We show how modal quantales arise as convolution algebras of functions fromlr-multisemigroups . The class generalises Schweizer and Sklar’s function systems and object-free categories . We also discuss how these results can be combined with previous ones for concurrent quantales andgeneralised to a setting that supports reasoning with stochastic matrices orprobabilistic predicate transformers.…

## t Entropy A New Measure of Uncertainty with SomeApplications

The concept of Entropy plays a key role in Information Theory, Statistics,and Machine Learning . This paper introduces a new entropy measure, called thet-entropy, which exploits the concavity of the inverse-tan function . We also propose theentropic-loss as a measure of the divergence between two probability distributions, which leads to robust estimators in the context of parametricstatistical inference .…

## Asymptotic behavior of fronts and pulses of the bidomain model

The bidomain model is the standard model for cardiac electrophysiology . In this paper, we investigate the instability and asymptotic behavior of planarfronts and planar pulses . We find that, afterthe planar front is destabilized, a rotating zigzag front develops whose shape can be explained by simple geometric arguments using a suitable Frank diagram .…

## Most Expected Winner An Interpretation of Winners over Uncertain Voter Preferences

It remains an open question how to determine the winner of an election given incomplete or uncertain voter preferences . One solution is to assume someprobability space for the voting profile and declare the candidates having the best chance of winning to be the (co-)winners .…

## Waypoint Planning Networks

Waypoint planning networks (WPN) is a hybrid algorithm based on LSTMs with alocal kernel – a classic algorithm such as A* . WPN produces a more computationally efficient and robust solution . It is shown that WPN’s search space is considerably less than A* while being able to generate near optimal results.…

## High accuracy time discretization of stochastic fractional diffusion equation

A high-accuracy time discretization is discussed to numerically solve thenonlinear fractional diffusion equation forced by a space-time white noise . The solution of the equation is onlyH\”older continuous in time, which is disadvantageous to improve the temporal convergence rate . The scheme can improve the convergence rate from ${\min\{\frac{\gamma}{2\alpha}.\frac{1}{2}$…

## MRCBert A Machine Reading ComprehensionApproach for Unsupervised Summarization

MRCBert is a novel unsupervised method to generate summaries from product reviews . We leverage Machine Reading Comprehension, i.e. MRC, approach to extract relevant opinions and generate both rating-wise and aspect-wisesummaries . We demonstrated our results on reviews of a product from the Electronics category in the AmazonReviews dataset .…

## Detecting Deletions and Insertions in Concatenated Strings with Optimal Redundancy

We study codes that can detect the exact number of deletions and insertions in concatenated binary strings . We construct optimal codes for the case ofdetecting up to $2$ insertions . We prove the optimality of these codes by . proving that the redundancy of our codes isasymptotically optimal in .…

## A Single Layer Asymmetric RNN Potential Low Hardware Complexity Linear Equation Solver

A single layer neural network for the solution of linear equations is presented . The proposed circuit is based on the standard Hopfield model . The interconnection weight matrix need not besymmetric . This results in an asymmetric Hopfield neural network capable of solving linear equations .…

## Perfect Forests in Graphs and Their Extensions

Scott (2001) showed that every connected graph witheven number of vertices contains a (proper) 0-perfect forest . We prove that for a prescribed edge $e$ of $G,$ it is NP-hard to obtain a0-perfect . forest containing $e,$ but we can find a 0-Perfect forest notcontaining $e in polynomial time .…

## Blockchain Based Decentralized Energy Management Platform for Residential Distributed Energy Resources in A Virtual Power Plant

The advent of distributed energy resources (DERs), such as distributedrenewables, energy storage, electric vehicles, and controllable loads, is a significantly disruptive and transformational impact on the centralized power system . Virtual power plant emerges as a promisingparadigm for managing DERs to participate in the power system, says the authors .…

## QoS Aware Placement of Deep Learning Services on the Edge with Multiple Service Implementations

Mobile edge computing pushes computationally-intensive services closer to the user to provide reduced delay due to physical proximity . This has led many toconsider deploying deep learning models on the edge — commonly known as edgeintelligence (EI) EI services can have many model implementations that providedifferent QoS.…

## User centric Cell free Massive MIMO Networks A Survey of Opportunities Challenges and Solutions

Densification of network base stations is indispensable to achieve the Quality of Service (QoS) requirements of future mobile networks . With a dense deployment of transmitters, interference management becomes an arduous task. To solve this issue, exploring radically new networkarchitectures with intelligent coordination and cooperation capabilities iscrucial.…

