All amazon affiliates are welcome to post here with dictionaries of advertising products to advertise 1 product at a time per post.
And then link that in for self posts elsewhere.
We want to introduce a construction of spherical designs from finite graphs
with the theory of crystal lattice. We start from a finite graph,...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:47 p.m.
In this paper we consider Type 1 Gray maps and Type 2 Gray maps for groups of
order 16. First, we confirm that we can construct Type 1 Gray m...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:50 p.m.
We introduce an exactly solvable model for trapped three-color atom gases.
Applications to a cigar-shaped trapped cold fermions reveal a comp...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:36 p.m.
We consider correlation functions for string theory on AdS_3. We analyze
their singularities and we provide a physical interpretation for the...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:46 p.m.
We define and prove some properties of the semi-classical wavefront set. We
also define and study semi-classical Fourier integral operators, ...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:52 p.m.
We address the problem of action detection in videos. Driven by the latest
progress in object detection from 2D images, we build action model...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:50 p.m.
The presence of non-Abelian discrete gauge symmetries in four-dimensional
F-theory compactifications is investigated. Such symmetries are sho...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:26 p.m.
Connection between an intrinsic breach of symmetry of equilibrium motion and
violation of the second law is accentuated. An intrinsic breach ...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:35 p.m.
When perturbation or unexpected events do occur, agents need protocols for
repairing or reforming the supply chain. Unfortunate contingency c...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:43 p.m.
We study the real algebraic variety of real symmetric matrices with
eigenvalue multiplicities determined by a partition. We present formulas ...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:46 p.m.
We have recently started to investigate 2D arrays of confocal lens pairs.
Miniaturization of the lens pairs can make the array behave ray-opt...
Words:
Votes:
Views: 0
Latest: Nov. 10, 2020, 6:25 a.m.
We present several numerical results on granular mixtures. In particular, we
examine the efficiency of diffusion as a mixing mechanism in the...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:49 p.m.
We study the dynamics of meromorphic maps for a compact Kaehler manifold X.
More precisely, we give a simple criterion that allows us to prod...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:49 p.m.
We follow up on our previous work [C. Le Bris, F. Legoll and A. Lozinski,
Chinese Annals of Mathematics 2013] where we have studied a multisc...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:50 p.m.
Predictive models for music are studied by researchers of algorithmic
composition, the cognitive sciences and machine learning. They serve as...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:13 p.m.
Quantum mechanics represents one of the greatest triumphs of human intellect
and, undoubtedly, is the most successful physical theory we have...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:22 p.m.
Following a remark of Lawvere, we explicitly exhibit a particularly
elementary bijection between the set T of finite binary trees and the set...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:32 p.m.
Data security and personal privacy are difficult to maintain in the Internet
age. In 2012, professional networking site LinkedIn suffered a b...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:35 p.m.
The domestic environment is a key area for the design and deployment of
autonomous systems. Yet research indicates their adoption is already ...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:40 p.m.
When configuring customizable software, it is useful to provide interactive
tool-support that ensures that the configuration does not breach ...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:43 p.m.
In statistical process control, procedures are applied that require
relatively strict conditions for their use. If such assumptions are viola...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:44 p.m.
In this paper we start a classification of certain global integrals. First,
we use the language of unipotent orbits to write down a family of...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:46 p.m.
We survey some recent results in Ramsey theory. We indicate their connections
with topological dynamics. On the foundational side, we describ...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:47 p.m.
We introduce a framework for the description of a large class of
delay-differential algebraic systems, in which we study three core problems:...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:48 p.m.
In this paper, we address the problem of constructing a uniform probability
measure on $\mathbb{N}$. Of course, this is not possible within t...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:48 p.m.
We study the dynamics of the SK model modified by a small non-hamiltonian
perturbation. We study aging, and we find that on the time scales i...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:48 p.m.
In this paper we will study the ground states of the toy model of 2D closed
string tachyon effective action. We will firstly construct the cl...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:49 p.m.
For each sequence $\{c_n\}_n$ in $l_{1}(\N)$ we define an operator $A$ in the
hyperfinite $\mathrm{II}_1$-factor $\mathcal{R}$. We prove that...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:49 p.m.
For Banach left and right module actions, we extend some propositions from
Lau and $\ddot{U}lger$ into general situations and we establish th...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:50 p.m.
We consider how to index strings, trees and graphs for jumbled pattern
matching when we are asked to return a match if one exists. For exampl...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:50 p.m.
An obituary for Alexander Gordon which will appear in the Journal of Spectral
Theory
Words:
Votes:
Views: 0
Latest: Jan. 20, 2021, 9:35 p.m.
Fundamental frequency (f0) estimation from polyphonic music includes the
tasks of multiple-f0, melody, vocal, and bass line estimation. Histo...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:12 p.m.
A suite of discoveries in the last two decades demonstrate that we are now at
a point where incorporating magnetic behavior is key for advanc...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:17 p.m.
Data are often labeled by many different experts with each expert only
labeling a small fraction of the data and each data point being labele...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:20 p.m.
