTART Extended Practice module (this includes both word-based and LSA-based assessments). The technical issues involved in development of MiBoard and Self- Explanation Showdown are described. The lessons learned from the MiBoard experience are also discussed in this paper.
EcoTRADE is a multi player network game of a virtual biodiversity credit market. Each player controls the land use of a certain amount of parcels on a virtual landscape. The biodiversity credits of a particular parcel depend on neighboring parcels, which may be owned by other players. The game can be used to study the strategies of players in experiments or classroom games and also as a communication tool for stakeholders participating in credit markets that include spatially interdependent credits.
Peer prediction mechanisms are often adopted to elicit truthful contributions from crowd workers when no ground-truth verification is available. Recently, mechanisms of this type have been developed to incentivize effort exertion, in addition to truthful elicitation. In this paper, we study a sequential peer prediction problem where a data requester wants to dynamically determine the reward level to optimize the trade-off between the quality of information elicited from workers and the total expected payment. In this problem, workers have homogeneous expertise and heterogeneous cost for exerting effort, both unknown to the requester. We propose a sequential posted-price mechanism to dynamically learn the optimal reward level from workers  contributions and to incentivize effort exertion and truthful reporting. We show that (1) in our mechanism, workers exerting effort according to a non-degenerate threshold policy and then reporting truthfully is an equilibrium that returns highest utility for each worker, and (2) The regret of our learning mechanism w.r.t. offering the optimal reward (price) is upper bounded by $\\tilde{O}(T^{3/4})$ where $T$ is the learning horizon. We further show the power of our learning approach when the reports of workers do not necessarily follow the game-theoretic equilibrium.
Several multi-winner systems that use approval voting have been developed but they each suffer from various problems. Six of these methods are discussed in this paper. They are Satisfaction Approval Voting, Minimax Approval Voting, Proportional Approval Voting, Monroe s Fully Proportional Representation, Chamberlin-Courant s Rule, and Ebert s method. They all fail at least one of Proportional Representation (PR), strong PR, monotonicity or positive support. However, the new method described in this paper - Proportional Approval Method using Squared loads, Approval removal and Coin-flip approval transformation (PAMSAC) - passes them all. PAMSAC uses the squared loads of Ebert s method, but removes non-beneficial approvals to restore monotonicity. It also uses the Coin-Flip Approval Transformation (CFAT), where voters are \"split\" into two for each candidate they approve, and where one half of this split voter approves and the other half does not approve each candidate approved on the ballot. This restores positive support, and also makes the method equivalent to the D Hondt party-list method for party voting. PAMSAC reduces to simple approval voting in the single-winner case. A score voting version is described that also reduces to simple score voting in the single-winner case.
This paper investigates the different effects of chaotic switching on Parrondo s games, as compared to random and periodic switching. The rate of winning of Parrondo s games with chaotic switching depends on coefficient(s) defining the chaotic generator, initial conditions of the chaotic sequence and the proportion of Game A played. Maximum rate of winning can be obtained with all the above mentioned factors properly set, and this occurs when chaotic switching approaches periodic behavior.
Group identification models situations where a set of individuals are asked to determine who among themselves are socially qualified. In this paper, we study the complexity of three group control problems, namely Group Control by Adding Individuals, Group Control by Deleting Individuals and Group Control by Partition of Individuals for various social rules. In these problems, an external agent has an incentive to make a given subset of individuals socially qualified by adding, deleting or partition of individuals. We achieve both polynomial-time solvability results and NP-hardness results. In addition, we study the NP-hard problems from the parameterized complexity perspective, and obtain several fixed-parameter tractability results.
In cost sharing games, the existence and efficiency of pure Nash equilibria fundamentally depends on the method that is used to share the resources  costs. We consider a general class of resource allocation problems in which a set of resources is used by a heterogeneous set of selfish users. The cost of a resource is a (non-decreasing) function of the set of its users. Under the assumption that the costs of the resources are shared by uniform cost sharing protocols, i.e., protocols that use only local information of the resource s cost structure and its users to determine the cost shares, we exactly quantify the inefficiency of the resulting pure Nash equilibria. Specifically, we show tight bounds on prices of stability and anarchy for games with only submodular and only supermodular cost functions, respectively, and an asymptotically tight bound for games with arbitrary set-functions. While all our upper bounds are attained for the well-known Shapley cost sharing protocol, our lower bounds hold for arbitrary uniform cost sharing protocols and are even valid for games with anonymous costs, i.e., games in which the cost of each resource only depends on the cardinality of the set of its users.
We study large markets with a single seller which can produce many types of goods, and many multi-minded buyers. The seller chooses posted prices for its many items, and the buyers purchase bundles to maximize their utility. For this setting, we consider the following questions: What fraction of the optimum social welfare does a revenue maximizing solution achieve? Are there pricing mechanisms which achieve both good revenue and good welfare simultaneously? To address these questions, we give efficient pricing schemes which are guaranteed to result in both good revenue and welfare, as long as the buyer valuations for the goods they desire have a nice (although reasonable) structure, e.g., that the aggregate buyer demand has a monotone hazard rate or is not too convex. We also show that our pricing schemes have implications for any pricing which achieves high revenue: specifically that even if the seller cares only about revenue, they can still ensure that their prices result in good social welfare without sacrificing profit. Our results holds for general multi-minded buyers in large markets; we also provide improved guarantees for the important special case of unit-demand buyers.
Sequential allocation is a simple allocation mechanism in which agents are given pre-specified turns and each agents gets the most preferred item that is still available. It has long been known that sequential allocation is not strategyproof. Bouveret and Lang (2014) presented a polynomial-time algorithm to compute a best response of an agent with respect to additively separable utilities and claimed that (1) their algorithm correctly finds a best response, and (2) each best response results in the same allocation for the manipulator. We show that both claims are false via an example. We then show that in fact the problem of computing a best response is NP-complete. On the other hand, the insights and results of Bouveret and Lang (2014) for the case of two agents still hold.
We consider a network creation game in which each player (vertex) has a fixed budget to establish links to other players. In our model, each link has unit price and each agent tries to minimize its cost, which is either its local diameter or its total distance to other players in the (undirected) underlying graph of the created network. Two versions of the game are studied: in the MAX version, the cost incurred to a vertex is the maximum distance between the vertex and other vertices, and in the SUM version, the cost incurred to a vertex is the sum of distances between the vertex and other vertices. We prove that in both versions pure Nash equilibria exist, but the problem of finding the best response of a vertex is NP-hard. We take the social cost of the created network to be its diameter, and next we study the maximum possible diameter of an equilibrium graph with n vertices in various cases. When the sum of players  budgets is n-1, the equilibrium graphs are always trees, and we prove that their maximum diameter is Theta(n) and Theta(log n) in MAX and SUM versions, respectively. When each vertex has unit budget (i.e. can establish link to just one vertex), the diameter of any equilibrium graph in either version is Theta(1). We give examples of equilibrium graphs in the MAX version, such that all vertices have positive budgets and yet the diameter is Omega(sqrt(log n)). This interesting (and perhaps counter-intuitive) result shows that increasing the budgets may increase the diameter of equilibrium graphs and hence deteriorate the network structure. Then we prove that every equilibrium graph in the SUM version has diameter 2^O(sqrt(log n)). Finally, we show that if the budget of each player is at least k, then every equilibrium graph in the SUM version is k-connected or has diameter smaller than 4.
Crowdsourced wireless community networks can effectively alleviate the limited coverage issue of Wi-Fi access points (APs), by encouraging individuals (users) to share their private residential Wi-Fi APs with others. In this paper, we provide a comprehensive economic analysis for such a crowdsourced network, with the particular focus on the users  behavior analysis and the community network operator s pricing design. Specifically, we formulate the interactions between the network operator and users as a two-layer Stackelberg model, where the operator determining the pricing scheme in Layer I, and then users determining their Wi-Fi sharing schemes in Layer II. First, we analyze the user behavior in Layer II via a two-stage membership selection and network access game, for both small-scale networks and large-scale networks. Then, we design a partial price differentiation scheme for the operator in Layer I, which generalizes both the complete price differentiation scheme and the single pricing scheme (i.e., no price differentiation). We show that the proposed partial pricing scheme can achieve a good tradeoff between the revenue and the implementation complexity. Numerical results demonstrate that when using the partial pricing scheme with only two prices, we can increase the operator s revenue up to 124.44% comparing with the single pricing scheme, and can achieve an average of 80% of the maximum operator revenue under the complete price differentiation scheme.
Real-Time Bidding (RTB) is revolutionising display advertising by facilitating per-impression auctions to buy ad impressions as they are being generated. Being able to use impression-level data, such as user cookies, encourages user behaviour targeting, and hence has significantly improved the effectiveness of ad campaigns. However, a fundamental drawback of RTB is its instability because the bid decision is made per impression and there are enormous fluctuations in campaigns  key performance indicators (KPIs). As such, advertisers face great difficulty in controlling their campaign performance against the associated costs. In this paper, we propose a feedback control mechanism for RTB which helps advertisers dynamically adjust the bids to effectively control the KPIs, e.g., the auction winning ratio and the effective cost per click. We further formulate an optimisation framework to show that the proposed feedback control mechanism also has the ability of optimising campaign performance. By settling the effective cost per click at an optimal reference value, the number of campaign s ad clicks can be maximised with the budget constraint. Our empirical study based on real-world data verifies the effectiveness and robustness of our RTB control system in various situations. The proposed feedback control mechanism has also been deployed on a commercial RTB platform and the online test has shown its success in generating controllable advertising performance.
We consider markets consisting of a set of indivisible items, and buyers that have {\\em sharp} multi-unit demand. This means that each buyer $i$ wants a specific number $d_i$ of items; a bundle of size less than $d_i$ has no value, while a bundle of size greater than $d_i$ is worth no more than the most valued $d_i$ items (valuations being additive). We consider the objective of setting prices and allocations in order to maximize the total revenue of the market maker. The pricing problem with sharp multi-unit demand buyers has a number of properties that the unit-demand model does not possess, and is an important question in algorithmic pricing. We consider the problem of computing a revenue maximizing solution for two solution concepts: competitive equilibrium and envy-free pricing. For unrestricted valuations, these problems are NP-complete; we focus on a realistic special case of \"correlated values\" where each buyer $i$ has a valuation $v_i\\qual_j$ for item $j$, where $v_i$ and $\\qual_j$ are positive quantities associated with buyer $i$ and item $j$ respectively. We present a polynomial time algorithm to solve the revenue-maximizing competitive equilibrium problem. For envy-free pricing, if the demand of each buyer is bounded by a constant, a revenue maximizing solution can be found efficiently; the general demand case is shown to be NP-hard.
Budget feasible mechanism considers algorithmic mechanism design questions where there is a budget constraint on the total payment of the mechanism. An important question in the field is that under which valuation domains there exist budget feasible mechanisms that admit `small  approximations (compared to a socially optimal solution). Singer \\cite{PS10} showed that additive and submodular functions admit a constant approximation mechanism. Recently, Dobzinski, Papadimitriou, and Singer \\cite{DPS11} gave an $O(\\log^2n)$ approximation mechanism for subadditive functions and remarked that: \"A fundamental question is whether, regardless of computational constraints, a constant-factor budget feasible mechanism exists for subadditive function.\" In this paper, we give the first attempt to this question. We give a polynomial time $O(\\frac{\\log n}{\\log\\log n})$ sub-logarithmic approximation ratio mechanism for subadditive functions, improving the best known ratio $O(\\log^2 n)$. Further, we connect budget feasible mechanism design to the concept of approximate core in cooperative game theory, and show that there is a mechanism for subadditive functions whose approximation is, via a characterization of the integrality gap of a linear program, linear to the largest value to which an approximate core exists. Our result implies in particular that the class of XOS functions, which is a superclass of submodular functions, admits a constant approximation mechanism. We believe that our work could be a solid step towards solving the above fundamental problem eventually, and possibly, with an affirmative answer.
We revisit a classic coordination problem from the perspective of mechanism design: how can we coordinate a social welfare maximizing flow in a network congestion game with selfish players? The classical approach, which computes tolls as a function of known demands, fails when the demands are unknown to the mechanism designer, and naively eliciting them does not necessarily yield a truthful mechanism. Instead, we introduce a weak mediator that can provide suggested routes to players and set tolls as a function of reported demands. However, players can choose to ignore or misreport their type to this mediator. Using techniques from differential privacy, we show how to design a weak mediator such that it is an asymptotic ex-post Nash equilibrium for all players to truthfully report their types to the mediator and faithfully follow its suggestion, and that when they do, they end up playing a nearly optimal flow. Notably, our solution works in settings of incomplete information even in the absence of a prior distribution on player types. Along the way, we develop new techniques for privately solving convex programs which may be of independent interest.
In a system of interdependent users, the security of an entity is affected not only by that user s investment in security measures, but also by the positive externality of the security decisions of (some of) the other users. The provision of security in such system is therefore modeled as a public good provision problem, and is referred to as a security game. In this paper, we compare two well-known incentive mechanisms in this context for incentivizing optimal security investments among users, namely the Pivotal and the Externality mechanisms. The taxes in a Pivotal mechanism are designed to ensure users  voluntary participation, while those in an Externality mechanism are devised to maintain a balanced budget. We first show the more general result that, due to the non-excludable nature of security, no mechanism can incentivize the socially optimal investment profile, while at the same time ensuring voluntary participation and maintaining a balanced budget for all instances of security games. To further illustrate, we apply the Pivotal and Externality mechanisms to the special case of weighted total effort interdependence models, and identify some of the effects of varying interdependency between users on the budget deficit in the Pivotal mechanism, as well as on the participation incentives in the Externality mechanism.
Coordination games describe social or economic interactions in which the adoption of a common strategy has a higher payoff. They are classically used to model the spread of conventions, behaviors, and technologies in societies. Here we consider a two-strategies coordination game played asynchronously between the nodes of a network. Agents behave according to a noisy best-response dynamics. It is known that noise removes the degeneracy among equilibria: In the long run, the ``risk-dominant   behavior spreads throughout the network. Here we consider the problem of computing the typical time scale for the spread of this behavior. In particular, we study its dependence on the network structure and derive a dichotomy between highly-connected, non-local graphs that show slow convergence, and poorly connected, low dimensional graphs that show fast convergence.
We study the problem of computing Nash equilibria of zero-sum games. Many natural zero-sum games have exponentially many strategies, but highly structured payoffs. For example, in the well-studied Colonel Blotto game (introduced by Borel in 1921), players must divide a pool of troops among a set of battlefields with the goal of winning (i.e., having more troops in) a majority. The Colonel Blotto game is commonly used for analyzing a wide range of applications from the U.S presidential election, to innovative technology competitions, to advertisement, to sports. However, because of the size of the strategy space, standard methods for computing equilibria of zero-sum games fail to be computationally feasible. Indeed, despite its importance, only a few solutions for special variants of the problem are known. In this paper we show how to compute equilibria of Colonel Blotto games. Moreover, our approach takes the form of a general reduction: to find a Nash equilibrium of a zero-sum game, it suffices to design a separation oracle for the strategy polytope of any bilinear game that is payoff-equivalent. We then apply this technique to obtain the first polytime algorithms for a variety of games. In addition to Colonel Blotto, we also show how to compute equilibria in an infinite-strategy variant called the General Lotto game; this involves showing how to prune the strategy space to a finite subset before applying our reduction. We also consider the class of dueling games, first introduced by Immorlica et al. (2011). We show that our approach provably extends the class of dueling games for which equilibria can be computed: we introduce a new dueling game, the matching duel, on which prior methods fail to be computationally feasible but upon which our reduction can be applied.
We study how standard auction objectives in sponsored search markets change with refinements in the prediction of the relevance (click-through rates) of ads. We study mechanisms that optimize for a convex combination of efficiency and revenue. We show that the objective function of such a mechanism can only improve with refined (improved) relevance predictions, i.e., the search engine has no disincentive to perform these refinements. More interestingly, we show that under assumptions, refinements to relevance predictions can only improve the efficiency of any such mechanism. Our main technical contribution is to study how relevance refinements affect the similarity between ranking by virtual-value (revenue ranking) and ranking by value (efficiency ranking). Finally, we discuss implications of our results to the literature on signaling.
In this paper we study a generalization of the classic \\emph{network creation game} in the scenario in which the $n$ players sit on a given arbitrary \\emph{host graph}, which constrains the set of edges a player can activate at a cost of $\\alpha \\geq 0$ each. This finds its motivations in the physical limitations one can have in constructing links in practice, and it has been studied in the past only when the routing cost component of a player is given by the sum of distances to all the other nodes. Here, we focus on another popular routing cost, namely that which takes into account for each player its \\emph{maximum} distance to any other player. For this version of the game, we first analyze some of its computational and dynamic aspects, and then we address the problem of understanding the structure of associated pure Nash equilibria. In this respect, we show that the corresponding price of anarchy (PoA) is fairly bad, even for several basic classes of host graphs. More precisely, we first exhibit a lower bound of $\\Omega (\\sqrt{ n / (1+\\alpha)})$ for any $\\alpha = o(n)$. Notice that this implies a counter-intuitive lower bound of $\\Omega(\\sqrt{n})$ for very small values of $\\alpha$ (i.e., edges can be activated almost for free). Then, we show that when the host graph is restricted to be either $k$-regular (for any constant $k \\geq 3$), or a 2-dimensional grid, the PoA is still $\\Omega(1+\\min\\{\\alpha, \\frac{n}{\\alpha}\\})$, which is proven to be tight for $\\alpha=\\Omega(\\sqrt{n})$. On the positive side, if $\\alpha \\geq n$, we show the PoA is $O(1)$. Finally, in the case in which the host graph is very sparse (i.e., $|E(H)|=n-1+k$, with $k=O(1)$), we prove that the PoA is $O(1)$, for any $\\alpha$.
The problem of designing Bayesian incentive compatible, individually rational and revenue maximizing auction for multiple goods and flexible customers is considered. The auctioneer has $M$ goods and $N$ potential customers. Customer $i$ has a flexibility set $\\phi_i$ which represents the set of goods the customer is equally interested in. Customer $i$ can consume at most one good from its flexibility set. We first characterize the optimal auction for customers with arbitrary flexibility sets and then consider the case when the flexibility sets are nested. This allows us to group customers into classes of increasing flexibility. We show that the optimal auction can be simplified in this case and we provide a complete characterization of allocations and payments in terms of simple thresholds.
Let $V$ be a finite vector space over a finite field of order $q$ and of characteristic $p$. Let $G\\leq GL(V)$ be a $p$-solvable completely reducible linear group. Then there exists a base for $G$ on $V$ of size at most $2$ unless $q \\leq 4$ in which case there exists a base of size at most $3$. The first statement extends a recent result of Halasi and Podoski and the second statement generalizes a theorem of Seress. An extension of a theorem of P\\ alfy and Wolf is also given.
We notice that Haynes-Hedetniemi-Slater Conjecture is true (i.e. $\\gamma(G) \\leq \\frac{\\delta}{3\\delta -1}n$ for every graph $G$ of size $n$ with minimum degree $\\delta \\geq 4$, where $\\gamma(G)$ is the domination number of $G$). Because the conjecture for $\\delta =6$ follows from the estimate n (1 - \\prod_{i= 1}^[\\delta + 1} (\\delta i)/(\\delta i + 1) by W. E. Clark, B. Shekhtman, S. Suen [Upper bounds of the Domination Number of a Graph, Congressus Numerantium, 132 (1998), pp. 99-123.]
A semisimple element $s$ of a connected reductive group $G$ is said {\\it quasi-isolated} (respectively {\\it isolated}) if $C_G(s)$ (respectively $C_G^0(s)$) is not contained in a Levi subgroup of a proper parabolic subgroup of $G$. We study properties of quasi-isolated semisimple elements and give a classification in terms of the affine Dynkin diagram of $G$. Tables are provided for adjoint simple groups.
In this work, we give two characterisations of the general linear group as a group $G$ of finite Morley rank acting on an abelian connected group $V$ of finite Morley rank definably, faithfully and irreducibly. To be more precise, we prove that if the pseudoreflection rank of $G$ is equal to the Morley rank of $V$, then $V$ has a vector space structure over an algebraically closed field, $G\\cong GL(V)$ and the action is the natural action. The same result holds also under the assumption of Prufer 2-rank of $G$ being equal to the Morley rank of $V$.
Let $F$ be a group whose abelianization is $\\Z^k$, $k\\geq 2.$ An element of $F$ is called visible if its image in the abelianization is visible, that is, the greatest common divisor of its coordinates is 1. In this paper we compute three types of densities, annular, even and odd spherical, of visible elements in surface groups. We then use our results to show that the probability of a homogeneous equation in a surface group to have solutions is neither 0 nor 1, as the lengths of the right- and left-hand side of the equation go to infinity.
Given any directed graph E one can construct a graph inverse semigroup G(E), where, roughly speaking, elements correspond to paths in the graph. In this paper we study the semigroup-theoretic structure of G(E). Specifically, we describe the non-Rees congruences on G(E), show that the quotient of G(E) by any Rees congruence is another graph inverse semigroup, and classify the G(E) that have only Rees congruences. We also find the minimum possible degree of a faithful representation by partial transformations of any countable G(E), and we show that a homomorphism of directed graphs can be extended to a homomorphism (that preserves zero) of the corresponding graph inverse semigroups if and only if it is injective.
Root-class residuality of free product of root-class residual groups is demonstrated. A sufficient condition for root-class residuality of generalized free product $G$ of groups $A$ and $B$ amalgamating subgroups $H$ and $K$ through the isomorphism $\\phi$ is derived. For the particular case when $A=B$, $H=K$ and $\\phi$ is the identity mapping, it is shown that group $G$ is root-class residual if and only if $A$ is root-class residual and subgroup $H$ of $A$ is root-class closed. These results are extended to generalized free product of infinitely many groups amalgamating a common subgroup.
Let $G$ be the fundamental group of a compact nonpositively curved cube complex $Y$. With respect to a basepoint $x$, one obtains an integer-valued length function on $G$ by counting the number of edges in a minimal length edge-path representing each group element. The growth series of $G$ with respect to $x$ is then defined to be the power series $G_x(t)=\\sum_g t^{|g|}$ where $|g|$ denotes the length of $g$. Using the fact that $G$ admits a suitable automatic structure, $G_x(t)$ can be shown to be a rational function. We prove that if $Y$ is a manifold of dimension $n$, then this rational function satisfies the reciprocity formula $G_x(t^{-1})=(-1)^n G_x(t)$. We prove the formula in a more general setting, replacing the group with the fundamental groupoid, replacing the growth series with the characteristic series for a suitable regular language, and only assuming $Y$ is Eulerian.
In this article, we study eigenvalue functions of varying transition probability matrices on finite, vertex transitive graphs. We prove that the eigenvalue function of an eigenvalue of fixed higher multiplicity has a critical point if and only if the corresponding spectral representation is equilateral. We also show how the geometric realisation of a finite Coxeter group as a reflection group can be used to obtain an explicit orthogonal system of eigenfunctions. Combining both results, we describe the behaviour of the spectral representations of the second highest eigenvalue function under the change of the transition probabilities in the case of Archimedean solids.
An analogue of Stallings  decomposition theorem is proved for totally disconnected locally compact groups, i.e., a totally disconnected locally compact group $G$ with more than one end splits either as an HNN-extension $H\\ast_K^t$ or non-trivially as a free product with amalgamation $H\\ast_K J$, where $K$ is compact and open. This splitting theorem can be formulated in terms of rational discrete cohomology of $G$ with coefficients in the standard bimodule $\\mathrm{Bi}(G)$ (cf. Theorem A). Using an accessibility result due to Y. Cornulier, an analogue of the Karrass-Pietrowski-Solitar theorem is proved for t.d.l.c. groups, i.e., a compactly presented totally disconnected locally compact group $G$ of rational discrete cohomological dimension at most 1 is isomorphic to the fundamental group $\\pi_1(\\mathcal{G},\\Lambda)$ of a finite graph of profinite groups $(\\mathcal{G},\\Lambda)$ (cf. Theorem B).
The notion of active sum provides an analogue for groups of that of direct sum for abelian groups. One natural question then is which groups are the active sum of cyclic subgroups. Many groups have been found to give a positive answer to this question, while the case of finite metacyclic groups remained unknown. In this note we show that every finite metacyclic group can be recovered as the active sum of a discrete family of cyclic subgroups.
Let $H$ be a linear algebraic group over an algebraically closed field of characteristic $p>0$. We prove that any \"exponential map\" for $H$ induces a bijection between the variety of $r$-tuples of commuting $[p]$-nilpotent elements in $Lie(H)$ and the variety of height $r$ infinitesimal one-parameter subgroups of $H$. In particular, we show that for a connected reductive group $G$ in pretty good characteristic, there is a canonical exponential map for $G$ and hence a canonical bijection between the aforementioned varieties, answering in this case questions raised both implicitly and explicitly by Suslin, Friedlander, and Bendel.
A countable graph is ultrahomogeneous if every isomorphism between finite induced subgraphs can be extended to an automorphism. Woodrow and Lachlan showed that there are essentially four types of such countably infinite graphs: the random graph; infinite disjoint unions of complete graphs $K_n$ with $n\\in \\mathbb{N}$ vertices; the $K_n$-free graphs; finite unions of the infinite complete graph $K_{\\omega}$; and duals of such graphs. The groups $\\operatorname{Aut}(\\Gamma)$ of automorphisms of such graphs $\\Gamma$ have a natural topology, which is compatible with multiplication and inversion, i.e.\\ the groups $\\operatorname{Aut}(\\Gamma)$ are topological groups. We consider the problem of finding minimally generated dense subgroups of the groups $\\operatorname{Aut}(\\Gamma)$ where $\\Gamma$ is ultrahomogeneous. We show that if $\\Gamma$ is ultrahomogeneous, then $\\operatorname{Aut}(\\Gamma)$ has 2-generated dense subgroups, and that under certain conditions given $f \\in \\operatorname{Aut}(\\Gamma)$ there exists $g\\in \\operatorname{Aut}(\\Gamma)$ such that the subgroup generated by $f$ and $g$ is dense. We also show that, roughly speaking, $g$ can be chosen with a high degree of freedom. For example, if $\\Gamma$ is either an infinite disjoint unions of $K_n$ or a finite union of $K_{\\omega}$, then $g$ can be chosen to have any given finite set of orbit representatives.
Let G be group; a finite p-subgroup S of G is a Sylow p-subgroup if every finite p-subgroup of G is conjugate to a subgroup of S. In this paper, we examine the relations between the fusion system over S which is given by conjugation in G and a certain chamber system C, on which G acts chamber transitively with chamber stabilizer N_G(S). Next, we introduce the notion of a fusion system with a parabolic family and we show that a chamber system can be associated to such a fusion system. We determine some conditions the chamber system has to fulfill in order to assure the saturation of the underlying fusion system. We give an application to fusion systems with parabolic families of classical type.
Given a reflection $r$ in a Coxeter group $W$ (possibly of infinite rank), we consider the subgroup of $W$ generated by the reflections in $W$ having (-1)-eigenvectors orthogonal to the (-1)-eigenvector of $r$. In this paper, we determine completely when this subgroup is finitely generated, by using preceding results on centralizers of reflections. This result provides a new and naturally constructed example of a family of non-finitely generated subgroups of finitely generated groups.
