Next Page: 10000

          Diagnosing Heart Diseases with Deep Neural Networks      Cache   Translate Page      

The Second National Data Science Bowl, a data science competition where the goal was to automatically determine cardiac volumes from MRI scans, has just ended. We participated with a team of 4 members from Ghent University and finished 2nd!

The team kunsthart (artificial heart in English) consisted of Ira Korshunova, Jeroen Burms, Jonas Degrave, 3 PhD students, and professor Joni Dambre. It’s also a follow-up of last year’s team ≋ Deep Sea ≋, which finished in first place for the First National Data Science Bowl.

Overview

This blog post is going to be long, here is a clickable overview of different sections.

Introduction

The problem

The goal of this year’s Data Science Bowl was to estimate minimum (end-systolic) and maximum (end-diastolic) volumes of the left ventricle from a set of MRI-images taken over one heartbeat. These volumes are used by practitioners to compute an ejection fraction: fraction of outbound blood pumped from the heart with each heartbeat. This measurement can predict a wide range of cardiac problems. For a skilled cardiologist analysis of MRI scans can take up to 20 minutes, therefore, making this process automatic is obviously useful.

Unlike the previous Data Science Bowl, which had very clean and voluminous data set, this year’s competition required a lot more focus on dealing with inconsistencies in the way the very limited number of data points were gathered. As a result, most of our efforts went to trying out different ways to preprocess and combine the different data sources.

The data

The dataset consisted of over a thousand patients. For each patient, we were given a number of 30-frame MRI videos in the DICOM format, showing the heart during a single cardiac cycle (i.e. a single heartbeat). These videos were taken in different planes including the multiple short-axis views (SAX), a 2-chamber view (2Ch), and a 4-chamber view (4Ch). The SAX views, whose planes are perpendicular to the long axis of the left ventricle, form a series of slices that (ideally) cover the entire heart. The number of SAX slices ranged from 1 to 23. Typically, the region of interest (ROI) is only a small part of the entire image. Below you can find a few of SAX slices and Ch2, Ch4 views from one of the patients. Red circles on the SAX images indicate the ROI’s center (later we will explain how to find it), for Ch2 and Ch4 they specify the location of SAX slices projected on the corresponding view.

sax_5 sax_9 sax_10 sax_11 sax_12 sax_15
2Ch 4Ch

The DICOM files also contained a bunch of metadata. Some of the metadata fields, like PixelSpacing and ImageOrientationm were absolutely invaluable to us. The metadata also specified patient’s age and sex.

For each patient in the train set, two labels were provided: the systolic volume and the diastolic volume. From what we gathered (link), these were obtained by cardiologists by manually performing a segmentation on the SAX slices, and feeding these segmentations to a program that computes the minimal and maximal heart chamber volumes. The cardiologists didn’t use the 2Ch or 4Ch images to estimate the volumes, but for us they proved to be very useful.

Combining these multiple data sources can be difficult, however for us dealing with inconsistencies in the data was more challenging. Some examples: the 4Ch slice not being provided for some patients, one patient with less than 30 frames per MRI video, couple of patients with only a handful of SAX slices, patients with SAX slices taken in weird locations and orientations.

The evaluation

Given a patient’s data, we were asked to output a cumulative distribution function over the volume, ranging from 0 to 599 mL, for both systole and diastole. The models were scored by a Continuous Ranked Probability Score (CRPS) error metric, which computes the average squared distance between the predicted CDF and a Heaviside step function representing the real volume.

An additional interesting novelty of this competition was the two stage process. In the first stage, we were given a training set of 500 patients with a public test set of 200 patients. In the final week we were required to submit our model and afterwards the organizers released the test data of 440 patients and labels for 200 patients from the public test set. We think the goal was to compensate for the small dataset and prevent people from optimizing against the test set through visual inspection of every part of their algorithm. Hand-labeling in the first stage was allowed on the training dataset only, for the second stage it was also allowed for 200 validation patients.

The solution: traditional image processing, convnets, and dealing with outliers

In our solution, we combined traditional image processing approaches, which find the region of interest (ROI) in each slice, with convolutional neural networks, which perform the mapping from the extracted image patches to the predicted volumes. Given the very limited number of training samples, we tried combat overfitting by restricting our models to combine the different data sources in predefined ways, as opposed to having them learn how to do the aggregation. Unlike many other contestants, we performed no hand-labelling .

Pre-processing and data augmentation

The provided images have varying sizes and resolutions, and do not only show the heart, but the entire torso of the patient. Our preprocessing pipeline made the images ready to be fed to a convolutional network by going through the following steps:

  • applying a zoom factor such that all images have the same resolution in millimeters
  • finding the region of interest and extracting a patch centered around it
  • data augmentation
  • contrast normalization

To find the correct zooming factor, we made use of the PixelSpacing metadata field, which specifies the image resolution. Further we will explain our approach to ROI detection and data augmentation.

Detecting the Region Of Interest through image segmentation techniques

We used classical computer vision techniques to find the left ventricle in the SAX slices. For each patient, the center and width of the ROI were determined by combining the information of all the SAX slices provided. The figure below shows an example of the result.

ROI extraction steps
ROI extraction steps

First, as was suggested in the Fourier based tutorial, we exploit the fact that each slice sequence captures one heartbeat and use Fourier analyses to extract an image that captures the maximal activity at the corresponding heartbeat frequency (same figure, second image).

From these Fourier images, we then extracted the center of the left ventricle by combining the Hough circle transform with a custom kernel-based majority voting approach across all SAX slices. First, for each fourier image (resulting from a single sax slice), the highest scoring Hough circles for a range of radii were found, and from all of those, the highest scoring ones were retained. , and the range of radii are metaparameters that severely affect the robustness of the ROI detected and were optimised manually. The third image in the figure shows an example of the best circles for one slice.

Finally, a ‘likelihood surface’ (rightmost image in figure above) was obtained by combining the centers and scores of the selected circles for all slices. Each circle center was used as the center for a Gaussian kernel, which was scaled with the circle score, and all these kernels were added. The maximum across this surface was selected as the center of the ROI. The width and height of the bounding box of all circles with centers within a maximal distance (another hyperparameter) of the ROI center were used as bounds for the ROI or to create an ellipsoidal mask as shown in the figure.

Given these ROIs in the SAX slices, we were able to find the ROIs in the 2Ch and 4Ch slices by projecting the SAX ROI centers onto the 2Ch and 4Ch planes.

Data augmentation

As always when using convnets on a problem with few training examples, we used tons of data augmentation. Some special precautions were needed, since we had to preserve the surface area. In terms of affine transformations, this means that only skewing, rotation and translation was allowed. We also added zooming, but we had to correct our volume labels when doing so! This helped to make the distirbution of labels more diverse.

Another augmentation here came in the form of shifting the images over the time axis. While systole was often found in the beginning of a sequence, this was not always the case. Augmenting this, by rolling the image tensor over the time axis, made the resulting model more robust against this noise in the dataset, while providing even more augmentation of our data.

Data augmentation was applied during the training phase to increase the number of training examples. We also applied the augmentations during the testing phase, and averaged predictions across the augmented versions of the same data sample.

Network architectures

We used convolutional neural networks to learn a mapping from the extracted image patches to systolic and diastolic volumes. During the competition, we played around a lot with both minor and major architectural changes. Our base architecture for most of our models was based on VGG-16.

As we already mentioned, we trained different models which can deal with different kinds of patients. There are roughly four different kinds of models we trained: single slice models, patient models, 2Ch models and 4Ch models.

Single slice models

Single slice models are models that take a single SAX slice as an input, and try to predict the systolic and diastolic volumes directly from it. The 30 frames were fed to the network as 30 different input channels. The systolic and diastolic networks shared the convolutional layers, but the dense layers were separated. The output of the network could be either a 600-way softmax (followed by a cumulative sum), or the mean and standard deviation of a Gaussian (followed by a layer computing the cdf of the Gaussian).

Although these models obviously have too little information to make a decent volume estimation, they benefitted hugely from test-time augmentation (TTA). During TTA, the model gets slices with different augmentations, and the outputs are averaged across augmenations and slices for each patient. Although this way of aggregating over SAX slices is suboptimal, it proved to be very robust to the relative positioning of the SAX slices, and is as such applicable to all patients.

Our single best single slice model achieved a local validation score of 0.0157 (after TTA), which was a reliable estimate for the public leaderboard score for these models. The approximate architecture of the slice models is shown on the following figure.

2Ch and 4Ch models

These models have a much more global view on the left ventricle of the heart than single SAX slice models. The 2Ch models also have the advantage of being applicable to every patient. Not every patient had a 4Ch slice. We used the same VGG-inspired architecture for these models. Individually, they achieved a similar validation score (0.0156) as was achieved by averaging over multiple sax slices. By ensembling only single slice, 2Ch and 4Ch models, we were able to achieve a score of 0.0131 on the public leaderboard.

Patient models

As opposed to single slice models, patient models try to make predictions based on the entire stack of (up to 25) SAX slices. In our first approaches to these models, we tried to process each slice separately using a VGG-like single slice network, followed by feeding the results to an overarching RNN in an ordered fashion. However, these models tended to overfit badly. Our solution to this problem consists of a clever way to merge predictions from multiple slices. Instead of having the network learn how to compute the volume based on the results of the individual slices, we designed a layer which combines the areas of consecutive cross-sections of the heart using a truncated cone approximation.

Basically, the slice models have to estimate the area (and standard deviation thereof) of the cross-section of the heart in a given slice . For each pair of consecutive slices and , we estimate the volume of the heart between them as , where is the distance between the slices. The total volume is then given by .

Ordering the SAX slices and finding the distance between them was achieved through looking at the SliceLocation metadata fields, but this field was not very reliable in finding the distance between slices, neither was the SliceThickness. We looked for the two slices that were furthest apart, drew a line between them, and projected every other slice onto this line. This way, we estimated the distance between two slices ourselves.

Our best single model achieved a local validation score of 0.0105 using this approach. This was no longer a good leaderboard estimation, since our local validation set contained relatively few outliers compared to the public leaderboard in the first round. The model had the following architecture:

Layer Type Size Output shape
Input layer   (8, 25, 30, 64, 64)*
Convolution 128 filters of 3x3 (8, 25, 128, 64, 64)
Convolution 128 filters of 3x3 (8, 25, 128, 64, 64)
Max pooling   (8, 25, 128, 32, 32)
Convolution 128 filters of 3x3 (8, 25, 128, 32, 32)
Convolution 128 filters of 3x3 (8, 25, 128, 32, 32)
Max pooling   (8, 25, 128, 16, 16)
Convolution 256 filters of 3x3 (8, 25, 256, 16, 16)
Convolution 256 filters of 3x3 (8, 25, 256, 16, 16)
Convolution 256 filters of 3x3 (8, 25, 256, 16, 16)
Max pooling   (8, 25, 256, 8, 8)
Convolution 512 filters of 3x3 (8, 25, 512, 8, 8)
Convolution 512 filters of 3x3 (8, 25, 512, 8, 8)
Convolution 512 filters of 3x3 (8, 25, 512, 8, 8)
Max pooling   (8, 25, 512, 4, 4)
Convolution 512 filters of 3x3 (8, 25, 512, 4, 4)
Convolution 512 filters of 3x3 (8, 25, 512, 4, 4)
Convolution 512 filters of 3x3 (8, 25, 512, 4, 4)
Max pooling   (8, 25, 512, 2, 2)
Fully connected (S/D) 1024 units (8, 25, 1024)
Fully connected (S/D) 1024 units (8, 25, 1024)
Fully connected (S/D) 2 units (mu and sigma) (8, 25, 2)
Volume estimation (S/D)   (8, 2)
Gaussian CDF (S/D)   (8, 600)

* The first dimension is the batch size, i.e. the number of patients, the second dimension is the number of slices. If a patient had fewer slices, we padded the input and omitted the extra slices in the volume estimation.

Oftentimes, we did not train patient models from scratch. We found that initializing patient models with single slice models helps against overfitting, and severely reduces training time of the patient model.

The architecture we described above was one of the best for us. To diversify our models, some of the good things we tried include:

  • processing each frame separately, and taking the minimum and maximum at some point in the network to compute systole and diastole
  • sharing some of the dense layers between the systole and diastole networks as well
  • using discs to approximate the volume, instead of truncated cones
  • cyclic rolling layers
  • leaky RELUs
  • maxout units

One downside of the patient model approach was that these models assume that SAX slices nicely range from one end of the heart to the other. This was trivially not true for patients with very few (< 5) slices, but it was harder to detect automatically for some other outlier cases as in figure below, where something is wrong with the images or the ROI algorithm fails.

sax_12 sax_15 sax_17 sax_36 sax_37 sax_41
2Ch 4Ch

Training and ensembling

Error function. At the start of the competition, we experimented with various error functions, but we found optimising CRPS directly to work best.

Training algorithm. To train the parameters of our models, we used the Adam update rule (Kingma and Ba).

Initialization. We initialised all filters and dense layers orthogonally (Saxe et al.). Biases were initialized to small positive values to have more gradients at the lower layer in the beginning of the optimization. At the Gaussian output layers, we initialized the biases for mu and sigma such that initial predictions of the untrained network would fall in a sensible range.

Regularization. Since we had a low number of patients, we needed considerable regularization to prevent our models from overfitting. Our main approach was to augment the data and to add a considerable amount of dropout.

Validation

Since the trainset was already quite small, we kept the validation set small as well (83 patients). Despite this, our validation score remained pretty close to the leaderboard score. Also, in cases where it didn’t, it helped us identify issues in our models, namely problematic cases in the test set which were not represented in our validation set. We noticed for instance that quite some of our patient models had problems with patients with too few SAX slices (< 5).

Selectively train and predict

By looking more closely at the validation scores, we observed that most of the accumulated error was obtained by wrongly predicting only a couple of such outlier cases. At some point, being able to handle only a handful of these meant the difference between a leaderboard score of 0.0148 and 0.0132!

To mitigate such issues, we set up our framework such that each individual model could choose not to train on or predict a certain patient. For instance, models on patients’ SAX slices could choose not to predict patients with too few SAX slices, models which use the 4Ch slice would not predict for patients who don’t have this slice. We extended this idea further by developing expert models, which only trained and predicted for patients with either a small or a big heart (as determined by the ROI detection step). Further down the pipeline, our ensembling scripts would then take these non-predictions into account.

Ensembling and dealing with outliers

We ended up creating about 250 models throughout the competition. However, we knew that some of these models were not very robust to certain outliers or patients whose ROI we could not accurately detect. We came up with two different ensembling strategies that would deal with these kind of issues.

Our first ensembling technique followed the following steps:

  1. For each patient, we select the best way to average over the test time augmentations. Slice models often preferred a geometric averaging of distributions, whereas in general arithmetic averaging worked better for patient models.
  2. We average over the models by calculating each prediction’s KL-divergence from the average distribution, and the cross entropy of each single sample of the distribution. This means that models which are further away from the average distribution get more weight (since they are more certain). It also means samples of the distribution closer to the median-value of 0.5 get more weight. Each model also receives a model-specific weight, which is determined by optimizing these weights over the validation set.
  3. Since not all models predict all patients, it is possible for a model in the ensemble to not predict a certain patient. In this case, a new ensemble without these models is optimized, especially for this single patient. The method to do this is described in step 2.
  4. This ensemble is then used on every patient on the test-set. However, when a certain model’s average prediction disagrees too much with the average prediction of all models, the model is thrown out of the ensemble, and a new ensemble is optimized for this patient, as described in step 2. This meant that about ~75% of all patients received a new, ‘personalized’ ensemble.

Our second way of ensembling involves comparing an ensemble that is suboptimal, but robust to outliers, to an ensemble that is not robust to them. This approach is especially interesting, since it does not need a validation set to predict the test patients. It follows the following steps:

  1. Again, for each patient, we select the best way to average over the test time augmentations again.
  2. We combine the models by using a weighted average on the predictions, with the weights summing to one. These weights are determined by optimising them on the validation set. In case not all models provide a prediction for a certain patient, it is dropped for that patient and the weights of the other models are rescaled such that they again sum to one. This ensemble is not robust to outliers, since it contains patient models.
  3. We combine all 2Ch, 4Ch and slice models in a similar fashion. This ensemble is robust to outliers, but only contains less accurate models.
  4. We detect outliers by finding the patients where the two ensembles disagree the most. We measure disagreement using CRPS. If the CRPS exceeds a certain threshold for a patient, we assume it to be an outlier. We chose this threshold to be 0.02.
  5. We retrain the weights for the first ensemble, but omit the outliers from the validation set. We choose this ensemble to generate predictions for most of the patients, but choose the robust ensemble for the outliers.

Following this approach, we detected three outliers in the test set during phase one of the competition. Closer inspection revealed that for all of them either our ROI detection failed, or the SAX slices were not nicely distributed across the heart. Both ways of ensembling achieved similar scores on the public leaderboard. (0.0110)

Second round submissions

For the second round of the competition, we were allowed to retrain our models on the new labels (+ 200 patients). We were also allowed to plan two submissions. Of course, it was impossible to retrain all of our models during this single week. For this reason, we chose to only train our 44 best models, according to our ensembling scripts.

For our first submission, we splitted of a new validation set. The resulting models were combined using our first ensembling strategy.

For our second submission, we trained our models on the entire training set (i.e. there was no validation split). We assembled them using the second ensembling method. Since we had no validation set to optimise the weights of the ensemble, we computed the weights by training an ensemble on the models we trained with a validation split, and transferred them over.

Software and hardware

We used Lasagne, Python, Numpy and Theano to implement our solution, in combination with the cuDNN library. We also used PyCUDA for a few custom kernels. We made use of scikit-image for pre-processing and augmentation.

We trained our models on the NVIDIA GPUs that we have in the lab, which include GTX TITAN X, GTX 980, GTX 680 and Tesla K40 cards. We would like to thank Frederick Godin and Elias Vansteenkiste for lending us a few extra GPUs in the last week of the competition.

Conclusion

In this competition, we tried out different ways to preprocess data and combine information from different data sources, and thus, we learned a lot in this aspect. However, we feel that there is still a room for improvement. For example, we observed that most of our error still hails from a select group of patients. These include the ones for which our ROI extraction fails. In hindsight, hand-labeling the training data and training a network to do the ROI extraction would be a better approach, but we wanted to sidestep doing a lot of this kind of manual effort as much as possible. In the end, labeling the data would probably have been less time intensive.

UPDATE (March 23): the code is now available on GitHub: github.com/317070/kaggle-heart


          Predicting epileptic seizures      Cache   Translate Page      

The American Epilepsy Society Seizure Prediction Challenge ended a few days ago, and I finished 10th out of 504 teams. In this post I will briefly outline the problem and my solution.

The problem

Epilepsy is one of the most commonly diagnosed neurological disorders. It is characterized by the occurrence of spontaneous seizures, and to make matters even worse nearly 30% of patients cannot control their seizures with medication. In such cases, seizure forecasting systems are vitally important. Their purpose is to trigger a warning when a probability of the forthcoming seizure exceeds a predefined threshold, so patients have time to plan their activities.

As a primary challenge towards building a seizure prediction device is the ability to classify between pre-seizure and non-seizure states of the brain activity measured with the EEG. Further, we will use a term preictal to denote a pre-seizure state and interictal for a normal EEG data without any signs of seizure activity.

Preictal state in our setting was defined to be one hour before the seizure onset with a 5-minute horizon.

An example of a preictal EEG record (3 channels out of 16, picture from Kaggle)
An example of a preictal EEG record (3 channels out of 16, picture from Kaggle)

For each 10-minute clip from preictal or interictal one-hour sequence, we were asked to assign a probability that a given clip is preictal. In the training data the timing of each clip was known. However it wasn’t given for the test data clips, so we couldn’t use the timing information when building a classifier.

The evaluation metric was the area under the ROC curve (AUC) calculated for seven available subjects as one big group. It implied an additional challenge since predictions from subject-specific models in general were not well calibrated. Training a single classifier for all subject a priori could not work better because brain activity is a highly individual. The global AUC metric required additional robustness against the choice of the classification threshold, which is crucial in seizure forecasting systems.

The solution: convnets

The idea of using convnets for EEG was inspired by the research of Sander Dieleman. In his case, the audio signal was one-dimensional, unlike the EEG signal, which had 15-24 channels depending on the subject. Therefore, the information from different channels has to be combined in some way. I tried various convnets architectures, however, most success I could get when merging features from different channels in the very first layer.

The input features itself were very simple and similar to those in Howbert et al., 2014: EEG signal was partitioned into nonoverlapping 1 min frames and transformed with DFT. The resulted amplitude spectrum was averaged within 6 frequency bands: delta (0.1-4 Hz), theta (4-8 Hz), alpha (8-12 Hz), beta (12-30 Hz), low­gamma (30-70 Hz) and high­gamma (70-180 Hz). Thus, the dimension of the data clip was equal to (channels frequency bands time frames). Additionally in some models I used standard deviation of the signal computed in the same time windows as DFT.

An example of a convnet architecture
An example of a convnet architecture

Its first layer (C1) performs convolution in a time dimension over all N channels and all 6 frequency bands, so the shape of its filters is . C1 has 16 feature maps each of shape . The second layer (C2) performs convolution with 32 filters of size . C2 is followed by a global temporal pooling layer GP3, which computes the following statistics: mean, maximum, minimum, variance, geometrical mean, norm over 9 values in each feature map from C2. GP3 is fully connected with 128 units in F4 layer. C1 and C2 layers were composed of ReLUs; tanh activation was used in the hidden layer.

I used Python, Theano, NumPy and SciPy to implement the solution. Since I didn’t have a GPU, I trained everything on CPU, which usually took 2-6 hours to train all individual models for 175K gradient updates with ADADELTA.

Model averaging

As a final model I used a geometric mean of the predictions (normalized to 0-1 range for each subject) obtained from 11 convnets with different hyperparameters: number of feature maps or hidden units in each layer, strides in convolutional layers, amount of dropout and weight decay, etc. Models were also trained on different data, for example, I could take DFT in 0.5 or 2 minute windows or change the frequency bands partition by dividing large gamma bands into two. To augment the training set I took the overlaps between consecutive clips in the same one-hour sequence, regretfully I didn’t do it real-time.

Results

In the middle of the competition organizers decided to allow use of the test data to calibrate the predictions. I used the simplest form of calibration: unity-based normalization of per-subject predictions. This could improve the AUC on about 0.01. So the final ensemble, where each of 11 models was calibrated, obtained 0.81087 on public and 0.78354 on private datasets. Models averaging was essential to reduce the probability of an unpleasant surprise on the private LB. After the private scores had become available, I found out that some models with relatively high public scores had unexpectedly low private scores and vice versa. A possible explanation I will give in the next section.

Pitfalls of the EEG

In this competition one could easily overfit to the public test set, which explains a large shake up between public and private leaderboard standings. Moreover, a tricky cross-validation could track the test score with varying success, and simple validation wasn’t even supposed to work. So what is the reason for this phenomena?

The problem lies in the properties of the EEG data: clips, which are close in time are more similar to one another than to the distant clips because brain activity constantly changes. This can be showed via t-SNE. If we take all preprocessed data clips (train and test) from one subject, transform them with PCA into vectors with 50 components and take a few sequences it would look like the plot below. Here we can see three clusters of six 10-minute clips (with some outliers), which correspond to different preictal EEG hours.

t-SNE visualization of the preictal clips from 3 one-hour sequences.
t-SNE visualization of the preictal clips from 3 one-hour sequences.

Obviously, if the classifier is trained on 5 clips from a green sequence, it is easier to make a correct predictions for the 6th green clip rather than for yellow or red clip from another sequence. Sadly, but in many papers I’ve seen on seizure prediction, this fact is oftenly neglected. Many authors report cross-validation or validation results, which are unlikely to be as optimistic at test time, when the device is actually implanted in one’s brain.

Conclusions

This competition outlined a lot of open questions in the field of seizure prediction. These problems are solvable, so epilepsy patients hopefully could get reliable seizure advisory systems in the nearest future.

The competition was a basis for my thesis, which can be found in my GitHub repository along with its code.


          KAM Theory. Part II. Kolmogorov spaces. (arXiv:1809.03492v1 [math.DS])      Cache   Translate Page      

Authors: Mauricio Garay, Duco van Straten

This is part II of our book on KAM theory. We start by defining functorial analysis and then switch to the particular case of Kolmogorov spaces. We develop functional calculus based on the notion of local operators. This allows to define the exponential and therefore relation between Lie algebra and Lie group actions in the infinite dimensional context. Then we introduce a notion of finite dimensional reduction and use it to prove a fixed point theorem for Kolmogorov spaces. We conclude by proving general normal theorems.


          Decomposition of Augmented Cubes into Regular Connected Pancyclic Subgraphs. (arXiv:1809.03493v1 [math.CO])      Cache   Translate Page      

Authors: S. A. Kandekar, Y. M. Borse, B. N. Waphare

In this paper, we consider the problem of decomposing the augmented cube $AQ_n$ into two spanning, regular, connected and pancyclic subgraphs. We prove that for $ n \geq 4$ and $ 2n - 1 = n_1 + n_2 $ with $ n_1, n_2 \geq 2,$ the augmented cube $ AQ_n$ can be decomposed into two spanning subgraphs $ H_1$ and $ H_2$ such that each $ H_i$ is $n_i$-regular and $n_i$-connected. Moreover, $H_i$ is $4$-pancyclic if $ n_i \geq 3.$


          Generalised model-independent characterisation of strong gravitational lenses IV: formalism-intrinsic degeneracies. (arXiv:1809.03505v1 [astro-ph.CO])      Cache   Translate Page      

Authors: Jenny Wagner

Based on the standard gravitational lensing formalism with its effective, projected lensing potential in a given background cosmology, we investigate under which transformations of the source position and of the deflection angle the observable properties of the multiple images, i.e. the time delay differences, the relative image positions, relative shapes, and magnification ratios, remain invariant. As these observables only constrain local lens properties, we derive general, local invariance transformations in the areas covered by the multiple images. We show that the known global invariance transformations, e.g. the mass sheet transformation or the source position transformation, are contained in our invariance transformations, when they are restricted to the areas covered by the multiple images and when lens-model-based degeneracies are ignored, like the freedom to add or subtract masses in unconstrained regions without multiple images. Hence, we have identified the general class of invariance transformations that can occur, in particular in our model-independent local characterisation of strong gravitational lenses.


          Arithmetic representations of fundamental groups II: finiteness. (arXiv:1809.03524v1 [math.AG])      Cache   Translate Page      

Authors: Daniel Litt

Let $X$ be a smooth curve over a finitely generated field $k$, and let $\ell$ be a prime different from the characteristic of $k$. We analyze the dynamics of the Galois action on the deformation rings of mod $\ell$ representations of the geometric fundamental group of $X$. Using this analysis, we prove analogues of the Shafarevich and Fontaine-Mazur finiteness conjectures for function fields over algebraically closed fields in arbitrary characteristic, and a weak variant of the Frey-Mazur conjecture for function fields in characteristic zero.

For example, we show that if $X$ is a normal, connected variety over $\mathbb{C}$, the (typically infinite) set of representations of $\pi_1(X^{\text{an}})$ into $GL_n(\overline{\mathbb{Q}_\ell})$, which come from geometry, has no limit points. As a corollary, we deduce that if $L$ is a finite extension of $\mathbb{Q}_\ell$, then the set of representations of $\pi_1(X^{\text{an}})$ into $GL_n(L)$, which arise from geometry, is finite.


          A weighted setting for the numerical approximation of the Poisson problem with singular sources. (arXiv:1809.03529v1 [math.NA])      Cache   Translate Page      

Authors: Irene Drelichman, Ricardo Durán, Ignacio Ojea

We consider the approximation of Poisson type problems where the source is given by a singular measure and the domain is a convex polygonal or polyhedral domain. First, we prove the well-posedness of the Poisson problem when the source belongs to the dual of a weighted Sobolev space where the weight belongs to the Muckenhoupt class. Second, we prove the stability in weighted norms for standard finite element approximations under the quasi-uniformity assumption on the family of meshes.


          Signatures for finite-dimensional representations of real reductive Lie groups. (arXiv:1809.03533v1 [math.RT])      Cache   Translate Page      

Authors: Daniil Kalinov, David A. Vogan, Jr., Christopher Xu

We present a closed formula, analogous to the Weyl dimension formula, for the signature of an invariant Hermitian form on any finite-dimensional irreducible representation of a real reductive Lie group, assuming that such a form exists. The formula shows in a precise sense that the form must be very indefinite. For example, if an irreducible representation of $GL(n,R)$ admits an invariant form of signature $(p,q)$, then we show that $(p-q)^2 \le p+q$. The proof is an application of Kostant's computation of the kernel of the Dirac operator.


          Poisson geometry of the moduli of local systems on smooth varieties. (arXiv:1809.03536v1 [math.AG])      Cache   Translate Page      

Authors: Tony Pantev, Bertrand Toen

We study the moduli of G-local systems on smooth but not necessarily proper complex algebraic varieties. We show that, when suitably considered as derived algebraic stacks, they carry natural Poisson structures, generalizing the well known case of curves. We also construct symplectic leaves of this Poisson structure by fixing local monodromies at infinity, and show that a new feature, called strictness, appears as soon as the divisor at infinity has non-trivial crossings.


          The Kauffman bracket skein module of the projective space. (arXiv:1809.03540v1 [math.GT])      Cache   Translate Page      

Authors: Boštjan Gabrovšek

Khovanov homology, an invariant of links in $\R^3$, is a graded homology theory that categorifies the Jones polynomial in the sense that the graded Euler characteristic of the homology is the Jones polynomial. Asaeda, Przytycki and Sikora generalized this construction by defining a double graded homology theory that categorifies the Kauffman bracket skein module of links in $I$-bundles over surfaces, except for the surface $\rp^2$, where the construction fails due to strange behaviour of links when projected to the non-orientable surface $\rp^2$. This paper categorifies the missing case of the twisted $I$-bundle over $\rp^2$, $\rp^2 \widetilde{\times} I \approx \rpt \setminus \{\ast\}$, by redefining the differential in the Khovanov chain complex in a suitable manner.


          The moduli space of matroids. (arXiv:1809.03542v1 [math.AG])      Cache   Translate Page      

Authors: Matthew Baker, Oliver Lorscheid

In the first part of the paper, we clarify the connections between several algebraic objects appearing in matroid theory: both partial fields and hyperfields are fuzzy rings, fuzzy rings are tracts, and these relations are compatible with the respective matroid theories. Moreover, fuzzy rings are ordered blueprints and lie in the intersection of tracts with ordered blueprints; we call the objects of this intersection pastures.

In the second part, we construct moduli spaces for matroids over pastures. We show that, for any non-empty finite set $E$, the functor taking a pasture $F$ to the set of isomorphism classes of rank-$r$ $F$-matroids on $E$ is representable by an ordered blue scheme $Mat(r,E)$, the moduli space of rank-$r$ matroids on $E$.

In the third part, we draw conclusions on matroid theory. A classical rank-$r$ matroid $M$ on $E$ corresponds to a $\mathbb{K}$-valued point of $Mat(r,E)$ where $\mathbb{K}$ is the Krasner hyperfield. Such a point defines a residue pasture $k_M$, which we call the universal pasture of $M$. We show that for every pasture $F$, morphisms $k_M\to F$ are canonically in bijection with $F$-matroid structures on $M$.

An analogous weak universal pasture $k_M^w$ classifies weak $F$-matroid structures on $M$. The unit group of $k_M^w$ can be canonically identified with the Tutte group of $M$. We call the sub-pasture $k_M^f$ of $k_M^w$ generated by ``cross-ratios' the foundation of $M$,. It parametrizes rescaling classes of weak $F$-matroid structures on $M$, and its unit group is coincides with the inner Tutte group of $M$. We show that a matroid $M$ is regular if and only if its foundation is the regular partial field, and a non-regular matroid $M$ is binary if and only if its foundation is the field with two elements. This yields a new proof of the fact that a matroid is regular if and only if it is both binary and orientable.


          A log-Sobolev inequality for the multislice, with applications. (arXiv:1809.03546v1 [math.PR])      Cache   Translate Page      

Authors: Yuval Filmus, Ryan O'Donnell, Xinyu Wu

Let $\kappa \in \mathbb{N}_+^\ell$ satisfy $\kappa_1 + \dots + \kappa_\ell = n$ and let $\mathcal{U}_\kappa$ denote the "multislice" of all strings $u$ in $[\ell]^n$ having exactly $\kappa_i$ coordinates equal to $i$, for all $i \in [\ell]$. Consider the Markov chain on $\mathcal{U}_\kappa$, where a step is a random transposition of two coordinates of $u$. We show that the log-Sobolev constant $\rho_\kappa$ for the chain satisfies $$(\rho_\kappa)^{-1} \leq n \sum_{i=1}^{\ell} \tfrac{1}{2} \log_2(4n/\kappa_i),$$ which is sharp up to constants whenever $\ell$ is constant. From this, we derive some consequences for small-set expansion and isoperimetry in the multislice, including a KKL Theorem, a Kruskal--Katona Theorem for the multislice, a Friedgut Junta Theorem, and a Nisan--Szegedy Theorem.


          Pursuit of Low-Rank Models of Time-Varying Matrices Robust to Sparse and Measurement Noise. (arXiv:1809.03550v1 [math.OC])      Cache   Translate Page      

Authors: Albert Akhriev, Jakub Marecek, Andrea Simonetto

In tracking of time-varying low-rank models of time-varying matrices, we present a method robust to both uniformly-distributed measurement noise and arbitrarily-distributed "sparse" noise. In theory, we bound the tracking error. In practice, our use of randomised coordinate descent is scalable and allows for encouraging results on changedetection.net, a benchmark.


          Unicyclic Strong Permutations. (arXiv:1809.03551v1 [cs.CR])      Cache   Translate Page      

Authors: Claude Gravel, Daniel Panario, David Thomson

For positive integers $n$ and $k$ such that $0\leq k\leq n-1$, we study some properties of a certain kind of permutations $\sigma_{k}$ over $\mathbb{F}_{2}^{n}$. The properties that hold simultaneously are related to: (1) the algebraic degree of the boolean output bits: all of the $\sigma_{k}$'s considered have algebraic degree $n-1$; (2) the cycle structure: the permutations $\sigma_{k}$ are unicyclic; (3) the average number of terms to describe the algebraic normal form of the boolean output bits: the average number of terms for each $\sigma_{k}$ is $2^{n-1}$. We also study the composition $\sigma_{n-1}\cdots\sigma_{0}=\sigma$ and notice a dichotomy about the cycle structure of $\sigma$ between odd and even values of $n$; while there are unicyclic permutations for odd $n$, we could not find any unicyclic permutation for even values of $n\leq 30$. For the composition $\sigma$, we also study empirically the differential uniformity for all values of $n\leq 16$ and notice that it never exceeds $6$. For some specific cases of $n=17$ and $n=19$, we report counts of the number of equal entries of their difference table and linear approximation table. The number of bits to describe either the $\sigma_{k}$'s or the composition $\sigma$ is only $O(n)$, and outputs can be generated on the fly. The analysis of the cycle structure bears some analogies with the analysis of continued fraction over finite fields.


          Partial Recovery of Erd\H{o}s-R\'{e}nyi Graph Alignment via $k$-Core Alignment. (arXiv:1809.03553v1 [cs.IT])      Cache   Translate Page      

Authors: Daniel Cullina, Negar Kiyavash, Prateek Mittal, H. Vincent Poor

We determine information theoretic conditions under which it is possible to partially recover the alignment used to generate a pair of sparse, correlated Erd\H{o}s-R\'{e}nyi graphs. To prove our achievability result, we introduce the $k$-core alignment estimator. This estimator searches for an alignment in which the intersection of the correlated graphs using this alignment has a minimum degree of $k$. We prove a matching converse bound. As the number of vertices grows, recovery of the alignment for a fraction of the vertices tending to one is possible when the average degree of the intersection of the graph pair tends to infinity. It was previously known that exact alignment is possible when this average degree grows faster than the logarithm of the number of vertices.


          Stress of a spatially uniform dislocation density field. (arXiv:1809.03567v1 [physics.class-ph])      Cache   Translate Page      

Authors: Amit Acharya

It can be shown that the stress produced by a spatially uniform dislocation density field in a body comprising a linear elastic material under no loads vanishes. We prove that the same result does not hold in general in the geometrically nonlinear case. This problem of mechanics establishes the purely geometrical result that the $\curl$ of a sufficiently smooth two-dimensional rotation field cannot be a non-vanishing constant on a domain.


          Malliavin Calculus and Density for Singular Stochastic Partial Differential Equations. (arXiv:1809.03570v1 [math.PR])      Cache   Translate Page      

Authors: Philipp Schönbauer

We study Malliavin differentiability of solutions to sub-critical singular parabolic stochastic partial differential equations (SPDEs) and we prove the existence of densities for a class of singular SPDEs. Both of these results are implemented in the setting of regularity structures. For this we construct renormalized models in situations where some of the driving noises are replaced by deterministic Cameron-Martin functions, and we show Lipschitz continuity of these models with respect to the Cameron-Martin norm. In particular, in many interesting situations we obtain a convergence and stability result for lifts of $L^2$-functions to models, which is of independent interest. The proof also involves two separate algebraic extensions of the regularity structure which are carried out in rather large generality.


          Spatial Models of Vector-Host Epidemics with Directed Movement of Vectors Over Long Distances. (arXiv:1809.03581v1 [math.AP])      Cache   Translate Page      

Authors: W.E. Fitzgibbon, J.J. Morgan, Glenn F. Webb, Yixiang Wu

We investigate a time-dependent spatial vector-host epidemic model with non-coincident domains for the vector and host populations. The host population resides in small non-overlapping sub-regions, while the vector population resides throughout a much larger region. The dynamics of the populations are modeled by a reaction-diffusion-advection compartmental system of partial differential equations. The disease is transmitted through vector and host populations in criss-cross fashion. We establish global well-posedness and uniform a prior bounds as well as the long-term behavior. The model is applied to simulate the outbreak of bluetongue disease in sheep transmitted by midges infected with bluetongue virus. We show that the long-range directed movement of the midge population, due to wind-aided movement, enhances the transmission of the disease to sheep in distant sites.


          Conflict-free connection number of random graphs. (arXiv:1809.03582v1 [math.CO])      Cache   Translate Page      

Authors: Ran Gu, Xueliang Li

An edge-colored graph $G$ is conflict-free connected if any two of its vertices are connected by a path which contains a color used on exactly one of its edges. The conflict-free connection number of a connected graph $G$, denoted by $cfc(G)$, is the smallest number of colors needed in order to make $G$ conflict-free connected. In this paper, we show that almost all graphs have the conflict-free connection number 2. More precisely, let $G(n,p)$ denote the Erd\H{o}s-R\'{e}nyi random graph model, in which each of the $\binom{n}{2}$ pairs of vertices appears as an edge with probability $p$ independent from other pairs. We prove that for sufficiently large $n$, $cfc(G(n,p))\le 2$ if $p\ge\frac{\log n +\alpha(n)}{n}$, where $\alpha(n)\rightarrow \infty$. This means that as soon as $G(n,p)$ becomes connected with high probability, $cfc(G(n,p))\le 2$.


          Wandering Singularities. (arXiv:1809.03585v1 [math.DG])      Cache   Translate Page      

Authors: Tobias Holck Colding, William P. Minicozzi II

Parabolic geometric flows are smoothing for short time however, over long time, singularities are typically unavoidable, can be very nasty and may be impossible to classify. The idea of [CM6] and here is that, by bringing in the dynamical properties of the flow, we obtain also smoothing for large time for generic initial conditions. When combined with [CM1], this shows, in an important special case, the singularities are the simplest possible.

The question of the dynamics of a singularity has two parts. One is: What are the dynamics near a singularity? The second is: What is the long time behavior? That is, if the flow leaves a neighborhood of a singularity, can it return at a much later time? The first question was addressed in [CM6] and the second here.

Combined with [CM1], [CM6], we show that all other closed singularities than the (round) sphere have a neighborhood where `nearly every' closed hypersurface leaves under the flow and never returns, even to a dilated, rotated or translated copy of the singularity. In other words, it wanders off. In contrast, by Huisken, any closed hypersurface near a sphere remains close to a dilated or translated copy of the sphere at each time.


          On some rigorous aspects of fragmented condensation. (arXiv:1809.03586v1 [cond-mat.quant-gas])      Cache   Translate Page      

Authors: Daniele Dimonte, Marco Falconi, Alessandro Olgiati

In this paper we discuss some aspects of finite fragmented condensation from a mathematical perspective. Inspired by techniques of pseudodifferential calculus and semiclassical analysis in Bosonic Quantum Field Theory, we propose a simple way of identifying finite fragmentation, and we analyze the effects of pair interaction on finite fragmented states. In particular, we focus on the persistence of finite fragmented condensation when the gap between the degenerate ground state and the excited states of the corresponding non-interacting system is very large.


          Unconstraining graph-constrained group testing. (arXiv:1809.03589v1 [cs.IT])      Cache   Translate Page      

Authors: Bruce Spang, Mary Wootters

In network tomography, one goal is to identify a small set of failed links in a network, by sending a few packets through the network and seeing which reach their destination. This problem can be seen as a variant of combinatorial group testing, which has been studied before under the moniker "graph-constrained group testing."

The main contribution of this work is to show that for most graphs, the "constraints" imposed by the underlying network topology are no constraint at all. That is, the number of tests required to identify the failed links in "graph-constrained" group testing is near-optimal even for the corresponding group testing problem with no graph constraints.

Our approach is based on a simple randomized construction of tests, to analyze our construction, we prove new results about the size of giant components in randomly sparsified graphs. Finally, we provide empirical results which suggest that our connected-subgraph tests perform better not just in theory but also in practice, and in particular perform better on a real-world network topology.


          On Hydrodynamic Limits of Young Diagrams. (arXiv:1809.03592v1 [math-ph])      Cache   Translate Page      

Authors: Ibrahim Fatkullin, Sunder Sethuraman, Jianfei Xue

We consider a family of stochastic models of evolving two-dimensional Young diagrams, given in terms of certain energies, with Gibbs invariant measures. `Static' scaling limits of the shape functions, under these Gibbs measures, have been shown by several over the years. The purpose of this article is to study corresponding `dynamical' limits of which less is understood. We show that the hydrodynamic scaling limits of the diagram shape functions may be described by different types parabolic PDEs, depending on the energy structure.


          Hamiltonian Berge cycles in random hypergraphs. (arXiv:1809.03596v1 [math.CO])      Cache   Translate Page      

Authors: Deepak Bal, Pat Devlin

In this note, we study the emergence of Hamiltonian Berge cycles in random $r$-uniform hypergraphs. In particular, we show that for $r \geq 3$, the $2$-out random $r$-graph almost surely has such a cycle, and we use this to determine (up to a multiplicative factor) the threshold probability for when the Erd\H{o}s--R\'enyi random $r$-graph is likely to have such a cycle. In particular, in the Erd\H{o}s--R\'enyi model we show (up to a constant factor depending on $r$) the emergence of these cycles essentially coincides with the disappearance of vertices of degree at most $1$.


          Non-Asymptotic Inference in Instrumental Variables Estimation. (arXiv:1809.03600v1 [econ.EM])      Cache   Translate Page      

Authors: Joel L. Horowitz

This paper presents a simple method for carrying out inference in a wide variety of possibly nonlinear IV models under weak assumptions. The method is non-asymptotic in the sense that it provides a finite sample bound on the difference between the true and nominal probabilities of rejecting a correct null hypothesis. The method is a non-Studentized version of the Anderson-Rubin test but is motivated and analyzed differently. In contrast to the conventional Anderson-Rubin test, the method proposed here does not require restrictive distributional assumptions, linearity of the estimated model, or simultaneous equations. Nor does it require knowledge of whether the instruments are strong or weak. It does not require testing or estimating the strength of the instruments. The method can be applied to quantile IV models that may be nonlinear and can be used to test a parametric IV model against a nonparametric alternative. The results presented here hold in finite samples, regardless of the strength of the instruments.


          Conformal Lie algebras via deformation theory. (arXiv:1809.03603v1 [hep-th])      Cache   Translate Page      

Authors: José M. Figueroa-O'Farrill

We discuss possible notions of conformal Lie algebras, paying particular attention to graded conformal Lie algebras with $d$-dimensional space isotropy: namely, those with a $\mathfrak{co}(d)$ subalgebra acting in a prescribed way on the additional generators. We classify those Lie algebras up to isomorphism for all $d\geq 2$ following the same methodology used recently to classify kinematical Lie algebras, as deformations of the `most abelian' graded conformal algebra. We find 17 isomorphism classes of Lie algebras for $d\neq 3$ and 23 classes for $d=3$. Lie algebra contractions define a partial order in the set of isomorphism classes and this is illustrated via the corresponding Hesse diagram. The only metric graded conformal Lie algebras are the simple Lie algebras, isomorphic to either $\mathfrak{so}(d{+}1,2)$ or $\mathfrak{so}(d{+}2,1)$. We also work out the central extensions of the graded conformal algebras and study their invariant inner products. We find that central extensions of a Lie algebra in $d=3$ and two Lie algebras in $d=2$ are metric. We then discuss several other notions of conformal Lie algebras (generalised conformal, Schr\"odinger and Lifshitz Lie algebras) and we present some partial results on their classification. We end with some open problems suggested by our results.


          Towards Practical Software Stack Decoding of Polar Codes. (arXiv:1809.03606v1 [cs.IT])      Cache   Translate Page      

Authors: Harsh Aurora, Warren J. Gross

The successive cancellation list decoding algorithm for polar codes yields near-optimal decoding performance at the cost of high implementation complexity. The successive cancellation stack algorithm has been shown to provide similar decoding performance at a much lower computational complexity, but software implementations report a sub-par T/P performance. In this technical report, the benefits of the fast simplified successive cancellation list decoder are extended to the stack algorithm, resulting in a throughput increase by two orders of magnitude over the traditional stack decoder.


          Characterizations of Tilt-Stable Minimizers in Second-Order Cone Programming. (arXiv:1809.03607v1 [math.OC])      Cache   Translate Page      

Authors: Matúš Benko, Helmut Gfrerer, Boris S. Mordukhovich

This paper is devoted to the study of tilt stability of local minimizers, which plays an important role in both theoretical and numerical aspects of optimization. This notion has been comprehensively investigated in the unconstrained framework as well as for problems of nonlinear programming with $C^2$-smooth data. Available results for nonpolyhedral conic programs were obtained only under strong constraint nondegeneracy assumptions. Here we develop an approach of second-order variational analysis, which allows us to establish complete neighborhood and pointbased characterizations of tilt stability for problems of second-order cone programming generated by the nonpolyhedral second-order/Lorentz/ice-cream cone. These characterizations are established under the weakest metric subregularity constraint qualification condition.


          Optimal Strategies for Disjunctive Sensing and Control. (arXiv:1809.03608v1 [math.OC])      Cache   Translate Page      

Authors: Richard L Sutherland, Ilya V Kolmanovsky, Anouck R Girard, Frederick A Leve, Christopher D Petersen

A disjunctive sensing and actuation problem is considered in which the actuators and sensors are prevented from operating together over any given time step. This problem is motivated by practical applications in the area of spacecraft control. Assuming a linear system model with stochastic process disturbance and measurement noise, a procedure to construct a periodic sequence that ensures bounded states and estimation error covariance is described along with supporting analysis results. The procedure is also extended to ensure eventual satisfaction of probabilistic chance constraints on the state. The proposed scheme demonstrates good performance in simulations for spacecraft relative motion control.


          Decomposing Frobenius Heisenberg categories. (arXiv:1809.03613v1 [math.RT])      Cache   Translate Page      

Authors: Raj Gandhi

We give two alternate presentations of the Frobenius Heisenberg category, $\mathcal{Heis}_{F,k}$, defined by Savage, when the Frobenius algebra $F=F_1\oplus\dotsb\oplus F_n$ decomposes as a direct sum of Frobenius subalgebras. In these alternate presentations, the morphism spaces of $\mathcal{Heis}_{F,k}$ are given in terms of planar diagrams consisting of strands "colored" by integers $i=1,\dotsc,n$, where a strand of color $i$ carries tokens labelled by elements of $F_i.$ In addition, we prove that when $F$ decomposes this way, the tensor product of Frobenius Heisenberg categories, $\mathcal{Heis}_{F_1,k}\otimes\dotsb\otimes\mathcal{Heis}_{F_n,k},$ is equivalent to a certain subcategory of the Karoubi envelope of $\mathcal{Heis}_{F,k}$ that we call the $\textit{partial}$ Karoubi envelope of $\mathcal{Heis}_{F,k}$.


          On the Capacity Region for Secure Index Coding. (arXiv:1809.03615v1 [cs.IT])      Cache   Translate Page      

Authors: Yuxin Liu, Badri N. Vellambi, Young-Han Kim, Parastoo Sadeghi

We study the index coding problem in the presence of an eavesdropper, where the aim is to communicate without allowing the eavesdropper to learn any single message aside from the messages it may already know as side information. We establish an outer bound on the underlying secure capacity region of the index coding problem, which includes polymatroidal and security constraints, as well as the set of additional decoding constraints for legitimate receivers. We then propose a secure variant of the composite coding scheme, which yields an inner bound on the secure capacity region of the index coding problem. For the achievability of secure composite coding, a secret key with vanishingly small rate may be needed to ensure that each legitimate receiver who wants the same message as the eavesdropper, knows at least two more messages than the eavesdropper. For all securely feasible index coding problems with four or fewer messages, our numerical results establish the secure index coding capacity region.


          Social cognitive optimization with tent map for combined heat and power economic dispatch. (arXiv:1809.03616v1 [math.OC])      Cache   Translate Page      

Authors: Jiaze Sun, Yang Li

Combined heat and power economic dispatch (CHPED) problem is a sophisticated constrained nonlinear optimization problem in a heat and power production system for assigning heat and power production to minimize the production costs. To address this challenging problem, a novel social cognitive optimization algorithm with tent map (TSCO) is presented for solving the CHPED problem. To handle the equality constraints in heat and power balance constraints, adaptive constraints relaxing rule is adopted in constraint processing. The novelty of our work lies in the introduction of a new powerful TSCO algorithm to solve the CHPED issue. The effectiveness and superiority of the presented algorithm is validated by conducting 2 typical CHPED cases. The numerical results show that the proposed approach has better convergence speed and solution quality than all other existing state-of-the-art algorithms.


          New Lower Bounds for the Number of Pseudoline Arrangements. (arXiv:1809.03619v1 [math.CO])      Cache   Translate Page      

Authors: Adrian Dumitrescu, Ritankar Mandal

Arrangements of lines and pseudolines are fundamental objects in discrete and computational geometry. They also appear in other areas of computer science, such as the study of sorting networks. Let $B_n$ be the number of arrangements of $n$ pseudolines and let $b_n=\log{B_n}$. The problem of estimating $B_n$ was posed by Knuth in 1992. Knuth conjectured that $b_n \leq {n \choose 2} + o(n^2)$ and also derived the first upper and lower bounds: $b_n \leq 0.7924 (n^2 +n)$ and $b_n \geq n^2/6 -O(n)$. The upper bound underwent several improvements, $b_n \leq 0.6988 n^2$ (Felsner, 1997), and $b_n \leq 0.6571 n^2$ (Felsner and Valtr, 2011), for large $n$. Here we show that $b_n \geq cn^2 -O(n \log{n})$ for some constant $c>0.2083$. In particular, $b_n \geq 0.2083 \, n^2$ for large $n$. This improves the previous best lower bound, $b_n \geq 0.1887 n^2$, due to Felsner and Valtr (2011). Our arguments are elementary and geometric in nature. Further, our constructions are likely to spur new developments and improved lower bounds for related problems, such as in topological graph drawings.