We present numerical solutions of the 2D relativistic hydrodynamics equations
describing the deceleration and expansion of highly relativisti...
Words:
Votes:
Views: 0
Latest: Nov. 10, 2020, 6:24 a.m.
We construct new topological theories related to sigma models whose target
space is a seven dimensional manifold of G_2 holonomy. We define a...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:32 p.m.
All leptons, quarks, and gauge bosons can be placed in the periodic table of
elementary particles. As the periodic table of elements derived ...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:34 p.m.
Medical training devices are becoming increasingly dependent on technology,
creating opportunities that are inherently conducive to security ...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:34 p.m.
Most software factories contain applications with sensitive information that
needs to be protected against breaches of confidentiality and in...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:37 p.m.
Password leaks have been frequently reported in recent years, with big
companies like Sony, Amazon, LinkedIn, and Walmart falling victim to b...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:40 p.m.
Overfitting and treatment of "small data" are among the most challenging
problems in the machine learning (ML), when a relatively s...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:42 p.m.
We discuss on the pairing mechanism of fermions with mismatch in their fermi
momenta due to a mass asymmetry. Using a variational ansatz for ...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:43 p.m.
In network management, when it comes to security breaches, human error
constitutes a dominant factor. We present our tool topoS which automat...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:44 p.m.
Motivated by problems in behavioural finance, we provide two explicit
constructions of a randomized stopping time which embeds a given center...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:44 p.m.
Cloud-based and network-based technology has witnessed an exponential rise in
development. Adaptation of these latest technologies has opened...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:45 p.m.
Malicious softwares or malwares for short have become a major security
threat. While originating in criminal behavior, their impact are also
...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:46 p.m.
In this paper, we define the reoptimization variant of the closest substring
problem (CSP) under sequence addition. We show that, even with t...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:47 p.m.
We consider the problem of reconstructing binary images from their horizontal
and vertical projections. For any reconstruction we define the ...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:47 p.m.
This is perhaps a philosophical question rather than a mathematical one, we
do not expect to give a full answer, even though we hope to clari...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:48 p.m.
We define a relation < for dual operator algebras. We say that B < A if there
exists a projection p in A such that B and pAp are Morita...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:48 p.m.
We study anisotropic heterogeneous nonlinear integral equations arising in
epidemiology. We focus on the case where the heterogeneities have ...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:48 p.m.
In this thesis we consider a way to construct a rich family of compact
Riemann Surfaces in a combinatorial way. Given a 3-regualr graph with
...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:48 p.m.
We modify the propagation for the quarks and gluons, with that we have finite
results, without ultra violet divergence in perturbed interacti...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:48 p.m.
We present 450 and 850 um maps of R Coronae Australis. We compare the maps to
previous surveys of the region, and shed new light on the previ...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:48 p.m.
An informal guide to the history of Heisenberg's matrix mechanics. It is
designed for mathematicians with only a minimal background in ei...
Words:
Votes:
Views: 0
Latest: Nov. 10, 2020, 2:40 p.m.
In this paper we studied generalization of Hermitian function field proposed
by A.Garcia and H.Stichtenoth. We calculated a Weierstrass semig...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:49 p.m.
In this thesis time-dependent configurations are studied in the formalism of
first-quantized string. These configurations are exact: solution...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:49 p.m.
In this paper we study actions of reductive groups on affine spaces. We prove
that there is a fan structure on the space of characters of the...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:49 p.m.
For a field $F$ and an integer $d\geq 1$, we consider the universal
associative $F$-algebra $A$ generated by two sets of $d+1$ mutually ortho...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:49 p.m.
We introduce a class of coded systems that we construct from sofic systems
and Dyck shifts and we study a class of subshifts that we obtain b...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:50 p.m.
We show that the generating functions of Gromov--Witten invariants with
ancestors are invariant under a simple flop, for all genera, after an...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 5:01 p.m.
In this paper, we introduce the notion of bigraft algebra, generalizing the
notions of left and right graft algebras. We give a combinatorial...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:50 p.m.
In a present note we give a new proof of Etingof-Kazhdan quantization
theorem.
Words:
Votes:
Views: 0
Latest: Jan. 20, 2021, 9:45 p.m.
This paper has been withdrawn by the author(s), due a crucial i-number error
in Eqn. 18.
Words:
Votes:
Views: 0
Latest: Jan. 20, 2021, 5:15 p.m.
The status of event generators for SUSY processes at future Linear Colliders
is briefly reviewed.
Words:
Votes:
Views: 0
Latest: Jan. 21, 2021, 1:32 a.m.
We solve the longstanding problem of smoothing a stadium billiard. Besides
our results demonstrate why there were no clear conjectures how mu...
Words:
Votes:
Views: 0
Latest: Nov. 19, 2020, 6:32 a.m.
For perfect fields $k$ satisfying $[\bar k:k]>2$, we construct new normal
subgroups of the plane Cremona group and provide an elementary p...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:15 p.m.