In this paper we characterize and construct semigroups whose right regular representation is a left cancellative semigroup. These semigroups will be called left equalizer simple semigroups. For a congruence $\\varrho$ on a semigroup $S$, let ${\\mathbb F}[\\varrho]$ denote the ideal of the semigroup algebra ${\\mathbb F}[S]$ which determines the kernel of the extended homomorphism of ${\\mathbb F}[S]$ onto ${\\mathbb F}[S/\\varrho]$ induced by the canonical homomorphism of $S$ onto $S/\\varrho$. We examine the right colons $({\\mathbb F}[\\varrho]:_r{\\mathbb F}[S])=\\{ a\\in {\\mathbb F}[S]:\\ {\\mathbb F}[S]a\\subseteq {\\mathbb F}[\\varrho ]\\}$ in general, and in that special case when $\\varrho$ has the property that the factor semigroup $S/\\varrho$ is left equalizer simple.
Given commuting elements a, b of a group G and a group epimorphism q : G  \\to G with finite kernel, the set of commuting lifts of a, b to G  is finite (possibly, empty). The second named author obtained a formula for the number of such lifts in terms of representations of Ker q. We apply this formula to several group epimorphisms q with the same kernel. In particular, we analyze the case where Ker q = Q_8 is the quaternion group. We show that in this case the number in question is equal to 0, 8, 16, 24, or 40. We show that all these numbers are realized by some G,G ,q,a,b.
We describe the most efficient solutions to the word problem of Artin s braid group known so far, i.e., in other words, the most efficient solutions to the braid isotopy problem, including the Dynnikov method, which could be especially suitable for cryptographical applications. Most results appear in literature; however, some results about the greedy normal form and the symmetric normal form and their connection with grid diagrams may have never been stated explicitly.
We investigate a new lattice of generalised non-crossing partitions, constructed using the geometry of the complex reflection group $G(e,e,r)$. For the particular case $e=2$ (resp. $r=2$), our lattice coincides with the lattice of simple elements for the type $D_n$ (resp. $I_2(e)$) dual braid monoid. Using this lattice, we construct a Garside structure for the braid group $B(e,e,r)$. As a corollary, one may solve the word and conjugacy problems in this group.
In the first, mostly expository, part of this paper, a graded Lie algebra is associated to every group G given with an N-series of subgroups. The asymptotics of the Poincare series of this algebra give estimates on the growth of the group G. This establishes the existence of a gap between polynomial growth and growth of type $e^{\\sqrt n}$ in the class of residually-p groups, and gives examples of finitely generated p-groups of uniformly exponential growth. In the second part, we produce two examples of groups of finite width and describe their Lie algebras, introducing a notion of Cayley graph for graded Lie algebras. We compute explicitly their lower central and dimensional series, and outline a general method applicable to some other groups from the class of branch groups. These examples produce counterexamples to a conjecture on the structure of just-infinite groups of finite width.
We study direct products of free-abelian and free groups with special emphasis on algorithmic problems. After giving natural extensions of standard notions into that family, we find an explicit expression for an arbitrary endomorphism of $\\ZZ^m \\times F_n$. These tools are used to solve several algorithmic and decision problems for $\\ZZ^m \\times F_n $: the membership problem, the isomorphism problem, the finite index problem, the subgroup and coset intersection problems, the fixed point problem, and the Whitehead problem.
We study three natural bi-invariant partial orders on a certain covering group of the automorphism group of a bounded symmetric domain of tube type; these orderings are defined using the geometry of the Shilov boundary, Lie semigroup theory and quasimorphisms respectively. Our main result shows that these orders are related by two inclusion relations. In the case of $SL_2(\\R)$ we can show that they coincide.
Planar locally finite graphs which are almost vertex transitive are discussed. If the graph is 3-connected and has at most one end then the group of automorphisms is a planar discontinuous group and its structure is well-known. A general result is obtained for such graphs where no restriction is put on the number of ends. It is shown that such a graph can be built up from one ended or finite planar graphs in a precise way. The results give a classification of the finitely generated groups with planar Cayley graphs.
In this paper, we study the minimality of the boundary of a Coxeter system. We show that for a Coxeter system $(W,S)$ if there exist a maximal spherical subset $T$ of $S$ and an element $s_0\\in S$ such that $m(s_0,t)\\ge 3$ for each $t\\in T$ and $m(s_0,t_0)=\\infty$ for some $t_0\\in T$, then every orbit $W\\alpha$ is dense in the boundary $\\partial\\Sigma(W,S)$ of the Coxeter system $(W,S)$, hence $\\partial\\Sigma(W,S)$ is minimal, where $m(s_0,t)$ is the order of $s_0t$ in $W$.
In this article we show that every group with a finite presentation satisfying one or both of the small cancellation conditions $C (1/6)$ and $C (1/4)-T(4)$ has the property that the set of all geodesics (over the same generating set) is a star-free regular language. Star-free regularity of the geodesic set is shown to be dependent on the generating set chosen, even for free groups. We also show that the class of groups whose geodesic sets are star-free with respect to some generating set is closed under taking graph (and hence free and direct) products, and includes all virtually abelian groups.
Let n >1 be an integer, and G a doubly transitive subgroup of the symmetric group on X={1,...,n}. In this paper we find all linear group representations rho of G on an euclidean vector space V which contains a set of equiangular vector lines GG={< v_1>,...,} such that : (1) V is generated by v_1,...,v_n, (2) for all i in X and all g in G, = . Then we illustrate our construction when G=SL_d(q), q odd and d > 1.
A group has finite palindromic width if there exists $n$ such that every element can be expressed as a product of $n$ or fewer palindromic words. We show that if $G$ has finite palindromic width with respect to some generating set, then so does $G \\wr \\mathbb{Z}^{r}$. We also give a new, self-contained, proof that finitely generated metabelian groups have finite palindromic width. Finally, we show that solvable groups satisfying the maximal condition on normal subgroups (max-n) have finite palindromic width.
We study the HNN extension of $\\mathbb{Z}^m$ given by the cubing endomorphism $g\\mapsto g^3$, and prove that such groups have rational horocyclic growth. To do so, we describe a method of computing the subgroup growth series of the horocyclic subgroup $\\mathbb{Z}^m$ in this family of examples, prove that for all $m$ the subgroup has rational growth. In the appendix, the subgroup growth series has been computed for all $m \\leq 10$.
The aim of this note is to answer a question by Guoliang Yu of whether the group $EL_3(Z<x,y>)$, where $Z<x,y>$ is the free (non-commutative) ring, has any faithful linear representations over a field. We prove, in particular, that for every (unitary associative) ring $R$, the group $EL_3(R)$ has a faithful finite dimensional complex representation if and only if $R$ has a finite index ideal that has a faithful finite dimensional complex representation.
We investigate the class of root systems R obtained by extending an irreducible root system by a torsion-free group G. In this context there is a Weyl group W and a group U with the presentation by conjugation. We show under additional hypotheses that the kernel of the natural homomorphism from U to W is isomorphic to the kernel of the homomorphism from the abelianization of U to that of W. For this we introduce the concept of a symmetric system, a discrete version of the concept of a symmetric space. Mathematics Subject Classification 2000: 20F55, 17B65, 17B67, 22E65, 22E40. Key Words and Phrases: Weyl group, root system, presentation by conjugation, extended affine Weyl group (EAWeG), extended affine root system (EARS), irreducible root system extended by an abelian group.
We show that every word hyperbolic, surface-by-(noncyclic) free group Gamma is as rigid as possible: the quasi-isometry group of Gamma equals the abstract commensurator group Comm(Gamma), which in turn contains Gamma as a finite index subgroup. As a corollary, two such groups are quasi-isometric if and only if they are commensurable, and any finitely generated group quasi-isometric to Gamma must be weakly commensurable with Gamma. We use quasi-isometries to compute Comm(Gamma) explicitly, an example of how quasi-isometries can actually detect finite index information. The proofs of these theorems involve ideas from coarse topology, Teichmuller geometry, pseudo-Anosov dynamics, and singular solv-geometry.
This paper is a continuation of our first paper [10] in which we showed how deformation theory of representation varieties can be used to study finite simple quotients of triangle groups. While in Part I, we mainly used deformations of the principal homomorphism from ${\\rm SO}(3,\\R)$, in this part we use ${\\rm PGL}_2(\\R)$ as well as deformations of representations which are very different from the principal homomorphism.
A group is $G$ commutative transitive or CT if commuting is transitive on nontrivial elements. A group $G$ is CSA or conjugately separated abelian if maximal abelian subgroups are malnormal. These concepts have played a prominent role in the studies of fully residually free groups, limit groups and dicriminating groups. They were especially important in the solution to the Tarski problems. CSA always implies CT however the class of CSA groups is a proper subclass of the class of CT groups. For limit groups and finitely generated elementary free groups they are equivalent. In this paper we examine the relationship between the two concepts. In particular we show that a finite CSA group must be abelian. If $G$ is CT then we prove that $G$ is not CSA if and only if $G$ contains a nonabelian subgroup $G_0$ which contains a nontrivial abelian subgroup $H$ that is normal in $G_0$. For $K$ a field the group $PSL(2,K)$ is never CSA but is CT if char$(K) = 2$ and for fields $K$ of characteristic $0$ where $-1$ is not a sum of two squares in $K$. For characteristic $p$, for an odd prime $p$, $PSL(2,K)$ is never CT. Infinite CT groups $G$ with a composition series and having no nontrivial normal abelian subgroup must be monolithic with monolith a simple nonabalian CT group. Further if a group $G$ is monolithic with monolith $N$ isomorphic to $PSL(2,K)$ for a field $K$ of characteristic $2$ and $G$ is CT then $G \\cong N$.
We present a construction for the holomorph of an inverse semigroup, derived from the cartesian closed structure of the category of ordered groupoids. We compare the holomorph with the monoid of mappings that preserve the ternary heap operation on an inverse semigroup: for groups these two constructions coincide. We present detailed calculations for semilattices of groups and for the polycyclic monoids.
Motivated by a desire to test the security of the pubic key exchange protocol of I. Anshel, M. Anshel, and D. Goldfeld, (``An Algebraic Method for Public-Key Cryptography  , Mathematical Research Letters, vol. 6, pp. 1-5, 1999), we study algorithmic approaches to the simple commutator decision and promise problems (SCDP/SCPP) for the braid groups B_n. We take as our point of departure a seminal paper of O. Ore, (``Some Remarks on Commutators  , Proceedings of the American Mathematical Society, Vol. 2, No. 2, pp.307-314, 1951), which studies the SCPP for the symmetric groups. Our results build on the work of H. Cejtin and I. Rivin, (``A Property of Alternating Groups  , arXiv:math.GR/0303036).
Let F_n be a free group of rank n>1. Two elements g, h in F_n are said to be translation equivalent in F_n if the cyclic length of \\phi(g) equals the cyclic length of \\phi(h) for every automorphism \\phi of F_n. Let F(a, b) be the free group generated by {a, b} and let w(a,b) be an arbitrary word in F(a,b). We prove that w(g, h) and w(h, g) are translation equivalent in F_n whenever g, h \\in F_n are translation equivalent in F_n, which hereby gives an affirmative solution to problem F38b in the online version (this http URL) of [1].
The problem of determining whether or not a non-elementary subgroup of $PSL(2,\\CC)$ is discrete is a long standing one. The importance of two generator subgroups comes from J{\\o}rgensen s inequality which has as a corollary the fact that a non-elementary subgroup of $PSL(2,\\CC)$ is discrete if and only if every non-elementary two generator subgroup is. A solution even in the two-generator $PSL(2,\\RR)$ case appears to require an algorithm that relies on a the concept of {\\sl trace minimizing} that was initiated by Rosenberger and Purzitsky in the 1970 s Their work has lead to many discreteness results and algorithms. Here we show how their concept of trace minimizing leads to a theorem that gives bounds on the hyperbolic lengths of curves on the quotient surface that are the images of primitive generators in the case where the group is discrete and the quotient is a pair of pants. The result follows as a consequence of the Non-Euclidean Euclidean algorithm.
Let $S$ be a semigroup and $T$ be a subsemigroup of finite index in $S$ (that is, the set $S\\setminus T$ is finite). The subsemigroup $T$ is also called a large subsemigroup of $S$. It is well known that if $T$ has a finite complete rewriting system then so does $S$. In this paper, we will prove the converse, that is, if $S$ has a finite complete rewriting system then so does $T$. Our proof is purely combinatorial and also constructive.
Let $F$ be a perfect field and $M^*(F)$ the nonassociative simple Moufang loop consisting of the units in the (unique) split octonion algebra $O(F)$ modulo the center. Then $Aut(M^*(F))$ is equal to $G_2(F) \\rtimes Aut(F)$. In particular, every automorphism of $M^*(F)$ is induced by a semilinear automorphism of $O(F)$. The proof combines results and methods from geometrical loop theory, groups of Lie type and composition algebras; its gist being an identification of the automorphism group of a Moufang loop with a subgroup of the automorphism group of the associated group with triality.
We examine distortion of finitely generated normal subgroups. We show a connection between subgroup distortion and group divergence. We suggest a method computing the distortion of normal subgroups by decomposing the whole group into smaller subgroups. We apply our work to compute the distortion of normal subgroups of graph of groups and normal subgroups of right-angled Artin groups that induce infinite cyclic quotient groups. We construct normal subgroups of $\\CAT(0)$ groups introduced by Macura and introduce a collection of normal subgroups of right-angled Artin groups. These groups provide a rich source to study the connection between subgroup distortion and group divergence on $\\CAT(0)$ groups.
Using the Kirillov orbit method, novel methods from p-adic integration and Clifford theory, we study representation zeta functions associated to compact p-adic analytic groups. In particular, we give general estimates for the abscissae of convergence of such zeta functions. We compute explicit formulae for the representation zeta functions of some compact p-adic analytic groups, defined over a compact discrete valuation ring O of characteristic 0. These include principal congruence subgroups of SL_2(O), without any restrictions on the residue field characteristic of O, as well as the norm one group SL_1(D) of a non-split quaternion algebra D over the field of fractions of O and its principal congruence subgroups. We also determine the representation zeta functions of principal congruence subgroups of SL_3(O) in the case that O has residue field characteristic 3 and is unramified over Z_3.
In 1968, John Thompson proved that a finite group $G$ is solvable if and only if every $2$-generator subgroup of $G$ is solvable. In this paper, we prove that solvability of a finite group $G$ is guaranteed by a seemingly weaker condition: $G$ is solvable if for all conjugacy classes $C$ and $D$ of $G$, \\emph{there exist} $x\\in C$ and $y\\in D$ for which $\\gen{x,y}$ is solvable. We also prove the following property of finite nonabelian simple groups, which is the key tool for our proof of the solvability criterion: if $G$ is a finite nonabelian simple group, then there exist two integers $a$ and $b$ which represent orders of elements in $G$ and for all elements $x,y\\in G$ with $|x|=a$ and $|y|=b$, the subgroup $\\gen{x,y}$ is nonsolvable.
In [10] Benjamin Klopsch and Ilir Snopce posted the conjecture that for $p\\geq 3$ and $G$ a torsion-free pro-$p$ group $d(G)=\\dim (G)$ is a sufficient and necessary condition for the pro-$p$ group $G$ to be uniform. They pointed out that this follows from the more general question of whether for a finite $p$-group $d(G)=\\log_p(|\\Omega_1(G)|)$ is a sufficient and necessary condition for the group $G$ to be powerful. In this short note we will give a positive answer to this question for $p\\geq 5$.
Let G be a finite group and {\\sigma} = {{\\sigma}_i, i \\in I} be a partition of the set of all primes \\mathbb{P}. A set \\mathcal{H} of subgroups of G with 1 \\in \\mathcal{H} is said to be a complete Hall {\\sigma}-set of G if every non-identity member of \\mathcal{H} is a Hall {\\sigma}_i-subgroup of G. A subgroup H of G is said to be {\\sigma}-permutable if G possesses a complete Hall {\\sigma}-set \\mathcal{H} such that HA^x = A^xH for all A \\in \\mathcal{H} and all x \\in G. We say that a subgroup H of G is weakly {\\sigma}-permutable in G if there exists a {\\sigma}-subnormal subgroup T of G such that G = HT and H \\cap T \\leq H_{\\sigma}G. where H_{\\sigma}G is the subgroup of H generated by all those subgroups of H which are {\\sigma}-permutable in G. By using this new notion, we establish some new criterias for a group G to be a {\\sigma}-soluble and supersoluble, and also we give the conditions under which a normal subgroup of G is hypercyclically embedded.
In his paper \"On a construction of semigroups\", M. Kolibiar gives a construction for a semigroup $T$ (beginning from a semigroup $S$) which is said to be derived from the semigroup $S$ by a $\\theta$-construction. He asserted that every semigroup $T$ can be derived from the factor semigroup $T/\\theta (T)$ by a $\\theta$-construction, where $\\theta (T)$ is the congruence on $T$ defined by: $(a, b)\\in \\theta (T)$ if and only if $xa=xb$ for all $x\\in T$. Unfortunately, the paper contains some incorrect part. In our present paper we give a revision of the paper.
Symmetric $k$-varieties generalize Riemannian sym\\-me\\-tric spaces to reductive groups defined over arbitrary fields. For most perfect fields, it is known that symmetric $k$-varieties are in one-to-one correspondence with isomorphy classes of $k$-involutions. Therefore, it is useful to have representatives of each isomorphy class in order to describe the $k$-varieties. Here we give matrix representatives for each isomorphy class of $k$-involutions of $\\text{SL}(n,k)$ in the case that $k$ is any field of characteristic 2; we also describe fixed point groups of each type of involution.
This paper is the first of a sequence of three papers, where the concept of an $\\mathbb R$-tree dual to a measured geodesic lamination in a hyperbolic surface is generalized to arbitrary $\\mathbb R$-trees provided with a (very small) action of the free group $F_N$ of finite rank $N\\geq 2$ by isometries. Three different definitions are given and they are proved to be equivalent. We also describe the topology and Out$(F_N)$-action on the space of laminations.
We determine the Lusztig restrictions on the space of class functions with a unipotent support on a finite reductive group. In particular we give a simple expression for the Lusztig restrictions of the generalized Green functions and we describe the Lusztig restrictions of the generalized Gelfand-Graev representations. We make explicit computations for the Gelfand-Graev representations associated to the subregular unipotent class. In the case of SLn we show that the computations can be reduced to the case of GLn  for various n .
The Bernoulli measure on strings is used to define height functions for the dense R- and L-orders of the Thompson-Higman monoids M_{k,1}. The measure can also be used to characterize the D-relation of certain submonoids of M_{k,1}. The computational complexity of computing the Bernoulli measure of certain sets, and in particular, of computing the R- and L-height of an element of M_{k,1} is investigated.
Given a finitely generated (fg) group G, the set R(G) of homomorphisms from G to SL(2,C) inherits the structure of an algebraic variety known as the \"representation variety\" of G. This algebraic variety is an invariant of fg presentations of G. Call a group G parafree of rank n if it shares the lower central sequence with a free group of rank n, and if it is residually nilpotent. The deviation of a fg parafree group is the difference between the minimum possible number of generators of G and the rank of G. So parafree groups of deviation zero are actually just free groups. Parafree groups that are not free share a host of properties with free groups. In this paper algebraic geometric invariants involving the number of maximal irreducible components (mirc) of R(G) and the dimension of R(G) for certain classes of one-relator parafree groups are computed. It is then shown that in an infinite number of cases these invariants successfully discriminate between isomorphism types within the class of parafree groups of the same rank. This is quite surprising, since in this paper it also shown that an n generated group G is free of rank n iff Dim(R(G))=3n. In fact, a direct consequence of Theorem 1.6 in this paper is that given an arbitrary positive integer k, and any integer r > 1 there exist infinitely many non-isomorphic (fg) parafree groups of rank r and deviation one with representation varieties of dimension 3r, having more than k mirc of dimension 3r.
In this article we will describe a finitely presented subgroup of Monod s group of piecewise projective homeomorphisms of R. This in particular provides a new example of a finitely presented group which is nonamenable and yet does not contain a nonabelian free subgroup. It is in fact the first such example which is torsion free. We will also develop a means for representing the elements of the group by labeled tree diagrams in a manner which closely parallels Richard Thompson s group F.
We provide a new and much simpler structure for quasi-ideal adequate transversals of abundant semigroups in terms of spined products, which is similar in nature to that given by Saito for weakly multiplicative inverse transversals of regular semigroups. As a consequence we deduce a similar result for multiplicative transversals of abundant semigroups and also consider the case when the semigroups are in fact regular and provide some new structure theorems for inverse transversals.
We show that the conjugacy problem is solvable in [finitely generated free]-by-cyclic groups, by using a result of O. Maslakova that one can algorithmically find generating sets for the fixed subgroups of free group automorphisms, and one of P. Brinkmann that one can determine whether two cyclic words in a free group are mapped to each other by some power of a given automorphism. The algorithm effectively computes a conjugating element, if it exists. We also solve the power conjugacy problem and give an algorithm to recognize if two given elements of a finitely generated free group are Reidemeister equivalent with respect to a given automorphism.
We classify abelian subgroups of Out(F_n) up to finite index in an algorithmic and computationally friendly way. A process called disintegration is used to canonically decompose a single rotationless element \\phi into a composition of finitely many elements and then use these elements to generate an abelian subgroup A(\\phi) that contains \\phi. The main theorem is that up to finite index every abelian subgroup is realized by this construction. As an application we classify, up to finite index, abelian subgroups of Out(F_n) and of IA with maximal rank.
It is well known that every finite subgroup of automorphism group of polynomial algebra of rank 2 over the field of zero characteristic is conjugated with a subgroup of linear automorphisms. We prove that it is not true for an arbitrary torsion subgroup. We construct an example of abelian $p$-group of automorphism of polynomial algebra of rank 2 over the field of complex numbers, which is not conjugated with a subgroup of linear automorphisms.
We give an example of a Cayley graph $\\Gamma$ for the group $F_{2}\\times F_{2}$ which is not minimally almost convex (MAC). On the other hand, the standard Cayley graph for $F_{2}\\times F_{2}$ does satisfy the falsification by fellow traveler property (FFTP). As a result, we show that any Cayley graph property $K$ which satisfies $\\text{FFTP}\\Rightarrow K\\Rightarrow\\text{MAC}$ is dependent on the generating set. This includes the well known properties FFTP and almost convexity, which were already known to depend on the generating set. This also shows the new results that Poenaru s condition $P(2)$ and the basepoint loop shortening property both depend on the generating set. We also show that the Cayley graph $\\Gamma$ does not have the loop shortening property, so this property also depends on the generating set.
We prove that the nilpotent product of a set of groups $A_{1},\\dots, A_{s}$ has finite palindromic width if and only if the palindromic widths of $A_{i}, i=1,\\dots, s,$ are finite. We give a new proof that the commutator width of $F_n \\wr K$ is infinite, where $F_n$ is a free group of rank $n \\geq 2$ and $K$ a finite group. This result, combining with a result of Fink \\cite{f1} gives examples of groups with infinite commutator width but finite palindromic width with respect to some generating set.
A crucial lemma on module theory is Nakayama s lemma \\cite{AF}. In this article, we shall investigate some forms of Nakayama s lemma in the category of right acts over a given monoid $S$ with identity 1. More precisely, among other things, we show that equality $AI=A$ for some proper ideal $I$ of $S$ implies $A=\\{\\theta\\}$, when $A$ is a finitely generated quasi-strongly faithful $S$-act with unique zero element $\\theta$ and $S$ is a monoid in which its unique maximal right ideal $\\mathfrak{M}$ is two-sided. Furthermore, as an application of Nakayama s lemma we prove Krull intersection theorem for $S$-acts. Finally, as a consequence, we shall see a homological classification form of this lemma, i.e, we prove if $S$ is a commutative monoid then every projective $S$-act is free if and only if $E(S)=\\{1\\}$, which $E(S)$ is the set of all idempotents of $S$.
Finite groups $G$ such that $G/Z(G) \\simeq C_2 \\times C_2$ where $C_2$ denotes a cyclic group of order 2 and $Z(G)$ is the center of $G$ were studied in \\cite{casofinito} and were used to classify finite loops with alternative loop algebras. In this paper we extend this result to finitely generated groups such that $G/Z(G) \\simeq C_p \\times C_p$ where $C_p$ denotes a cyclic group of prime order $p$ and provide an explicit description of all such groups.
Let $G$ be a finite group, $u$ a Bass unit based on an element $a$ of $G$ of prime order, and assume that $u$ has infinite order modulo the center of the units of the integral group ring $\\Z G$. It was recently proved that if $G$ is solvable then there is a Bass unit or a bicyclic unit $v$ and a positive integer $n$ such that the group generated by $u^n$ and $v^n$ is a non-abelian free group. It has been conjectured that this holds for arbitrary groups $G$. To prove this conjecture it is enough to do it under the assumption that $G$ is simple and $a$ is a dihedral $p$-critical element in $G$. We first classify the simple groups with a dihedral $p$-critical element. They are all of the form $\\PSL(2,q)$. We prove the conjecture for $p=5$; for $p>5$ and $q$ even; and for $p>5$ and $q+1=2p$. We also provide a sufficient condition for the conjecture to hold for $p>5$ and $q$ odd. With the help of computers we have verified the sufficient condition for all $q<10000$.
The study of associativity of the commutator operation in groups goes back to some work of Levi in 1942. In the 1960 s Richard J. Thompson created a group F whose elements are representatives of the generalized associative law for an arbitrary binary operation. In 2006, Geoghegan and Guzman proved that a group G is solvable if and only if the commutator operation in G eventually satisfies ALL instances of the associative law, and also showed that many non-solvable groups do not satisfy any instance of the generalized associative law. We will address the question: Is there a non-solvable group which satisfies SOME instance of the generalized associative law? For finite groups, we prove that the answer is no.
Let a discrete group $G$ possess two convergence actions by homeomorphisms on compacta $X$ and $Y$. Consider the following question: does there exist a convergence action $G{\\curvearrowright}Z$ on a compactum $Z$ and continuous equivariant maps $X\\leftarrow Z\\to Y$? We call the space $Z$ (and action of $G$ on it) {\\it pullback} space (action). In such general setting a negative answer follows from a recent result of O. Baker and T. Riley [BR]. Suppose, in addition, that the initial actions are relatively hyperbolic that is they are non-parabolic and the induced action on the distinct pairs are cocompact. Then the existence of the pullback space if $G$ is finitely generated follows from \\cite{Ge2}. The main result of the paper claims that the pullback space exists if and only if the maximal parabolic subgroups of one of the actions are dynamically quasiconvex for the other one. We provide an example of two relatively hyperbolic actions of the free group $G$ of countable rank for which the pullback action does not exist. We study an analog of the notion of geodesic flow for relatively hyperbolic groups. Further these results are used to prove the main theorem.
We show several geometric and algebraic aspects of a necklace: a link composed with a core circle and a series of circles linked to this core. We first prove that the fundamental group of the configuration space of necklaces (that we will call braid group of a necklace) is isomorphic to the braid group over an annulus quotiented by the square of the center. We then define braid groups of necklaces and affine braid groups of type A in terms of automorphisms of free groups and characterize these automorphisms among all automorphisms of free groups. In the case of affine braid groups of type A such representation is faithful.
We generalize the common notion of descending and ascending central series. The descending approach determines a naturally graded Lie ring and the ascending version determines a graded module for this ring. We also link derivations of these rings to the automorphisms of a group. This uncovers new structure in 4/5 of the approximately 11.8 million groups of size at most 1000 and beyond that point pertains to at least a positive logarithmic proportion of all finite groups.
In this thesis we study the following property of a finite group G: the minimal number n such that G embeds in Sn. We start with an explicit formula for the number n for abelian groups. Then, we study the behavior of this group property in respect to direct products. Finally, we define and explore the \"compression ratio\" of a finite group G which measures how much better the best embedding is relative to the embedding given by Cayley s theorem.