## On a linear stability issue of split form schemes for compressible flows

Split form schemes for Euler and Navier-Stokes equations are useful forcomputation of turbulent flows due to their better robustness . This is becausethey satisfy additional conservation properties of the governing equations likekinetic energy preservation leading to a reduction in aliasing errors at high orders .…

## Tableau based decision procedure for non Fregean logic of sentential identity

Sentential Calculus with Identity (SCI) is an extension of classicalpropositional logic, featuring a new connective of identity between formulas . In SCI two formulas are said to be identical if they share the same denotation . In the semantics of the logic, truth values are distinguished from denotations,hence the identity connective is stronger than classical equivalence .…

## Certifying Emergency Landing for Safe Urban UAV

Unmanned Aerial Vehicles (UAVs) have the potential to be used for many applications in urban environments . However, allowing UAVs to fly above denselypopulated areas raises concerns regarding safety . A failure to cause the loss of navigation capabilities can result in the UAV falling/landing in hazardous areas such as busyroads, where it can cause fatal accidents .…

## Cross Modal Music Video Recommendation A Study of Design Choices

In this work, webuild upon a recent video-music retrieval system (the VM-NET), which originallyrelies on an audio representation obtained by a set of statistics computed overhandcrafted features . We demonstrate that using audio representationlearning such as the audio embeddings provided by the pre-trained MuSimNet,OpenL3, MusicCNN or by AudioSet, largely improves recommendations .…

## A Review on Bio Cyber Interfaces for Intrabody Molecular Communications Systems

Recent advancements in bio-engineering and wireless communications have motivated researchers to propose novel applications for telemedicine, therapeutics and human health monitoring . This technology can be furtherextended to use Bio-Nano devices to promote a real-time monitoring of the human health and storage of the gathered data in the cloud .…

## Non Deterministic Functions as Non Deterministic Processes Extended Version

We study encodings of the lambdafail into the pi-calculus in the case of calculi with non-determinism and failures . Ourencoding precisely explains the interplay of non-Deterministic and fail-proneevaluation in lambfafail via typed processes in spi . In particular, it showshow failures in sequential evaluation (absence/excess of resources) can beneatly codified as interaction protocols .…

## Super Odometry IMU centric LiDAR Visual Inertial Estimator for Challenging Environments

We propose Super Odometry, a high-precision multi-modal sensor fusion framework . The proposed system was deployed on drones and groundrobots, as part of Team Explorer’s effort to the DARPA Subterranean Challengewhere the team won $1,000st and $2.2nd place in the Tunnel and UrbanCircuits, respectively.…

## A Novel Approximate Hamming Weight Computing for Spiking Neural Networks an FPGA Friendly Architecture

Hamming weights of sparse and long binary vectors are important modules in scientific applications, particularly in spiking neural networks that areof our interest . We propose a method inspired from synaptic transmissionfailure for exploiting FPGA lookup tables to compress long input vectors .…

## ICOS Efficient and Highly Robust Point Cloud Registration with Correspondences

ICOS (Inlier searching usingCOmpatible Structures) is a novel, efficient and highly robust solution for the point cloud registration problem . ICOS is fast, accurate, robust against as many as 99% outliers with nearly 100% recall ratio of inlierswhether the scale is known or unknown, outperforming other state-of-the-art methods .…

## Tensor Random Projection for Low Memory Dimension Reduction

Random projections reduce the dimension of a set of vectors while preservingstructural information, such as distances between vectors in the set . This paper proposes a novel use of row-product random matrices in random projection . It requires substantially less memory than existing dimension reduction maps .…

## Decentralized Swarm Collision Avoidance for Quadrotors via End to End Reinforcement Learning

Collision avoidance algorithms are of central interest to many drone applications . In particular, decentralized approaches may be the key to enabling robust drone swarm solutions . By applying ageneral reinforcement learning approach, we propose a holistic learning-based approach to integrating collision avoidance with various tasks and dynamics .…

## An integration by parts formula for the bilinear form of the hypersingular boundary integral operator for the transient heat equation in three spatial dimensions

An integration by parts formula for the transient heat equation in three spatial dimensions is available in the literature, but a proof of this formula seems to be missing . The available formula contains anintegral term including the time derivative of the fundamental solution of the heat equation, whose interpretation is difficult at second glance .…

## Self Dimensioning and Planning of Small Cell Capacity in Multitenant 5G Networks

An important concept in the fifth generation of mobile networks ismultitenancy, which allows diverse operators sharing the same wireless infrastructure . This paper proposes a new framework for automated cell planning in multitenant small cell networks . The simulation results show the effectiveness of various methods to derive the planning specifications depending on the correlation between the tenant’s and network’s traffic demands .…