          Approximate abstractions of control systems with an application to aggregation. (arXiv:1809.03621v1 [math.OC])      Cache   Translate Page      

Authors: Stanley W. Smith, Murat Arcak, Majid Zamani

Previous approaches to constructing abstractions for control systems rely on geometric conditions or, in the case of an interconnected control system, a condition on the interconnection topology. Since these conditions are not always satisfiable, we relax the restrictions on the choice of abstractions, instead opting to select ones which nearly satisfy such conditions via optimization-based approaches. To quantify the resulting effect on the error between the abstraction and concrete control system, we introduce the notions of practical simulation functions and practical storage functions. We show that our approach facilitates the procedure of aggregation, where one creates an abstraction by partitioning agents into aggregate areas. We demonstrate the results on an application where we regulate the temperature in three separate zones of a building.


          A Kazhdan-Lusztig algorithm for Whittaker modules. (arXiv:1809.03622v1 [math.RT])      Cache   Translate Page      

Authors: Anna Romanov

We study a category of Whittaker modules over a complex semisimple Lie algebra by realizing it as a category of twisted D-modules on the associated flag variety using Beilinson-Bernstein localization. The main result of this paper is the development of a geometric algorithm for computing the composition multiplicities of standard Whittaker modules. This algorithm establishes that these multiplicities are determined by a collection of polynomials we refer to as Whittaker Kazhdan-Lusztig polynomials. In the case of trivial nilpotent character, this algorithm specializes to the usual algorithm for computing multiplicities of composition factors of Verma modules using Kazhdan-Lusztig polynomials.


          A Brief History of Persistence. (arXiv:1809.03624v1 [math.AT])      Cache   Translate Page      

Authors: Jose A. Perea

Persistent homology is currently one of the more widely known tools from computational topology and topological data analysis. We present in this note a brief survey on the evolution of the subject. The goal is to highlight the main ideas, starting from the subject's computational inception more than 20 years ago, to the more modern categorical and representation-theoretic point of view.


          Probabilistic Condition Number Estimates for Real Polynomial Systems II: Structure and Smoothed Analysis. (arXiv:1809.03626v1 [math.AG])      Cache   Translate Page      

Authors: Alperen A. Ergür, Grigoris Paouris, J. Maurice Rojas

We consider the sensitivity of real zeros of polynomial systems with respect to perturbation of the coefficients, and extend our earlier probabilistic estimates for the condition number in two directions: (1) We give refined bounds for the condition number of random structured polynomial systems, depending on a variant of sparsity and an intrinsic geometric quantity called dispersion. (2) Given any structured polynomial system $P$, we prove the existence of a nearby well-conditioned structured polynomial system $Q$, with explicit quantitative estimates.

Our underlying notion of structure is to consider a linear subspace $E_i$ of the space $H_{d_i}$ of homogeneous $n$-variate polynomials of degree $d_i$, let our polynomial system $P$ be an element of $E:=E_1\times \cdots \times E_{n-1}$, and let $\dim(E):=\dim(E_1) +\cdots+\dim(E_{n-1})$ be our measure of sparsity. The dispersion $\sigma(E)$ provides a rough measure of how suitable the tuple $E$ is for numerical solving.

Part I of this series studied how to extend probabilistic estimates of a condition number defined by Cucker to a family of measures going beyond the weighted Gaussians often considered in the current literature. We continue at this level of generality, using tools from geometric functional analysis.


          Network Coded Handover in IEEE 802.11. (arXiv:1809.03629v1 [cs.IT])      Cache   Translate Page      

Authors: Samah A. M. Ghanem

We propose a network coded handover of a station moving between two IEEE 802.11 access points (AP). To address such novel proposed framework on a small cell WiFi to WiFi AP handoff, we propose a novel model for the Distributed Coordination Function (DCF) of the WiFi IEEE 802.11 with fixed average contention window. We provide a single packet tranmission model which has been extended to N-packets transmission models with and without fragmentation. We also model the N-packet transmission for the uncoded/coded packets broadcast in order to compare the IEEE 802.11 unreliable to reliable coded broadcast with ACK. We analyze the delay over all, unicast and broadcast transmissions, for the scenario considered with a topology with one WiFi AP before the handover. Capitalizing on the set of models and their corresponding mean completion times (delay), we analyze the performance of different mechanisms. Finally, we provide a novel formulation of the Network Coding on the Edge handover when the station is mobile allowing for the derivation of optimal transmission strategies that can define an optimal time, when to switch to the other AP.


          Whitney equisingularity in families of generically reduced curves. (arXiv:1809.03630v1 [math.CV])      Cache   Translate Page      

Authors: O.N. Silva, J. Snoussi

In this work we study equisingularity in a one-parameter flat family of generically reduced curves. We consider some equisingular criteria as topological triviality, Whitney equisingularity and strong simultaneous resolution. In this context, we prove that Whitney equisingularity is equivalent to strong simultaneous resolution and also is equivalent to the constancy of the Milnor number and the multiplicity of the fibers. These results are extensions to the case of flat deformations of generically reduced curves, of known results on reduced curves. When the family $(X,0)$ is topologically trivial, we also characterize Whitney equisingularity through Cohen-Macaulay property of a certain local ring associated to the parameter space of the family.


          Path prediction of aggregated $\alpha$-stable moving averages using semi-norm representations. (arXiv:1809.03631v1 [math.PR])      Cache   Translate Page      

Authors: Sébastien Fries

For $(X_t)$ a two-sided $\alpha$-stable moving average, this paper studies the conditional distribution of future paths given a piece of observed trajectory when the process is far from its central values. Under this framework, vectors of the form $\boldsymbol{X}_t=(X_{t-m},\ldots,X_t,X_{t+1},\ldots,X_{t+h})$, $m\ge0$, $h\ge1$, are multivariate $\alpha$-stable and the dependence between the past and future components is encoded in their spectral measures. A new representation of stable random vectors on unit cylinders -sets $\{\boldsymbol{s}\in\mathbb{R}^{m+h+1}: \hspace{0.3cm} \|\boldsymbol{s}\|=1\}$ for $\|\cdot\|$ an adequate semi-norm- is proposed in order to describe the tail behaviour of vectors $\boldsymbol{X}_t$ when only the first $m+1$ components are assumed to be observed and large in norm. Not all stable vectors admit such a representation and $(X_t)$ will have to be <<anticipative enough>> for $\boldsymbol{X}_t$ to admit one. The conditional distribution of future paths can then be explicitly derived using the regularly varying tails property of stable vectors and has a natural interpretation in terms of pattern identification. The approach extends to processes resulting from the linear combination of stable moving averages and applied to several examples.


          Critical Percolation on Random Networks with Prescribed Degrees. (arXiv:1809.03634v1 [math.PR])      Cache   Translate Page      

Authors: Souvik Dhara

Random graphs have played an instrumental role in modelling real-world networks arising from the internet topology, social networks, or even protein-interaction networks within cells. Percolation, on the other hand, has been the fundamental model for understanding robustness and spread of epidemics on these networks. From a mathematical perspective, percolation is one of the simplest models that exhibits phase transition, and fascinating features are observed around the critical point. In this thesis, we prove limit theorems about structural properties of the connected components obtained from percolation on random graphs at criticality. The results are obtained for random graphs with general degree sequence, and we identify different universality classes for the critical behavior based on moment assumptions on the degree distribution.


          On the two-systole of real projective spaces. (arXiv:1809.03636v1 [math.DG])      Cache   Translate Page      

Authors: Lucas Ambrozio, Rafael Montezuma

In this short note, we establish an integral-geometric formula for minimal two-spheres inside homogeneous three-spheres, and use it to provide a characterisation of each homogeneous metric on the three-dimensional real projective space as the unique metric with the largest possible two-systole among metrics with the same volume in its conformal class.


          On the width of unit volume three-spheres. (arXiv:1809.03638v1 [math.DG])      Cache   Translate Page      

Authors: Lucas Ambrozio, Rafael Montezuma

How large can be the width of Riemannian three-spheres of the same volume in the same conformal class? If a maximum value is attained, how does a maximising metric look like? What happens as the conformal class changes? In this paper, we investigate these and other related questions, focusing on the context of Simon-Smith min-max theory.


          On cylindricity of submanifolds of nonnegative Ricci curvature in a Minkowski space. (arXiv:1809.03639v1 [math.DG])      Cache   Translate Page      

Authors: A.Borisenko, Y.Nikolayevsky

We consider Finsler submanifolds $M^n$ of nonnegative Ricci curvature in a Minkowski space $\mathbb{M}^{n+p}$ which contain a line or whose relative nullity index is positive. For hypersurfaces, submanifolds of codimension two or of dimension two, we prove that the submanifold is a cylinder, under a certain condition on the inertia of the pencil of the second fundamental forms. We give an example of a surface of positive flag curvature in a three-dimensional Minkowski space which is not locally convex.


          On The Painleve Property For A Class Of Quasilinear Partial Differential Equations. (arXiv:1809.03640v1 [nlin.SI])      Cache   Translate Page      

Authors: Stanislav Sobolevsky

The last decades saw growing interest across multiple disciplines in nonlinear phenomena described by partial differential equations (PDE). Integrability of such equations is tightly related with the Painleve property - solutions being free from moveable critical singularities. The problem of Painleve classification of ordinary and partial nonlinear differential equations lasting since the end of XIX century saw significant advances for the equation of lower (mainly up to fourth with rare exceptions) order, however not that much for the equations of higher orders.

Recent works of the author have completed the Painleve classification for several broad classes of ordinary differential equations of arbitrary order, advancing the methodology of the Panleve analysis. This paper transfers one of those results on a broad class of nonlinear partial differential equations - quasilinear equations of an arbitrary order three or higher, algebraic in the dependent variable and including only the highest order derivatives of it. Being a first advance in Painleve classification of broad classes of arbitrary order nonlinear PDE's known to the author, this work highlights the potential in building classifications of that kind going beyond specific equations of a limited order, as mainly considered so far.


          Model Risk Measurement under Wasserstein Distance. (arXiv:1809.03641v1 [q-fin.MF])      Cache   Translate Page      

Authors: Yu Feng, Erik Schlögl

The paper proposes a new approach to model risk measurement based on the Wasserstein distance between two probability measures. It formulates the theoretical motivation resulting from the interpretation of fictitious adversary of robust risk management. The proposed approach accounts for all alternative models and incorporates the economic reality of the fictitious adversary. It provides practically feasible results that overcome the restriction and the integrability issue imposed by the nominal model. The Wasserstein approach suits for all types of model risk problems, ranging from the single-asset hedging risk problem to the multi-asset allocation problem. The robust capital allocation line, accounting for the correlation risk, is not achievable with other non-parametric approaches.


          A measure of transcendence for singular points on conics. (arXiv:1809.03642v1 [math.NT])      Cache   Translate Page      

Authors: Damien Roy

A singular point on a plane conic defined over $\mathbb{Q}$ is a transcendental point of the curve which admits very good rational approximations, uniformly in terms of the height. Extremal numbers and Sturmian continued fractions are abscissa of such points on the parabola $y=x^2$. In this paper we provide a measure of transcendence for singular points on conics defined over $\mathbb{Q}$ which, in these two cases, improves on the measure obtained by Adamczewski et Bugeaud. The main tool is a quantitative version of Schmidt subspace theorem due to Evertse.


          Pseudocharacters of Classical Groups. (arXiv:1809.03644v1 [math.RT])      Cache   Translate Page      

Authors: Matthew Weidner

A $GL_d$-pseudocharacter is a function from a group $\Gamma$ to a ring $k$ satisfying polynomial relations which make it "look like" the character of a representation. When $k$ is an algebraically closed field, Taylor proved that $GL_d$-pseudocharacters of $\Gamma$ are the same as degree-$d$ characters of $\Gamma$ with values in $k$, hence are in bijection with equivalence classes of semisimple representations $\Gamma \rightarrow GL_d(k)$. Recently, V. Lafforgue generalized this result by showing that, for any connected reductive group $H$ over an algebraically closed field $k$ of characteristic 0 and for any group $\Gamma$, there exists an infinite collection of functions and relations which are naturally in bijection with $H^0(k)$-conjugacy classes of semisimple representations $\Gamma \rightarrow H(k)$. In this paper, we reformulate Lafforgue's result in terms of a new algebraic object called an FFG-algebra. We then define generating sets and generating relations for these objects and show that, for all $H$ as above, the corresponding FFG-algebra is finitely presented. Hence we can always define $H$-pseudocharacters consisting of finitely many functions satisfying finitely many relations. Next, we use invariant theory to give explicit finite presentations of the FFG-algebras for (general) orthogonal groups, (general) symplectic groups, and special orthogonal groups. Finally, we use our pseudocharacters to answer questions about conjugacy vs. element-conjugacy of representations, following Larsen.


          Super-Isolated Abelian Varieties. (arXiv:1809.03649v1 [math.NT])      Cache   Translate Page      

Authors: Travis Scholl

We call an abelian variety over a finite field $\mathbb{F}_q$ super-isolated if its ($\mathbb{F}_q$-rational) isogeny class contains a single isomorphism class. In this paper, we use the Honda-Tate theorem to characterize super-isolated ordinary simple abelian varieties by certain algebraic integers. Our main result is that for a fixed dimension $g \geq 3$, there are finitely many such varieties.


          Exploiting the structure effectively and efficiently in low rank matrix recovery. (arXiv:1809.03652v1 [math.NA])      Cache   Translate Page      

Authors: Jian-Feng Cai, Ke Wei

Low rank model arises from a wide range of applications, including machine learning, signal processing, computer algebra, computer vision, and imaging science. Low rank matrix recovery is about reconstructing a low rank matrix from incomplete measurements. In this survey we review recent developments on low rank matrix recovery, focusing on three typical scenarios: matrix sensing, matrix completion and phase retrieval. An overview of effective and efficient approaches for the problem is given, including nuclear norm minimization, projected gradient descent based on matrix factorization, and Riemannian optimization based on the embedded manifold of low rank matrices. Numerical recipes of different approaches are emphasized while accompanied by the corresponding theoretical recovery guarantees.


          Energy-efficient Decision Fusion for Distributed Detection in Wireless Sensor Networks. (arXiv:1809.03653v1 [cs.IT])      Cache   Translate Page      

Authors: N. Sriranga, K. G. Nagananda, R. S. Blum, A. Saucan, P. K. Varshney

This paper proposes an energy-efficient counting rule for distributed detection by ordering sensor transmissions in wireless sensor networks. In the counting rule-based detection in an $N-$sensor network, the local sensors transmit binary decisions to the fusion center, where the number of all $N$ local-sensor detections are counted and compared to a threshold. In the ordering scheme, sensors transmit their unquantized statistics to the fusion center in a sequential manner; highly informative sensors enjoy higher priority for transmission. When sufficient evidence is collected at the fusion center for decision making, the transmissions from the sensors are stopped. The ordering scheme achieves the same error probability as the optimum unconstrained energy approach (which requires observations from all the $N$ sensors) with far fewer sensor transmissions. The scheme proposed in this paper improves the energy efficiency of the counting rule detector by ordering the sensor transmissions: each sensor transmits at a time inversely proportional to a function of its observation. The resulting scheme combines the advantages offered by the counting rule (efficient utilization of the network's communication bandwidth, since the local decisions are transmitted in binary form to the fusion center) and ordering sensor transmissions (bandwidth efficiency, since the fusion center need not wait for all the $N$ sensors to transmit their local decisions), thereby leading to significant energy savings. As a concrete example, the problem of target detection in large-scale wireless sensor networks is considered. Under certain conditions the ordering-based counting rule scheme achieves the same detection performance as that of the original counting rule detector with fewer than $N/2$ sensor transmissions; in some cases, the savings in transmission approaches $(N-1)$.


          Kahler-Ricci flow on blowups along submanifolds. (arXiv:1809.03654v1 [math.DG])      Cache   Translate Page      

Authors: Bin Guo

In this short note, we study the behavior of Kaher-Ricci flow on Kahler manifolds which contract divisors to smooth submanifolds. We show that the Kahler potentials are Holder continuous and the flow converges sequentially in Gromov-Hausdorff topology to a compact metric space which is homeomorphic to the base manifold.


          Uplink Cooperative NOMA for Cellular-Connected UAV. (arXiv:1809.03657v1 [cs.IT])      Cache   Translate Page      

Authors: Weidong Mei, Rui Zhang

Aerial-ground interference mitigation is a challenging issue in the cellular-connected unmanned aerial vehicle (UAV) communications. Due to the strong line-of-sight (LoS) air-to-ground (A2G) channels, the UAV may impose/suffer more severe uplink/downlink interference to/from the cellular base stations (BSs) than the ground users. To tackle this challenge, we propose to apply the non-orthogonal multiple access (NOMA) technique to the uplink communication from a UAV to cellular BSs, under spectrum sharing with the existing ground users. However, for our considered system, traditional NOMA with local interference cancellation (IC), termed non-cooperative NOMA, may provide very limited gain compared to the OMA. This is because there are many co-channel BSs due to the LoS A2G channels and thus the UAV's rate performance is severely limited by the BS with the worst channel condition with the UAV. To improve the UAV's achievable rate, a new cooperative NOMA scheme is proposed by exploiting the backhaul links among BSs. Specifically, some BSs with better channel conditions are selected to decode the UAV's signals first, and then forward the decoded signals to their backhaul-connected BSs for IC. To investigate the optimal design of cooperative NOMA, we maximize the weighted sum-rate of the UAV and ground users by jointly optimizing the UAV's rate and power allocations over multiple resource blocks. However, this problem is hard to be solved optimally. To obtain useful insights, we first consider two special cases with egoistic and altruistic transmission strategies of the UAV, respectively, and solve their corresponding problems optimally. Next, we consider the general case and propose an efficient suboptimal solution via the alternating optimization. Numerical results show that the proposed cooperative NOMA yields significant throughput gains than the OMA and the non-cooperative NOMA benchmark.


          Algebraic Structure of Holomorphic Poisson Cohomology on Nilmanifolds. (arXiv:1809.03660v1 [math.AG])      Cache   Translate Page      

Authors: Yat Sun Poon, John Simanyi

It is proved that on nilmanifolds with abelian complex structure, there exists a canonically constructed non-trivial holomorphic Poisson structure. We identify the necessary and sufficient condition for its associated cohomology to be isomorphic to the cohomology associated to trivial (zero) holomorphic Poisson structure. We also identify a sufficient condition for this isomorphism to be at the level of Gerstenhaber algebras.


          Vorticity measures and the inviscid limit. (arXiv:1809.03661v1 [math.AP])      Cache   Translate Page      

Authors: Peter Constantin, Milton Lopes Filho, Helena Nussenzveig Lopes, Vlad Vicol

We consider a sequence of Leray-Hopf weak solutions of the 2D Navier-Stokes equations on a bounded domain, in the vanishing viscosity limit. We provide sufficient conditions on the associated vorticity measures, away from the boundary, which ensure that as the viscosity vanishes the sequence converges to a weak solution of the Euler equations. These assumptions are consistent with vortex sheet solutions of the Euler equations.


          Multiple list colouring triangle-free planar graphs. (arXiv:1809.03665v1 [math.CO])      Cache   Translate Page      

Authors: Yiting Jiang, Xuding Zhu

This paper proves that for each positive integer $m$, there is a triangle-free planar graph $G$ which is not $(3m+ \lceil \frac m{17} \rceil-1, m)$-choosable.


          Universal mixed sums of generalized $4$- and $8$-gonal numbers. (arXiv:1809.03673v1 [math.NT])      Cache   Translate Page      

Authors: Jangwon Ju, Byeong-Kweon Oh

An integer of the form $P_m(x)= \frac{(m-2)x^2-(m-4)x}{2}$ for an integer $x$, is called a generalized $m$-gonal number. For positive integers $\alpha_1,\dots,\alpha_u$ and $\beta_1,\dots,\beta_v$, a mixed sum $\Phi=\alpha_1P_4(x_1)+\cdots+\alpha_uP_4(x_u)+\beta_1P_8(y_1)+\cdots+\beta_vP_8(y_v)$ of generalized $4$- and $8$-gonal numbers is called universal if $\Phi=N$ has an integer solution for any nonnegative integer $N$. In this article, we prove that there are exactly 1271 proper universal mixed sums of generalized $4$- and $8$-gonal numbers. Furthermore, the "$61$-theorem" is proved, which states that an arbitrary mixed sum of generalized $4$- and $8$-gonal numbers is universal if and only if it represents the integers $1$, $2$, $3$, $4$, $5$, $6$, $7$, $8$, $9$, $10$, $12$, $13$, $14$, $15$, $18$, $20$, $30$, $60$, and $61$.


          Central limit theorem near the critical temperature for the overlap in the 2-spin spherical SK model. (arXiv:1809.03675v1 [math.PR])      Cache   Translate Page      

Authors: Vu Lan Nguyen, Philippe Sosoe

We prove a central limit theorem for the normalized overlap between two replicas in the spherical SK model in the high temperature phase. The convergence holds almost surely with respect to the disorder variables, and the inverse temperature can approach the criticial value at a polynomial rate with any exponent strictly greater than $1/3$.


          Equivariant cohomology of torus orbifolds. (arXiv:1809.03678v1 [math.AT])      Cache   Translate Page      

Authors: Alastair Darby, Shintaro Kuroki, Jongbaek Song

We calculate the integral equivariant cohomology, in terms of generators and relations, of locally standard torus orbifolds whose odd degree ordinary cohomology vanishes. We begin by studying GKM-orbifolds, which are more general, before specialising to half-dimensional torus actions.


          CNN-Based Signal Detection for Banded Linear Systems. (arXiv:1809.03682v1 [cs.IT])      Cache   Translate Page      

Authors: Congmin Fan, Xiaojun Yuan, Ying-Jun Angela Zhang

Banded linear systems arise in many communication scenarios, e.g., those involving inter-carrier interference and inter-symbol interference. Motivated by recent advances in deep learning, we propose to design a high-accuracy low-complexity signal detector for banded linear systems based on convolutional neural networks (CNNs). We develop a novel CNN-based detector by utilizing the banded structure of the channel matrix. Specifically, the proposed CNN-based detector consists of three modules: the input preprocessing module, the CNN module, and the output postprocessing module. With such an architecture, the proposed CNN-based detector is adaptive to different system sizes, and can overcome the curse of dimensionality, which is a ubiquitous challenge in deep learning. Through extensive numerical experiments, we demonstrate that the proposed CNN-based detector outperforms conventional deep neural networks and existing model-based detectors in both accuracy and computational time. Moreover, we show that CNN is flexible for systems with large sizes or wide bands. We also show that the proposed CNN-based detector can be easily extended to near-banded systems such as doubly selective orthogonal frequency division multiplexing (OFDM) systems and 2-D magnetic recording (TDMR) systems, in which the channel matrices do not have a strictly banded structure.


          Irreducible component of affine Deligne-Lusztig varieties. (arXiv:1809.03683v1 [math.AG])      Cache   Translate Page      

Authors: Sian Nie

By extending the method of semi-modules developed by de Jong,Oort, Viehmann and Hamacher, we introduce a stratification for the affine Deligne-Lusztig variety (in the affine Grassmannian) attached to a basic element. As an application, we verify a conjecture, due to M. Chen and X. Zhu, on the irreducible components of the affine Deligne-Lusztig variety attached to a sum of dominant minuscule coweights.


          Addendum to 'The equivariant spectral function of an invariant elliptic operator'. (arXiv:1809.03687v1 [math.SP])      Cache   Translate Page      

Authors: Pablo Ramacher

Let $M$ be a compact boundaryless Riemannian manifold, carrying an effective and isometric action of a torus $T$, and $P_0$ an invariant elliptic classical pseudodifferential operator on $M$. In this note, we strengthen asymptotics for the equivariant (or reduced) spectral function of $P_0$ derived previously, which are already sharp in the eigenvalue aspect, to become almost sharp in the isotypic aspect. In particular, this leads to hybrid equivariant $L^p$-bounds for eigenfunctions that are almost sharp in the eigenvalue and isotypic aspect.


          A classification of proper holomorphic mappings between generalized pseudoellipsoids of different dimensions. (arXiv:1809.03691v1 [math.CV])      Cache   Translate Page      

Authors: Atsushi Hayashimoto

We classify proper holomorphic mappings between generalized pseudoellipsoids of different dimensions. Those domains are parametrized by the exponents. The relations among them are also obtained. Main tool is the orthogonal decomposition of a CR bundle. Such a decomposition derives the `variable-splitting' of the mapping.


          Chaotic translations on weighted Orlicz spaces. (arXiv:1809.03694v1 [math.FA])      Cache   Translate Page      

Authors: Chung-Chuan Chen, Kui-Yo Chen, Serap Öztop, Seyyed Mohammad Tabatabaie

Let $G$ be a locally compact group, $w$ be a weight on $G$ and $\Phi$ be a Young function. We give some characterizations for translation operators to be topologically transitive and chaotic on the weighted Orlicz space $L_w^\Phi(G)$. In particular, transitivity is equivalent to the blow-up/collapse property in our case. Moreover, the dense set of periodic elements implies transitivity automatically.


          The spectra of finite 3-transposition groups. (arXiv:1809.03696v1 [math.GR])      Cache   Translate Page      

Authors: Jonathan I. Hall, Sergey Shpectorov

We calculate the spectrum of the diagram for each finite $3$-transposition group. Such graphs with a given minimal eigenvalue have occurred in the context of compact Griess subalgebras of vertex operator algebras.


          CAPRL: Signal Recovery from Compressive Affine Phase Retrieval via Lifting. (arXiv:1809.03700v1 [math.OC])      Cache   Translate Page      

Authors: Wengu Chen, Peng Li, Qiyu Sun

In this paper, we consider compressive/sparse affine phase retrieval proposed in [B. Gao B, Q. Sun, Y. Wang and Z. Xu, Adv. in Appl. Math., 93(2018), 121-141]. By the lift technique, and heuristic nuclear norm for convex relaxation of rank and $\ell$ one norm convex relaxation of sparsity, we establish convex models , which are called compressive affine phase retrieval via lifting (CAPRL). In order to compute these models, we develop inertial proximal ADMM for multiple separated operators and also give out its convergence analysis. Our numerical experiments via proposed algorithm show that sparse signal can be exactly and stably recovered via CAPRL. We also list some other applications of our proposed algorithm.


          Fold cobordisms and a Poincare-Hopf type theorem for the signature. (arXiv:1809.03703v1 [math.GT])      Cache   Translate Page      

Authors: Boldizsar Kalmar

We give complete geometric invariants of cobordisms of framed fold maps. These invariants consist of two types. We take the immersion of the fold singular set into the target manifold together with information about non-triviality of the normal bundle of the singular set in the source manifold. These invariants were introduced in the author's earlier works. Secondly we take the induced stable partial framing on the source manifold whose cobordisms were studied in general by Koschorke. We show that these invariants describe completely the cobordism groups of framed fold maps into R^n. Then we are looking for dependencies between these invariants and we study fold maps of 4k-dimensional manifolds into R^2. We construct special fold maps which are representatives of the fold cobordism classes and we also compute cobordism groups. We obtain a Poincare-Hopf type formula, which connects local data of the singularities of a fold map of an oriented 4k-dimensional manifold M to the signature of M. We also study the unoriented case analogously and prove a similar formula about the twisting of the normal bundle of the fold singular set.


          Robust Resource Allocation for UAV Systems with UAV Jittering and User Location Uncertainty. (arXiv:1809.03706v1 [cs.IT])      Cache   Translate Page      

Authors: Dongfang Xu, Yan Sun, Derrick Wing Kwan Ng, Robert Schober

In this paper, we investigate resource allocation algorithm design for multiuser unmanned aerial vehicle (UAV) communication systems in the presence of UAV jittering and user location uncertainty. In particular, we jointly optimize the two-dimensional position and the downlink beamformer of a fixed-altitude UAV for minimization of the total UAV transmit power. The problem formulation takes into account the quality-of-service requirements of the users, the imperfect knowledge of the antenna array response (AAR) caused by UAV jittering, and the user location uncertainty. Despite the non-convexity of the resulting problem, we solve the problem optimally employing a series of transformations and semidefinite programming relaxation. Our simulation results reveal the dramatic power savings enabled by the proposed robust scheme compared to two baseline schemes. Besides, the robustness of the proposed scheme with respect to imperfect AAR knowledge and user location uncertainty at the UAV is also confirmed.


          Some inequalities for interval-valued functions on time scales. (arXiv:1809.03709v1 [math.CA])      Cache   Translate Page      

Authors: Dafang Zhao, Guoju Ye, Wei Liu, Delfim F. M. Torres

We introduce the interval Darboux delta integral (shortly, the $ID$ $\Delta$-integral) and the interval Riemann delta integral (shortly, the $IR$ $\Delta$-integral) for interval-valued functions on time scales. Fundamental properties of $ID$ and $IR$ $\Delta$-integrals and examples are given. Finally, we prove Jensen's, H\"{o}lder's and Minkowski's inequalities for the $IR$ $\Delta$-integral. Also, some examples are given to illustrate our theorems.


          Orbifold products for higher K-theory and motivic cohomology. (arXiv:1809.03710v1 [math.AG])      Cache   Translate Page      

Authors: Lie Fu, Manh Toan Nguyen

Due to the work of many authors in the last decades, given an algebraic orbifold (smooth proper Deligne-Mumford stack with trivial generic stabilizer), one can construct its orbifold Chow ring and orbifold Grothendieck ring, and relate them by the orbifold Chern character map, generalizing the fundamental work of Chen-Ruan on orbifold cohomology. In this paper, we extend this theory naturally to higher Chow groups and higher algebraic K-theory, mainly following the work of Jarvis-Kaufmann-Kimura and Edidin-Jarvis-Kimura.


          On non-formality of homogeneous spaces. (arXiv:1809.03711v1 [math.RT])      Cache   Translate Page      

Authors: Zofia Stȩpień

One of the interesting and important rational homotopy properties of a topological space $X$ is that of {\em formality}. In this paper we prove the non-formality property of some family homogeneous spaces.


          DGA-Models of variations of mixed Hodge structures. (arXiv:1809.03716v1 [math.AG])      Cache   Translate Page      

Authors: Hisashi Kasuya

We define objects over Morgan's mixed Hodge diagrams which will be algebraic models of unipotent variations of mixed hodge structures over K\"ahler manifolds. As an analogue of Hain-Zucker's equivalence between unipotent variations of mixed Hodge structures and mixed Hodge representations of the fundamental group with Hain's mixed hodge structure, we give an equivalence between the category of our VMHS-like objects and the category of mixed Hodge representations of the dual Lie algebra of Sullivan's minimal model with Morgan's mixed Hodge structure. By this result, we can put various (tannakian theoretical) non-abelian mixed Hodge structures on the category of our new objects like the taking fibers of variations of mixed Hodge structures at points. By certain modifications of the result, we also give models of non-unipotent variations of mixed Hodge structures.


          Countable Sofic Shifts with a Periodic Direction. (arXiv:1809.03717v1 [math.DS])      Cache   Translate Page      

Authors: Ilkka Törmä

As a variant of the equal entropy cover problem, we ask whether all multidimensional sofic shifts with countably many configurations have SFT covers with countably many configurations. We answer this question in the negative by presenting explicit counterexamples. We formulate necessary conditions for a vertically periodic shift space to have a countable SFT cover, and prove that they are sufficient in a natural (but quite restricted) subclass of shift spaces.


          The continuous Anderson hamiltonian in $d\le 3$. (arXiv:1809.03718v1 [math.PR])      Cache   Translate Page      

Authors: Cyril Labbé

We construct the continuous Anderson hamiltonian on $(-L,L)^d$ driven by a white noise and endowed with either Dirichlet or periodic boundary conditions. Our construction holds in any dimension $d\le 3$ and relies on the theory of regularity structures: it yields a self-adjoint operator in $L^2\big((-L,L)^d\big)$ with pure point spectrum. In $d\ge 2$, a renormalisation of the operator by means of infinite constants is required to compensate for ill-defined products involving functionals of the white noise. We also obtain left tail estimates on the distributions of the eigenvalues: in particular, for $d=3$ these estimates show that the eigenvalues do not have exponential moments.


          Constraint Energy Minimizing Generalized Multiscale Finite Element Method for high-contrast linear elasticity problem. (arXiv:1809.03726v1 [math.NA])      Cache   Translate Page      

Authors: Shubin Fu, Eric T. Chung

In this paper, we consider the offline and online Constraint Energy Minimizing Generalized Mul- tiscale Finite Element Method (CEM-GMsFEM) for high-contrast linear elasticity problem. Offline basis construction starts with an auxiliary multiscale space by solving local spectral problems. We select eigenfunctions that correspond to a few small eigenvalues to form the auxiliary space. Using the auxiliary space, we solve a constraint energy minimization problem to construct offline multiscale spaces. The minimization problem is defined in the oversampling domain, which is larger than the target coarse block. To get a good approximation space, the oversampling domain should be large enough. We also propose a relaxed minimization problem to construct multiscale basis functions, which will yield more accurate and robust solution. To take into account the influence of input pa- rameters, such as source terms, we propose the construction of online multiscale basis and an adaptive enrichment algorithm. We provide extensive numerical experiments on 2D and 3D models to show the performance of the proposed method.


          The Maximum Number of Three Term Arithmetic Progressions, and Triangles in Cayley Graphs. (arXiv:1809.03729v1 [math.CO])      Cache   Translate Page      

Authors: Zachary Chase

Let $G$ be a finite Abelian group. For a subset $S \subseteq G$, let $T_3(S)$ denote the number of length three arithemtic progressions in $S$ and Prob[$S$] $= \frac{1}{|S|^2}\sum_{x,y \in S} 1_S(x+y)$. For any $q \ge 1$ and $\alpha \in [0,1]$, and any $S \subseteq G$ with $|S| = \frac{|G|}{q+\alpha}$, we show $\frac{T_3(S)}{|S|^2}$ and Prob[$S$] are bounded above by $\max\left(\frac{q^2-\alpha q+\alpha^2}{q^2},\frac{q^2+2\alpha q+4\alpha^2-6\alpha+3}{(q+1)^2},\gamma_0\right)$, where $\gamma_0 < 1$ is an absolute constant. As a consequence, we verify a graph theoretic conjecture of Gan, Loh, and Sudakov for Cayley graphs.


          Nonlinear stationary subdivision schemes that reproduce trigonometric functions. (arXiv:1809.03731v1 [math.NA])      Cache   Translate Page      

Authors: Rosa Donat, Sergio López-Ureña

In this paper we define a family of nonlinear, stationary, interpolatory subdivision schemes with the capability of reproducing conic shapes including polynomials upto second order. Linear, non-stationary, subdivision schemes do also achieve this goal, but different conic sections require different refinement rules to guarantee exact reproduction. On the other hand, with our construction, exact reproduction of different conic shapes can be achieved using exactly the same nonlinear scheme. Convergence, stability, approximation and shape preservation properties of the new schemes are analyzed. In addition, the conditions to obtain $\mathcal{C}^1$ limit functions are also studied.


          Consensus of a class of nonlinear fractional-order multi-agent systems via dynamic output feedback. (arXiv:1809.03733v1 [math.OC])      Cache   Translate Page      

Authors: Elyar Zavary, Pouya Badri, Mahdi Sojoodi

This paper addresses the consensus of a class of nonlinear fractional-order multi-agent systems (FOMAS) with positive real uncertainty. First a fractional non-fragile dynamic output feedback controller is put forward via the output measurements of neighboring agents, then appropriate state transformation reduced the consensus problem to a stability one. A sufficient condition based on direct Lyapunov approach, for the robust asymptotic stability of the transformed system and subsequently for the consensus of the main system is presented. Additionally, utilizing S-procedure and Schur complement, the systematic stabilization design algorithm is proposed for fractional-order system with and without nonlinear term. The results are formulated as an optimization problem with linear matrix inequality constraints. Simulation results are given to verify the effectiveness of the theoretical results.


          Determinants of Interval Matrices. (arXiv:1809.03736v1 [math.NA])      Cache   Translate Page      

Authors: Jaroslav Horáček, Milan Hladík, Josef Matějka

In this paper we shed more light on determinants of interval matrices. Computing the exact bounds on a determinant of an interval matrix is an NP-hard problem. Therefore, attention is first paid to approximations. NP-hardness of both relative and absolute approximation is proved. Next, methods computing verified enclosures of interval determinants and their possible combination with preconditioning are discussed. A new method based on Cramer's rule was designed. It returns similar results to the state-of-the-art method, however, it is less consuming regarding computational time. As a byproduct, the Gerschgorin circles were generalized for interval matrices. New results about classes of interval matrices with polynomially computable tasks related to determinant are proved (symmetric positive definite matrices, class of matrices with identity midpoint matrix, tridiagonal H-matrices). The mentioned methods were exhaustively compared for random general and symmetric matrices.


          The Abel map for surface singularities I. Generalities and examples. (arXiv:1809.03737v1 [math.AG])      Cache   Translate Page      

Authors: János Nagy, András Némethi

Let $(X,o)$ be a complex normal surface singularity. We fix one of its good resolutions $\widetilde{X}\to X$, an effective cycle $Z$ supported on the reduced exceptional curve, and any possible (first Chern) class $l'\in H^2(\widetilde{X},\mathbb{Z})$. With these data we define the variety ${\rm ECa}^{l'}(Z)$ of those effective Cartier divisors $D$ supported on $Z$ which determine a line bundles $\mathcal{O}_Z(D)$ with first Chern class $l'$. Furthermore, we consider the affine space ${\rm Pic}^{l'}(Z)\subset H^1(\mathcal{O}_Z^*)$ of isomorphism classes of holomorphic line bundles with Chern class $l'$ and the Abel map $c^{l'}(Z):{\rm ECa}^{l'}(Z)\to {\rm Pic}^{l'}(Z)$.

The present manuscript develops the major properties of this map, and links them with the determination of the cohomology groups $H^1(Z,\mathcal{L})$, where we might vary the analytic structure $(X,o)$ (supported on a fixed topological type/resolution graph) and we also vary the possible line bundles ${\mathcal{L}}\in {\rm Pic}^{l'}(Z)$. The case of generic line bundles of ${\rm Pic}^{l'}(Z)$ and generic line bundles of the image of the Abel map will have priority roles. Rewriting the Abel map via Laufer duality based on integration of forms on divisors, we can make explicit the Abel map and its tangent map. The case of superisolated and weighted homogeneous singularities are exemplified with several details.

The theory has similar goals (but rather different techniques) as the theory of Abel map or Brill--Noether theory of reduced smooth projective curves.


          The Abel map for surface singularities II. Generic analytic structure. (arXiv:1809.03744v1 [math.AG])      Cache   Translate Page      

Authors: János Nagy, András Némethi

We study the analytic and topological invariants associated with complex normal singularities. Our goal is to provide topological formulae for several discrete analytic invariants whenever the analytic structure is generic (with respect to a fixed topological type), under the condition that the link is a rational homology sphere.

The list of analytic invariants include: the geometric genus, the cohomology of certain natural line bundles, the cohomology of their restrictions on effective cycles (in a resolution), the cohomological cycle of natural line bundles, the multivariable Hilbert and Poincar\'e series associated with the divisorial filtration, the analytic semigroup, the maximal ideal cycle.

The first part contains the definition of `generic structure' based on the work of Laufer. The second technical part rely on the properties of the Abel map developed in a previous manuscript of the authors.

The results can be compared with certain parallel statements from the Brill-Noether theory (and the theory of Abel map) associated with projective smooth curves, though the tools and machineries are very different.


          The tangential $k$-Cauchy-Fueter complexes and Hartogs' phenomenon over the right quaternionic Heisenberg group. (arXiv:1809.03748v1 [math.CV])      Cache   Translate Page      

Authors: Yun Shi, Wei Wang

We construct the tangential $k$-Cauchy-Fueter complexes on the right quaternionic Heisenberg group, as the quaternionic counterpart of $\overline{\partial}_b$-complex on the Heisenberg group in the theory of several complex variables. We can use the $L^2$ estimate to solve the nonhomogeneous tangential $k$-Cauchy-Fueter equation under the compatibility condition over this group modulo a lattice. This solution has an important vanishing property when the group is higher dimensional. It allows us to prove the Hartogs' extension phenomenon for $k$-CF functions, which are the quaternionic counterpart of CR functions.


          Joint Spatial Division and Diversity for Massive MIMO Systems. (arXiv:1809.03751v1 [cs.IT])      Cache   Translate Page      

Authors: Ke-Wen Huang, Hui-Ming Wang, Jia Hou, Shi Jin

We propose a downlink beamforming scheme that combines spatial division and orthogonal space-time block coding (OSTBC) in multi-user massive MIMO systems. The beamformer is divided into two parts: a pre-beamforming matrix to separate the users into different beams with no interference between each other, which is designed based on the low rank covariance matrix of the downlink channel, and a linear precoding matrix using partial or even no channel state information (CSI) concatenated by an OSTBC. To construct the pre-beamforming matrix, a simple method that selects columns from DFT matrix is presented. To design the linear precoding matrix with partial CSI of the effective channel after the pre-beamforming, we solve an optimization problem to minimize the pairwise error probability (PEP) of the users under an individual power or sum power constraint, respectively. For the individual power constraint, a semi-definite relaxing (SDR) method with a sufficient condition achieving the globally optimal solution is proposed to provide a performance benchmark. In addition, an efficient iterative successive convex approximation (SCA) method is provided to achieve a suboptimal solution. Furthermore, closed form solutions are derived under some special cases. For the sum power constraint, we consider two different designs, i.e., minimizing the average PEP and minimizing the maximum PEP of all users. We find that both non-convex problems have a similar structure, and proposed a unified SCA-Alternating Direction Method of Multipliers (ADMM) algorithm to handle them. The SCA-ADMM method can be implemented in a parallel manner, and thus is with great efficiency. Simulation results show the efficiency of our proposed JSDD scheme and the optimization method.


          The reproducing kernel Hilbert space approach in nonparametric regression problems with correlated observations. (arXiv:1809.03754v1 [math.ST])      Cache   Translate Page      

Authors: Djihad Benelmadani, Karim Benhenni, Sana Louhichi

In this paper we investigate the problem of estimating the regression function in models with correlated observations. The data is obtained from several experimental units each of them forms a time series. We propose a new estimator based on the in- verse of the autocovariance matrix of the observations, assumed known and invertible. Using the properties of the Reproducing Kernel Hilbert spaces, we give the asymptotic expressions of its bias and its variance. In addition, we give a theoretical comparison, by calculating the IMSE, between this new estimator and the classical one proposed by Gasser and Muller. Finally, we conduct a simulation study to investigate the performance of the proposed estimator and to compare it to the Gasser and Muller's estimator in a finite sample set.


          On the aberrations of mixed level Orthogonal Arrays with removed runs. (arXiv:1809.03759v1 [math.ST])      Cache   Translate Page      

Authors: Roberto Fontana, Fabio Rapallo

Given an Orthogonal Array we analyze the aberrations of the sub-fractions which are obtained by the deletion of some of its points. We provide formulae to compute the Generalized Word-Length Pattern of any sub-fraction. In the case of the deletion of one single point, we provide a simple methodology to find which the best sub-fractions are according to the Generalized Minimum Aberration criterion. We also study the effect of the deletion of 1, 2 or 3 points on some examples. The methodology does not put any restriction on the number of levels of each factor. It follows that any mixed level Orthogonal Array can be considered.


          Asymptotic joint spectra of Cartesian powers of strongly regular graphs and bivariate Charlier-Hermite polynomials. (arXiv:1809.03761v1 [math.CO])      Cache   Translate Page      

Authors: John Vincent S. Morales, Nobuaki Obata, Hajime Tanaka

Generalizing previous work of Hora (1998) on the asymptotic spectral analysis for the Hamming graph $H(n,q)$ which is the $n^{\mathrm{th}}$ Cartesian power $K_q^{\square n}$ of the complete graph $K_q$ on $q$ vertices, we describe the possible limits of the joint spectral distribution of the pair $(G^{\square n},\overline{G}\vphantom{G}^{\square n})$ of the $n^{\mathrm{th}}$ Cartesian powers of a strongly regular graph $G$ and its complement $\overline{G}$, where we let $n\rightarrow\infty$, and $G$ may vary with $n$. This result is an analogue of the bivariate central limit theorem, and we obtain in this way the bivariate Poisson distributions and the standard bivariate Gaussian distribution, together with the product measures of univariate Poisson and Gaussian distributions. We also report a family of bivariate hypergeometric orthogonal polynomials with respect to the last distributions, which we call the bivariate Charlier-Hermite polynomials, and prove basic formulas for them. This family of orthogonal polynomials seems previously unnoticed, possibly because of its peculiarity.


          Automorphisms and transformations of solutions to the generalised Chazy equation for various parameters. (arXiv:1809.03762v1 [math.CA])      Cache   Translate Page      

Authors: Matthew Randall

We analyse the automorphisms of solutions to Chazy's equation and the generalised Chazy equation for the parameters $k=2,3,4$ and $9$. These automorphisms are induced by triangular domains with isosceles symmetry. We also prove theorems about the transformations of solutions to the generalised Chazy equation between various different parameters. Using the transformation of solutions between parameters $k=2$ and $k=\frac{2}{3}$, we are able to prove a result about the automorphism of the solutions to the $k=\frac{2}{3}$ generalised Chazy equation.


          A negative answer to the problem: are stratifiable spaces $M_1$?. (arXiv:1809.03763v1 [math.GN])      Cache   Translate Page      

Authors: Huaipeng Chen, Gary Gruenhage, Bosen Wang

In accordance with $M_3$-structures in paper [4], we construct a stratifiable space which is not $M_1$-spaces.


          A note on reducing the computation time for minimum distance and equivalence check of binary linear codes. (arXiv:1809.03764v1 [cs.IT])      Cache   Translate Page      

Authors: Nikolay Yankov, Krassimir Enev

In this paper we show the usability of the Gray code with constant weight words for computing linear combinations of codewords. This can lead to a big improvement of the computation time for finding the minimum distance of a code. We have also considered the usefulness of combinatorial $2$-$(t,k,1)$ designs when there are memory limitations to the number of objects (linear codes in particular) that can be tested for equivalence.


          Solution of a Nonlinear Integral Equation via New Fixed Point Iteration Process. (arXiv:1809.03771v1 [math.FA])      Cache   Translate Page      

Authors: Chanchal Garodia, Izhar Uddin

In this paper, we introduce a new three-step iteration process in Banach space and prove convergence results for approximating fixed points for nonexpansive mappings. Also, we show that the newly introduced iteration process converges faster than a number of existing iteration processes. Further, we discuss about the solution of mixed type Volterra-Fredholm functional nonlinear integral equation.


          Galois connections and tense operators on q-effect algebras. (arXiv:1809.03773v1 [math.LO])      Cache   Translate Page      

Authors: Ivan Chajda, Jan Paseka

For effect algebras, the so-called tense operators were already introduced by Chajda and Paseka. They presented also a canonical construction of them using the notion of a time frame.

Tense operators express the quantifiers "it is always going to be the case that" and "it has always been the case that" and hence enable us to express the dimension of time both in the logic of quantum mechanics and in the many-valued logic.

A crucial problem concerning tense operators is their representation. Having an effect algebra with tense operators, we can ask if there exists a time frame such that each of these operators can be obtained by the canonical construction. To approximate physical real systems as best as possible, we introduce the notion of a q-effect algebra and we solve this problem for q-tense operators on q-representable q-Jauch-Piron q-effect algebras.


          A few properties of sample variance. (arXiv:1809.03774v1 [math.ST])      Cache   Translate Page      

Authors: Eric Benhamou

A basic result is that the sample variance for i.i.d. observations is an unbiased estimator of the variance of the underlying distribution (see for instance Casella and Berger (2002)). But what happens if the observations are neither independent nor identically distributed. What can we say? Can we in particular compute explicitly the first two moments of the sample mean and hence generalize formulae provided in Tukey (1957a), Tukey (1957b) for the first two moments of the sample variance? We also know that the sample mean and variance are independent if they are computed on an i.i.d. normal distribution. This is one of the underlying assumption to derive the Student distribution Student alias W. S. Gosset (1908). But does this result hold for any other underlying distribution? Can we still have independent sample mean and variance if the distribution is not normal? This paper precisely answers these questions and extends previous work of Cho, Cho, and Eltinge (2004). We are able to derive a general formula for the first two moments and variance of the sample variance under no specific assumption. We also provide a faster proof of a seminal result of Lukacs (1942) by using the log characteristic function of the unbiased sample variance estimator.


          Compressive Massive Random Access for Massive Machine-Type Communications (mMTC). (arXiv:1809.03784v1 [cs.IT])      Cache   Translate Page      

Authors: Malong Ke, Zhen Gao, Yongpeng Wu, Xiangming Meng

In future wireless networks, one fundamental challenge for massive machine-type communications (mMTC) lies in the reliable support of massive connectivity with low latency. Against this background, this paper proposes a compressive sensing (CS)-based massive random access scheme for mMTC by leveraging the inherent sporadic traffic, where both the active devices and their channels can be jointly estimated with low overhead. Specifically, we consider devices in the uplink massive random access adopt pseudo random pilots, which are designed under the framework of CS theory. Meanwhile, the massive random access at the base stations (BS) can be formulated as the sparse signal recovery problem by leveraging the sparse nature of active devices. Moreover, by exploiting the structured sparsity among different receiver antennas and subcarriers, we develop a distributed multiple measurement vector approximate message passing (DMMV-AMP) algorithm for further improved performance. Additionally, the state evolution (SE) of the proposed DMMV-AMP algorithm is derived to predict the performance. Simulation results demonstrate the superiority of the proposed scheme, which exhibits a good tightness with the theoretical SE.


          Kodaira vanishing for singular varieties revisited. (arXiv:1809.03785v1 [math.AG])      Cache   Translate Page      

Authors: Donu Arapura, Lei Song

We correct the proof and slightly strengthen a Kodaira-type vanishing theorem for singular varieties originally due to Jaffe and the first author. Specifically, we show that if $L$ is a nef and big line bundle on a projective variety of characteristic zero, the $i^{\text{th}}$ cohomology of $L^{-1}$ vanishes for $i$ in a range determined by the depth and dimension of the singular locus.


          Laplacian preconditioning of elliptic PDEs: Localization of the eigenvalues of the discretized operator. (arXiv:1809.03790v1 [math.NA])      Cache   Translate Page      

Authors: Tomáš Gergelits, Kent-André Mardal, Bjørn Fredrik Nielsen, Zdeněk Strakoš

In the paper \textit{Preconditioning by inverting the {L}aplacian; an analysis of the eigenvalues. IMA Journal of Numerical Analysis 29, 1 (2009), 24--42}, Nielsen, Hackbusch and Tveito study the operator generated by using the inverse of the Laplacian as preconditioner for second order elliptic PDEs $\nabla \cdot (k(x) \nabla u) = f$. They prove that the range of $k(x)$ is contained in the spectrum of the preconditioned operator, provided that $k$ is continuous. Their rigorous analysis only addresses mappings defined on infinite dimensional spaces, but the numerical experiments in the paper suggest that a similar property holds in the discrete case.