We define a family of groups that include the mapping class group of a genus g surface with one boundary component and the integral symplectic group Sp(2g,Z). We then prove that these groups are finitely generated. These groups, which we call mapping class groups over graphs, are indexed over labeled simplicial graphs with 2g vertices. The mapping class group over the graph Gamma is defined to be a subgroup of the automorphism group of the right-angled Artin group A_Gamma of Gamma. We also prove that the kernel of the map Aut A_Gamma to Aut H_1(A_Gamma) is finitely generated, generalizing a theorem of Magnus.
Recently, two first authors have introduced a group invariant, which is related to the number of elements $x$ and $y$ of a finite group $G$ such that $x\\wedge y=1$ in the exterior square $G\\wedge G$ of $G$. Research on this probability gives some relations between the concept and Schur multiplier and the capability of finite groups. In the present paper, we will generalize the concept of exterior degree of groups and we will introduce the multiple exterior degree of finite groups. Among the other results, we will state some results between the multiple exterior degree, multiple commutativity degree and capability of finite groups.
We consider a finiteness condition on centralizers in a group G, namely that |C_G (x) : <x>| is finite for every non-normal cyclic subgroup <x> of G. For periodic groups, this is the same as |C_G (x)| is finite for every non-normal cyclic subgroup <x> of G. We give a full description of locally finite groups satisfying this condition. As it turns out, they are a special type of cyclic extensions of Dedekind groups. We also study a variation of our condition, where the requirement of finiteness is replaced with a bound: |C_G (x) : <x>| < n for every non-normal cyclic subgroup <x> of G, for some fixed n. In this case, we are able to extend our analysis to the class of periodic locally graded groups.
This paper deals with the reducibility property of semidirect products of the form $\\bf V*\\bf D$ relatively to graph equation systems, where $\\bf D$ denotes the pseudovariety of definite semigroups. We show that, if the pseudovariety $\\bf V$ is reducible with respect to the canonical signature $\\kappa$ consisting of the multiplication and the $(\\omega-1)$-power, then $\\bf V*\\bf D$ is also reducible with respect to $\\kappa$.
Assume $G$ is a solvable group whose elementary abelian sections are all finite. Suppose, further, that $p$ is a prime such that $G$ fails to contain any subgroups isomorphic to $C_{p^\\infty}$. We show that if $G$ is nilpotent, then the pro-$p$ completion map $G\\to \\hat{G}_p$ induces an isomorphism $H^\\ast(\\hat{G}_p,M)\\to H^\\ast(G,M)$ for any discrete $\\hat{G}_p$-module $M$ of finite $p$-power order. For the general case, we prove that $G$ contains a normal subgroup $N$ of finite index such that the map $H^\\ast(\\hat{N}_p,M)\\to H^\\ast(N,M)$ is an isomorphism for any discrete $\\hat{N}_p$-module $M$ of finite $p$-power order. Moreover, if $G$ lacks any $C_{p^\\infty}$-sections, the subgroup $N$ enjoys some additional special properties with respect to its pro-$p$ topology.
In parallel to the classical theory of central extensions of groups, we develop a version for extensions that preserve commutativity. It is shown that the Bogomolov multiplier is a universal object parametrising such extensions of a given group. Maximal and minimal extensions are inspected, and a connection with commuting probability is explored. Such considerations produce bounds for the exponent and rank of the Bogomolov multiplier.
For a discrete group $\\Gamma$ satisfying some finiteness conditions we give a Bredon projective resolution of the trivial module in terms of projective covers of the chain complex associated to certain posets of subgroups. We use this to give new results on dimensions of $E\\gamma$ and to reprove that for virtually solvable groups, $\\underline{\\cd}\\Gamma=\\vcd\\Gamma$. We also deduce a formula to compute the Euler class of $E\\gamma$ for $\\Gamma$ virtually solvable of type $\\FP_\\infty$ and use it to compute orbifold Euler characteristics.
Let $G$ be a non-abelian $p$-group of order $p^n$ and $M(G)$ denote the Schur multiplier of $G$. Niroomand proved that $|M(G)| \\leq p^{\\frac{1}{2}(n+k-2)(n-k-1)+1}$ for non-abelian $p$-groups $G$ of order $p^n$ with derived subgroup of order $p^k$. Recently Rai classified $p$-groups $G$ of nilpotency class $2$ for which $|M(G)|$ attains this bound. In this article we show that there is no finite $p$-group $G$ of nilpotency class $c \\geq 3$ for $p\\neq3$ such that $|M(G)|$ attains this bound. Hence $|M(G)| \\leq p^{\\frac{1}{2}(n+k-2)(n-k-1)}$ for $p$-groups $G$ of class $c \\geq 3$ where $p \\neq 3$. We also construct a $p$-group $G$ for $p=3$ such that $|M(G)|$ attains the Niroomand s bound.
The operator of weak commutativity between isomorphic groups $H$ and $H^{\\psi }$ was defined by Sidki as \\begin{equation*} \\chi (H)=\\left\\langle H,H^{\\psi }\\mid \\lbrack h,h^{\\psi }]=1,\\forall ,h\\in H\\right\\rangle \\text{.} \\end{equation*}% It is known that the operator $\\chi $ preserves group properties such as finiteness, solubility and also nilpotency for finitely generated groups. We prove in this work that $\\chi $ preserves the properties of being polycyclic and polycyclic by finite. As a consequence of this result, we conclude that the non-abelian tensor square $H\\otimes H$ of a group $H$, defined by Brown and Loday, preserves the property polycyclic by finite. This last result extends that of Blyth and Morse who proved that $H\\otimes H$ is polycyclic if $H$ is polycyclic.
The set of finitely generated subgroups of the group $PL_+(I)$ of orientation-preserving piecewise-linear homeomorphisms of the unit interval includes many important groups, most notably R.~Thompson s group $F$. In this paper we show that every finitely generated subgroup $G<PL_+(I)$ is either soluble, or contains an embedded copy of Brin s group $B$, a finitely generated, non-soluble group, which verifies a conjecture of the first author from 2009. In the case that $G$ is soluble, we show that the derived length of $G$ is bounded above by the number of breakpoints of any finite set of generators. We specify a set of `computable  subgroups of $PL_+(I)$ (which includes R. Thompson s group $F$) and we give an algorithm which determines in finite time whether or not any given finite subset $X$ of such a computable group generates a soluble group. When the group is soluble, the algorithm also determines the derived length of $\\langle X\\rangle$. Finally, we give a solution of the membership problem for a family of finitely generated soluble subgroups of any computable subgroup of $PL_+(I)$.
Hopf Galois theory expands the classical Galois theory by considering the Galois property in terms of the action of the group algebra k[G] on K/k and then replacing it by the action of a Hopf algebra. We review the case of separable extensions where the Hopf Galois property admits a group-theoretical formulation suitable for counting and classifying, and also to perform explicit computations and explicit descriptions of all the ingredients involved in a Hopf Galois structure. At the end we give just a glimpse of how this theory is used in the context of Galois module theory for wildly ramified extensions.
We study special elements of eight types (namely, neutral, standard, costandard, distributive, codistributive, modular, lower-modular and upper-modular elements) in the lattice EPI of all epigroup varieties. Neutral, standard, costandard, distributive and lower-modular elements are completely determined. A strong necessary condition and a sufficient condition for modular elements are found. Modular elements are completely classified within the class of commutative varieties, while codistributive and upper-modular elements are completely determined within the wider class of strongly permutative varieties. It is verified that an element of EPI is costandard if and only if it is neutral; is standard if and only if it is distributive; is modular whenever it is lower-modular; is neutral if and only if it is lower-modular and upper-modular simultaneously. We found also an application of results concerning neutral and lower-modular elements of EPI for studying of definable sets of epigroup varieties.
We generalize the familiar notion of a Whitehead move from Culler and Vogtmann s Outer space to the setting of deformation spaces of G-trees. Specifically, we show that there are two moves, each of which transforms a reduced G-tree into another reduced G-tree, that suffice to relate any two reduced trees in the same deformation space. These two moves further factor into three moves between reduced trees that have simple descriptions in terms of graphs of groups. This result has several applications.
Let G be a finite group and let T(G) be the abelian group of equivalence classes of endotrivial kG-modules, where k is an algebraically closed field of characteristic p. We determine, in terms of the structure of G, the kernel of the restriction map from T(G) to T(S), where S is a Sylow p-subgroup of G, in the case when S is abelian. This provides a classification of all torsion endotrivial kG-modules in that case.
A loop $(X,\\circ)$ is said to be a Bruck loop if it satisfies the (right) Bol identity $((z\\circ x)\\circ y)\\circ x = z\\circ ((x\\circ y)\\circ x)$ and the automorphic inverse property $(x\\circ y)^{-1}=x^{-1}\\circ y^{-1}$. If $X$ is a finite Bruck loop and $G$ is the group generated by all right translations $R(x): y\\mapsto y\\circ x$, then we show that $X$ and $G$ are central products $X = O^{2 }(X) * O(X)$ and $G = O^{2 }(G) * O(G)$, where $O^{2 }(X)$ ($O^{2 }(G)$) is the subloop (subgroup) generated by all 2-elements, and $O(X)$ ($O(G)$) is the largest normal subloop (subgroup) of odd order. In particular, if $X$ is solvable, then these central products are direct products. We also give a set of necessary conditions that must hold for a finite Bruck loop $X$ to be nonsolvable but have each proper section solvable; in particular, $X$ must be simple and consist of 2-elements, while the quotient of $G$ by its largest normal 2-subgroup must be isomorphic to $PGL_2(q)$, with $q=2^n+1\\geq 5$.
Let $\\Out(F_n)$ denote the outer automorphism group of the free group $F_n$ with $n>3$. We prove that for any finite index subgroup $\\Gamma<\\Out(F_n)$, the group $\\Aut(\\Gamma)$ is isomorphic to the normalizer of $\\Gamma$ in $\\Out(F_n)$. We prove that $\\Gamma$ is {\\em co-Hopfian} : every injective homomorphism $\\Gamma\\to \\Gamma$ is surjective. Finally, we prove that the abstract commensurator $\\Comm(\\Out(F_n))$ is isomorphic to $\\Out(F_n)$.
A discrete group which admits a faithful, finite dimensional, linear representation over a field $\\mathbb F$ of characteristic zero is called linear. This note combines the natural structure of semi-direct products with work of A. Lubotzky on the existence of linear representations to develop a technique to give sufficient conditions to show that a semi-direct product is linear. Let $G$ denote a discrete group which is a semi-direct product given by a split extension $1 \\to \\pi \\to G \\to \\Gamma \\to 1$. This note defines an additional type of structure for this semi-direct product called a stable extension below. The main results are as follows: 1. If $\\pi$ and $\\Gamma$ are linear, and the extension is stable, then $G$ is also linear. Restrictions concerning this extension are necessary to guarantee that $G$ is linear as seen from properties of the Formanek-Procesi \"poison group\". 2. If the action of $\\Gamma$ on $\\pi$ has a \"Galois-like\" property that it factors through the automorphisms of certain natural \"towers of groups over $\\pi$\" (to be defined below), then the associated extension is stable and thus $G$ is linear. 3. The condition of a stable extension also implies that $G$ admits filtration quotients which themselves give a natural structure of Lie algebra and which also imply earlier results of Kohno, and Falk-Randell on the Lie algebra attached to the descending central series associated to the fundamental groups of complex hyperplane complements. The methods here suggest that a possible technique for obtaining new linearity results may be to analyze automorphisms of towers of groups.
We describe finite-dimensional smooth Lie groups over local fields of positive characteristic which do not admit an analytic Lie group structure compatible with the given topological group structure, and C^n-Lie groups without a compatible C^{n+1}-Lie group structure, for each positive integer n. We also present examples of non-analytic, smooth automorphisms of Lie groups over such fields, as well as C^n-automorphisms which fail to be C^{n+1}.
In the case where $G=$SL$_{2}(F)$ for a non-archimedean local field $F$ and $\\Gamma$ is a discrete torsion-free cocompact subgroup of $G$, there is a known relationship between the Ihara zeta function for the quotient of the Bruhat-Tits tree of $G$ by the action of $\\Gamma$, and an alternating product of determinants of twisted Poincar\\ e series for parabolic subgroups of the affine Weyl group of $G$. We show how this can be generalised to other split simple algebraic groups of rank two over $F$, and formulate a conjecture about how this might be generalised to groups of higher rank.
In this paper, we have introduced the notion of {\\Gamma}-fuzzification in {\\Gamma}-AG-groupoids which is in fact the generalization of fuzzy AG-groupoids. We have studied several properties of an intra-regular {\\Gamma}-AG^{**}-groupoids in terms of fuzzy {\\Gamma}-left (right, two-sided, quasi, interior, generalized bi-, bi-) ideals. We have proved that all fuzzy {\\Gamma}-ideals coincide in intra-regular {\\Gamma}-AG^{**}-groupoids. We have also shown that the set of fuzzy {\\Gamma}-two-sided ideals of an intra-regular {\\Gamma}-AG^{**}-groupoid forms a semilattice structure.
We study spectral properties of the Laplacians on Schreier graphs arising from Grigorchuk s group acting on the boundary of the infinite binary tree. We establish a connection between the action of $G$ on its space of Schreier graphs and a subshift associated to a non-primitive substitution and relate the Laplacians on the Schreier graphs to discrete Schroedinger operators with aperiodic order. We use this relation to prove that the spectrum of the anisotropic Laplacians is a Cantor set of Lebesgue measure zero. We also use it to show absence of eigenvalues both almost-surely and for certain specific graphs. The methods developed here apply to a large class of examples.
We generalize the notion of a projective profinite group to a projective pair of a profinite group and a closed subgroup. We establish the connection with Pseudo Algebraically Closed (PAC) extensions of PAC fields: Let M be an algebraic extension of a PAC field K. Then M/K is PAC if and only if the corresponding pair of absolute Galois groups (Gal(M),Gal(K)) is projective. Moreover any projective pair can be realized as absolute Galois groups of a PAC extension of a PAC field. Using this characterization we construct new examples of PAC extensions of relatively small fields, e.g., unbounded abelian extensions of the rational numbers.
We study a class of inverse monoids of the form M = Inv< X | w=1 >, where the single relator w has a combinatorial property that we call sparse. For a sparse word w, we prove that the word problem for M is decidable. We also show that the set of words in (X \\cup X^{-1})^* that represent the identity in M is a deterministic context free language, and that the set of geodesics in the Schutzenberger graph of the identity of M is a regular language.
If $(W,S)$ is a right-angled Coxeter system and $W$ has no $\\mathbb Z^3$ subgroups, then it is shown that the absence of an elementary separation property in the presentation diagram for $(W,S)$ implies all CAT(0) spaces acted on geometrically by $W$ have locally connected CAT(0) boundary. It was previously known that if the presentation diagram of a general right-angled Coxeter system satisfied the separation property then all CAT(0) spaces acted on geometrically by $W$ have non-locally connected boundary. In particular, this gives a complete classification of the right-angled Coxeter groups with no 3-flats and with locally connected boundary.
Motivated by their study of pro-p limit groups, D.H. Kochloukova and P.A. Zalesskii formulated a question concerning the minimum number of generators d(N) of a normal subgroup N of prime index p in a non-abelian limit group G (cf. Question*). It is shown that the analogous question for the rational rank has an affirmative answer (cf. Thm. A). From this result one may conclude that the original question of D.H. Kochloukova and P.A. Zalesskii has an affirmative answer if the abelianization G^{\\ab} of G is torsion free and d(G)=d(G^{\\ab}) (cf. Cor.~B), or if G has the IF-property (cf. Thm. C).
Let S_n be the symmetric group on n-letters. Fix n>5. Given any nontrivial $\\alpha,\\beta\\in S_n$, we prove that the product $\\alpha^{S_n}\\beta^{S_n}$ of the conjugacy classes $\\alpha^{S_n}$ and $\\beta^{S_n}$ is never a conjugacy class. Furthermore, if n is not even and $n$ is not a multiple of three, then $\\alpha^{S_n}\\beta^{S_n}$ is the union of at least three distinct conjugacy classes. We also describe the elements $\\alpha,\\beta\\in S_n$ in the case when $\\alpha^{S_n}\\beta^{S_n}$ is the union of exactly two distinct conjugacy classes.
We define the cascade product of permutation groups as an external product, an explicit construction of substructures of the iterated wreath product that are much smaller than the full wreath product. This construction is essential for computational implementations of algebraic hierarchical decompositions of finite automata. We show how direct, semidirect, and wreath products and group extensions can all be expressed as cascade products, and analyse examples of groups that can be constructed isomorphically by this generic extension giving them a hierarchically coordinatized form.
Isaacs has defined a character to be super monomial if every primitive character inducing it is linear. Isaacs has conjectured that if $G$ is an $M$-group with odd order, then every irreducible character is super monomial. We prove that the conjecture is true if $G$ is an $M$-group of odd order where every irreducible character is a $\\{p \\}$-lift for some prime $p$. We say that a group where irreducible character is super monomial is a super $M$-group. We use our results to find an example of a super $M$-group that has a subgroup that is not a super $M$-group.
In this paper, we work on the pro-nilpotent group topology of a free group. First we investigate the closure of the product of finitely many subgroups of a free group in the pro-nilpotent group topology. We present an algorithm for the calculation of the closure in the pro-nilpotent group topology of the product of finitely many finitely generated subgroups of a free group. Then we deduce that the nil-closure of a rational subset is computable. We also prove that the pseudovarieties V malcev G_nil, for every decidable pseudovariety of monoids V, and J * G_nil are decidable.
Let \\(G\\) be a finite group, and let \\(\\Delta(G)\\) denote the \\emph{prime graph} built on the set of degrees of the irreducible complex characters of \\(G\\). It is well known that, whenever \\(\\Delta(G)\\) is connected, the diameter of \\(\\Delta(G)\\) is at most \\(3\\). In the present paper, we provide a description of the finite solvable groups for which the diameter of this graph attains the upper bound. This also enables us to confirm a couple of conjectures proposed by M.L. Lewis.
Exponential equations in free groups were studied initially by Lyndon and Schutzenberger and then by Comerford and Edmunds. Comerford and Edmunds showed that the problem of determining whether or not the class of quadratic exponential equations have solution is decidable, in finitely generated free groups. In this paper we show that for finite systems of quadratic exponential equations decidability passes, under certain hypotheses, from the factor groups to free products and one-relator products.
We discuss a new attack, termed a dimension or linear decomposition attack, on several known group-based cryptosystems. This attack gives a polynomial time deterministic algorithm that recovers the secret shared key from the public data in all this schemes under consideration. Furthemore, we show that in this case, contrary to the common opinion, the typical computational security assumptions are not very relevant to the security of the schemes, i.e., one can break the schemes without solving the algorithmic problems on which the assumptions are based. The efficacy of the attack depends on the platform group, so it requires a more thorough analysis in each particular case.
Let K be the field of formal Laurent series over the finite field of order q. We construct cocompact lattices \\Gamma _0 < \\Gamma_0 in the group G = PGL_d(K) which are type-preserving and act transitively on the set of vertices of each type in the building associated to G. The stabiliser of each vertex in \\Gamma _0 is a Singer cycle and the stabiliser of each vertex in \\Gamma_0 is isomorphic to the normaliser of a Singer cycle in PGL_d(q). We then show that the intersections of \\Gamma _0 and \\Gamma_0 with PSL_d(K) are lattices in PSL_d(K), and identify the pairs (d,q) such that the entire lattice \\Gamma _0 or \\Gamma_0 is contained in PSL_d(K). Finally we discuss minimality of covolumes of cocompact lattices in SL_3(K). Our proofs combine a construction of Cartwright and Steger with results about Singer cycles and their normalisers, and geometric arguments.
Let G be a finitely generated relatively hyperbolic group. We show that if no peripheral subgroup of G is hyperbolic relative to a collection of proper subgroups, then the fixed subgroup of every automorphism of G is relatively quasiconvex. It follows that the fixed subgroup is itself relatively hyperbolic with respect to a natural family of peripheral subgroups. If all peripheral subgroups of G are slender (respectively, slender and coherent), our result implies that the fixed subgroup of every automorphism of G is finitely generated (respectively, finitely presented). In particular, this happens when G is a limit group, and thus for any automorphism \\phi of G, Fix(\\phi) is a limit subgroup of G.
We define a family of groups that generalises Thompson s groups $T$ and $G$ and also those of Higman, Stein and Brin. For groups in this family we descrine centralisers of finite subgroups and show, that for a given finite subgroup $Q$, there are finitely many conjugacy classes of finite subgroups isomorphic to $Q$. We use this to show that whenever defined, the T versions of these groups have a slightly weaker property, quasi-$\\underline{\\operatorname F}_\\infty$, to that of a group possessing a finite type model for the classifying space for proper actions ${\\underline{E}}G$ if and only if they posses finite type models for the ordinary classifying space. We also generalise some well-known properties of ordinary cohomology to Bredon cohomology.
In this paper, we define the generalized Lejmi s $P_J$ operator on a compact almost K\\\"{a}hler $2n$-manifold. We get that $J$ is $C^\\infty$-pure and full if $\\dim\\ker P_J=b^2-1$. Additionally, we investigate the relationship between $J$-anti-invariant cohomology introduced by T.-J. Li and W. Zhang and new symplectic cohomologies introduced by L.-S. Tseng and S.-T. Yau on a closed symplectic $4$-manifold.
For a smooth map $f:X^4\\to\\Sigma^2$ that is locally modeled by holomorphic maps, the domain is shown to admit a symplectic structure that is symplectic on some regular fiber, if and only if $f^*[\\Sigma]\\ne0$. If so, the space of symplectic forms on $X$ that are symplectic on all fibers is nonempty and contractible. The cohomology classes of these forms vary with the maximum possible freedom on the reducible fibers, subject to the obvious constraints. The above results are derived via an analogous theorem for locally holomorphic maps $f:X^{2n}\\to Y^{2n-2}$ with $Y$ symplectic.
Embedded contact homology (ECH) is a kind of Floer homology for contact three-manifolds. Taubes has shown that ECH is isomorphic to a version of Seiberg-Witten Floer homology (and both are conjecturally isomorphic to a version of Heegaard Floer homology). This isomorphism allows information to be transferred between topology and contact geometry in three dimensions. In this article we first give an overview of the definition of embedded contact homology. We then outline its applications to generalizations of the Weinstein conjecture, the Arnold chord conjecture, and obstructions to symplectic embeddings in four dimensions.
We study the relation of an embedded Lagrangian cobordism between two closed, orientable Legendrian submanifolds of R^{2n+1}. More precisely, we investigate the behavior of the Thurston-Bennequin number and (linearized) Legendrian contact homology under this relation. The result about the Thurston-Bennequin number can be considered as a generalization of the result of Chantraine which holds when n = 1. In addition, we provide a few constructions of Lagrangian cobordisms and prove that there are infinitely many pairs of exact Lagrangian cobordant and not pairwise Legendrian isotopic Legendrian n-tori in R^{2n+1}.
We develop a new approach to Lagrangian-Floer gluing. The construction of the gluing map is based on the intersection theory in some Hilbert manifold of paths $\\mathcal{P} $. We consider some moduli spaces of perturbed holomorphic curves whose domains are either strips or more general Riemann surfaces with strip-like ends. These moduli spaces can be injectively immersed into the Hilbert manifold $\\mathcal{P} $ by taking the restriction to non-Lagrangian boundary. Some subsets $ \\mathcal{M}^T(U) $ and $ \\mathcal{M}^{\\infty} (U) $ of the aforementioned moduli spaces of perturbed holomorphic strips turn out to be embedded submanifolds of the Hilbert manifold $ \\mathcal{P} $. The main result is that $ \\mathcal{M}^T (U) $ converges in the $C^1 $ topology toward $ \\mathcal{M}^{\\infty} (U) $. As an application of this convergence property we prove various gluing theorems. We explain the construction of Lagrangian-Floer homology and prove that the square of the boundary map is equal to zero in the monotone case with minimal Maslov number at least three. We also prove the invariance of the homology and include the exposition of the Lagrangian-Floer-Donaldson functor and Seidel homomorphism.
Let $M$ be a quantizable symplectic manifold acted on by $T=(S^1)^r$ in a Hamiltonian fashion and $J$ a moment map for this action. Suppose that the set $M^{T}$ of fixed points is discrete and denote by ${\\alpha}_{pj}\\in{\\mathbb Z}^r$ the weights of the isotropy representation at $p$. By means of the $\\alpha_{pj}$ s we define a partition ${\\mathcal Q}_+$, ${\\mathcal Q}_-$ of $M^T$. (When $r=1$, ${\\mathcal Q}_{\\pm}$ will be the set of fixed points such that the half of the Morse index of $J$ at them is even (odd)). We prove the existence of a map $\\pi_{\\pm}:{\\mathcal Q}_{\\pm}\\to{\\mathcal Q}_{\\mp}$ such that $J(q)-J(\\pi_{\\pm}(q))\\in I_{\\mp}$, for all $q\\in {\\mathcal Q}_{\\pm}$, where $I_{\\pm}$ is the lattice generated by the $\\alpha_{pj}$ s with $p\\in{\\mathcal Q}_{\\pm}.$ We define partition functions $N_p$ similar to the ones of Kostant \\cite{Gui} and we prove that $\\sum_{p\\in{\\mathcal Q}_+}N_p(l)=\\sum_{p\\in{\\mathcal Q}_-}N_p(l)$, for any $l\\in{\\mathbb Z}^r$ with $|l|$ sufficiently large.
In this paper we describe a general strategy for approaching the Weinstein conjecture in dimension three. We apply this approach to prove the Weinstein conjecture for a new class of contact manifolds (planar contact manifolds). We also discuss how the present approach reduces the general Weinstein conjecture in dimension three to a compactness problem for the solution set of a first order elliptic PDE.
We express the mean Euler characteristic of a contact structure in terms of the mean indices of closed Reeb orbits for a broad class of contact manifolds, the so-called asymptotically finite contact manifolds. We show that this class is closed under subcritical surgery and examine the behavior of the mean Euler characteristic under such surgery. To this end, we revisit the notion of index-positivity for contact forms. We also obtain an expression for the mean Euler characteristic in the Morse-Bott case.
A collection of simple closed curves in $\\rr^3$ is called a negative slice if it is the intersection of a flat-at-infinity planar Lagrangian surface and $\\{y_2 = a \\}$ for some $a < 0$. Examples and non-examples of negative slices are given. Embedded Lagrange cobordisms define a relation on slices and in some (and perhaps all) cases this relation defines a partial order. The set of slices is a commutative monoid and the additive structure has an interesting relationship with the ordering relation.
Presymplectic and Poisson reduction of cluster maps are described in terms of the \"canonical\" foliations of presymplectic and Poisson manifolds. This approach to reduction leads to a geometric description, in terms of foliations, of the dynamics of the original (not reduced) map. The case where multiple reductions exist (presymplectic/Poisson or presymplectic/Poisson/Poisson) is further explored and examples illustrating several features of this approach are presented, including a nontrivial one in dimension seven which is comprehensively treated.
We relate the version of rational Symplectic Field Theory for exact Lagrangian cobordisms introduced in [5] with linearized Legendrian contact homology. More precisely, if $L\\subset X$ is an exact Lagrangian submanifold of an exact symplectic manifold with convex end $\\Lambda\\subset Y$, where $Y$ is a contact manifold and $\\Lambda$ is a Legendrian submanifold, and if $L$ has empty concave end, then the linearized Legendrian contact cohomology of $\\Lambda$, linearized with respect to the augmentation induced by $L$, equals the rational SFT of $(X,L)$. Following ideas of P. Seidel, this equality in combination with a version of Lagrangian Floer cohomology of $L$ leads us to a conjectural exact sequence which in particular implies that if $X=\\C^{n}$ then the linearized Legendrian contact cohomology of $\\Lambda\\subset S^{2n-1}$ is isomorphic to the singular homology of $L$. We outline a proof of the conjecture and show how to interpret the duality exact sequence for linearized contact homology of [6] in terms of the resulting isomorphism.
