S. Smoliar, D. Hofstadter
Hasil untuk "Modern"
Menampilkan 20 dari ~4311862 hasil Β· dari CrossRef, arXiv, DOAJ, Semantic Scholar
Maciejowsk
R. Nielsen, J. Akey, M. Jakobsson et al.
Francesco Vissani
Between 1933 and 1937, the treatment of relativistic spin-1/2 particles, initially rooted in Hole theory, evolved into the modern framework of quantum field theory. This paper reconstructs the crucial stages of that transition by examining the formal and physical progress of the numerous authors who shaped the field's modern formalism. This historical study traces the development of fermionic field theory in full, beginning with the foundational work of the 1920s, focussing on the results of the 1930s, and concluding with the influential synthesis of Wolfgang Pauli in 1941, the content of which has shaped the subsequent tradition. Within this framework, particular emphasis is given to Ettore Majorana's 1937 quantisation procedure and argument for anti-commuting fermionic quantum fields. This study demonstrates that Majorana's work was not merely a technical variant, but the definitive rejection of the concept of negative energy solutions, whose conceptual clarity and educational value remain vital today.
Yufan Wang, Sokratis Makrogiannis, Chandra Kambhamettu
State Space Models (SSMs) have recently gained traction in remote sensing change detection (CD) for their favorable scaling properties. In this paper, we explore the potential of modern convolutional and attention-based architectures as a competitive alternative. We propose NeXt2Former-CD, an end-to-end framework that integrates a Siamese ConvNeXt encoder initialized with DINOv3 weights, a deformable attention-based temporal fusion module, and a Mask2Former decoder. This design is intended to better tolerate residual co-registration noise and small object-level spatial shifts, as well as semantic ambiguity in bi-temporal imagery. Experiments on LEVIR-CD, WHU-CD, and CDD datasets show that our method achieves the best results among the evaluated methods, improving over recent Mamba-based baselines in both F1 score and IoU. Furthermore, despite a larger parameter count, our model maintains inference latency comparable to SSM-based approaches, suggesting it is practical for high-resolution change detection tasks.
Lilit Grigoryan, Nikolay Karpov, Enas Albasiri et al.
Despite Arabic being one of the most widely spoken languages, the development of Arabic Automatic Speech Recognition (ASR) systems faces significant challenges due to the language's complexity, and only a limited number of public Arabic ASR models exist. While much of the focus has been on Modern Standard Arabic (MSA), there is considerably less attention given to the variations within the language. This paper introduces a universal methodology for Arabic speech and text processing designed to address unique challenges of the language. Using this methodology, we train two novel models based on the FastConformer architecture: one designed specifically for MSA and the other, the first unified public model for both MSA and Classical Arabic (CA). The MSA model sets a new benchmark with state-of-the-art (SOTA) performance on related datasets, while the unified model achieves SOTA accuracy with diacritics for CA while maintaining strong performance for MSA. To promote reproducibility, we open-source the models and their training recipes.
Sujal Chondhekar, Vasanth Murukuri, Rushabh Vasani et al.
Speech enhancement methods are commonly believed to improve the performance of automatic speech recognition (ASR) in noisy environments. However, the effectiveness of these techniques cannot be taken for granted in the case of modern large-scale ASR models trained on diverse, noisy data. We present a systematic evaluation of MetricGAN-plus-voicebank denoising on four state-of-the-art ASR systems: OpenAI Whisper, NVIDIA Parakeet, Google Gemini Flash 2.0, Parrotlet-a using 500 medical speech recordings under nine noise conditions. ASR performance is measured using semantic WER (semWER), a normalized word error rate (WER) metric accounting for domain-specific normalizations. Our results reveal a counterintuitive finding: speech enhancement preprocessing degrades ASR performance across all noise conditions and models. Original noisy audio achieves lower semWER than enhanced audio in all 40 tested configurations (4 models x 10 conditions), with degradations ranging from 1.1% to 46.6% absolute semWER increase. These findings suggest that modern ASR models possess sufficient internal noise robustness and that traditional speech enhancement may remove acoustic features critical for ASR. For practitioners deploying medical scribe systems in noisy clinical environments, our results indicate that preprocessing audio with noise reduction techniques might not just be computationally wasteful but also be potentially harmful to the transcription accuracy.