% Motivated by this investigation, we analyze the eigenvalues of the matrix $\bf{L}^{-1}\bf{A}$, where $\bf{L}$ and ${\bf{A}}$ are the stiffness matrices associated with the Laplace operator and general second order elliptic operators, respectively. Without any assumption about the continuity of $k(x)$, we prove the existence of a one-to-one pairing between the eigenvalues of $\bf{L}^{-1}\bf{A}$ and the intervals determined by the images under $k(x)$ of the supports of the FE nodal basis functions. As a consequence, we can show that the nodal values of $k(x)$ yield accurate approximations of the eigenvalues of $\bf{L}^{-1}\bf{A}$. Our theoretical results are illuminated by several numerical experiments.


          Outer billiards outside regular dodecagon: computer proof of periodicity of almost all orbits and existence of an aperiodic point. (arXiv:1809.03791v1 [math.DS])      Cache   Translate Page      

Authors: Filipp Rukhovich

An existence of an aperiodic point for outer billiard outside regular dodecagon is proved. Additionally, almost all orbits of such an outer billiard are proved to be periodic, and all possible periods are listed explicitly. The proof is based on facts established with computer program implemented by author. All calculations of a program has been made with absolute accuracy; these calculations can be done "by hands" but it this case, amount of calculations would be too large.


          Cut distance identifying graphon parameters over weak* limits. (arXiv:1809.03797v1 [math.CO])      Cache   Translate Page      

Authors: Martin Doležal, Jan Grebík, Jan Hladký, Israel Rocha, Václav Rozhoň

The theory of graphons comes with the so-called cut distance. The cut distance is finer than the weak* topology. Dole\v{z}al and Hladk\'y [arXiv:1705.09160] showed, that given a sequence of graphons, a cut distance accumulation graphon can be pinpointed in the set of weak* accumulation points as minimizers of the entropy. Motivated by this, we study graphon parameters with the property that their minimizers or maximizers identify cut distance accumulation points over the set of weak* accumulation points. We call such parameters cut distance identifying.

Of particular importance are cut distance identifying parameters coming from subgraph densities, $t(H,\cdot)$. It turns out that this concept is closely related to graph norms. In particular, we prove that a connected graph $H$ is step Sidorenko (a concept very similar to $t(H,\cdot)$ being cut distance identifying) if and only if it is weakly norming. This answers a question of Kr\'al', Martins, Pach and Wrochna [arXiv:1802.05007].

Further, we study convexity properties of cut distance identifying graphon parameters, and find a way to identify cut distance limits using spectra of graphons.


          The hiring problem with rank-based strategies. (arXiv:1809.03800v1 [math.PR])      Cache   Translate Page      

Authors: Svante Janson

The hiring problem is studied for general strategies based only on the relative ranking of the candidates; this includes some well known strategies studied before such as hiring above the median. We give general limit theorems for the number of hired candidates and some other properties, extending previous results. The results exhibit a dichotomy between two classes of rank-based strategies: either the asymptotics of the process are determined by the early events, with a.s. convergence of suitably normalized random variables, or there is a mixing behaviour without long-term memory and with asymptotic normality.


          Homogeneous Dynamics and Unlikely Intersections. (arXiv:1809.03802v1 [math.NT])      Cache   Translate Page      

Authors: R. Richard, A. Yafaev, T. Zamojski

This is a preliminary version of a monograph on homogeneous dynamics and application to some problems of unlikely intersections in Shimura varieties. It consists of four articles, which can be read independently. The first one, by the two first named authors, discuss the main application, to some refinement of the Andr\'{e}-Pink-Zannier conjecture about closures of subsets of restricted Hecke orbits in Shimura varieties. The second article, by the first and last named author, establishes results about the dynamics of sequences translates of some measures in spaces of $S$-arithmetic lattices. These results are the cornerstone of the methods in the first article. The last two articles, by the first named author, establish results which are crucial for the second article. The third article gives an ultrametric analogue of archimedean results of Richard and Shah, and contains methods of independent interest about stability, Berkovich spaces and Bruhat-Tits buildings. The last article is set in the same context as the second article, and discusses non-divergence of the studied sequences of translates.


          Jump inequalities for translation-invariant operators of Radon type on $\mathbb{Z}^d$. (arXiv:1809.03803v1 [math.CA])      Cache   Translate Page      

Authors: Mariusz Mirek, Elias M. Stein, Pavel Zorin-Kranich

We prove strong jump inequalities for a large class of operators of Radon type in the discrete and ergodic theoretical settings. These inequalities are the $r=2$ endpoints of the $r$-variational estimates studied in arXiv:1512.07523, and are formulated in terms of the jump quasi-seminorm. Here we rely on the facts about jumps derived in arXiv:1808.04592, and also used in arXiv:1808.09048.


          A fast Fourier transform based direct solver for the Helmholtz problem. (arXiv:1809.03808v1 [cs.NA])      Cache   Translate Page      

Authors: Jari Toivanen, Monika Wolfmayr

This paper is devoted to the efficient numerical solution of the Helmholtz equation in a two- or three-dimensional rectangular domain with an absorbing boundary condition (ABC). The Helmholtz problem is discretized by standard bilinear and trilinear finite elements on an orthogonal mesh yielding a separable system of linear equations. The main key to high performance is to employ the Fast Fourier transform (FFT) within a fast direct solver to solve the large separable systems. Numerical results for both two- and three-dimensional problems are presented confirming the efficiency of the method discussed.


          The Cosmological Semiclassical Einstein Equation as an Infinite-Dimensional Dynamical System. (arXiv:1809.03812v1 [math-ph])      Cache   Translate Page      

Authors: Hanno Gottschalk, Daniel Siemssen

We develop a comprehensive framework in which the existence of solutions to the semiclassical Einstein equation (SCE) in cosmological spacetimes is shown. Different from previous work on this subject, we do not restrict to the conformally coupled scalar field and we admit the full renormalization freedom. Based on a regularization procedure, which utilizes homogeneous distributions and is equivalent to Hadamard point-splitting, we obtain a reformulation of the evolution of the quantum state as an infinite-dimensional dynamical system with mathematical features that are distinct from the standard theory of infinite-dimensional dynamical systems (e.g. unbounded evolution operators). Nevertheless, applying new mathematical methods, we show existence of maximal/global (in time) solutions to the SCE for vacuum-like states, and of local solutions for thermal-like states. Our equations do not show the instability of the Minkowski solution described by other authors.


          Globally constraint-preserving FR/DG scheme for Maxwell's equations at all orders. (arXiv:1809.03816v1 [math.NA])      Cache   Translate Page      

Authors: Arijit Hazra, Praveen Chandrashekar, Dinshaw S. Balsara

Computational electrodynamics (CED), the numerical solution of Maxwell's equations, plays an incredibly important role in several problems in science and engineering. High accuracy solutions are desired, and the discontinuous Galerkin (DG) method is one of the better ways of delivering high accuracy in CED. Maxwell's equations have a pair of involution constraints for which mimetic schemes that globally satisfy the constraints at a discrete level are highly desirable. Balsara and Kappeli presented a von Neumann stability analysis of globally constraint-preserving DG schemes for CED up to 4'th order which was focused on developing the theory and documenting the superior dissipation and dispersion of DGTD schemes in media with constant permittivity and permeability. In this paper we present DGTD schemes for CED that go up to 5'th order of accuracy and analyze their performance when permittivity and permeability vary strongly in space. Our DGTD schemes achieve constraint preservation by collocating the electric displacement and magnetic induction as well as their higher order modes in the faces of the mesh. Our first finding is that at 4'th and higher orders, one has to evolve some zone-centered modes in addition to the face-centered modes. It is well-known that the limiting step in DG schemes causes a reduction of the optimal accuracy of the scheme. In this paper we document simulations where permittivity and permeability vary by almost an order of magnitude without requiring any limiting of the DG scheme. This very favorable finding ensures that DGTD schemes retain optimal accuracy even in the presence of large spatial variations in permittivity/permeability. Our third finding shows that the electromagnetic energy is conserved very well even when permittivity and permeability vary strongly in space; as long as the conductivity is zero.


          Delayed and rushed motions through time change. (arXiv:1809.03818v1 [math.PR])      Cache   Translate Page      

Authors: Raffaela Capitanelli, Mirko D'Ovidio

We consider time changes given by subordinators and their inverse processes. Our analysis shows that, quite surprisingly, inverse processes are not necessarily leading to delayed processes.


          The Undirected Two Disjoint Shortest Paths Problem. (arXiv:1809.03820v1 [math.CO])      Cache   Translate Page      

Authors: Marinus Gottschau, Marcus Kaiser, Clara Waldmann

The $k$ disjoint shortest paths problem ($k$-DSPP) on a graph with $k$ source-sink pairs $(s_i, t_i)$ asks for the existence of $k$ pairwise edge- or vertex-disjoint shortest $s_i$-$t_i$-paths. It is known to be NP-complete if $k$ is part of the input. Restricting to $2$-DSPP with strictly positive lengths, it becomes solvable in polynomial time. We extend this result by allowing zero edge lengths and give a polynomial time algorithm based on dynamic programming for $2$-DSPP on undirected graphs with non-negative edge lengths.


          On higher special elements of $p$-adic representations. (arXiv:1809.03830v1 [math.NT])      Cache   Translate Page      

Authors: David Burns, Takamichi Sano, Kwok-Wing Tsoi

As a natural generalization of the notion of `higher rank Euler system', we develop a theory of `higher special elements' in the exterior power biduals of the Galois cohomology of $p$-adic representations. We show, in particular, that such elements encode detailed information about the structure of Galois cohomology groups and are related by families of congruences involving natural height pairings on cohomology. As a first concrete application of the approach, we use it to refine, and extend, a variety of existing results and conjectures concerning the values of derivatives of Dirichlet $L$-series.


          The 6-element case of S-Frankl conjecture (I). (arXiv:1809.03836v1 [math.CO])      Cache   Translate Page      

Authors: Ze-Chun Hu, Shi-Lun Li

The union-closed sets conjecture (Frankl's conjecture) says that for any finite union-closed family of finite sets, other than the family consisting only of the empty set, there exists an element that belongs to at least half of the sets in the family. In [3], a stronger version of Frankl's conjecture (S-Frankl conjecture for short) was introduced and a partial proof was given. In particular, it was proved in \cite{CH17} that S-Frankl conjecture holds for $n\leq 5$, where $n$ is the number of all the elements in the family of sets. Now, we want to prove that it holds for $n=6$. Since the paper is very long, we split it into two parts. This is the first part.


          Eigenstates of Linear Combinations of Phase Operators. (arXiv:1809.03844v1 [quant-ph])      Cache   Translate Page      

Authors: C.V.Sukumar

The eigenstates of linear combinations of the Susskind and Glogowerphase operators for the harmonic oscillator are constructed. It is shown that such eigenstates are squeezed states.


          On the motion of a fluid-filled rigid body with Navier Boundary conditions. (arXiv:1809.03852v1 [math.AP])      Cache   Translate Page      

Authors: Giusy Mazzone, Jan Pruess, Gieri Simonett

We consider the inertial motion of a system constituted by a rigid body with an interior cavity entirely filled with a viscous incompressible fluid. Navier boundary conditions are imposed on the cavity surface. We prove the existence of weak solutions and determine the critical spaces for the governing evolution equation. Using parabolic regularization in time-weighted spaces, we establish regularity of solutions and their long-time behavior. We show that every weak solution \`a la Leray-Hopf to the equations of motion converges to an equilibrium at an exponential rate in the $L_q$-topology for every fluid-solid configuration. A nonlinear stability analysis shows that equilibria associated with the largest moment of inertia are asymptotically (exponentially) stable, whereas all other equilibria are normally hyperbolic and unstable in an appropriate topology.


          Robust Energy Efficient Beamforming in MISOME-SWIPT Systems With Proportional Secrecy Rate. (arXiv:1809.03856v1 [cs.IT])      Cache   Translate Page      

Authors: Yanjie Dong, Md. Jahangir Hossain, Julian Cheng, Victor C. M. Leung

The joint design of beamforming vector and artificial noise covariance matrix is investigated for the multiple-input-single-output-multiple-eavesdropper simultaneous wireless information and power transferring \mbox{(MISOME-SWIPT)} systems. In the MISOME-SWIPT system, the base station delivers information signals to the legitimate user equipments and broadcasts jamming signals to the eavesdroppers. A secrecy energy efficiency (SEE) maximization problem is formulated for the considered \mbox{MISOME-SWIPT} system with imperfect channel state information, where the SEE is defined as the ratio of sum secrecy rate over total power consumption. Since the formulated SEE maximization problem is non-convex, it is first recast into a series of convex problems in order to obtain the optimal solution with a reasonable computational complexity. Two suboptimal solutions are also proposed based on the heuristic beamforming techniques that trade performance for computational complexity. In addition, the analysis of computational complexity is performed for the optimal and suboptimal solutions. Numerical results are used to verify the performance of proposed algorithms and to reveal practical insights.


          Euler's divergent series in arithmetic progressions. (arXiv:1809.03859v1 [math.NT])      Cache   Translate Page      

Authors: Anne-Maria Ernvall-Hytönen, Tapani Matala-aho, Louna Seppälä

Let $\xi$ and $m$ be integers satisfying $\xi\ne 0$ and $m\ge 3$. We show that for any given integers $a$ and $b$, $b \neq 0$, there are $\frac{\varphi(m)}{2}$ reduced residue classes modulo $m$ each containing infinitely many primes $p$ such that $a-bF_p(\xi) \ne 0$, where $F_p(\xi)=\sum_{n=0}^\infty n!\xi^n$ is the $p$-adic evaluation of Euler's factorial series at the point $\xi$.


          Equivalence of two BV classes of functions in metric spaces, and existence of a Semmes family of curves under a $1$-Poincar\'e inequality. (arXiv:1809.03861v1 [math.MG])      Cache   Translate Page      

Authors: Estibalitz Durand-Cartagena, Sylvester Eriksson-Bique, Riikka Korte, Nageswari Shanmugalingam

We consider two notions of functions of bounded variation in complete metric measure spaces, one due to Martio and the other due to Miranda~Jr. We show that these two notions coincide, if the measure is doubling and supports a $1$-Poincar\'e inequality. In doing so, we also prove that if the measure is doubling and supports a $1$-Poincar\'e inequality, then the metric space supports a \emph{Semmes family of curves} structure.


          Fixed point on partial metric type spaces. (arXiv:1809.03862v1 [math.GN])      Cache   Translate Page      

Authors: Yaé Ulrich Gaba

In this paper, we study some new fixed point results for self maps defined on partial metric type spaces. In particular, we give common fixed point theorems in the same setting. Some examples are given which illustrate the results.


          On association in Colombeau algebras without asymptotics. (arXiv:1809.03865v1 [math.FA])      Cache   Translate Page      

Authors: Eduard A. Nigsch

A recent variant of Colombeau algebras does not employ asymptotic estimates for its definition. We discuss how the concept of association with distributions transfers to this setting and why it still needs to be based on asymptotics.


          Intransitive Machines. (arXiv:1809.03869v1 [math.HO])      Cache   Translate Page      

Authors: Alexander Poddiakov

The intransitive cycle of superiority is characterized by such binary relations between A, B, and C that A is superior to B, B is superior to C, and C is superior to A (i.e., A>B>C>A - in contrast with transitive relations A>B>C). The first part of the article presents a brief review of studies of intransitive cycles in various disciplines (mathematics, biology, sociology, logical games, decision theory, etc.), and their reflections in educational materials. The second part of the article introduces the issue of intransitivity in elementary physics. We present principles of building mechanical intransitive devices in correspondence with the structure of the Condorcet paradox, and describe five intransitive devices: intransitive gears; levers; pulleys, wheels, and axles; wedges; inclined planes. Each of the mechanisms are constructed as compositions of simple machines and show paradoxical intransitivity of relations such as "to rotate faster than", "to lift", "to be stronger than" in some geometrical constructions. The article is an invitation to develop teaching materials and problems advancing the understanding of transitivity and intransitivity in various areas, including physics education.


          Dicounted Hamilton-Jacobi Equation on Networks and Asymptotic Analysis. (arXiv:1809.03872v1 [math.AP])      Cache   Translate Page      

Authors: Marco Pozza, Antonio Siconolfi

We study discounted Hamilton Jacobi equations on networks, without putting any restriction on their geometry. Assuming the Hamiltonians continuous and coercive, we establish a comparison principle and provide representation formulae for solutions. We follow the approach introduced in 11, namely we associate to the differential problem on the network, a discrete functional equation on an abstract underlying graph. We perform some qualitative analysis and single out a distinguished subset of vertices, called lambda Aubry set, which shares some properties of the Aubry set for Eikonal equations on compact manifolds. We finally study the asymptotic behavior of solutions and lambda Aubry sets as the discount factor lambda becomes infinitesimal.


          On the genericity of positive exponents of conservative skew products with two-dimensional fibers. (arXiv:1809.03874v1 [math.DS])      Cache   Translate Page      

Authors: Davi Obata, Mauricio Poletti

In this paper we study the existence of positive Lyapunov exponents for three different types of skew products, whose fibers are compact Riemannian surfaces and the action on the fibers are by volume preserving diffeomorphisms. These three types include skew products with a volume preserving Anosov diffeomorphism on the basis; or with a subshift of finite type on the basis preserving a measure with product structure; or locally constant skew products with Bernoulli shifts on the basis. We prove the $C^1$-density and $C^r$-openess of the existence of positive Lyapunov exponents on a set of positive measure in the space of such skew products.


          Nuclearity for Fourier integral operators in $L^p$-spaces. (arXiv:1809.03876v1 [math.SP])      Cache   Translate Page      

Authors: Duván Cardona

In this note we study sharp sufficient conditions for the nuclearity of Fourier integral operators on $L^p$-spaces, $1< p\leq 2$. Our conditions and those presented in Cardona [2] provide a systematic investigation on the subject for all $1<p<\infty.$


          Generalized multipliers for left-invertible operators and applications. (arXiv:1809.03882v1 [math.FA])      Cache   Translate Page      

Authors: Pawel Pietrzycki

We introduce generalized multipliers for left-invertible operators which formal Laurent series $U_x(z)=\sum_{n=1}^\infty(P_ET^{n}x) \frac{1}{z^n}+\sum_{n=0}^\infty(P_E{T^{\prime*}}^{n}x)z^n$ actually represent analytic functions on an annulus or a disc.


          Rational equivalence and Lagrangian tori on K3 surfaces. (arXiv:1809.03892v1 [math.SG])      Cache   Translate Page      

Authors: Nick Sheridan, Ivan Smith

Fix a symplectic K3 surface X homologically mirror to an algebraic K3 surface Y by an equivalence taking a graded Lagrangian torus L in X to the skyscraper sheaf of a point y of Y. We show there are Lagrangian tori with vanishing Maslov class in X whose class in the Grothendieck group of the Fukaya category is not generated by Lagrangian spheres. This is mirror to a statement about the `Beauville--Voisin subring' in the Chow groups of Y, and fits into a conjectural relationship between Lagrangian cobordism and rational equivalence of algebraic cycles.


          Geometric Surface-Based Tracking Control of a Quadrotor UAV under Actuator Constraints. (arXiv:1809.03898v1 [math.OC])      Cache   Translate Page      

Authors: Michalis Ramp, Evangelos Papadopoulos

This paper presents contributions on nonlinear tracking control systems for a quadrotor unmanned micro aerial vehicle. New controllers are proposed based on nonlinear surfaces composed by tracking errors that evolve directly on the nonlinear configuration manifold thus inherently including in the control design the nonlinear characteristics of the SE(3) configuration space. In particular geometric surface-based controllers are developed, and through rigorous stability proofs they are shown to have desirable closed loop properties that are almost global. A region of attraction, independent of the position error, is produced and its effects are analyzed. A strategy allowing the quadrotor to achieve precise attitude tracking while simultaneously following a desired position command and complying to actuator constraints in a computationally inexpensive manner is derived. This important contribution differentiates this work from existing Geometric Nonlinear Control System solutions (GNCSs) since the commanded thrusts can be realized by the majority of quadrotors produced by the industry. The new features of the proposed GNCSs are illustrated by numerical simulations of aggressive maneuvers and a comparison with a GNCSs from the bibliography.


          LOS MIMO Design based on Multiple Optimum Antenna Separations. (arXiv:1809.03899v1 [eess.SP])      Cache   Translate Page      

Authors: Mario H. Castañeda García, Marcin Iwanow, Richard A. Stirling-Gallacher

The use of multiple antennas in a transmit and receive antenna array for MIMO wireless communication allows the spatial degrees of freedom in rich scattering environments to be exploited. However, for line-of-sight (LOS) MIMO channels with uniform linear arrays (ULAs) at the transmitter and receiver, the antenna separations at the transmit and receive array need to be optimized to maximize the spatial degrees of freedom and the channel capacity. In this paper, we first revisit the derivation of the optimum antenna separation at the transmit and receive ULAs in a LOS MIMO system, and provide the general expression for the optimum antenna separation product, which consists of multiple solutions. Although only the solution corresponding to the smallest antenna separation product is usually considered in the literature, we exploit the multiple solutions for a LOS MIMO design over a range of distances between the transmitter and receiver. In particular, we consider the LOS MIMO design in a vehicle-to-vehicle (V2V) communication scenario, over a range of distances between the transmit and receive vehicle.


          Explicit examples in Ergodic Optimization. (arXiv:1809.03900v1 [math.DS])      Cache   Translate Page      

Authors: Hermes H. Ferreira, Artur O. Lopes, Elismar R. Oliveira

Denote by $T$ the transformation $T(x)= 2 \,x $ (mod 1). Given a potential $A:S^1 \to \mathbb{R}$ we are interested in exhibiting explicit examples of calibrated subactions $V: S^1 \to \mathbb{R}$ for $A$. The action of the $1/2$-operator $\mathcal{G}$ acting on H\"older functions $f: S^1 \to \mathbb{R}$ was analyzed in a companion paper by the same authors. The sharp numerical evidence obtained from this algorithm in several examples permits to guess explicit expressions for the subaction: among them for $A(x) = \sin^2 ( 2 \pi x)$ and $A(x) = \sin ( 2 \pi x)$. Here, among other things, we present a piecewise analytical expression for these calibrated subactions. The explicit expression of the subaction can help to localize the maximizing probability. The algorithm can also be applied to the estimation of the joint spectral radius of matrices. We present an example of a potential $A$ which is equal to its subaction. We also analyze the case where the subaction is not unique. Moreover, we briefly present the version of the $1/2$-algorithm for the estimation of the main eigenfunction of the Ruelle operator.


          On the irreducibility of Severi varieties on K3 surfaces. (arXiv:1809.03914v1 [math.AG])      Cache   Translate Page      

Authors: Ciro Ciliberto, Thomas Dedieu

Let $(S,L)$ be a polarized $K3$ surface of genus $p \geqslant 11$ such that $\mathrm{Pic}(S)=\mathbf{Z}[L]$, and $\delta$ a non-negative integer. We prove that if $p\geqslant 4\delta-3$, then the Severi variety of $\delta$-nodal curves in $|L|$ is irreducible.


          Computing the resolvent of the sum of operators with application to best approximation problems. (arXiv:1809.03921v1 [math.OC])      Cache   Translate Page      

Authors: Minh N. Dao, Hung M. Phan

We propose a flexible approach for computing the resolvent of the sum of weakly monotone operators in real Hilbert spaces. This relies on splitting methods where strong convergence is guaranteed. We also prove linear convergence under Lipschitz continuity assumption. The approach is then applied to computing the proximity operator of the sum of weakly convex functions, and particularly to finding the best approximation to the intersection of convex sets.


          Constructive regularization of the random matrix norm. (arXiv:1809.03926v1 [math.PR])      Cache   Translate Page      

Authors: Elizaveta Rebrova

We show a simple local norm regularization algorithm that works with high probability. Namely, we prove that if the entries of a $n \times n$ matrix $A$ are i.i.d. symmetrically distributed and have finite second moment, it is enough to zero out a small fraction of the rows and columns of $A$ with largest $L_2$ norms in order to bring the operator norm of $A$ to the almost optimal order $O(\sqrt{\log \log n \cdot n})$. As a corollary, we also obtain a constructive procedure to find a small submatrix of $A$ that one can zero out to achieve the same goal. This work is a natural continuation of our recent work with R. Vershynin, where we have shown that the norm of $A$ can be reduced to the optimal order $O(\sqrt{n})$ by zeroing out just a small submatrix of $A$, but did not provide a constructive procedure to find this small submatrix. Our current approach extends the norm regularization techniques developed for the graph adjacency (Bernoulli) matrices in the works of Feige and Ofek, and Le, Levina and Vershynin to the considerably broader class of matrices.


          A Short Note on Integral Transformations and Conversion Formulas for Sequence Generating Functions. (arXiv:1809.03933v1 [math.CO])      Cache   Translate Page      

Authors: Maxie D. Schmidt

The purpose of this note is to provide an expository introduction to some more curious integral formulas and transformations involving generating functions. We seek to generalize these results and integral representations which effectively provide a mechanism for converting between a sequence's ordinary and exponential generating function (OGF and EGF, respectively) and vice versa. The Laplace transform provides an integral formula for the EGF-to-OGF transformation, where the reverse OGF-to-EGF operation requires more careful integration techniques. We prove two variants of the OGF-to-EGF transformation integrals from the Hankel loop contour for the reciprocal gamma function and from Fourier series expansions of integral representations for the Hadamard product of two generating functions, respectively. We also suggest several generalizations of these integral formulas and provide new examples along the way.


          MIMO Mutli-Cell Processing: Optimal Precoding and Power Allocation. (arXiv:1809.03937v1 [cs.IT])      Cache   Translate Page      

Authors: Samah A. M. Ghanem

We investigate the optimal power allocation and optimal precoding for a cluster of two BSs which cooperate to jointly maximize the achievable rate for two users connecting to each BS in a MCP framework. This framework is modeled by a virtual network MIMO channel due to the framework of full cooperation. In particular, due to sharing the CSI and data between the two BSs over the backhaul link. We provide a generalized fixed point equation of the optimal precoder in the asymptotic regimes of the low- and high-snr. We introduce a new iterative approach that leads to a closed-form expression for the optimal precoding matrix in the high-snr regime which is known to be an NP-hard problem. Two MCP distributed algorithms have been introduced, a power allocation algorithm for the UL, and a precoding algorithm for the DL.


          On Hopf algebras over basic Hopf algebras of dimension 24. (arXiv:1809.03938v1 [math.QA])      Cache   Translate Page      

Authors: Rongchuan Xiong

We determine finite-dimensional Hopf algebras over an algebraically closed field of characteristic zero, whose Hopf coradical is isomorphic to a non-pointed basic Hopf algebra of dimension $24$ and the infinitesimal braidings are simple objects, under the assumption that the diagrams are strictly graded. In particular, we obtain families of new finite-dimensional Hopf algebras without the dual Chevalley property.


          Structural Analysis and Control of a Model of Two-site Electricity and Heat Supply. (arXiv:1809.03939v1 [math.OC])      Cache   Translate Page      

Authors: Hikaru Hoshino, Yoshihiko Susuki, T.John Koo, Takashi Hikihara

This paper introduces a control problem of regulation of energy flows in a two-site electricity and heat supply system, where two Combined Heat and Power (CHP) plants are interconnected via electricity and heat flows. The control problem is motivated by recent development of fast operation of CHP plants to provide ancillary services of power system on the order of tens of seconds to minutes. Due to the physical constraint that the responses of the heat subsystem are not necessary as fast as those of the electric subsystem, the target controlled state is not represented by any isolated equilibrium point, implying that stability of the system is lost in the long-term sense on the order of hours. In this paper, we first prove in the context of nonlinear control theory that the state-space model of the two-site system is non-minimum phase due to nonexistence of isolated equilibrium points of the associated zero dynamics.Instead, we locate a one-dimensional invariant manifold that represents the target controlled flows completely. Then, by utilizing a virtual output under which the state-space model becomes minimum phase, we synthesize a controller that achieves not only the regulation of energy flows in the short-term regime but also stabilization of an equilibrium point in the long-term regime. Effectiveness of the synthesized controller is established with numerical simulations with a practical set of model parameters.


          The determined property of Baire in reverse math. (arXiv:1809.03940v1 [math.LO])      Cache   Translate Page      

Authors: Eric Astor, Damir Dzhafarov, Antonio Montalbán, Reed Solomon, Linda Brown Westrick

We define the notion of a determined Borel code in reverse math, and consider the principle $DPB$, which states that every determined Borel set has the property of Baire. We show that this principle is strictly weaker than $ATR$. Any $\omega$-model of $DPB$ must be closed under hyperarithmetic reduction, but $DPB$ is not a theory of hyperarithmetic analysis. We show that whenever $M\subseteq 2^\omega$ is the second-order part of an $\omega$-model of $DPB$, then for every $Z \in M$, there is a $G \in M$ such that $G$ is $\Delta^1_1$-generic relative to $Z$.


          Multi-domain Spectral Collocation Method for Variable-Order Nonlinear Fractional Differential Equations. (arXiv:1809.03945v1 [math.NA])      Cache   Translate Page      

Authors: Tinggang Zhao, Zhiping Mao, George Em Karniadakis

Spectral and spectral element methods using Galerkin type formulations are efficient for solving linear fractional PDEs (FPDEs) of constant order but are not efficient in solving nonlinear FPDEs and cannot handle FPDEs with variable-order. In this paper, we present a multi-domain spectral collocation method that addresses these limitations. We consider FPDEs in the Riemann-Liouville sense, and employ Jacobi Lagrangian interpolants to represent the solution in each element. We provide variable-order differentiation formulas, which can be computed efficiently for the multi-domain discretization taking into account the nonlocal interactions. We enforce the interface continuity conditions by matching the solution values at the element boundaries via the Lagrangian interpolants, and in addition we minimize the jump in (integer) fluxes using a penalty method. We analyze numerically the effect of the penalty parameter on the condition number of the global differentiation matrix and on the stability and convergence of the penalty collocation scheme. We demonstrate the effectiveness of the new method for the fractional Helmholtz equation of constant and variable-order using $h-p$ refinement for different values of the penalty parameter. We also solve the fractional Burgers equation with constant and variable-order and compare with solutions obtained with a single domain spectral collocation method.


          Real algebraic curves of bidegree (5,5) on the quadric ellipsoid. (arXiv:1809.03946v1 [math.AG])      Cache   Translate Page      

Authors: Matilde Manzaroli

We complete the topological classification of real algebraic non-singular curves of bidegree $(5, 5)$ on the quadric ellipsoid. We show in particular that previously known restrictions form a complete system for this bidegree. Therefore, the main part of the paper concerns the construction of real algebraic curves. Our strategy is first to reduce to the construction of curves in the second Hirzebruch surface by degenerating the quadric ellipsoid to the quadratic cone. Next, we combine different classical construction methods on toric surfaces, such as Dessin d'enfants and and Viro's patchworking method.


          Linear and nonlinear equations for beams and degenerate plates with multiple intermediate piers. (arXiv:1809.03948v1 [math.AP])      Cache   Translate Page      

Authors: Maurizio Garrione, Filippo Gazzola

A full theory for hinged beams and degenerate plates with multiple intermediate piers is developed. The analysis starts with the variational setting and the study of the linear stationary problem in one dimension. Well-posedness results are provided and the possible loss of regularity, due to the presence of the piers, is underlined. A complete spectral theorem is then proved, explicitly determining the eigenvalues on varying of the position of the piers and exhibiting the fundamental modes of oscillation. The obtained eigenfunctions are used to tackle the study of the nonlinear evolution problem in presence of different nonlinearities, focusing on the appearance of linear and (a suitable notion of) nonlinear instability, with a twofold goal: finding the most reliable nonlinearity describing the oscillations of real structures and determining the position of the piers that maximizes the stability of the structure. The last part of the paper is devoted to the study of degenerate plate models, where the structure is composed by a central beam moving vertically and by a continuum of cross-sections free to rotate around the beam and allowed to deflect from the horizontal equilibrium position. The torsional instability of the structure is investigated, taking into account the impact of different nonlinear terms aiming at modeling the action of cables and hangers in a suspension bridge. Again, the optimal position of the piers in terms of stability is discussed. The stability analysis is carried out both by means of analytical tools, such as Floquet theory, and numerical experiments. Several open problems and possible future developments are presented.


          Partial and full hyper-viscosity for Navier-Stokes and primitive equations. (arXiv:1809.03954v1 [math.AP])      Cache   Translate Page      

Authors: Amru Hussein

The $3$-D primitive equations and incompressible Navier-Stokes equations with full hyper-viscosity and only horizontal hyper-viscosity are considered on the torus, i.e., the diffusion term $-\Delta$ is replaced by $-\Delta+ \varepsilon(-\Delta)^{l}$ or by $-\Delta + \varepsilon(-\Delta_H)^{l}$, respectively, where $\Delta_H = \partial_x^2+\partial_y^2 $, $\Delta= \Delta_H + \partial_z^2$, $\varepsilon> 0$, $l>1$. Hyper-viscosity is applied in many numerical schemes, and in particular horizontal hyper-viscosity appears in meteorological models. A classical result by Lions states that for the Navier-Stokes equations uniqueness of global weak solutions for initial data in $L^2$ holds if $-\Delta$ is replaced by $(-\Delta)^{5/4}$. Here, for the primitive equations the corresponding result is proven for $(-\Delta)^{8/5}$. For the case of horizontal hyper-viscosity $l=2$ is sufficient in both cases. Strong convergence for $\varepsilon\to 0$ of hyper-viscous solutions to a weak solution of the Navier-Stokes and primitive equations, respectively, is proven as well. The approach presented here is based on the construction of strong solutions via an evolution equation approach for initial data in $L^2$ and weak-strong uniqueness.


          Dimension walks on $\mathbb{S}^d \times \mathbb{R}$. (arXiv:1809.03955v1 [math.CA])      Cache   Translate Page      

Authors: N. H. Bingham, Tasmin L. Symons

We verify that the established one- and two-step recurrences for positive definite functions on spheres extend to the spatio-temporal case.


          Taut Foliations, Positive 3-Braids, and the L-Space Conjecture. (arXiv:1809.03959v1 [math.GT])      Cache   Translate Page      

Authors: Siddhi Krishna

We construct taut foliations in every closed 3-manifold obtained by $r$-framed Dehn surgery along a positive 3-braid knot $K$ in $S^3$, where $r < 2g(K)-1$ and $g(K)$ denotes the Seifert genus of $K$. This confirms a prediction of the L-space Conjecture. For instance, we produce taut foliations in every non-L-space obtained by surgery along the pretzel knot $P(-2,3,7)$, and indeed along every pretzel knot $P(-2,3,q)$, for $q$ a positive odd integer. This is the first construction of taut foliations for every non-L-space obtained by surgery along an infinite family of hyperbolic L-space knots. Additionally, we construct taut foliations in every closed 3-manifold obtained by $r$-framed Dehn surgery along a positive 1-bridge braid in $S^3$, where $r <g(K)$.


          Curved fronts in a shear flow: case of combustion nonlinearities. (arXiv:1809.03963v1 [math.AP])      Cache   Translate Page      

Authors: Mohammad El Smaily

We prove the existence and uniqueness, up to a shift in time, of curved traveling fronts for a reaction-advection-diffusion equation with a combustion-type nonlinearity. The advection is through a shear flow $q$. This analyzes, for instance, the shape of flames produced by a Bunsen burner in the presence of advection. We also give a formula for the speed of propagation of these conical fronts in terms of the well-known speed of planar pulsating traveling waves.


          The descent of biquaternion algebras in characteristic two. (arXiv:1809.03965v1 [math.AC])      Cache   Translate Page      

Authors: Demba Barry, Adam Chapman, Ahmed Laghribi

In this paper we associate an invariant to a biquaternion algebra $B$ over a field $K$ with a subfield $F$ such that $K/F$ is a quadratic separable extension and $\operatorname{char}(F)=2$. We show that this invariant is trivial exactly when $B \cong B_0 \otimes K$ for some biquaternion algebra $B_0$ over $F$. We also study the behavior of this invariant under certain field extensions and provide several interesting examples.


          More Cases Where the Kruskal-Katona Bound is Tight. (arXiv:1809.03967v1 [math.CO])      Cache   Translate Page      

Authors: Robert Cowen

In graph theory, knowing the number of complete subgraphs with r vertices that a graph g has, limits the number of its complete subgraphs with s vertices, for s > r. A useful upper bound is provided by the Kruskal-Katona theorem, but this bound is often not tight. In this note, we add to the known cases where this bound is tight and begin an investigation of tight bounded graph sequences.


          Cusp Universality for Random Matrices I: Local Law and the Complex Hermitian Case. (arXiv:1809.03971v1 [math.PR])      Cache   Translate Page      

Authors: László Erdős, Torben Krüger, Dominik Schröder

For complex Wigner-type matrices, i.e. Hermitian random matrices with independent, not necessarily identically distributed entries above the diagonal, we show that at any cusp singularity of the limiting eigenvalue distribution the local eigenvalue statistics are universal and form a Pearcey process. Since the density of states typically exhibits only square root or cubic root cusp singularities, our work complements previous results on the bulk and edge universality and it thus completes the resolution of the Wigner-Dyson-Mehta universality conjecture for the last remaining universality type in the complex Hermitian class. Our analysis holds not only for exact cusps, but approximate cusps as well, where an extended Pearcey process emerges. As a main technical ingredient we prove an optimal local law at the cusp for both symmetry classes. This result is also used in the companion paper [18] where the cusp universality for real symmetric Wigner-type matrices is proven.


          Complex dynamic of the system of nonlinear difference equations in the Hilbert space. (arXiv:1809.03980v1 [math.AP])      Cache   Translate Page      

Authors: O.O. Pokutnyi

In the given article the necessary and sufficient conditions of the existence of solutions of boundary value problem for the nonlinear system in the Hilbert spaces are obtained. Examples of such systems like a Lotka-Volterra are considered. Bifurcation and branching conditions of solutions are obtained.


          C*-algebras of stable rank one and their Cuntz semigroups. (arXiv:1809.03984v1 [math.OA])      Cache   Translate Page      

Authors: Ramon Antoine, Francesc Perera, Leonel Robert, Hannes Thiel

The uncovering of new structure on the Cuntz semigroup of a C*-algebra of stable rank one leads to several applications: We answer affirmatively, for the class of stable rank one C*-algebras, a conjecture by Blackadar and Handelman on dimension functions, the Global Glimm Halving problem, and the problem of realizing functions on the cone of 2-quasitraces as ranks of Cuntz semigroup elements. We also gain new insights into the comparability properties of positive elements in C*-algebras of stable rank one.


          Efficient Statistics, in High Dimensions, from Truncated Samples. (arXiv:1809.03986v1 [math.ST])      Cache   Translate Page      

Authors: Constantinos Daskalakis, Themis Gouleakis, Christos Tzamos, Manolis Zampetakis

We provide an efficient algorithm for the classical problem, going back to Galton, Pearson, and Fisher, of estimating, with arbitrary accuracy the parameters of a multivariate normal distribution from truncated samples. Truncated samples from a $d$-variate normal ${\cal N}(\mathbf{\mu},\mathbf{\Sigma})$ means a samples is only revealed if it falls in some subset $S \subseteq \mathbb{R}^d$; otherwise the samples are hidden and their count in proportion to the revealed samples is also hidden. We show that the mean $\mathbf{\mu}$ and covariance matrix $\mathbf{\Sigma}$ can be estimated with arbitrary accuracy in polynomial-time, as long as we have oracle access to $S$, and $S$ has non-trivial measure under the unknown $d$-variate normal distribution. Additionally we show that without oracle access to $S$, any non-trivial estimation is impossible.


          The $\epsilon$-error Capacity of Symmetric PIR with Byzantine Adversaries. (arXiv:1809.03988v1 [cs.IT])      Cache   Translate Page      

Authors: Qiwen Wang, Hua Sun, Mikael Skoglund

The capacity of symmetric private information retrieval with $K$ messages, $N$ servers (out of which any $T$ may collude), and an omniscient Byzantine adversary (who can corrupt any $B$ answers) is shown to be $1 - \frac{T+2B}{N}$ [1], under the requirement of zero probability of error. In this work, we show that by weakening the adversary slightly (either providing secret low rate channels between the servers and the user, or limiting the observation of the adversary), and allowing vanishing probability of error, the capacity increases to $1 - \frac{T+B}{N}$.


          DLR equations and rigidity for the Sine-beta process. (arXiv:1809.03989v1 [math.PR])      Cache   Translate Page      

Authors: David Dereudre, Adrien Hardy, Thomas Leblé, Mylène Maïda

We investigate Sine$_\beta$, the universal point process arising as the thermodynamic limit of the microscopic scale behavior in the bulk of one-dimensional log-gases, or $\beta$-ensembles, at inverse temperature $\beta>0$. We adopt a statistical physics perspective, and give a description of Sine$_\beta$ using the Dobrushin-Landford-Ruelle (DLR) formalism by proving that it satisfies the DLR equations: the restriction of Sine$_\beta$ to a compact set, conditionally to the exterior configuration, reads as a Gibbs measure given by a finite log-gas in a potential generated by the exterior configuration. Moreover, we show that Sine$_\beta$ is number-rigid and tolerant in the sense of Ghosh-Peres, i.e. the number, but not the position, of particles lying inside a compact set is a deterministic function of the exterior configuration. Our proof of the rigidity differs from the usual strategy and is robust enough to include more general long range interactions in arbitrary dimension.


          On the Relation between Very Weak and Leray-Hopf Solutions to Navier-Stokes Equations. (arXiv:1809.03991v1 [math.AP])      Cache   Translate Page      

Authors: Giovanni P. Galdi

We prove a general result that implies that very weak solutions to the Cauchy problem for the Navier-Stokes equations must be, in fact, Leray-Hopf solutions if only their initial data are (solenoidal) with finite kinetic energy.


          Convex functions on graphs: Sum of the eigenvalues. (arXiv:1809.03996v1 [math.CO])      Cache   Translate Page      

Authors: Asghar Bahmani

Let $G$ be a simple graph with the Laplacian matrix $L(G)$ and let $e(G)$ be the number of edges of $G$. A conjecture by Brouwer and a conjecture by Grone and Merris state that the sum of the $k$ largest Laplacian eigenvalues of $G$ is at most $e(G)+\binom{k+1}{2}$ and $\sum_{i=1}^{k}d_{i}^{*}$, respectively, where $(d_{i}^{*})_{i}$ is the conjugate of the degree sequence $(d_i)_{i}$. We generalize these conjectures to weighted graphs and symmetric matrices. Moreover, among other results we show that under some assumptions, concave upper bounds on convex functions of symmetric real matrices are equivalent to concave upper bounds on convex functions of $(0,1)$ matrices.


          Eigenfunction expansions and scattering theory associated with the Dirac equation. (arXiv:1809.03998v1 [math.CA])      Cache   Translate Page      

Authors: Lev Sakhnovich

The classical Lippmann-Schwinger equation (LS equation) plays an important role in the scattering theory for the non-relativistic case (Schr\"odinger equation). In our previous paper arXiv:1801.05370, we consider the relativistic analogue of the Lippmann-Schwinger equation (RLS equation). We represent the corresponding equation in the integral form. In the present paper, we use the corresponding integral equation and investigate the scattering problems for both stationary and dynamical cases. Our approach allows us to develop an RLS equation theory which is comparable in its completeness with the theory of the LS equation. In particular, we consider the eigenfunction expansion associated with the relativistic Dirac equation. We note that the works on the theory of the LS equation serve as a model for us.


          Relativistic formulation of abstract evolution equations. (arXiv:1809.04001v1 [math.AP])      Cache   Translate Page      

Authors: Yoritaka Iwata

The relativistic formulation of abstract evolution equations is introduced. The corresponding logarithmic representation is shown to exist without assuming the invertible property of evolution operators. Consequently, by means of the logarithmic representation of operators, nonlinear and discrete properties are shown to be valid to the infinitesimal generators of relativistic abstract evolution equations.


          Subgroupoids and groupoid embeddings. (arXiv:1809.04003v1 [math.GT])      Cache   Translate Page      

Authors: João Nuno Mestre, Martin Weilandt

Given the notion of suborbifold of the second author (based on ideas of Borzellino/Brunsden) and the classical correspondence (up to certain equivalences) between (effective) orbifolds via atlases and effective orbifold groupoids, we analyze which groupoid embeddings correspond to suborbifolds and give classes of suborbifolds naturally leading to groupoid embeddings.


          Local density of Caputo-stationary functions of any order. (arXiv:1809.04005v1 [math.AP])      Cache   Translate Page      

Authors: Alessandro Carbotti, Serena Dipierro, Enrico Valdinoci

We show that any given function can be approximated with arbitrary precision by solutions of linear, time-fractional equations of any prescribed order.

This extends a recent result by Claudia Bucur, which was obtained for time-fractional derivatives of order less than one, to the case of any fractional order of differentiation.

In addition, our result applies also to the $\psi$-Caputo-stationary case, and it will provide one of the building blocks of a forthcoming paper in which we will establish general approximation results by operators of any order involving anisotropic superpositions of classical, space-fractional and time-fractional diffusions.


          Dynamics near a periodically forced robust heteroclinic cycle. (arXiv:1809.04006v1 [math.DS])      Cache   Translate Page      

Authors: Isabel S. Labouriau, Alexandre A.P. Rodrigues

There are few examples of non-autonomous vector fields exhibiting complex dynamics that may be proven analytically. We analyse a family of periodic perturbations of a weakly attracting robust heteroclinic network defined on the two-sphere. We derive the first return map near the heteroclinic cycle for small amplitude of the perturbing term, and we reduce the analysis of the non-autonomous system to that of a two-dimensional map on a cylinder.

When the perturbation strength is small there is an attracting invariant closed curve not contractible on the cylinder. Near the centre of frequency locking there are parameter values for which this curve coexists with an attracting periodic solution. Increasing the perturbation strength there are periodic solutions that bifurcate into a closed contractible invariant curve and into a region where the dynamics is conjugate to a full shift on two symbols. These last two dynamical features appear at a discrete-time Bogdanov-Takens bifurcation.


          On the question "Can one hear the shape of a group?" and Hulanicki type theorem for graphs. (arXiv:1809.04008v1 [math.GR])      Cache   Translate Page      

Authors: Artem Dudko, Rostislav Grigorchuk

We study the question of whether it is possible to determine a finitely generated group $G$ up to some notion of equivalence from the spectrum $\mathrm{sp}(G)$ of $G$. We show that the answer is "No" in a strong sense. As the first example we present the collection of amenable 4-generated groups $G_\omega$, $\omega\in\{0,1,2\}^\mathbb N$, constructed by the second author in 1984. We show that among them there is a continuum of pairwise non-quasi-isometric groups with $\mathrm{sp}(G_\omega)=[-\tfrac{1}{2},0]\cup[\tfrac{1}{2},1]$. Moreover, for each of these groups $G_\omega$ there is a continuum of covering groups $G$ with the same spectrum. As the second example we construct a continuum of $2$-generated torsion-free step-3 solvable groups with the spectrum $[-1,1]$. In addition, in relation to the above results we prove a version of Hulanicki Theorem about inclusion of spectra for covering graphs.


          Failure Rate Properties of Parallel Systems. (arXiv:1809.04009v1 [math.PR])      Cache   Translate Page      

Authors: Idir Arab, Milto Hadjikyriakou, Paulo Eduardo Oliveira

We study failure rate monotonicity and generalized convex transform stochastic ordering properties of random variables, with a concern on applications. We are especially interested in the effect of a tail weight iteration procedure to define distributions, which is equivalent to the characterization of moments of the residual lifetime at a given instant. For the monotonicity properties, we are mainly concerned with hereditary properties with respect to the iteration procedure providing counter-examples showing either that the hereditary property does not hold or that inverse implications are not true. For the stochastic ordering, we introduce a new criterium, based on the analysis of the sign variation of a suitable function. This criterium is then applied to prove ageing properties of parallel systems formed with components that have exponentially distributed lifetimes.


          Shift-Inequivalent Decimations of the Sidelnikov-Lempel-Cohn-Eastman Sequences. (arXiv:1809.04010v1 [math.CO])      Cache   Translate Page      

Authors: Saban Alaca, Goldwyn Millar

We consider the problem of finding maximal sets of shift-inequivalent decimations of Sidelnikov-Lempel-Cohn-Eastman (SLCE) sequences (as well as the equivalent problem of determining the multiplier groups of the almost difference sets associated with these sequences). We derive a numerical necessary condition for a residue to be a multiplier of an SLCE almost difference set. Using our necessary condition, we show that if $p$ is an odd prime and $S$ is an SLCE almost difference set over $\mathbb{F}_p,$ then the multiplier group of $S$ is trivial. Consequently, for each odd prime $p,$ we obtain a family of $\phi(p-1)$ shift-inequivalent balanced periodic sequences (where $\phi$ is the Euler-Totient function) each having period $p-1$ and nearly perfect autocorrelation.


          On the approximation of L\'evy driven Volterra processes and their integrals. (arXiv:1809.04011v1 [math.OC])      Cache   Translate Page      

Authors: Giulia di Nunno, Andrea Fiacco, Erik Hove Karlsen

Volterra processes appear in several applications ranging from turbulence to energy finance where they are used in the modelling of e.g. temperatures and wind and the related financial derivatives. Volterra processes are in general non-semimartingales and a theory of integration with respect to such processes is in fact not standard. In this work we suggest to construct an approximating sequence of L\'evy driven Volterra processes, by perturbation of the kernel function. In this way, one can obtain an approximating sequence of semimartingales.

Then we consider fractional integration with respect to Volterra processes as integrators and we study the corresponding approximations of the fractional integrals. We illustrate the approach presenting the specific study of the Gamma-Volterra processes. Examples and illustrations via simulation are given.


          T-statistic for Autoregressive process. (arXiv:1809.04018v1 [math.ST])      Cache   Translate Page      

Authors: Eric Benhamou

In this paper, we discuss the distribution of the t-statistic under the assumption of normal autoregressive distribution for the underlying discrete time process. This result generalizes the classical result of the traditional t-distribution where the underlying discrete time process follows an uncorrelated normal distribution. However, for AR(1), the underlying process is correlated. All traditional results break down and the resulting t-statistic is a new distribution that converges asymptotically to a normal. We give an explicit formula for this new distribution obtained as the ratio of two dependent distribution (a normal and the distribution of the norm of another independent normal distribution). We also provide a modified statistic that follows a non central t-distribution. Its derivation comes from finding an orthogonal basis for the the initial circulant Toeplitz covariance matrix. Our findings are consistent with the asymptotic distribution for the t-statistic derived for the asympotic case of large number of observations or zero correlation. This exact finding of this distribution has applications in multiple fields and in particular provides a way to derive the exact distribution of the Sharpe ratio under normal AR(1) assumptions.


          Stochastic growth rates for populations in random environments with rare migration. (arXiv:1809.04025v1 [q-bio.PE])      Cache   Translate Page      

Authors: David Steinsaltz, Shripad Tuljapurkar

The growth of a population divided among spatial sites, with migration between the sites, is sometimes modelled by a product of random matrices, with each diagonal elements representing the growth rate in a given time period, and off-diagonal elements the migration rate. The randomness of the matrices then represents stochasticity of environmental conditions. We consider the case where the off-diagonal elements are small, representing a situation where migration has been introduced into an otherwise sessile meta-population. We examine the asymptotic behaviour of the long-term growth rate. When there is a single site with the highest growth rate, under the assumption of Gaussian log growth rates at the individual sites (or having Gaussian-like tails) we show that the behavior near zero is like a power of $\epsilon$, and derive upper and lower bounds for the power in terms of the difference in the growth rates and the distance between the sites. In particular, when the difference in mean log growth rate between two sites is sufficiently small, or the variance of the difference between the sites sufficiently large, migration will always be favored by natural selection, in the sense that introducing a small amount of migration will increase the growth rate of the population relative to the zero-migration case.