We prove a Hitchin-Kobayashi correspondence for affine vortices generalizing a result of Jaffe-Taubes for the action of the circle on the affine line. Namely, suppose a compact Lie group K has a Hamiltonian action on a Kaehler manifold X which is either compact or convex at infinity with a proper moment map, and so that stable=semistable for the action of the complexified Lie group G. Then, for some sufficiently divisible integer n, there is a bijection between gauge equivalence classes of K-vortices with target X modulo gauge and isomorphism classes of maps from the weighted projective line P(1,n) to X/G that map the stacky point at infinity P(n) to the semistable locus in X. The results allow the construction and partial computation of the quantum Kirwan map in Woodward, and play a role in the conjectures of Dimofte, Gukov, and Hollande relating vortex counts to knot invariants.
Kuranishi structures were introduced in the 1990s by Fukaya and Ono for the purpose of assigning a virtual cycle to moduli spaces of pseudoholomorphic curves that cannot be regularized by geometric methods. Starting from the same core idea (patching local finite dimensional reductions) we develop a theory of topological Kuranishi atlases and cobordisms that transparently resolves algebraic and topological challenges in this virtual regularization approach. It applies to any Kuranishi-type setting, e.g. atlases with isotropy, boundary and corners, or lack of differentiable structure.
We give two equivalent sets of invariants which classify pairs of coisotropic subspaces of finite-dimensional Poisson vector spaces. For this it is convenient to dualize; we work with pairs of isotropic subspaces of presymplectic vector spaces. We identify ten elementary types which are the building blocks of such pairs, and we write down a matrix, invertible over $\\mathbb{Z}$, which takes one 10-tuple of invariants to the other.
We define a version of spectral invariant in the vortex Floer theory for a $G$-Hamiltonian manifold $M$. This defines potentially new (partial) symplectic quasi-morphism and quasi-states when $M//G$ is not semi-positive. We also establish a relation between vortex Hamiltonian Floer homology and Woodward s quasimap Floer homology by constructing a closed-open string map between them. This yields applications to study non-displaceability problems of subsets in $M//G$
A generalized moment map is proposed for arbitrary symplectic actions of compact connected Lie groups on closed symplectic manifolds, in the spirit of the circle -valued maps introduced by D. McDuff in the case of non-Hamiltonian circle actions. We study equivariance properties of generalized moments, show that they allow reduction procedures, and obtain in the torus case a version of the Atiyah-Guillemin-Sternberg convexity theorem. As illustration, we reformulate a proof of M.K. Kim that \"complexity one\" symplectic torus actions are Hamiltonian, and give a symplectic proof of the finiteness of certain symmetry groups of compact oriented surfaces.
Given an exact symplectic manifold M and a support Lagrangian \\Lambda, we construct an infinity-category Lag, which we conjecture to be equivalent (after specialization of the coefficients) to the partially wrapped Fukaya category of M relative to \\Lambda. Roughly speaking, the objects of Lag are Lagrangian branes inside of M x T*(R^n), for large n, and the morphisms are Lagrangian cobordisms that are non-characteristic with respect to \\Lambda. The main theorem of this paper is that Lag is a stable infinity-category, so that its homotopy category is triangulated, with mapping cones given by an elementary construction. In particular, its shift functor is equivalent to the familiar shift of grading for Lagrangian branes.
This paper continues to carry out a foundational study of Banyaga topologies of a closed symplectic manifold [3]. Our intension in writing this paper is to provide several symplectic analogues of some results found in the study of Hamiltonian dynamics. Especially, without appealing to the positivity of the symplectic displacement energy, we point out the impact of the $L^\\infty$ version of Banyaga Hofer-like metric in the investigation of the symplectic nature of the $C^0-$limit of a sequence of symplectic maps. This result is the symplectic analogue of a result that was proved in Hofer-Zehnder [8] (for compactly supported Hamiltonian diffeomorphisms on $\\mathbb{R}^{2n}$), and then reformulated in Oh-M\\\"{u}ller [10] for Hamiltonian diffeomorphisms in general. Furthermore, we extend to symplectic isotopies the regularization procedure for Hamiltonian paths introduced in Polterovich [11], and then we use it to prove the equality between the two versions of Banyaga Hofer-like norms defined on the identity component in the group of symplectomorphisms. This result was announced in [2]. It shows the uniqueness of Banyaga Hofer-like geometry, and then yields the symplectic analogue of a result that was proved in Polterovich [11]. Finally, we elaborate the symplectic analogues of some approximation results found in Oh-M\\\"{u}ller [10], and make some remarks on flux theory.
This paper deals with multiplicity of rotation type solutions for Hamiltonian systems on $T^\\ell\\times \\mathbb{R}^{2n-\\ell}$. It is proved that, for every spatially periodic Hamiltonian system, i.e., the case $\\ell=n$, there exist at least $n+1$ geometrically distinct rotation type solutions with given energy rotation vector. It is also proved that, for a class of Hamiltonian systems on $T^\\ell\\times\\mathbb{R}^{2n-\\ell}$ with $1\\leqslant\\ell\\leqslant 2n-1$ but $\\ell\\neq n$, there exists at least one periodic solution or $n+1$ rotation type solutions on every contact energy hypersurface.
We define objects made of marked complex disks connected by metric line segments and construct nonsymmetric and symmetric moduli spaces of these objects. This allows choices of coherent perturbations over the corresponding versions of the Floer trajectories proposed by Cornea and Lalonde. These perturbations are intended to lead to an alternative description of the (obstructed) $A_\\infty$-structures studied by Fukaya, Oh, Ohta and Ono. Given a $Pin_{\\pm}$ monotone lagrangian submanifold $L \\subset (M,\\omega)$ with minimal Maslov number $N_L \\geq 2$, we define an $A_\\infty$-algebra (resp. differential graded algebra) structure from the critical points of a generic Morse function on $L$. It is written as a cochain (resp. chain) complex extending the pearl complex introduced by Oh and further explicited by Biran and Cornea, equipped with its quantum product. We verify that the construction is homotopy invariant, defining a functor from a homotopy category of $Pin_{\\pm}$ monotone lagrangian submanifolds $h\\mathcal{L}^{mono, \\pm}(M,\\omega)$ to the homotopy category of cochain (resp. chain) complexes $hK(\\Lambda \\text{-mod})$ where $\\Lambda$ is a Novikov ring with coefficients in $\\mathbb{Z}$.
In this paper the relations between the existence of Lagrangian fibration of Hyper-K\\\"{a}hler manifolds and the existence of the Large Radius Limit is established. It is proved that if the the rank of the second homology group of a Hyper-K\\\"{a}hler manifold N of complex dimension $2n\\geq4$ is at least 5, then there exists an unipotent element T in the mapping class group $\\Gamma $(N) such that its action on the second cohomology group satisfies $(T-id)^{2}\\neq0$ and $(T-id)^{3}=0.$ A Theorem of Verbitsky implies that the symmetric power $S^{n}(T)$ acts on $H^{2n}$ and it satisfies $(S^{n}% (T)-id)^{2n}\\neq0$ and $(S^{n}(T)-id)^{2n+1}=0.$ This fact established the existence of Large Radius Limit for Hyper-K\\\"{a}hler manifolds for polarized algebraic Hyper-K\\\"{a}hler manifolds. Using the theory of vanishing cycles it is proved that if a Hyper-K\\\"{a}hler manifold admits a Lagrangian fibration then the rank of the second homology group is greater than or equal to five. It is also proved that the fibre of any Lagrangian fibration of a Hyper-K\\\"{a}hler manifold is homological to a vanishing invariant $2n$ cycle of a maximal unipotent element acting on the middle homology. According to Clemens this vanishing invariant cycle can be realized as a torus. I conjecture that the SYZ conjecture implies finiteness of the topological types of Hyper-K\\\"{a}hler manifolds of fix dimension.
We study geometric representation theory of Lie algebroids. A new equivalence relation for integrable Lie algebroids is introduced and investigated. It is shown that two equivalent Lie algebroids have equivalent categories of infinitesimal actions of Lie algebroids. As an application, it is also shown that the Hamiltonian categories for gauge equivalent Dirac structures are equivalent as categories.
We prove that symplectic quasi-states and quasi-morphisms on a symplectic manifold descend under symplectic reduction on a superheavy level set of a Hamiltonian torus action. Using a construction due to Abreu and Macarini, in each dimension at least four we produce a closed symplectic toric manifold with infinite dimensional spaces of symplectic quasi-states and quasi-morphisms, and a one-parameter family of non-displaceable Lagrangian tori. By using McDuff s method of probes, we also show how Ostrover and Tyomkin s method for finding distinct spectral quasi-states in symplectic toric Fano manifolds can also be used to find different superheavy toric fibers.
This paper is about the Fukaya category of a Fano hypersurface $X \\subset \\mathbb{CP}^n$. Because these symplectic manifolds are monotone, both the analysis and the algebra involved in the definition of the Fukaya category simplify considerably. The first part of the paper is devoted to establishing the main structures of the Fukaya category in the monotone case: the closed-open string maps, weak proper Calabi-Yau structure, Abouzaid s split-generation criterion, and their analogues when weak bounding cochains are included. We then turn to computations of the Fukaya category of the hypersurface $X$: we construct a configuration of monotone Lagrangian spheres in $X$, and compute the associated disc potential. The result coincides with the Hori-Vafa superpotential for the mirror of $X$ (up to a constant shift in the Fano index $1$ case). As a consequence, we give a proof of Kontsevich s homological mirror symmetry conjecture for $X$. We also explain how to extract non-trivial information about Gromov-Witten invariants of $X$ from its Fukaya category.
A K-contact manifold is a smooth manifold M with a contact form whose Reeb flow preserves a Riemannian metric on M. Main examples are Sasakian manifolds. Our results in this paper are four results i), ii), iii) and iv) below obtained by the application of the Morse theory to the contact moment maps on closed 5-dimensional K-contact manifolds of rank 2. 5-dimensional K-contact manifolds of rank 2 have the lowest dimension among K-contact manifolds with nontrivial contact moment maps which are not toric. i) Correspondence between the isomorphism classes of K-contact manifolds and graphs of isotropy data, ii) Classification of K-contact manifolds up to contact blowing up and down, iii) Every closed 5-dimensional K-contact manifold of rank 2 has a Sasakian metric, iv) A sufficient condition for closed 5-dimensional K-contact manifolds of rank 2 to be contact toric.
Integral symplectic 4-manifolds may be described in terms of Lefschetz fibrations. In this note we give a formula for the signature of any Lefschetz fibration in terms of the second cohomology of the moduli space of stable curves. As a consequence we see that the sphere in moduli space defined by any (not necessarily holomorphic) Lefschetz fibration has positive \"symplectic volume\"; it evaluates positively with the Kahler class. Some other applications of the signature formula and some more general results for genus two fibrations are discussed.
In this work we discuss a conjecture of Viterbo relating the symplectic capacity of a convex body and its volume. The conjecture states that among all 2n-dimensional convex bodies with a given volume the euclidean ball has maximal symplectic capacity. We present a proof of this fact up to a logarithmic factor in the dimension, and many classes of bodies for which this holds up to a universal constant.
Sivek proves a \"van Kampen\" decomposition theorem for the combinatorial Legendrian contact algebra (also known as the Chekanov-Eliashberg algebra) of knots in standard contact $\\R^3$ . We prove an analogous result for the holomorphic curve version of the Legendrian contact algebra of certain Legendrians submanifolds in standard contact $J^1(M).$ This includes all 1- and 2-dimensional Legendrians, and some higher dimensional ones. We present various applications including a Mayer-Vietoris sequence for linearized contact homology similar to Sivek s and a connect sum formula for the augmentation variety introduced by Ng. The main tool is the theory of gradient flow trees developed by Ekholm.
We define and investigate spectral invariants for Floer homology $HF(H,U:M)$ of an open subset $U\\subset M$ in $T^*M$, defined by Kasturirangan and Oh as a direct limit of Floer homologies of approximations. We define a module structure product on $HF(H,U:M)$ and prove the triangle inequality for invariants with respect to this product. We also prove the continuity of these invariants and compare them with spectral invariants for periodic orbit case in $T^*M$.
Goodwillie introduced a periodic cyclic homology group associated to a mixed complex. In this paper, we apply this construction to the symplectic cochain complex of a Liouville domain $(M,\\theta)$ and obtain two periodic symplectic cohomology theories, denoted as $\\widehat{PSH^*}(M)$ and $PSH^*(M)$. Our main result is that both cohomology theories are invariant under Liouville isomorphism and that there is a natural isomorphism $H^*(M)\\otimes_{\\mathbb{Q}} \\mathbb{Q}((u)) \\xrightarrow{\\sim} PSH^*(M, \\mathbb{Q})$.
We prove a gluing theorem for a symplectic vortex on a compact complex curve and a collection of holomorphic sphere bubbles. Using the theorem we show that the moduli space of regular stable symplectic vortices on a fixed curve with varying markings has the structure of a stratified-smooth topological orbifold. In addition, we show that the moduli space has a non-canonical $C^1$-orbifold structure.
Let $S^*Q$ be the spherization of a closed connected manifold of dimension at least two. Consider a contactomorphism $\\varphi$ that can be reached by a contact isotopy that is everywhere positively transverse to the contact structure. In other words, $\\varphi$ is the time-1-map of a time-dependent Reeb flow. We show that the volume growth of $\\varphi$ is bounded from below by the topological complexity of the loop space of $Q$. Denote by $\\Omega Q_0(q)$ the component of the based loop space that contains the constant loop. We show that if the fundamental group or the homology of $\\Omega Q_0(q)$ grows exponentially, then the volume growth of $\\varphi$ is exponential, and thus its topological entropy is positive. A similar statement holds for polynomial growths. This result generalizes work of Dinaburg, Gromov, Paternain and Petean on geodesic flows and of Macarini, Frauenfelder, Labrousse and Schlenk on Reeb flows. Our main tool is a version of Rabinowitz--Floer homology developed by Albers and Frauenfelder.
We give an equivalent definition of the Fredholm property for linear operators on scale Banach spaces and introduce a (nonlinear) scale Fredholm property with respect to a splitting of the domain. The latter implies the Fredholm property introduced by Hofer-Wysocki-Zehnder in terms of contraction germs, but is easier to check in practice and holds in applications to holomorphic curve moduli spaces. We demonstrate this at the example of trajectory breaking in Hamiltonian Floer theory.
The quantum homology of the monotone complex quadric surface splits into the sum of two fields. We outline a proof of the following statement: The unities of these fields give rise to distinct symplectic quasi-states defined by asymptotic spectral invariants. In fact, these quasi-states turn out to be \"supported\" on disjoint Lagrangian submanifolds. Our method involves a spectral sequence which starts at homology of the loop space of the 2-sphere and whose higher differentials are computed via symplectic field theory, in particular with the help of the Bourgeois-Oancea exact sequence.
The purpose of this article is to characterize symplectic and Hamiltonian circle actions on symplectic manifolds in terms of symplectic embeddings of Riemann surfaces. More precisely, we will show that (1) if $(M,\\omega)$ admits a Hamiltonian $S^1$-action, then there exists an $S^1$-invariant symplectic $2$-sphere $S$ in $(M,\\omega)$ such that $\\langle c_1(M), [S] \\rangle > 0$, and (2) if the action is non-Hamiltonian, then there exists an $S^1$-invariant symplectic $2$-torus $T$ in $(M,\\omega)$ such that $\\langle c_1(M), [T] \\rangle = 0$. As applications, we will give a very simple proof of the following well-known theorem which was proved by Atiyah-Bott \\cite{AB}, Lupton-Oprea \\cite{LO}, and Ono \\cite{O2} : suppose that $(M,\\omega)$ is a smooth closed symplectic manifold satisfying $c_1(TM)=\\lambda \\cdot [\\omega]$ for some $\\lambda \\in \\R$ and let $G$ be a compact connected Lie group acting effectively on $M$ preserving $\\omega$. Then (1) if $\\lambda < 0$, then $G$ must be trivial, (2) if $\\lambda=0$, then the $G$-action is non-Hamiltonian, and (3) if $\\lambda > 0$, then the $G$-action is Hamiltonian.
Given a chord-generic horizontally displaceable Legendrian submanifold $\\Lambda\\subset P\\times \\mathbb R$ with the property that its characteristic algebra admits a finite-dimensional matrix representation, we prove an Arnold-type lower bound for the number of Reeb chords on $\\Lambda$. This result is a generalization of the results of Ekholm-Etnyre-Sullivan and Ekholm-Etnyre-Sabloff which hold for Legendrian submanifolds whose Chekanov-Eliashberg algebras admit augmentations. We also provide examples of Legendrian submanifolds $\\Lambda$ of $\\mathbb C^{n}\\times \\mathbb R$, $n \\ge 1$, whose characteristic algebras admit finite-dimensional matrix representations, but whose Chekanov-Eliashberg algebras do not admit augmentations. In addition, to show the limits of the method of proof for the bound, we construct a Legendrian submanifold $\\Lambda\\subset \\mathbb C^{n}\\times \\mathbb R$ with the property that the characteristic algebra of $\\Lambda$ does not satisfy the rank property. Finally, in the case when a Legendrian submanifold $\\Lambda$ has a non-acyclic Chekanov-Eliashberg algebra, using rather elementary algebraic techniques we obtain lower bounds for the number of Reeb chords of $\\Lambda$. These bounds are slightly better than the number of Reeb chords that is possible to achieve with a Legendrian submanifold whose Chekanov-Eliashberg algebra is acyclic.
In this paper we first apply the chain level Floer theory to the study of Hofer s geometry of Hamiltonian diffeomorphism group in the cases without quantum contribution: we prove that any quasi-autonomous Hamiltonian path on weakly exact symplectic manifolds or any autonomous Hamiltonian path on arbitrary symplectic manifolds is length minimizing in its homotopy class with fixed ends, as long as it has a fixed maximum and a fixed minimum which are not over-twisted and all of its contractible periodic orbits of period less than one are sufficiently $C^1$-small. Next we give a construction of new invariant norm of Viterbo s type on the Hamiltonian diffeomorphism group of arbitrary compact symplectic manifolds.
We show that for a Hamiltonian action of a compact torus $G$ on a compact, connected symplectic manifold $M$, the $G$-equivariant cohomology is determined by the residual $S^1$ action on the submanifolds of $M$ fixed by codimension-1 tori. This theorem allows us to compute the equivariant cohomology of certain manifolds, which have pieces that are four-dimensional or smaller. We give several examples of the computations that this allows.
In this Master s thesis, we consider the problem of classifying, up to conjugation by linear symplectomorphisms, linear canonical relations (lagrangian correspondences) from a finite-dimensional symplectic vector space to itself. We give an elementary introduction to the theory of linear canonical relations and present partial results toward the classification problem. This exposition should be accessible to undergraduate students with a basic familiarity with linear algebra.
We define Maslov--type indices associated to contact and symplectic transformation groups. There are two such families of indices. The first class of indices are maps from the homotopy groups of the contactomorphism or symplectomorphism group to a quotient of the integers. These are based on a generalization of the Maslov index. The second class of indices are maps from the homotopy groups of the space of contact structures or the space of cohomologous symplectic forms to the homotopy groups of a simple homogeneous space. We provide a detailed construction and describe some properties of these indices and their applications.
In this paper we introduce a new way of displacing Lagrangian fibers in toric symplectic manifolds, a generalization of McDuff s original method of probes. Extended probes are formed by deflecting one probe by another auxiliary probe. Using them, we are able to displace all fibers in Hirzebruch surfaces except those already known to be nondisplaceable, and can also displace an open dense set of fibers in the weighted projective space P(1,3,5) after resolving the singularities. We also investigate the displaceability question in sectors and their resolutions. There are still many cases in which there is an open set of fibers whose displaceability status is unknown.
T.-J. Li and W. Zhang defined an almost complex structure $J$ on a manifold $X$ to be {\\em \\Cpf}, if the second de Rham cohomology group can be decomposed as a direct sum of the subgroups whose elements are cohomology classes admitting $J$-invariant and $J$-anti-invariant representatives. It turns out (see T. Draghici, T.-J. Li and W. Zhang) that any almost complex structure on a 4-dimensional compact manifold is \\Cpf. We study the $J$-invariant and $J$-anti-invariant cohomology subgroups on almost complex manifolds, possibly non compact. In particular, we prove an analytic continuation result for anti-invariant forms on almost complex manifolds.
We compare Hofer s geometries on two spaces associated with a closed symplectic manifold M. The first space is the group of Hamiltonian diffeomorphisms. The second space L consists of all Lagrangian submanifolds of $M \\times M$ which are exact Lagrangian isotopic to the diagonal. We show that in the case of a closed symplectic manifold with $\\pi_2(M) = 0$, the canonical embedding of Ham(M) into L, f $\\mapsto$ graph(f) is not an isometric embedding, although it preserves Hofer s length of smooth paths.
We estimate from below the expected Betti numbers of real hypersurfaces taken at random in a smooth real projective n-dimensional manifold. These random hypersurfaces are chosen in the linear system of a large d-th power of a real ample line bundle equipped with a Hermitian metric of positive curvature. As for the upper bounds that we recently established, these lower bounds read as a product of a constant which only depends on the dimension n of the manifold with the K\\\"ahlerian volume of its real locus RX and d^{n/2}. Actually, any closed affine real algebraic hypersurface appears with positive probability as part of such random real hypersurfaces in any ball of RX of radius O(d^{-1/2}).
Relations between the symplectically harmonic and the coeffective cohomologies of a symplectic manifold are given. This is achieved through a generalization of the latter, which in addition provides a coeffective version of the filtered cohomologies. We also construct closed manifolds endowed with a family of symplectic forms $\\omega_t$ such that the dimensions of all these symplectic cohomology groups vary with respect to $t$.
At first glance, Ionel s GW invariants relative normal crossing divisors seem quite different invariants from log Gromov-Witten invariants or Gromov-Witten invariants defined using exploded manifolds. In this note, I sketch the relationship between Ionel s GW invariants relative normal crossing divisors and Gromov-Witten invariants defined using exploded manifolds. To set the scene, I go through the example of the moduli space of lines in the complex projective plane relative to the two coordinate lines. Even in this simplest of examples, 13 different types of curves appear in Ionel s compactified moduli space, but these different types of curves can be understood in a unified and intuitive fashion by thinking about tropical curves.
Let G be a compact connected Lie group G and T its maximal torus. The coadjoint orbit O_{\\lambda} through \\lambda in the dual of the Lie algebra of T, is canonically a symplectic manifold. Therefore we can ask the question of its Gromov width. In many known cases the width is exactly the minimum over the positive results of pairing \\lambda with coroots: min{< \\alpha_j^{\\vee},\\lambda > ; \\alpha_j^{\\vee} is a coroot and < \\alpha_j^{\\vee},\\lambda > is positive}. We will show that the Gromov width for regular coadjoint orbits of the special orthogonal group is at least this minimum. The proof uses the torus action coming from the Gelfand-Tsetlin system.
Following [Fra08, AF14] we construct Rabinowitz Floer homology for negative line bundles over symplectic manifolds and prove a vanishing result. In [Rit14] Ritter showed that symplectic homology of these spaces does not vanish, in general. Thus, the theorem $\\mathrm{SH}=0\\Leftrightarrow\\mathrm{RFH}=0$, [Rit13], does not extend beyond the symplectically aspherical situation. We give a conjectural explanation in terms of the Cieliebak-Frauenfelder-Oancea long exact sequence [CFO10].
We use Hamiltonian Floer theory to recover and generalize a classic rigidity theorem of Ekelend and Lasry. That theorem can be rephrased as an assertion about the existence of multiple closed Reeb orbits for certain tight contact forms on the sphere that are close, in a suitable sense, to the standard contact form. We first generalize this result to Reeb flows of contact forms on prequantization spaces that are suitably close to Boothby-Wang forms. We then establish, under an additional nondegeneracy assumption, the same rigidity phenomenon for Reeb flows on any closed contact manifold. A natural obstruction to obtaining sharp multiplicity results for closed Reeb orbits is the possible existence of fast closed orbits. To complement the existence results established here, we also show that the existence of such fast orbits can not be precluded by any condition which is invariant under contactomorphisms, even for nearby contact forms.
We derive constraints on Lagrangian concordances from Legendrian submanifolds of the standard contact sphere admitting exact Lagrangian fillings. More precisely, we show that such a concordance induces an isomorphism on the level of bilinearised Legendrian contact cohomology. This is used to prove the existence of non-invertible exact Lagrangian concordances in all dimensions. In addition, using a result of Eliashberg-Polterovich, we completely classify exact Lagrangian concordances from the Legendrian unknot to itself in the tight contact-three sphere: every such concordance is the trace of a Legendrian isotopy. We also discuss a high dimensional topological result related to this classification.
This paper studies U(1)-Chern-Simons theory and its relation to a construction of Chris Beasley and Edward Witten. The natural geometric setup here is that of a three-manifold with a Seifert structure. Based on a suggestion of Edward Witten we are led to study the stationary phase approximation of the path integral for U(1)-Chern-Simons theory after one of the three components of the gauge field is decoupled. This gives an alternative formulation of the partition function for U(1)-Chern-Simons theory that is conjecturally equivalent to the usual U(1)-Chern-Simons theory. The goal of this paper is to establish this conjectural equivalence rigorously through appropriate regularization techniques. This approach leads to some rather surprising results and opens the door to studying hypoelliptic operators and their associated eta invariants in a new light.
We show that every (possibly degenerate) contact form on a closed three-manifold has at least two embedded Reeb orbits. We also show that if there are only finitely many embedded Reeb orbits, then their symplectic actions are not all integer multiples of a single real number; and if there are exactly two embedded Reeb orbits, then the product of their symplectic actions is less than or equal to the contact volume of the manifold. The proofs use a relation between the contact volume and the asymptotics of the amount of symplectic action needed to represent certain classes in embedded contact homology, recently proved by the authors and V. Ramos.
Using a basic idea of Sullivan s rational homotopy theory, one can see a Lie groupoid as the fundamental groupoid of its Lie algebroid. This paper studies analogues of Lie algebroids with non-trivial higher homotopy. Using various homotopy classes one can obtain e.g. central extensions of loop groups, or one can integrate a Lie biagebroid to a double symplectic groupoid. When combined with symplectic geometry, this idea leads to an infinite sequence of notions, starting with sympectic manifolds, Poisson manifolds and Courant algebroids. They are interrelated with higher-dimensional variational problems, and one can use them to define higher-dimensional Hamiltonian mechanics.
The n-dimensional pair of pants is defined to be the complement of n+2 generic hyperplanes in CP^n. We construct an immersed Lagrangian sphere in the pair of pants and compute its endomorphism A_{\\infty} algebra in the Fukaya category. On the level of cohomology, it is an exterior algebra with n+2 generators. It is not formal, and we compute certain higher products in order to determine it up to quasi-isomorphism. This allows us to give some evidence for the homological mirror symmetry conjecture: the pair of pants is conjectured to be mirror to the Landau-Ginzburg model (C^{n+2},W), where W = z_1 ... z_{n+2}. We show that the endomorphism A_{\\infty} algebra of our Lagrangian is quasi-isomorphic to the endomorphism dg algebra of the structure sheaf of the origin in the mirror. This implies similar results for finite covers of the pair of pants, in particular for certain affine Fermat hypersurfaces.