Harshraj Bhoite
Data contracts formalize agreements between data producers and consumers regarding schema, semantics, and quality expectations. As data pipelines grow in complexity, manual authoring and maintenance of contracts becomes error-prone and labor-intensive. We present an AI-driven framework for automatic data contract generation using large language models (LLMs). Our system leverages parameter-efficient fine-tuning methods, including LoRA and PEFT, to adapt LLMs to structured data domains. The models take sample data or schema descriptions and output validated contract definitions in formats such as JSON Schema and Avro. We integrate this framework into modern data platforms (e.g., Databricks, Snowflake) to automate contract enforcement at scale. Experimental results on synthetic and real-world datasets demonstrate that the fine-tuned LLMs achieve high accuracy in generating valid contracts and reduce manual workload by over 70%. We also discuss key challenges such as hallucination, version control, and the need for continuous learning. This work demonstrates that generative AI can enable scalable, agile data governance by bridging the gap between intent and implementation in enterprise data management.
Jamie J. Alnasir
Traditional flight computers -- including mechanical "whiz-wheels" (e.g. E6B, CRP series) and electronic flight calculators (e.g. ASA CX-3, Sportys E6-B) -- have long played a central role in flight planning and training within general aviation (GA). While these tools remain pedagogically valuable, their fixed form factors, constrained interaction models, and limited extensibility are increasingly misaligned with the expectations and workflows of pilots operating in modern digital environments. This paper presents E6BJA (Jamie's Flight Computer), a fully featured, multi-platform, software-based flight computer designed natively for Apple iOS, Android, and Microsoft Windows devices, with a complementary web-based implementation. E6BJA reproduces the core calculations of traditional flight computers while extending them through enhanced modelling capabilities and more accurate atmospheric (i.e. ISA-based) and performance calculations, including carburettor icing risk estimation and aircraft-specific weight and balance modelling for common GA aircraft. Each calculator is accompanied by embedded educational monographs explaining underlying assumptions, variables, and equations. We compare E6BJA with mechanical and electronic flight computers across functional, cognitive, and technical dimensions, demonstrating improvements in accuracy, error reduction, discoverability, and educational value. We also discuss design trade-offs associated with native multi-platform development and examine how contemporary mobile computing environments can support safer and more intuitive pre-flight planning. By combining the conceptual rigour of traditional flight planning with modern human-computer interaction design, E6BJA represents a meaningful evolution in pilot-facing flight tools, supporting both computation and instruction in aviation training contexts.
Ye Wang, Yaling Deng, Ge Wang et al.
Modern Large Language Models (LLMs) exhibit complexity and granularity similar to humans in the field of natural language processing, challenging the boundaries between humans and machines in language understanding and creativity. However, whether the semantic network of LLMs is similar to humans is still unclear. We examined the representative closed-source LLMs, GPT-3.5-Turbo and GPT-4, with open-source LLMs, LLaMA-2-70B, LLaMA-3-8B, LLaMA-3-70B using semantic fluency tasks widely used to study the structure of semantic networks in humans. To enhance the comparability of semantic networks between humans and LLMs, we innovatively employed role-playing to generate multiple agents, which is equivalent to recruiting multiple LLM participants. The results indicate that the semantic network of LLMs has poorer interconnectivity, local association organization, and flexibility compared to humans, which suggests that LLMs have lower search efficiency and more rigid thinking in the semantic space and may further affect their performance in creative writing and reasoning.
Ranyang Zhou, Jacqueline T. Liu, Sabbir Ahmed et al.