          Stability of fixed life histories to perturbation by rare diapause. (arXiv:1809.04027v1 [q-bio.PE])      Cache   Translate Page      

Authors: David Steinsaltz, Shripad Tuljapurkar

We follow up on a companion work that considered growth rates of populations growing at different sites, with different randomly varying growth rates at each site, in the limit as migration between sites goes to 0. We extend this work here to the special case where the maximum average log growth rate is achieved at two different sites. The primary motivation is to cover the case where `sites' are understood as age classes for the same individuals. The theory then calculates the effect on growth rate of introducing a rare delay in development, a diapause, into an otherwise fixed-length semelparous life history.

Whereas the increase in stochastic growth rate due to rare migrations was found to grow as a power of the migration rate, we show that under quite general conditions that in the diapause model --- or in the migration model with two or more sites having equal individual stochastic growth rates --- the increase in stochastic growth rate due to diapause at rate $\epsilon$ behaves like $(\log \epsilon^{-1})^{-1}$ as $\epsilon\downarrow 0$. In particular, this implies that a small random disruption to the deterministic life history will always be favored by natural selection, in the sense that it will increase the stochastic growth rate relative to the zero-delay deterministic life history.


          Polygones fondamentaux d'une courbe modulaire. (arXiv:1809.04030v1 [math.NT])      Cache   Translate Page      

Authors: Karim Belabas, Dominique Bernardi, Bernadette Perrin-Riou

A few pages in Siegel describe how, starting with a fundamental polygon for a compact Riemann surface, one can construct a symplectic basis of its homology. This note retells that construction, specializing to the case where the surface is associated to a congruence subgroup $\Gamma$ of $SL_2(Z)$. One then obtains by classical procedures a generating system for $\Gamma$ with a minimal number of hyperbolic elements and a presentation of the $Z[\Gamma]$-module $Z[P^1(Q)]_0$.


          Augmented Lagrangian for treatment of hanging nodes in hexahedral meshes. (arXiv:1809.04031v1 [math.NA])      Cache   Translate Page      

Authors: Saumik Dana, Mary F Wheeler

The surge of activity in the resolution of fine scale features in the field of earth sciences over the past decade necessitates the development of robust yet simple algorithms that can tackle the various drawbacks of in silico models developed hitherto. One such drawback is that of the restrictive computational cost of finite element method in rendering resolutions to the fine scale features, while at the same time keeping the domain being modeled sufficiently large. We propose the use of the augmented lagrangian method commonly used in the treatment of hanging nodes in contact mechanics in tackling the drawback. An interface is introduced in a typical finite element mesh across which an aggressive coarsening of the finite elements is possible. The method is based upon minimizing an augmented potential energy which factors in the constraint that exists at the hanging nodes on that interface. This allows for a significant reduction in the number of finite elements comprising the mesh with concomitant reduction in the computational expense.


          Bit-Metric Decoding of Non-Binary LDPC Codes with Probabilistic Amplitude Shaping. (arXiv:1809.04037v1 [cs.IT])      Cache   Translate Page      

Authors: Fabian Steiner, Georg Böcherer, Gianluigi Liva

A new approach for combining non-binary low-density parity-check (NB-LDPC) codes with higher-order modulation and probabilistic amplitude shaping (PAS) is presented. Instead of symbol-metric decoding (SMD), a bit-metric decoder (BMD) is used so that matching the field order of the non-binary code to the constellation size is not needed, which increases the flexibility of the coding scheme. Information rates, density evolution thresholds and finite-length simulations show that the flexibility comes at no loss of performance if PAS is used.


          Small-Gain-Based Boundary Feedback Design for Global Exponential Stabilization of 1-D Semilinear Parabolic PDEs. (arXiv:1809.04039v1 [math.OC])      Cache   Translate Page      

Authors: Iasson Karafyllis, Miroslav Krstic

This paper presents a novel methodology for the design of boundary feedback stabilizers for 1-D, semilinear, parabolic PDEs. The methodology is based on the use of small-gain arguments and can be applied to parabolic PDEs with nonlinearities that satisfy a linear growth condition. The nonlinearities may contain nonlocal terms. Two different types of boundary feedback stabilizers are constructed: a linear static boundary feedback and a nonlinear dynamic boundary feedback. It is also shown that there are fundamental limitations for feedback design in the parabolic case: arbitrary gain assignment is not possible by means of boundary feedback. An example with a nonlocal nonlinear term illustrates the applicability of the proposed methodology.


          Spin structures and the divisibility of Euler classes. (arXiv:1809.04045v1 [math.GT])      Cache   Translate Page      

Authors: Yukio Kametani

In this short article we give a geometric meaning of the divisibility of $KO$-theoretical Euler classes for given two spin modules. We are motivated by Furuta's 10/8-inequality for a closed spin $4$-manifold. The role of the reducibles is clarified in the monopole equations of Seiberg-Witten theory, as done by Donaldson and Taubes in Yang-Mills theory.


          Dynamical invariants of mapping torus categories. (arXiv:1809.04046v1 [math.SG])      Cache   Translate Page      

Authors: Yusuf Barış Kartal

This paper describes constructions in homological algebra that are part of a strategy whose goal is to understand and classify symplectic mapping tori. More precisely, given a dg category and an auto-equivalence, satisfying certain assumptions, we introduce a category $M_\phi$-called the mapping torus category- that describes the wrapped Fukaya category of an open symplectic mapping torus. Then we define a family of bimodules on a natural deformation of $M_\phi$, uniquely characterize it and using this, we distinguish $M_\phi$ from the mapping torus category of the identity. The proof of the equivalence of $M_\phi$ with wrapped Fukaya category is not proven here, and it will be shown in an upcoming paper.


          On the structure of Ricci shrinkers. (arXiv:1809.04049v1 [math.DG])      Cache   Translate Page      

Authors: Haozhao Li, Yu Li, Bing Wang

We develop a structure theory for non-collapsed Ricci shrinkers without any curvature condition. As applications, we obtain some curvature estimates of the Ricci shrinkers depending only on the non-collapsing constant.


          On Rogers-Shephard type inequalities for general measures. (arXiv:1809.04051v1 [math.MG])      Cache   Translate Page      

Authors: David Alonso-Gutiérrez, María A. Hernández Cifre, Michael Roysdon, Jesús Yepes Nicolás, Artem Zvavitch

In this paper we prove a series of Rogers-Shephard type inequalities for convex bodies when dealing with measures on the Euclidean space with either radially decreasing densities, or quasi-concave densities attaining their maximum at the origin. Functional versions of classical Rogers-Shephard inequalities are also derived as consequences of our approach.


          On Hawking mass and Bartnik mass of CMC surfaces. (arXiv:1809.04056v1 [math.DG])      Cache   Translate Page      

Authors: Pengzi Miao, Yaohua Wang, Naqing Xie

Given a constant mean curvature surface that bounds a compact manifold with nonnegative scalar curvature, we obtain intrinsic conditions on the surface that guarantee the positivity of its Hawking mass. We also obtain estimates of the Bartnik mass of such surfaces, without assumptions on the integral of the squared mean curvature. If the ambient manifold has negative scalar curvature, our method also applies and yields estimates on the hyperbolic Bartnik mass of these surfaces.


          Horocycle averages on closed manifolds and transfer operators. (arXiv:1809.04062v1 [math.DS])      Cache   Translate Page      

Authors: Alexander Adam

We study semigroups of weighted transfer operators for Anosov flows of regularity C^r, r>1, on compact manifolds without boundary. We construct an anisotropic Banach space on which the resolvent of the generator is quasi-compact and where the upper bound on the essential spectral radius depends continuously on the regularity. We apply this result to the ergodic average of the horocycle flow for C^3 contact Anosov flows in dimension three.


          Logarithmic growth filtrations for $(\varphi,\nabla)$-modules over the bounded Robba ring. (arXiv:1809.04065v1 [math.NT])      Cache   Translate Page      

Authors: Shun Ohkubo

In this paper, we study the logarithmic growth (log-growth) filtration, a mysterious invariant found by B. Dwork, for $(\varphi,\nabla)$-modules over the bounded Robba ring. The main result is a proof of a conjecture proposed by B. Chiarellotto and N. Tsuzuki on a comparison between the log-growth filtration and Frobenius slope filtration. One of the ingredients of the proof is a new criterion for pure of bounded quotient, which is a notion introduced by Chiarellotto and Tsuzuki to formulate their conjecture. We also give several applications to log-growth Newton polygons, including a conjecture of Dwork on the semicontinuity, and an analogue of a theorem due to V. Drinfeld and K. Kedlaya on Frobenius Newton polygons for indecomposable convergent $F$-isocrystals.


          An Application of the Index Theorem for Manifolds with Fibered Boundaries. (arXiv:1809.04066v1 [math.DG])      Cache   Translate Page      

Authors: Andres Larrain-Hubach

We show how the index formula for manifolds with fibered boundaries can be used to compute the index of the Dirac operator on Taub-NUT space twisted by an anti-self-dual generic instanton connection.


          The Metric Completion of Outer Space. (arXiv:1202.6392v6 [math.GR] UPDATED)      Cache   Translate Page      

Authors: Yael Algom-Kfir

We develop the theory of a metric completion of an asymmetric metric space. We characterize the points on the boundary of Outer Space that are in the metric completion of Outer Space with the Lipschitz metric. We prove that the simplicial completion, the subset of the completion consisting of simplicial tree actions, is homeomorphic to the free splitting complex. We use this to give a new proof of a theorem by Francaviglia and Martino that the isometry group of Outer Space is homeomorphic to $\text{Out}(F_n)$ for $n \geq 3$ and equal to $\text{PSL}(2,\mathbb{Z})$ for $n=2$.


          Generalized iterated wreath products of symmetric groups and generalized rooted trees correspondence. (arXiv:1409.0604v2 [math.RT] UPDATED)      Cache   Translate Page      

Authors: Mee Seong Im, Angela Wu

Consider the generalized iterated wreath product $S_{r_1}\wr \ldots \wr S_{r_k}$ of symmetric groups. We give a complete description of the traversal for the generalized iterated wreath product. We also prove an existence of a bijection between the equivalence classes of ordinary irreducible representations of the generalized iterated wreath product and orbits of labels on certain rooted trees. We find a recursion for the number of these labels and the degrees of irreducible representations of the generalized iterated wreath product. Finally, we give rough upper bound estimates for fast Fourier transforms.


          Configuration categories and homotopy automorphisms. (arXiv:1503.00501v3 [math.AT] UPDATED)      Cache   Translate Page      

Authors: Michael S Weiss

Let M be a smooth compact manifold with boundary. Under some geometric conditions on M, a homotopical model for the pair (M,boundary of M) can be recovered from the configuration category of the interior of M. The grouplike monoid of derived homotopy automorphisms of the configuration category of the interior of M then acts on the homotopical model of the pair (M,boundary of M), in a way which is compatible with a known homotopical action of the homeomorphism group of M minus boundary on (M,boundary of M).


          Lower bounds for the dynamically defined measures. (arXiv:1506.04497v19 [math.DS] UPDATED)      Cache   Translate Page      

Authors: Ivan Werner

The dynamically defined measure (DDM) $\Phi$ arising from a finite measure $\phi_0$ on an initial $\sigma$-algebra on a set and an invertible map acting on the latter is considered. Several lower bounds for it are obtained and sufficient conditions for its positivity are deduced under the general assumption that there exists an invariant measure $\Lambda$ such that $\Lambda\ll\phi_0$.

In particular, DDMs arising from the Hellinger integral $\mathcal{J}_\alpha(\Lambda,\phi_0)\geq\mathcal{H}^{\alpha,0}(\Lambda,\phi_0)\geq\mathcal{H}_\alpha(\Lambda,\phi_0)$ are constructed with $\mathcal{H}_{0}\left(\Lambda,\phi_0\right)(Q) = \Phi(Q)$, $\mathcal{H}_{1}\left(\Lambda,\phi_0\right)(Q) = \Lambda(Q)$, and \[\Phi(Q)^{1-\alpha}\Lambda(Q)^{\alpha}\geq\mathcal{J}_{\alpha}\left(\Lambda,\phi_0\right)(Q)\] for all measurable $Q$ and $\alpha\in[0,1]$, and further computable lower bounds for them are obtained and analyzed. It is shown, in particular, that $(0,1)\owns\alpha\longmapsto\mathcal{H}_{\alpha}(\Lambda,\phi_0)(Q)$ is completely determined by the $\Lambda$-essential supremum of $d\Lambda/d\phi_0$ for all $0<\alpha<1$ if $\Lambda$ is ergodic, and if also a condition for the continuity at $0$ is satisfied, the above inequalities become equalities. In general, for every measurable $Q$, it is shown that $[0,1]\owns\alpha\longmapsto\mathcal{J}_{\alpha}(\Lambda,\phi_0)(Q)$ is log-convex, all one-sided derivatives of $(0,1)\owns\alpha\longmapsto\mathcal{H}^{\alpha,0}(\Lambda,\phi_0)(Q)$ and $(0,1)\owns\alpha\longmapsto\mathcal{J}_{\alpha}(\Lambda,\phi_0)(Q)$ are obtained, and some lower bounds for the functions by means of the derivatives are given. Some sufficient conditions for the continuity and a one-sided differentiability of $(0,1)\owns\alpha\longmapsto\mathcal{H}_{\alpha}(\Lambda,\phi_0)(Q)$ are provided.


          Differential operators and families of automorphic forms on unitary groups of arbitrary signature. (arXiv:1511.06771v4 [math.NT] UPDATED)      Cache   Translate Page      

Authors: Ellen Eischen, Jessica Fintzen, Elena Mantovan, Ila Varma

In the 1970's, Serre exploited congruences between $q$-expansion coefficients of Eisenstein series to produce $p$-adic families of Eisenstein series and, in turn, $p$-adic zeta functions. Partly through integration with more recent machinery, including Katz's approach to $p$-adic differential operators, his strategy has influenced four decades of developments. Prior papers employing Katz's and Serre's ideas exploiting differential operators and congruences to produce families of automorphic forms rely crucially on $q$-expansions of automorphic forms.

The overarching goal of the present paper is to adapt the strategy to automorphic forms on unitary groups, which lack $q$-expansions when the signature is of the form $(a, b)$, $a\neq b$. In particular, this paper completely removes the restrictions on the signature present in prior work. As intermediate steps, we achieve two key objectives. First, partly by carefully analyzing the action of the Young symmetrizer on Serre-Tate expansions, we explicitly describe the action of differential operators on the Serre-Tate expansions of automorphic forms on unitary groups of arbitrary signature. As a direct consequence, for each unitary group, we obtain congruences and families analogous to those studied by Katz and Serre. Second, via a novel lifting argument, we construct a $p$-adic measure taking values in the space of $p$-adic automorphic forms on unitary groups of any prescribed signature. We relate the values of this measure to an explicit $p$-adic family of Eisenstein series. One application of our results is to the recently completed construction of $p$-adic $L$-functions for unitary groups by the first named author, Harris, Li, and Skinner.


          On links of vertices in simplicial $d$-complexes embeddable in the euclidean $2d$-space. (arXiv:1512.05164v5 [cs.CG] UPDATED)      Cache   Translate Page      

Authors: Salman Parsa

We consider $d$-dimensional simplicial complexes which can be PL embedded in the $2d$-dimensional euclidean space. In short, we show that in any such complex, for any three vertices, the intersection of the link-complexes of the vertices is linklessly embeddable in the $(2d-1)$-dimensional euclidean space. These considerations lead us to a new upper bound on the total number of $d$-simplices in an embeddable complex in $2d$-space with $n$ vertices, improving known upper bounds, for all $d \geq 2$. Moreover, the bound is also true for the size of $d$-complexes linklessly embeddable in the $(2d+1)$-dimensional space.


          Efficiency analysis of double perturbed pairwise comparison matrices. (arXiv:1602.07137v2 [math.OC] UPDATED)      Cache   Translate Page      

Authors: Kristóf Ábele-Nagy, Sándor Bozóki, Örs Rebák

Efficiency is a core concept of multi-objective optimization problems and multi-attribute decision making. In the case of pairwise comparison matrices a weight vector is called efficient if the approximations of the elements of the pairwise comparison matrix made by the ratios of the weights cannot be improved in any position without making it worse in some other position. A pairwise comparison matrix is called double perturbed if it can be made consistent by altering two elements and their reciprocals. The most frequently used weighting method, the eigenvector method is analyzed in the paper, and it is shown that it produces an efficient weight vector for double perturbed pairwise comparison matrices.


          John Ellipsoid and the Center of Mass of a Convex Body. (arXiv:1605.06881v3 [math.MG] UPDATED)      Cache   Translate Page      

Authors: Han Huang

It is natural to ask whether the center of mass of a convex body $K\subset \mathbb{R}^n$ lies in its John ellipsoid $B_K$, i.e., in the maximal volume ellipsoid contained in $K$. This question is relevant to the efficiency of many algorithms for convex bodies. In this paper, we obtain an unexpected negative result. There exists a convex body $K\subset \mathbb{R}^n$ such that its center of mass does not lie in the John ellipsoid $B_K$ inflated $(1-C\sqrt{\frac{\log(n)} {n}})n$ times about the center of $B_K$. Moreover, there exists a polytope $P \subset \mathbb{R}^n$ with $O(n^2)$ facets whose center of mass is not contained in the John ellipsoid $B_P$ inflated $O(\frac{n}{\log(n)})$ times about the center of $B_P$.


          Identities involving (doubly) symmetric polynomials and integrals over Grassmannians. (arXiv:1607.04850v3 [math.AG] UPDATED)      Cache   Translate Page      

Authors: Dang Tuan Hiep

We obtain identities involving symmetric and doubly symmetric polynomials. These identities provide a way of handling expressions appearing in the Atiyah-Bott-Berline-Vergne formula for Grassmannians. As corollaries, we obtain formulas for integrals over Grassmannians of characteristic classes of the tautological bundles. Moreover, we provide a valid proof of the Martin formula for the classical Grassmannian.


          On the Iterates of Digit Maps. (arXiv:1609.03263v3 [math.NT] UPDATED)      Cache   Translate Page      

Authors: Zachary Chase

Given a base $b$, a "digit map" is a map $f: \mathbb{Z}^{\ge 0} \to \mathbb{Z}^{\ge 0}$ of the form $f(\sum_{i=0}^n a_ib^i) = \sum_{i=0}^n f_*(a_i)$ where $\sum_i a_ib^i$ is the base $b$ representation and $f_* : \{0,1,\dots, b-1\} \to \mathbb{Z}^{\ge 0}$ satisfies $f_*(0) = 0, f_*(1) = 1$, and $\gcd(f_*(b-1),b) = 1$. Suppose further there exists some $m_*$, $0 \le m_* \le b-1$, such that $f(m_*)-m_*$ is relatively prime to $f(b-1)$. We generalize recent results on so-called 'happy numbers' to general digit maps, showing that any periodic point, that is, under iterates of the digit map, can eventually be reached by arbitrarily long sequences of consecutive positive integers.


          Wronskians of theta functions and series for $1/\pi$. (arXiv:1611.02217v3 [math.NT] UPDATED)      Cache   Translate Page      

Authors: Alex Berkovich, Heng Huat Chan, Michael J. Schlosser

In this article, we define functions analogous to Ramanujan's function $f(n)$ defined in his famous paper "Modular equations and approximations to $\pi$". We then use these new functions to study Ramanujan's series for $1/\pi$ associated with the classical, cubic and quartic bases.


          Singular Limit of BSDEs and Optimal Control of two Scale Stochastic Systems in Infinite Dimensional Spaces. (arXiv:1701.01165v2 [math.OC] UPDATED)      Cache   Translate Page      

Authors: Giuseppina Guatteri, Gianmario Tessitore

In this paper we study, by probabilistic techniques, the convergence of the value function for a two-scale, infinite-dimensional, stochastic controlled system as the ratio between the two evolution speeds diverges. The value function is represented as the solution of a backward stochastic differential equation (BSDE) that it is shown to converge towards a reduced BSDE. The noise is assumed to be additive both in the slow and the fast equations for the state. Some non degeneracy condition on the slow equation are required. The limit BSDE involves the solution of an ergodic BSDE and is itself interpreted as the value function of an auxiliary stochastic control problem on a reduced state space.


          Aut-invariant norms and Aut-invariant quasimorphisms on free and surface groups. (arXiv:1702.01662v3 [math.GT] UPDATED)      Cache   Translate Page      

Authors: Michael Brandenbursky, Michał Marcinkowski

Let $F_n$ be the free group on $n$ generators and $\Gamma_g$ the surface group of genus $g$. We consider two particular generating sets: the set of all primitive elements in $F_n$ and the set of all simple loops in $\Gamma_g$. We give a complete characterization of distorted and undistorted elements in the corresponding $Aut$-invariant word metrics. In particular, we reprove Stallings theorem and answer a question of Danny Calegari about the growth of simple loops. In addition, we construct infinitely many quasimorphisms on $F_2$ that are $Aut(F_2)$-invariant. This answers an open problem posed by Mikl\'os Ab\'ert.


          Gauge from holography and holographic gravitational observables. (arXiv:1704.07959v3 [gr-qc] UPDATED)      Cache   Translate Page      

Authors: José A. Zapata

In a spacetime divided into two regions $U_1$ and $U_2$ by a hypersurface $\Sigma$, a perturbation of the field in $U_1$ is coupled to perturbations in $U_2$ by means of the holographic imprint that it leaves on $\Sigma$. The linearized gluing field equation constrains perturbations on the two sides of a dividing hypersurface, and this linear operator may have a nontrivial null space. A nontrivial perturbation of the field leaving a holographic imprint on a dividing hypersurface which does not affect perturbations on the other side should be considered physically irrelevant. This consideration, together with a locality requirement, leads to the notion of gauge equivalence in Lagrangian field theory over confined spacetime domains.

Physical observables in a spacetime domain $U$ can be calculated integrating locally defined gauge invariant conserved currents on hypersurfaces such that $\partial \Sigma \subset \partial U$. This type of observables are capable of distinguishing gauge inequivalent solutions. The integral of a conserved current on a hypersurface is sensitive only to its homology class $[\Sigma]$, and if $U$ is homeomorphic to a four ball the homology class is determined by its boundary $S = \partial \Sigma$. We will see that a result of Anderson and Torre \cite{anderson1996classification} implies that for a large class of theories including General Relativity local observables turn out to be holographic in the sense that they can be written as integrals of over the two dimensional surface $S$. However, non holographic observables are needed to distinguish between gauge inequivalent solutions.


          Auslander's Theorem for permutation actions on noncommutative algebras. (arXiv:1705.00068v2 [math.RA] UPDATED)      Cache   Translate Page      

Authors: Jason Gaddis, Ellen Kirkman, W. Frank Moore, Robert Won

When $A = \mathbb{k}[x_1, \ldots, x_n]$ and $G$ is a small subgroup of $\operatorname{GL}_n(\mathbb{k})$, Auslander's Theorem says that the skew group algebra $A \# G$ is isomorphic to $\operatorname{End}_{A^G}(A)$ as graded algebras. We prove a generalization of Auslander's Theorem for permutation actions on $(-1)$-skew polynomial rings, $(-1)$-quantum Weyl algebras, three-dimensional Sklyanin algebras, and a certain graded down-up algebra. We also show that certain fixed rings $A^G$ are graded isolated singularities in the sense of Ueyama.


          A classification of star log symplectic structures on a compact oriented surface. (arXiv:1705.01793v3 [math.SG] UPDATED)      Cache   Translate Page      

Authors: Melinda Lanius

Given a compact oriented surface, we classify log Poisson bi-vectors whose degeneracy loci are locally modeled by a finite set of lines in the plane intersecting at a point. Further, we compute the Poisson cohomology of such structures and discuss the relationship between our classification and the second Poisson cohomology.


          Exact Formulas for the Generalized Sum-of-Divisors Functions. (arXiv:1705.03488v4 [math.NT] UPDATED)      Cache   Translate Page      

Authors: Maxie D. Schmidt

We prove new exact formulas for the generalized sum-of-divisors functions. The formulas for $\sigma_{\alpha}(x)$ when $\alpha \in \mathbb{C}$ is fixed and $x \geq 1$ involves a finite sum over all of the prime factors $n \leq x$ and terms involving the $r$-order harmonic number sequences. The generalized harmonic number sequences correspond to the partial sums of the Riemann zeta function when $r > 1$ and are related to the generalized Bernoulli numbers when $r \leq 0$ is integer-valued. A key part of our expansions of the Lambert series generating functions for the generalized divisor functions is formed by taking logarithmic derivatives of the cyclotomic polynomials, $\Phi_n(q)$, which completely factorize the Lambert series terms $(1-q^n)^{-1}$ into irreducible polynomials in $q$. We also consider applications of our new results to asymptotic approximations for sums over these divisor functions and to the forms of perfect numbers defined by the special case of the divisor function, $\sigma(n)$, when $\alpha := 1$.

Keywords: divisor function; sum-of-divisors function; Lambert series; perfect number.

MSC (2010): 30B50; 11N64; 11B83


          Antimatroids Induced by Matchings. (arXiv:1705.05510v2 [math.CO] UPDATED)      Cache   Translate Page      

Authors: Yasushi Kawase, Yutaro Yamaguchi

We explore novel connections between antimatroids and matchings in bipartite graphs. In particular, we prove that a combinatorial structure induced by stable matchings or maximum-weight matchings is an antimatroid. Moreover, we demonstrate that every antimatroid admits such a representation by stable matchings and maximum-weight matchings.


          The Tutte embedding of the mated-CRT map converges to Liouville quantum gravity. (arXiv:1705.11161v4 [math.PR] UPDATED)      Cache   Translate Page      

Authors: Ewain Gwynne, Jason Miller, Scott Sheffield

We prove that the Tutte embeddings (a.k.a. harmonic/embeddings) of certain random planar maps converge to $\gamma$-Liouville quantum gravity ($\gamma$-LQG). Specifically, we treat mated-CRT maps, which are discretized matings of correlated continuum random trees, and $\gamma$ ranges from $0$ to $2$ as one varies the correlation parameter. We also show that the associated space-filling path on the embedded map converges to space-filling SLE$_{\kappa}$ for $\kappa =16/\gamma^2$ (in the annealed sense) and that simple random walk on the embedded map converges to Brownian motion (in the quenched sense). Our arguments also yield analogous statements for the Smith (square tiling) embedding of the mated-CRT map.

This work constitutes the first proof that a discrete conformal embedding of a random planar map converges to LQG. Many more such statements have been conjectured. Since the mated-CRT map can be viewed as a coarse-grained approximation to other random planar maps (the UIPT, tree-weighted maps, bipolar-oriented maps, etc.), our results indicate a potential approach for proving that embeddings of these maps converge to LQG as well.

To prove the main result, we establish several (independently interesting) theorems about LQG surfaces decorated by space-filling SLE. There is a natural way to use the SLE curve to divide the plane into `cells' corresponding to vertices of the mated-CRT map. We study the law of the shape of the origin-containing cell, in particular proving moments for the ratio of its squared diameter to its area. We also give bounds on the degree of the origin-containing cell and establish a form of ergodicity for the entire configuration. Ultimately, we use these properties to show (using a general theorem proved in a separate paper) that random walk on these cells converges to a time change of Brownian motion, which in turn leads to the Tutte embedding result.


          More Tur\'an-Type Theorems for Triangles in Convex Point Sets. (arXiv:1706.10193v2 [math.CO] UPDATED)      Cache   Translate Page      

Authors: Boris Aronov, Vida Dujmović, Pat Morin, Aurélien Ooms, Luís Fernando Schultz Xavier da Silveira

We study the following family of problems: Given a set of $n$ points in convex position, what is the maximum number triangles one can create having these points as vertices while avoiding certain sets of forbidden configurations. As forbidden configurations we consider all 8 ways in which a pair of triangles in such a point set can interact. This leads to 256 extremal Tur\'an-type questions. We give nearly tight (within a $\log n$ factor) bounds for 248 of these questions and show that the remaining 8 questions are all asymptotically equivalent to Stein's longstanding tripod packing problem.


          Long paths and toughness of k-trees and chordal planar graphs. (arXiv:1707.08026v3 [math.CO] UPDATED)      Cache   Translate Page      

Authors: Adam Kabela

We show that every $k$-tree of toughness greater than $\frac{k}{3}$ is Hamilton-connected for $k \geq 3$. (In particular, chordal planar graphs of toughness greater than $1$ are Hamilton-connected.) This improves the result of Broersma et al. (2007) and generalizes the result of B{\"o}hme et al. (1999).

On the other hand, we present graphs whose longest paths are short. Namely, we construct $1$-tough chordal planar graphs and $1$-tough planar $3$-trees, and we show that the shortness exponent of the class is $0$, at most $\log_{30}{22}$, respectively. Both improve the bound of B{\"o}hme et al. Furthermore, the construction provides $k$-trees (for $k \geq 4$) of toughness greater than $1$.


          Internal sizes in $\mu$-abstract elementary classes. (arXiv:1708.06782v3 [math.LO] UPDATED)      Cache   Translate Page      

Authors: Michael Lieberman, Jiří Rosický, Sebastien Vasey

The internal size of an object $M$ inside a given category is, roughly, the least infinite cardinal $\lambda$ such that any morphism from $M$ into the colimit of a $\lambda^+$-directed system factors through one of the components of the system. The existence spectrum of a category is the class of cardinals $\lambda$ such that the category has an object of internal size $\lambda$. We study the existence spectrum in $\mu$-abstract elementary classes ($\mu$-AECs), which are, up to equivalence of categories, the same as accessible categories with all morphisms monomorphisms. We show for example that, assuming instances of the singular cardinal hypothesis which follow from a large cardinal axiom, $\mu$-AECs which admit intersections have objects of all sufficiently large internal sizes. We also investigate the relationship between internal sizes and cardinalities and analyze a series of examples, including one of Shelah---a certain class of sufficiently-closed constructible models of set theory---which show that the categoricity spectrum can behave very differently depending on whether we look at categoricity in cardinalities or in internal sizes.


          GIANT: Globally Improved Approximate Newton Method for Distributed Optimization. (arXiv:1709.03528v5 [cs.LG] UPDATED)      Cache   Translate Page      

Authors: Shusen Wang, Farbod Roosta-Khorasani, Peng Xu, Michael W. Mahoney

For distributed computing environment, we consider the empirical risk minimization problem and propose a distributed and communication-efficient Newton-type optimization method. At every iteration, each worker locally finds an Approximate NewTon (ANT) direction, which is sent to the main driver. The main driver, then, averages all the ANT directions received from workers to form a {\it Globally Improved ANT} (GIANT) direction. GIANT is highly communication efficient and naturally exploits the trade-offs between local computations and global communications in that more local computations result in fewer overall rounds of communications. Theoretically, we show that GIANT enjoys an improved convergence rate as compared with first-order methods and existing distributed Newton-type methods. Further, and in sharp contrast with many existing distributed Newton-type methods, as well as popular first-order methods, a highly advantageous practical feature of GIANT is that it only involves one tuning parameter. We conduct large-scale experiments on a computer cluster and, empirically, demonstrate the superior performance of GIANT.


          Kac-Ward formula and its extension to order-disorder correlators through a graph zeta function. (arXiv:1709.06052v3 [math-ph] UPDATED)      Cache   Translate Page      

Authors: Michael Aizenman, Simone Warzel

A streamlined derivation of the Kac-Ward formula for the planar Ising model's partition function is presented and applied in relating the kernel of the Kac-Ward matrices' inverse with the correlation functions of the Ising model's order-disorder correlation functions. A shortcut for both is facilitated by the Bowen-Lanford graph zeta function relation. The Kac-Ward relation is also extended here to produce a family of non planar interactions on $\mathbb{Z}^2$ for which the partition function and the correlation function based on the order-disorder correlators are solvable at special values of the coupling parameters / temperature.


          Small-time asymptotics for subelliptic Hermite functions on $SU(2)$ and the CR sphere. (arXiv:1710.02550v2 [math.AP] UPDATED)      Cache   Translate Page      

Authors: Joshua Campbell, Tai Melcher

We show that, under a natural scaling, the small-time behavior of the logarithmic derivatives of the subelliptic heat kernel on $SU(2)$ converges to their analogues on the Heisenberg group at time 1. Realizing $SU(2)$ as $\mathbb{S}^3$, we then generalize these results to higher-order odd-dimensional spheres equipped with their natural subRiemannian structure, where the limiting spaces are now the higher-dimensional Heisenberg groups.


          Using a Factored Dual in Augmented Lagrangian Methods for Semidefinite Programming. (arXiv:1710.04869v3 [math.OC] UPDATED)      Cache   Translate Page      

Authors: Marianna De Santis, Franz Rendl, Angelika Wiegele

In the context of augmented Lagrangian approaches for solving semidefinite programming problems, we investigate the possibility of eliminating the positive semidefinite constraint on the dual matrix by employing a factorization. Hints on how to deal with the resulting unconstrained maximization of the augmented Lagrangian are given. We further use the approximate maximum of the augmented Lagrangian with the aim of improving the convergence rate of alternating direction augmented Lagrangian frameworks. Numerical results are reported, showing the benefits of the approach.


          Classification of simple linearly compact Kantor triple systems over the complex numbers. (arXiv:1710.05375v3 [math.QA] UPDATED)      Cache   Translate Page      

Authors: Nicoletta Cantarini, Antonio Ricciardo, Andrea Santi

Simple finite dimensional Kantor triple systems over the complex numbers are classified in terms of Satake diagrams. We prove that every simple and linearly compact Kantor triple system has finite dimension and give an explicit presentation of all the classical and exceptional systems.


          Isolated singularities of conformal hyperbolic metrics. (arXiv:1711.01018v2 [math.DG] UPDATED)      Cache   Translate Page      

Authors: Yu Feng, Yiqian Shi, Bin Xu

J. Nitsche proved that an isolated singularity of a conformal hyperbolic metric is either a conical singularity or a cusp one. We prove by developing map that there exists a complex coordinate $z$ centered at the singularity where the metric has the expression of either $\displaystyle{\frac{4\alpha^2\vert z \vert^{2\alpha-2}}{(1-\vert z \vert ^{2\alpha})^2}\vert \mathrm{d} z \vert^2}$ with $\alpha>0$ or $\displaystyle{\vert z \vert ^{-2}\big(\ln|z|\big)^{-2}|dz|^{2}}$.


          Convexity of complements of tropical varieties, and approximations of currents. (arXiv:1711.02045v3 [math.AG] UPDATED)      Cache   Translate Page      

Authors: Karim Adiprasito, Farhad Babaee

The goal of this note is to affirm a local version of the conjecture of Nisse--Sottile [NS16] on higher convexity of complements of tropical varieties, while providing a family of counter-examples for the global Nisse--Sottle conjecture in any codimension and dimension higher than 1. Moreover, it will be shown that, surprisingly, this family also provides a family of counter-examples for the generalized Hodge conjecture for positive currents in these dimensions, and gives rise to further approximability obstruction.


          Uncertainty quantification for radio interferometric imaging: I. proximal MCMC methods. (arXiv:1711.04818v2 [astro-ph.IM] UPDATED)      Cache   Translate Page      

Authors: Xiaohao Cai, Marcelo Pereyra, Jason D. McEwen

Uncertainty quantification is a critical missing component in radio interferometric imaging that will only become increasingly important as the big-data era of radio interferometry emerges. Since radio interferometric imaging requires solving a high-dimensional, ill-posed inverse problem, uncertainty quantification is difficult but also critical to the accurate scientific interpretation of radio observations. Statistical sampling approaches to perform Bayesian inference, like Markov Chain Monte Carlo (MCMC) sampling, can in principle recover the full posterior distribution of the image, from which uncertainties can then be quantified. However, traditional high-dimensional sampling methods are generally limited to smooth (e.g. Gaussian) priors and cannot be used with sparsity-promoting priors. Sparse priors, motivated by the theory of compressive sensing, have been shown to be highly effective for radio interferometric imaging. In this article proximal MCMC methods are developed for radio interferometric imaging, leveraging proximal calculus to support non-differential priors, such as sparse priors, in a Bayesian framework. Furthermore, three strategies to quantify uncertainties using the recovered posterior distribution are developed: (i) local (pixel-wise) credible intervals to provide error bars for each individual pixel; (ii) highest posterior density credible regions; and (iii) hypothesis testing of image structure. These forms of uncertainty quantification provide rich information for analysing radio interferometric observations in a statistically robust manner.


          Uncertainty quantification for radio interferometric imaging: II. MAP estimation. (arXiv:1711.04819v2 [astro-ph.IM] UPDATED)      Cache   Translate Page      

Authors: Xiaohao Cai, Marcelo Pereyra, Jason D. McEwen

Uncertainty quantification is a critical missing component in radio interferometric imaging that will only become increasingly important as the big-data era of radio interferometry emerges. Statistical sampling approaches to perform Bayesian inference, like Markov Chain Monte Carlo (MCMC) sampling, can in principle recover the full posterior distribution of the image, from which uncertainties can then be quantified. However, for massive data sizes, like those anticipated from the Square Kilometre Array (SKA), it will be difficult if not impossible to apply any MCMC technique due to its inherent computational cost. We formulate Bayesian inference problems with sparsity-promoting priors (motivated by compressive sensing), for which we recover maximum a posteriori (MAP) point estimators of radio interferometric images by convex optimisation. Exploiting recent developments in the theory of probability concentration, we quantify uncertainties by post-processing the recovered MAP estimate. Three strategies to quantify uncertainties are developed: (i) highest posterior density credible regions; (ii) local credible intervals (cf. error bars) for individual pixels and superpixels; and (iii) hypothesis testing of image structure. These forms of uncertainty quantification provide rich information for analysing radio interferometric observations in a statistically robust manner. Our MAP-based methods are approximately $10^5$ times faster computationally than state-of-the-art MCMC methods and, in addition, support highly distributed and parallelised algorithmic structures. For the first time, our MAP-based techniques provide a means of quantifying uncertainties for radio interferometric imaging for realistic data volumes and practical use, and scale to the emerging big-data era of radio astronomy.


          A Saito criterion for holonomic divisors. (arXiv:1711.10259v3 [math.AG] UPDATED)      Cache   Translate Page      

Authors: Raul Epure, Mathias Schulze

We show that a holonomic divisor is free if and only if applying all logarithmic derivations to a generic function with isolated critical point yields a complete intersection Artin algebra.


          Edge rings with $3$-linear resolutions. (arXiv:1712.03504v2 [math.AC] UPDATED)      Cache   Translate Page      

Authors: Takayuki Hibi, Kazunori Matsuda, Akiyoshi Tsuchiya

It is shown that the edge ring of a finite connected simple graph with a $3$-linear resolution is a hypersurface.


          ROAST: Rapid Orthogonal Approximate Slepian Transform. (arXiv:1712.04613v2 [cs.IT] UPDATED)      Cache   Translate Page      

Authors: Zhihui Zhu, Santhosh Karnik, Michael B. Wakin, Mark A. Davenport, Justin Romberg

In this paper, we provide a Rapid Orthogonal Approximate Slepian Transform (ROAST) for the discrete vector that one obtains when collecting a finite set of uniform samples from a baseband analog signal. The ROAST offers an orthogonal projection which is an approximation to the orthogonal projection onto the leading discrete prolate spheroidal sequence (DPSS) vectors (also known as Slepian basis vectors). As such, the ROAST is guaranteed to accurately and compactly represent not only oversampled bandlimited signals but also the leading DPSS vectors themselves. Moreover, the subspace angle between the ROAST subspace and the corresponding DPSS subspace can be made arbitrarily small. The complexity of computing the representation of a signal using the ROAST is comparable to the FFT, which is much less than the complexity of using the DPSS basis vectors. We also give non-asymptotic results to guarantee that the proposed basis not only provides a very high degree of approximation accuracy in a mean squared error sense for bandlimited sample vectors, but also that it can provide high-quality approximations of all sampled sinusoids within the band of interest.


          Full Orbit Sequences in Affine Spaces via Fractional Jumps and Pseudorandom Number Generation. (arXiv:1712.05258v3 [math.NT] UPDATED)      Cache   Translate Page      

Authors: Federico Amadio Guidi, Sofia Lindqvist, Giacomo Micheli

Let $n$ be a positive integer. In this paper we provide a general theory to produce full orbit sequences in the affine $n$-dimensional space over a finite field. For $n=1$ our construction covers the case of the Inversive Congruential Generators (ICG). In addition, for $n>1$ we show that the sequences produced using our construction are easier to compute than ICG sequences. Furthermore, we prove that they have the same discrepancy bounds as the ones constructed using the ICG.


          Boolean Tensor Decomposition for Conjunctive Queries with Negation. (arXiv:1712.07445v2 [cs.DB] UPDATED)      Cache   Translate Page      

Authors: Mahmoud Abo Khamis, Hung Q. Ngo, Dan Olteanu, Dan Suciu

We propose an algorithm for answering conjunctive queries with negation, where the negated relations have bounded degree. Its data complexity matches that of the best known algorithms for the positive subquery of the input query and is expressed in terms of the fractional hypertree width and the submodular width. The query complexity depends on the structure of the negated subquery; in general it is exponential in the number of join variables occurring in negated relations yet it becomes polynomial for several classes of queries.

This algorithm relies on several contributions. We show how to rewrite queries with negation on bounded-degree relations into equivalent conjunctive queries with not-all-equal (NAE) predicates, which are a multi-dimensional analog of disequality (not-equal). We then generalize the known color-coding technique to conjunctions of NAE predicates and explain it via a Boolean tensor decomposition of conjunctions of NAE predicates. This decomposition can be achieved via a probabilistic construction that can be derandomized efficiently.


          A note on logarithmic growth of solutions of $p$-adic differential equations without solvability. (arXiv:1801.00771v2 [math.NT] UPDATED)      Cache   Translate Page      

Authors: Shun Ohkubo

For a $p$-adic differential equation solvable in an open disc (in a $p$-adic sense), around 1970, Dwork proves that the solutions satisfy a certain growth condition on the boundary. Dwork also conjectures that a similar phenomenon should be observed without assuming the solvability. In this paper, we verify Dwork's conjecture in the rank two case, which is the first non-trivial result on the conjecture. The proof is an application of Kedlaya's decomposition theorem of $p$-adic differential equations defined over annulus.


          On properties of Bourgeois contact structures. (arXiv:1801.00869v4 [math.SG] UPDATED)      Cache   Translate Page      

Authors: Samuel Lisi, Aleksandra Marinković, Klaus Niederkrüger

The Bourgeois construction associates to every contact open book on a manifold $V$ a contact structure on $V\times T^2$. We study in this article some of the properties of $V$ that are inherited by $V\times T^2$ and some that are not.

Giroux has provided recently a suitable framework to work with contact open books. In the appendix of this article, we quickly review this formalism, and we work out a few classical examples of contact open books to illustrate how to use this new language.


          An operator-valued Lyapunov theorem. (arXiv:1801.03109v2 [math.FA] UPDATED)      Cache   Translate Page      

Authors: Sarah Plosker, Christopher Ramsey

We generalize Lyapunov's convexity theorem for classical (scalar-valued) measures to quantum (operator-valued) measures. In particular, we show that the range of a nonatomic quantum probability measure is a weak*-closed convex set of quantum effects (positive operators bounded above by the identity operator) under a sufficient condition on the non-injectivity of integration. To prove the operator-valued version of Lyapunov's theorem, we must first define the notions of essentially bounded, essential support, and essential range for quantum random variables (Borel measurable functions from a set to the bounded linear operators acting on a Hilbert space).


          Stably irrational hypersurfaces of small slopes. (arXiv:1801.05397v3 [math.AG] UPDATED)      Cache   Translate Page      

Authors: Stefan Schreieder

Let k be an uncountable field of characteristic different from two. We show that a very general hypersurface of dimension N>2 and degree at least $\log_2N +2$ is not stably rational over the algebraic closure of k.


          The Slow-coloring Game on Outerplanar, Planar, and $k$-degenerate Graphs. (arXiv:1801.06754v2 [math.CO] UPDATED)      Cache   Translate Page      

Authors: Grzegorz Gutowski, Tomasz Krawczyk, Douglas B. West, Michał Zając, Xuding Zhu

The \emph{slow-coloring game} is played by Lister and Painter on a graph $G$. Initially, all vertices of $G$ are uncolored. In each round, Lister marks a nonempty set $M$ of uncolored vertices, and Painter colors a subset of $M$ that is independent in $G$. The game ends when all vertices are colored. The score of the game is the sum of the sizes of all sets marked by Lister. The goal of Painter is to minimize the score, while Lister tries to maximize it. We provide strategies for Painter on various classes of graphs whose vertices can be partitioned into a bounded number of sets inducing forests, including $k$-degenerate, acyclically $k$-colorable, planar, and outerplanar graphs. For example, we show that on an $n$-vertex graph $G$, Painter can keep the score to at most $\frac{3k+4}4n$ when $G$ is $k$-degenerate, $3.9857n$ when $G$ is acyclically $5$-colorable, $3n$ when $G$ is planar with a Hamiltonian dual, $\frac{8n+3m}5$ when $G$ is $4$-colorable with $m$ edges (hence $3.4n$ when $G$ is planar), and $\frac73n$ when $G$ is outerplanar.


          Cross-over between diffusion-limited and reaction-limited regimes in the coagulation-diffusion process. (arXiv:1801.09216v3 [cond-mat.stat-mech] UPDATED)      Cache   Translate Page      

Authors: Dmytro Shapoval, Maxym Dudka, Xavier Durang, Malte Henkel

The change from the diffusion-limited to the reaction-limited cooperative behaviour in reaction-diffusion systems is analysed by comparing the universal long-time behaviour of the coagulation-diffusion process on a chain and on the Bethe lattice. On a chain, this model is exactly solvable through the empty-interval method. This method can be extended to the Bethe lattice, in the ben-Avraham-Glasser approximation. On the Bethe lattice, the analysis of the Laplace-transformed time-dependent particle-density is analogous to the study of the stationary state, if a stochastic reset to a configuration of uncorrelated particles is added. In this stationary state logarithmic corrections to scaling are found, as expected for systems at the upper critical dimension. Analogous results hold true for the time-integrated particle-density. The crossover scaling functions and the associated effective exponents between the chain and the Bethe lattice are derived.


          Counting and Sampling from Markov Equivalent DAGs Using Clique Trees. (arXiv:1802.01239v2 [cs.DS] UPDATED)      Cache   Translate Page      

Authors: AmirEmad Ghassami, Saber Salehkaleybar, Negar Kiyavash, Kun Zhang

A directed acyclic graph (DAG) is the most common graphical model for representing causal relationships among a set of variables. When restricted to using only observational data, the structure of the ground truth DAG is identifiable only up to Markov equivalence, based on conditional independence relations among the variables. Therefore, the number of DAGs equivalent to the ground truth DAG is an indicator of the causal complexity of the underlying structure--roughly speaking, it shows how many interventions or how much additional information is further needed to recover the underlying DAG. In this paper, we propose a new technique for counting the number of DAGs in a Markov equivalence class. Our approach is based on the clique tree representation of chordal graphs. We show that in the case of bounded degree graphs, the proposed algorithm is polynomial time. We further demonstrate that this technique can be utilized for uniform sampling from a Markov equivalence class, which provides a stochastic way to enumerate DAGs in the equivalence class and may be needed for finding the best DAG or for causal inference given the equivalence class as input. We also extend our counting and sampling method to the case where prior knowledge about the underlying DAG is available, and present applications of this extension in causal experiment design and estimating the causal effect of joint interventions.


          Unified Models for Second-Order TV-Type Regularisation in Imaging - A New Perspective Based on Vector Operators. (arXiv:1802.01895v3 [math.NA] UPDATED)      Cache   Translate Page      

Authors: Eva-Maria Brinkmann, Martin Burger, Joana Sarah Grah

We introduce a novel regulariser based on the natural vector field operations gradient, divergence, curl and shear. For suitable choices of the weighting parameters contained in our model it generalises well-known first- and second-order TV-type regularisation methods including TV, ICTV and TGV$^2$ and enables interpolation between them. To better understand the influence of each parameter, we characterise the nullspaces of the respective regularisation functionals. Analysing the continuous model, we conclude that it is not sufficient to combine penalisation of the divergence and the curl to achieve high-quality results, but interestingly it seems crucial that the penalty functional includes at least one component of the shear or suitable boundary conditions. We investigate which requirements regarding the choice of weighting parameters yield a rotational invariant approach. To guarantee physically meaningful reconstructions, implying that conservation laws for vectorial differential operators remain valid, we need a careful discretisation that we therefore discuss in detail.


          A Unified Gas-kinetic Scheme for Continuum and Rarefied Flows VI: Dilute Disperse Gas-Particle Multiphase System. (arXiv:1802.04961v2 [physics.comp-ph] UPDATED)      Cache   Translate Page      

Authors: Chang Liu, Zhao Wang, Kun Xu

In this paper, a unified gas kinetic scheme for multiphase dilute gas-particle system is proposed. The UGKS multiphase (UGKS-M) is a finite volume method, which captures flow physics in the regimes from collisionless multispecies transport to the two-fluid hydrodynamic Navier-Stokes (NS) solution with the variation of Knudsen number, and from granular flow regime to dusty gas dynamics with the variation of Stokes number. The main reason for preserving the multiscale nature in UGKS-M is mainly coming from the direct modeling of the flow physics in the scales of discrete cell size and time step, where the ratio of the time step over the particle collision time determines flow behavior in different regimes. For the particle phase, the integral solution of the kinetic equation is used in the construction of the numerical flux, which takes into account the particle transport, collision, and acceleration. The gas phase, which is assumed to be in the continuum flow regime, evolves numerically by the gas kinetic scheme (GKS), which is a subset of the UGKS for the Navier-Stokes (NS) solutions. The interaction between the gas and particle phase is calculated based on a velocity space mapping method, which solves accurately the kinetic acceleration process. The stability of UGKS-M is determined by the CFL condition only. With the inclusion of the material temperature evolution equation of solid particles, the UGKS-M conserves the total mass, momentum, and energy for the whole multiphase system. In the numerical tests, the UGKS-M shows good multiscale property in capturing the particle trajectory crossing (PTC), particle wall reflecting phenomena, and vortex-induced segregation of inertial particles under different Stokes numbers. The scheme is also applied to simulate shock induced fluidization problem and the simulation results agree well with experimental measurement.


          Matrix Exponential Learning Schemes with Low Informational Exchange. (arXiv:1802.06652v2 [cs.IT] UPDATED)      Cache   Translate Page      

Authors: Wenjie Li, Mohamad Assaad

We consider a distributed resource allocation problem in networks where each transmitter-receiver pair aims at maximizing its local utility function by adjusting its action matrix, which belongs to a given feasible set. This problem has been addressed recently by applying a matrix exponential learning (MXL) algorithm which has a very appealing convergence rate. In this learning algorithm, however, each transmitter must know an estimate of the gradient matrix of the local utility. The knowledge of the gradient matrix at the transmitters incurs a high signaling overhead especially that the matrix size increases with the dimension of the action matrix. In this paper, we therefore investigate two strategies in order to decrease the informational exchange per iteration of the algorithm. In the first strategy, each receiver sends at each iteration part of the elements of the gradient matrix with respect to a certain probability. In the second strategy, each receiver feeds back sporadically the whole gradient matrix. We focus on the analysis of the convergence of the MXL algorithm to optimum under these two strategies. We prove that the algorithm can still converge to optimum almost surely. Upper bounds of the average convergence rate are also derived in both situations with general step-size setting, from which we can clearly see the impact of the incompleteness of the feedback information. The proposed algorithms are applied to solve the energy efficiency maximization problem in a multicarrier multi-user MIMO network. Simulation results further corroborate our claim.