## Unique Ergodicity in the Interconnections of Ensembles with Applications to Two Sided Markets

In a general discrete-time feedback model, we show conditions that assure that for each agent, there exists the limit of along-run average allocation of a resource to the agent . We call this property the unique ergodicity . Our model encompasses two-sided markets and more complicated interconnectionsof workers and customers, such as in a supply chain .…

## Cybersecurity in Power Grids Challenges and Opportunities

Increasing volatilities within power transmission and distribution force power grid operators to amplify their use of communication infrastructure to monitor and control their grid . The resulting increase in communication creates a larger attack surface for malicious actors . Cyber attacks on powergrids have already succeeded in causing temporary, large-scale blackouts in therecent past .…

## On the Computation of PSNR for a Set of Images or Video

When comparing learned image/video restoration and compression methods, it iscommon to report peak-signal to noise ratio (PSNR) results . However, there doesnot exist a generally agreed upon practice to compute PSNR for sets of imagesor video . Some authors report average of individual image/frame PSNR, which is equivalent to computing PSNR from geometric mean of individualimage/frame mean-square error (MSE) Others compute a single PSNR of Y-channel only, while others compute MSE/PSNR for RGB channels .…

## Analyzing Semantics of Aggregate Answer Set Programming Using Approximation Fixpoint Theory

Aggregates provide a concise way to express complex knowledge . Formalizing aggregates for answer set programming has proven to be challenging . We show that ternary satisfactionrelations bridge the gap between the standard Gelfond-Lifschitz reduct, and stable semantics as defined in the framework of ApproximationFixpoint Theory (AFT) We also show how different methods for handling aggregates taken from the literature can be described in terms of the framework and we study the corresponding Ternary Satisfaction Relations .…

## Design and analysis of the Extended Hybrid High Order method for the Poisson problem

We propose an Extended Hybrid High-Order scheme for the Poisson problem with weak singularities . The method is formulated by enriching the local polynomial spaces with appropriatesingular functions . Via a detailed error analysis, the method is shown toconverge optimally in both discrete and continuous energy norms .…

## Technology Report Robotic Localization and Navigation System for Visible Light Positioning and SLAM

Visible light positioning (VLP) technology is a promising technique as it can provide high accuracy positioning based on the existing lighting infrastructure . The efficacy of the proposed scheme is verified by extensivereal-time experiment 1 . The results show that our proposed scheme can provide an average accuracy of 2 cm and the average computational time in low-costembedded platforms is around 50 ms .…

## On Numerical approximations of fractional and nonlocal Mean Field Games

We construct numerical approximations for Mean Field Games with fractional or nonlocal diffusions . The methods are monotone, stable, and consistent . We prove convergence along subsequences for (i) degenerate equations in onespace dimension and (ii) nondegenerate . equations in arbitrary dimensions .…

## Multi Structural Games and Number of Quantifiers

We study multi-structural games, played on two sets of structures . These games generalize Ehrenfeucht-Fra\”{i}ss\'{e} games . We use these games to give a completecharacterization of the number of quantifiers required to distinguish linearorders of different sizes . We also develop machinery for analyzing structures beyond linear orders .…

## A string averaging method based on strictly quasi nonexpansive operators with generalized relaxation

Fixed point iterative method is assembled byaveraging of strings, and each string is composed of finitely many strictlyquasi-nonexpansive operators . We examine a wide class ofiterative methods for solving linear systems of equations (inequalities) and the subgradient projection method for solving nonlinear convex feasibilityproblems .…

## Graph Aware Evolutionary Algorithms for Influence Maximization

Social networks represent nowadays in many contexts the main source of information transmission and the way opinions and actions are influenced . Modern marketing often involves paying some targeted users, or influencers, for advertising products or ideas . Find the set of nodes in a social network that lead to the highestinformation spread — the so-called Influence Maximization (IM) problem — is a pressing question and as such it has recently attracted a greatresearch interest .…

## Tracking and managing deemed abilities

A basic model can be thought of as the ongoing trace of a multi-agent system . Every state records systemic confirmations and disconfirmations of whether an acting entity is able to bring about something . Qualitative inductive reasoning is then used in order to infer what actingentities are deemed able to do .…

## Safety Control of Mobile Robots Under Time Delay Using Barrier Certificates and a Two Layer Predictor

The proposed solution includes a two-layerpredictor to compensate for the time-delay in the servo-system and anglecontrol loops . Barrier certificates are used to determine the safe range of the robot’s heading angle to avoid collisions . The proposed method accommodates multiple obstacles anddecouples the control structure from the obstacles’ shape, count, and distribution .…