In a previous paper, the second author used embedded contact homology (ECH) of contact three-manifolds to define \"ECH capacities\" of four-dimensional symplectic manifolds. In the present paper we prove that for a four-dimensional Liouville domain with all ECH capacities finite, the asymptotics of the ECH capacities recover the symplectic volume. This follows from a more general theorem relating the volume of a contact three-manifold to the asymptotics of the amount of symplectic action needed to represent certain classes in ECH. The latter theorem was used by the first and second authors to show that every contact form on a closed three-manifold has at least two embedded Reeb orbits.
For any symplectic form $\\omega$ on $T^2\\times S^2$ we construct infinitely many nonisomorphic finite groups which admit effective smooth actions on $T^2\\times S^2$ that are trivial in cohomology but which do not admit any effective symplectic action on $(T^2\\times S^2,\\omega)$. We also prove that for any $\\omega$ there is another symplectic form $\\omega $ on $T^2\\times S^2$ and a finite group acting symplectically and effectively on $(T^2\\times S^2,\\omega )$ which does not admit any effective symplectic action on $(T^2\\times S^2,\\omega)$. A basic ingredient in our arguments is the study of the Jordan property of the symplectomorphism groups of $T^2\\times S^2$. A group $G$ is Jordan if there exists a constant $C$ such that any finite subgroup $\\Gamma$ of $G$ contains an abelian subgroup whose index in $\\Gamma$ is at most $C$. Csik\\ os, Pyber and Szab\\ o proved recently that the diffeomorphism group of $T^2\\times S^2$ is not Jordan. We prove that, in contrast, for any symplectic form $\\omega$ on $T^2\\times S^2$ the group of symplectomorphisms $Symp(T^2\\times S^2,\\omega)$ is Jordan. We also give upper and lower bounds for the optimal value of the constant $C$ in Jordan s property for $Symp(T^2\\times S^2,\\omega)$ depending on the cohomology class represented by $\\omega$. Our bounds are sharp for a large class of symplectic forms on $T^2\\times S^2$.
Let X be the Fermat quintic threefold. The set of real solutions L forms a Lagrangian submanifold of X. Multiplying the homogeneous coordinates of X by various fifth roots of unity gives automorphisms of X; the images of L under these automorphisms defines a family of 625 different Lagrangian submanifolds, called real Lagrangians. In this paper we try to calculate the Floer cohomology between all pairs of these Lagrangians. We are able to complete most of the calculations, but there are a few cases we cannot do. The basic idea is to explicitly describe some low energy moduli spaces and then use this knowledge to calculate the differential on the E_2 page of the standard spectral sequence for Floer cohomology. It turns out that this is often enough to calculate the cohomology completely. Several techniques are developed to help describe these low energy moduli spaces, including a formula for the Maslov index, a formula for the obstruction bundle, and a way to relate holomorphic strips and discs to holomorphic spheres. The real nature of the Lagrangians is crucial for the development of these techniques.
Let $(X,\\omega)$ be a compact symplectic manifold, $L$ be a Lagrangian submanifold and $V$ be a codimension 2 symplectic submanifold of $X$, we consider the pseudoholomorphic maps from a Riemann surface with boundary $(\\Sigma,\\partial\\Sigma)$ to the pair $(X,L)$ satisfying Lagrangian boundary conditions and intersecting $V$. In some special cases, for instance, under the semi-positivity condition, we study the stable moduli space of such open pseudoholomorphic maps involving the intersection data. If $L\\cap V=\\emptyset$, we study the problem of orientability of the moduli space. Moreover, assume that there exists an anti-symplectic involution $\\phi$ on $X$ such that $L$ is the fixed point set of $\\phi$ and $V$ is $\\phi$-anti-invariant, then we define the so-called \"relatively open\" invariants for the tuple $(X,\\omega,V,\\phi)$ if $L$ is orientable and dim$X\\le 6$. If $L$ is nonorientable, we define such invariants under the condition that dim$X\\le4$ and some additional restrictions on the number of marked points on each boundary component of the domain.
This paper is a fusion of a survey and a research article. We focus on certain rigidity phenomena in function spaces associated to a symplectic manifold. Our starting point is a lower bound obtained in an earlier paper with Zapolsky for the uniform norm of the Poisson bracket of a pair of functions in terms of symplectic quasi-states. After a short review of the theory of symplectic quasi-states, we extend this bound to the case of iterated Poisson brackets. A new technical ingredient is the use of symplectic integrators. In addition, we discuss some applications to symplectic approximation theory and present a number of open problems.
We give Chern-Weil definitions of the Maslov indices of bundle pairs over a Riemann surface \\Sigma with boundary, which consists of symplectic vector bundle on \\Sigma and a Lagrangian subbundle on \\partial{\\Sigma} as well as its generalization for transversely intersecting Lagrangian boundary conditions. We discuss their properties and relations to the known topological definitions. As a main application, we extend Maslov index to the case with orbifold interior singularites, via curvature integral, and find also an analogous topological definition in these cases.
We study holomorphic supercurves, which are motivated by supergeometry as a natural generalisation of holomorphic curves. We prove that, upon perturbing the defining equations by making them depend on a connection, the corresponding linearised operator is generically surjective. By this transversality result, we show that the resulting moduli spaces are oriented finite dimensional smooth manifolds. Finally, we examine how they depend on the choice of generic data.
We define prequantization for Dirac manifolds to generalize known procedures for Poisson and (pre) symplectic manifolds by using characteristic distributions obtained from 2-cocycles associated to Dirac structures. Given a Dirac manifold $(M,D)$, we construct Poisson structure on the space of admissible functions on $(M,D)$ and a representation of the Poisson algebra to establish the prequantization condition of $(M,D)$ in terms of a Lie algebroid cohomology. Additional to this, we introduce a polarization for a Dirac manifold $M$ and discuss procedures for quantization in two cases where $M$ is compact and where $M$ is not compact.
This paper studies how some symplectic invariants which are born from Hamiltonian Floer theory (e.g. spectral invariant, boundary depth, (partial) symplectic quasi-state) change with respect to symplectic structure perturbations, i.e., new symplectic structures perturbed from a known symplectic structure. This paper can be roughly divided into two parts. In the first part, we will prove a family of energy estimation inequalities which control the shifts of action functional in the Hamiltonian Floer theory. This directly implies an affirmative conclusion on continuity of spectral invariant and boundary depth in several important cases, for instance, the symplectic surface $\\Sigma_{g >1}$ or closed symplectic manifold $M$ with $\\dim_{\\mathcal K} H^2(M;\\mathcal K) = 1$. This follows by an application on the rigidity of subsets on symplectic manifolds in terms of heavy or superheavy. In the second part, we generalize the construction in the first part to any symplectic manifold. Specifically, in order to deal with the change of Novikov ring due to the perturbations, we will construct a (local) family of variant Floer chain complexes over a variant Novikov ring and study its homologies, which takes its inspiration from Ono s construction. We will also prove, in this set-up, a new family of spectral invariant called $t$-spectral invariant is upper semicontinuous. This has applications on a quasi-embedding from $\\mathbb{R}^{\\infty}$ to ${\\widetilde {Ham}}(M, \\omega)$ under a certain dynamical condition imitating the main result from Usher s Hofer norm paper and several continuity properties of Hofer-Zehnder capacity and spectral capacity. Finally, $t$-boundary depth (defined over the local family of variant Floer chain complexes above) is defined and briefly discussed but its continuity property is unknown.
We study Lefschetz pencils on symplectic four-manifolds via the associated spheres in the moduli spaces of curves, and in particular their intersections with certain natural divisors. An invariant defined from such intersection numbers can distinguish manifolds with torsion first Chern class. We prove that pencils of large degree always give spheres which behave `homologically  like rational curves; contrastingly, we give the first constructive example of a symplectic non-holomorphic Lefschetz pencil. We also prove that only finitely many values of signature or Euler characteristic are realised by manifolds admitting Lefschetz pencils of genus two curves.
We show that positive $S^1$-equivariant symplectic homology is a contact invariant for a subclass of contact manifolds which are boundaries of Liouville domains. In nice cases, when the set of Conley-Zehnder indices of all good periodic Reeb orbits on the boundary of the Liouville domain is lacunary, the positive $S^1$-equivariant symplectic homology can be computed; it is generated by those orbits. We prove a \"Viterbo functoriality\" property: when one Liouville domain is embedded into an other one, there is a morphism (reversing arrows) between their positive $S^1$-equivariant symplectic homologies and morphisms compose nicely. These properties allow us to give a proof of Ustilovsky s result on the number of non isomorphic contact structures on the spheres $S^{4m+1}$. They also give a new proof of a Theorem by Ekeland and Lasry on the minimal number of periodic Reeb orbits on some hypersurfaces in $\\mathbb{R}^{2n}$. We extend this result to some hypersurfaces in some negative line bundles.
In this article we study immersions of the circle that are tangent to an Engel structure $\\mathcal{D}$. We show that a full $h$-principle does exist as soon as one excludes the closed orbits of $\\mathcal{W}$, the kernel of $\\mathcal{D}$. This is sharp: we elaborate on work of Bryant and Hsu to show that curves tangent to $\\mathcal{W}$ often conform additional isolated components that cannot be detected at a formal level. We then show that this is an exceptional phenomenon: if $\\mathcal{D}$ is generic, curves tangent to $\\mathcal{W}$ are not isolated anymore. We then go on to show that a full $h$-principle holds for immersions transverse to the Engel structure.
Let $(M,\\omega)$ be a symplectic manifold and $U\\subseteq M$ an open subset. I study the natural inclusion of the group of Hamiltonian diffeomorphisms of $U$ into the group of Hamiltonian diffeomorphisms of $M$. The main result is an upper bound for this map in terms of the Hofer norms for $U$ and $M$. Applications are upper bounds on the relative Hofer diameter of $U$ and the asymptotic Hofer-Lipschitz constant, which are often sharp up to constant factors. As another consequence, the relative Hofer diameter of certain symplectic submanifolds vanishes.
This survey wants to give a short introduction to the transversality problem in symplectic field theory and motivate to approach it using the new Fredholm theory by Hofer, Wysocki and Zehnder. With this it should serve as a lead-in for the user s guide to polyfolds, which will appear soon and is the result of a working group organized by J. Fish, R. Golovko and the author at MSRI Berkeley in fall 2009.
We prove that every symplectic toric orbifold is a centered reduction of a Cartesian product of weighted projective spaces. A theorem of Abreu and Macarini shows that if the level set of the reduction passes through a non-displaceable set then the image of this set in the reduced space is also non-displaceable. Using this result we show that every symplectic toric orbifold contains a non-displaceable fiber and we identify this fiber.
For each compact almost Kahler manifold $(X,\\om,J)$ and an element A of $H_2(X;Z)$, we describe a closed subspace $\\ov{\\frak M}_{1,k}^0(X,A;J)$ of the moduli space $\\ov{\\frak M}_{1,k}(X,A;J)$ of stable J-holomorphic genus-one maps such that $\\ov{\\frak M}_{1,k}^0(X,A;J)$ contains all stable maps with smooth domains. If $(P^n,\\om,J_0)$ is the standard complex projective space, $\\ov{\\frak M}_{1,k}^0(P^n,A;J_0)$ is an irreducible component of $\\ov{\\frak M}_{1,k}(P^n,A;J_0)$. We also show that if an almost complex structure $J$ on $P^n$ is sufficiently close to J_0, the structure of the space $\\ov{\\frak M}_{1,k}^0(P^n,A;J)$ is similar to that of $\\ov{\\frak M}_{1,k}^0(P^n,A;J_0)$. This paper s compactness and structure theorems lead to new invariants for some symplectic manifolds, which are generalized to arbitrary symplectic manifolds in a separate paper. Relatedly, the smaller moduli space $\\ov\\M_{1,k}^0(X,A;J)$ is useful for computing the genus-one Gromov-Witten invariants, which arise from the larger moduli space $\\ov\\M_{1,k}(X,A;J)$.
Consider a closed coisotropic submanifold $N$ of a symplectic manifold $(M,\\omega)$ and a Hamiltonian diffeomorphism $\\phi$ on $M$. The main result of this article is that $\\phi$ has a leafwise fixed point with respect to $N$, provided that it is the time-1-map of a Hamiltonian flow whose restriction to $N$ stays $C^0$-close to the inclusion $N\\to M$. This appears to be the first leafwise fixed point result in which neither $\\phi\\big|_N$ is assumed to be $C^1$-close to the inclusion $N\\to M$, nor $N$ to be of contact type or regular (i.e., \"fibering\"). It is optimal in the sense that the $C^0$-condition on $\\phi$ cannot be replaced by the assumption that $\\phi$ is Hofer-small. The method of proof of the result leads to a local coisotropic version of Floer homology.
The degree zero part of the quantum cohomology algebra of a smooth Fano toric symplectic manifold is determined by the superpotential function, W, of its moment polytope. In particular, this algebra is semisimple, i.e. splits as a product of fields, if and only if all the critical points of W are non-degenerate. In this paper we prove that this non-degeneracy holds for all smooth Fano toric varieties with facet-symmetric duals to moment polytopes.
The present paper explores how the spectral sequence introduced in a previous work (and obtained by taking moduli spaces of any dimension into account in the Floer construction), interacts with the presence of bubbling. As consequences are obtained some relations between binary Gromov-Witten invariants and relative Ganea-Hopf invariants, a criterion for detecting the monodromy of bubbling as well as algebraic criteria for the detection of periodic orbits.
In this paper, we give a new method to construct a compact symplectic manifold which does not satisfy the hard Lefschetz property. Using our method, we construct a simply connected compact K\\\"ahler manifold $(M,J,\\omega)$ and a symplectic form $\\sigma$ on $M$ which does not satisfy the hard Lefschetz property, but is symplectically deformation equivalent to the K\\\"ahler form $\\omega$. As a consequence, we can give an answer to the question posed by Khesin and McDuff as follows. According to symplectic Hodge theory, any symplectic form $\\omega$ on a smooth manifold $M$ defines \\textit{symplectic harmonic forms} on $M$. In \\cite{Yan}, Khesin and McDuff posed a question whether there exists a path of symplectic forms $\\{\\omega_t \\}$ such that the dimension $h^k_{hr}(M,\\omega)$ of the space of \\textit{symplectic harmonic $k$-forms} varies along $t$. By \\cite{Yan} and \\cite{Ma}, the hard Lefschetz property holds for $(M,\\omega)$ if and only if $h^k_{hr}(M,\\omega)$ is equal to the Betti number $b_k(M)$ for all $k>0$. Thus our result gives an answer to the question. Also, our construction provides an example of compact K\\\"ahler manifold whose K\\\"ahler cone is properly contained in the symplectic cone (c.f. \\cite{Dr}).
Consider a holomorphic torus action on a possibly non-compact K\\\"ahler manifold. We show that the higher cohomology groups appearing in the geometric quantization of the symplectic quotient are isomorphic to the invariant parts of the corresponding cohomology groups of the original manifold. For non-Abelian group actions on compact K\\\"ahler manifolds, this result was proved recently by Teleman and by Braverman. Our approach is applying the holomorphic instanton complex to the prequantum line bundles over the symplectic cuts. We also settle a conjecture of Zhang and the present author on the exact sequence of higher cohomology groups in the context of symplectic cutting.
We apply ideas from conformal field theory to study symplectic four-manifolds, by using modular functors to \"linearise\" Lefschetz fibrations. In Chern-Simons theory this leads to the study of parabolic vector bundles of conformal blocks. Motivated by the Hard Lefschetz theorem, we show the bundles of SU(2) conformal blocks associated to Kaehler surfaces are Brill-Noether special, although the associated flat connexions may be irreducible if the surface is simply-connected and not spin.
A twin Lagrangian fibration, originally introduced by Yau and the first author, is roughly a geometric structure consisting of two Lagrangian fibrations whose fibers intersect with each other cleanly. In this paper, we show the existence of twin Lagrangian fibrations on certain symplectic manifolds whose mirrors are fibered by rigid analytic cycles. Using family Floer theory in the sense of Fukaya and Abouzaid, these twin Lagrangian fibrations are shown to be induced from fibrations by rigid analytic subvarieties on the mirror. As additional evidences, we discuss two simple applications of our constructions.
We give a construction of Piunikhin-Salamon-Schwarz isomorphism between the Morse homology and the Floer homology generated by Hamiltonian orbits starting at the zero section and ending at the conormal bundle. We also prove that this isomorphism is natural in the sense that it commutes with the isomorphisms between the Morse homology for different choices of the Morse function and the Floer homology for different choices of the Hamiltonian. We define a product on the Floer homology and prove triangle inequality for conormal spectral invariants with respect to this product.
We define the contact homology algebra for any contact manifold and show that it is an invariant of the contact manifold. More precisely, given a contact manifold $(M,\\xi)$ and some auxiliary data $\\mathcal{D}$, we define an algebra $HC(\\mathcal{D})$. If $\\mathcal{D}_1$ and $\\mathcal{D}_2$ are two choices of auxiliary data for $(M,\\xi)$, then $HC(\\mathcal{D}_1)$ and $HC(\\mathcal{D}_2)$ are isomorphic. We use a simplified version of Kuranishi perturbation theory, consisting of semi-global Kuranishi charts.
In this paper, we generalize construction of Seidel s long exact sequence of Lagrangian Floer cohomology to that of compact Lagrangian submanifolds with vanishing Malsov class on general Calabi-Yau manifolds. We use the framework of anchored Lagrangian submanifolds developed in \\cite{fooo:anchor} and some compactness theorem of \\emph{smooth} $J$-holomorphic sections of Lefschetz Hamiltonian fibration for a generic choice of $J$. The proof of the latter compactness theorem involves a study of proper pseudoholomorphic curves in the setting of noncompact symplectic manifolds with cylindrical ends.
Let $\\mathbb{R} \\times (P \\times \\mathbb{R})$ be the symplectisation of the contactisation of an exact symplectic manifold $P$, and let $\\mathbb{R} \\times \\Lambda$ be a cylinder over a Legendrian submanifold in the contactisation. We show that a pseudo-holomorphic polygon in $P$ having boundary on the projection of $\\Lambda$ can be lifted to a pseudo-holomorphic disc in the symplectisation having boundary on $\\mathbb{R} \\times \\Lambda$. It follows that Legendrian contact homology may be equivalently defined by counting either of these objects. Using this result, we give a proof of Seidel s isomorphism of the linearised Legendrian contact homology induced by an exact Lagrangian filling and the singular homology of the filling.
We study the moduli space of pseudo pointed holomorphic disks with boundaries mapped in the zero section of the cotangent bundle of a manifold. We define perturbations of the equation for which it is possible to describe explicitly all the solutions of the problem in terms of Morse graphs on the manifold. In particular, this proves that the $A_\\infty$ structure of the zero section of the cotangent bundle is equivalent to the Morse $A_\\infty$ structure of the base manifold.
In this paper we first describe the geometry of the Newton polyhedra of polynomials invariant under certain linear Hamiltonian circle actions. From the geometry of the polyhedra, various Poisson structures on the orbit spaces of the actions are derived and Poisson embeddings into model spaces, for the orbit spaces, are constructed. The Poisson structures, on respective source and model space, are compatible even for the minimum possible (embedding) dimension of the model spaces. This is, in particular, important since it is still an open question if, in general, there exist finite dimensional model spaces with Poisson structures compatible with the actions and the usual nondegenerate Poisson structure on the source spaces.
This paper explains an application of Gromov s h-principle to prove the existence, on any orientable 4-manifold, of a folded symplectic form. That is a closed 2-form which is symplectic except on a separating hypersurface where the form singularities are like the pullback of a symplectic form by a folding map. We use the h-principle for folding maps (a theorem of Eliashberg) and the h-principle for symplectic forms on open manifolds (a theorem of Gromov) to show that, for orientable even-dimensional manifolds, the existence of a stable almost complex structure is necessary and sufficient to warrant the existence of a folded symplectic form.
Let $(X,\\sigma,J)$ be a compact K\\\"{a}hler Calabi-Yau manifold equipped with a symplectic circle action. By Frankel s theorem \\cite{F}, the action on $X$ is non-Hamiltonian and $X$ does not have any fixed point. In this paper, we will show that a symplectic circle action on a compact non-K\\\"{a}hler symplectic Calabi-Yau manifold may have a fixed point. More precisely, we will show that the symplectic $S^1$-manifold constructed by D. McDuff \\cite{McD} has the vanishing first Chern class. This manifold has the Betti numbers $b_1 = 3$, $b_2 = 8$, and $b_3 = 12$. In particular, it does not admit any K\\\"{a}hler structure.
The long exact sequence describes how the Floer cohomology of two Lagrangian submanifolds changes if one of them is modified by applying a Dehn twist. We give a proof in the simplest case (no bubbling). The paper contains a certain amount of material that may be of interest independently of the exact sequence: in particular, chapter 1 covers \"symplectic Picard-Lefschetz theory\" in some detail, and chapter 2 contains a generalization of the usual TQFT setup for Floer cohomology.
We complete the classification of Hamiltonian torus and circle actions on symplectic four-dimensional manifolds. Following work of Delzant and Karshon, Hamiltonian circle and 2-torus actions on any fixed simply connected symplectic four-manifold were characterized by Karshon, Kessler and Pinsonnault. What remains is to study the case of Hamiltonian actions on blowups of S^2-bundles over a Riemann surface of positive genus. These do not admit 2-torus actions. In this paper, we characterize Hamiltonian circle actions on them. We then derive combinatorial results on the existence and counting of these actions. As a by-product, we provide an algorithm that determines the g-reduced form of a blowup form. Our work is a combination of \"soft\" equivariant and combinatorial techniques, using the momentum map and related data, with \"hard\" holomorphic techniques, including Gromov-Witten invariants.
A Maslov cycle is a singular variety in the lagrangian grassmannian L(V) of a symplectic vector space V consisting of all lagrangian subspaces having nonzero intersection with a fixed one. Givental has shown that a Maslov cycle is a Legendre singularity, i.e. the projection of a smooth conic lagrangian submanifold S in the cotangent bundle of L(V). We show here that S is the wavefront set of a Fourier integral distribution which is \"evaluation at 0 of the quantizations\".
We define an enhanced compactification of Floer trajectories under Morse background using the adiabatic degeneration and the scale-dependent gluing techniques. The compactification reflects the 1-jet datum of the smooth Floer trajectories nearby the limiting nodal Floer trajectories arising from adiabatic degeneration of the background Morse function. This paper studies the gluing problem when the limiting gradient trajectories has length zero through a renomalization process. The case with limiting gradient trajectories of non-zero length will be treated elsewhere. An immediate application of our result is a proof of the isomorphism property of the PSS map : A proof of this isomorphism property was first outlined by P\\\"unihikin-Salamon-Schwarz \\cite{PSS} in a way somewhat different from the current proof in its details. This kind of scale-dependent gluing techniques was initiated in [FOOO07] in relation to the metamorphosis of holomorphic polygons under Lagrangian surgery and is expected to appear in other gluing and compactification problem of pseudo-holomorphic curves that involves `adiabatic  parameters or rescales the targets.
This paper is the first input towards an open analogue of the quantum Kirwan map. We consider the adiabatic limit of the symplectic vortex equation over the unit disk for a Hamiltonian G-manifold with Lagrangian boundary condition, by blowing up the metric on the disk. We define an appropriate notion of stable solutions in the limit, and prove that any sequence of disk vortices with energy uniformly bounded has a subsequence converging to such a stable object. We also proved several analytical properties of vortices over the upper half plane, which are new type of bubbles appearing in our compactification.
We use the criteria of Lalonde and McDuff to show that a path that is generated by a generic autonomous Hamiltonian is length minimizing with respect to the Hofer norm among all homotopic paths provided that it induces no non-constant closed trajectories in M. This generalizes a result of Hofer for symplectomorphisms of Euclidean space. The proof for general M uses Liu-Tian s construction of S^1-invariant virtual moduli cycles. As a corollary, we find that any semifree action of S^1 on M gives rise to a nontrivial element in the fundamental group of the symplectomorphism group of M. We also establish a version of the area-capacity inequality for quasicylinders.
Biinvariant diagonal classes give rise to right inverses of the Kirwan map. By means of multivalued perturbations of the gradient flow equation such classes are constructed explicitly for $S^1$-Hamiltonian spaces. Moreover, the notion of biinvariant diagonal class is extended to a cohomology map that gives extra topological information on the Hamiltonian space. The non-uniqueness of global biinvariant diagonal classes is also proven.
Consider the $2n$-dimensional closed ball $B$ of radius 1 in the $2n$-dimensional symplectic cylinder $Z = D \\times R^{2n-2}$ over the closed disc $D$ of radius 1. We construct for each $\\epsilon >0$ a Hamiltonian deformation $\\phi$ of $B$ in $Z$ of energy less than $\\epsilon$ such that the area of each intersection of $\\phi (B)$ with the disc $D \\times \\{x\\}$, $x \\in R^{2n-2}$, is less than $\\epsilon$.
We introduce topological contact dynamics of a smooth manifold carrying a cooriented contact structure, generalizing previous work in the case of a symplectic structure [MO07] or a contact form [BS12]. A topological contact isotopy is not generated by a vector field; nevertheless, the group identities, the transformation law, and classical uniqueness results in the smooth case extend to topological contact isotopies and homeomorphisms, giving rise to an extension of smooth contact dynamics to topological dynamics. Our approach is via symplectization of a contact manifold, and our main tools are an energy-capacity inequality we prove for contact diffeomorphisms, combined with techniques from measure theory on oriented manifolds. We establish non-degeneracy of a Hofer-like bi-invariant pseudo-metric on the group of strictly contact diffeomorphisms constructed in [BD06]. The topological automorphism group of the contact structure exhibits rigidity properties analogous to those of symplectic diffeomorphisms, including C^0-rigidity of contact and strictly contact diffeomorphisms.
Let G be a compact connected Lie group G and T its maximal torus. The coadjoint orbit O_lambda through lambda in Lie(T)^* is canonically a symplectic manifold. Therefore we can ask the question about its Gromov width. In many known cases the Gromov width is exactly the minimum over the set {< alpha_j^{\\vee},lambda > ; alpha_j^{\\vee} a coroot and < alpha_j^{\\vee},lambda > positive}. We show that the Gromov width of coadjoint orbits of the unitary group and of most of the coadjoint orbits of the special orthogonal group is at least the above minimum. The proof uses the torus action coming from the Gelfand-Tsetlin system.
We construct a family of Lagrangian tori $\\Theta^n_s$ $\\subset$ $(\\mathbb{C}P^1)^n$, $s \\in (0,1)$, where $\\Theta^n_{1/2} = \\Theta^n$, is the monotone twist Lagrangian torus described by Chekanov-Schlenk. We show that for $n = 2m$ and $s \\ge 1/2$ these tori are non-displaceable. Then by considering $\\Theta^{k_1}_{s_1}$ $ \\times$ $\\cdots$ $\\times$ $ \\Theta^{k_l}_{s_l}$ $ \\times$ $ (S^2_{\\mathrm{eq}})^{n - \\sum_i k_i}$ $ \\subset $ $(\\mathbb{C}P^1)^n$, with $s_i \\in [1/2,1)$ and $k_i \\in 2\\mathbb{Z}_{>0}$, $\\sum_i k_i \\le n$ we get several $l$-dimensional families of non-displaceable Lagrangian tori. We also show that there exists partial symplectic quasi-states $\\zeta^{\\mathfrak{b}_s}_{\\textbf{e}_s}$ and linearly independent homogeneous Calabi quasimorphims $\\mu^{\\mathfrak{b}_s}_{\\textbf{e}_s}$ or which $\\Theta^{2m}_s$ are $\\zeta^{\\mathfrak{b}_s}_{\\textbf{e}_s}$-superheavy and $\\mu^{\\mathfrak{b}_s}_{\\textbf{e}_s}$-superheavy. We also prove a similar result for $(\\mathbb{C}P^2 3\\bar{\\mathbb{C}P^2}, \\omega_\\epsilon)$, where $\\{\\omega_\\epsilon; 0 < \\epsilon < 1\\}$ is a family of symplectic forms in $\\mathbb{C}P^2 3\\bar{\\mathbb{C}P^2}$, for which $\\omega_{1/2}$ is monotone.