          Univalence of a certain quartic function. (arXiv:1803.03098v2 [math.CV] UPDATED)      Cache   Translate Page      

Authors: Jimmy Dillies

We give a short proof that the quartic polynomial $f(z)=\frac 1 6 z^{4} + \frac 2 3 z^{3} + \frac 7 6 z^{2} + z$ is univalent.


          Singular limit of BSDEs and Optimal control of two scale stochastic systems in infinite dimensional spaces. (arXiv:1803.05908v2 [math.OC] UPDATED)      Cache   Translate Page      

Authors: Giuseppina Guatteri, Gianmario Tessitore

In this paper we study by probabilistic techniques the convergence of the value function for a two-scale, infinite-dimensional, stochastic controlled system as the ratio between the two evolution speeds diverges. The value function is represented as the solution of a \textit{backward stochastic differential equation} (BSDE) that it is shown to converge towards a \textit{reduced} BSDE. The noise is assumed to be additive both in the slow and the fast equations for the state. Some non degeneracy condition on the slow equation is required. The limit BSDE involves the solution of an \textit{ergodic} BSDE and is itself interpreted as the value function of an auxiliary stochastic control problem on a reduced state space.


          Higher Lelong numbers and convex geometry. (arXiv:1803.07948v3 [math.CV] UPDATED)      Cache   Translate Page      

Authors: Dano Kim, Alexander Rashkovskii

We confirm Demailly's conjecture on the convergence of higher Lelong numbers under the canonical approximation of a plurisubharmonic function, in the case when the function is toric and in the Cegrell class. As applications to convex geometry, we give a unified complex analytic proof of the Alexandrov-Fenchel inequalities for mixed Monge-Amp\`ere masses, mixed covolumes and mixed multiplicities.


          Data-driven Discovery of Closure Models. (arXiv:1803.09318v3 [math.DS] UPDATED)      Cache   Translate Page      

Authors: Shaowu Pan, Karthik Duraisamy

Derivation of reduced order representations of dynamical systems requires the modeling of the truncated dynamics on the retained dynamics. In its most general form, this so-called closure model has to account for memory effects. In this work, we present a framework of operator inference to extract the governing dynamics of closure from data in a compact, non-Markovian form. We employ sparse polynomial regression and artificial neural networks to extract the underlying operator. For a special class of non-linear systems, observability of the closure in terms of the resolved dynamics is analyzed and theoretical results are presented on the compactness of the memory. The proposed framework is evaluated on examples consisting of linear to nonlinear systems with and without chaotic dynamics, with an emphasis on predictive performance on unseen data.


          Semitotal domination in trees. (arXiv:1803.10486v3 [math.CO] UPDATED)      Cache   Translate Page      

Authors: Zhuang Wei, Hao Guoliang

In this paper, we study a parameter that is squeezed between arguably the two important domination parameters, namely the domination number, $\gamma(G)$, and the total domination number, $\gamma_t(G)$. A set $S$ of vertices in $G$ is a semitotal dominating set of $G$ if it is a dominating set of $G$ and every vertex in S is within distance $2$ of another vertex of $S$. The semitotal domination number, $\gamma_{t2}(G)$, is the minimum cardinality of a semitotal dominating set of $G$. We observe that $\gamma(G)\leq \gamma_{t2}(G)\leq \gamma_t(G)$. In this paper, we give a lower bound for the semitotal domination number of trees and we characterize the extremal trees. In addition, we characterize trees with equal domination and semitotal domination numbers.


          Effective Action for Relativistic Hydrodynamics: Fluctuations, Dissipation, and Entropy Inflow. (arXiv:1803.11155v2 [hep-th] UPDATED)      Cache   Translate Page      

Authors: Felix M. Haehl, R. Loganayagam, Mukund Rangamani

We present a detailed and self-contained analysis of the universal Schwinger-Keldysh effective field theory which describes macroscopic thermal fluctuations of a relativistic field theory, elaborating on our earlier construction in arXiv:1511.07809. We write an effective action for appropriate hydrodynamic Goldstone modes and fluctuation fields, and discuss the symmetries to be imposed. The constraints imposed by fluctuation-dissipation theorem are manifest in our formalism. Consequently, the action reproduces hydrodynamic constitutive relations consistent with the local second law at all orders in the derivative expansion, and captures the essential elements of the eightfold classification of hydrodynamic transport of arXiv:1502.00636. We demonstrate how to recover the hydrodynamic entropy and give predictions for the non-Gaussian hydrodynamic fluctuations.

The basic ingredients of our construction involve (i) doubling of degrees of freedom a la Schwinger-Keldysh, (ii) an emergent thermal gauge symmetry associated with entropy which is encapsulated in a Noether current a la Wald, and (iii) a BRST/topological supersymmetry imposing the fluctuation-dissipation theorem a la Parisi-Sourlas. The overarching mathematical framework for our construction is provided by the balanced equivariant cohomology of thermal translations, which captures the basic constraints arising from the Schwinger-Keldysh doubling, and the thermal Kubo-Martin-Schwinger relations. All these features are conveniently implemented in a covariant superspace formalism. An added benefit is that the second law can be understood as being due to entropy inflow from the Grassmann-odd directions of superspace.


          On the relationship between green-to-red sequences, local-acyclicity, and upper cluster algebras. (arXiv:1804.00479v2 [math.AC] UPDATED)      Cache   Translate Page      

Authors: Matthew R. Mills

A cluster is a finite set of generators of a cluster algebra. The Laurent Phenomenon of Fomin and Zelevinsky says that any element of a cluster algebra can be written as a Laurent polynomial in terms of any cluster. The upper cluster algebra of a cluster algebra is the ring of rational functions that can be written as a Laurent polynomial in every cluster of the cluster algebra. By the Laurent phenomenon a cluster algebra is always contained in its upper cluster algebra, but they are not always equal.

In 2014 it was conjectured that the equality of the cluster algebra and upper cluster algebra is equivalent to a combinatorial property regarding the existence of a maximal green sequence. In this work we prove a stronger result for cluster algebras from mutation-finite quivers, and provide a counterexample to show that the conjecture does not hold in general. Finally, we propose a new conjecture about the upper cluster algebra on the relationship which replaces maximal green sequences with more general green-to-red sequences and incorporates Mueller's local-acyclicity.


          Counting graded lattices of rank three that have few coatoms. (arXiv:1804.03679v3 [math.CO] UPDATED)      Cache   Translate Page      

Authors: Jukka Kohonen

We consider the problem of computing $R(c,a)$, the number of unlabeled graded lattices of rank $3$ that contain $c$ coatoms and $a$ atoms. More specifically we do this when $c$ is fairly small, but $a$ may be large. For this task, we describe a computational method that combines constructive listing of basic cases and tools from enumerative combinatorics. With this method we compute the exact values of $R(c,a)$ for $c\le 9$ and $a\le 1000$.

We also show that, for any fixed $c$, there exists a quasipolynomial in $a$ that matches with $R(c,a)$ for all $a$ above a small value. We explicitly determine these quasipolynomials for $c \le 7$, thus finding closed form expressions of $R(c,a)$ for $c \le 7$.


          New Lower Bounds for Permutation Arrays Using Contraction. (arXiv:1804.03768v3 [math.CO] UPDATED)      Cache   Translate Page      

Authors: Sergey Bereg, Zevi Miller, Luis Gerardo Mojica, Linda Morales, I.H. Sudborough

A permutation array $A$ is a set of permutations on a finite set $\Omega$, say of size $n$. Given distinct permutations $\pi, \sigma\in \Omega$, we let $hd(\pi, \sigma) = |\{ x\in \Omega: \pi(x) \ne \sigma(x) \}|$, called the Hamming distance between $\pi$ and $\sigma$. Now let $hd(A) =$ min$\{ hd(\pi, \sigma): \pi, \sigma \in A \}$. For positive integers $n$ and $d$ with $d\le n$, we let $M(n,d)$ be the maximum number of permutations in any array $A$ satisfying $hd(A) \geq d$. There is an extensive literature on the function $M(n,d)$, motivated in part by suggested applications to error correcting codes for message transmission over power lines.

A basic fact is that if a permutation group $G$ is sharply $k$-transitive on a set of size $n\geq k$, then $M(n,n-k+1) = |G|$. Motivated by this we consider the permutation groups $AGL(1,q)$ and $PGL(2,q)$ acting sharply $2$-transitively on $GF(q)$ and sharply $3$-transitively on $GF(q)\cup \{\infty\}$ respectively. Applying a contraction operation to these groups, we obtain the following new lower bounds for prime powers $q$ satisfying $q\equiv 1$ (mod $3$).

1. $M(q-1,q-3)\geq (q^{2} - 1)/2$ for $q$ odd, $q\geq 7$,

2. $M(q-1,q-3)\geq (q-1)(q+2)/3$ for $q$ even, $q\geq 8$,

3. $M(q,q-3)\geq Kq^{2}\log q$ for some constant $K$ if $q$ is odd, $q\geq 13$.

These results resolve a case left open in a previous paper \cite{BLS}, where it was shown that $M(q-1, q-3) \geq q^{2} - q$ and $M(q,q-3) \geq q^{3} - q$ for all prime powers $q$ such that $q\not \equiv 1$ (mod $3$). We also obtain lower bounds for $M(n,d)$ for a finite number of exceptional pairs $n,d$, by applying this contraction operation to the sharply $4$ and $5$-transitive Mathieu groups.


          The Dyson equation with linear self-energy: spectral bands, edges and cusps. (arXiv:1804.07752v4 [math.OA] UPDATED)      Cache   Translate Page      

Authors: Johannes Alt, Laszlo Erdos, Torben Krüger

We study the unique solution $m$ of the Dyson equation \[ -m(z)^{-1} = z - a + S[m(z)] \] on a von Neumann algebra $\mathcal{A}$ with the constraint $\mathrm{Im} \, m\geq 0$. Here, $z$ lies in the complex upper half-plane, $a$ is a self-adjoint element of $\mathcal{A}$ and $S$ is a positivity-preserving linear operator on $\mathcal{A}$. We show that $m$ is the Stieltjes transform of a compactly supported $\mathcal{A}$-valued measure on $\mathbb{R}$. Under suitable assumptions, we establish that this measure has a uniformly $1/3$-H\"{o}lder continuous density with respect to the Lebesgue measure, which is supported on finitely many intervals, called bands. In fact, the density is analytic inside the bands with a square-root growth at the edges and internal cubic root cusps whenever the gap between two bands vanishes. The shape of these singularities is universal and no other singularity may occur. We give a precise asymptotic description of $m$ near the singular points. These asymptotics play a key role in the companion papers on the Tracy-Widom universality for the edge eigenvalue statistics for correlated random matrices [arXiv:1804.07744] and on the Pearcey universality at the cusp for Wigner-type matrices [19]. We also show that the spectral mass of the bands is topologically rigid under deformations and we conclude that these masses are quantized in some important cases.


          On the saturation conjecture for $\operatorname{Spin}(2n)$. (arXiv:1804.09229v3 [math.RT] UPDATED)      Cache   Translate Page      

Authors: Joshua Kiers

In this paper we examine the saturation conjecture on decompositions of tensor products of irreducible representations for complex semisimple algebraic groups of type $D$ (the even \emph{spin} groups: Spin$(2n)$ for $n\ge 4$ an integer), extending work done by Kumar-Kapovich-Millson on Spin(8). Our main theorem asserts that the saturation conjecture holds for Spin(10) and Spin(12): for all triples of dominants weights $\lambda,\mu,\nu$ such that $\lambda+\mu+\nu$ is in the root lattice, and for any $N>0$, $$ \left(V(\lambda)\otimes V(\mu)\otimes V(\nu)\right)^G \ne 0 $$ if and only if $$ \left(V(N\lambda)\otimes V(N\mu)\otimes V(N\nu)\right)^G\ne 0, $$ for $G=$ Spin(10) or Spin(12). Some related results for groups of other types are listed as well.


          Stabilization of port-Hamiltonian systems by nonlinear boundary control in the presence of disturbances. (arXiv:1804.10598v2 [math.OC] UPDATED)      Cache   Translate Page      

Authors: Jochen Schmid, Hans Zwart

In this paper, we are concerned with the stabilization of linear port-Hamiltonian systems of arbitrary order $N \in \mathbb{N}$ on a bounded $1$-dimensional spatial domain $(a,b)$. In order to achieve stabilization, we couple the system to a dynamic boundary controller, that is, a controller that acts on the system only via the boundary points $a,b$ of the spatial domain. We use a nonlinear controller in order to capture the nonlinear behavior that realistic actuators often exhibit and, moreover, we allow the output of the controller to be corrupted by actuator disturbances before it is fed back into the system. What we show here is that the resulting nonlinear closed-loop system is input-to-state stable w.r.t.~square-integrable disturbance inputs. In particular, we obtain uniform input-to-state stability for systems of order $N=1$ and a special class of nonlinear controllers, and weak input-to-state stability for systems of arbitrary order $N \in \mathbb{N}$ and a more general class of nonlinear controllers. Also, in both cases, we obtain convergence to $0$ of all solutions as $t \to \infty$. Applications are given to vibrating strings and beams.


          First eigenvalue of the $p$-Laplacian on K\"ahler manifolds. (arXiv:1804.10876v2 [math.DG] UPDATED)      Cache   Translate Page      

Authors: Casey Blacker, Shoo Seto

We prove a Lichnerowicz type lower bound for the first nontrivial eigenvalue of the $p$-Laplacian on K\"ahler manifolds. Parallel to the $p = 2$ case, the first eigenvalue lower bound is improved by using a decomposition of the Hessian on K\"ahler manifolds with positive Ricci curvature.


          On the dimension and measure of inhomogeneous attractors. (arXiv:1805.00887v3 [math.MG] UPDATED)      Cache   Translate Page      

Authors: Stuart A. Burrell

A central question in the field of inhomogeneous attractors has been to relate the dimension of an inhomogeneous attractor to the condensation set and associated homogeneous attractor. This has been achieved only in specific settings, with notable results by Olsen, Snigireva, Fraser and Kaenmaki on inhomogeneous self-similar sets, and by Burrell and Fraser on inhomogeneous self-affine sets. This paper is devoted to filling a significant gap in the dimension theory of inhomogeneous attractors, by studying those formed from arbitrary bi-Lipschitz contractions. We show that the maximum of the dimension of the condensation set and a quantity related to pressure, which we term upper Lipschitz dimension, forms a natural and general upper bound on the dimension. Additionally, we begin a new line of enquiry; the methods developed are used to classify the Hausdorff measure of inhomogeneous attractors. Our results have applications for affine systems with affinity dimension less than or equal to one and systems satisfying bounded distortion, such as conformal systems in dimensions greater than one.


          Statistical mechanical analysis of sparse linear regression as a variable selection problem. (arXiv:1805.11259v2 [cond-mat.dis-nn] UPDATED)      Cache   Translate Page      

Authors: Tomoyuki Obuchi, Yoshinori Nakanishi-Ohno, Masato Okada, Yoshiyuki Kabashima

An algorithmic limit of compressed sensing or related variable-selection problems is analytically evaluated when a design matrix is given by an overcomplete random matrix. The replica method from statistical mechanics is employed to derive the result. The analysis is conducted through evaluation of the entropy, an exponential rate of the number of combinations of variables giving a specific value of fit error to given data which is assumed to be generated from a linear process using the design matrix. This yields the typical achievable limit of the fit error when solving a representative $\ell_0$ problem and includes the presence of unfavourable phase transitions preventing local search algorithms from reaching the minimum-error configuration. The associated phase diagrams are presented. A noteworthy outcome of the phase diagrams is that there exists a wide parameter region where any phase transition is absent from the high temperature to the lowest temperature at which the minimum-error configuration or the ground state is reached. This implies that certain local search algorithms can find the ground state with moderate computational costs in that region. Another noteworthy result is the presence of the random first-order transition in the strong noise case. The theoretical evaluation of the entropy is confirmed by extensive numerical methods using the exchange Monte Carlo and the multi-histogram methods. Another numerical test based on a metaheuristic optimisation algorithm called simulated annealing is conducted, which well supports the theoretical predictions on the local search algorithms. In the successful region with no phase transition, the computational cost of the simulated annealing to reach the ground state is estimated as the third order polynomial of the model dimensionality.


          Liouville property of strongly transitive actions. (arXiv:1806.02753v2 [math.GR] UPDATED)      Cache   Translate Page      

Authors: Kate Juschenko

Liouville property of actions of discrete groups can be reformulated in terms of existence co-F$\o$lner sets. Since every action of amenable group is Liouville, the property can be served as an approach for proving non-amenability. The verification of this property is conceptually different than finding a non-amenable action. There are many groups that are defined by strongly transitive actions. In some cases amenability of such groups is an open problem. We define $n$-Liouville property of action to be Liouville property of point-wise action of the group on the sets of cardinality $n$. We reformulate $n$-Liouville property in terms of additive combinatorics and prove it for $n=1, 2$. The case $n\geq 3$ remains open.


          Sturm attractors for quasilinear parabolic equations with singular coefficients. (arXiv:1806.04019v2 [math.DS] UPDATED)      Cache   Translate Page      

Authors: Phillipo Lappicy

The goal of this paper is to construct explicitly the global attractors of parabolic equations with singular diffusion coefficients on the boundary, as it was done without the singular term for the semilinear case by Brunovsk'y and Fiedler (1986), generalized by Fiedler and Rocha (1996) and later for quasilinear equa- tions by the author (2017). In particular, we construct heteroclinic connections between hyperbolic equilibria, stating necessary and sufficient conditions for heteroclinics to occur. Such conditions can be computed through a permutation of the equilibria. Lastly, an example is computed yielding the well known Chafee-Infante attractor.


          Duality of Gabor frames and Heisenberg modules. (arXiv:1806.05616v3 [math.FA] UPDATED)      Cache   Translate Page      

Authors: Mads S. Jakobsen, Franz Luef

Given a locally compact abelian group $G$ and a closed subgroup $\Lambda$ in $G\times\widehat{G}$, Rieffel associated to $\Lambda$ a Hilbert $C^*$-module $\mathcal{E}$, known as a Heisenberg module. He proved that $\mathcal{E}$ is an equivalence bimodule between the twisted group $C^*$-algebra $C^*(\Lambda,\textsf{c})$ and $C^*(\Lambda^\circ,\overline{\textsf{c}})$, where $\Lambda^{\circ}$ denotes the adjoint subgroup of $\Lambda$. Our main goal is to study Heisenberg modules using tools from time-frequency analysis and pointing out that Heisenberg modules provide the natural setting of the duality theory of Gabor systems. More concretely, we show that the Feichtinger algebra ${\textbf{S}}_{0}(G)$ is an equivalence bimodule between the Banach subalgebras ${\textbf{S}}_{0}(\Lambda,\textsf{c})$ and ${\textbf{S}}_{0}(\Lambda^{\circ},\overline{\textsf{c}})$ of $C^*(\Lambda,\textsf{c})$ and $C^*(\Lambda^\circ,\overline{\textsf{c}})$, respectively. Further, we prove that ${\textbf{S}}_{0}(G)$ is finitely generated and projective exactly for co-compact closed subgroups $\Lambda$. In this case the generators $g_1,\ldots,g_n$ of the left ${\textbf{S}}_{0}(\Lambda)$-module ${\textbf{S}}_{0}(G)$ are the Gabor atoms of a multi-window Gabor frame for $L^2(G)$. We prove that this is equivalent to $g_1,\ldots,g_n$ being a Gabor super frame for the closed subspace generated by the Gabor system for $\Lambda^{\circ}$. This duality principle is of independent interest and is also studied for infinitely many Gabor atoms. We also show that for any non-rational lattice $\Lambda$ in $\mathbb{R}^{2m}$ with volume ${s}(\Lambda)<1$ there exists a Gabor frame generated by a single atom in ${\textbf{S}}_{0}(\mathbb{R}^m)$.


          Embeddings of $3$--manifolds via open books. (arXiv:1806.09784v2 [math.GT] UPDATED)      Cache   Translate Page      

Authors: Dishant M. Pancholi, Suhas Pandit, Kuldeep Saha

In this note, we discuss embeddings of $3$--manifolds via open books. First we show that every open book of every closed orientable $3$--manifold admits an open book embedding in any open book decompistion of $S^2 \times S^3$ and $S^2 \widetilde{\times} S^3$ with the page a disk bundle over $S^2$ and monodromy the identity. We then use open book embeddings to reprove that every closed orientable $3$--manifold embeds in $S^5.$


          Behavior of zeros of $X_{1}$-Jacobi and $X_{1}$-Laguerre exceptional polynomials. (arXiv:1807.00034v2 [math.CA] UPDATED)      Cache   Translate Page      

Authors: Yen Chi Lun

The $X_1$-Jacobi and the $X_1$-Laguerre exceptional orthogonal polynomials have been introduced and studied by G\'omez-Ullate, Kamran and Milson in a series of papers. In this note, we establish some properties about the called regular and exceptional zeros of these two classes of polynomials such as interlacing, monotonicity with respect to the parameters and asymptotic behavior.


          Constrained dynamical optimal transport and its Lagrangian formulation. (arXiv:1807.00937v2 [math.OC] UPDATED)      Cache   Translate Page      

Authors: Wuchen Li, Stanley Osher

We propose dynamical optimal transport (OT) problems constrained in a parameterized probability subset. In application problems such as deep learning, the probability distribution is often generated by a parameterized mapping function. In this case, we derive a simple formulation for the constrained dynamical OT.


          Optimum Transmission Delay for Function Computation in NFV-based Networks: the role of Network Coding and Redundant Computing. (arXiv:1807.03337v2 [cs.IT] UPDATED)      Cache   Translate Page      

Authors: Behrooz Tahmasebi, Mohammad Ali Maddah-Ali, Saeedeh Parsaeefard, Babak Hossein Khalaj

In this paper, we study the problem of delay minimization in NFV-based networks. In such systems, the ultimate goal of any request is to compute a sequence of functions in the network, where each function can be computed at only a specific subset of network nodes. In conventional approaches, for each function, we choose one node from the corresponding subset of the nodes to compute that function. In contrast, in this work, we allow each function to be computed in more than one node, redundantly in parallel, to respond to a given request. We argue that such redundancy in computation not only improves the reliability of the network, but would also, perhaps surprisingly, reduce the overall transmission delay. In particular, we establish that by judiciously choosing the subset of nodes which compute each function, in conjunction with a linear network coding scheme to deliver the result of each computation, we can characterize and achieve the optimal end-to-end transmission delay. In addition, we show that using such technique, we can significantly reduce the transmission delay as compared to the conventional approach. In some scenarios, such reduction can even scale with the size of the network. More precisely, by increasing the number of nodes that can compute the given function in parallel by a multiplicative factor, the end-to-end delay will also decrease by the same factor. Moreover, we show that while finding the subset of nodes for each computation, in general, is a complex integer program, approximation algorithms can be proposed to reduce the computational complexity. In fact, for the case where the number of computing nodes for a given function is upper-bounded by a constant, a dynamic programming scheme can be proposed to find the optimum subsets in polynomial times. Our numerical simulations confirm the achieved gain in performance in comparison with conventional approaches.


          Soap films with gravity and almost-minimal surfaces. (arXiv:1807.05200v2 [math.AP] UPDATED)      Cache   Translate Page      

Authors: Francesco Maggi, Antonello Scardicchio, Salvatore Stuvard

Motivated by the study of the equilibrium equations for a soap film hanging from a wire frame, we prove a compactness theorem for surfaces with asymptotically vanishing mean curvature and fixed or converging boundaries. In particular, we obtain sufficient geometric conditions for the minimal surfaces spanned by a given boundary to represent all the possible limits of sequences of almost-minimal surfaces. Finally, we provide some sharp quantitative estimates on the distance of an almost-minimal surface from its limit minimal surface.


          The Structure of BPS Equations for Ambi-polar Microstate Geometries. (arXiv:1807.06596v2 [hep-th] UPDATED)      Cache   Translate Page      

Authors: Alexander Tyukov, Robert Walker, Nicholas P. Warner

Ambi-polar metrics, defined so as to allow the signature to change from +4 to -4 across hypersurfaces, are a mainstay in the construction of BPS microstate geometries. This paper elucidates the cohomology of these spaces so as to simplify greatly the construction of infinite families of fluctuating harmonic magnetic fluxes. It is argued that such fluxes should come from scalar, harmonic pre-potentials whose source loci are holomorphic divisors. This insight is obtained by exploring the Kahler structure of ambi-polar Gibbons-Hawking spaces and it is shown that differentiating the pre-potentials with respect to Kahler moduli yields solutions to the BPS equations for the electric potentials sourced by the magnetic fluxes. This suggests that harmonic analysis on ambi-polar spaces has a novel, and an extremely rich structure, that is deeply intertwined with the BPS equations. We illustrate our results using a family of two-centered solutions.


          An invariance principle for ergodic scale-free random environments. (arXiv:1807.07515v2 [math.PR] UPDATED)      Cache   Translate Page      

Authors: Ewain Gwynne, Jason Miller, Scott Sheffield

There are many classical random walk in random environment results that apply to ergodic random planar environments. We extend some of these results to random environments in which the length scale varies from place to place, so that the law of the environment is in a certain sense only translation invariant modulo scaling. For our purposes, an "environment" consists of an infinite random planar map embedded in $\mathbb C$, each of whose edges comes with a positive real conductance. Our main result is that under modest constraints (translation invariance modulo scaling together with the finiteness of a type of specific energy) a random walk in this kind of environment converges to Brownian motion modulo time parameterization in the quenched sense.

Environments of the type considered here arise naturally in the study of random planar maps and Liouville quantum gravity. In fact, the results of this paper are used in separate works to prove that certain random planar maps (embedded in the plane via the so-called Tutte embedding) have scaling limits given by SLE-decorated Liouville quantum gravity, and also to provide a more explicit construction of Brownian motion on the Brownian map. However, the results of this paper are much more general and can be read independently of that program.

One general consequence of our main result is that if a translation invariant (modulo scaling) random embedded planar map and its dual have finite energy per area, then they are close on large scales to a minimal energy embedding (the harmonic embedding). To establish Brownian motion convergence for an infinite energy embedding, it suffices to show that one can perturb it to make the energy finite.


          On the logical complexity of cyclic arithmetic. (arXiv:1807.10248v3 [cs.LO] UPDATED)      Cache   Translate Page      

Authors: Anupam Das

We study the logical complexity of proofs in cyclic arithmetic ($\mathsf{CA}$), as introduced in Simpson '17, in terms of quantifier alternations of formulae occurring. Writing $C\Sigma_n$ for (the logical consequences of) cyclic proofs containing only $\Sigma_n$ formulae, our main result is that $I\Sigma_{n+1}$ and $C\Sigma_n$ prove the same $\Pi_{n+1}$ theorems, for all $n\geq 0$. Furthermore, due to the 'uniformity' of our method, we also show that $\mathsf{CA}$ and Peano Arithmetic ($\mathsf{PA}$) proofs of the same theorem differ only exponentially in size.

The inclusion $I\Sigma_{n+1} \subseteq C\Sigma_n$ is obtained by proof theoretic techniques, relying on normal forms and structural manipulations of $\mathsf{PA}$ proofs. It improves upon the natural result that $I\Sigma_n$ is contained in $C\Sigma_n$. The converse inclusion, $C\Sigma_n \subseteq I\Sigma_{n+1}$, is obtained by calibrating the approach of Simpson '17 with recent results on the reverse mathematics of B\"uchi's theorem in Ko{\l}odziejczyk, Michalewski, Pradic & Skrzypczak '16, and specialising to the case of cyclic proofs. These results improve upon the bounds on proof complexity and logical complexity implicit in Simpson '17 and also an alternative approach due to Berardi & Tatsuta '17.

The uniformity of our method also allows us to recover a metamathematical account of fragments of $\mathsf{CA}$; in particular we show that, for $n\geq 0$, the consistency of $C\Sigma_n$ is provable in $I\Sigma_{n+2}$ but not $I\Sigma_{n+1}$.


          $p$-adic dynamical systems of $(3,1)$-rational functions with unique fixed point. (arXiv:1807.11561v2 [math.DS] UPDATED)      Cache   Translate Page      

Authors: A.R. Luna, U.A. Rozikov, I.A. Sattarov

We describe the set of all $(3,1)$-rational functions given on the set of complex $p$-adic field $\mathbb C_p$ and having a unique fixed point. We study $p$-adic dynamical systems generated by such $(3,1)$-rational functions and show that the fixed point is indifferent and therefore the convergence of the trajectories is not the typical case for the dynamical systems. We obtain Siegel disks of these dynamical systems. Moreover an upper bound for the set of limit points of each trajectory is given. For each $(3,1)$-rational function on $\mathbb C_p$ there is a point $\hat x=\hat x(f)\in \mathbb C_p$ which is zero in its denominator. We give explicit formulas of radii of spheres (with the center at the fixed point) containing some points that the trajectories (under actions of $f$) of the points after a finite step come to $\hat x$. For a class of $(3,1)$-rational functions defined on the set of $p$-adic numbers $\mathbb Q_p$ we study ergodicity properties of the corresponding dynamical systems. We show that if $p\geq 3$ then the $p$-adic dynamical system reduced on each invariant sphere is not ergodic with respect to Haar measure. For $p=2$, under some conditions we prove non ergodicity and show that there exists a sphere on which the dynamical system is ergodic. Finally, we give a characterization of periodic orbits and some uniformly local properties of the $(3.1)-$rational functions.


          A quasi-strictly non-volterra quadratic stochastic operator. (arXiv:1808.00229v2 [math.DS] UPDATED)      Cache   Translate Page      

Authors: A.J.M. Hardin, U.A. Rozikov

We consider a four-parameter family of non-Volterra operators defined on the two-dimensional simplex and show that, with one exception, each such operator has a unique fixed point. Depending on the parameters, we establish the type of this fixed point. We study the set of limit points for each trajectory and show that this set can be a single point or can contain a 2-periodic trajectory.


          Safe Dependency Atoms and Possibility Operators in Team Semantics. (arXiv:1808.00710v2 [math.LO] UPDATED)      Cache   Translate Page      

Authors: Pietro Galliani (Free University of Bozen-Bolzano)

I consider the question of which dependencies are safe for a Team Semantics-based logic FO(D), in the sense that they do not increase its expressive power over sentences when added to it. I show that some dependencies, like totality, non-constancy and non-emptiness, are safe for all logics FO(D), and that other dependencies, like constancy, are not safe for FO(D) for some choices of D despite being strongly first order. I furthermore show that the possibility operator, which holds in a team if and only if its argument holds in some nonempty subteam, can be added to any logic FO(D) without increasing its expressive power over sentences.


          On Volterra quadratic stochastic operators of a two-sex population on $S^1\times S^1$. (arXiv:1808.01812v2 [math.DS] UPDATED)      Cache   Translate Page      

Authors: O. Castanos, U.U. Jamilov, U.A. Rozikov

We consider a four-parametric $(a, b, \alpha, \beta)$ family of Volterra quadratic stochastic operators for a bisexual population (i.e., each organism of the population must belong either to the female sex or the male sex). We show that independently on parameters each such operator has at least two fixed points. Moreover, under some conditions on parameters the operator has infinitely many (continuum) fixed points. Choosing parameters, numerically we show that a fixed point may be any type: attracting, repelling, saddle and non-hyperbolic. We separate five subfamilies of quadratic operators and show that each operator of these subfamilies is regular, i.e. any trajectory constructed by the operator converges to a fixed point.


          Ricci curvature and isometric actions with scaling nonvanishing property. (arXiv:1808.02329v3 [math.DG] UPDATED)      Cache   Translate Page      

Authors: Jiayin Pan, Xiaochun Rong

In the study manifolds of Ricci curvature bounded below, a stumbling obstruction is the lack of links between large-scale geometry and small-scale geometry at a fixed reference point. There have been few links (volume, dimension) when the unit ball at the point is not collapsed, that is, $\mathrm{vol}(B_1(p))\ge v>0$. In this paper, we conjecture a new link in terms of isometries: if the maximal displacement of an isometry $f$ on $B_1(p)$ is at least $\delta>0$, then the maximal displacement of $f$ on the rescaled unit ball $r^{-1}B_r(p)$ is at least $\Phi(\delta,n,v)>0$ for all $r\in(0,1)$. We call this scaling $\Phi$-nonvanishing property at $p$. We study the equivariant Gromov-Hausdorff convergence of a sequence of Riemannian universal covers with abelian $\pi_1(M_i,p_i)$-actions $(\widetilde{M}_i,\tilde{p}_i,\pi_1(M_i,p_i))\overset{GH}\longrightarrow(\widetilde{X},\tilde{p},G)$, where $\pi_1(M_i,p_i)$-action is scaling $\Phi$-nonvanishing at $\tilde{p_i}$. We establish a dimension monotonicity on the limit group associated to any rescaling sequence. As one of the applications, we prove that for an open manifold $M$ of non-negative Ricci curvature, if the universal cover $\widetilde{M}$ has Euclidean volume growth and $\pi_1(M,p)$-action on $R^{-1}\widetilde{M}$ is scaling $\Phi$-nonvanishing at $\tilde{p}$ for all $R$ large, then $\pi_1(M)$ is finitely generated.


          Stein's method for asymmetric $\alpha$-stable distributions, with application to the stable CLT. (arXiv:1808.02405v3 [math.PR] UPDATED)      Cache   Translate Page      

Authors: Peng Chen, Ivan Nourdin, Lihu Xu

This paper is concerned with the Stein's method associated with a (possibly) asymmetric $\alpha$-stable distribution $Z$, in dimension one. More precisely, its goal is twofold. In the first part, we exhibit a genuine bound for the Wasserstein distance between $Z$ and any integrable random variable $X$, in terms of an operator that reduces to the classical fractional Laplacian in the symmetric case. Then, in the second part we apply the aforementioned bound to compute error rates in the stable central limit theorem, when the entries are in the domain $\mathcal{D}_\alpha$ of normal attraction of a stable law of exponent $\alpha$. To conclude, we study the specific case where the entries are Pareto like multiplied by a slowly varying function, which provides an example of random variables that do not belong to $\mathcal{D}_\alpha$, but for which our approach continues to apply.


          Dirac spinors and their application to Bianchi-I space-times in 5 dimensions. (arXiv:1808.08536v2 [gr-qc] UPDATED)      Cache   Translate Page      

Authors: Stefano Vignolo, Luca Fabbri, Oscar Castillo-Felisola

We consider a five-dimensional Einstein--Cartan spacetime upon which Dirac spinor fields can be defined. Dirac spinor fields in five and four dimensions share many features, like the fact that both are described by four-component spinor fields, but they are also characterized by strong differences, like the fact that in five dimensions we do not have the possibility to project on left-handed and right-handed chiral parts unlike what happens in the four-dimensional instance: we conduct a polar decomposition of the spinorial fields, so to highlight all similarities and discrepancies. As an application of spinor fields in five dimensions, we study Bianchi-I spacetimes, verifying whether the Dirac fields in five dimensions can give rise to inflation or dark-energy dominated cosmological eras or not.


          The Steinberg relation in the stable motivic homotopy theory over a base. (arXiv:1809.00087v2 [math.AG] UPDATED)      Cache   Translate Page      

Authors: A. Druzhinin

We prove the Steinberg relation in the sections of the Zariski sheaf $\underline{\pi}^{2,2}$ in $\mathbf{SH}(S)$ over a noetherian base scheme $S$ of a finite Krull dimension (actually for an arbitrary base scheme $S$ such that $\mathbf{SH}(U)$ exists for any Zariski open $U\subset S$). Namely we prove that the class of the morphism $$(1-x,x)\colon \mathbf (A^1-\{0,1\})\times S\to \mathbf G_m\times\mathbf G_m/(1\times\mathbf G_m\cup \mathbf G_m\times 1)$$ is trivial in the stable motivic homotopy category $$[(1-x,x)]=0\in [A^1_S-\{0_S,1_S\},\mathbf G_m^{\wedge 2}]_{\mathbf{SH}(S)}.$$


          Convex optimization using quantum oracles. (arXiv:1809.00643v2 [quant-ph] UPDATED)      Cache   Translate Page      

Authors: Joran van Apeldoorn, András Gilyén, Sander Gribling, Ronald de Wolf

We study to what extent quantum algorithms can speed up solving convex optimization problems. Following the classical literature we assume access to a convex set via various oracles, and we examine the efficiency of reductions between the different oracles. In particular, we show how a separation oracle can be implemented using $\tilde{O}(1)$ quantum queries to a membership oracle, which is an exponential quantum speed-up over the $\Omega(n)$ membership queries that are needed classically. We show that a quantum computer can very efficiently compute an approximate subgradient of a convex Lipschitz function. Combining this with a simplification of recent classical work of Lee, Sidford, and Vempala gives our efficient separation oracle. This in turn implies, via a known algorithm, that $\tilde{O}(n)$ quantum queries to a membership oracle suffice to implement an optimization oracle (the best known classical upper bound on the number of membership queries is quadratic). We also prove several lower bounds: $\Omega(\sqrt{n})$ quantum separation (or membership) queries are needed for optimization if the algorithm knows an interior point of the convex set, and $\Omega(n)$ quantum separation queries are needed if it does not.


          Quantized Vershik-Kerov Theory and Quantized Central Measures on Branching Graphs. (arXiv:1804.02644v2 [math.RT] CROSS LISTED)      Cache   Translate Page      

Authors: Ryosuke Sato

We propose a natural quantized character theory for inductive systems of compact quantum groups based on KMS states on AF-algebras following Stratila-Voiculescu's work (Stratila-Voiculescu, 1975) (or (Enomoto-Izumi, 2016)), and give its serious investigation when the system consists of quantum unitary groups $U_q(N)$ with $q$ in $(0,1)$. The key features of this work are: The "quantized trace" of a unitary representation of a compact quantum group can be understood as a quantized character associated with the unitary representation and its normalized one is captured as a KMS state with respect to a certain one-parameter automorphism group related to the so-called scaling group. In this paper we provide a Vershik-Kerov type approximation theorem for extremal quantized characters (called the ergodic method) and also compare our quantized character theory for the inductive system of $U_q(N)$ with Gorin's theory on $q$-Gelfand-Tsetlin graphs (Gorin, 2012).


          An analogue of Schur functions for the plane partitions. (arXiv:1808.01059v3 [hep-th] CROSS LISTED)      Cache   Translate Page      

Authors: A.Morozov

An attempt is described to extend the notion of Schur functions from Young diagrams to plane partitions. The suggestion is to use the recursion in the partition size, which is easily generalized and deformed. This opens a possibility to obtain Macdonald polynomials by a change of recursion coefficients and taking appropriate limit from three to two dimensions -- though details still remain to be worked out. Another perspective is opened by the observation of a rich non-abelian structure, extending that of commuting cut-and-join operators, for which the discovered 3-Schurs are the common eigenfunctions.


          Secret Sharing with Binary Shares. (arXiv:1808.02974v2 [cs.CR] CROSS LISTED)      Cache   Translate Page      

Authors: Fuchun Lin, Mahdi Cheraghchi, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang

Shamir's celebrated secret sharing scheme provides an efficient method for encoding a secret of arbitrary length $\ell$ among any $N \leq 2^\ell$ players such that for a threshold parameter $t$, (i) the knowledge of any $t$ shares does not reveal any information about the secret and, (ii) any choice of $t+1$ shares fully reveals the secret. It is known that any such threshold secret sharing scheme necessarily requires shares of length $\ell$, and in this sense Shamir's scheme is optimal. The relaxed notion of ramp schemes requires the reconstruction of secret from any $t+1+g$ shares, for a gap parameter $g>0$. Ramp secret sharing is possible with share lengths depending only on the gap ratio $g/N$.

In this work, we study secret sharing in the extremal case of bit-long shares, where even ramp secret sharing becomes impossible. We show, however, that a slightly relaxed but equally effective notion of semantic security for the secret, and negligible reconstruction error probability, eliminates the impossibility. Moreover, we provide explicit constructions of such schemes. Our relaxation results in separation of adaptive and non-adaptive adversaries. For non-adaptive adversaries, we explicitly construct secret sharing schemes that provide secrecy against any $\tau$ fraction of observed shares, and reconstruction from any $\kappa$ fraction of shares, for any choices of $0 \leq \tau < \kappa \leq 1$. Our construction achieves secret length $N(\kappa-\tau-o(1))$ which we show to be optimal. Finally, we construct explicit schemes against adaptive adversaries attaining a secret length $\Omega(N(\kappa-\tau))$. Our work makes a new connection between secret sharing and coding theory, this time wiretap codes, that was not known before, and raises new interesting open questions.


          Approximately counting bases of bicircular matroids. (arXiv:1808.09548v1 [cs.DS] CROSS LISTED)      Cache   Translate Page      

Authors: Heng Guo, Mark Jerrum

We give a fully polynomial-time randomised approximation scheme (FPRAS) for the number of bases in a bicircular matroids. This is a natural class of matroids for which counting bases exactly is #P-hard and yet approximate counting can be done efficiently.


          “Dövlət informasiya ehtiyatları və sistemlərinin formalaşdırılması, aparılması, inteqrasiyası və arxivləşdirilməsi Qaydaları” təsdiq edilib      Cache   Translate Page      
Prezident İlham Əliyev “Dövlət informasiya ehtiyatları və sistemlərinin formalaşdırılması, aparılması, inteqrasiyası və arxivləşdirilməsi Qaydaları”nın təsdiq edilməsi və elektron hökumətlə bağlı bəzi tədbirlər haqqında Fərman imzalayıb. AZƏRTAC xəbər verir ki, Fərmana əsasən
          Dövlət informasiya ehtiyatları və sistemlərinin formalaşdırılması, aparılması, inteqrasiyası və arxivləşdirilməsi QAYDALARI      Cache   Translate Page      
1.1. “Dövlət informasiya ehtiyatları və sistemlərinin formalaşdırılması, aparılması, inteqrasiyası və arxivləşdirilməsi Qaydaları” (bundan sonra – Qaydalar) “Elektron hökumətin inkişafı və rəqəmsal hökumətə keçid ilə bağlı tədbirlər haqqında” Azərbaycan Respublikası Prezidentinin
          “Paket”lərdə gələn pullar – Böyük rəhbərlərin kiçik maaşları      Cache   Translate Page      
SSRİ rəhbərlərinin şəxsi həyatları, yaşam tərzi sovet dönəmində nə qədər gizli və qapalı saxlansa da, ölkə dağıldıqdan sonra açılan arxivlər bu şəxslərin həyat tərzlərinin bütün məqamlarını eninə-boyuna ictimaiyyətə təqdim etdi. Hətta arxivlər sovet liderlərinin ciblərini də açıb göstərdi. Kommunizmə doğru […]
          LA ESTAFA QUE QUIERE QUEDARSE CON TODO, TUS DATOS Y TU CUENTA (PARA VACIARLA)      Cache   Translate Page      
La suplantación de identidad -o phishing-  es un método para realizar estafas por internet conocido desde la década de 1980 y comenzó a hacerse popular en los años siguientes, con la popularización de la red de redes. El término phishing fue inventado por el hacker y spammer Khan C. Smith y la primera estafa que se conoce estaba relacionada con robar contraseñas y datos financieros de los usuarios de America Online, según los archivos de la Universidad Cornell. De hecho, la palabra está relacionada con “pescar” usuarios de AOL (“pescar” en inglés es “fishing”.
Una forma habitual es enviar un mail avisando de una deuda o de la falta de actualización de datos de contacto o de pago con una institución conocida. Ese correo incluye un sitio web que, en ocasiones, es similar al de la institución. Cuando se entra al sitio web, la pantalla que aparece solicita una serie de datos que luego usará para obtener dinero (de cuentas bancarias o tarjetas de crédito) o datos directamente para venderlos.
En la actualidad, es uno de los métodos de estafa online más populares, más que nada en su modalidad “bulk” (en criollo, envían mails al voleo). Sin embargo, el número de sitios únicos de phishing identificados por el Antipishing Working Group bajo en el último trimestre de 2017 (180.757 frente a 190.942 en el tercero) y en el año contra año (de un total de 277.693 en el último trimestre de 2016). Esta caída podría deberse a un cambio en la metodología de medición, ya que ahora se computan direcciones web que suelen aparecen con URL personalizadas pero que dirigen al mismo lugar, según consigna el blog Segu-info.

El caso más reciente: PayPal (y Apple)

Como puede verse en la imagen dada a conocer desde la cuenta del Twitter del blog mencionado, el correo en cuestión llega en este caso sin enlace (para evitar las medidas de seguridad de los distintos clientes de correo) pero con un archivo PDF adjunto. En él se informa que los datos propios en la cuenta de PayPal son incorrectos y que si el usuario quiere seguir utilizando la cuenta deberá actualizar. Por supuesto, en el PDF sí aparece una dirección web  que lleva a un sitio web que comienza con “country0-mypapal” y que pide mail y contraseña. Una vez que el usuario introduce los datos, los ladrones se habrán hecho con los datos de PayPal. En el caso de Apple, pide información para quedarse con el Apple ID de los usuarios de la manzanita.

 

Qué buscan

Según Borghello, en este caso se trata tan solo de los datos más básicos del usuario, ya que luego de introducirlos en la pantalla mostrada arriba, el sitio web redirige a la página oficial de PayPal. ¿Qué pueden hacer con esos datos? Si bien no pueden acceder a los datos de las tarjetas de crédito y débito, si pueden utilizar el saldo precargado que se pueda tener en la cuenta, tal como lo confima Camilo Gutiérrez , jefe de Laboratorio de la compañía de ciberseguridad ESET.
Además -dice Rodríguez-, "cuando uno se loguea utiliza el mismo correo electrónico y la misma clave que usa en otros servicios, algo que hacen muchos usuarios; ahí pueden matar muchos pájaros de un tiro". Si consiguen ingresar a la cuenta de email, desde allí podrán modificar y hacerse con las contraseñas de muchos otros servicios, como las de las redes sociales. 
Un dato a tener en cuenta es que quien roba los datos no es quien necesariamente lo va a utilizar. "Estos suelen ponerse a la venta en mercados de la Deep Web. Se trata de bases de datos de, por ejemplo, 10.000 cuentas de correos electrónicos con contraseñas -no todas funcionan, por supuesto- y hay personas que luego utilizan esa información. Así que un posible objetivo es obtener la información para obtener ganancias con ella."
 

Consejos útiles

Desde ya, la recomendación es no hacer caso a este tipo de email. ¿Cómo darse cuenta? Si uno mira el mail, vera que más allá del nombre de fantasía de la cuenta (Centro de Ayuda de PayPal), la dirección real está llena de números y no tiene mucho sentido. En el PDF, hay una serie de errores de edición que las empresas suelen cuidar mucho (la prolijidad en las comunicaciones es parte de la imagen corporativa): dos, puntualmente –como puede verse en la imagen-, un salto de línea en el medio del párrafo que habla de lo rápido del proceso y luego dos puntos en lugar de uno en el final del último párrafo. El sitio web, con todos esos caracteres, no tiene sentido: la URL de PayPal es www.paypal.com.
Más allá de esto, la propia página de PayPal dedicada a este tipo de estafas señala que nunca le va a pedir al usuario números de tarjeta de crédito y débito, números de cuenta bancaria, número de documento de identidad, direcciones de correo electrónico, contraseñas y el nombre completo. O sea, justamente lo que solicitan las web falsas involucradas en un phishing. En caso de recibir este correo PayPal solicita que se denuncie a spoof@paypal.com. Otro lugar para denunciar es phishing@antiphishing.com.ar, de Segu-Info, que se ocupa de avisar a las compañías.
Cristian Borghello, director de Segu-Info, además de lo ya dicho, recomienda "nunca hacer clic en los enlaces recibidos" y aclara que no alcanza con chequear la dirección de correo electrónico o la URL. No es suficiente, de hecho, que los sitios web comienzen con el HTTPS. Se deben dar ambas condiciones, ser el sitio real y comenzar con HTTPS. "Esto es muy importante porque los delincuentes suelen crear dominios parecidos al real. Por ejemplo: HTTPS://www.sitioseguro.com vs HTTPS://www.sitiosegur0.com (ambos son HTTPS pero en el segundo se cambió la letra "o" por el nro "0")", desarrolla el experto en ciberseguridad.
"Una táctica común en casos de correos falsos es la de intentar asustar al destinatario. Es común que los asuntos del correo sean intimidatorios como 'bloquearemos su cuenta' o 'su tarjeta ha caducado'", puntualiza. "En cada correo recibido, utilizar el sentido común. Si algo es demasiado bueno o demasiado malo seguramente el correo es falso", recomienda.
El caso reciente que llegó a las noticias es el de Netflix: ofrecían una suscripción por $1 por año pero, claro, era solo una estafa más. La estafa apareció repetidamente en Instagram.


infotechnology

          Google AI with Jeff Dean      Cache   Translate Page      

Jeff Dean, the lead of Google AI, is on the podcast this week to talk with Melanie and Mark about AI and machine learning research, his upcoming talk at Deep Learning Indaba and his educational pursuit of parallel processing and computer systems was how his career path got him into AI. We covered topics from his team’s work with TPUs and TensorFlow, the impact computer vision and speech recognition is having on AI advancements and how simulations are being used to help advance science in areas like quantum chemistry. We also discussed his passion for the development of AI talent in the content of Africa and the opening of Google AI Ghana. It’s a full episode where we cover a lot of ground. One piece of advice he left us with, “the way to do interesting things is to partner with people who know things you don’t.”

Listen for the end of the podcast where our colleague, Gabe Weiss, helps us answer the question of the week about how to get data from IoT core to display in real time on a web front end.

Jeff Dean

Jeff Dean joined Google in 1999 and is currently a Google Senior Fellow, leading Google AI and related research efforts. His teams are working on systems for speech recognition, computer vision, language understanding, and various other machine learning tasks. He has co-designed/implemented many generations of Google’s crawling, indexing, and query serving systems, and co-designed/implemented major pieces of Google’s initial advertising and AdSense for Content systems. He is also a co-designer and co-implementor of Google’s distributed computing infrastructure, including the MapReduce, BigTable and Spanner systems, protocol buffers, the open-source TensorFlow system for machine learning, and a variety of internal and external libraries and developer tools.

Jeff received a Ph.D. in Computer Science from the University of Washington in 1996, working with Craig Chambers on whole-program optimization techniques for object-oriented languages. He received a B.S. in computer science & economics from the University of Minnesota in 1990. He is a member of the National Academy of Engineering, and of the American Academy of Arts and Sciences, a Fellow of the Association for Computing Machinery (ACM), a Fellow of the American Association for the Advancement of Sciences (AAAS), and a winner of the ACM Prize in Computing.

