lr Multisemigroups and Modal Convolution Algebras

We show how modal quantales arise as convolution algebras of functions fromlr-multisemigroups . The class generalises Schweizer and Sklar’s function systems and object-free categories . We also discuss how these results can be combined with previous ones for concurrent quantales andgeneralised to a setting that supports reasoning with stochastic matrices orprobabilistic predicate transformers.…

t Entropy A New Measure of Uncertainty with SomeApplications

The concept of Entropy plays a key role in Information Theory, Statistics,and Machine Learning . This paper introduces a new entropy measure, called thet-entropy, which exploits the concavity of the inverse-tan function . We also propose theentropic-loss as a measure of the divergence between two probability distributions, which leads to robust estimators in the context of parametricstatistical inference .…

Asymptotic behavior of fronts and pulses of the bidomain model

The bidomain model is the standard model for cardiac electrophysiology . In this paper, we investigate the instability and asymptotic behavior of planarfronts and planar pulses . We find that, afterthe planar front is destabilized, a rotating zigzag front develops whose shape can be explained by simple geometric arguments using a suitable Frank diagram .…

Waypoint Planning Networks

Waypoint planning networks (WPN) is a hybrid algorithm based on LSTMs with alocal kernel – a classic algorithm such as A* . WPN produces a more computationally efficient and robust solution . It is shown that WPN’s search space is considerably less than A* while being able to generate near optimal results.…

Perfect Forests in Graphs and Their Extensions

Scott (2001) showed that every connected graph witheven number of vertices contains a (proper) 0-perfect forest . We prove that for a prescribed edge $e$ of $G,$ it is NP-hard to obtain a0-perfect . forest containing $e,$ but we can find a 0-Perfect forest notcontaining $e in polynomial time .…

Blockchain Based Decentralized Energy Management Platform for Residential Distributed Energy Resources in A Virtual Power Plant

The advent of distributed energy resources (DERs), such as distributedrenewables, energy storage, electric vehicles, and controllable loads, is a significantly disruptive and transformational impact on the centralized power system . Virtual power plant emerges as a promisingparadigm for managing DERs to participate in the power system, says the authors .…

Certifying Emergency Landing for Safe Urban UAV

Unmanned Aerial Vehicles (UAVs) have the potential to be used for many applications in urban environments . However, allowing UAVs to fly above denselypopulated areas raises concerns regarding safety . A failure to cause the loss of navigation capabilities can result in the UAV falling/landing in hazardous areas such as busyroads, where it can cause fatal accidents .…

Cross Modal Music Video Recommendation A Study of Design Choices

In this work, webuild upon a recent video-music retrieval system (the VM-NET), which originallyrelies on an audio representation obtained by a set of statistics computed overhandcrafted features . We demonstrate that using audio representationlearning such as the audio embeddings provided by the pre-trained MuSimNet,OpenL3, MusicCNN or by AudioSet, largely improves recommendations .…

Non Deterministic Functions as Non Deterministic Processes Extended Version

We study encodings of the lambdafail into the pi-calculus in the case of calculi with non-determinism and failures . Ourencoding precisely explains the interplay of non-Deterministic and fail-proneevaluation in lambfafail via typed processes in spi . In particular, it showshow failures in sequential evaluation (absence/excess of resources) can beneatly codified as interaction protocols .…

An integration by parts formula for the bilinear form of the hypersingular boundary integral operator for the transient heat equation in three spatial dimensions

An integration by parts formula for the transient heat equation in three spatial dimensions is available in the literature, but a proof of this formula seems to be missing . The available formula contains anintegral term including the time derivative of the fundamental solution of the heat equation, whose interpretation is difficult at second glance .…

Self Dimensioning and Planning of Small Cell Capacity in Multitenant 5G Networks

An important concept in the fifth generation of mobile networks ismultitenancy, which allows diverse operators sharing the same wireless infrastructure . This paper proposes a new framework for automated cell planning in multitenant small cell networks . The simulation results show the effectiveness of various methods to derive the planning specifications depending on the correlation between the tenant’s and network’s traffic demands .…

Cybersecurity in Power Grids Challenges and Opportunities

Increasing volatilities within power transmission and distribution force power grid operators to amplify their use of communication infrastructure to monitor and control their grid . The resulting increase in communication creates a larger attack surface for malicious actors . Cyber attacks on powergrids have already succeeded in causing temporary, large-scale blackouts in therecent past .…

On the Computation of PSNR for a Set of Images or Video

When comparing learned image/video restoration and compression methods, it iscommon to report peak-signal to noise ratio (PSNR) results . However, there doesnot exist a generally agreed upon practice to compute PSNR for sets of imagesor video . Some authors report average of individual image/frame PSNR, which is equivalent to computing PSNR from geometric mean of individualimage/frame mean-square error (MSE) Others compute a single PSNR of Y-channel only, while others compute MSE/PSNR for RGB channels .…