We introduce the notion of tropicalization for Poisson structures on $\\mathbb{R}^n$ with coefficients in Laurent polynomials. To such a Poisson structure we associate a polyhedral cone and a constant Poisson bracket on this cone. There is a version of this formalism applicable to $\\mathbb{C}^n$ viewed as a real Poisson manifold. In this case, the tropicalization gives rise to a completely integrable system with action variables taking values in a polyhedral cone and angle variables spanning a torus. As an example, we consider the canonical Poisson bracket on the dual Poisson-Lie group $G^*$ for $G=U(n)$ in the cluster coordinates of Fomin-Zelevinsky defined by a certain choice of solid minors. We prove that the corresponding integrable system is isomorphic to the Gelfand-Zeitlin completely integrable system of Guillemin-Sternberg and Flaschka-Ratiu.
We examine symplectic topological features of certain family of monotone Lagrangian submanifolds in CP^n. Firstly, we give a cohomological restriction for Lagrangian submanifolds in CP^n whose first integral homologies are 3-torsion. In particular, in the case where n=5,8, we prove the cohomologies with coefficients in Z_2 of such Lagrangian submanifolds are isomorphic to that of SU(3)/(SO(3) Z_3) and SU(3)/Z_3, respectively. Secondly, we calculate the Floer cohomology of a monotone Lagrangian submanifold SU(p)/Z_p in CP^{p^2-1} with coefficients in Z_2 by using Biran-Cornea s theory.
We show that there is no positive loop inside the component of a fiber in the space of Legendrian embeddings in the contact manifold $ST^*M$, provided that the universal cover of $M$ is $\\RM^n$. We consider some related results in the space of one-jets of functions on a compact manifold. We give an application to the positive isotopies in homogeneous neighborhoods of surfaces in a tight contact 3-manifold.
We introduce a contravariant functor, called Floer functor, from the category of Lagrangian conductors of a symplectic manifold to the homotopy category of bounded chain complexes of open strings in this manifold. The latter two categories are defined for all symplectic manifolds, whereas Floer functor is defined for semipositive manifolds which are either closed or convex at infinity. We then prove that when the first Chern class of the symplectic manifold vanishes, Lagrangian spheres define Lagrangian conductors so that in particular their integral Floer cohomology is well defined. This requires the introduction of singular almost-complex structures given by symplectic field theory.
A good object clustering is critical to the performance of object-oriented databases. However, it always involves some kind of overhead for the system. The aim of this paper is to propose a modelling methodology in order to evaluate the performances of different clustering policies. This methodology has been used to compare the performances of three clustering algorithms found in the literature (Cactis, CK and ORION) that we considered representative of the current research in the field of object clustering. The actual performance evaluation was performed using simulation. Simulation experiments showed that the Cactis algorithm is better than the ORION algorithm and that the CK algorithm totally outperforms both other algorithms in terms of response time and clustering overhead.
Given a point query Q in multi-dimensional space, K-Nearest Neighbor (KNN) queries return the K closest answers according to given distance metric in the database with respect to Q. In this scenario, it is possible that a majority of the answers may be very similar to some other, especially when the data has clusters. For a variety of applications, such homogeneous result sets may not add value to the user. In this paper, we consider the problem of providing diversity in the results of KNN queries, that is, to produce the closest result set such that each answer is sufficiently different from the rest. We first propose a user-tunable definition of diversity, and then present an algorithm, called MOTLEY, for producing a diverse result set as per this definition. Through a detailed experimental evaluation on real and synthetic data, we show that MOTLEY can produce diverse result sets by reading only a small fraction of the tuples in the database. Further, it imposes no additional overhead on the evaluation of traditional KNN queries, thereby providing a seamless interface between diversity and distance.
Differential dependencies (DDs) capture the relationships between data columns of relations. They are more general than functional dependencies (FDs) and and the difference is that DDs are defined on the distances between values of two tuples, not directly on the values. Because of this difference, the algorithms for discovering FDs from data find only special DDs, not all DDs and therefore are not applicable to DD discovery. In this paper, we propose an algorithm to discover DDs from data following the way of fixing the left hand side of a candidate DD to determine the right hand side. We also show some properties of DDs and conduct a comprehensive analysis on how sampling affects the DDs discovered from data.
In this work we establish and investigate the connections between causality for query answers in databases, database repairs wrt. denial constraints, and consistency-based diagnosis. The first two are relatively new problems in databases, and the third one is an established subject in knowledge representation. We show how to obtain database repairs from causes and the other way around. The vast body of research on database repairs can be applied to the newer problem of determining actual causes for query answers. By formulating a causality problem as a diagnosis problem, we manage to characterize causes in terms of a system s diagnoses.
Record linkage has been extensively used in various data mining applications involving sharing data. While the amount of available data is growing, the concern of disclosing sensitive information poses the problem of utility vs privacy. In this paper, we study the problem of private record linkage via secure data transformations. In contrast to the existing techniques in this area, we propose a novel approach that provides strong privacy guarantees under the formal framework of differential privacy. We develop an embedding strategy based on frequent variable length grams mined in a private way from the original data. We also introduce personalized threshold for matching individual records in the embedded space which achieves better linkage accuracy than the existing global threshold approach. Compared with the state-of-the-art secure matching schema, our approach provides formal, provable privacy guarantees and achieves better scalability while providing comparable utility.
This document defines extensions of the RDF data model and of the SPARQL query language that capture an alternative approach to represent statement-level metadata. While this alternative approach is backwards compatible with RDF reification as defined by the RDF standard, the approach aims to address usability and data management shortcomings of RDF reification. One of the great advantages of the proposed approach is that it clarifies a means to (i) understand sparse matrices, the property graph model, hypergraphs, and other data structures with an emphasis on link attributes, (ii) map such data onto RDF, and (iii) query such data using SPARQL. Further, the proposal greatly expands both the freedom that database designers enjoy when creating physical indexing schemes and query plans for graph data annotated with link attributes and the interoperability of those database solutions.
This paper presents the method of mining the data and which contains the information about the large information about the PR (Panchayat Raj Department)of Orissa.We have focused some of the techniques,approaches and different methodologies of the demand forecasting. Every organizations are operated in different places of the country. Each place of operation may generate a huge amount of data. In an organization, worker prediction is the difficult task of the manager. It is the complex process not only because its nature of feature prediction but also various approaches methodologies always makes user confused. This paper aims to deal with the problem selection process. In this paper we have used some of the approaches from literature are been introduced and analyzed to find its suitable organization and situation. Based on this we have designed with automatic selection function to help users make a prejudgment. This information about each approach will be showed to users with examples to help understanding. This system also provides calculation function to help users work out a predication result. Generally the new developed system has a more comprehensive functions compared with existing ones. It aims to improve the accuracy of demand forecasting by implementing the forecasting algorithm. While it is still a decision support system with no ability of make the final judgment.This type of huge amount of data are are available in the form of different ways which has drastically changed in the areas of science and engineering.To analyze, manage and make a decision of such type of huge amount of data we need techniques called the data mining which will transforming in many fields. We have implemented the algorithms in JAVA technology. This paper provides the prediction algorithm Linear Regression, result which will helpful in the further research.
We focus on the problem of differentially private histogram publication, for range-sum query answering. Specifically, we derive a histogram from a given dataset, such that (i) it satisfies $\\epsilon$-differential privacy, and (ii) it achieves high utility for queries that request the sum of contiguous histogram bins. Existing schemes are distinguished into two categories: fast but oblivious to utility optimizations that exploit the data characteristics, and data-aware but slow. We are the first to address this problem with emphasis on both efficiency and utility. Towards this goal, we formulate a principled approach, which defines a small set of simple modules, based on which we can devise a variety of more complex schemes. We first express the state-of-the-art methods in terms of these modules, which allows us to identify the performance bottlenecks. Next, we design novel efficient and effective schemes based on non-trivial module combinations. We experimentally evaluate all mechanisms on three real datasets with diverse characteristics, and demonstrate the benefits of our proposals over previous work.
In general frequent itemsets are generated from large data sets by applying association rule mining algorithms like Apriori, Partition, Pincer-Search, Incremental, Border algorithm etc., which take too much computer time to compute all the frequent itemsets. By using Genetic Algorithm (GA) we can improve the scenario. The major advantage of using GA in the discovery of frequent itemsets is that they perform global search and its time complexity is less compared to other algorithms as the genetic algorithm is based on the greedy approach. The main aim of this paper is to find all the frequent itemsets from given data sets using genetic algorithm.
In this paper a novel fragile watermarking scheme is proposed to detect, localize and recover malicious modifications in relational databases. In the proposed scheme, all tuples in the database are first securely divided into groups. Then watermarks are embedded and verified group-by-group independently. By using the embedded watermark, we are able to detect and localize the modification made to the database and even we recover the true data from the database modified locations. Our experimental results show that this scheme is so qualified; i.e. distortion detection and true data recovery both are performed successfully.
Graphs are becoming one of the most popular data modeling paradigms since they are able to model complex relationships that cannot be easily captured using traditional data models. One of the major tasks of graph management is graph matching, which aims to find all of the subgraphs in a data graph that match a query graph. In the literature, proposals in this context are classified into two different categories: graph-at-a-time, which process the whole query graph at the same time, and vertex-at-a-time, which process a single vertex of the query graph at the same time. In this paper, we propose a new vertex-at-a-time proposal that is based on graphlets, each of which comprises a vertex of a graph, all of the immediate neighbors of that vertex, and all of the edges that relate those neighbors. Furthermore, we also use the concept of minimum hub covers, each of which comprises a subset of vertices in the query graph that account for all of the edges in that graph. We present the algorithms of our proposal and describe an implementation based on XQuery and RDF. Our evaluation results show that our proposal is appealing to perform graph matching.
We develop a tool called PipeGen for efficient data transfer between database management systems (DBMSs). PipeGen targets data analytics workloads on shared-nothing engines. It supports scenarios where users seek to perform different parts of an analysis in different DBMSs or want to combine and analyze data stored in different systems. The systems may be colocated in the same cluster or may be in different clusters. To achieve high performance, PipeGen leverages the ability of all DBMSs to export, possibly in parallel, data into a common data format, such as CSV or JSON. It automatically extends these import and export functions with efficient binary data transfer capabilities that avoid materializing the transmitted data on the file system. We implement a prototype of PipeGen and evaluate it by automatically generating data pipes between five different DBMSs. Our experiments show that PipeGen delivers speedups up to 3.8x compared with manually exporting and importing data across systems using CSV.
We focus on data fusion, i.e., the problem of unifying conflicting data from data sources into a single representation by estimating the source accuracies. We propose SLiMFast, a framework that expresses data fusion as a statistical learning problem over discriminative probabilistic models, which in many cases correspond to logistic regression. In contrast to previous approaches that use complex generative models, discriminative models make fewer distributional assumptions over data sources and allow us to obtain rigorous theoretical guarantees. Furthermore, we show how SLiMFast enables incorporating domain knowledge into data fusion, yielding accuracy improvements of up to 50\\% over state-of-the-art baselines. Building upon our theoretical results, we design an optimizer that obviates the need for users to manually select an algorithm for learning SLiMFast s parameters. We validate our optimizer on multiple real-world datasets and show that it can accurately predict the learning algorithm that yields the best data fusion results.
Visualisation facilitates the understanding of scientific data both through exploration and explanation of visualised data. Provenance contributes to the understanding of data by containing the contributing factors behind a result. With the significant increase in data volumes and algorithm complexity, clinical researchers are struggling with information tracking, analysis reproducibility and the verification of scientific output. Data coming from various heterogeneous sources (multiple sources with varying level of trust) in a collaborative environment adds to the uncertainty of the scientific output. Systems are required that offer provenance data capture and visualisation support for analyses. We present an account for the need to visualise provenance information in order to aid the process of verification of scientific outputs, comparison of analyses,progression and evolution of results for neuroimaging analysis.
Stream processing applications are deployed as continuous queries that run from the time of their submission until their cancellation. This deployment mode limits developers who need their applications to perform runtime adaptation, such as algorithmic adjustments, incremental job deployment, and application-specific failure recovery. Currently, developers do runtime adaptation by using external scripts and/or by inserting operators into the stream processing graph that are unrelated to the data processing logic. In this paper, we describe a component called orchestrator that allows users to write routines for automatically adapting the application to runtime conditions. Developers build an orchestrator by registering and handling events as well as specifying actuations. Events can be generated due to changes in the system state (e.g., application component failures), built-in system metrics (e.g., throughput of a connection), or custom application metrics (e.g., quality score). Once the orchestrator receives an event, users can take adaptation actions by using the orchestrator actuation APIs. We demonstrate the use of the orchestrator in IBM s System S in the context of three different applications, illustrating application adaptation to changes on the incoming data distribution, to application failures, and on-demand dynamic composition.
In this paper, we propose a concurrency control protocol, called the Prudent-Precedence Concurrency Control (PPCC) protocol, for high data contention database environments. PPCC is prudently more aggressive in permitting more serializable schedules than two-phase locking. It maintains a restricted precedence among conflicting transactions and commits the transactions according to the serialization order established in the executions. A detailed simulation model has been constructed and extensive experiments have been conducted to evaluate the performance of the proposed approach. The results demonstrate that the proposed algorithm outperforms the two-phase locking and optimistic concurrency control in all ranges of system workload.
The HL7 standard is widely used to exchange medical information electronically. As a part of the standard, HL7 defines scalar communication data types like physical quantity, point in time and concept descriptor but also complex types such as interval types, collection types and probabilistic types. Typical HL7 applications will store their communications in a database, resulting in a translation from HL7 concepts and types into database types. Since the data types were not designed to be implemented in a relational database server, this transition is cumbersome and fraught with programmer error. The purpose of this paper is two fold. First we analyze the HL7 version 3 data type definitions and define a number of conditions that must be met, for the data type to be suitable for implementation in a relational database. As a result of this analysis we describe a number of possible improvements in the HL7 specification. Second we describe an implementation in the PostgreSQL database server and show that the database server can effectively execute scientific calculations with units of measure, supports a large number of operations on time points and intervals, and can perform operations that are akin to a medical terminology server. Experiments on synthetic data show that the user defined types perform better than an implementation that uses only standard data types from the database server.
Organizations with a large user base, such as Samsung and Google, can potentially benefit from collecting and mining users  data. However, doing so raises privacy concerns, and risks accidental privacy breaches with serious consequences. Local differential privacy (LDP) techniques address this problem by only collecting randomized answers from each user, with guarantees of plausible deniability; meanwhile, the aggregator can still build accurate models and predictors by analyzing large amounts of such randomized data. So far, existing LDP solutions either have severely restricted functionality, or focus mainly on theoretical aspects such as asymptotical bounds rather than practical usability and performance. Motivated by this, we propose Harmony, a practical, accurate and efficient system for collecting and analyzing data from smart device users, while satisfying LDP. Harmony applies to multi-dimensional data containing both numerical and categorical attributes, and supports both basic statistics (e.g., mean and frequency estimates), and complex machine learning tasks (e.g., linear regression, logistic regression and SVM classification). Experiments using real data confirm Harmony s effectiveness.
A common form of MapReduce application involves discovering relationships between certain pairs of inputs. Similarity joins serve as a good example of this type of problem, which we call a \"some-pairs\" problem. In the framework of Afrati et al. (VLDB 2013), algorithms are measured by the tradeoff between reducer size (maximum number of inputs a reducer can handle) and the replication rate (average number of reducers to which an input must be sent. There are two obvious approaches to solving some-pairs problems in general. We show that no general-purpose MapReduce algorithm can beat both of these two algorithms in the worst case. We then explore a recursive algorithm for solving some-pairs problems and heuristics for beating the lower bound on common instances of the some-pairs class of problems.
Traditional association rule mining based on the support-confidence framework provides the objective measure of the rules that are of interest to users. However, it does not reflect the utility of the rules. To extract non-redundant association rules in support-confidence framework frequent closed itemsets and their generators play an important role. To extract non-redundant association rules among high utility itemsets, high utility closed itemsets (HUCI) and their generators should be extracted in order to apply traditional support-confidence framework. However, no efficient method exists at present for mining HUCIs with their generators. This paper addresses this issue. A post-processing algorithm, called the HUCI-Miner, is proposed to mine HUCIs with their generators. The proposed algorithm is implemented using both synthetic and real datasets.
Recent advances in 3D modeling provide us with real 3D datasets to answer queries, such as \"What is the best position for a new billboard?\" and \"Which hotel room has the best view?\" in the presence of obstacles. These applications require measuring and differentiating the visibility of an object (target) from different viewpoints in a dataspace, e.g., a billboard may be seen from two viewpoints but is readable only from the viewpoint closer to the target. In this paper, we formulate the above problem of quantifying the visibility of (from) a target object from (of) the surrounding area with a visibility color map (VCM). A VCM is essentially defined as a surface color map of the space, where each viewpoint of the space is assigned a color value that denotes the visibility measure of the target from that viewpoint. Measuring the visibility of a target even from a single viewpoint is an expensive operation, as we need to consider factors such as distance, angle, and obstacles between the viewpoint and the target. Hence, a straightforward approach to construct the VCM that requires visibility computation for every viewpoint of the surrounding space of the target, is prohibitively expensive in terms of both I/Os and computation, especially for a real dataset comprising of thousands of obstacles. We propose an efficient approach to compute the VCM based on a key property of the human vision that eliminates the necessity of computing the visibility for a large number of viewpoints of the space. To further reduce the computational overhead, we propose two approximations; namely, minimum bounding rectangle and tangential approaches with guaranteed error bounds. Our extensive experiments demonstrate the effectiveness and efficiency of our solutions to construct the VCM for real 2D and 3D datasets.
Because the presence of views enhances query performance, materialized views are increasingly being supported by commercial database/data warehouse systems. Whenever the data warehouse is updated, the materialized views must also be updated. However, whereas the amount of data entering a warehouse, the query loads, and the need to obtain up-to-date responses are all increasing, the time window available for making the warehouse up-to-date is shrinking. These trends necessitate efficient techniques for the maintenance of materialized views. In this paper, we show how to find an efficient plan for maintenance of a {\\em set} of views, by exploiting common subexpressions between different view maintenance expressions. These common subexpressions may be materialized temporarily during view maintenance. Our algorithms also choose subexpressions/indices to be materialized permanently (and maintained along with other materialized views), to speed up view maintenance. While there has been much work on view maintenance in the past, our novel contributions lie in exploiting a recently developed framework for multiquery optimization to efficiently find good view maintenance plans as above. In addition to faster view maintenance, our algorithms can also be used to efficiently select materialized views to speed up workloads containing queries.
Entity Resolution concerns identifying co-referent entity pairs across datasets. A typical workflow comprises two steps. In the first step, a blocking method uses a one-many function called a blocking scheme to map entities to blocks. In the second step, entities sharing a block are paired and compared. Current DNF blocking scheme learners (DNF-BSLs) apply only to structurally homogeneous tables. We present an unsupervised algorithmic pipeline for learning DNF blocking schemes on RDF graph datasets, as well as structurally heterogeneous tables. Previous DNF-BSLs are admitted as special cases. We evaluate the pipeline on six real-world dataset pairs. Unsupervised results are shown to be competitive with supervised and semi-supervised baselines. To the best of our knowledge, this is the first unsupervised DNF-BSL that admits RDF graphs and structurally heterogeneous tables as inputs.
Evaluating workers is a critical aspect of any crowdsourcing system. In this paper, we devise techniques for evaluating workers by finding confidence intervals on their error rates. Unlike prior work, we focus on \"conciseness\"---that is, giving as tight a confidence interval as possible. Conciseness is of utmost importance because it allows us to be sure that we have the best guarantee possible on worker error rate. Also unlike prior work, we provide techniques that work under very general scenarios, such as when not all workers have attempted every task (a fairly common scenario in practice), when tasks have non-boolean responses, and when workers have different biases for positive and negative tasks. We demonstrate conciseness as well as accuracy of our confidence intervals by testing them on a variety of conditions and multiple real-world datasets.
XML is of great importance in information storage and retrieval because of its recent emergence as a standard for data representation and interchange on the Internet. However XML provides little semantic content and as a result several papers have addressed the topic of how to improve the semantic expressiveness of XML. Among the most important of these approaches has been that of defining integrity constraints in XML. In a companion paper we defined strong functional dependencies in XML(XFDs). We also presented a set of axioms for reasoning about the implication of XFDs and showed that the axiom system is sound for arbitrary XFDs. In this paper we prove that the axioms are also complete for unary XFDs (XFDs with a single path on the l.h.s.). The second contribution of the paper is to prove that the implication problem for unary XFDs is decidable and to provide a linear time algorithm for it.
While traditional data-management systems focus on evaluating single, ad-hoc queries over static data sets in a centralized setting, several emerging applications require (possibly, continuous) answers to queries on dynamic data that is widely distributed and constantly updated. Furthermore, such query answers often need to discount data that is \"stale\", and operate solely on a sliding window of recent data arrivals (e.g., data updates occurring over the last 24 hours). Such distributed data streaming applications mandate novel algorithmic solutions that are both time- and space-efficient (to manage high-speed data streams), and also communication-efficient (to deal with physical data distribution). In this paper, we consider the problem of complex query answering over distributed, high-dimensional data streams in the sliding-window model. We introduce a novel sketching technique (termed ECM-sketch) that allows effective summarization of streaming data over both time-based and count-based sliding windows with probabilistic accuracy guarantees. Our sketch structure enables point as well as inner-product queries, and can be employed to address a broad range of problems, such as maintaining frequency statistics, finding heavy hitters, and computing quantiles in the sliding-window model. Focusing on distributed environments, we demonstrate how ECM-sketches of individual, local streams can be composed to generate a (low-error) ECM-sketch summary of the order-preserving aggregation of all streams; furthermore, we show how ECM-sketches can be exploited for continuous monitoring of sliding-window queries over distributed streams. Our extensive experimental study with two real-life data sets validates our theoretical claims and verifies the effectiveness of our techniques. To the best of our knowledge, ours is the first work to address efficient, guaranteed-error complex query answ...[truncated].
Motivated by the increasing prominence of loosely-coupled systems, such as mobile and sensor networks, which are characterised by intermittent connectivity and volatile data, we study the tagging of data with so-called expiration times. More specifically, when data are inserted into a database, they may be tagged with time values indicating when they expire, i.e., when they are regarded as stale or invalid and thus are no longer considered part of the database. In a number of applications, expiration times are known and can be assigned at insertion time. We present data structures and algorithms for online management of data tagged with expiration times. The algorithms are based on fully functional, persistent treaps, which are a combination of binary search trees with respect to a primary attribute and heaps with respect to a secondary attribute. The primary attribute implements primary keys, and the secondary attribute stores expiration times in a minimum heap, thus keeping a priority queue of tuples to expire. A detailed and comprehensive experimental study demonstrates the well-behavedness and scalability of the approach as well as its efficiency with respect to a number of competitors.
There is a growing realization that uncertain information is a first-class citizen in modern database management. As such, we need techniques to correctly and efficiently process uncertain data in database systems. In particular, data reduction techniques that can produce concise, accurate synopses of large probabilistic relations are crucial. Similar to their deterministic relation counterparts, such compact probabilistic data synopses can form the foundation for human understanding and interactive data exploration, probabilistic query planning and optimization, and fast approximate query processing in probabilistic database systems. In this paper, we introduce definitions and algorithms for building histogram- and wavelet-based synopses on probabilistic data. The core problem is to choose a set of histogram bucket boundaries or wavelet coefficients to optimize the accuracy of the approximate representation of a collection of probabilistic tuples under a given error metric. For a variety of different error metrics, we devise efficient algorithms that construct optimal or near optimal B-term histogram and wavelet synopses. This requires careful analysis of the structure of the probability distributions, and novel extensions of known dynamic-programming-based techniques for the deterministic domain. Our experiments show that this approach clearly outperforms simple ideas, such as building summaries for samples drawn from the data distribution, while taking equal or less time.
The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained at the conclusion.
In this work, we initiate the investigation of optimization opportunities in collaborative crowdsourcing. Many popular applications, such as collaborative document editing, sentence translation, or citizen science resort to this special form of human-based computing, where, crowd workers with appropriate skills and expertise are required to form groups to solve complex tasks. Central to any collaborative crowdsourcing process is the aspect of successful collaboration among the workers, which, for the first time, is formalized and then optimized in this work. Our formalism considers two main collaboration-related human factors, affinity and upper critical mass, appropriately adapted from organizational science and social theories. Our contributions are (a) proposing a comprehensive model for collaborative crowdsourcing optimization, (b) rigorous theoretical analyses to understand the hardness of the proposed problems, (c) an array of efficient exact and approximation algorithms with provable theoretical guarantees. Finally, we present a detailed set of experimental results stemming from two real-world collaborative crowdsourcing application us- ing Amazon Mechanical Turk, as well as conduct synthetic data analyses on scalability and qualitative aspects of our proposed algorithms. Our experimental results successfully demonstrate the efficacy of our proposed solutions.
Detecting dominant clusters is important in many analytic applications. The state-of-the-art methods find dense subgraphs on the affinity graph as the dominant clusters. However, the time and space complexity of those methods are dominated by the construction of the affinity graph, which is quadratic with respect to the number of data points, and thus impractical on large data sets. To tackle the challenge, in this paper, we apply Evolutionary Game Theory (EGT) and develop a scalable algorithm, Approximate Localized Infection Immunization Dynamics (ALID). The major idea is to perform Localized Infection Immunization Dynamics (LID) to find dense subgraph within local range of the affinity graph. LID is further scaled up with guaranteed high efficiency and detection quality by an estimated Region of Interest (ROI) and a carefully designed Candidate Infective Vertex Search method (CIVS). ALID only constructs small local affinity graphs and has a time complexity of O(C(a^*+ {\\delta})n) and a space complexity of O(a^*(a^*+ {\\delta})), where a^* is the size of the largest dominant cluster and C << n and {\\delta} << n are small constants. We demonstrate by extensive experiments on both synthetic data and real world data that ALID achieves state-of-the-art detection quality with much lower time and space cost on single machine. We also demonstrate the encouraging parallelization performance of ALID by implementing the Parallel ALID (PALID) on Apache Spark. PALID processes 50 million SIFT data points in 2.29 hours, achieving a speedup ratio of 7.51 with 8 executors.
XML data warehouses form an interesting basis for decision-support applications that exploit complex data. However, native XML database management systems currently bear limited performances and it is necessary to design strategies to optimize them. In this paper, we propose an automatic strategy for the selection of XML materialized views that exploits a data mining technique, more precisely the clustering of the query workload. To validate our strategy, we implemented an XML warehouse modeled along the XCube specifications. We executed a workload of XQuery decision-support queries on this warehouse, with and without using our strategy. Our experimental results demonstrate its efficiency, even when queries are complex.