Cool things of the week
  • Google Dataset Search is in beta site
  • Expanding our Public Datasets for geospatial and ML-based analytics blog
    • Zip Code Tabulation Area (ZCTA) site
  • Google AI and Kaggle Inclusive Images Challenge site
  • We are rated in the top 100 technology podcasts on iTunes site
  • What makes TPUs fine-tuned for deep learning? blog
Interview
  • Jeff Dean on Google AI profile
  • Deep Learning Indaba site
  • Google AI site
  • Google AI in Ghana blog
  • Google Brain site
  • Google Cloud site
  • DeepMind site
  • Cloud TPU site
  • Google I/O Effective ML with Cloud TPUs video
  • Liquid cooling system article
  • DAWNBench Results site
  • Waymo (Alphabet’s Autonomous Car) site
  • DeepMind AlphaGo site
  • Open AI Dota 2 blog
  • Moustapha Cisse profile
  • Sanjay Ghemawat profile
  • Neural Information Processing Systems Conference site
  • Previous Podcasts
    • GCP Podcast Episode 117: Cloud AI with Dr. Fei-Fei Li podcast
    • GCP Podcast Episode 136: Robotics, Navigation, and Reinforcement Learning with Raia Hadsell podcast
    • TWiML & AI Systems and Software for ML at Scale with Jeff Dean podcast
  • Additional Resources
    • arXiv.org site
    • Chris Olah blog
    • Distill Journal site
    • Google’s Machine Learning Crash Course site
    • Deep Learning by Ian Goodfellow, Yoshua Bengio and Aaron Courville book and site
    • NAE Grand Challenges for Engineering site
    • Senior Thesis Parallel Implementations of Neural Network Training: Two Back-Propagation Approaches by Jeff Dean paper and tweet
    • Machine Learning for Systems and Systems for Machine Learning slides
Question of the week

How do I get data from IoT core to display in real time on a web front end?

  • Building IoT Applications on Google Cloud video
  • MQTT site
  • Cloud Pub/Sub site
  • Cloud Functions site
  • Cloud Firestore site
Where can you find us next?

Melanie is at Deep Learning Indaba and Mark is at Tokyo NEXT. We’ll both be at Strangeloop end of the month.

Gabe will be at Cloud Next London and the IoT World Congress.


          L’Audiència espanyola arxiva definitivament la querella per la trama entorn del projecte Castor      Cache   Translate Page      
La sala penal refusa el recurs d'apel·lació negant l'existència d'una conxorxa i acceptant les xifres de l'ex-concessionària sobre el cost
          ミツバチと同じように農作物の受粉を行うロボット「BrambleBee」      Cache   Translate Page      
#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
ミツバチは農作物の受粉を担う重要な役目を持っている動物ですが、近年その個体数が減少していることが問題になっています。今後の農業に大きなダメージを与えかねない状況が叫ばれている中、ミツバチのような受粉作業を代わりに担うロボット「BrambleBee」が開発されています。[1808.10010] Design of an Autonomous Precision Pollination Robothttps://arxiv.org/abs/1808.10010BrambleBee Robot Promises to Help Honeybees Pollinate Flowers | Digital Trendshttps://www.digita 全文
GIGAZINE(ギガジン) 09月13日 07時30分


          A quantum algebra approach to multivariate Askey-Wilson polynomials. (arXiv:1809.04327v1 [math.QA])      Cache   Translate Page      

Authors: Wolter Groenevelt

We study matrix elements of a change of base between two different bases of representations of the quantum algebra $U_q(su(1,1))$. The two bases, which are multivariate versions of Al-Salam--Chihara polynomials, are eigenfunctions of iterated coproducts of twisted primitive elements. The matrix elements are identified with Gasper and Rahman's multivariate Askey-Wilson polynomials, and from this interpretation we derive their orthogonality relations. Furthermore, the matrix elements are shown to be eigenfunctions of the twisted primitive elements after a change of representation, which gives a quantum algebraic derivation of the fact that the multivariate Askey-Wilson polynomials are solutions of a multivariate bispectral $q$-difference problem.


          The center of the small quantum group II: singular blocks. (arXiv:1703.02457v3 [math.RT] UPDATED)      Cache   Translate Page      

Authors: Anna Lachowska, You Qi

We generalize to the case of singular blocks the result in \cite{BeLa} that describes the center of the principal block of a small quantum group in terms of sheaf cohomology over the Springer resolution. Then using the method developed in \cite{LQ1}, we present a linear algebro-geometric approach to compute the dimensions of the singular blocks and of the entire center of the small quantum group associated with a complex semisimple Lie algebra. A conjectural formula for the dimension of the center of the small quantum group at an $l$th root of unity is formulated in type A.


          Twist-field representations of W-algebras, exact conformal blocks and character identities. (arXiv:1705.00957v3 [hep-th] UPDATED)      Cache   Translate Page      

Authors: M. Bershtein, P. Gavrylenko, A. Marshakov

We study the twist-field representations of W-algebras and generalize construction of the corresponding vertex operators to D- and B-series. It is shown, how the computation of characters of these representations leads to nontrivial identities involving lattice theta-functions. We also propose a way to calculate their exact conformal blocks, expressing them for D-series in terms of geometric data of the corresponding Prym variety for covering curve with involution.


          L'Audiència Nacional arxiva la demanda pel magatzem de gas Castor contra exministres i ESCAL-UGS      Cache   Translate Page      
La Sala penal de l'Audiència Nacional ha desestimat el recurs d'apel·lació i arxiva la demanda que demanava responsabilitat penal per la indemnització fixada pel cessament d'activitat del magatzem de gas Castor, enfront de les costes de Vinaròs (Castelló).
          Episode 67: #67: “Your encryption is useless, Charlie Brown”      Cache   Translate Page      

This week Dave and Gunnar talk about encrypting everything, why encryption doesn’t matter, and why we are all Charlie Brown now.

Lucy, in the role of a cloud server provider. Or telco. Or regulator. Lucy, in the role of a cloud server provider. Or telco. Or regulator.

Cutting Room Floor

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          KMi researchers, David Pride and Petr Knoth, receive best paper award at TPDL2018      Cache   Translate Page      
The best paper award at the 22nd International Conference on Theory and Practice of Digital Libraries (TPDL 2018) went to the paper authored by David Pride and Petr Knoth titled "Peer review and citation data in predicting university rankings, a large-scale analysis." The paper conducted the largest analysis of REF2014 data so far (data of 145 thousand submitted papers, 7 million citations across all 36 REF Units of Assessment/disciplines), looking at the link between peer review, conducted by REF nominated panels, and bibliometric indicators. The study found surprisingly high correlations of the REF results at an institutional level (Grade Points Average - GPA) with simple bibliometric indicators.   This indicates that 2014 REF results could have been predicted using automated techniques to a high degree of accuracy for about a third of the disciplines, those with high average citations per paper. If such approach was adopted for just those disciplines, this could result in savings to UK universities and Research England of about £50 million every time a national exercise is run and even more if more disciplines adopted a similar approach. Since the preprint of this study was made available, a number of researchers have made contact with us and confirmed that they have since obtained similar results. This information is now being discussed with Jisc, who finance the project, to advise Research England on the next steps. TPDL 2018 is the highest regarded conference in the area of digital libraries in Europe and 2nd worldwide. TPDL 2018 took place in Porto, Portugal. Pride, D. and Knoth, P. (2018) Peer review and citation data in predicting university rankings, a large-scale analysis, Theory and Practice of Digital Libraries (TPDL) 2018, Porto, Portugal Lecture Notes in Computer Science, Springer, https://arxiv.org/abs/1805.08529 
          上交大卢策吾团队AlphaPose更新,顶级性能的实时姿态估计      Cache   Translate Page      

上交大卢策吾团队AlphaPose更新,顶级性能的实时姿态估计

雷锋网 AI 科技评论按:今年 2 月,我们报道过 上海交通大学卢策吾团队开源 AlphaPose 的消息。

AlphaPose 是一个多人姿态估计系统,具有极高的精准度。据卢策吾团队介绍,AlphaPose 在姿态估计(Pose Estimation)标准测试集 MSCOCO 上达到 72.3 mAP,是首个超过 70 mAP 的开源系统, 比 Mask-RCNN 相对提高 8.2%,比 OpenPose(CMU)相对提高 17% 。除此之外,在 MPII 排行榜上,AlphaPose以 6% 的相对优势占据榜首。AlphaPose 基于腾讯优图和卢策吾团队在 ICCV 2017 上发表的分区域多人姿态识别算法(RMPE)。

近日,AlphaPose 迎来一次重大更新。在不损失精度的情况下,他们把识别速度提升到 实时 。系统采用PyTorch 框架,在姿态估计的标准测试集MSCOCO上, 达到 71mAP 的精度,同时,速度达到 20FPS (平均每张图像中有 4. 6 人)。代码支持 linuxwindows


上交大卢策吾团队AlphaPose更新,顶级性能的实时姿态估计
各开源框架在MSCOCO上的性能,运行在 1080Ti 单卡上

据卢策吾团队介绍,新版 AlphaPose 系统,架设在 PyTorch 框架上,得益于 PyTorch 的灵活性,新系统对用户更加友好,安装使用过程更加简易,也方便进行二次开发。同时,系统支持图片、视频、摄像头输入,实时在线计算出多人的姿态结果。

为了在兼顾速度的同时保持精度,新版 AlphaPose 提出了一个新的姿态估计模型。模型的骨架网络使用 ResNet101,在下采样部分添加 SE 模块作为 attention 模块。除此之外,使用 PixelShuffle 进行3次上采样,输出关键点的热度图,在提高分辨率的同时,保持特征信息不丢失,技术论文会在近期公布。

另一方面,卢策吾本人在知乎上表示,「alphapose 系统接下来计划上线 3D pose,密集人群 pose,超轻量级 pose,pose-action 联合预测模块,等等,每一个模块一般会对应一篇学术论文。MVIG 团队会持续优化速度,精度。希望能像 Yolo 一样持续更新成为一个对大家有用的系统。学术上,有新的算法第一时间更新,并投稿顶级会议。工程上,也会做到方便二次开发。」从这样的路线图可以看到,AlphaPose 目标是成为一个对学界、业界都开放、有用的代码库,我们也非常期待AlphaPose 的未来更新。

项目链接:

https://github.com/MVIG-SJTU/AlphaPose/tree/pytorch

项目主页:

http://www.mvig.org/research/alphapose.html

ICCV 2017 RMPE论文链接:

http://cn.arxiv.org/abs/1612.00137


上交大卢策吾团队AlphaPose更新,顶级性能的实时姿态估计

人体关键点检测对于描述人体姿态,预测人体行为至关重要。因此人体关键点检测是诸多计算机视觉任务的基础。其在动作分类,异常行为检测,以及人机交互等领域有着很广阔的应用前景,是计算机视觉领域中一个既具有研究价值、同时又极具挑战性的热门课题。


上交大卢策吾团队AlphaPose更新,顶级性能的实时姿态估计

卢策吾:上海交通大学研究员,博士生导师。主要从事计算机视觉与深度学习相关研究,入选国家「青年千人」计划,原斯坦福 AI Lab 博士后研究员(导师:Fei-Fei Li 和 Leo Guibas),为斯坦福-丰田无人车重要研究人员之一。

雷锋网 (公众号:雷锋网) AI 科技评论报道。上海交大机器视觉与智能实验室公众号推文参见 这里 。

雷锋网版权文章,未经授权禁止转载。详情见 转载须知 。


上交大卢策吾团队AlphaPose更新,顶级性能的实时姿态估计

          SonarSnoop:一种将智能手机转变为迷你声纳系统窃取用户手机解锁图案的新技术      Cache   Translate Page      

近日,来自瑞典和英国大学的学者们提出了一项被称之为SonarSnoop的新技术。据称,通过该技术可以将将智能手机的内置扬声器和麦克风,转化为迷你声纳系统,从而窃取Android设备的手机解锁模式。该技术的主要思路是,使用声波来跟踪用户在手机屏幕上手指的位置。攻击者只需在目标手机上安装一个恶意app,手机扬声器就会发出人耳听不到的频率(18kHz和20kHz之间)。

就像潜水艇的声纳一样,恶意app会利用(设备的)麦克风来接收从附近物体反弹的声波,即用户手指的点击/滑动声波。根据设备外壳上扬声器和麦克风的位置,可以构建机器学习算法来读取收集的数据并确定可能的解锁模式。

在上周,来自英国兰开斯特大学(Lancaster University)和瑞典林雪平大学( Linköping University)的学者,发表了一篇关于在Android 5.0.1的三星Galaxy S4智能手机上SonarSnoop技术测试的详细研究论文。

sonarsnoop-image.png

该研究小组表示,SonarSnoop获得的数据将可能的解锁模式数量减少近70%。虽说如此,但SonarSnoop技术并没有像你在好莱坞电影的黑客场景中看到的那样酷炫,迄今我们仍无法做到100%准确的解锁模式输出。当前,SonarSnoop正处于实验的早期阶段。相信随着该项技术的不断推进,准确率也会进一步的提升。

在网络安全研究领域,使用声音进行用户跟踪仍然是一个新概念。 在过去的几年中,学者们已经探索了使用智能手机传感器(如加速度计,陀螺仪和接近传感器)来记录和窃取智能手机的PIN码解锁模式,但从未利用过声波。

自从它在2008年蝙蝠侠电影“黑暗骑士”中出现后,使用类似声纳的系统来跟踪用户及其行为的想法,也逐渐走进了我们的现实。

2017年8月美国华盛顿大学的研究人员,首次尝试并实现了一种称之为CovertBand的技术。该技术可将含有麦克风和扬声器的智能设备转化为一种监控工具(主动声纳系统),隐蔽发射频率为18-20 kHz特定构造的音频信号,并可穿越墙壁、门和窗户监测多个用户的位置和身体活动。

但SonarSnoop研究团队认为,其主要的灵感来源于FingerIO。FingerIO是2016年3月发布的一种新概念,当时学者们创建了类似声纳的系统,主要用于改善与智能手表的互动。

使用FingerIO,用户可以用手指在智能手表附近绘制线条和形状,智能手表将使用高频声波来接收手指运动并将其转换为触摸屏交互。可以说,SonarSnoop是FingerIO的邪恶版本,概念相同但目的不同(SonarSnoop主要是窃取触摸屏的交互数据)。

研究人员还指出,尽管他们的实验目前专注于智能手机。但SonarSnoop“也适用于许多其他类型的计算设备和可用麦克风和扬声器的物理环境。”

有关SonarSnoop技术的更多细节,可在“SonarSnoop: Active Acoustic Side-Channel Attacks”研究论文中找到。

*参考来源:zdnet,FB小编 secist 编译,转载请注明来自FreeBuf.COM


          NALU 0.0.4      Cache   Translate Page      
basic implementation of Neural arithmetic and logic units as described in arxiv.org/pdf/1808.00508.pdf
          Whats new on arXiv      Cache   Translate Page      
Out-of-Distribution Detection Using an Ensemble of Self Supervised Leave-out Classifiers As deep learning methods form a critical part in commercially …

Continue reading


          Whats new on arXiv      Cache   Translate Page      
Performance Metrics (Error Measures) in Machine Learning Regression, Forecasting and Prognostics: Properties and Typology Performance metrics (error measures) are vital …

Continue reading


          Zoom: SSD-based Vector Search for Optimizing Accuracy, Latency and Memory. (arXiv:1809.04067v1 [cs.CV])      Cache   Translate Page      

Authors: Minjia Zhang, Yuxiong He

With the advancement of machine learning and deep learning, vector search becomes instrumental to many information retrieval systems, to search and find best matches to user queries based on their semantic similarities.These online services require the search architecture to be both effective with high accuracy and efficient with low latency and memory footprint, which existing work fails to offer. We develop, Zoom, a new vector search solution that collaboratively optimizes accuracy, latency and memory based on a multiview approach. (1) A "preview" step generates a small set of good candidates, leveraging compressed vectors in memory for reduced footprint and fast lookup. (2) A "fullview" step on SSDs reranks those candidates with their full-length vector, striking high accuracy. Our evaluation shows that, Zoom achieves an order of magnitude improvements on efficiency while attaining equal or higher accuracy, comparing with the state-of-the-art.


          Estimate the Warfarin Dose by Ensemble of Machine Learning Algorithms. (arXiv:1809.04069v1 [q-bio.QM])      Cache   Translate Page      

Authors: Zhiyuan Ma, Ping Wang, Zehui Gao, Ruobing Wang, Koroush Khalighi

Warfarin dosing remains challenging due to narrow therapeutic index and highly individual variability. Incorrect warfarin dosing is associated with devastating adverse events. Remarkable efforts have been made to develop the machine learning based warfarin dosing algorithms incorporating clinical factors and genetic variants such as polymorphisms in CYP2C9 and VKORC1. The most widely validated pharmacogenetic algorithm is the IWPC algorithm based on multivariate linear regression (MLR). However, with only a single algorithm, the prediction performance may reach an upper limit even with optimal parameters. Here, we present novel algorithms using stacked generalization frameworks to estimate the warfarin dose, within which different types of machine learning algorithms function together through a meta-machine learning model to maximize the prediction accuracy. Compared to the IWPC-derived MLR algorithm, Stack 1 and 2 based on stacked generalization frameworks performed significantly better overall. Subgroup analysis revealed that the mean of the percentage of patients whose predicted dose of warfarin within 20% of the actual stable therapeutic dose (mean percentage within 20%) for Stack 1 was improved by 12.7% (from 42.47% to 47.86%) in Asians and by 13.5% (from 22.08% to 25.05%) in the low-dose group compared to that for MLR, respectively. These data suggest that our algorithms would especially benefit patients required low warfarin maintenance dose, as subtle changes in warfarin dose could lead to adverse clinical events (thrombosis or bleeding) in patients with low dose. Our study offers novel pharmacogenetic algorithms for clinical trials and practice.


          DNN Dataflow Choice Is Overrated. (arXiv:1809.04070v1 [cs.DC])      Cache   Translate Page      

Authors: Xuan Yang, Mingyu Gao, Jing Pu, Ankita Nayak, Qiaoyi Liu, Steven Emberton Bell, Jeff Ou Setter, Kaidi Cao, Heonjae Ha, Christos Kozyrakis, Mark Horowitz

Many DNN accelerators have been proposed and built using different microarchitectures and program mappings. To fairly compare these different approaches, we modified the Halide compiler to produce hardware as well as CPU and GPU code, and show that Halide's existing scheduling language has enough power to represent all existing dense DNN accelerators. Using this system we can show that the specific dataflow chosen for the accelerator is not critical to achieve good efficiency: many different dataflows yield similar energy efficiency with good performance. However, finding the best blocking and resource allocation is critical, and we achieve a 2.6X energy savings over Eyeriss system by reducing the size of the local register file. Adding an additional level in the memory hierarchy saves an additional 25%. Based on these observations, we develop an optimizer that automatically finds the optimal blocking and storage hierarchy. Compared with Eyeriss system, it achieves up to 4.2X energy improvement for Convolutional Neural Networks (CNNs), 1.6X and 1.8X improvement for Long Short-Term Memories (LSTMs) and multi-layer perceptrons (MLPs) respectively.


          Smooth Structured Prediction Using Quantum and Classical Gibbs Samplers. (arXiv:1809.04091v1 [cs.LG])      Cache   Translate Page      

Authors: Behrooz Sepehry, Ehsan Iranmanesh, Michael P. Friedlander, Pooya Ronagh

We introduce a quantum algorithm for solving structured-prediction problems with a runtime that scales with the square root of the size of the label space, but scales in $\widetilde O\left(\frac{1}{\epsilon^5}\right)$ with respect to the precision of the solution. In doing so, we analyze a stochastic gradient algorithm for convex optimization in the presence of an additive error in the calculation of the gradients, and show that its convergence rate does not deteriorate if the additive errors are of the order $\widetilde O(\epsilon)$. Our algorithm uses quantum Gibbs sampling at temperature $O (\epsilon)$ as a subroutine. Numerical results using Monte Carlo simulations on an image tagging task demonstrate the benefit of the approach.


          The Coin Problem in Constant Depth: Sample Complexity and Parity Gates. (arXiv:1809.04092v1 [cs.CC])      Cache   Translate Page      

Authors: Nutan Limaye, Karteek Sreenivasaiah, Srikanth Srinivasan, Utkarsh Tripathi, S. Venkitesh

The $\textit{\delta-Coin Problem}$ is the computational problem of distinguishing between coins that are heads with probability $(1+\delta)/2$ or $(1-\delta)/2,$ where $\delta$ is a parameter tending to $0$. We study this problem's complexity in the model of constant-depth Boolean circuits and prove the following results.

$\textbf{Upper bounds.}$ For any constant $d\geq 2$, we show that there are $\textit{explicit}$ monotone AC$^0$ formulas (i.e. made up of AND and OR gates only) solving the $\delta$-coin problem, having depth $d$, size $\exp(O(d(1/\delta)^{1/(d-1)}))$, and sample complexity (no. of inputs) poly$(1/\delta).$ This matches previous upper bounds of O'Donnell and Wimmer (ICALP 2007) and Amano (ICALP 2009) in terms of size (which is optimal) and improves the sample complexity from $\exp(O(d(1/\delta)^{1/(d-1)}))$ to poly$(1/\delta)$.

$\textbf{Lower bounds.}$ We show that the above upper bounds are nearly tight even for the significantly stronger model of AC$^0[\oplus]$ formulas (i.e. allowing NOT and Parity gates): formally, we show that any AC$^0[\oplus]$ formula solving the $\delta$-coin problem must have size $\exp(\Omega(d(1/\delta)^{1/(d-1)})).$ This strengthens a result of Cohen, Ganor and Raz (APPROX-RANDOM 2014), who prove a similar result for AC$^0$, and a result of Shaltiel and Viola (SICOMP 2010), which implies a superpolynomially weaker (still exponential) lower bound.

The above yields the first class of $\textit{explicit}$ functions where we have nearly (up to a polynomial factor) matching upper and lower bounds for the class of AC$^0[\oplus]$ formulas. In particular, this yields the first $\textit{Fixed-depth Size-Hierarchy Theorem}$ for the uniform version of this class: our results imply that for any fixed $d$, the class $\mathcal{C}_{d,k}$ of functions that have uniform AC$^0[\oplus]$ formulas of depth $d$ and size $n^k$ form an infinite hierarchy.


          Is together better? Examining scientific collaborations across multiple authors, institutions, and departments. (arXiv:1809.04093v1 [cs.SI])      Cache   Translate Page      

Authors: Lovenoor Aulck, Kishore Vasan, Jevin West

Collaborations are an integral part of scientific research and publishing. In the past, access to large-scale corpora has limited the ways in which questions about collaborations could be investigated. However, with improvements in data/metadata quality and access, it is possible to explore the idea of research collaboration in ways beyond the traditional definition of multiple authorship. In this paper, we examine scientific works through three different lenses of collaboration: across multiple authors, multiple institutions, and multiple departments. We believe this to be a first look at multiple departmental collaborations as we employ extensive data curation to disambiguate authors' departmental affiliations for nearly 70,000 scientific papers. We then compare citation metrics across the different definitions of collaboration and find that papers defined as being collaborative were more frequently cited than their non-collaborative counterparts, regardless of the definition of collaboration used. We also share preliminary results from examining the relationship between co-citation and co-authorship by analyzing the extent to which similar fields (as determined by co-citation) are collaborating on works (as determined by co-authorship). These preliminary results reveal trends of compartmentalization with respect to intra-institutional collaboration and show promise in being expanded.


          FIVR: Fine-grained Incident Video Retrieval. (arXiv:1809.04094v1 [cs.MM])      Cache   Translate Page      

Authors: Giorgos Kordopatis-Zilos, Symeon Papadopoulos, Ioannis Patras, Ioannis Kompatsiaris

This paper introduces the problem of Fine-grained Incident Video Retrieval (FIVR). Given a query video, the objective is to retrieve all associated videos, considering several types of association that range from duplicate videos to videos from the same incident. FIVR offers a single framework that contains as special cases several retrieval tasks. To address the benchmarking needs of all such tasks, we constructed and present a large-scale annotated video dataset, which we call FIVR-200K and it comprises 225,960 videos. To create the dataset, we devised a process for the collection of YouTube videos based on major events from recent years crawled from Wikipedia and deployed a retrieval pipeline for the automatic selection of query videos based on their estimated suitability as benchmarks. We also devised a protocol for the annotation of the dataset with respect to the four types of video association defined by FIVR. Finally, we report results of an experimental study on the dataset comparing a variety of state-of-the-art visual descriptors and aggregation techniques, highlighting the challenges of the problem at hand.


          Parallel Separable 3D Convolution for Video and Volumetric Data Understanding. (arXiv:1809.04096v1 [cs.CV])      Cache   Translate Page      

Authors: Felix Gonda, Donglai Wei, Toufiq Parag, Hanspeter Pfister

For video and volumetric data understanding, 3D convolution layers are widely used in deep learning, however, at the cost of increasing computation and training time. Recent works seek to replace the 3D convolution layer with convolution blocks, e.g. structured combinations of 2D and 1D convolution layers. In this paper, we propose a novel convolution block, Parallel Separable 3D Convolution (PmSCn), which applies m parallel streams of n 2D and one 1D convolution layers along different dimensions. We first mathematically justify the need of parallel streams (Pm) to replace a single 3D convolution layer through tensor decomposition. Then we jointly replace consecutive 3D convolution layers, common in modern network architectures, with the multiple 2D convolution layers (Cn). Lastly, we empirically show that PmSCn is applicable to different backbone architectures, such as ResNet, DenseNet, and UNet, for different applications, such as video action recognition, MRI brain segmentation, and electron microscopy segmentation. In all three applications, we replace the 3D convolution layers in state-of-the art models with PmSCn and achieve around 14% improvement in test performance and 40% reduction in model size and on average.


          On the Structural Sensitivity of Deep Convolutional Networks to the Directions of Fourier Basis Functions. (arXiv:1809.04098v1 [cs.CV])      Cache   Translate Page      

Authors: Yusuke Tsuzuku, Issei Sato

Data-agnostic quasi-imperceptible perturbations on inputs can severely degrade recognition accuracy of deep convolutional networks. This indicates some structural instability of their predictions and poses a potential security threat. However, characterization of the shared directions of such harmful perturbations remains unknown if they exist, which makes it difficult to address the security threat and performance degradation. Our primal finding is that convolutional networks are sensitive to the directions of Fourier basis functions. We derived the property by specializing a hypothesis of the cause of the sensitivity, known as the linearity of neural networks, to convolutional networks and empirically validated it. As a by-product of the analysis, we propose a fast algorithm to create shift-invariant universal adversarial perturbations available in black-box settings.


          Usable Differential Privacy: A Case Study with PSI. (arXiv:1809.04103v1 [cs.HC])      Cache   Translate Page      

Authors: Jack Murtagh, Kathryn Taylor, George Kellaris, Salil Vadhan

Differential privacy is a promising framework for addressing the privacy concerns in sharing sensitive datasets for others to analyze. However differential privacy is a highly technical area and current deployments often require experts to write code, tune parameters, and optimize the trade-off between the privacy and accuracy of statistical releases. For differential privacy to achieve its potential for wide impact, it is important to design usable systems that enable differential privacy to be used by ordinary data owners and analysts. PSI is a tool that was designed for this purpose, allowing researchers to release useful differentially private statistical information about their datasets without being experts in computer science, statistics, or privacy. We conducted a thorough usability study of PSI to test whether it accomplishes its goal of usability by non-experts. The usability test illuminated which features of PSI are most user-friendly and prompted us to improve aspects of the tool that caused confusion. The test also highlighted some general principles and lessons for designing usable systems for differential privacy, which we discuss in depth.


          Infectivity Enhances Prediction of Viral Cascades in Twitter. (arXiv:1809.04104v1 [physics.soc-ph])      Cache   Translate Page      

Authors: Weihua Li, Skyler J. Cranmer, Zhiming Zheng, Peter J. Mucha

Models of contagion dynamics, originally developed for infectious diseases, have proven relevant to the study of information, news, and political opinions in online social systems. Modelling diffusion processes and predicting viral information cascades are important problems in network science. Yet, many studies of information cascades neglect the variation in infectivity across different pieces of information. Here, we employ early-time observations of online cascades to estimate the infectivity of distinct pieces of information. Using simulations and data from real-world Twitter retweets, we demonstrate that these estimated infectivities can be used to improve predictions about the virality of an information cascade. Developing our simulations to mimic the real-world data, we consider the effect of the limited effective time for transmission of a cascade and demonstrate that a simple model for slow but non-negligible decay of the infectivity captures the essential properties of retweet distributions. These results demonstrate the interplay between the intrinsic infectivity of a tweet and the complex network environment within which it diffuses, strongly influencing the likelihood of becoming a viral cascade.


          On the Beneficial Roles of Fading and Transmit Diversity in Wireless Power Transfer with Nonlinear Energy Harvesting. (arXiv:1809.04105v1 [cs.IT])      Cache   Translate Page      

Authors: Bruno Clerckx, Junghoon Kim

We study the effect of channel fading in Wireless Power Transfer (WPT) and show that fading enhances the RFto- DC conversion efficiency of nonlinear RF energy harvesters. We then develop a new form of signal design for WPT, denoted as Transmit Diversity, that relies on multiple dumb antennas at the transmitter to induce fast fluctuations of the wireless channel. Those fluctuations boost the RF-to-DC conversion efficiency thanks to the energy harvester nonlinearity. In contrast with (energy) beamforming, Transmit Diversity does not rely on Channel State Information at the Transmitter (CSIT) and does not increase the average power at the energy harvester input, though it still enhances the overall end-to-end power transfer efficiency. Transmit Diversity is also combined with recently developed (energy) waveform and modulation to provide further enhancements. The efficacy of the scheme is analyzed using physics-based and curve fitting-based nonlinear models of the energy harvester and demonstrated using circuit simulations, prototyping and experimentation. Measurements with two transmit antennas reveal gains of 50%in harvested DC power over a single transmit antenna setup. The work (again) highlights the crucial role played by the harvester nonlinearity and demonstrates that multiple transmit antennas can be beneficial to WPT even in the absence of CSIT.


          ACM RecSys 2018 Late-Breaking Results Proceedings. (arXiv:1809.04106v1 [cs.AI])      Cache   Translate Page      

Authors: Christoph Trattner (University of Bergen), Vanessa Murdock (Amazon), Steven Chang (Quora)

The ACM RecSys'18 Late-Breaking Results track (previously known as the Poster track) is part of the main program of the 2018 ACM Conference on Recommender Systems in Vancouver, Canada. The track attracted 48 submissions this year out of which 18 papers could be accepted resulting in an acceptance rated of 37.5%.


          David Rosenthal: Blockchain Solves Preservation!      Cache   Translate Page      
We're in a period when blockchain or "Distributed Ledger Technology" is the Solution to Everything™, so it is inevitable that it will be proposed as the solution to the problems of digital preservation. John Collomosse et al's abstract for ARCHANGEL: Trusted Archives of Digital Public Documents states:
We present ARCHANGEL; a de-centralised platform for ensuring the long-term integrity of digital documents stored within public archives. Document integrity is fundamental to public trust in archives. Yet currently that trust is built upon institutional reputation --- trust at face value in a centralised authority, like a national government archive or University. ARCHANGEL proposes a shift to a technological underscoring of that trust, using distributed ledger technology (DLT) to cryptographically guarantee the provenance, immutability and so the integrity of archived documents. We describe the ARCHANGEL architecture, and report on a prototype of that architecture build over the Ethereum infrastructure. We report early evaluation and feedback of ARCHANGEL from stakeholders in the research data archives space.
This is a wonderful example of the way people blithely assume that the claimed properties of blockchain systems are actually delivered in the real world. Below the fold I ask whether Collomosse et al have applied appropriate skepticism to blockchain's claims, and whether they have considered the sustainability of their proposal.

Collomosse et al start by claiming:
ARCHANGEL breaks new ground by proposing the use of a blockchain payload to record digital signatures (content evidence) derived from either scanned physical, or born-digital, document to ensure their integrity over decade- or century-long timespans.
Seven years ago I wrote Do Digital Signatures Assure Long-Term Integrity? in response to Duane Dunston's advocacy of the use of digital signatures to assure the integrity of preserved digital documents. After reviewing the issues I concluded:
Basing the long-term integrity of digital documents on digital signatures, and thus on the ability to keep secrets for the long term is unwise. Fortunately, it is not necessary. There are at least two different approaches to doing so that do not depend on long-term secrets:
  • The technique of entangling hashes, patented by Stuart Haber and others, and implemented in the ACE system, provides tamper-evident storage without secrets. It can detect but not recover from tampering using a minimum of tamper-proof storage. There are practical difficulties in implementing it securely enough, but these are much less significant than those involved in long-term use of digital signatures.
  • The protocol underlying the LOCKSS system provides tamper-resistant storage against a powerful adversary without long-term secrets. It does use short-term secrets, whose life is a day or less, but it limits the damage caused if even these leak.
So they are proposing to use blockchain technology to solve a problem for which a commercial centralized solution has been available for twenty-four years, and an open-source academic solution for eleven years (both based on patents issued twenty-six years ago), and a decentralized solution available for fifteen years which has been in economically sustainable production use for twelve years. None of this work is cited.

The authors do not establish that there is significant unmet demand for services of these kinds, presumably because they are unaware that such services have existed for more than a decade. ARCHANGEL does not even "break new ground" in proposing the use of blockchain technology for this purpose. Victoria Lemieux's 2016 paper Trusting records: is Blockchain technology the answer? concluded:
Blockchain technology can be used to address issues associated with information integrity in the present and near term, assuming proper security architecture and infrastructure management controls. It does not, however, guarantee reliability of information in the first place, and would have several limitations as a long-term solution for maintaining trustworthy digital records.
It is important to observe that:
ARCHANGEL utilises a permissioned blockchain model, in which operators or automatic processes authorised to add content to the AMI commit blocks into the chain encoding content evidence.
They go on to suggest that their permissioned blockchain use proof-of-work to establish consensus:
In our architecture we propose two modes of consensus checking, both predicated upon a permissioned DLT model:
  1. The Blockchain is maintained via proof of work across a private set of nodes, which are maintained collectively by multiple AMIs each with independent governance structure e. g. national archives of different nation states. As such an unprecedented level of collusion would be required to corrupt the Blockchain.
  2. The Blockchain is maintained via proof of work across a public Blockchain maintained globally. In such case a program embedded within the Blockchain (a ’smart contract’) with sole permission to write to the Blockchain is invoked in order to the append data. Access to the smart contract end-point is granted via secret key. In this case corruption would require more than half of the public DLT infrastructure miners to collude, which is again unlikely e. g. on the Ethereum main network.
There are a number of problems here. The first is that permissioned blockchains do not need proof of work to maintain consensus; the canonical permissioned blockchain, IBM's Hyperledger, uses Byzantine Fault Tolerance protocols and thereby avoids the appalling and obviously unsustainable energy use of current proof of work blockchains (the top 5 cryptocurrencies are estimated to use as much energy as The Netherlands). Option 1 could be implemented using Hyperledger far more easily and efficiently than by using proof of work.

The second is that the security of blockchains assumes that a large number of nodes act independently. It has been known for more than four years that this is not the case in public blockchains such as Ethereum, which are dominated by a small number of large "mining pools":
in Ethereum — 3 pools control more than 60% of the hashrate, and 6 pools will get you over 85%.
For major cryptocurrencies these pools contain large numbers of nodes, which were attracted by the rapidly rising "price" of the coin. Since the beginning of this year, however:
MVIS CryptoCompare Digital Assets 10 Index extended its collapse from a January high to 80 percent. ... Wednesday’s losses were led by Ether, the second-largest virtual currency. It fell 6 percent to $171.15 at 7:50 a.m. in New York, extending this month’s retreat to 40 percent.
This makes mining uneconomic for most miners, as does utilities raising electricity prices for miners, so the networks will lose nodes. Committing digital preservation for the long term to infrastructure as volatile as cryptocurrencies is not a route to sustainability.

British Library budget
Equally, a private blockchain operated by memory institutions faces great difficulty in maintaining adequate participation. These institutions are under severe budget pressure and competition for skilled staff. They are being forced to outsource their IT operations to "the cloud", and are unlikely to take on new or maintain existing in-house tasks. Byzantine Fault Tolerance is a better approach to maintaining consensus than proof of work in networks with a small number of nodes, even ignoring its wastefulness.

Third, Collomosse et al pay scant attention to the fact that digital preservation is primarily an economic problem. A sustainable digital preservation technology requires a viable business model:
We might also explore ... new business models to encourage sustainability. For example, the maintenance of the DLT (in terms of computational effort for mining) might be facilitated by users who seek document verification ’paying’ for that service via contribution of mining effort to maintain the DLT.
The whole point of archives and memory institutions is that they hold materials that are very rarely accessed. Thus the idea of sustaining them economically by charging for access can never work. Not to mention that the idea that individual scholars wanting to verify a document would "pay" by running a network node fails the laugh test.

Fourth, the authors uncritically accept blockchain's marketing hype that the only security threat is the unlikely one of collusion among the independent nodes:
The security of a blockchain is afforded by the immutability of data with the blocks, delivered by the compounding effect of each new block being hashed to include the hashes of previous blocks. Thus as content is committed into the blockchain, the security of the content is reinforced.
There are a number of issues with this:
  • The verifiability "of a blockchain is afforded by the immutability of data with the blocks". The security of the blockchain is afforded by the large number of replicas of the blocks at the large number of nodes.
  • The immutability of the blocks depends on the security of the hash algorithm in use. This is not absolute; "over decade- or century-long timespans" it degrades as happened for example to SHA-1.
  • Their system uses "smart contracts", which in practice are "immutable in name only".
  • Because the security of the blockchain depends upon the entire chain being replicated at each of the large number of nodes, successful blockchain systems suffer scaling problems, consuming large amounts of storage.
  • Unlike the decentralized LOCKSS system, ARCHANGEL and systems such as ACE do not contain "the content", merely hashes of "the content" which can be used for verification only if "the content" itself has survived through some other mechanism.
To do Collomosse et al justice, they do not claim to solve the whole problem of digital preservation, just that:
Blockchain offers a shield which archives can use to defend the records as authentic. ... It was also noted that acceptance of content evidence might eventually become similar to acceptance of DNA evidence in court, but that establishing that level of confidence would require strong public engaged to explain Blockchain in an accessible manner particularly explaining why one could trust the cryptographic assurances inherent in a DLT solution.
But, to the extent that blockchains and cryptocurrencies are perceived by the public as a single technology, and cryptocurrencies perceived as rancid with theft, fraud and manipulation, this may be difficult.

Sustainability is job #1 for archives. There's no point in setting up an archiving system and filling it with content only to have it fail after a decade or so. Sustainability has to be designed into both the technology and the organization into which it is embedded from the start if the contents are to survive the wide range of threats to which archived data is subject. Layering it on afterwards isn't going to be effective.

Basing the architecture of a preservation system on economically and environmentally unsustainable proof of work blockchains, and failing to identify any sustainable business model to support them isn't realistic.
          The 21 Card Trick and its Generalization. (arXiv:1809.04072v1 [math.CO])      Cache   Translate Page      

Authors: Dibyajyoti Deb

The 21 card trick is well known. It was recently shown in an episode of the popular YouTube channel Numberphile. In that trick, the audience is asked to remember a card, and through a series of steps, the magician is able to find the card. In this article, we look into the mathematics behind the trick, and look at a complete generalization of the trick. We show that this trick can be performed with any number of cards.


          Multivariate Brenier cumulative distribution functions and their application to non-parametric testing. (arXiv:1809.04090v1 [math.ST])      Cache   Translate Page      

Authors: Melf Boeckel, Vladimir Spokoiny, Alexandra Suvorikova

In this work we introduce a novel approach of construction of multivariate cumulative distribution functions, based on cyclical-monotone mapping of an original measure $\mu \in \mathcal{P}^{ac}_2(\mathbb{R}^d)$ to some target measure $\nu \in \mathcal{P}^{ac}_2(\mathbb{R}^d)$ , supported on a convex compact subset of $\mathbb{R}^d$. This map is referred to as $\nu$-Brenier distribution function ($\nu$-BDF), whose counterpart under the one-dimensional setting $d = 1$ is an ordinary CDF, with $\nu$ selected as $\mathcal{U}[0, 1]$, a uniform distribution on $[0, 1]$. Following one-dimensional frame-work, a multivariate analogue of Glivenko-Cantelli theorem is provided. A practical applicability of the theory is then illustrated by the development of a non-parametric pivotal two-sample test, that is rested on $2$-Wasserstein distance.


          Smooth Structured Prediction Using Quantum and Classical Gibbs Samplers. (arXiv:1809.04091v1 [cs.LG])      Cache   Translate Page      

Authors: Behrooz Sepehry, Ehsan Iranmanesh, Michael P. Friedlander, Pooya Ronagh

We introduce a quantum algorithm for solving structured-prediction problems with a runtime that scales with the square root of the size of the label space, but scales in $\widetilde O\left(\frac{1}{\epsilon^5}\right)$ with respect to the precision of the solution. In doing so, we analyze a stochastic gradient algorithm for convex optimization in the presence of an additive error in the calculation of the gradients, and show that its convergence rate does not deteriorate if the additive errors are of the order $\widetilde O(\epsilon)$. Our algorithm uses quantum Gibbs sampling at temperature $O (\epsilon)$ as a subroutine. Numerical results using Monte Carlo simulations on an image tagging task demonstrate the benefit of the approach.


          Norm-controlled inversion in weighted convolution algebras. (arXiv:1809.04097v1 [math.FA])      Cache   Translate Page      

Authors: Ebrahim Samei, Varvara Shepelska

Let $G$ be a discrete group, let $p\ge1$, and let $\omega$ be a weight on $G$. Using the approach from [9], we provide sufficient conditions on a weight $\omega$ for $\ell^p(G,\omega)$ to be a Banach algebra admitting a norm-controlled inversion in the reduced C$^*$-algebra of $G$, namely $C^*_r(G)$. We show that our results can be applied to various cases including locally finite groups as well as finitely generated groups of polynomial or intermediate growth and a natural class of weights on them. These weights are of the form of polynomial or certain subexponential functions. We also consider the non-discrete case and study the existence of norm-controlled inversion in $B(L^2(G))$ for some related convolution algebras.


          On the Beneficial Roles of Fading and Transmit Diversity in Wireless Power Transfer with Nonlinear Energy Harvesting. (arXiv:1809.04105v1 [cs.IT])      Cache   Translate Page      

Authors: Bruno Clerckx, Junghoon Kim

We study the effect of channel fading in Wireless Power Transfer (WPT) and show that fading enhances the RFto- DC conversion efficiency of nonlinear RF energy harvesters. We then develop a new form of signal design for WPT, denoted as Transmit Diversity, that relies on multiple dumb antennas at the transmitter to induce fast fluctuations of the wireless channel. Those fluctuations boost the RF-to-DC conversion efficiency thanks to the energy harvester nonlinearity. In contrast with (energy) beamforming, Transmit Diversity does not rely on Channel State Information at the Transmitter (CSIT) and does not increase the average power at the energy harvester input, though it still enhances the overall end-to-end power transfer efficiency. Transmit Diversity is also combined with recently developed (energy) waveform and modulation to provide further enhancements. The efficacy of the scheme is analyzed using physics-based and curve fitting-based nonlinear models of the energy harvester and demonstrated using circuit simulations, prototyping and experimentation. Measurements with two transmit antennas reveal gains of 50%in harvested DC power over a single transmit antenna setup. The work (again) highlights the crucial role played by the harvester nonlinearity and demonstrates that multiple transmit antennas can be beneficial to WPT even in the absence of CSIT.


          Vortex filament solutions of the Navier-Stokes equations. (arXiv:1809.04109v1 [math.AP])      Cache   Translate Page      

Authors: Jacob Bedrossian, Pierre Germain, Benjamin Harrop-Griffiths

We consider solutions of the Navier-Stokes equations in \(3d\) with vortex filament initial data of arbitrary circulation, that is, initial vorticity given by a divergence-free vector-valued measure of arbitrary mass supported on a smooth curve. First, we prove global well-posedness for perturbations of the Oseen vortex column in scaling-critical spaces. Second, we prove local well-posedness (in a sense to be made precise) when the filament is a smooth, closed, non-self-intersecting curve. Besides their physical interest, these results are the first to give well-posedness in a neighborhood of large self-similar solutions of $3d$ Navier-Stokes, as well as solutions which are locally approximately self-similar.


          Two applications of the integral regulator. (arXiv:1809.04114v1 [math.AG])      Cache   Translate Page      

Authors: Matt Kerr, Muxi Li

We review Li's refinement of the KLM regulator map, and use it to detect torsion phenomena in higher Chow groups.


          On Boolean algebras with strictly positive measures. (arXiv:1809.04118v1 [math.LO])      Cache   Translate Page      

Authors: Menachem Magidor, Grzegorz Plebanek

We investigate reflection-type problems on the class SPM, of Boolean algebras carrying strictly positive finitely additive measures. We show, in particular, that in the constructible universe there is a Boolean algebra $\mathfrak A$ which is not in SPM but every subalgebra of $\mathfrak A$ of cardinality $\mathfrak c$ admits a strictly positive measure.


          Dedekind's criterion for the monogenicity of a number field versus Uchida's and L\"uneburg's. (arXiv:1809.04122v1 [math.NT])      Cache   Translate Page      

Authors: Xavier Vidaux, Carlos R. Videla

We compare three different characterizations, due respectively to R. Dedekind, K. Uchida, and H. L\"uneburg, of when $\mathbb Z[\theta]$ is the ring of integers of $\mathbb Q(\theta)$, and apply our results to some concrete $2$-towers of number fields.


          Categorical foundations of variety-based bornology. (arXiv:1809.04124v1 [math.CT])      Cache   Translate Page      

Authors: Jan Paseka, Sergey A. Solovyov

Following the concept of topological theory of S.~E.~Rodabaugh, this paper introduces a new approach to (lattice-valued) bornology, which is based in bornological theories, and which is called variety-based bornology. In particular, motivated by the notion of topological system of S.~Vickers, we introduce the concept of variety-based bornological system, and show that the category of variety-based bornological spaces is isomorphic to a full reflective subcategory of the category of variety-based bornological systems.


          Thin-shell concentration for zero cells of stationary Poisson mosaics. (arXiv:1809.04134v1 [math.PR])      Cache   Translate Page      

Authors: Eliza O'Reilly

We study the concentration of the norm of a random vector $Y$ uniformly sampled in the centered zero cell of two types of stationary and isotropic random mosaics in $\mathbb{R}^n$ for large dimensions $n$. For a stationary and isotropic Poisson-Voronoi mosaic, $Y$ has a radial and log-concave distribution, implying that $|Y|/\mathbb{E}(|Y|^2)^{\frac{1}{2}}$ approaches one for large $n$. If we assume that the centroids of the mosaic have intensity scaling like $e^{n \lambda}$, then $|Y|$ is on the order of $\sqrt{n}$ for large $n$. For the Poisson-Voronoi mosaic, we show that $|Y|/\sqrt{n}$ concentrates to $e^{-\lambda}(2\pi e)^{-\frac{1}{2}}$ as $n$ increases, and for a stationary and isotropic Poisson hyperplane mosaic, we show there is a range $(R_{\ell}, R_u)$ such that ${|Y|}/{\sqrt{n}}$ will be within this range with high probability for large $n$. The rates of convergence are also computed in both cases.


          Large deviations and localization of the microcanonical ensembles given by multiple constraints. (arXiv:1809.04138v1 [math.PR])      Cache   Translate Page      

Authors: Kyeongsik Nam

We develop a unified theory to analyze the microcanonical ensembles given by several constraints. Several interesting phenomena that do not occur in the single constraint case can happen under the multiple constraints case. We systematically analyze detailed structures of such microcanonical ensembles in two orthogonal directions using the theory of large deviations. First of all, we establish the equivalence of ensembles result, which exhibits an interesting phase transition phenomenon. Secondly, we study the localization and delocalization phenomena by obtaining large deviation results for the joint law of empirical distributions and the maximum component. Some concrete examples for which the theory applies will be given as well.


          Quantum revival patterns from classical phase-space trajectories. (arXiv:1809.04139v1 [quant-ph])      Cache   Translate Page      

Authors: Gabriel M. Lando, Raúl O. Vallejos, Gert-Ludwig Ingold, Alfredo M. Ozorio de Almeida

A general semiclassical method in phase space based on the final-value representation of the Wigner function is discussed that bypasses caustics and the need to search for classical trajectories. We demonstrate its potential by applying the method to the Kerr Hamiltonian. Fractional revivals sensitive to details in the quantum evolution are obtained semiclassically and provide decisive evidence for the validity of the approach far beyond the Ehrenfest time. There is no constraint on the initial state as is shown by reproducing fractional revivals not only for the usual coherent states but also for a shifted weakly excited Fock state.


          Nonparametric Bayesian analysis of the compound Poisson prior for support boundary recovery. (arXiv:1809.04140v1 [math.ST])      Cache   Translate Page      

Authors: Markus Reiss, Johannes Schmidt-Hieber

Given data from a Poisson point process with intensity $(x,y) \mapsto n \mathbf{1}(f(x)\leq y),$ frequentist properties for the Bayesian reconstruction of the support boundary function $f$ are derived. We mainly study compound Poisson process priors with fixed intensity proving that the posterior contracts with nearly optimal rate for monotone and piecewise constant support boundaries and adapts to H\"older smooth boundaries with smoothness index at most one. We then derive a non-standard Bernstein-von Mises result for a compound Poisson process prior and a function space with increasing parameter dimension. As an intermediate result the limiting shape of the posterior for random histogram type priors is obtained. In both settings, it is shown that the marginal posterior of the functional $\vartheta =\int f$ performs an automatic bias correction and contracts with a faster rate than the MLE. In this case, $(1-\alpha)$-credible sets are also asymptotic $(1-\alpha)$-confidence intervals. As a negative result, it is shown that the frequentist coverage of credible sets is lost for linear functions indicating that credible sets only have frequentist coverage for priors that are specifically constructed to match properties of the underlying true function.


          Nonconvex Variance Reduced Optimization with Arbitrary Sampling. (arXiv:1809.04146v1 [math.OC])      Cache   Translate Page      

Authors: Samuel Horváth, Peter Richtárik

We provide the first importance sampling variants of variance reduced algorithms for empirical risk minimization with non-convex loss functions. In particular, we analyze non-convex versions of SVRG, SAGA and SARAH. Our methods have the capacity to speed up the training process by an order of magnitude compared to the state of the art on real datasets. Moreover, we also improve upon current mini-batch analysis of these methods by proposing importance sampling for minibatches in this setting. Surprisingly, our approach can in some regimes lead to superlinear speedup with respect to the minibatch size, which is not usually present in stochastic optimization. All the above results follow from a general analysis of the methods which works with arbitrary sampling, i.e., fully general randomized strategy for the selection of subsets of examples to be sampled in each iteration. Finally, we also perform a novel importance sampling analysis of SARAH in the convex setting.


          Noncontractible loops of symplectic embeddings between convex toric domains. (arXiv:1809.04147v1 [math.SG])      Cache   Translate Page      

Authors: Mihai Munteanu

Given two 4-dimensional ellipsoids whose symplectic sizes satisfy a specified inequality, we prove that a certain loop of symplectic embeddings between the two ellipsoids is noncontractible. The statement about symplectic ellipsoids is a particular case of a more general result. Given two convex toric domains whose first and second ECH capacities satisfy a specified inequality, we prove that a certain loop of symplectic embeddings between the two convex toric domains is noncontractible. We show how the constructed loops become contractible if the target domain becomes large enough. The proof involves studying certain moduli spaces of holomorphic cylinders in families of symplectic cobordisms arising from families of symplectic embeddings.