The $(kkk)$ double layered quantum Hall state has been shown to exhibit many
superfluid properties including the appearance of an alternating...
Words:
Votes:
Views: 0
Latest: Nov. 10, 2020, 6:24 a.m.
The calculation of expected spectral line strengths and profiles is a
powerful tool for the analysis of the solar atmosphere, and other stell...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:28 p.m.
Consider a configuration of pebbles distributed on the vertices of a
connected graph of order $n$. A pebbling step consists of removing two p...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:18 p.m.
Considering a bosonic ($1$-)form-valued $k$-form with a second-order
Lagrangian dynamics [depending on two arbitrary real constants] we first...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:28 p.m.
We prove a large deviation type estimate for the asymptotic behavior of a
weighted local time of $\varepsilon W$ as $\varepsilon\to0$.
Words:
Votes:
Views: 0
Latest: Nov. 19, 2020, 7:14 p.m.
In the middle of the third millennium BC the Sumerians must have noticed that
the reciprocal of the number 7,in contrast to the numbers 1,2,3...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:31 p.m.
We report the discovery of seven hitherto unknown L-dwarfs found as a result
of a spectroscopic search for distant AGB stars. Their far-red a...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:31 p.m.
Conventional wisdom in baseball circles holds that a seven-game playoff
series is fairer than a five-game series. In an earlier paper, E. Lee...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:32 p.m.
Geometrically non-Higgsable seven-branes carry gauge sectors that cannot be
broken by complex structure deformation, and there is growing evi...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:32 p.m.
In this short supplement to [1], we discuss the uplift of half-flat six-folds
to Spin(7) eight-folds by fibration of the former over a produc...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:34 p.m.
News about massive online breaches is increasingly common. But there has been
little good data on how exposed people are because of these bre...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:34 p.m.
Data anonymization is gaining much attention these days as it provides the
fundamental requirements to safely outsource datasets containing i...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:36 p.m.
We review experimental and theoretical work on current-driven switching of
magnetisation and present quantitative results for the Co/Cu/Co (0...
Words:
Votes:
Views: 0
Latest: Nov. 10, 2020, 2:40 p.m.
The manner in which Aircraft Communications, Addressing and Reporting System
(ACARS) is being used has significantly changed over time. Whils...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:37 p.m.
We are entering the era of ubiquitous genetic information for research,
clinical care, and personal curiosity. Sharing these datasets is vita...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:38 p.m.
Applying recent ideas of Carlet, Dubrovin and Zhang (to appear), who,
following a suggestion of Eguchi and Yang (hep-th/9407134), study the l...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 5:01 p.m.
We consider various specializations of the non-twisted quantum affine
algebras at roots of unity. We define and study the q-characters of the...
Words:
Votes:
Views: 0
Latest: Nov. 10, 2020, 2:40 p.m.
To unravel the effect of likely interactions between the energetic ejections
of the galactic superluminal source GRS 1915+105 and its surroun...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:42 p.m.
Breached pairing solutions to the gap equation are obtained analytically in
for two and three quarks and for low and high temperatures. We co...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:42 p.m.
Internet-connected devices are increasingly present in our homes, and privacy
breaches, data thefts, and security threats are becoming common...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:43 p.m.
In 4D general relativity, the angular momentum of a black hole is limited by
the Kerr bound. We suggest that in string theory, this bound can...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:43 p.m.
Igniting cornstarch powder is a classic physics demonstration that showcases
the rapid conduction of heat for a material in which the surface...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:44 p.m.
The Semantic Web (SW) is a significant advancement in the field of Internet
technologies and an uncharted territory as far as security is con...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:44 p.m.
Polarizability theory and discrete dipole approximation in a rotating medium
rest-frame is developed and discussed. The analysis is based on ...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:44 p.m.
Software applications are subject to an increasing number of attacks,
resulting in data breaches and financial damage. Many solutions have be...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:44 p.m.
Leaked secrets, such as passwords and API keys, in codebases were responsible
for numerous security breaches. Existing heuristic techniques, ...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:45 p.m.
We study resolutions of singularities of orbit closures in quiver
representations. We consider certain resolutions of singularities which hav...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:48 p.m.
We define Dedekind sums attached to a totally real number field of class
number one. We prove that they satisfy some reciprocity law. Then we...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:52 p.m.
In this paper, we introduce a new way of constructing and decoding
multipermutation codes. Multipermutations are permutations of a multiset t...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:47 p.m.
We begin with a review of the notion of a braid group. We then discuss some
known solutions to decision problems in braid groups. We then mov...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:47 p.m.
With the rapid development of the multimedia,the secure of the multimedia is
get more concerned. as far as we know , Digital watermarking is ...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:47 p.m.
We define general Lie tori which generalize original Lie tori. We show that a
Naoi torus is a general Lie torus. We give examples and prove s...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:47 p.m.
We consider the estimation of hidden Markovian process by using information
geometry with respect to transition matrices. We consider the cas...
Words:
Votes:
Views: 0
Latest: Sept. 30, 2020, 3:51 p.m.