We present a framework for concurrency control and availability in multi-datacenter datastores. While we consider Google s Megastore as our motivating example, we define general abstractions for key components, making our solution extensible to any system that satisfies the abstraction properties. We first develop and analyze a transaction management and replication protocol based on a straightforward implementation of the Paxos algorithm. Our investigation reveals that this protocol acts as a concurrency prevention mechanism rather than a concurrency control mechanism. We then propose an enhanced protocol called Paxos with Combination and Promotion (Paxos-CP) that provides true transaction concurrency while requiring the same per instance message complexity as the basic Paxos protocol. Finally, we compare the performance of Paxos and Paxos-CP in a multi-datacenter experimental study, and we demonstrate that Paxos-CP results in significantly fewer aborted transactions than basic Paxos.
The problem of extracting consistent information from relational databases violating integrity constraints on numerical data is addressed. In particular, aggregate constraints defined as linear inequalities on aggregate-sum queries on input data are considered. The notion of repair as consistent set of updates at attribute-value level is exploited, and the characterization of several complexity issues related to repairing data and computing consistent query answers is provided.
Users  locations are important for many applications such as personalized search and localized content delivery. In this paper, we study the problem of profiling Twitter users  locations with their following network and tweets. We propose a multiple location profiling model (MLP), which has three key features: 1) it formally models how likely a user follows another user given their locations and how likely a user tweets a venue given his location, 2) it fundamentally captures that a user has multiple locations and his following relationships and tweeted venues can be related to any of his locations, and some of them are even noisy, and 3) it novelly utilizes the home locations of some users as partial supervision. As a result, MLP not only discovers users  locations accurately and completely, but also \"explains\" each following relationship by revealing users  true locations in the relationship. Experiments on a large-scale data set demonstrate those advantages. Particularly, 1) for predicting users  home locations, MLP successfully places 62% users and outperforms two state-of-the-art methods by 10% in accuracy, 2) for discovering users  multiple locations, MLP improves the baseline methods by 14% in recall, and 3) for explaining following relationships, MLP achieves 57% accuracy.
Data warehousing is an essential element of decision support systems. It aims at enabling the user knowledge to make better and faster daily business decisions. To improve this decision support system and to give more and more relevant information to the user, the need to integrate user s profiles into the data warehouse process becomes crucial. In this paper, we propose to exploit users  preferences as a basis for adapting OLAP (On-Line Analytical Processing) queries to the user. For this, we present a user profile-driven data warehouse approach that allows dening user s profile composed by his/her identifier and a set of his/her preferences. Our approach is based on a general data warehouse architecture and an adaptive OLAP analysis system. Our main idea consists in creating a data warehouse materialized view for each user with respect to his/her profile. This task is performed off-line when the user defines his/her profile for the first time. Then, when a user query is submitted to the data warehouse, the system deals with his/her data warehouse materialized view instead of the whole data warehouse. In other words, the data warehouse view summaries the data warehouse content for the user by taking into account his/her preferences. Moreover, we are implementing our data warehouse personalization approach under the SQL Server 2005 DBMS (DataBase Management System).
Grid services are heavily used for handling large distributed computations. They are also very useful to handle heavy data intensive applications where data are distributed in different sites. Most of the data grid services used in such situations are meant for homogeneous data source. In case of Heterogeneous data sources, most of the grid services that are available are designed such a way that they must be identical in schema definition for their smooth operation. But there can be situations where the grid site databases are heterogeneous and their schema definition is different from the central schema definition. In this paper we propose a light weight coherent grid service for heterogeneous data sources that is very easily install. It can map and convert the central SQL schema into that of the grid members and send queries to get according results from heterogeneous data sources.
MEMS storage devices are new non-volatile secondary storages that have outstanding advantages over magnetic disks. MEMS storage devices, however, are much different from magnetic disks in the structure and access characteristics. They have thousands of heads called probe tips and provide the following two major access facilities: (1) flexibility: freely selecting a set of probe tips for accessing data, (2) parallelism: simultaneously reading and writing data with the set of probe tips selected. Due to these characteristics, it is nontrivial to find data placements that fully utilize the capability of MEMS storage devices. In this paper, we propose a simple logical model called the Region-Sector (RS) model that abstracts major characteristics affecting data retrieval performance, such as flexibility and parallelism, from the physical MEMS storage model. We also suggest heuristic data placement strategies based on the RS model and derive new data placements for relational data and two-dimensional spatial data by using those strategies. Experimental results show that the proposed data placements improve the data retrieval performance by up to 4.0 times for relational data and by up to 4.8 times for two-dimensional spatial data of approximately 320 Mbytes compared with those of existing data placements. Further, these improvements are expected to be more marked as the database size grows.
We consider Location-based Service (LBS) settings, where a LBS provider logs the requests sent by mobile device users over a period of time and later wants to publish/share these logs. Log sharing can be extremely valuable for advertising, data mining research and network management, but it poses a serious threat to the privacy of LBS users. Sender anonymity solutions prevent a malicious attacker from inferring the interests of LBS users by associating them with their service requests after gaining access to the anonymized logs. With the fast-increasing adoption of smartphones and the concern that historic user trajectories are becoming more accessible, it becomes necessary for any sender anonymity solution to protect against attackers that are trajectory-aware (i.e. have access to historic user trajectories) as well as policy-aware (i.e they know the log anonymization policy). We call such attackers TP-aware. This paper introduces a first privacy guarantee against TP-aware attackers, called TP-aware sender k-anonymity. It turns out that there are many possible TP-aware anonymizations for the same LBS log, each with a different utility to the consumer of the anonymized log. The problem of finding the optimal TP-aware anonymization is investigated. We show that trajectory-awareness renders the problem computationally harder than the trajectory-unaware variants found in the literature (NP-complete in the size of the log, versus PTIME). We describe a PTIME l-approximation algorithm for trajectories of length l and empirically show that it scales to large LBS logs (up to 2 million users).
Querying very large RDF data sets in an efficient manner requires a sophisticated distribution strategy. Several innovative solutions have recently been proposed for optimizing data distribution with predefined query workloads. This paper presents an in-depth analysis and experimental comparison of five representative and complementary distribution approaches. For achieving fair experimental results, we are using Apache Spark as a common parallel computing framework by rewriting the concerned algorithms using the Spark API. Spark provides guarantees in terms of fault tolerance, high availability and scalability which are essential in such systems. Our different implementations aim to highlight the fundamental implementation-independent characteristics of each approach in terms of data preparation, load balancing, data replication and to some extent to query answering cost and performance. The presented measures are obtained by testing each system on one synthetic and one real-world data set over query workloads with differing characteristics and different partitioning constraints.
In data management, and in particular in data integration, data exchange, query optimization, and data privacy, the notion of view plays a central role. In several contexts, such as data integration, data mashups, and data warehousing, the need arises of designing views starting from a set of known correspondences between queries over different schemas. In this paper we deal with the issue of automating such a design process. We call this novel problem \"view synthesis from schema mappings\": given a set of schema mappings, each relating a query over a source schema to a query over a target schema, automatically synthesize for each source a view over the target schema in such a way that for each mapping, the query over the source is a rewriting of the query over the target wrt the synthesized views. We study view synthesis from schema mappings both in the relational setting, where queries and views are (unions of) conjunctive queries, and in the semistructured data setting, where queries and views are (two-way) regular path queries, as well as unions of conjunctions thereof. We provide techniques and complexity upper bounds for each of these cases.
Despite the increasing need for modeling and implementing Distributed Databases (DDB), distributed database management systems are still quite far from helping the designer to directly implement its BDD. Indeed, the fundamental principle of implementation of a DDB is to make the database appear as a centralized database, providing series of transparencies, something that is not provided directly by the current DDBMS. We focus in this work on Oracle DBMS which, despite its market dominance, offers only a few logical mechanisms to implement distribution. To remedy this problem, we propose a new architecture of DDBMS Oracle. The idea is based on extending it by an intelligent layer that provides: 1) creation of different types of fragmentation through a GUI for defining different sites geographically dispersed 2) allocation and replication of DB. The system must automatically generate SQL scripts for each site of the original configuration.
Biologists are increasingly using databases for storing and managing their data. Biological databases typically consist of a mixture of raw data, metadata, sequences, annotations, and related data obtained from various sources. Current database technology lacks several functionalities that are needed by biological databases. In this paper, we introduce bdbms, an extensible prototype database management system for supporting biological data. bdbms extends the functionalities of current DBMSs to include: (1) Annotation and provenance management including storage, indexing, manipulation, and querying of annotation and provenance as first class objects in bdbms, (2) Local dependency tracking to track the dependencies and derivations among data items, (3) Update authorization to support data curation via content-based authorization, in contrast to identity-based authorization, and (4) New access methods and their supporting operators that support pattern matching on various types of compressed biological data types. This paper presents the design of bdbms along with the techniques proposed to support these functionalities including an extension to SQL. We also outline some open issues in building bdbms.
Data warehouses are the core of decision support sys- tems, which nowadays are used by all kind of enter- prises in the entire world. Although many studies have been conducted on the need of decision support systems (DSSs) for small businesses, most of them adopt ex- isting solutions and approaches, which are appropriate for large-scaled enterprises, but are inadequate for small and middle-sized enterprises. Small enterprises require cheap, lightweight architec- tures and tools (hardware and software) providing on- line data analysis. In order to ensure these features, we review web-based business intelligence approaches. For real-time analysis, the traditional OLAP architecture is cumbersome and storage-costly; therefore, we also re- view in-memory processing. Consequently, this paper discusses the existing approa- ches and tools working in main memory and/or with web interfaces (including freeware tools), relevant for small and middle-sized enterprises in decision making.
In this paper, we study the communication complexity for the problem of computing a conjunctive query on a large database in a parallel setting with $p$ servers. In contrast to previous work, where upper and lower bounds on the communication were specified for particular structures of data (either data without skew, or data with specific types of skew), in this work we focus on worst-case analysis of the communication cost. The goal is to find worst-case optimal parallel algorithms, similar to the work of [18] for sequential algorithms. We first show that for a single round we can obtain an optimal worst-case algorithm. The optimal load for a conjunctive query $q$ when all relations have size equal to $M$ is $O(M/p^{1/\\psi^*})$, where $\\psi^*$ is a new query-related quantity called the edge quasi-packing number, which is different from both the edge packing number and edge cover number of the query hypergraph. For multiple rounds, we present algorithms that are optimal for several classes of queries. Finally, we show a surprising connection to the external memory model, which allows us to translate parallel algorithms to external memory algorithms. This technique allows us to recover (within a polylogarithmic factor) several recent results on the I/O complexity for computing join queries, and also obtain optimal algorithms for other classes of queries.
Graphs have been commonly used to model many applications. A natural problem which abstracts applications such as itinerary planning, playlist recommendation, and flow analysis in information networks is that of finding the heaviest path(s) in a graph. More precisely, we can model these applications as a graph with non-negative edge weights, along with a monotone function such as sum, which aggregates edge weights into a path weight, capturing some notion of quality. We are then interested in finding the top-k heaviest simple paths, i.e., the $k$ simple (cycle-free) paths with the greatest weight, whose length equals a given parameter $\\ell$. We call this the \\emph{Heavy Path Problem} (HPP). It is easy to show that the problem is NP-Hard. In this work, we develop a practical approach to solve the Heavy Path problem by leveraging a strong connection with the well-known Rank Join paradigm. We first present an algorithm by adapting the Rank Join algorithm. We identify its limitations and develop a new exact algorithm called HeavyPath and a scalable heuristic algorithm. We conduct a comprehensive set of experiments on three real data sets and show that HeavyPath outperforms the baseline algorithms significantly, with respect to both $\\ell$ and $k$. Further, our heuristic algorithm scales to longer lengths, finding paths that are empirically within 50% of the optimum solution or better under various settings, and takes only a fraction of the running time compared to the exact algorithm.
Our Chemical e-Science Information Cloud (ChemCloud) - a Semantic Web based eScience infrastructure - integrates and automates a multitude of databases, tools and services in the domain of chemistry, pharmacy and bio-chemistry available at the Fachinformationszentrum Chemie (FIZ Chemie), at the Freie Universitaet Berlin (FUB), and on the public Web. Based on the approach of the W3C Linked Open Data initiative and the W3C Semantic Web technologies for ontologies and rules it semantically links and integrates knowledge from our W3C HCLS knowledge base hosted at the FUB, our multi-domain knowledge base DBpedia (Deutschland) implemented at FUB, which is extracted from Wikipedia (De) providing a public semantic resource for chemistry, and our well-established databases at FIZ Chemie such as ChemInform for organic reaction data, InfoTherm the leading source for thermophysical data, Chemisches Zentralblatt, the complete chemistry knowledge from 1830 to 1969, and ChemgaPedia the largest and most frequented e-Learning platform for Chemistry and related sciences in German language.
This paper presents a proposed model for database replication model in private cloud availability regions, which is an enhancement of the SQL Server AlwaysOn Layers of Protection Model presents by Microsoft in 2012. The enhancement concentrates in the database replication for private cloud availability regions through the use of primary and secondary servers. The processes of proposed model during the client send Write/Read Request to the server, in synchronous and semi synchronous replication level has been described in details also the processes of proposed model when the client send Write/Read Request to the Primary Server presented in details. All the types of automatic failover situations are presented in this thesis. Using the proposed models will increase the performance because each one of the secondary servers will open for Read / Write and allow the clients to connect to the nearby secondary and less loading on each server. Keywords: Availability Regions, Cloud Computing, Database Replication, SQL Server AlwaysOn, Synchronization.
As the amount of linked data published on the web grows, attempts are being made to describe and measure it. However even basic statistics about a graph, such as its size, are difficult to express in a uniform and predictable way. In order to be able to sensibly interpret a statistic it is necessary to know how it was calculate. In this paper we survey the nature of the problem and outline a strategy for addressing it.
The formalism of active integrity constraints was introduced as a way to specify particular classes of integrity constraints over relational databases together with preferences on how to repair existing inconsistencies. The rule-based syntax of such integrity constraints also provides algorithms for finding such repairs that achieve the best asymptotic complexity. However, the different semantics that have been proposed for these integrity constraints all exhibit some counter-intuitive examples. In this work, we look at active integrity constraints using ideas from algebraic fixpoint theory. We show how database repairs can be modeled as fixpoints of particular operators on databases, and study how the notion of grounded fixpoint induces a corresponding notion of grounded database repair that captures several natural intuitions, and in particular avoids the problems of previous alternative semantics. In order to study grounded repairs in their full generality, we need to generalize the notion of grounded fixpoint to non-deterministic operators. We propose such a definition and illustrate its plausibility in the database context.
The increasing popularity of social networks has initiated a fertile research area in information extraction and data mining. Anonymization of these social graphs is important to facilitate publishing these data sets for analysis by external entities. Prior work has concentrated mostly on node identity anonymization and structural anonymization. But with the growing interest in analyzing social networks as a weighted network, edge weight anonymization is also gaining importance. We present An\\ onimos, a Linear Programming based technique for anonymization of edge weights that preserves linear properties of graphs. Such properties form the foundation of many important graph-theoretic algorithms such as shortest paths problem, k-nearest neighbors, minimum cost spanning tree, and maximizing information spread. As a proof of concept, we apply An\\ onimos to the shortest paths problem and its extensions, prove the correctness, analyze complexity, and experimentally evaluate it using real social network data sets. Our experiments demonstrate that An\\ onimos anonymizes the weights, improves k-anonymity of the weights, and also scrambles the relative ordering of the edges sorted by weights, thereby providing robust and effective anonymization of the sensitive edge-weights. Additionally, we demonstrate the composability of different models generated using An\\ onimos, a property that allows a single anonymized graph to preserve multiple linear properties.
Functional dependencies are an integral part of database design. However, they are only defined when we exclude null markers. Yet we commonly use null markers in practice. To bridge this gap between theory and practice, researchers have proposed definitions of functional dependencies over relations with null markers. Though sound, these definitions lack some qualities that we find desirable. For example, some fail to satisfy Armstrong s axioms---while these axioms are part of the foundation of common database methodologies. We propose a set of properties that any extension of functional dependencies over relations with null markers should possess. We then propose two new extensions having these properties. These extensions attempt to allow null markers where they make sense to practitioners. They both support Armstrong s axioms and provide realizable null markers: at any time, some or all of the null markers can be replaced by actual values without causing an anomaly. Our proposals may improve database designs.
Acting on time-critical events by processing ever growing social media, news or cyber data streams is a major technical challenge. Many of these data sources can be modeled as multi-relational graphs. Mining and searching for subgraph patterns in a continuous setting requires an efficient approach to incremental graph search. The goal of our work is to enable real-time search capabilities for graph databases. This demonstration will present a dynamic graph query system that leverages the structural and semantic characteristics of the underlying multi-relational graph.
A temporal graph is a graph in which vertices communicate with each other at specific time, e.g., $A$ calls $B$ at 11 a.m. and talks for 7 minutes, which is modeled by an edge from $A$ to $B$ with starting time \"11 a.m.\" and duration \"7 mins\". Temporal graphs can be used to model many networks with time-related activities, but efficient algorithms for analyzing temporal graphs are severely inadequate. We study fundamental problems such as answering reachability and time-based path queries in a temporal graph, and propose an efficient indexing technique specifically designed for processing these queries in a temporal graph. Our results show that our method is efficient and scalable in both index construction and query processing.
Data warehouse architectural choices and optimization techniques are critical to decision support query performance. To facilitate these choices, the performance of the designed data warehouse must be assessed. This is usually done with the help of benchmarks, which can either help system users comparing the performances of different systems, or help system engineers testing the effect of various design choices. While the TPC standard decision support benchmarks address the first point, they are not tuneable enough to address the second one and fail to model different data warehouse schemas. By contrast, our Data Warehouse Engineering Benchmark (DWEB) allows to generate various ad-hoc synthetic data warehouses and workloads. DWEB is fully parameterized to fulfill data warehouse design needs. However, two levels of parameterization keep it relatively easy to tune. Finally, DWEB is implemented as a Java free software that can be interfaced with most existing relational database management systems. A sample usage of DWEB is also provided in this paper.
The problem of privately releasing data is to provide a version of a dataset without revealing sensitive information about the individuals who contribute to the data. The model of differential privacy allows such private release while providing strong guarantees on the output. A basic mechanism achieves differential privacy by adding noise to the frequency counts in the contingency tables (or, a subset of the count data cube) derived from the dataset. However, when the dataset is sparse in its underlying space, as is the case for most multi-attribute relations, then the effect of adding noise is to vastly increase the size of the published data: it implicitly creates a huge number of dummy data points to mask the true data, making it almost impossible to work with. We present techniques to overcome this roadblock and allow efficient private release of sparse data, while maintaining the guarantees of differential privacy. Our approach is to release a compact summary of the noisy data. Generating the noisy data and then summarizing it would still be very costly, so we show how to shortcut this step, and instead directly generate the summary from the input data, without materializing the vast intermediate noisy data. We instantiate this outline for a variety of sampling and filtering methods, and show how to use the resulting summary for approximate, private, query answering. Our experimental study shows that this is an effective, practical solution, with comparable and occasionally improved utility over the costly materialization approach.
By incorporating human workers into the query execution process crowd-enabled databases facilitate intelligent, social capabilities like completing missing data at query time or performing cognitive operators. But despite all their flexibility, crowd-enabled databases still maintain rigid schemas. In this paper, we extend crowd-enabled databases by flexible query-driven schema expansion, allowing the addition of new attributes to the database at query time. However, the number of crowd-sourced mini-tasks to fill in missing values may often be prohibitively large and the resulting data quality is doubtful. Instead of simple crowd-sourcing to obtain all values individually, we leverage the user-generated data found in the Social Web: By exploiting user ratings we build perceptual spaces, i.e., highly-compressed representations of opinions, impressions, and perceptions of large numbers of users. Using few training samples obtained by expert crowd sourcing, we then can extract all missing data automatically from the perceptual space with high quality and at low costs. Extensive experiments show that our approach can boost both performance and quality of crowd-enabled databases, while also providing the flexibility to expand schemas in a query-driven fashion.
Integrity constraints (ICs) provide a valuable tool for expressing and enforcing application semantics. However, formulating constraints manually requires domain expertise, is prone to human errors, and may be excessively time consuming, especially on large datasets. Hence, proposals for automatic discovery have been made for some classes of ICs, such as functional dependencies (FDs), and recently, order dependencies (ODs). ODs properly subsume FDs, as they can additionally express business rules involving order; e.g., an employee never has a higher salary while paying lower taxes compared with another employee. We address the limitations of prior work on OD discovery which has factorial complexity in the number of attributes, is incomplete (i.e., it does not discover valid ODs that cannot be inferred from the ones found) and is not concise (i.e., it can result in \"redundant\" discovery and overly large discovery sets). We improve significantly on complexity, offer completeness, and define a compact canonical form. This is based on a novel polynomial mapping to a canonical form for ODs, and a sound and complete set of axioms (inference rules) for canonical ODs. This allows us to develop an efficient set-containment, lattice-driven OD discovery algorithm that uses the inference rules to prune the search space. Our algorithm has exponential worst-case time complexity in the number of attributes and linear complexity in the number of tuples. We prove that it produces a complete, minimal set of ODs (i.e., minimal with regards to the canonical representation). Finally, using real and synthetic datasets, we experimentally show orders-of-magnitude performance improvements over the current state-of-the-art algorithm and demonstrate effectiveness of our techniques.
Today, huge amounts of data are being collected with spatial and temporal components from sources such as metrological, satellite imagery etc. Efficient visualisation as well as discovery of useful knowledge from these datasets is therefore very challenging and becoming a massive economic need. Data Mining has emerged as the technology to discover hidden knowledge from very large size of data. Furthermore, data mining techniques could be applied to decrease the large size of raw data by retrieving its useful knowledge as representatives. As a consequence, instead of dealing with a large size of raw data, we can use these representatives to visualise or to analyse without losing important information. This paper presents a data reduction technique based on clustering to help analyse very large spatio-temporal data. We also present and discuss preliminary results of this approach.
Clustering is an important data mining technique where we will be interested in maximizing intracluster distance and also minimizing intercluster distance. We have utilized clustering techniques for detecting deviation in product sales and also to identify and compare sales over a particular period of time. Clustering is suited to group items that seem to fall naturally together, when there is no specified class for any new item. We have utilizedannual sales data of a steel major to analyze Sales Volume & Value with respect to dependent attributes like products, customers and quantities sold. The demand for steel products is cyclical and depends on many factors like customer profile, price,Discounts and tax issues. In this paper, we have analyzed sales data with clustering algorithms like K-Means&EMwhichrevealed many interesting patternsuseful for improving sales revenue and achieving higher sales volume. Our study confirms that partition methods like K-Means & EM algorithms are better suited to analyze our sales data in comparison to Density based methods like DBSCAN & OPTICS or Hierarchical methods like COBWEB.
Determining trust of data available in the Semantic Web is fundamental for applications and users, in particular for linked open data obtained from SPARQL endpoints. There exist several proposals in the literature to annotate SPARQL query results with values from abstract models, adapting the seminal works on provenance for annotated relational databases. We provide an approach capable of providing provenance information for a large and significant fragment of SPARQL 1.1, including for the first time the major non-monotonic constructs under multiset semantics. The approach is based on the translation of SPARQL into relational queries over annotated relations with values of the most general m-semiring, and in this way also refuting a claim in the literature that the OPTIONAL construct of SPARQL cannot be captured appropriately with the known abstract models.
In this work, we study the correlation between attribute sets and the occurrence of dense subgraphs in large attributed graphs, a task we call structural correlation pattern mining. A structural correlation pattern is a dense subgraph induced by a particular attribute set. Existing methods are not able to extract relevant knowledge regarding how vertex attributes interact with dense subgraphs. Structural correlation pattern mining combines aspects of frequent itemset and quasi-clique mining problems. We propose statistical significance measures that compare the structural correlation of attribute sets against their expected values using null models. Moreover, we evaluate the interestingness of structural correlation patterns in terms of size and density. An efficient algorithm that combines search and pruning strategies in the identification of the most relevant structural correlation patterns is presented. We apply our method for the analysis of three real-world attributed graphs: a collaboration, a music, and a citation network, verifying that it provides valuable knowledge in a feasible time.
This paper introduces ENFrame, a unified data processing platform for querying and mining probabilistic data. Using ENFrame, users can write programs in a fragment of Python with constructs such as bounded-range loops, list comprehension, aggregate operations on lists, and calls to external database engines. The program is then interpreted probabilistically by ENFrame. The realisation of ENFrame required novel contributions along several directions. We propose an event language that is expressive enough to succinctly encode arbitrary correlations, trace the computation of user programs, and allow for computation of discrete probability distributions of program variables. We exemplify ENFrame on three clustering algorithms: k-means, k-medoids, and Markov Clustering. We introduce sequential and distributed algorithms for computing the probability of interconnected events exactly or approximately with error guarantees. Experiments with k-medoids clustering of sensor readings from energy networks show orders-of-magnitude improvements of exact clustering using ENFrame over na\\\"ive clustering in each possible world, of approximate over exact, and of distributed over sequential algorithms.
The rapidly expanding technology of mobile communication will give mobile users capability of accessing information from anywhere and any time. The wireless technology has made it possible to achieve continuous connectivity in mobile environment. When the query is specified as continuous, the requesting mobile user can obtain continuously changing result. In order to provide accurate and timely outcome to requesting mobile user, the locations of moving object has to be closely monitored. The objective of paper is to discuss the problem related to the role of personal and terminal mobility and query processing in the mobile environment.
Now a days, data mining and knowledge discovery methods are applied to a variety of enterprise and engineering disciplines to uncover interesting patterns from databases. The study of Sequential patterns is an important data mining problem due to its wide applications to real world time dependent databases. Sequential patterns are inter-event patterns ordered over a time-period associated with specific objects under study. Analysis and discovery of frequent sequential patterns over a predetermined time-period are interesting data mining results, and can aid in decision support in many enterprise applications. The problem of sequential pattern mining poses computational challenges as a long frequent sequence contains enormous number of frequent subsequences. Also useful results depend on the right choice of event window. In this paper, we have studied the problem of sequential pattern mining through two perspectives, one the computational aspect of the problem and the other is incorporation and adjustability of time constraint. We have used Indiscernibility relation from theory of rough sets to partition the search space of sequential patterns and have proposed a novel algorithm that allows previsualization of patterns and allows adjustment of time constraint prior to execution of mining task. The algorithm Rough Set Partitioning is at least ten times faster than the naive time constraint based sequential pattern mining algorithm GSP. Besides this an additional knowledge of time interval of sequential patterns is also determined with the method.
We study the problem of answering k-hop reachability queries in a directed graph, i.e., whether there exists a directed path of length k, from a source query vertex to a target query vertex in the input graph. The problem of k-hop reachability is a general problem of the classic reachability (where k=infinity). Existing indexes for processing classic reachability queries, as well as for processing shortest path queries, are not applicable or not efficient for processing k-hop reachability queries. We propose an index for processing k-hop reachability queries, which is simple in design and efficient to construct. Our experimental results on a wide range of real datasets show that our index is more efficient than the state-of-the-art indexes even for processing classic reachability queries, for which these indexes are primarily designed. We also show that our index is efficient in answering k-hop reachability queries.
Educational data mining (EDM) is defined as the area of scientific inquiry centered around the development of methods for making discoveries within the unique kinds of data that come from educational settings, and using those methods to better understand students and the settings which they learn in. Data mining enables organizations to use their current reporting capabilities to uncover and understand hidden patterns in vast databases. As a result of this insight, institutions are able to allocate resources and staff more effectively. In this paper, we present a real-world experiment conducted in Shree Rayeshwar Institute of Engineering and Information Technology (SRIEIT) in Goa, India. Here we found the relevant subjects in an undergraduate syllabus and the strength of their relationship. We have also focused on classification of students into different categories such as good, average, poor depending on their marks scored by them by obtaining a decision tree which will predict the performance of the students and accordingly help the weaker section of students to improve in their academics. We have also found clusters of students for helping in analyzing student s performance and also improvising the subject teaching in that particular subject.