          Joint Chance Constraints in AC Optimal Power Flow: Improving Bounds through Learning. (arXiv:1809.04153v1 [math.OC])      Cache   Translate Page      

Authors: Kyri Baker, Andrey Bernstein

This paper considers distribution systems with a high penetration of distributed, renewable generation and addresses the problem of incorporating the associated uncertainty into the optimal operation of these networks. Joint chance constraints, which satisfy multiple constraints simultaneously with a prescribed probability, are one way to incorporate uncertainty across sets of constraints, leading to a chance-constrained optimal power flow problem. Departing from the computationally-heavy scenario-based approaches or approximations that transform the joint constraint into conservative deterministic constraints, this paper develops a scalable, data-driven approach which learns operational trends in a power network, eliminates zero-probability events (e.g., inactive constraints), and accurately and efficiently approximates bounds on the joint chance constraint iteratively. In particular, the proposed framework improves upon the classic methods based on the union bound (or Boole's inequality) by generating a much less conservative set of single chance constraints that also guarantees the satisfaction of the original joint constraint. The proposed framework is evaluated numerically using the IEEE 37-node test feeder, focusing on the problem of voltage regulation in distribution grids.


          Gabber's rigidity theorem for stable framed linear presheaves. (arXiv:1809.04158v1 [math.AG])      Cache   Translate Page      

Authors: A. Druzhinin

We extend the results of the joint work of the author with Alexey Ananievsky [AnDr17] for the case of smooth affine henselian pairs over a field which means the rigidity theorem in sense of Gabber [Gab92] for a stable homotopy invariant linear framed presheaf (of abelian groups). Precisely we prove that for such a presheaf $F$ on $Sm_k$, and a smooth affine henselian pair $(U,Z)$ over the base filed $k$, there is an isomorphism $$F(U)\big/ \Lambda_l\cdot F(U)\simeq F(Z)\big/\Lambda_l\cdot F(Z),$$ where $\Lambda_l= nh$, if $l=2n$, $\Lambda_l= nh+1$, if $l=2n+1$, for any $l\in k^\times$. As a consequence this implies the rigidity with respect to smooth henselian pairs for a $\Lambda_l$-torsion $\mathbf{SH}(k)$-representable cohomology theory on $Sm_k$.


          Restrictions of higher derivatives of the Fourier transform. (arXiv:1809.04159v1 [math.CA])      Cache   Translate Page      

Authors: Michael Goldberg, Dmitriy Stolyarov

We consider several problems related to the restriction of $(\nabla^k) \hat{f}$ to a surface $\Sigma \subset \mathbb R^d$ with nonvanishing Gauss curvature. While such restrictions clearly exist if $f$ is a Schwartz function, there are few bounds available that enable one to take limits with respect to the $L_p(\mathbb R^d)$ norm of $f$. We establish three scenarios where it is possible to do so:

$\bullet$ When the restriction is measured according to a Sobolev space $H^{-s}(\Sigma)$ of negative index. We determine the complete range of indices $(k, s, p)$ for which such a bound exists.

$\bullet$ Among functions where $\hat{f}$ vanishes on $\Sigma$ to order $k-1$, the restriction of $(\nabla^k) \hat{f}$ defines a bounded operator from (this subspace of) $L_p(\mathbb R^d)$ to $L_2(\Sigma)$ provided $1 \leq p \leq \frac{2d+2}{d+3+4k}$.

$\bullet$ When there is _a priori_ control of $\hat{f}|_\Sigma$ in a space $H^{\ell}(\Sigma)$, $\ell > 0$, this implies improved regularity for the restrictions of $(\nabla^k)\hat{f}$. If $\ell$ is large enough then even $\|\nabla \hat{f}\|_{L_2(\Sigma)}$ can be controlled in terms of $\|\hat{f}\|_{H^\ell(\Sigma)}$ and $\|f\|_{L_p(\mathbb R^d)}$ alone.

The techniques underlying these results are inspired by the spectral synthesis work of Y. Domar, which provides a mechanism for $L_p$ approximation by "convolving along surfaces", and the Stein-Tomas restriction theorem. Our main inequality is a bilinear form bound with similar structure to the Stein--Tomas $T^*T$ operator, generalized to accommodate smoothing along $\Sigma$ and derivatives transverse to it. It is used both to establish basic $H^{-s}(\Sigma)$ bounds for derivatives of $\hat{f}$ and to bootstrap from surface regularity of $\hat{f}$ to regularity of its higher derivatives.


          $C^{1,\alpha}$ Isometric Embeddings of Polar Caps. (arXiv:1809.04161v1 [math.AP])      Cache   Translate Page      

Authors: Camillo De Lellis, Dominik Inauen

We study isometric embeddings of $C^2$ Riemannian manifolds in the Euclidean space and we establish that the H\"older space $C^{1,\frac{1}{2}}$ is critical in a suitable sense: in particular we prove that for $\alpha > \frac{1}{2}$ the Levi-Civita connection of any isometric immersion is induced by the Euclidean connection, whereas for any $\alpha < \frac{1}{2}$ we construct $C^{1,\alpha}$ isometric embeddings of portions of the standard $2$-dimensional sphere for which such property fails.


          A splitting of the virtual class for genus one stable maps. (arXiv:1809.04162v1 [math.AG])      Cache   Translate Page      

Authors: Tom Coates, Cristina Manolache

Moduli spaces of stable maps to a smooth projective variety typically have several components. We express the virtual class of the moduli space of genus one stable maps to a smooth projective variety as a sum of virtual classes of the components. The key ingredient is a generalised functoriality result for virtual classes. We show that the natural maps from 'ghost' components of the genus one moduli space to moduli spaces of genus zero stable maps satisfy the strong push forward property. As a consequence, we give a cycle-level formula which relates standard and reduced genus one Gromov--Witten invariants of a smooth projective Calabi--Yau theefold.


          On the geometry of the automorphism groups of affine varieties. (arXiv:1809.04175v1 [math.AG])      Cache   Translate Page      

Authors: Jean-Philippe Furter, Hanspeter Kraft

This article is a survey on ind-varieties and ind-groups introduced by Shafarevich in 1965, with a special emphasis on automorphism groups of affine varieties and actions of ind-groups on ind-varieties. We give precise definitions and complete proofs, including several known results. The survey contains many examples and also some questions which came up during our work on the subject.

Among the new results we show that for an affine variety X the automorphism group Aut(X) is always locally closed in the ind-semigroup End(X) of all endomorphisms, and we give an example of a strict closed subgroup of a connected ind-group which has the same Lie algebra, based on the work of Shestakov-Umirbaev on the existence of non-tame automorphisms of affine 3-space.


          Phaseless Subspace Tracking. (arXiv:1809.04176v1 [cs.LG])      Cache   Translate Page      

Authors: Seyedehsara Nayer, Namrata Vaswani

This work takes the first steps towards solving the "phaseless subspace tracking" (PST) problem. PST involves recovering a time sequence of signals (or images) from phaseless linear projections of each signal under the following structural assumption: the signal sequence is generated from a much lower dimensional subspace (than the signal dimension) and this subspace can change over time, albeit gradually. It can be simply understood as a dynamic (time-varying subspace) extension of the low-rank phase retrieval problem studied in recent work.


          The arithmetic of arithmetic Coxeter groups. (arXiv:1809.04181v1 [math.NT])      Cache   Translate Page      

Authors: Suzana Milea, Christopher Shelley, Martin H. Weissman

In the 1990s, J.H. Conway published a combinatorial-geometric method for analyzing integer-valued binary quadratic forms (BQFs). Using a visualization he named the "topograph," Conway revisited the reduction of BQFs and the solution of quadratic Diophantine equations such as Pell's equation. It appears that the crux of his method is the coincidence between the arithmetic group $PGL_2({\mathbb Z})$ and the Coxeter group of type $(3,\infty)$. There are many arithmetic Coxeter groups, and each may have unforeseen applications to arithmetic. We introduce Conway's topograph, and generalizations to other arithmetic Coxeter groups. This includes a study of "arithmetic flags" and variants of binary quadratic forms.


          Satellites of Infinite Rank in the Smooth Concordance Group. (arXiv:1809.04186v1 [math.GT])      Cache   Translate Page      

Authors: Matthew Hedden, Juanita Pinzon-Caicedo

We conjecture that satellite operations are either constant or have infinite rank in the concordance group. We reduce this to the difficult case of winding number zero satellites, and use $SO(3)$ gauge theory to provide a general criterion sufficient for the image of a satellite operation to generate an infinite rank subgroup of the smooth concordance group $\mathcal{C}$. Our criterion applies widely, notably to scores of unknotted patterns for which the corresponding operators on the topological concordance group are zero. We raise some questions and conjectures regarding satellite operators and their interaction with concordance.


          Inner vectors for Toeplitz operators. (arXiv:1809.04194v1 [math.CV])      Cache   Translate Page      

Authors: Raymond Cheng, Javad Mashreghi, William T. Ross

In this paper we survey and bring together several approaches to obtaining inner functions for Toeplitz operators. These approaches include the classical definition, the Wold decomposition, the operator-valued Poisson Integral, and Clark measures. We then extend these notions somewhat to inner functions on model spaces. Along the way we present some novel examples.


          Optimization with Non-Differentiable Constraints with Applications to Fairness, Recall, Churn, and Other Goals. (arXiv:1809.04198v1 [cs.LG])      Cache   Translate Page      

Authors: Andrew Cotter, Heinrich Jiang, Serena Wang, Taman Narayan, Maya Gupta, Seungil You, Karthik Sridharan

We show that many machine learning goals, such as improved fairness metrics, can be expressed as constraints on the model's predictions, which we call rate constraints. We study the problem of training non-convex models subject to these rate constraints (or any non-convex and non-differentiable constraints). In the non-convex setting, the standard approach of Lagrange multipliers may fail. Furthermore, if the constraints are non-differentiable, then one cannot optimize the Lagrangian with gradient-based methods. To solve these issues, we introduce the proxy-Lagrangian formulation. This new formulation leads to an algorithm that produces a stochastic classifier by playing a two-player non-zero-sum game solving for what we call a semi-coarse correlated equilibrium, which in turn corresponds to an approximately optimal and feasible solution to the constrained optimization problem. We then give a procedure which shrinks the randomized solution down to one that is a mixture of at most $m+1$ deterministic solutions, given $m$ constraints. This culminates in algorithms that can solve non-convex constrained optimization problems with possibly non-differentiable and non-convex constraints with theoretical guarantees. We provide extensive experimental results enforcing a wide range of policy goals including different fairness metrics, and other goals on accuracy, coverage, recall, and churn.


          Sharp sectional curvature bounds and a new proof of The Spectral Theorem. (arXiv:1809.04200v1 [math.DG])      Cache   Translate Page      

Authors: Maxine Calle, Corey Dunn

We algebraically compute all possible sectional curvature values for canonical algebraic curvature tensors, and use this result to give a method for constructing general sectional curvature bounds. We use a well-known method to geometrically realize these results to produce a hypersurface with prescribed sectional curvatures at a point. By extending our methods, we give a relatively short proof of the Spectral Theorem for self-adjoint operators on a finite dimensional real vector space.


          Genuinely entangled subspace with all-encompassing free bipartite entanglement. (arXiv:1809.04202v1 [quant-ph])      Cache   Translate Page      

Authors: Sristy Agrawal, Saronath Halder, Manik Banik

In a multipartite scenario quantum entanglement manifests its most dramatic form when the state is genuinely entangled. It is, therefore, of significant operational interest to identify subspaces of multipartite quantum systems that contain such states only. In this work, we introduce the notion of unextendible biseparable bases (UBB) that provides an adequate method to construct such genuinely entangled subspaces (GES). We provide explicit construction of two types of UBBs -- party symmetric and party asymmetric -- for every 3-qudit quantum system, with local dimension $d\ge 3$. Further we show that the GES resulting from the symmetric construction is indeed a bidistillable subspace, i.e., all the states supported on it contain free (distillable) entanglement across every bipartition.


          Colorings and doubled colorings of virtual doodles. (arXiv:1809.04205v1 [math.GT])      Cache   Translate Page      

Authors: Andrew Bartholomew, Roger Fenn, Naoko Kamada, Seiichi Kamada

A virtual doodle is an equivalence class of virtual diagrams under an equivalence relation generated by flat version of classical Reidemesiter moves and virtual Reidemsiter moves such that Reidemeister moves of type 3 are forbidden. In this paper we discuss colorings of virtual diagrams using an algebra, called a doodle switch, and define an invariant of virtual doodles. Besides usual colorings of diagrams, we also introduce doubled colorings.


          On scattering for the defocusing high dimensional inter-critical NLS. (arXiv:1809.04211v1 [math.AP])      Cache   Translate Page      

Authors: Chuanwei Gao, Zehua Zhao

In this paper, we study the critical norm conjecture for the inter-critical nonlinear Schr{\"o}dinger equation with critical index $s_c$ satisfying $\frac{1}{2}<s_c<1$ when $d\geq 5$. Under the assumption of uniform boundedness of the critical norm, we prove the global well-posedness and scattering for the Cauchy problem. We follow the standard `Concentration compactness/Rigidity method' established in \cite{KenigMerle1,KenigMerle2}, and treat three scenarios for the critical element respectively. Moreover, double Duhamel method and interaction Morawetz estimate are applied to exclude the critical element.


          On Markov Chain Gradient Descent. (arXiv:1809.04216v1 [math.OC])      Cache   Translate Page      

Authors: Tao Sun, Yuejiao Sun, Wotao Yin

Stochastic gradient methods are the workhorse (algorithms) of large-scale optimization problems in machine learning, signal processing, and other computational sciences and engineering. This paper studies Markov chain gradient descent, a variant of stochastic gradient descent where the random samples are taken on the trajectory of a Markov chain. Existing results of this method assume convex objectives and a reversible Markov chain and thus have their limitations. We establish new non-ergodic convergence under wider step sizes, for nonconvex problems, and for non-reversible finite-state Markov chains. Nonconvexity makes our method applicable to broader problem classes. Non-reversible finite-state Markov chains, on the other hand, can mix substatially faster. To obtain these results, we introduce a new technique that varies the mixing levels of the Markov chains. The reported numerical results validate our contributions.


          Constrained optimization as ecological dynamics with applications to random quadratic programming in high dimensions. (arXiv:1809.04221v1 [cond-mat.stat-mech])      Cache   Translate Page      

Authors: Pankaj Mehta, Wenping Cui, Ching-Hao Wang, Robert Marsland III

Quadratic programming (QP) is a common and important constrained optimization problem. Here, we derive a surprising duality between constrained optimization with inequality constraints -- of which QP is a special case -- and consumer resource models describing ecological dynamics. Combining this duality with a recent `cavity solution', we analyze high-dimensional, random QP where the optimization function and constraints are drawn randomly. Our theory shows remarkable agreement with numerics and points to a deep connection between optimization, dynamical systems, and ecology.


          Concentration for Coulomb gases on compact manifolds. (arXiv:1809.04231v1 [math.PR])      Cache   Translate Page      

Authors: David García-Zelada

We study the non-asymptotic behavior of a Coulomb gas on a compact Riemannian manifold. This gas is a symmetric n-particle Gibbs measure associated to the two-body interaction energy given by the Green function. We encode such a particle system by using an empirical measure. Our main result is a concentration inequality in Kantorovich-Wasserstein distance inspired from the work of Chafa\"i, Hardy and Ma\"ida on the Euclidean space. Their proof involves large deviation techniques together with an energy-distance comparison and a regularization procedure based on the superharmonicity of the Green function. This last ingredient is not available on a manifold. We solve this problem by using the heat kernel and its short-time asymptotic behavior.


          A two-dimensional topological representation theorem for matroid polytopes of rank 4. (arXiv:1809.04236v1 [math.CO])      Cache   Translate Page      

Authors: Hiroyuki Miyata

The Folkman-Lawrence topological representation theorem, which states that every (loop-free) oriented matroid of rank $r$ can be represented as a pseudosphere arrangement on the $(r-1)$-dimensional sphere $S^{r-1}$, is one of the most outstanding results in oriented matroid theory. In this paper, we provide a lower-dimensional version of the topological representation theorem for uniform matroid polytopes of rank $4$. We introduce $2$-weak configurations of points and pseudocircles ($2$-weak PPC configurations) on $S^2$ and prove that every uniform matroid polytope of rank $4$ can be represented by a $2$-weak PPC configuration. As an application, we provide a proof of Las Vergnas conjecture on simplicial topes for the case of uniform matroid polytopes of rank $4$.


          On the topological boundary of the range of super-Brownian motion-extended version. (arXiv:1809.04238v1 [math.PR])      Cache   Translate Page      

Authors: Jieliang Hong, Leonid Mytnik, Edwin Perkins

We show that if $\partial\mathcal{R}$ is the boundary of the range of super-Brownian motion and dim denotes Hausdorff dimension, then with probability one, for any open set $U$, $\partial\mathcal{R}\cap U\neq\emptyset$ implies $$\text{dim}(U\cap\partial\mathcal{R})=\begin{cases} 4-2\sqrt2\approx1.17&\text{ if }d=2\\ \frac{9-\sqrt{17}}{2}\approx 2.44&\text{ if }d=3. \end{cases}$$ This improves recent results of the last two authors (arxiv:1711.03486) by working with the actual topological boundary, rather than the boundary of the zero set of the local time, and establishing a local result for the dimension.


          A geometric proof of an equivariant Pieri rule for flag manifolds. (arXiv:1809.04242v1 [math.AG])      Cache   Translate Page      

Authors: Changzheng Li, Vijay Ravikumar, Frank Sottile, Mingzhi Yang

We use geometry to give a short proof of an equivariant Pieri rule in the classical flag manifold.


          Self-foldability of monohedral quadrilateral origami tessellations. (arXiv:1809.04243v1 [math.MG])      Cache   Translate Page      

Authors: Thomas C. Hull, Tomohiro Tachi

Using a mathematical model for self-foldability of rigid origami, we determine which monohedral quadrilateral tilings of the plane are uniquely self-foldable. In particular, the Miura-ori and Chicken Wire patterns are not self-foldable under our definition, but such tilings that are rotationally-symmetric about the midpoints of the tile are uniquely self-foldable.


          On Conjectural Rank Parities of Quartic and Sextic Twists of Elliptic Curves. (arXiv:1809.04244v1 [math.NT])      Cache   Translate Page      

Authors: Matthew Weidner

We study the behavior under twisting of the Selmer rank parities of a self-dual prime-degree isogeny on a principally polarized abelian variety defined over a number field, subject to compatibility relations between the twists and the isogeny. In particular, we study isogenies on abelian varieties whose Selmer rank parities are related to the rank parities of elliptic curves with $j$-invariant 0 or 1728, assuming the Shafarevich-Tate conjecture. Using these results, we show how to classify the conjectural rank parities of all quartic or sextic twists of an elliptic curve defined over a number field, after a finite calculation. This generalizes previous results of Hadian and Weidner on the behavior of $p$-Selmer ranks under $p$-twists.


          Limit theorems for the minimal position of a branching random walk in random environment. (arXiv:1809.04245v1 [math.PR])      Cache   Translate Page      

Authors: Wenming Hong, Xiaoyue Zhang

We consider a branching system of random walk in random environment (in location) in $\mathbb{N}$. We will give the exact limit value of $\frac{M_{n}}{n}$, where $M_{n}$ denotes the minimal position of branching random walk at time $n$. A key step in the proof is to transfer our branching random walks in random environment (in location) to branching random walks in random environment (in time), by use of Bramson's "branching processes within a branching process" .


          Weight filtrations on GKZ-systems. (arXiv:1809.04247v1 [math.AG])      Cache   Translate Page      

Authors: Thomas Reichelt, Uli Walther

If $\beta\in\CC^d$ is integral but not a strongly resonant parameter for the homogeneous matrix $A\in\ZZ^{d\times n}$ with $\ZZ A=\ZZ^d$, then the associated GKZ-system carries a naturally defined mixed Hodge module structure. We study here in the normal case the corresponding weight filtration by computing the intersection complexes with respective multiplicities on the associated graded parts. We do this by computing the weight filtration of a Gauss--Manin system with respect to a locally closed embedding of a torus inside an affine space. Our results show that these data, which we express in terms of intersection cohomology groups on induced toric varieties, are purely combinatorial, and not arithmetic, in the sense that they only depend on the polytopal structure of the cone of $A$ but not on the semigroup itself. As a corollary we get a purely combinatorial formula for the length of the underlying (regular) holonomic $D$-module, irrespective of homogeneity. In dimension up to three, and for simplicial semigroups, we give explicit generators of the weight filtration.


          A Fast Globally Linearly Convergent Algorithm for the Computation of Wasserstein Barycenters. (arXiv:1809.04249v1 [math.OC])      Cache   Translate Page      

Authors: Lei Yang, Jia Li, Defeng Sun, Kim-Chuan Toh

In this paper, we consider the problem of computing a Wasserstein barycenter for a set of discrete probability distributions with finite supports, which finds many applications in different areas such as statistics, machine learning and image processing. When the support points of the barycenter are pre-specified, this problem can be modeled as a linear programming (LP), while the problem size can be extremely large. To handle this large-scale LP, in this paper, we derive its dual problem, which is conceivably more tractable and can be reformulated as a well-structured convex problem with 3 kinds of block variables and a coupling linear equality constraint. We then adapt a symmetric Gauss-Seidel based alternating direction method of multipliers (sGS-ADMM) to solve the resulting dual problem and analyze its global convergence as well as its global linear convergence rate. We also show how all the subproblems involved can be solved exactly and efficiently. This makes our method suitable for computing a Wasserstein barycenter on a large dataset. In addition, our sGS-ADMM can be used as a subroutine in an alternating minimization method to compute a barycenter when its support points are not pre-specified. Numerical results on synthetic datasets and image datasets demonstrate that our method is more efficient for solving large-scale problems, comparing with two existing representative methods and the commercial software Gurobi.


          On the convergence rate improvement of a splitting method for finding the resolvent of the sum of maximal monotone operators. (arXiv:1809.04250v1 [math.OC])      Cache   Translate Page      

Authors: Shin-ya Matsushita

This paper provides a new way of developing the splitting method which is used to solve the problem of finding the resolvent of the sum of maximal monotone operators in Hilbert spaces. By employing accelerated techniques developed by Davis and Yin (in Set-Valued Var. Anal. 25(4):829-858, 2017), this paper presents an implementable, strongly convergent splitting method which is designed to solve the problem. In particular, we show that the distance between the sequence of iterates and the solution converges to zero at a rate O(1/k) to illustrate the efficiency of the proposed method, where k is the number of iterations. Then, we apply the result to a class of optimization problems.


          Large time behavior of ODE type solutions to nonlinear diffusion equations. (arXiv:1809.04252v1 [math.AP])      Cache   Translate Page      

Authors: Junyong Eom, Kazuhiro Ishige

Consider the Cauchy problem for a nonlinear diffusion equation \begin{equation} \tag{P} \left\{ \begin{array}{ll} \partial_t u=\Delta u^m+u^\alpha & \quad\mbox{in}\quad{\bf R}^N\times(0,\infty),\\ u(x,0)=\lambda+\varphi(x)>0 & \quad\mbox{in}\quad{\bf R}^N, \end{array} \right. \end{equation} where $m>0$, $\alpha\in(-\infty,1)$, $\lambda>0$ and $\varphi\in BC({\bf R}^N)\,\cap\, L^r({\bf R}^N)$ with $1\le r<\infty$ and $\inf_{x\in{\bf R}^N}\varphi(x)>-\lambda$. Then the positive solution to problem (P) behaves like a positive solution to ODE $\zeta'=\zeta^\alpha$ in $(0,\infty)$ and it tends to $+\infty$ as $t\to\infty$. In this paper we obtain the precise description of the large time behavior of the solution and reveal the relationship between the behavior of the solution and the diffusion effect the nonlinear diffusion equation has.


          Free Pseudodistance Growth Rates for Spatially Coupled LDPC Codes over the BEC. (arXiv:1809.04253v1 [cs.IT])      Cache   Translate Page      

Authors: Cunlu Zhou, David G. M. Mitchell, Roxana Smarandache

The minimum pseudoweight is an important parameter related to the decoding performance of LDPC codes with iterative message-passing decoding. In this paper, we consider ensembles of periodically time-varying spatially coupled LDPC (SC-LDPC) codes and the pseudocodewords arising from their finite graph covers of a fixed degree. We show that for certain $(J,K)$-regular SC-LDPC code ensembles and a fixed cover degree, the typical minimum pseudoweight of the unterminated (and associated tail-biting/terminated) SC-LDPC code ensembles grows linearly with the constraint (block) length as the constraint (block) length tends to infinity. We prove that one can bound the the free pseudodistance growth rate over a BEC from below (respectively, above) using the associated tail-biting (terminated) SC-LDPC code ensemble and show empirically that these bounds coincide for a sufficiently large period, which gives the exact free pseudodistance growth rate for the SC-LDPC ensemble considered.


          Efficiency and detectability of random reactive jamming in carrier sense wireless networks. (arXiv:1809.04263v1 [cs.IT])      Cache   Translate Page      

Authors: Ni An, Steven Weber

A natural basis for the detection of a wireless random reactive jammer (RRJ) is the perceived violation by the detector (typically located at the access point (AP)) of the carrier sensing protocol underpinning many wireless random access protocols (e.g., WiFi). Specifically, when the wireless medium is perceived by a station to be busy, a carrier sensing compliant station will avoid transmission while a RRJ station will often initiate transmission. However, hidden terminals (HTs), i.e., activity detected by the AP but not by the sensing station, complicate the use of carrier sensing as the basis for RRJ detection since they provide plausible deniability to a station suspected of being an RRJ. The RRJ has the dual objectives of avoiding detection and effectively disrupting communication, but there is an inherent performance tradeoff between these two objectives. In this paper we capture the behavior of both the RRJ and the compliant stations via a parsimonious Markov chain model, and pose the detection problem using the framework of Markov chain hypothesis testing. Our analysis yields the receiver operating characteristic of the detector, and the optimized behavior of the RRJ. While there has been extensive work in the literature on jamming detection, our innovation lies in leveraging carrier sensing as a natural and effective basis for detection.


          Scalable Computation of 2D-Minkowski Sum of Arbitrary Non-Convex Domains: Modeling Flexibility in Energy Resources. (arXiv:1809.04265v1 [math.OC])      Cache   Translate Page      

Authors: Soumya Kundu, Vikas Chandan, Karan Kalsi

The flexibility of active ($p$) and reactive power ($q$) consumption in distributed energy resources (DERs) can be represented as a (potentially non-convex) set of points in the $p$-$q$ plane. Modeling of the aggregated flexibility in a heterogeneous ensemble of DERs as a Minkowski sum (M-sum) is computationally intractable even for moderately sized populations. In this article, we propose a scalable method of computing the M-sum of the flexibility domains of a heterogeneous ensemble of DERs, which are allowed to be non-convex, non-compact. In particular, the proposed algorithm computes a guaranteed superset of the true M-sum, with desired accuracy. The worst-case complexity of the algorithm is computed. Special cases are considered, and it is shown that under certain scenarios, it is possible to achieve a complexity that is linear with the size of the ensemble. Numerical examples are provided by computing the aggregated flexibility of different mix of DERs under varying scenarios.


          A Singular Integral Measure for $C^{1,1}$ and $C^1$ Boundaries. (arXiv:1809.04266v1 [math.CA])      Cache   Translate Page      

Authors: Laramie Paxton, Kevin R. Vixie

The art of analysis involves the subtle combination of approximation, inequalities, and geometric intuition as well as being able to work at different scales. With this subtlety in mind, we present this paper in a manner designed for wide accessibility for both advanced undergraduate students and graduate students. The main results include a singular integral for measuring the level sets of a $C^{1,1}$ function mapping from $\mathbb{R}^n$ to $\mathbb{R}$, that is, one whose derivative is Lipschitz continuous. We extend this to measure embedded submanifolds in $\mathbb{R}^2$ that are merely $C^1$ using the distance function and provide an example showing that the measure does not hold for general rectifiable boundaries.


          Convex domain which tiles space by translation,with multiplicity. (arXiv:1809.04272v1 [math.MG])      Cache   Translate Page      

Authors: Qi Yang

This paper shows that a multiple translative tile in the plane must be a multiple lattice tile.


          Prediction out-of-sample using block shrinkage estimators: model selection and predictive inference. (arXiv:1809.04275v1 [math.ST])      Cache   Translate Page      

Authors: Hannes Leeb, Nina Senitschnig

In a linear regression model with random design, we consider a family of candidate models from which we want to select a `good' model for prediction out-of-sample. We fit the models using block shrinkage estimators, and we focus on the challenging situation where the number of explanatory variables can be of the same order as sample size and where the number of candidate models can be much larger than sample size. We develop an estimator for the out-of-sample predictive performance, and we show that the empirically best model is asymptotically as good as the truly best model. Using the estimator corresponding to the empirically best model, we construct a prediction interval that is approximately valid and short with high probability, i.e., we show that the actual coverage probability is close to the nominal one and that the length of this prediction interval is close to the length of the shortest but infeasible prediction interval. All results hold uniformly over a large class of data-generating processes. These findings extend results of Leeb (2009), where the models are fit using least-squares estimators, and of Huber (2013), where the models are fit using shrinkage estimators without block structure.


          Classes of graphs with no long cycle as a vertex-minor are polynomially $\chi$-bounded. (arXiv:1809.04278v1 [math.CO])      Cache   Translate Page      

Authors: Ringi Kim, O-joung Kwon, Sang-il Oum, Vaidy Sivaraman

A class $\mathcal G$ of graphs is $\chi$-bounded if there is a function $f$ such that for every graph $G\in \mathcal G$ and every induced subgraph $H$ of $G$, $\chi(H)\le f(\omega(H))$. In addition, we say that $\mathcal G$ is polynomially $\chi$-bounded if $f$ can be taken as a polynomial function. We prove that for every integer $n\ge3$, there exists a polynomial $f$ such that $\chi(G)\le f(\omega(G))$ for all graphs with no vertex-minor isomorphic to the cycle graph $C_n$. To prove this, we show that if $\mathcal G$ is polynomially $\chi$-bounded, then so is the closure of $\mathcal G$ under taking the $1$-join operation.


          Equidistributions of Jacobi sums. (arXiv:1809.04286v1 [math.NT])      Cache   Translate Page      

Authors: Ping Xi

Let $\mathbf{F}_q$ be a finite field of $q$ elements. We show that the normalized Jacobi sum $J(\chi,\eta)/\sqrt{q}$, for each fixed non-trivial multiplicative character $\eta$, becomes equidistributed in the unit circle as $q\rightarrow+\infty,$ when $\chi$ runs over all non-trivial multiplicative characters different from $\eta^{-1}.$ Previously, the similar equidistribution was obtained by Katz and Zheng by varying both of $\chi$ and $\eta$. On the other hand, we also obtain the equidistribution of $J(\chi,\eta)$ as $(\chi,\eta)$ runs over $\mathcal{X}\times\mathcal{Y}\subseteq(\widehat{\mathrm{F}^*})^2$, as long as $|\mathcal{X}|>q^{\frac{1}{2}+\varepsilon}$ and $|\mathcal{Y}|>q^\varepsilon$ for any $\varepsilon>0$. This updates a recent work of Lu, Zheng and Zheng, who require $|\mathcal{X}||\mathcal{Y}|>q\log^2q.$

The main ingredient is the estimate for hypergeometric sums due to Katz.


          On symplectic resolutions and factoriality of Hamiltonian reductions. (arXiv:1809.04301v1 [math.AG])      Cache   Translate Page      

Authors: Gwyn Bellamy, Travis Schedler

Recently, Herbig--Schwarz--Seaton have shown that $2$-large representations of a reductive group $G$ give rise to a large class of symplectic singularities via Hamiltonian reduction. We show that these singularities are always terminal. We show that they are $\mathbb{Q}$-factorial if and only if $G$ has finite abelianization. When $G$ is connected and semi-simple, we show they are actually locally factorial. As a consequence, the symplectic singularities do not admit symplectic resolutions when $G$ is semi-simple. We end with some open questions.


          Power values of sums of certain products of consecutive integers and related results. (arXiv:1809.04304v1 [math.NT])      Cache   Translate Page      

Authors: Szabolcs Tengely, Maciej Ulas

Let $n$ be a non-negative integer and put $p_{n}(x)=\prod_{i=0}^{n}(x+i)$. In the first part of the paper, for given $n$, we study the existence of integer solutions of the Diophantine equation $$ y^m=p_{n}(x)+\sum_{i=1}^{k}p_{a_{i}}(x), $$ where $m\in\N_{\geq 2}$ and $a_{1}<a_{2}<\ldots <a_{k}<n$. This equation can be considered as a generalization of the Erd\H{o}s-Selfridge Diophantine equation $y^m=p_{n}(x)$. We present some general finiteness results concerning the integer solutions of the above equation. In particular, if $n\geq 2$ with $a_{1}\geq 2$, then our equation has only finitely many solutions in integers. In the second part of the paper we study the equation $$ y^m=\sum_{i=1}^{k}p_{a_{i}}(x_{i}), $$ for $m=2, 3$, which can be seen as an additive version of the equation considered by Erd\H{o}s and Graham. In particular, we prove that if $m=2, a_{1}=1$ or $m=3, a_{2}=2$, then for each $k-1$ tuple of positive integers $(a_{2},\ldots, a_{k})$ there are infinitely many solutions in integers.


          On Kn\"orrer periodicity for quadric hypersurfaces in skew projective spaces. (arXiv:1809.04305v1 [math.RA])      Cache   Translate Page      

Authors: Kenta Ueyama

We study the structure of the stable category $\mathsf{\underline{CM}}^{\mathbb Z}(S/(f))$ of graded maximal Cohen-Macaulay module over $S/(f)$ where $S$ is a graded ($\pm 1$)-skew polynomial algebra in $n$ variables of degree 1, and $f =x_1^2 + \cdots +x_n^2$. If $S$ is commutative, then the structure of $\mathsf{\underline{CM}}^{\mathbb Z}(S/(f))$ is well-known by Kn\"orrer's periodicity theorem. We prove in this paper that if $n\leq 5$, then the structure of $\mathsf{\underline{CM}}^{\mathbb Z}(S/(f))$ is determined by the number of irreducible components of the point scheme of $S$ which are isomorphic to ${\mathbb P}^1$.


          Filippov trajectories and clustering in the Kuramoto model with singular couplings. (arXiv:1809.04307v1 [math.AP])      Cache   Translate Page      

Authors: Jinyeong Park, David Poyato, Juan Soler

We study the synchronization of a generalized Kuramoto system in which the coupling weights are determined by the phase differences between oscillators. We employ the fast-learning regime in a Hebbian-like plasticity rule so that the interaction between oscillators is enhanced by the approach of phases. First, we study the well-posedness problem for the singular weighted Kuramoto systems in which the Lipschitz continuity is deprived. We present the dynamics of the system equipped with singular weights in all the subcritical, critical and supercritical regimes of the singularity. A key fact is that solutions in the most singular cases must be considered in Filippov's sense. We characterize sticking of phases in the subcritical and critical case and we exhibit a continuation criterion of classical solutions after any collision state in the supercritical regime. Second, we prove that strong solutions to these systems of differential inclusions can be recovered as singular limits of regular weights. We also provide the emergence of synchronous dynamics for the singular and regular weighted Kuramoto models.


          The breadth-degree type of a finite $p$-group. (arXiv:1809.04308v1 [math.GR])      Cache   Translate Page      

Authors: Norberto Gavioli, Valerio Monti

We determine an upper bound for the size of a stem $p$-group in terms of its breadth and its maximum character degree.


          Fourth order finite difference methods for the wave equation with mesh refinement interfaces. (arXiv:1809.04310v1 [math.NA])      Cache   Translate Page      

Authors: Siyang Wang, N. Anders Petersson

We analyze two types of summation-by-parts finite difference operators for solving the two-dimensional wave equation on a grid with a mesh refinement interface. The first type uses ghost points, while the second type does not use any ghost points. A previously unexplored relation between the two types of summation-by-parts operators is investigated. By combining them we develop a new fourth order accurate finite difference discretization for the wave equation with hanging nodes on the mesh refinement interface. Compared to previous approaches using ghost points, the proposed method leads to a smaller system of linear equations that needs to be solved for the ghost point values. An attractive feature of the proposed method is that the explicit time step does not need to be reduced relative to the corresponding periodic problem. Numerical experiments, both for smoothly varying and discontinuous material properties, demonstrate that the proposed method converges to fourth order accuracy. A detailed comparison of the accuracy and the time-step restriction of the simultaneous-approximation-term penalty method is also presented.


          Some breathers and multi-breathers for FPU-type chains. (arXiv:1809.04311v1 [math.DS])      Cache   Translate Page      

Authors: Gianni Arioli, Hans Koch

We consider several breather solutions for FPU-type chains that have been found numerically. Using computer-assisted techniques, we prove that there exist true solutions nearby, and in some cases, we determine whether or not the solution is spectrally stable. Symmetry properties are considered as well. In addition, we construct solutions that are close to (possibly infinite) sums of breather solutions.


          On the number of increasing trees with label repetitions. (arXiv:1809.04314v1 [math.CO])      Cache   Translate Page      

Authors: Olivier Bodini, Antoine Genitrini, Bernhard Gittenberger

In this paper we study a special subclass of monotonically labeled increasing trees: each sequence of labels from the root to any leaf is strictly increasing and each integer between $1$ and $k$ must appear in the tree, where $k$ is the largest label. The main difference with the classical model of binary increasing tree is that the same label can appear in distinct branches of the tree. Such a class of trees can be used in order to model population evolution processes or concurrent processes.

A specificity of such trees is that they are built through an evolution process that induces ordinary generating functions. Finally, we solve the nice counting problem for these trees of size $n$ and observe interesting asymptotics involving powers of $n$ with irrational exponents.


          On superspecial abelian surfaces and type numbers of totally definite quaternion algebras. (arXiv:1809.04316v1 [math.NT])      Cache   Translate Page      

Authors: Jiangwei Xue, Chia-Fu Yu

In this paper we determine the number of endomorphism rings of superspecial abelian surfaces over a field $\mathbb{F}_q$ of odd degree over $\mathbb{F}_p$ in the isogeny class corresponding to the Weil $q$-number $\pm\sqrt{q}$. This extends earlier works of T.-C. Yang and the present authors on the isomorphism classes of these abelian surfaces, and also generalizes the classical formula of Deuring for the number of endomorphism rings of supersingular elliptic curves. Our method is to explore the relationship between the type and class numbers of the quaternion orders concerned. We study the Picard group action of the center of an arbitrary $\mathbb{Z}$-order in a totally definite quaternion algebra on the ideal class set of said order, and derive an orbit number formula for this action. This allows us to prove an integrality assertion of Vign\'eras [Enseign. Math. (2), 1975] as follows. Let $F$ be a totally real field of even degree over $\mathbb{Q}$, and $D$ be the (unique up to isomorphism) totally definite quaternion $F$-algebra unramified at all finite places of $F$. Then the quotient $h(D)/h(F)$ of the class numbers is an integer.


          On the status of expansion by regions. (arXiv:1809.04325v1 [hep-th])      Cache   Translate Page      

Authors: Tatiana Yu. Semenova, Alexander V. Smirnov, Vladimir A. Smirnov

We discuss the status of expansion by regions, i.e. a well-known strategy to obtain an expansion of a given multiloop Feynman integral in a given limit where some kinematic invariants and/or masses have certain scaling measured in powers of a given small parameter. Using the Lee-Pomeransky parametric representation, we formulate the corresponding prescriptions in a simple geometrical language and make a conjecture that they hold even in a much more general case. We prove this conjecture in some partial cases and illustrate them in a simple example.


          Privacy-Utility Management of Hypothesis Tests. (arXiv:1809.04329v1 [cs.IT])      Cache   Translate Page      

Authors: Zuxing Li, Tobias J. Oechtering

The trade-off of hypothesis tests on the correlated privacy hypothesis and utility hypothesis is studied. The error exponent of the Bayesian composite hypothesis test on the privacy or utility hypothesis can be characterized by the corresponding minimal Chernoff information rate. An optimal management protects the privacy by minimizing the error exponent of the privacy hypothesis test and meanwhile guarantees the utility hypothesis testing performance by satisfying a lower bound on the corresponding minimal Chernoff information rate. The asymptotic minimum error exponent of the privacy hypothesis test is shown to be characterized by the infimum of corresponding minimal Chernoff information rates subject to the utility guarantees.


          Adaptive Newton-Type Schemes Based on Projections. (arXiv:1809.04337v1 [math.NA])      Cache   Translate Page      

Authors: Mario Amrein

In this work we present and discuss a possible globalization concept for Newton-type methods. We consider nonlinear problems $f(x)=0$ in $\mathbb{R}^{n}$ using the concepts from ordinary differential equations as a basis for the proposed numerical solution procedure. Thus, the starting point of our approach is within the framework of solving ordinary differential equations numerically. Accordingly, we are able to reformulate general Newton-type iteration schemes using an adaptive step size control procedure. In doing so, we derive and discuss a discrete adaptive solution scheme thereby trying to mimic the underlying continuous problem numerically without losing the famous quadratic convergence regime of the classical Newton method in a vicinity of a regular solution. The derivation of the proposed adaptive iteration scheme relies on a simple orthogonal projection argument taking into account that, sufficiently close to regular solutions, the vector field corresponding to the Newton scheme is approximately linear. We test and exemplify our adaptive root-finding scheme using a few low-dimensional examples. Based on the presented examples, we finally show some performance data.


          On framed simple purely real Hurwitz numbers. (arXiv:1809.04340v1 [math.AG])      Cache   Translate Page      

Authors: Maxim Kazarian, Sergey Lando, Sergey Natanzon

We present a study of real Hurwitz numbers enumerating a special kind of real meromorphic functions, which we call simple framed purely real functions. We deduce partial differential equations of cut-and-join type for generating functions for these numbers. We also construct a topological field theory for them.


          An asymptotic expansion for the error term in the Brent-McMillan algorithm for Euler's constant. (arXiv:1809.04342v1 [math.CA])      Cache   Translate Page      

Authors: R B Paris

The Brent-McMillan algorithm is the fastest known procedure for the high-precision computation of Euler's constant $\gamma$ and is based on the modified Bessel functions $I_0(2x)$ and $K_0(2x)$. An error estimate for this algorithm relies on the optimally truncated asymptotic expansion for the product $I_0(2x) K_0(2x)$ when $x$ assumes large positive integer values. An asymptotic expansion for this optimal error term is derived by exploiting the techniques developed in hyperasymptotics, thereby enabling more precise information on the error term than recently obtained bounds and estimates.


          Self-adjoint local boundary problems on compact surfaces. II. Family index. (arXiv:1809.04353v1 [math-ph])      Cache   Translate Page      

Authors: Marina Prokhorova

The paper deals with first order formally self-adjoint elliptic differential operators on a smooth compact oriented surface with non-empty boundary. We consider such operators with self-adjoint elliptic local boundary conditions. The paper is focused on families of such operators parametrized by points of a compact topological space $X$. The first result of the paper is the computation of the $K^1(X)$-valued index for such families in terms of the topological data over the boundary. The second result is universality of the index: we show that the index is a universal additive homotopy invariant for such families, if the vanishing on families of invertible operators is required.


          Robust Beamforming for AN Aided MISO SWIPT System with Unknown Eavesdroppers and Non-linear EH Model. (arXiv:1809.04354v1 [cs.IT])      Cache   Translate Page      

Authors: Miao Zhang, Kanapathippillai Cumanan, Lei Ni, Hang Hu Alister G. Burr, Zhiguo Ding

This work studies a beamforming design for downlink transmission of a multi-user multiple-input single-output (MISO) system where each legitimate user employs a power splitting (PS) based simultaneous wireless information and power transfer (SWIPT) technique. The transmitter intends to send confidential information to its legitimate users in the presence of purely unknown eavesdroppers. Since the transmitter does not have any knowledge of the eavesdroppers' channel state information (CSI), we consider an artificial noise (AN) approach to establishing secure communication. This beamforming design is developed by maximizing the AN power to interfere with the eavesdropper as much as possible. Based on the assumption of imperfect CSI of legitimate users at the transmitter, two robust design approaches for the joint beamforming and PS ratio have been studied to maximize the AN power under both energy harvesting (EH) and signal-to-interference-plus-noise ratio (SINR) requirements at each legitimate user. In the first robust design, we consider the bounded channel uncertainties, and employ semidefinite relaxation (SDR) and a linear matrix inequality (LMI) representation to transform the original problem into a semidefinite program (SDP). In the second robust design, we consider the statistical channel uncertainties, and show that the proposed problem can be reformulated into another form of SDP through both SDR and Bernstein-type inequality. In addition, the non-linear energy harvesting (EH) model is incorporated in this work as it could reflect the characteristics of practical radio frequency(RF)-EH conversion circuit. Simulation results have been provided to demonstrate the performance of our proposed robust designs.


          Optimality conditions and complete description of polytopes in combinatorial optimization. (arXiv:1809.04363v1 [math.OC])      Cache   Translate Page      

Authors: Alexey Antonov

A combinatorial optimization problem (COP) has a finite groundset $E(\left|E\right|=N$), a weight vector $c=\left(c^e:e\in E\right)$ and a family $T\in E$ of feasible subsets with objective to find $t\in T$ with maximal weight: ${max}\{\sum_{e\in t}c^e$: $t\in T\}$. Polyhedral combinatorics reformulates combinatorial optimization as linear program: $T$ is mapped into the set $X\in R^N$ of 0/1 incidence vectors and $c\in R^N$ is maximized over the convex hull of $X$: ${max}\{cx: x\in conv(X)\}$. In theory, complementary slackness conditions for the induced linear program provide optimality conditions for the COP. However, in general case, optimality conditions for combinatorial optimization have not been formulated analytically as for many problems complete description of the induced polytopes is available only as a convex hull of extreme points rather than a system of linear inequalities. Here, we formulate optimality conditions for a COP in general case: $x_k\in X\ \ $is optimal if and only if $c\in cone\left(H_k\right)\ $ where $H_k$ $=\{h\in V:\ {hx}_k\ \ge hx$ for all $x\in X\}$ and $V$ is the set of all -1/0/1 valued vectors in $R^N$. This provides basis to get, in theory, a complete description of a combinatorial polytope induced by any COP: all facet inducing inequalities for $conv(X)$ can be written as $hx\le l$ where $h\in V$ and $l$ is integer. A vector $h\in V$ induces a nonredundent facet if and only if $h\in H_k^o$ $\in H_k$ for at least one $x_k\in X\ $(where $H_k^o$$=\{h\in H_k:h\notin cone(H_k\setminus \{h\})\}$ ) and $l=\ $ $x_kh$.


          Non-equilibrium fluctuations for the SSEP with a slow bond. (arXiv:1809.04367v1 [math.PR])      Cache   Translate Page      

Authors: Dirk Erhard, Tertuliano Franco, Patrícia Gonçalves, Adriana Neumann, Mariana Tavares

We prove the non-equilibrium fluctuations for the one-dimensional symmetric simple exclusion process with a slow bond. This generalizes a result of T. Franco, A. Neumann and P. Gon\c{c}alves (2013), which dealt with the equilibrium fluctuations. The foundation stone of our proof is a precise estimate on the correlations of the system, and that is by itself one of the main novelties of this paper. To obtain these estimates, we first deduce a spatially discrete PDE for the covariance function and we relate it to the local times of a random walk in a non-homogeneous environment via Duhamel's principle. Projection techniques and coupling arguments reduce the analysis to the problem of studying the local times of the classical random walk. We think that the method developed here can be applied to a variety of models, and we provide a discussion on this matter.


          Symmetries of special 2-flags. (arXiv:1809.04368v1 [math.DG])      Cache   Translate Page      

Authors: Piotr Mormul, Fernand Pelletier

This work is a continuation of authors' research interrupted in the year 2010. Derived are recursive relations describing for the first time all infinitesimal symmetries of special 2-flags (sometimes also misleadingly called `Goursat 2-flags'). When algorithmized to the software level, they will give an answer filling in the gap in knowledge as of 2010: on one side the local finite classification of special 2-flags known in lengths not exceeding four, on the other side the existence of a continuous numerical modulus of that classification in length seven.


          Thick points of random walk and the Gaussian free field. (arXiv:1809.04369v1 [math.PR])      Cache   Translate Page      

Authors: Antoine Jego

We consider the thick points of random walk, i.e. points where the local time is a fraction of the maximum. In two dimensions, we answer a question of Dembo, Peres, Rosen and Zeitouni and compute the number of thick points of planar random walk, assuming that the increments are symmetric and have a finite moment of order two. The proof provides a streamlined argument based on the connection to the Gaussian free field and works in a very general setting including isoradial graphs. In higher dimensions, we study the scaling limit of the thick points. In particular, we show that the rescaled number of thick points converges to a nondegenerate random variable and that the centered maximum of the local times converges to a randomly shifted Gumbel distribution.


          Global smoothness for a 1D supercritical transport model with nonlocal velocity. (arXiv:1809.04373v1 [math.AP])      Cache   Translate Page      

Authors: Lucas C. F. Ferreira, Valter V. C. Moitinho

We are concerned with a nonlocal transport 1D-model with supercritical dissipation $\gamma\in(0,1)$ in which the velocity is coupled via the Hilbert transform. This model arises in fluid mechanics linked to vortex-sheet problems, and as a lower dimensional model for the 2D dissipative quasi-geostrophic equation. It is known that solutions can blow up in finite time when $\gamma\in(0,1/2)$ . On the other hand, in the supercritical subrange $\gamma\in\lbrack1/2,1)$ it is an open problem to know whether solutions are globally regular, as stated by Kiselev (2010). We show global smoothness of solutions in a supercritical subrange (close to 1) that depends on the non-negative initial data. More precisely, for each smooth non-negative initial data (without smallness condition) the model has a unique global smooth solution provided that $\gamma\in\lbrack\gamma_{1},1)$, where $\gamma_{1}$ depends on the initial data size. Our approach is inspired on that of Coti Zelati and Vicol (2016).


          Binary MDS Array Codes with Optimal Repair. (arXiv:1809.04380v1 [cs.IT])      Cache   Translate Page      

Authors: Hanxu Hou, Patrick P. C. Lee

Consider a binary maximum distance separate (MDS) array code composed of an $m\times (k+r)$ array of bits with $k$ information columns and $r$ parity columns, such that any $k$ out of $k+r$ columns suffice to reconstruct the $k$ information columns. Our goal is to provide {\em optimal repair access} for binary MDS array codes, meaning that the bandwidth triggered to repair any single failed information or parity column is minimized. In this paper, we propose a generic transformation framework for binary MDS array codes, using EVENODD codes as a motivating example, to support optimal repair access for $k+1\le d \le k+r-1$, where $d$ denotes the number of non-failed columns that are connected for repair. In addition, we show that the efficient decoding property of the original EVENODD codes is maintained after transformation. Furthermore, we show how our transformation framework applies to general binary MDS array codes and enables them to support optimal repair access.


          On convergence of Chorin's projection method to a Leray-Hopf weak solution. (arXiv:1809.04383v1 [math.AP])      Cache   Translate Page      

Authors: Hidesato Kuroki, Kohei Soga

The projection method to solve the incompressible Navier-Stokes equations was first studied by Chorin [Math. Comp., 1969] in the framework of a finite difference method and Temam [Arch. Rational Mech. and Anal., 1969] in the framework of a finite element method. Chorin showed convergence of approximation and its error estimates in problems with the periodic boundary condition assuming existence of a $C^5$-solution, while Temam demonstrated an abstract argument to obtain a Leray-Hopf weak solution in problems on a bounded domain with the no-slip boundary condition. In the present paper, the authors extend Chorin's result with full details to obtain convergent finite difference approximation of a Leray-Hopf weak solution to the incompressible Navier-Stokes equations on a bounded domain of $\mathbb{R}^3$ with the no-slip boundary condition. The results contain a new method to prove strong $L^2$-convergence from weak $L^2$-convergence by means of an interpolation inequality for step functions.