## LightIoT Lightweight and Secure Communication for Energy Efficient IoT in Health Informatics

Internet of Things (IoT) is considered as a key enabler of healthinformatics . IoT-enabled devices are used for in-hospital and in-home patientmonitoring to collect and transfer biomedical data pertaining to bloodpressure, electrocardiography (ECG), blood sugar levels, body temperature, etc. These devices generate data in real-time and transmitthem to nearby gateways and remote servers for processing and visualization .…

## Graph theoretic algorithms for Kolmogorov operators Approximating solutions and their gradients in elliptic and parabolic problems on manifolds

We employ kernel-based approaches that use samples from a probability distribution to approximate a Kolmogorov operator on a manifold . We also employ an efficient $k$-$d$ tree algorithm to compute the sparse kernel matrix, which is a computational bottleneck . These methods only require samples from the underlying distribution and, therefore, can be applied on high dimensions or on geometrically complex manifolds when spatialdiscretizations are not available .…

## Convergence Analysis of a Local Stationarity Scheme for Rate Independent Systems and Application to Damage

This paper is concerned with an approximation scheme for rate-independentsystems governed by a non-smooth dissipation and a possibly non-convex energyfunctional . The scheme is based on the local minimization scheme introduced in[EM06], but relies on local stationarity of the underlying minimizationproblem .…

## On the randomized Euler schemes for ODEs under inexact information

We analyse errors of randomized explicit and implicit Euler schemes for approximating solving of ordinary differential equations (ODEs) We consider classes of ODEs for which right-hand side functions satisfy Lipschitzcondition globally or only locally . Optimality and stability of explicit or implicit algorithms are also investigated .…

## Using brain inspired principles to unsupervisedly learn good representations for visual pattern recognition

Deep learning has solved difficult problems in visual patternrecognition, it is mostly successful in tasks where there are lots of labeled training data available . The brain is able to perform most of these tasks in a general way from limited to no labeled data .…

## A mixed phase field fracture model for crack propagation in punctured EPDM strips

Crack propagation experiments evaluated by digitalimage correlation (DIC) for a carbon black filled ethylene propylene dienemonomer rubber (EPDM) and numerical modeling with the help of variational phase-field fracture . The main focus is the evolution of cracks in one-sidednotched EPDM strips containing a circular hole .…

## The Big Brother NaijaTV Reality Show as Coordinate of Media Functions and Dysfunctions

The study investigates how popular the Nigerian TV reality show, Big Brother Naija BBN, is perceived by its viewers . Three hundred heavy viewers of the program were surveyed from Lagos and Ede, South-West Nigeria . Sixty six per cent 66 33.7 of respondents likethe program because it entertains.…

## A note on a PDE approach to option pricing under xVA

In this paper we study partial differential equations (PDEs) that can be used to model value adjustments . Different value adjustments are nowadays added to the risk-free financial derivative values . The aim of this paper is to show howto solve the PDE analytically in the Black-Scholes setting to get newsemi-closed formulas that we compare to the widely used Monte-Carlo simulations .…

## Reservoir Stack Machines

Memory-augmented neural networks are notoriously hard to train, requiring many backpropagation epochs and a lot of data . In this paper, we introduce the reservoir stack machine, amodel which can provably recognize all deterministic context-free languages . We validate the reservoirstack machine against deep and shallow networks from the literature on threebenchmark tasks for Neural Turing machines and six deterministic .…

## Tightening the Biological Constraints on Gradient Based Predictive Coding

Predictive coding (PC) is a general theory of cortical function . The local, gradient-based learning rules found in one kind of PC model have recently been shown to closely approximate backpropagation . The model may also be useful for developing local learning algorithms that are compatible with neuromorphic hardware .…

## An augmented Lagrangian preconditioner for the magnetohydrodynamics equations at high Reynolds and coupling numbers

The magnetohydrodynamics (MHD) equations are generally known to be difficult to solve numerically . We present a scalableaugmented Lagrangian preconditioner for a finite element discretization of the incompressible viscoresistive MHDequations . For stationary problems, our solver achieves robust performance withrespect to the Reynolds and coupling numbers in two dimensions and good results in three dimensions .…

## DriveGAN Towards a Controllable High Quality Neural Simulation

Realistic simulators are critical for training and verifying roboticssystems . DriveGAN is a novel high-quality neural simulator called DriveGAN thatachieves controllability by disentangling different components withoutsupervision . It also includes controls for sampling features of a scene, such as the weather as well as the location of non-player objects .…