Recent advancements in side-channel attacks have revealed the vulnerability of modern Deep Neural Networks (DNNs) to malicious adversarial weight attacks. The well-studied RowHammer attack has effectively compromised DNN performance by inducing precise and deterministic bit-flips in the main memory (e.g., DRAM). Similarly, RowPress has emerged as another effective strategy for flipping targeted bits in DRAM. However, the impact of RowPress on deep learning applications has yet to be explored in the existing literature, leaving a fundamental research question unanswered: How does RowPress compare to RowHammer in leveraging bit-flip attacks to compromise DNN performance? This paper is the first to address this question and evaluate the impact of RowPress on DNN applications. We conduct a comparative analysis utilizing a novel DRAM-profile-aware attack designed to capture the distinct bit-flip patterns caused by RowHammer and RowPress. Eleven widely-used DNN architectures trained on different benchmark datasets deployed on a Samsung DRAM chip conclusively demonstrate that they suffer from a drastically more rapid performance degradation under the RowPress attack compared to RowHammer. The difference in the underlying attack mechanism of RowHammer and RowPress also renders existing RowHammer mitigation mechanisms ineffective under RowPress. As a result, RowPress introduces a new vulnerability paradigm for DNN compute platforms and unveils the urgent need for corresponding protective measures.
E. Shchukin, P. van Loock
Continuous-variable Gaussian entanglement is an attractive notion, both as a fundamental concept in quantum information theory, based on the well-established Gaussian formalism for phase-space variables, and as a practical resource in quantum technology, exploiting in particular, unconditional room-temperature squeezed-light quantum optics. The readily available high level of scalability, however, is accompanied by an increased theoretical complexity when the multipartite entanglement of a growing number of optical modes is considered. For such systems, we present several approaches to reconstruct the most probable physical covariance matrix from a measured non-physical one and then test the reconstructed matrix for different kinds of separability (factorizability, concrete partite separability or biseparability) even in the presence of measurement errors. All these approaches are based on formulating the desired properties (physicality or separability) as convex optimization problems, which can be efficiently solved with modern optimization solvers, even when the system grows. To every optimization problem we construct the corresponding dual problem used to verify the optimality of the solution. Besides this numerical part of work, we derive an explicit analytical expression for the symplectic trace of a positive definite matrix, which can serve as a simple witness of an entanglement witness, and extend it for positive semidefinite matrices. In addition, we show that in some cases our optimization problems can be solved analytically. As an application of our analytical approach, we consider small instances of bound entangled or genuine multipartite entangled Gaussian states, including some examples from the literature that were treated only numerically, and a family of non-Gaussian states.
Bum Jun Kim, Yoshinobu Kawahara, Sang Woo Kim
Dynamical systems are often time-varying, whose modeling requires a function that evolves with respect to time. Recent studies such as the neural ordinary differential equation proposed a time-dependent neural network, which provides a neural network varying with respect to time. However, we claim that the architectural choice to build a time-dependent neural network significantly affects its time-awareness but still lacks sufficient validation in its current states. In this study, we conduct an in-depth analysis of the architecture of modern time-dependent neural networks. Here, we report a vulnerability of vanishing timestep embedding, which disables the time-awareness of a time-dependent neural network. Furthermore, we find that this vulnerability can also be observed in diffusion models because they employ a similar architecture that incorporates timestep embedding to discriminate between different timesteps during a diffusion process. Our analysis provides a detailed description of this phenomenon as well as several solutions to address the root cause. Through experiments on neural ordinary differential equations and diffusion models, we observed that ensuring alive time-awareness via proposed solutions boosted their performance, which implies that their current implementations lack sufficient time-dependency.
Jerry Yao-Chieh Hu, Dennis Wu, Han Liu
We study the optimal memorization capacity of modern Hopfield models and Kernelized Hopfield Models (KHMs), a transformer-compatible class of Dense Associative Memories. We present a tight analysis by establishing a connection between the memory configuration of KHMs and spherical codes from information theory. Specifically, we treat the stored memory set as a specialized spherical code. This enables us to cast the memorization problem in KHMs into a point arrangement problem on a hypersphere. We show that the optimal capacity of KHMs occurs when the feature space allows memories to form an optimal spherical code. This unique perspective leads to: (i) An analysis of how KHMs achieve optimal memory capacity, and identify corresponding necessary conditions. Importantly, we establish an upper capacity bound that matches the well-known exponential lower bound in the literature. This provides the first tight and optimal asymptotic memory capacity for modern Hopfield models. (ii) A sub-linear time algorithm $\mathtt{U}\text{-}\mathtt{Hop}$+ to reach KHMs' optimal capacity. (iii) An analysis of the scaling behavior of the required feature dimension relative to the number of stored memories. These efforts improve both the retrieval capability of KHMs and the representation learning of corresponding transformers. Experimentally, we provide thorough numerical results to back up theoretical findings.