          Hybrid matrix compression for high-frequency problems. (arXiv:1809.04384v1 [math.NA])      Cache   Translate Page      

Authors: Steffen Börm, Christina Börst

Boundary element methods for the Helmholtz equation lead to large dense matrices that can only be handled if efficient compression techniques are used. Directional compression techniques can reach good compression rates even for high-frequency problems.

Currently there are two approaches to directional compression: analytic methods approximate the kernel function, while algebraic methods approximate submatrices. Analytic methods are quite fast and proven to be robust, while algebraic methods yield significantly better compression rates.

We present a hybrid method that combines the speed and reliability of analytic methods with the good compression rates of algebraic methods.


          On the regular-convexity of Ricci shrinker limit spaces. (arXiv:1809.04386v1 [math.DG])      Cache   Translate Page      

Authors: Shaosai Huang, Yu Li, Bing Wang

In this paper, we study the structure of the pointed-Gromov-Hausdorff limits of sequences of Ricci shrinkers. We define a regular-singular decomposition following the work of Cheeger-Colding for manifolds with a uniform Ricci curvature lower bound, and prove that the regular part of any Ricci shrinker limit space is convex, inspired by Colding-Naber's original idea of parabolic smoothing of the distance functions.


          Quantum version of Wielandt's Inequality revisited. (arXiv:1809.04387v1 [math.AC])      Cache   Translate Page      

Authors: Mateusz Michałek, Yaroslav Shitov

Consider a linear space L of complex D-dimensional linear operators, and assume that some power L^k of L is the whole space of DxD matrices. Perez-Garcia, Verstraete, Wolf and Cirac conjectured that the sequence L^1,L^2,... stablilizes after O(D^2) terms; we prove that this happens after O(D^2 log(D)) terms, improving the previously known bound of O(D^4).


          A random geometric social network with Poisson point measures. (arXiv:1809.04388v1 [math.PR])      Cache   Translate Page      

Authors: Ahmed Sid-Ali, Khader Khadraoui

We formalize the problem of modeling social networks into Poisson point measures. We obtain a simple model that describes each member of the network at virtual state as a Dirac measure. We set the exact Monte Carlo scheme of this model and its representation as a stochastic process. By assuming that the spatial dependence of the kernels and rates used to build the model is bounded in some sense, we show that the size of the network remains bounded in expectation over any finite time. By assuming the compactness of the virtual space, we study the extinction and the survival properties of the network. Furthermore, we use a renormalization technique, which has the effect that the density of the network population must grow to infinity, to prove that the rescaled network converges in law towards the solution of a deterministic equation. Finally, we use our algorithm for some numerical simulations.


          Induced path factors of regular graphs. (arXiv:1809.04394v1 [math.CO])      Cache   Translate Page      

Authors: Saieed Akbari, Daniel Horsley, Ian M. Wanless

An induced path factor of a graph $G$ is a set of induced paths in $G$ with the property that every vertex of $G$ is in exactly one of the paths. The induced path number $\rho(G)$ of $G$ is the minimum number of paths in an induced path factor of $G$. We show that if $G$ is a connected cubic graph on $n>6$ vertices, then $\rho(G)\le(n-1)/3$.

Fix an integer $k\ge3$. For each $n$, define $\mathcal{M}_n$ to be the maximum value of $\rho(G)$ over all connected $k$-regular graphs $G$ on $n$ vertices. As $n\rightarrow\infty$ with $nk$ even, we show that $c_k=\lim(\mathcal{M}_n/n)$ exists. We prove that $5/18\le c_3\le1/3$ and $3/7\le c_4\le1/2$ and that $c_k=\frac12-O(k^{-1})$ for $k\rightarrow\infty$.


          Finding Cheeger Cuts in Hypergraphs via Heat Equation. (arXiv:1809.04396v1 [cs.DS])      Cache   Translate Page      

Authors: Masahiro Ikeda, Atsushi Miyauchi, Yuuki Takai, Yuichi Yoshida

Cheeger's inequality states that a tightly connected subset can be extracted from a graph $G$ using an eigenvector of the normalized Laplacian associated with $G$. More specifically, we can compute a subset with conductance $O(\sqrt{phi_G})$, where $\phi_G$ is the minimum conductance of a set in $G$. It has recently been shown that Cheeger's inequality can be extended to hypergraphs. However, as the normalized Laplacian of a hypergraph is no longer a matrix, we can only approximate to its eigenvectors; this causes a loss in the conductance of the obtained subset. To address this problem, we here consider the heat equation on hypergraphs, which is a differential equation exploiting the normalized Laplacian. We show that the heat equation has a unique solution and that we can extract a subset with conductance $\sqrt{phi_G}$ from the solution. An analogous result also holds for directed graphs.


          Optimal Strong Convergence Rate of a Backward Euler Type Scheme for the Cox--Ingersoll--Ross Model Driven by Fractional Brownian Motion. (arXiv:1809.04398v1 [math.NA])      Cache   Translate Page      

Authors: Jialin Hong, Chuying Huang, Minoo Kamrani, Xu Wang

In this paper, we investigate the optimal strong convergence rate of numerical approximations for the Cox--Ingersoll--Ross model driven by fractional Brownian motion with Hurst parameter $H>1/2$. To deal with the unbounded diffusion coefficient and ensure the positivity of the numerical solution, we apply the backward Euler scheme to an auxiliary equation based on Lamperti transformation. By means of Malliavin calculus, we give the strong order one convergence for the scheme. Numerical experiments are performed to confirm the theoretical analysis.


          Torus orbifolds with two fixed points. (arXiv:1809.04402v1 [math.GT])      Cache   Translate Page      

Authors: Alastair Darby, Shintaro Kuroki, Jongbaek Song

The main objects of this paper are torus orbifolds that have exactly two fixed points. We study the equivariant topological type of these orbifolds and consider when we can use the results of the paper [DKS] (arXiv:1809.03678) to compute its integral equivariant cohomology, in terms of generators and relations, coming from the corresponding orbifold torus graph.


          Optimal residence time control for stochastically perturbed prescription opioid epidemic models. (arXiv:1809.04410v1 [math.OC])      Cache   Translate Page      

Authors: Getachew K. Befekadu, Quanyan Zhu

In this paper, we consider an optimal control problem for a prescription opioid epidemic model that describes the interaction between the regular prescription or addictive use of opioid drugs, and the process of rehabilitation and that of relapsing into opioid drug use. In particular, our interest is in the situation, where the control appearing linearly in the opioid epidemics is interpreted as the rate at which the susceptible individuals are effectively removed from the population due to an opioid-related intervention policy or when the dynamics of the addicted is strategically influenced due to an accessible addiction treatment facility, while a small perturbing noise enters through the dynamics of the susceptible group in the population compartmental model. To this end, we introduce a mathematical apparatus that minimizes the asymptotic exit-rate with which the solution for such stochastically perturbed prescription opioid epidemics exits from a given bounded open domain. Moreover, under certain assumptions, we also provide an admissible optimal Markov control for the corresponding optimal control problem that optimally effected removal of the susceptible or recovered individuals from the population dynamics.


          Infinitely divisible states on finite quantum groups. (arXiv:1809.04417v1 [math.OA])      Cache   Translate Page      

Authors: Haonan Zhang

In this paper we study the states of Poisson type and infinitely divisible states on compact quantum groups. Each state of Poisson type is infinitely divisible, i.e., it admits $n$-th root for all $n\geq1$. The main result is that on finite quantum groups infinitely divisible states must be of Poisson type. This generalizes B\"oge's theorem concerning infinitely divisible measures (commutative case) and Parthasarathy's result on infinitely divisible positive definite functions (cocommutative case). Two proofs are given.


          Balanced Phase Field model for Active Surfaces. (arXiv:1809.04420v1 [math.OC])      Cache   Translate Page      

Authors: Jozsef Molnar, Peter Horvath

In this paper we present a balanced phase field model for active surfaces. This work is devoted to the generalization of the Balanced Phase Field Model for Active Contours devised to eliminate the often undesirable curvature-dependent shrinking of the zero level set while maintaining the smooth interface necessary to calculate the fundamental geometric quantities of the represented contour. As its antecedent work, the proposed model extends the Ginzburg-Landau phase field energy with a higher order smoothness term. The relative weights are determined with the analysis of the level set motion in a curvilinear system adapted to the zero level set. The proposed model exhibits strong shape maintaining capability without significant interference with the active (e.g. a segmentation) model.


          Fertility Numbers. (arXiv:1809.04421v1 [math.CO])      Cache   Translate Page      

Authors: Colin Defant

A nonnegative integer is called a fertility number if it is equal to the number of preimages of a permutation under West's stack-sorting map. We prove structural results concerning permutations, allowing us to deduce information about the set of fertility numbers. In particular, the set of fertility numbers is closed under multiplication and contains every nonnegative integer that is not congruent to $3$ modulo $4$. We show that the lower asymptotic density of the set of fertility numbers is at least $1954/2565\approx 0.7618$. We also exhibit some positive integers that are not fertility numbers and conjecture that there are infinitely many such numbers.


          Inverse monoids of partial graph automorphisms. (arXiv:1809.04422v1 [math.CO])      Cache   Translate Page      

Authors: Robert Jajcay, Tatiana Jajcayova, Nóra Szakács, Mária B. Szendrei

A partial automorphism of a finite graph is an isomorphism between its vertex induced subgraphs. The set of all partial automorphisms of a given finite graph forms an inverse monoid under composition (of partial maps). We describe the algebraic structure of such inverse monoids by the means of the standard tools of inverse semigroup theory, namely Green's relations and some properties of the natural partial order, and give a characterization of inverse monoids which arise as inverse monoids of partial graph automorphisms. We extend our results to digraphs and edge-colored digraphs as well.


          Non-Scattering Energies and Transmission Eigenvalues in H^n. (arXiv:1809.04426v1 [math.AP])      Cache   Translate Page      

Authors: Eemeli Blåsten, Esa V. Vesalainen

We consider non-scattering energies and transmission eigenvalues of compactly supported potentials in the hyperbolic spaces $\mathbb H^n$. We prove that in $\ \mathbb H^2$ a corner bounded by two hyperbolic lines intersecting at an angle smaller than $180^\circ$ always scatters, and that one of the lines may be rep\ laced by a horocycle. In higher dimensions, we obtain similar results for corners bounded by hyperbolic hyperplanes intersecting each other pairwise orthogon\ ally, and that one of the hyperplanes may be replaced by a horosphere. The corner scattering results are contrasted by proving discreteness and existence res\ ults for the related transmission eigenvalue problems.


          Convergence of jump processes with stochastic intensity to Brownian motion with inert drift. (arXiv:1809.04428v1 [math.PR])      Cache   Translate Page      

Authors: Clayton Barnes

Consider a random walker on the nonnegative lattice, moving in continuous time, whose positive transition intensity is proportional to the time the walker spends at the origin. In this way, the walker is a jump process with a stochastic and adapted jump intensity. We show that, upon Brownian scaling, the sequence of such processes converges to Brownian motion with inert drift (BMID). BMID was introduced by Frank Knight in 2001 and generalized by White in 2007. This confirms a conjecture of Burdzy and White in 2008 in the one-dimensional setting.


          The Simanca metric admits a regular quantization. (arXiv:1809.04431v1 [math.DG])      Cache   Translate Page      

Authors: Francesco Cannas Aghedu, Andrea Loi

Let $g_S$ be the Simanca metric on the blow-up $\tilde{\mathbb{C}}^2$ of $\mathbb{C}^2$ at the origin. We show that $(\tilde{\mathbb{C}}^2,g_S)$ admits a regular quantization. We use this fact to prove that all coefficients in the Tian-Yau-Zelditch expansion for the Simanca metric vanish and that a dense subset of $(\tilde{\mathbb{C}}^2, g_S)$ admits a Berezin quantization


          Symmetric Function Theory at the Border of A_n and C_n. (arXiv:1809.04433v1 [math.CO])      Cache   Translate Page      

Authors: Graham Hawkes

We relate the type $A_n$ and type $C_n$ Stanley symmetric functions, by producing a new symmetric function: Our double Stanley symmetric function gives the type $A$ case at $(\mathbf{x},\mathbf{0})$ and gives the type $C$ case at $(\mathbf{x},\mathbf{x})$ and is symmetric and Schur positive in general at $(\mathbf{x}, \mathbf{y})$ for $\omega \in A_n \subseteq C_n$. In order to produce a Schur expansion for our functions, we make two attempts to generalize Edelman-Greene to signed words. We successfully do this using a \emph{signed-recording Edelman-Greene} map. However, the dual notion of the \emph{singed-insertion Edelman-Greene} map appears a difficult task, although its possible existence leaves us with the interesting conjecture of the \emph{even} and \emph{odd} Stanley symmetric functions.


          Generalized Staircase Tableaux: Symmetry and Applications. (arXiv:1809.04434v1 [math.CO])      Cache   Translate Page      

Authors: Graham Hawkes

We define a number of related combinatorial objects, each of which possesses a surprising symmetry. We include several applications such as a combinatorial explanation for certain fixed points of the involution $\omega$ on the ring of symmetric functions, as well as a relationship between certain skew Schur functions and skew $Q$-Schur functions. We give a $t$-deformation of these $Q$-Schur functions, and show that it is Schur positive, including a combinatorial description of the Schur coefficients. A corollary of our results is the equality of skew $Q$-Schur functions: $Q_{\lambda+\delta/\mu + \delta}=Q_{\lambda'+\delta/\mu' + \delta}$ for $\mu \subseteq \lambda$ and $\delta=(n,\ldots,1)$ for some $n > l(\lambda)$.


          Magnus-type Integrator for the Finite Element Discretization of Semilinear Parabolic non-Autonomous SPDEs Driven by multiplicative noise. (arXiv:1809.04438v1 [math.NA])      Cache   Translate Page      

Authors: Antoine Tambue, Jean Daniel Mukam

This paper aims to investigate numerical approximation of a general second order non-autonomous semilinear parabolic stochastic partial differential equation (SPDE) driven by multiplicative noise. Numerical approximations of autonomous SPDEs are thoroughly investigated in the literature, while the non-autonomous case is not yet understood. We discretize the non-autonomous SPDE driven by multiplicative noise by the finite element method in space and the Magnus-type integrator in time. We provide a strong convergence proof of the fully discrete scheme toward the mild solution in the root-mean-square $L^2$ norm. The result reveals how the convergence orders in both space and time depend on the regularity of the noise and the initial data. In particular, for multiplicative trace class noise we achieve convergence order $\mathcal{O}\left(h^2\left(1+\max(0,\ln\left(t_m/h^2\right)\right)+\Delta t^{1/2}\right)$.

Numerical simulations to illustrate our theoretical finding are provided.


          The sharp $L^p$ Korn interpolation and second inequalities in thin domains. (arXiv:1809.04439v1 [math.AP])      Cache   Translate Page      

Authors: Davit Harutyunyan

In the present paper we extend the $L^2$ Korn interpolation and second inequalities in thin domains, proven in [16], to the space $L^p$ for any $1<p<\infty.$ A thin domain is roughly speaking a shell with non-constant thickness in three dimensional Euclidean space around a smooth enough surface. The inequality holds for practically any thin domain $\Omega\subset\mathbb R^3$ and any vector field $\Bu\in W^{1,p}(\Omega).$ The constants in the estimate are asymptotically optimal in terms of the domain thickness $h.$ This in particular solves the problem of finding the asymptotics of the optimal constant in the classical Korn second inequality in $L^p$ for thin domains in terms of the domain thickness in almost full generality. The remarkable fact is that the interpolation inequality reduces the problem of estimating the gradient $\nabla\Bu$ in terms of the strain $e(\Bu)$ to the easier problem of estimating only the vector field $\Bu$, which is a Korn-Poincar\'e inequality.


          Synchronization of stochastic hybrid oscillators driven by a common switching environment. (arXiv:1809.04442v1 [math.PR])      Cache   Translate Page      

Authors: Paul Bressloff, James MacLaurin

Many systems in biology, physics and chemistry can be modeled through ordinary differential equations, which are piecewise smooth, but switch between different states according to a Markov jump process. In the fast switching limit, the dynamics converges to a deterministic ODE. In this paper we suppose that this limit ODE supports a stable limit cycle. We demonstrate that a set of such oscillators can synchronize when they are uncoupled, but they share the same switching Markov jump process. The latter is taken to represent the effect of a common randomly switching environment. We determine the leading order of the Lyapunov coefficient governing the rate of decay of the phase difference in the fast switching limit. The analysis bears some similarities to the classical analysis of synchronization of stochastic oscillators subject to common white noise. However the discrete nature of the Markov jump process raises some difficulties: in fact we find that the Lyapunov coefficient from the quasi-steady-state approximation differs from the Lyapunov coefficient one obtains from a second order perturbation expansion in the waiting time between jumps. Finally, we demonstrate synchronization numerically in the radial isochron clock model and show that the latter Lyapinov exponent is more accurate.


          Non-Archimedean Mathematics and the formalism of Quantum Mechanics. (arXiv:1809.04446v1 [math-ph])      Cache   Translate Page      

Authors: Vieri Benci

This paper is divided in four parts. In the introduction, we discuss the program and the motivations of this paper. In section 2, we introduce the non-Archimedean field of Euclidean numbers E and we present a summary of the theory of {\Lambda}-limits which can be considered as a different approach to nonstandard methods. In the third part (section 3), we define axiomatically the space of ultrafunctions which are a kind of generalized function based on the field of Euclidean numbers E. Finally, we describe an application of the previus theory to the formalism of classical Quantum Mecanics.


          Richardson-Gaudin models and broken integrability. (arXiv:1809.04447v1 [math-ph])      Cache   Translate Page      

Authors: Pieter W. Claeys

This thesis presents an introduction to the class of Richardson-Gaudin integrable models, with special focus on the Bethe ansatz wave function, and investigates ways of applying the properties of Richardson-Gaudin models both in and out of integrability. A framework is outlined for the numerical and theoretical treatment of these systems, exposing a duality allowing the Bethe equations to be solved numerically. This is extended to the calculation of inner products and correlation functions. Using this framework, the influence of particle exchange on the Bethe ansatz is discussed, after which it is shown how the Bethe ansatz is able to accurately model wave functions of non-integrable models in two different settings. First, a variational approach is outlined for stationary models where integrability-breaking perturbations are explicitly introduced. Second, an alternative way of breaking integrability is through the introduction of dynamics and periodic driving, where it is shown how integrability can be used to model the resulting Floquet many-body resonances. Throughout this work, it is shown how the clear-cut structure and relatively large freedom in Richardson-Gaudin models makes them ideal for an investigation of the general principles of integrability, as well as being a perfect testing ground for the development of new quantum many-body techniques beyond integrability.


          What is Schur positivity and how common is it?. (arXiv:1809.04448v1 [math.CO])      Cache   Translate Page      

Authors: Rebecca Patrias

This is a short note about Schur positivity. We introduce Schur polynomials and explain how they appear in the representation theory of the general linear group. We end with a new result of the author with F. Bergeron and V. Reiner that gives the probability that a homogeneous symmetric polynomial with positive coefficients is Schur positive.


          RC-positivity and rigidity of harmonic maps into Riemannian manifolds. (arXiv:1809.04449v1 [math.DG])      Cache   Translate Page      

Authors: Jun Wang, Xiaokui Yang

In this paper, we show that every harmonic map from a compact K\"ahler manifold with uniformly RC-positive curvature to a Riemannian manifold with non-positive complex sectional curvature is constant. In particular, there is no non-constant harmonic map from a compact K\"ahler manifold with positive holomorphic sectional curvature to a Riemannian manifold with non-positive complex sectional curvature.


          Global Strong Solutions to Magnetohydrodynamics with Density-Dependent Viscosity and Degenerate Heat-Conductivity. (arXiv:1809.04451v1 [math.AP])      Cache   Translate Page      

Authors: Bin Huang, Xiaoding Shi, Ying Sun

We deal with the equations of a planar magnetohydrodynamic compressible flow with the viscosity depending on the specific volume of the gas and the heat conductivity proportional to a positive power of the temperature. Under the same conditions on the initial data as those of the constant viscosity and heat conductivity case ([Kazhikhov (1987)], we obtain the global existence and uniqueness of strong solutions which means no shock wave, vacuum, or mass or heat concentration will be developed in finite time, although the motion of the flow has large oscillations and the interaction between the hydrodynamic and magnetodynamic effects is complex. Our result can be regarded as a natural generalization of the Kazhikhov's theory for the constant viscosity and heat conductivity case to that of nonlinear viscosity and degenerate heat-conductivity.


          Wideband mmWave Channel Estimation for Hybrid Massive MIMO with Low-Precision ADCs. (arXiv:1809.04454v1 [eess.SP])      Cache   Translate Page      

Authors: Yucheng Wang, Wei Xu, Hua Zhang, Xiaohu You

In this article, we investigate channel estimation for wideband millimeter-wave (mmWave) massive multiple-input multiple-output (MIMO) under hybrid architecture with lowprecision analog-to-digital converters (ADCs). To design channel estimation for the hybrid structure, both analog processing components and frequency-selective digital combiners need to be optimized. The proposed channel estimator follows the typical linear-minimum-mean-square-error (LMMSE) structure and applies for an arbitrary channel model. Moreover, for sparsity channels as in mmWave, the proposed estimator performs more efficiently by incorporating orthogonal matching pursuit (OMP) to mitigate quantization noise caused by low-precision ADCs. Consequently, the proposed estimator outperforms conventional ones as demonstrated by computer simulation results.


          Dynamic logic assigned to automata. (arXiv:1809.04456v1 [cs.LO])      Cache   Translate Page      

Authors: Ivan Chajda, Jan Paseka

A dynamic logic ${\mathbf B}$ can be assigned to every automaton ${\mathcal A}$ without regard if ${\mathcal A}$ is deterministic or nondeterministic. This logic enables us to formulate observations on ${\mathcal A}$ in the form of composed propositions and, due to a transition functor $T$, it captures the dynamic behaviour of ${\mathcal A}$. There are formulated conditions under which the automaton ${\mathcal A}$ can be recovered by means of ${\mathbf B}$ and $T$.


          Quantum chromodynamics through the geometry of M\"{o}bius structures. (arXiv:1809.04457v1 [physics.gen-ph])      Cache   Translate Page      

Authors: John Mashford

This paper describes a rigorous mathematical formulation providing a divergence free framework for QCD and the standard model in curved space-time. The starting point of the theory is the notion of covariance which is interpreted as (4D) conformal covariance rather than the general (diffeomorphism) covariance of general relativity. It is shown how the infinitesimal symmetry group (i.e. Lie algebra) of the theory, that is $su(2,2)$, is a linear direct sum of $su(3)$ and the algebra ${\mathfrak\kappa}\cong sl(2,{\bf C})\times u(1)$, these being the QCD algebra and the electroweak algebra. Fock space which is a graded algebra composed of Hilbert spaces of multiparticle states where the particles can be fermions such as quarks and electrons or bosons such as gluons or photons is described concretely. Algebra bundles whose typical fibers are the Fock spaces are defined. Scattering processes are associated with covariant linear maps between the Fock space fibers which can be generated by intertwining operators between the Fock spaces. It is shown how quark-quark scattering and gluon-gluon scattering are associated with kernels which generate such intertwining operators. The rest of the paper focusses on QCD vacuum polarization in order to compute and display the running coupling constant for QCD at different scales. Through an easy application of the technique called the spectral calculus the densities associated with the quark bubble and the gluon bubble are computed and hence the QCD vacuum polarization function is determined. It is found that the QCD running coupling constant has non-trivial behavior particularly at the subnuclear level. Asymptotic freedom and quark confinement are proved.


          Profinite groups with pronilpotent centralizers. (arXiv:1809.04462v1 [math.GR])      Cache   Translate Page      

Authors: Pavel Shumyatsky

The article deals with profinite groups in which the centralizers are pronilpotent (CN-groups). It is shown that such groups are virtually pronilpotent. More precisely, let G be a profinite CN-group, and let F be the maximal normal pronilpotent subgroup of G. It is shown that F is open and the structure of the finite quotient G/F is described in detail.


          Arbitrarily Varying Remote Sources. (arXiv:1809.04464v1 [cs.IT])      Cache   Translate Page      

Authors: Amitalok J. Budkuley, Bikash Kumar Dey, Sidharth Jaggi, Vinod M. Prabhakaran

We study a lossy source coding problem for an arbitrarily varying remote source (AVRS) which was proposed in a prior work. An AVRS transmits symbols, each generated in an independent and identically distributed manner, which are sought to be estimated at the decoder. These symbols are remotely generated, and the encoder and decoder observe noise corrupted versions received through a two-output noisy channel. This channel is an arbitrarily varying channel controlled by a jamming adversary. We assume that the adversary knows the coding scheme as well as the source data non-causally, and hence, can employ malicious jamming strategies correlated to them. Our interest lies in studying the rate distortion function for codes with a stochastic encoder, i.e, when the encoder can privately randomize while the decoder is deterministic. We provide upper and lower bounds on this rate distortion function.


          A note on deformations and mutations of fake weighted projective planes. (arXiv:1809.04470v1 [math.AG])      Cache   Translate Page      

Authors: Irem Portakal

It has been shown by Hacking and Prokhorov that if the projective surface X with quotient singularities and self-intersection number 9 has a smoothing to the projective plane, then X is the general fiber of a Q-Gorenstein deformation of the weighted projective plane with weights giving solutions to the Markov equation. This result has been understood and generalized by combinatorial mutations of Fano triangles by Akhtar, Coates, Galkin, and Kasprzyk. In this note, we study this result by utilizing polarized T-varieties and describe the associated deformation explicitly in terms of certain Minkowski summands of so-called divisorial polytopes.


          Analytic solutions of convolution equations on convex sets with a mixed structure. I. (arXiv:1809.04473v1 [math.FA])      Cache   Translate Page      

Authors: S.N. Melikhov, L.V. Khanina

We prove an abstract criterion that a surjective convolution operator in spaces of analytic functions on convex subsets of the complex plane has a continuous linear right inverse. Considered convex sets have a countable neighborhood basis of convex domains. The mentioned criterion is obtained in terms of the existence of a special family of subharmonic functions with global upper bounds and local lower bounds.


          Regularly Varying Random Fields. (arXiv:1809.04477v1 [math.PR])      Cache   Translate Page      

Authors: Lifan Wu, Gennady Samorodnitsky

We study the extremes of multivariate regularly varying random fields. The crucial tools in our study are the tail field and the spectral field, notions that extend the tail and spectral processes of Basrak and Segers (2009). The spatial context requires multiple notions of extremal index, and the tail and spectral fields are applied to clarify these notions and other aspects of extremal clusters. An important application of the techniques we develop is to the Brown-Resnick random fields.


          On the Fractional Landis Conjecture. (arXiv:1809.04480v1 [math.AP])      Cache   Translate Page      

Authors: Angkana Rüland, Jenn-Nan Wang

In this paper we study a Landis-type conjecture for fractional Schr\"odinger equations of fractional power $s\in(0,1)$ with potentials. We discuss both the cases of differentiable and non-differentiable potentials. On the one hand, it turns out for \emph{differentiable} potentials with some a priori bounds, if a solution decays at a rate $e^{-|x|^{1+}}$, then this solution is trivial. On the other hand, for $s\in(1/4,1)$ and merely bounded \emph{non-differentiable} potentials, if a solution decays at a rate $e^{-|x|^\alpha}$ with $\alpha>4s/(4s-1)$, then this solution must again be trivial. Remark that when $s\to 1$, $4s/(4s-1)\to 4/3$ which is the optimal exponent for the standard Laplacian. For the case of non-differential potentials and $s\in(1/4,1)$, we also derive a quantitative estimate mimicking the classical result by Bourgain and Kenig.


          Dynamic Edge Caching with Popularity Drifting. (arXiv:1809.04486v1 [cs.IT])      Cache   Translate Page      

Authors: Linqi Song, Jie Xu

Caching at the network edge devices such as wireless caching stations (WCS) is a key technology in the 5G network. The spatial-temporal diversity of content popularity requires different content to be cached in different WCSs and periodically updated to adapt to temporal changes. In this paper, we study how the popularity drifting speed affects the number of required broadcast transmissions by the MBS and then design coded transmission schemes by leveraging the broadcast advantage under the index coding framework. The key idea is that files already cached in WCSs, which although may be currently unpopular, can serve as side information to facilitate coded broadcast transmission for cache updating. Our algorithm extends existing index coding-based schemes from a single-request scenario to a multiple-request scenario via a "dynamic coloring" approach. Simulation results indicate that a significant bandwidth saving can be achieved by adopting our scheme.


          Bounds on the expected size of the maximum agreement subtree for a given tree shape. (arXiv:1809.04488v1 [math.CO])      Cache   Translate Page      

Authors: Pratik Misra, Seth Sullivant

We show that the expected size of the maximum agreement subtree of two $n$-leaf trees, uniformly random among all trees with the shape, is $\Theta(\sqrt{n})$. To derive the lower bound, we prove a global structural result on a decomposition of rooted binary trees into subgroups of leaves called blobs. To obtain the upper bound, we generalize a first moment argument for random tree distributions that are exchangeable and not necessarily sampling consistent.


          Global classical solutions of 3D compressible viscoelastic system near equilibrium. (arXiv:1809.04490v1 [math.AP])      Cache   Translate Page      

Authors: Yi Zhu

In this paper, we prove the global existence of general small solutions to compressible viscoelastic system. We remove the "initial state" assumption ($\tilde \rho_0 \det F_0 =1$) and the "div-curl" structure assumption compared with previous works. It then broadens the class of solutions to a great extent, more precisely the initial density state would not be constant necessarily, and no more structure is need for global well-posedness. It's quite different from the elasticity system in which structure plays an important role. Since we can not obtain any dissipation information for density and deformation tensor, we introduce a new effective flux in the thought of regarding the wildest "nonlinear term" as "linear term". Although the norms of solution may increase now, we can still derive the global existence for it.


          Homogenization for the Stokes equations in randomly perforated domains under almost minimal assumptions on the size of the holes. (arXiv:1809.04491v1 [math.AP])      Cache   Translate Page      

Authors: Arianna Giunti, Richard M. Höfer

We prove the homogenization to the Brinkman equations for the incompressible Stokes equations in a bounded domain which is perforated by a random collection of small spherical holes. The fluid satisfies a no-slip boundary condition at the holes. The balls generating the holes have centres distributed according to a Poisson point process and i.i.d. unbounded radii satisfying a suitable moment condition. We stress that our assumption on the distribution of the radii does not exclude that, with overwhelming probability, the holes contain clusters made by many overlapping balls. We show that the formation of these clusters has no effect on the limit Brinkman equations. In contrast with the case of the Poisson equation studied in [A.~{Giunti}, R.~{H\"ofer}, and J.J.L. {Vel\'azquez}, \textit{Homogenization for the Poisson equation in randomly perforated domains under minimal assumptions on the size of the holes}], the incompressibility condition requires a more detailed study of the geometry of the random holes generated by the class of probability measures considered.


          The W4 method: a new multi-dimensional root-finding scheme for nonlinear systems of equations. (arXiv:1809.04495v1 [cs.NA])      Cache   Translate Page      

Authors: Hirotada Okawa, Kotaro Fujisawa, Yu Yamamoto, Ryosuke Hirai, Nobutoshi Yasutake, Hiroki Nagakura, Shoichi Yamada

We propose a new class of method for solving nonlinear systems of equations, which, among other things,has four nice features: (i) it is inspired by the mathematical property of damped oscillators, (ii) it can be regarded as a simple extention to the Newton-Raphson(NR) method, (iii) it has the same local convergence as the NR method does, (iv) it has a significantly wider convergence region or the global convergence than that of the NR method. In this article, we present the evidence of these properties, applying our new method to some examples and comparing it with the NR method.


          Compatibility of quantum measurements and inclusion constants for the matrix jewel. (arXiv:1809.04514v1 [quant-ph])      Cache   Translate Page      

Authors: Andreas Bluhm, Ion Nechita

In this work, we establish the connection between the study of free spectrahedra and the compatibility of quantum measurements with an arbitrary number of outcomes. This generalizes previous results by the authors for measurements with two outcomes. Free spectrahedra arise from matricial relaxations of linear matrix inequalities. A particular free spectrahedron which we define in this work is the matrix jewel. We find that compatibility of arbitrary measurements corresponds to inclusion of the matrix jewel into a free spectrahedron defined by the effect operators of the measurements under study. We subsequently use this connection to bound the set of (asymmetric) inclusion constants for the matrix jewel using results from quantum information theory. Among the techniques we employ are approximate quantum cloning and mutually unbiased bases.


          On Zeros and Growth of Solutions of Second Order Linear Differential Equations. (arXiv:1809.04516v1 [math.CV])      Cache   Translate Page      

Authors: Manisha Saini, Sanjay Kumar

For a second order linear differential equation $f''+A(z)f'+B(z)f=0$, with $ A(z)$ and $B(z)$ being transcendental entire functions under some restriction, we have established that all non-trivial solutions are of infinite order. In addition, we have proved that these solutions have infinite number of zeros.


          Kempf-Ness type theorems and Nahm equations. (arXiv:1809.04518v1 [math.AG])      Cache   Translate Page      

Authors: Maxence Mayrand

We prove a version of the affine Kempf-Ness theorem for non-algebraic symplectic structures and shifted moment maps, and use it to describe hyperkahler quotients of T*G, where G is a complex reductive group.


          Steklov Regularization and Trajectory Methods for Univariate Global Optimization. (arXiv:1809.04530v1 [math.OC])      Cache   Translate Page      

Authors: Orhan Arıkan (1), Regina S. Burachik (2), C. Yalçın Kaya (2) ((1) Electrical and Electronics Engineering Department, Bilkent University, Bilkent, Ankara, Turkey, (2) School of Information Technology and Mathematical Sciences, University of South Australia, Mawson Lakes, Australia)

We introduce a new regularization technique, using what we refer to as the Steklov regularization function, and apply this technique to devise an algorithm that computes a global minimizer of univariate coercive functions. First, we show that the Steklov regularization convexifies a given univariate coercive function. Then, by using the regularization parameter as the independent variable, a trajectory is constructed on the surface generated by the Steklov function. For monic quartic polynomials, we prove that this trajectory does generate a global minimizer. In the process, we derive some properties of quartic polynomials. Comparisons are made with a previous approach which uses a quadratic regularization function. We carry out numerical experiments to illustrate the working of the new method on polynomials of various degree as well as a non-polynomial function.


          A coupled bulk-surface model for cell polarisation. (arXiv:1809.04535v1 [q-bio.CB])      Cache   Translate Page      

Authors: Davide Cusseddu, Leah Edelstein-Keshet, John A. Mackenzie, Stéphanie Portet, Anotida Madzvamuse

Several cellular activities, such as directed cell migration, are coordinated by an intricate network of biochemical reactions which lead to a polarised state of the cell, in which cellular symmetry is broken, causing the cell to have a well defined front and back. Recent work on balancing biological complexity with mathematical tractability resulted in the proposal and formulation of a famous minimal model for cell polarisation, known as the wave pinning model. In this study, we present a three-dimensional generalisation of this mathematical framework through the maturing theory of coupled bulk-surface semilinear partial differential equations in which protein compartmentalisation becomes natural. We show how a local perturbation over the surface can trigger propagating reactions, eventually stopped in a stable profile by the interplay with the bulk component. We describe the behavior of the model through asymptotic and local perturbation analysis, in which the role of the geometry is investigated. The bulk-surface finite element method is used to generate numerical simulations over simple and complex geometries, which confirm our analysis, showing pattern formation due to propagation and pinning dynamics. The generality of our mathematical and computational framework allows to study more complex biochemical reactions and biomechanical properties associated with cell polarisation in multi-dimensions.


          Poisson brackets after Jacobi and Plucker. (arXiv:1809.04538v1 [math-ph])      Cache   Translate Page      

Authors: Pantelis A. Damianou

We construct a symplectic realization and a bi-hamiltonian formulation of a 3-dimensional system whose solution are the Jacobi elliptic functions. We generalize this system and the related Poisson brackets to higher dimensions. These more general systems are parametrized by lines in 3-dimensional projective space. For these systems the Jacobi identity is satisfied only when the Plucker relations hold. Two of these Poisson brackets are compatible only if the corresponding lines in projective space intersect. We present several examples of such systems.


          Lugsail lag windows and their application to MCMC. (arXiv:1809.04541v1 [stat.CO])      Cache   Translate Page      

Authors: Dootika Vats, James M. Flegal

Lag windows are commonly used in the time series, steady state simulation, and Markov chain Monte Carlo literature to estimate the long range variances of estimators arising from correlated data. We propose a new lugsail lag window specifically designed for improved finite sample performance. We use this lag window for batch means and spectral variance estimators in Markov chain Monte Carlo simulations to obtain strongly consistent estimators that are biased from above in finite samples and asymptotically unbiased. This quality is particularly useful when calculating effective sample size and using sequential stopping rules where they help avoid premature termination. Further, we calculate the bias and variance of lugsail estimators and demonstrate that there is little loss compared to other estimators. We also show mean square consistency of these estimators under weak conditions. Finite sample properties of lugsail estimators are studied in various examples.


          Propagation of Moments and Semiclassical Limit from Hartree to Vlasov Equation. (arXiv:1809.04544v1 [math.AP])      Cache   Translate Page      

Authors: Laurent Lafleche

In this paper, we prove a quantitative version of the semiclassical limit from the Hartree to the Vlasov equation with singular interaction, including the Coulomb potential. To reach this objective, we also prove the propagation of velocity moments and weighted Schatten norms which implies the boundedness of the space density of particles uniformly in the Planck constant.


          Classification of Simple Cuspidal Modules over a Lattice Lie Algebra of Witt type. (arXiv:1809.04548v1 [math.RT])      Cache   Translate Page      

Authors: Yuly Billig, Kenji Iohara

Let $W_\pi$ be the lattice Lie algebra of Witt type associated with an additive inclusion $\pi: \mathbb{Z}^N \hookrightarrow \mathbb{C}^2$ with $N>1$. In this article, the classification of simple $\mathbb{Z}^N$-graded $W_\pi$-modules, whose multiplicities are uniformly bounded, is given.


          A rapid and well-conditioned algorithm for the Helmholtz--Hodge decomposition of vector fields on the sphere. (arXiv:1809.04555v1 [math.NA])      Cache   Translate Page      

Authors: Julien Molina, Richard Mikael Slevinsky

A rapid algorithm is derived for the Helmholtz--Hodge decomposition on the surface of the sphere in spherical coordinates. The algorithm uncouples modes of spherical harmonics with different absolute order, writes the conversion as barely-overdetermined banded linear systems, and solves them with banded $QR$ decompositions that factor and execute in optimal complexity. Rigorous upper bounds on the $2$-norm relative condition number of the banded linear systems support the observable low error growth with respect to truncation degree.


          Optimization-Based Bound Tightening using a Strengthened QC-Relaxation of the Optimal Power Flow Problem. (arXiv:1809.04565v1 [math.OC])      Cache   Translate Page      

Authors: Kaarthik Sundar, Harsha Nagarajan, Sidhant Misra, Mowen Lu, Carleton Coffrin, Russell Bent

This article develops a strengthened convex quadratic convex (QC) relaxation of the AC Optimal Power Flow (AC-OPF) problem and presents an optimization-based bound-tightening (OBBT) algorithm to compute tight, feasible bounds on the voltage magnitude variables for each bus and the phase angle difference variables for each branch in the network. Theoretical properties of the strengthened QC relaxation that show its dominance over the other variants of the QC relaxation studied in the literature are also derived. The effectiveness of the strengthened QC relaxation is corroborated via extensive numerical results on benchmark AC-OPF test networks. In particular, the results demonstrate that the proposed relaxation consistently provides the tightest variable bounds and optimality gaps with negligible impacts on runtime performance.


          Stable and Unstable Vortex Knots in Excitable Media. (arXiv:1809.04567v1 [nlin.PS])      Cache   Translate Page      

Authors: Jack Binysh, Carl A. Whitfield, Gareth P. Alexander

We study the dynamics of knotted vortices in a bulk excitable medium using the FitzHugh-Nagumo model. From a systematic survey of all knots of at most eight crossings we establish that the generic behaviour is of unsteady, irregular dynamics, with prolonged periods of expansion of parts of the vortex. The mechanism for the length expansion is a long-range `wave slapping' interaction, analogous to that responsible for the annihilation of small vortex rings by larger ones. We also show that there are stable vortex geometries for certain knots; in addition to the unknot, trefoil and figure eight knots reported previously, we have found stable examples of the Whitehead link and $6_2$ knot. We give a thorough characterisation of their geometry and steady state motion. For the unknot, trefoil and figure eight knots we greatly expand previous evidence that FitzHugh-Nagumo dynamics untangles initially complex geometries while preserving topology.


          On the uniform generation of random derangements. (arXiv:1809.04571v1 [stat.CO])      Cache   Translate Page      

Authors: J. R. G. Mendonça

We show how to generate random derangements with the expected distribution of cycle lengths by two different techniques: random restricted transpositions and sequential importance sampling. The algorithms are simple to understand and implement and possess a performance comparable with those of currently known methods. We measure the mixing time (in the chi-square distance) of the randomized algorithm and our data indicate that $\tau_{\mathrm{mix}} \sim O(n\log{n})$, where $n$ is the size of the derangement. The sequential importance sampling algorithm generates random derangements uniformly in ${O}(n)$ time but with a small probability ${O}(1/n)$ of failing.


          Edge universality of separable covariance matrices. (arXiv:1809.04572v1 [math.PR])      Cache   Translate Page      

Authors: Fan Yang

In this paper, we prove the edge universality of largest eigenvalues for separable covariance matrices of the form $\mathcal Q :=A^{1/2}XBX^*A^{1/2}$. Here $X=(x_{ij})$ is an $n\times N$ random matrix with $x_{ij}=N^{-1/2}q_{ij}$, where $q_{ij}$ are $i.i.d.$ random variables with zero mean and unit variance, and $A$ and $B$ are respectively $n \times n$ and $N\times N$ deterministic non-negative definite symmetric (or Hermitian) matrices. We consider the high-dimensional case, i.e. ${n}/{N}\to d \in (0, \infty)$ as $N\to \infty$. Assuming $\mathbb E q_{ij}^3=0$ and some mild conditions on $A$ and $B$, we prove that the limiting distribution of the largest eigenvalue of $\mathcal Q$ coincide with that of the corresponding Gaussian ensemble (i.e. the $\mathcal Q$ with $X$ being an $i.i.d.$ Gaussian matrix) as long as we have $\lim_{s \rightarrow \infty}s^4 \mathbb{P}(\vert q_{ij} \vert \geq s)=0$, which is a sharp moment condition for edge universality. If we take $B=I$, then $\mathcal Q$ becomes the normal sample covariance matrix and the edge universality holds true without the vanishing third moment condition. So far, this is the strongest edge universality result for sample covariance matrices with correlated data (i.e. non-diagonal $A$) and heavy tails, which improves the previous results in \cite{BPZ1,LS} (assuming high moments and diagonal $A$), \cite{Anisotropic} (assuming high moments) and \cite{DY} (assuming diagonal $A$).


          Rainbow numbers for $x_1+x_2=kx_3$ in $\mathbb{Z}_n$. (arXiv:1809.04576v1 [math.CO])      Cache   Translate Page      

Authors: Erin Bevilacqua, Samuel King, Jürgen Kritschgau, Michael Tait, Suzannah Tebon, Michael Young

In this work, we investigate the fewest number of colors needed to guarantee a rainbow solution to the equation $x_1 + x_2 = k x_3$ in $\mathbb{Z}_n$. This value is called the Rainbow number and is denoted by $rb(\mathbb{Z}_n, k)$ for positive integer values of $n$ and $k$. We find that $rb(\mathbb{Z}_p, 1) = 4$ for all primes greater than $3$ and that $rb(\mathbb{Z}_n, 1)$ can be deterimined from the prime factorization of $n$. Furthermore, when $k$ is prime, $rb(\mathbb{Z}_n, k)$ can be determined from the prime factorization of $n$.


          A Short Note on a Weighed Friedrich's Inequality. (arXiv:1809.04577v1 [math.AP])      Cache   Translate Page      

Authors: Immanuel Anjam, Dirk Pauly

In this short note we derive an upper bound for a Friedrich's type constant in a weighed Friedrich's type inequality. This upper bound generalizes a well known upper bound of the Friedrich's constant. We apply the derived upper bound in a posteriori error estimation for an elliptic problem.


          Distorting an Adversary's View in Cyber-Physical Systems. (arXiv:1809.04580v1 [cs.IT])      Cache   Translate Page      

Authors: Gaurav Kumar Agarwal, Mohammed Karmoose, Suhas Diggavi, Christina Fragouli, Paulo Tabuada

In Cyber-Physical Systems (CPSs), inference based on communicated data is of critical significance as it can be used to manipulate or damage the control operations by adversaries. This calls for efficient mechanisms for secure transmission of data since control systems are becoming increasingly distributed over larger geographical areas. Distortion based security, recently proposed as one candidate for CPSs security, is not only more appropriate for these applications but also quite frugal in terms of prior requirements on shared keys. In this paper, we propose distortion-based metrics to protect CPSs communication and show that it is possible to confuse adversaries with just a few bits of pre-shared keys.


          The Bernstein problem for Lipschitz intrinsic graphs in the Heisenberg group. (arXiv:1809.04586v1 [math.DG])      Cache   Translate Page      

Authors: Sebastiano Nicolussi, Francesco Serra Cassano

We prove that, in the first Heisenberg group $\mathbb{H}$, an entire locally Lipschitz intrinsic graph admitting vanishing first variation of its sub-Riemannian area and non-negative second variation must be an intrinsic plane, i.e., a coset of a two dimensional subgroup of $\mathbb{H}$. Moreover two examples are given for stressing result's sharpness.


          Distributed Chernoff Test: Optimal decision systems over networks. (arXiv:1809.04587v1 [stat.ME])      Cache   Translate Page      

Authors: Anshuka Rangi, Massimo Franceschetti, Stefano Marano

In this work, we propose two different sequential and adaptive hypothesis tests, motivated from classic Chernoff's test, for both decentralized and distributed setup of sensor networks. In the former setup, the sensors can communicate via central entity i.e. fusion center. On the other hand, in the latter setup, sensors are connected via communication link, and no central entity is present to facilitate the communication. We compare the performance of these tests with the optimal consistent sequential test in the sensor network. In decentralized setup, the proposed test achieves the same asymptotic optimality of the classic one, minimizing the expected cost required to reach a decision plus the expected cost of making a wrong decision, when the observation cost per unit time tends to zero. This test is also asymptotic optimal in the higher moments of decision time. The proposed test is parsimonious in terms of communications as the expected number of channel uses required by each sensor, in the regime of vanishing observation cost per unit time, to complete the test converges to four.In distributed setup, the proposed test is evaluated on the same performance measures as the test in decentralized setup. We also provide sufficient conditions for which the proposed test in distributed setup also achieves the same asymptotic optimality as the classic one. Like the proposed test in decentralized setup, under these sufficient conditions, the proposed test in distributed setup is also asymptotic optimal in the higher moments of time required to reach a decision in the sensor network. This test is parsimonious is terms of communications in comparison to the state of art schemes proposed in the literature for distributed hypothesis testing.


          Closed geodesics on connected sums and 3-manifolds. (arXiv:1809.04588v1 [math.DG])      Cache   Translate Page      

Authors: Hans-Bert Rademacher, Iskander A. Taimanov

We study the asymptotics of the number N(t) of geometrically distinct closed geodesics of a Riemannian or Finsler metric on a connected sum of two compact manifolds of dimension at least three with non-trivial fundamental groups and apply this result to the prime decomposition of a three-manifold. In particular we show that the function N(t) grows at least like the prime numbers on a compact 3-manifold with infinite fundamental group. It follows that a generic Riemannian metric on a compact 3-manifold has infinitely many geometrically distinct closed geodesics. We also consider the case of a connected sum of a compact manifold with positive first Betti number and a simply-connected manifold which is not homeomorphic to a sphere.


          Topological Transformation Monoids. (arXiv:1809.04590v1 [math.GR])      Cache   Translate Page      

Authors: Z. Mesyan, J. D. Mitchell, Y. H. Péresse

We investigate semigroup topologies on the full transformation monoid T(X) of an infinite set X. We show that the standard pointwise topology is the weakest Hausdorff semigroup topology on T(X), show that the pointwise topology is the unique Hausdorff semigroup topology on T(X) that induces the pointwise topology on the group of all permutations of X, and construct |X| distinct Hausdorff semigroup topologies on T(X). We also show that every separable semigroup topology on T(X) is perfect, describe the compact sets in an arbitrary Hausdorff semigroup topology on T(X), and show that there are no locally compact Polish semigroup topologies on T(X), among other results.


          On a Diophantine equation with five prime variables. (arXiv:1809.04591v1 [math.NT])      Cache   Translate Page      

Authors: Min Zhang, Jinjiang Li

Let $[x]$ denote the integral part of the real number $x$, and $N$ be a sufficiently large integer. In this paper, it is proved that, for $1<c<\frac{11216182}{5471123}, c\not=2$, the Diophantine equation $N=[p_1^c]+[p_2^c]+[p_3^c]+[p_4^c]+[p_5^c]$ is solvable in prime variables $p_1,p_2,p_3,p_4,p_5$.


          Hitchin's equations on a nonorientable manifold. (arXiv:1211.0746v3 [math.DG] UPDATED)      Cache   Translate Page      

Authors: Nan-Kuo Ho, Graeme Wilkin, Siye Wu

We define Hitchin's moduli space for a principal bundle $P$, whose structure group is a compact semisimple Lie group $K$, over a compact non-orientable Riemannian manifold $M$. We use the Donaldson-Corlette correspondence, which identifies Hitchin's moduli space with the moduli space of flat $K^\mathbb{C}$-connections, which remains valid when M is non-orientable. This enables us to study Hitchin's moduli space both by gauge theoretical methods and algebraically by using representation varieties. If the orientable double cover $\tilde{M}$ of $M$ is a K\"ahler manifold with odd complex dimension and if the K\"ahler form is odd under the non-trivial deck transformation on $\tilde{M}$, Hitchin's moduli space of the pull-back bundle $\tilde{P}$ over $\tilde{M}$ has a hyper-K\"ahler structure and admits an involution induced by the deck transformation. The fixed-point set is symplectic or Lagrangian with respect to various symplectic structures on Hitchin's moduli space over $\tilde{M}$. We show that there is a local diffeomorphism from Hitchin's moduli space over (the nonorientable manifold) $M$ to the fixed point set of the Hitchin's moduli space over (its orientable double cover) $\tilde{M}$. We compare the gauge theoretical constructions with the algebraic approach using representation varieties.


          Sandpile models. (arXiv:1401.0354v3 [math.PR] UPDATED)      Cache   Translate Page      

Authors: Antal A. Járai

This survey is an extended version of lectures given at the Cornell Probability Summer School 2013. The fundamental facts about the Abelian sandpile model on a finite graph and its connections to related models are presented. We discuss exactly computable results via Majumdar and Dhar's method. The main ideas of Priezzhev's computation of the height probabilities in 2D are also presented, including explicit error estimates involved in passing to the limit of the infinite lattice. We also discuss various questions arising on infinite graphs, such as convergence to a sandpile measure, and stabilizability of infinite configurations.


          Construction of Capacity-Achieving Lattice Codes: Polar Lattices. (arXiv:1411.0187v5 [cs.IT] UPDATED)