Over half a century old and showing no signs of aging, k-means remains one of the most popular data processing algorithms. As is well-known, a proper initialization of k-means is crucial for obtaining a good final solution. The recently proposed k-means++ initialization algorithm achieves this, obtaining an initial set of centers that is provably close to the optimum solution. A major downside of the k-means++ is its inherent sequential nature, which limits its applicability to massive data: one must make k passes over the data to find a good initial set of centers. In this work we show how to drastically reduce the number of passes needed to obtain, in parallel, a good initialization. This is unlike prevailing efforts on parallelizing k-means that have mostly focused on the post-initialization phases of k-means. We prove that our proposed initialization algorithm k-means|| obtains a nearly optimal solution after a logarithmic number of passes, and then show that in practice a constant number of passes suffices. Experimental evaluation on real-world large-scale data demonstrates that k-means|| outperforms k-means++ in both sequential and parallel settings.
In recent years, there has been a substantial amount of work on large-scale data analytics using Hadoop-based platforms running on large clusters of commodity machines. A less-explored topic is how those data, dominated by application logs, are collected and structured to begin with. In this paper, we present Twitter s production logging infrastructure and its evolution from application-specific logging to a unified \"client events\" log format, where messages are captured in common, well-formatted, flexible Thrift messages. Since most analytics tasks consider the user session as the basic unit of analysis, we pre-materialize \"session sequences\", which are compact summaries that can answer a large class of common queries quickly. The development of this infrastructure has streamlined log collection and data analysis, thereby improving our ability to rapidly experiment and iterate on various aspects of the service.
As data-driven methods are becoming pervasive in a wide variety of disciplines, there is an urgent need to develop scalable and sustainable tools to simplify the process of data science, to make it easier to keep track of the analyses being performed and datasets being generated, and to enable introspection of the workflows. In this paper, we describe our vision of a unified provenance and metadata management system to support lifecycle management of complex collaborative data science workflows. We argue that a large amount of information about the analysis processes and data artifacts can, and should be, captured in a semi-passive manner; and we show that querying and analyzing this information can not only simplify bookkeeping and debugging tasks for data analysts but can also enable a rich new set of capabilities like identifying flaws in the data science process itself. It can also significantly reduce the time spent in fixing post-deployment problems through automated analysis and monitoring. We have implemented an initial prototype of our system, called ProvDB, on top of git (a version control system) and Neo4j (a graph database), and we describe its key features and capabilities.
AsterixDB is a new, full-function BDMS (Big Data Management System) with a feature set that distinguishes it from other platforms in today s open source Big Data ecosystem. Its features make it well-suited to applications like web data warehousing, social data storage and analysis, and other use cases related to Big Data. AsterixDB has a flexible NoSQL style data model; a query language that supports a wide range of queries; a scalable runtime; partitioned, LSM-based data storage and indexing (including B+-tree, R-tree, and text indexes); support for external as well as natively stored data; a rich set of built-in types; support for fuzzy, spatial, and temporal types and queries; a built-in notion of data feeds for ingestion of data; and transaction support akin to that of a NoSQL store. Development of AsterixDB began in 2009 and led to a mid-2013 initial open source release. This paper is the first complete description of the resulting open source AsterixDB system. Covered herein are the system s data model, its query language, and its software architecture. Also included are a summary of the current status of the project and a first glimpse into how AsterixDB performs when compared to alternative technologies, including a parallel relational DBMS, a popular NoSQL store, and a popular Hadoop-based SQL data analytics platform, for things that both technologies can do. Also included is a brief description of some initial trials that the system has undergone and the lessons learned (and plans laid) based on those early \"customer\" engagements.
In this paper, we present a generalization of the relational data model based on paraconsistent intuitionistic fuzzy sets. Our data model is capable of manipulating incomplete as well as inconsistent information. Fuzzy relation or intuitionistic fuzzy relation can only handle incomplete information. Associated with each relation are two membership functions one is called truth-membership function $T$ which keeps track of the extent to which we believe the tuple is in the relation, another is called false-membership function which keeps track of the extent to which we believe that it is not in the relation. A paraconsistent intuitionistic fuzzy relation is inconsistent if there exists one tuple $a$ such that $T(a) + F(a) > 1$. In order to handle inconsistent situation, we propose an operator called split to transform inconsistent paraconsistent intuitionistic fuzzy relations into pseudo-consistent paraconsistent intuitionistic fuzzy relations and do the set-theoretic and relation-theoretic operations on them and finally use another operator called combine to transform the result back to paraconsistent intuitionistic fuzzy relation. For this model, we define algebraic operators that are generalisations of the usual operators such as union, selection, join on fuzzy relations. Our data model can underlie any database and knowledge-base management system that deals with incomplete and inconsistent information.
Bounded Derivation Depth property (BDD) and Finite Controllability (FC) are two properties of sets of datalog rules and tuple generating dependencies (known as Datalog +/- programs), which recently attracted some attention. We conjecture that the first of these properties implies the second, and support this conjecture by some evidence proving, among other results, that it holds true for all theories over binary signature.
Influence maximization is the problem of finding a set of users in a social network, such that by targeting this set, one maximizes the expected spread of influence in the network. Most of the literature on this topic has focused exclusively on the social graph, overlooking historical data, i.e., traces of past action propagations. In this paper, we study influence maximization from a novel data-based perspective. In particular, we introduce a new model, which we call credit distribution, that directly leverages available propagation traces to learn how influence flows in the network and uses this to estimate expected influence spread. Our approach also learns the different levels of influenceability of users, and it is time-aware in the sense that it takes the temporal nature of influence into account. We show that influence maximization under the credit distribution model is NP-hard and that the function that defines expected spread under our model is submodular. Based on these, we develop an approximation algorithm for solving the influence maximization problem that at once enjoys high accuracy compared to the standard approach, while being several orders of magnitude faster and more scalable.
Many studies have been conducted on seeking the efficient solution for subgraph similarity search over certain (deterministic) graphs due to its wide application in many fields, including bioinformatics, social network analysis, and Resource Description Framework (RDF) data management. All these works assume that the underlying data are certain. However, in reality, graphs are often noisy and uncertain due to various factors, such as errors in data extraction, inconsistencies in data integration, and privacy preserving purposes. Therefore, in this paper, we study subgraph similarity search on large probabilistic graph databases. Different from previous works assuming that edges in an uncertain graph are independent of each other, we study the uncertain graphs where edges  occurrences are correlated. We formally prove that subgraph similarity search over probabilistic graphs is #P-complete, thus, we employ a filter-and-verify framework to speed up the search. In the filtering phase,we develop tight lower and upper bounds of subgraph similarity probability based on a probabilistic matrix index, PMI. PMI is composed of discriminative subgraph features associated with tight lower and upper bounds of subgraph isomorphism probability. Based on PMI, we can sort out a large number of probabilistic graphs and maximize the pruning capability. During the verification phase, we develop an efficient sampling algorithm to validate the remaining candidates. The efficiency of our proposed solutions has been verified through extensive experiments.
Many systems for big data analytics employ a data flow abstraction to define parallel data processing tasks. In this setting, custom operations expressed as user-defined functions are very common. We address the problem of performing data flow optimization at this level of abstraction, where the semantics of operators are not known. Traditionally, query optimization is applied to queries with known algebraic semantics. In this work, we find that a handful of properties, rather than a full algebraic specification, suffice to establish reordering conditions for data processing operators. We show that these properties can be accurately estimated for black box operators by statically analyzing the general-purpose code of their user-defined functions. We design and implement an optimizer for parallel data flows that does not assume knowledge of semantics or algebraic properties of operators. Our evaluation confirms that the optimizer can apply common rewritings such as selection reordering, bushy join-order enumeration, and limited forms of aggregation push-down, hence yielding similar rewriting power as modern relational DBMS optimizers. Moreover, it can optimize the operator order of non-relational data flows, a unique feature among today s systems.
The Web has become a large-scale real-time information system forcing us to revise both how to effectively assess relevance of information for a user and how to efficiently implement information retrieval and dissemination functionality. To increase information relevance, Real-time Web applications such as Twitter and Facebook, extend content and social-graph relevance scores with \"real-time\" user generated events (e.g. re-tweets, replies, likes). To accommodate high arrival rates of information items and user events we explore a publish/subscribe paradigm in which we index queries and update on the fly their results each time a new item and relevant events arrive. In this setting, we need to process continuous top-k text queries combining both static and dynamic scores. To the best of our knowledge, this is the first work addressing how non-predictable, dynamic scores can be handled in a continuous top-k query setting.
In recent years, there has been much research in Ranked Retrieval model in structured databases, especially those in web databases. With this model, a search query returns top-k tuples according to not just exact matches of selection conditions, but a suitable ranking function. This paper studies a novel problem on the privacy implications of database ranking. The motivation is a novel yet serious privacy leakage we found on real-world web databases which is caused by the ranking function design. Many such databases feature private attributes - e.g., a social network allows users to specify certain attributes as only visible to him/herself, but not to others. While these websites generally respect the privacy settings by not directly displaying private attribute values in search query answers, many of them nevertheless take into account such private attributes in the ranking function design. The conventional belief might be that tuple ranks alone are not enough to reveal the private attribute values. Our investigation, however, shows that this is not the case in reality. To address the problem, we introduce a taxonomy of the problem space with two dimensions, (1) the type of query interface and (2) the capability of adversaries. For each subspace, we develop a novel technique which either guarantees the successful inference of private attributes, or does so for a significant portion of real-world tuples. We demonstrate the effectiveness and efficiency of our techniques through theoretical analysis, extensive experiments over real-world datasets, as well as successful online attacks over websites with tens to hundreds of millions of users - e.g., Amazon Goodreads and Renren.com.
Forms are our gates to the web. They enable us to access the deep content of web sites. Automatic form understanding provides applications, ranging from crawlers over meta-search engines to service integrators, with a key to this content. Yet, it has received little attention other than as component in specific applications such as crawlers or meta-search engines. No comprehensive approach to form understanding exists, let alone one that produces rich models for semantic services or integration with linked open data. In this paper, we present OPAL, the first comprehensive approach to form understanding and integration. We identify form labeling and form interpretation as the two main tasks involved in form understanding. On both problems OPAL pushes the state of the art: For form labeling, it combines features from the text, structure, and visual rendering of a web page. In extensive experiments on the ICQ and TEL-8 benchmarks and a set of 200 modern web forms OPAL outperforms previous approaches for form labeling by a significant margin. For form interpretation, OPAL uses a schema (or ontology) of forms in a given domain. Thanks to this domain schema, it is able to produce nearly perfect (more than 97 percent accuracy in the evaluation domains) form interpretations. Yet, the effort to produce a domain schema is very low, as we provide a Datalog-based template language that eases the specification of such schemata and a methodology for deriving a domain schema largely automatically from an existing domain ontology. We demonstrate the value of the form interpretations in OPAL through a light-weight form integration system that successfully translates and distributes master queries to hundreds of forms with no error, yet is implemented with only a handful translation rules.
Core decomposition is a fundamental graph problem with a large number of applications. Most existing approaches for core decomposition assume that the graph is kept in memory of a machine. Nevertheless, many real-world graphs are big and may not reside in memory. In the literature, there is only one work for I/O efficient core decomposition that avoids loading the whole graph in memory. However, this approach is not scalable to handle big graphs because it cannot bound the memory size and may load most parts of the graph in memory. In addition, this approach can hardly handle graph updates. In this paper, we study I/O efficient core decomposition following a semi-external model, which only allows node information to be loaded in memory. This model works well in many web-scale graphs. We propose a semi-external algorithm and two optimized algorithms for I/O efficient core decomposition using very simple structures and data access model. To handle dynamic graph updates, we show that our algorithm can be naturally extended to handle edge deletion. We also propose an I/O efficient core maintenance algorithm to handle edge insertion, and an improved algorithm to further reduce I/O and CPU cost by investigating some new graph properties. We conduct extensive experiments on 12 real large graphs. Our optimal algorithm significantly outperform the existing I/O efficient algorithm in terms of both processing time and memory consumption. In many memory-resident graphs, our algorithms for both core decomposition and maintenance can even outperform the in-memory algorithm due to the simple structures and data access model used. Our algorithms are very scalable to handle web-scale graphs. As an example, we are the first to handle a web graph with 978.5 million nodes and 42.6 billion edges using less than 4.2 GB memory.
Data management systems have traditionally been designed to support either long-running analytics queries or short-lived transactions, but an increasing number of applications need both. For example, online games, socio-mobile apps, and e-commerce sites need to not only maintain operational state, but also analyze that data quickly to make predictions and recommendations that improve user experience. In this paper, we present Minuet, a distributed, main-memory B-tree that supports both transactions and copy-on-write snapshots for in-situ analytics. Minuet uses main-memory storage to enable low-latency transactional operations as well as analytics queries without compromising transaction performance. In addition to supporting read-only analytics queries on snapshots, Minuet supports writable clones, so that users can create branching versions of the data. This feature can be quite useful, e.g. to support complex \"what-if\" analysis or to facilitate wide-area replication. Our experiments show that Minuet outperforms a commercial main-memory database in many ways. It scales to hundreds of cores and TBs of memory, and can process hundreds of thousands of B-tree operations per second while executing long-running scans.
Many data management applications, such as setting up Web portals, managing enterprise data, managing community data, and sharing scientific data, require integrating data from multiple sources. Each of these sources provides a set of values and different sources can often provide conflicting values. To present quality data to users, it is critical to resolve conflicts and discover values that reflect the real world; this task is called {\\em data fusion}. This paper describes a novel approach that finds true values from conflicting information when there are a large number of sources, among which some may copy from others. We present a case study on real-world data showing that the described algorithm can significantly improve accuracy of truth discovery and is scalable when there are a large number of data sources.
We define XPathLog as a Datalog-style extension of XPath. XPathLog provides a clear, declarative language for querying and manipulating XML whose perspectives are especially in XML data integration. In our characterization, the formal semantics is defined wrt. an edge-labeled graph-based model which covers the XML data model. We give a complete, logic-based characterization of XML data and the main language concept for XML, XPath. XPath-Logic extends the XPath language with variable bindings and embeds it into first-order logic. XPathLog is then the Horn fragment of XPath-Logic, providing a Datalog-style, rule-based language for querying and manipulating XML data. The model-theoretic semantics of XPath-Logic serves as the base of XPathLog as a logic-programming language, whereas also an equivalent answer-set semantics for evaluating XPathLog queries is given. In contrast to other approaches, the XPath syntax and semantics is also used for a declarative specification how the database should be updated: when used in rule heads, XPath filters are interpreted as specifications of elements and properties which should be added to the database.
Wireless sensor networks become integral part of our life. These networks can be used for monitoring the data in various domain due to their flexibility and functionality. Query processing and optimization in the WSN is a very challenging task because of their energy and memory constraint. In this paper, first our focus is to review the different approaches that have significant impacts on the development of query processing techniques for WSN. Finally, we aim to illustrate the existing approach in popular query processing engines with future research challenges in query optimization.
Recommender systems based on latent factor models have been effectively used for understanding user interests and predicting future actions. Such models work by projecting the users and items into a smaller dimensional space, thereby clustering similar users and items together and subsequently compute similarity between unknown user-item pairs. When user-item interactions are sparse (sparsity problem) or when new items continuously appear (cold start problem), these models perform poorly. In this paper, we exploit the combination of taxonomies and latent factor models to mitigate these issues and improve recommendation accuracy. We observe that taxonomies provide structure similar to that of a latent factor model: namely, it imposes human-labeled categories (clusters) over items. This leads to our proposed taxonomy-aware latent factor model (TF) which combines taxonomies and latent factors using additive models. We develop efficient algorithms to train the TF models, which scales to large number of users/items and develop scalable inference/recommendation algorithms by exploiting the structure of the taxonomy. In addition, we extend the TF model to account for the temporal dynamics of user interests using high-order Markov chains. To deal with large-scale data, we develop a parallel multi-core implementation of our TF model. We empirically evaluate the TF model for the task of predicting user purchases using a real-world shopping dataset spanning more than a million users and products. Our experiments demonstrate the benefits of using our TF models over existing approaches, in terms of both prediction accuracy and running time.
In the last two decades, the continuous increase of computational power has produced an overwhelming flow of data which has called for a paradigm shift in the computing architecture and large scale data processing mechanisms. MapReduce is a simple and powerful programming model that enables easy development of scalable parallel applications to process vast amounts of data on large clusters of commodity machines. It isolates the application from the details of running a distributed program such as issues on data distribution, scheduling and fault tolerance. However, the original implementation of the MapReduce framework had some limitations that have been tackled by many research efforts in several followup works after its introduction. This article provides a comprehensive survey for a family of approaches and mechanisms of large scale data processing mechanisms that have been implemented based on the original idea of the MapReduce framework and are currently gaining a lot of momentum in both research and industrial communities. We also cover a set of introduced systems that have been implemented to provide declarative programming interfaces on top of the MapReduce framework. In addition, we review several large scale data processing systems that resemble some of the ideas of the MapReduce framework for different purposes and application scenarios. Finally, we discuss some of the future research directions for implementing the next generation of MapReduce-like solutions.
Apriori Algorithm is one of the most important algorithm which is used to extract frequent itemsets from large database and get the association rule for discovering the knowledge. It basically requires two important things: minimum support and minimum confidence. First, we check whether the items are greater than or equal to the minimum support and we find the frequent itemsets respectively. Secondly, the minimum confidence constraint is used to form association rules. Based on this algorithm, this paper indicates the limitation of the original Apriori algorithm of wasting time and space for scanning the whole database searching on the frequent itemsets, and present an improvement on Apriori.
Many applications log a large amount of events continuously. Extracting interesting knowledge from logged events is an emerging active research area in data mining. In this context, we propose an approach for mining frequent events and association rules from logged events in XML format. This approach is composed of two-main phases: I) constructing a novel tree structure called Frequency XML-based Tree (FXT), which contains the frequency of events to be mined; II) querying the constructed FXT using XQuery to discover frequent itemsets and association rules. The FXT is constructed with a single-pass over logged data. We implement the proposed algorithm and study various performance issues. The performance study shows that the algorithm is efficient, for both constructing the FXT and discovering association rules.
XML data projection (or pruning) is a natural optimization for main memory query engines: given a query Q over a document D, the subtrees of D that are not necessary to evaluate Q are pruned, thus producing a smaller document D ; the query Q is then executed on D , hence avoiding to allocate and process nodes that will never be reached by Q. In this article, we propose a new approach, based on types, that greatly improves current solutions. Besides providing comparable or greater precision and far lesser pruning overhead, our solution ---unlike current approaches--- takes into account backward axes, predicates, and can be applied to multiple queries rather than just to single ones. A side contribution is a new type system for XPath able to handle backward axes. The soundness of our approach is formally proved. Furthermore, we prove that the approach is also complete (i.e., yields the best possible type-driven pruning) for a relevant class of queries and Schemas. We further validate our approach using the XMark and XPathMark benchmarks and show that pruning not only improves the main memory query engine s performances (as expected) but also those of state of the art native XML databases.
Graph simulation (using graph schemata or data guides) has been successfully proposed as a technique for adding structure to semistructured data. Design patterns for description (such as meta-classes and homomorphisms between schema layers), which are prominent in the object-oriented programming community, constitute a generalization of this graph simulation approach. In this paper, we show description applicable to a wide range of data models that have some notion of object (-identity), and propose to turn it into a data model primitive much like, say, inheritance. We argue that such an extension fills a practical need in contemporary data management. Then, we present algebraic techniques for query optimization (using the notions of described and description queries). Finally, in the semistructured setting, we discuss the pruning of regular path queries (with nested conditions) using description meta-data. In this context, our notion of meta-data extends graph schemata and data guides by meta-level values, allowing to boost query performance and to reduce the redundancy of data.
Advances in technology and computing hardware are enabling scientists from all areas of science to produce massive amounts of data using large-scale simulations or observational facilities. In this era of data deluge, effective coordination between the data production and the analysis phases hinges on the availability of metadata that describe the scientific datasets. Existing workflow engines have been capturing a limited form of metadata to provide provenance information about the identity and lineage of the data. However, much of the data produced by simulations, experiments, and analyses still need to be annotated manually in an ad hoc manner by domain scientists. Systematic and transparent acquisition of rich metadata becomes a crucial prerequisite to sustain and accelerate the pace of scientific innovation. Yet, ubiquitous and domain-agnostic metadata management infrastructure that can meet the demands of extreme-scale science is notable by its absence. To address this gap in scientific data management research and practice, we present our vision for an integrated approach that (1) automatically captures and manipulates information-rich metadata while the data is being produced or analyzed and (2) stores metadata within each dataset to permeate metadata-oblivious processes and to query metadata through established and standardized data access interfaces. We motivate the need for the proposed integrated approach using applications from plasma physics, climate modeling and neuroscience, and then discuss research challenges and possible solutions.
With the development of decision systems and specially data warehouses, the visibility of the data warehouse design before its creation has become essential, and that because of data warehouse importance as considered as the unique data source giving meaning to the decision. In a decision system the proper functioning of a data warehouse resides in the smooth running of the middleware tools ETC step one hand, and the restitution step through the data mining, reporting solutions, dashboards... etc other. The large volume of data that passes through these stages require an optimal design for a highly efficient decision system, without disregarding the choice of technologies that are introduced for the data warehouse implementation such as: database management system, the type of server operating systems, physical server architecture (64-bit, for example) that can be a benefit performance of this system. The designer of the data warehouse should consider the effectiveness of data query, this depends on the selection of relevant indexes and their combination with the materialized views, note that the index selection is a NPcomplete problem, because the number of indexes is exponential in the total number of attributes in the database, So, it is necessary to provide, while the data warehouse design, the suitable type of index for this data warehouse. This paper presents a comparative study between the index B-tree type and type Bitmap, their advantages and disadvantages, with a real experiment showing that its index of type Bitmap more advantageous than the index B-tree type.
The paper \"Stack-based Algorithms for Pattern Matching on DAGs\" generalizes the classical holistic twig join algorithms and proposes PathStackD, TwigStackD and DagStackD to respectively evaluate path, twig and DAG pattern queries on directed acyclic graphs. In this paper, we investigate the major results of that paper, pointing out several discrepancies and proposing solutions to resolving them. We show that the original algorithms do not find particular types of query solutions that are common in practice. We also analyze the effect of an underlying assumption on the correctness of the algorithms and discuss the pre-filtering process that the original work proposes to prune redundant nodes. Our experimental study on both real and synthetic data substantiates our conclusions.
There are two main approximations of mining big data in memory. One is to partition a big dataset to several subsets, so as to mine each subset in memory. By this way, global patterns can be obtained by synthesizing all local patterns discovered from these subsets. Another is the statistical sampling method. This indicates that data partitioning should be an important strategy for mining big data. This paper recalls our work on mining big data with a data partitioning and shows some interesting findings among the local patterns discovered from subsets of a dataset.
We identify two unreasonable, though standard, assumptions made by database query optimizers that can adversely affect the quality of the chosen evaluation plans. One assumption is that it is enough to optimize for the expected case---that is, the case where various parameters (like available memory) take on their expected value. The other assumption is that the parameters are constant throughout the execution of the query. We present an algorithm based on the ``System R  -style query optimization algorithm that does not rely on these assumptions. The algorithm we present chooses the plan of the least expected cost instead of the plan of least cost given some fixed value of the parameters. In execution environments that exhibit a high degree of variability, our techniques should result in better performance.
We investigate parameterizations of both database instances and queries that make query evaluation fixed-parameter tractable in combined complexity. We introduce a new Datalog fragment with stratified negation, intensional-clique-guarded Datalog (ICG-Datalog), with linear-time evaluation on structures of bounded treewidth for programs of bounded rule size. Such programs capture in particular conjunctive queries with simplicial decompositions of bounded width, guarded negation fragment queries of bounded CQ-rank, or two-way regular path queries. Our result proceeds via compilation to alternating two-way automata, whose semantics is defined via cyclic provenance circuits (cycluits) that can be tractably evaluated. Last, we prove that probabilistic query evaluation remains intractable in combined complexity under this parameterization.
We study in this paper provenance information for queries with aggregation. Provenance information was studied in the context of various query languages that do not allow for aggregation, and recent work has suggested to capture provenance by annotating the different database tuples with elements of a commutative semiring and propagating the annotations through query evaluation. We show that aggregate queries pose novel challenges rendering this approach inapplicable. Consequently, we propose a new approach, where we annotate with provenance information not just tuples but also the individual values within tuples, using provenance to describe the values computation. We realize this approach in a concrete construction, first for \"simple\" queries where the aggregation operator is the last one applied, and then for arbitrary (positive) relational algebra queries with aggregation; the latter queries are shown to be more challenging in this context. Finally, we use aggregation to encode queries with difference, and study the semantics obtained for such queries on provenance annotated databases.
The transformations, analyses and interpretations of data in scientific workflows are vital for the repeatability and reliability of scientific workflows. This provenance of scientific workflows has been effectively carried out in Grid based scientific workflow systems. However, recent adoption of Cloud-based scientific workflows present an opportunity to investigate the suitability of existing approaches or propose new approaches to collect provenance information from the Cloud and to utilize it for workflow repeatability in the Cloud infrastructure. The dynamic nature of the Cloud in comparison to the Grid makes it difficult because resources are provisioned on-demand unlike the Grid. This paper presents a novel approach that can assist in mitigating this challenge. This approach can collect Cloud infrastructure information along with workflow provenance and can establish a mapping between them. This mapping is later used to re-provision resources on the Cloud. The repeatability of the workflow execution is performed by: (a) capturing the Cloud infrastructure information (virtual machine configuration) along with the workflow provenance, and (b) re-provisioning the similar resources on the Cloud and re-executing the workflow on them. The evaluation of an initial prototype suggests that the proposed approach is feasible and can be investigated further.
Relational databases are wildly adopted in RDF (Resource Description Framework) data management. For efficient SPARQL query evaluation, the legacy query optimizer needs reconsiderations. One vital problem is how to tackle the suboptimal query plan caused by error-prone cardinality estimation. Consider the schema-free nature of RDF data and the Join-intensive characteristic of SPARQL query, determine an optimal execution order before the query actually evaluated is costly or even infeasible, especially for complex queries on large-scale data. In this paper, we propose ROSIE, a Runtime Optimization framework that iteratively re-optimize SPARQL query plan according to the actual cardinality derived from Incremental partial query Evaluation. By introducing an approach for heuristic-based plan generation, as well as a mechanism to detect cardinality estimation error at runtime, ROSIE relieves the problem of biased cardinality propagation in an efficient way, and thus is more resilient to complex query evaluation. Extensive experiments on real and benchmark data show that compared to the state-of-the-arts, ROSIE consistently outperformed on complex queries by orders of magnitude.
In this paper, we propose an efficient clustering technique to solve the problem of clustering in the presence of obstacles. The proposed algorithm divides the spatial area into rectangular cells. Each cell is associated with statistical information that enables us to label the cell as dense or non-dense. We also label each cell as obstructed (i.e. intersects any obstacle) or non-obstructed. Then the algorithm finds the regions (clusters) of connected, dense, non-obstructed cells. Finally, the algorithm finds a center for each such region and returns those centers as centers of the relatively dense regions (clusters) in the spatial area.