Analyzing Semantics of Aggregate Answer Set Programming Using Approximation Fixpoint Theory

Aggregates provide a concise way to express complex knowledge . Formalizing aggregates for answer set programming has proven to be challenging . We show that ternary satisfactionrelations bridge the gap between the standard Gelfond-Lifschitz reduct, and stable semantics as defined in the framework of ApproximationFixpoint Theory (AFT) We also show how different methods for handling aggregates taken from the literature can be described in terms of the framework and we study the corresponding Ternary Satisfaction Relations .…

Technology Report Robotic Localization and Navigation System for Visible Light Positioning and SLAM

Visible light positioning (VLP) technology is a promising technique as it can provide high accuracy positioning based on the existing lighting infrastructure . The efficacy of the proposed scheme is verified by extensivereal-time experiment 1 . The results show that our proposed scheme can provide an average accuracy of 2 cm and the average computational time in low-costembedded platforms is around 50 ms .…

Multi Structural Games and Number of Quantifiers

We study multi-structural games, played on two sets of structures . These games generalize Ehrenfeucht-Fra\”{i}ss\'{e} games . We use these games to give a completecharacterization of the number of quantifiers required to distinguish linearorders of different sizes . We also develop machinery for analyzing structures beyond linear orders .…

Graph Aware Evolutionary Algorithms for Influence Maximization

Social networks represent nowadays in many contexts the main source of information transmission and the way opinions and actions are influenced . Modern marketing often involves paying some targeted users, or influencers, for advertising products or ideas . Find the set of nodes in a social network that lead to the highestinformation spread — the so-called Influence Maximization (IM) problem — is a pressing question and as such it has recently attracted a greatresearch interest .…

Tracking and managing deemed abilities

A basic model can be thought of as the ongoing trace of a multi-agent system . Every state records systemic confirmations and disconfirmations of whether an acting entity is able to bring about something . Qualitative inductive reasoning is then used in order to infer what actingentities are deemed able to do .…

Safety Control of Mobile Robots Under Time Delay Using Barrier Certificates and a Two Layer Predictor

The proposed solution includes a two-layerpredictor to compensate for the time-delay in the servo-system and anglecontrol loops . Barrier certificates are used to determine the safe range of the robot’s heading angle to avoid collisions . The proposed method accommodates multiple obstacles anddecouples the control structure from the obstacles’ shape, count, and distribution .…

LightIoT Lightweight and Secure Communication for Energy Efficient IoT in Health Informatics

Internet of Things (IoT) is considered as a key enabler of healthinformatics . IoT-enabled devices are used for in-hospital and in-home patientmonitoring to collect and transfer biomedical data pertaining to bloodpressure, electrocardiography (ECG), blood sugar levels, body temperature, etc. These devices generate data in real-time and transmitthem to nearby gateways and remote servers for processing and visualization .…

Graph theoretic algorithms for Kolmogorov operators Approximating solutions and their gradients in elliptic and parabolic problems on manifolds

We employ kernel-based approaches that use samples from a probability distribution to approximate a Kolmogorov operator on a manifold . We also employ an efficient $k$-$d$ tree algorithm to compute the sparse kernel matrix, which is a computational bottleneck . These methods only require samples from the underlying distribution and, therefore, can be applied on high dimensions or on geometrically complex manifolds when spatialdiscretizations are not available .…

A note on a PDE approach to option pricing under xVA

In this paper we study partial differential equations (PDEs) that can be used to model value adjustments . Different value adjustments are nowadays added to the risk-free financial derivative values . The aim of this paper is to show howto solve the PDE analytically in the Black-Scholes setting to get newsemi-closed formulas that we compare to the widely used Monte-Carlo simulations .…

Reservoir Stack Machines

Memory-augmented neural networks are notoriously hard to train, requiring many backpropagation epochs and a lot of data . In this paper, we introduce the reservoir stack machine, amodel which can provably recognize all deterministic context-free languages . We validate the reservoirstack machine against deep and shallow networks from the literature on threebenchmark tasks for Neural Turing machines and six deterministic .…

An augmented Lagrangian preconditioner for the magnetohydrodynamics equations at high Reynolds and coupling numbers

The magnetohydrodynamics (MHD) equations are generally known to be difficult to solve numerically . We present a scalableaugmented Lagrangian preconditioner for a finite element discretization of the incompressible viscoresistive MHDequations . For stationary problems, our solver achieves robust performance withrespect to the Reynolds and coupling numbers in two dimensions and good results in three dimensions .…

DriveGAN Towards a Controllable High Quality Neural Simulation

Realistic simulators are critical for training and verifying roboticssystems . DriveGAN is a novel high-quality neural simulator called DriveGAN thatachieves controllability by disentangling different components withoutsupervision . It also includes controls for sampling features of a scene, such as the weather as well as the location of non-player objects .…