Kawasaki Fumitake, Shota Kishi, James Neve
The field of web and mobile software frameworks is relatively mature, with a large variety of tools in different languages that facilitate traditional app development where data in a relational database is displayed and modified. Our position is that many current frameworks became popular during single server deployment of MVC architecture apps, and do not facilitate modern aspects of app development such as cloud computing and the incorporation of emerging technologies such as AI. We present a novel framework which accomplishes these purposes, Skeet, which was recently released to general use, alongside an initial evaluation. Skeet provides an app structure that reflects current trends in architecture, and tool suites that allow developers with minimal knowledge of AI internals to easily incorporate such technologies into their apps and deploy them.
Hoirul Anam, Ahmad Fauzi, Dede Nurohman
The concept of usury in money is still unclear when it has not been studied, apart from the differences in the opinions of the four madhhab priests regarding usury, this is also caused by the limitations of our minds to capture the wisdom and lessons revealed by Allah SWT, as well as the increasingly modern era which demands new problems. which cannot be completely resolved, therefore it has become a taboo subject since ancient times until today. This paper contains taboos to be explained more clearly. This study uses a literature approach using the literature study method based on primary material, namely the book of al-fiqh al-Islami which is motivated by problems that exist in society. With the results of the study showing that the law of usury applies to money today, because there is a legal illat similar to gold and silver (Nuqud). And with this research, it is hoped that it can add to the body of knowledge in Islamic economics.
David McDowall
1. Introduction: Kurdish identity and social formation. Book I The Kurds in the age of tribe and empire: 2. Kurdistan before the 19th century 3. Ottoman Kurdistan, 1800-1850 4. Ottoman Kurdistan, 1850-1914 5. The Qajars and the Kurdis 6. Revolution, nationalism and war, 1908-1918. Book II Incorporating the Kurds: 7. Redrawing the map: the partition of Ottoman Kurdistan 8. The Kurds, Britain and Iraq 9. Incorporating Turkey's Kurds 10. The Kurds under Reza Shah. Book III Ethno-nationalism in Iran: 11. Tribe or Ethnicity? The Mahabad Republic 12. Iran: Creating a National movement 13. Subjects of the Shi'i republic. Book IV Ethno-nationalism in Iraq: 14. The birth of a nationalist movement under Hashimite Rule 15. The Kurds in revolutionary Iraq 16. The Kurds under the Baath, 1968-1975 17. The road to genocide, 1975-1988 18. Uprising and self-rule. Book V Ethno-nationalism in Turkey: 19. The Kurdish national revival in Turkey, 1946-1979 20. The PKK and the mass movement. Afterword: Retrospect and prospect. Appendix: The treaty of Sevres.
Andreas Triantafyllopoulos, Alexander Kathan, Alice Baird et al.
Recent years have seen a rapid increase in digital medicine research in an attempt to transform traditional healthcare systems to their modern, intelligent, and versatile equivalents that are adequately equipped to tackle contemporary challenges. This has led to a wave of applications that utilise AI technologies; first and foremost in the fields of medical imaging, but also in the use of wearables and other intelligent sensors. In comparison, computer audition can be seen to be lagging behind, at least in terms of commercial interest. Yet, audition has long been a staple assistant for medical practitioners, with the stethoscope being the quintessential sign of doctors around the world. Transforming this traditional technology with the use of AI entails a set of unique challenges. We categorise the advances needed in four key pillars: Hear, corresponding to the cornerstone technologies needed to analyse auditory signals in real-life conditions; Earlier, for the advances needed in computational and data efficiency; Attentively, for accounting to individual differences and handling the longitudinal nature of medical data; and, finally, Responsibly, for ensuring compliance to the ethical standards accorded to the field of medicine.
Cervelli Alberto
In the following a review of the present status of silicon tracking and vertexing systems and their future developments will be presented. We will show the modern detectors used in present day experiments both in nuclear and elementary particle physics, and their achieved performances. Later we present a review of the near-future systems which are now being designed, built, or commissioned together with an outlook on the future developments for next-generation silicon detectors.
Halaman 40 dari 215594