Hasil untuk "Oratory. Elocution, etc."

Menampilkan 20 dari ~43796 hasil · dari CrossRef, arXiv

JSON API
arXiv Open Access 2025
Polarization Decoupling Multi-Port Beam-Splitting Metasurface for Miniaturized Magneto-Optical Trap

Tian Tian, Chen Qing, Yuxuan Liao et al.

In regular magneto-optical trap (MOT) systems, the delivery of six circularly polarized (CP) cooling beams requires complex and bulky optical arrangements including waveplates, mirrors, retroreflectors, etc. To address such technique challenges, we have proposed a beam delivery system for miniaturized MOT entirely based on meta-devices. The key component is a novel multi-port beam-splitting (PD-MPBS) metasurface that relies on both propagation phase and geometric phase. The fabricated samples exhibit high beam-splitting power uniformity (within 4.4%) and polarization purities (91.29%~93.15%). By leveraging such beam-splitting device as well as reflective beam-expanding meta-device, an integrated six-beam delivery system for miniaturized MOT application has been implemented. The experimental results indicate that six expanded beams have been successfully delivered with uniform power (within 9.5%), the desired CP configuration and large overlapping volume (76.2 mm^3). We believe that a miniaturized MOT with the proposed beam delivery system is very promising for portable application of cold atom technology in precision measurement, atomic clock, quantum simulation and computing, etc.

en physics.optics, physics.app-ph
arXiv Open Access 2024
$ω$-trace and Griffiths positivity for singular Hermitian metrics

Yuta Watanabe

In this paper, we investigate various positivity for singular Hermitian metrics such as Griffiths, $ω$-trace and RC, where $ω$ is a Hermitian metric, and show that these quasi-positivity notions induce $0$-th cohomology vanishing, rational conected-ness, etc. Here, $ω$-trace positivity of smooth Hermitian metrics $h$ on holomorphic vector bundles $E$ represents the positivity of $tr_ωiΘ_{E,h}$.

en math.DG, math.CV
arXiv Open Access 2023
Inferring the Long-Term Causal Effects of Long-Term Treatments from Short-Term Experiments

Allen Tran, Aurélien Bibaut, Nathan Kallus

We study inference on the long-term causal effect of a continual exposure to a novel intervention, which we term a long-term treatment, based on an experiment involving only short-term observations. Key examples include the long-term health effects of regularly-taken medicine or of environmental hazards and the long-term effects on users of changes to an online platform. This stands in contrast to short-term treatments or "shocks," whose long-term effect can reasonably be mediated by short-term observations, enabling the use of surrogate methods. Long-term treatments by definition have direct effects on long-term outcomes via continual exposure, so surrogacy conditions cannot reasonably hold. We connect the problem with offline reinforcement learning, leveraging doubly-robust estimators to estimate long-term causal effects for long-term treatments and construct confidence intervals.

en stat.AP, stat.ME
arXiv Open Access 2023
Photon liquefaction in time

Eduardo Zubizarreta Casalengua, Elena del Valle, Fabrice P. Laussy

We provide a mechanism to imprint local temporal correlations in photon streams which have the same character as spatial correlations in liquids. Usual single-photon emitters correspond, in this picture, to a (temporal) gas while uncorrelated light is the ideal gas. We argue that good single-photon sources are those that exhibit such temporal liquid features, i.e., with a plateau for their short-time correlations (as opposed to a linear dependence) and oscillations at later times, which is a direct manifestation of photon time-ordering. We obtain general, closed-form analytical expressions for the second-order coherence function of a broad family of "liquid light" which can be arbitrarily correlated, though never completely crystallized.

en quant-ph, cond-mat.quant-gas
arXiv Open Access 2023
Integrity and Junkiness Failure Handling for Embedding-based Retrieval: A Case Study in Social Network Search

Wenping Wang, Yunxi Guo, Chiyao Shen et al.

Embedding based retrieval has seen its usage in a variety of search applications like e-commerce, social networking search etc. While the approach has demonstrated its efficacy in tasks like semantic matching and contextual search, it is plagued by the problem of uncontrollable relevance. In this paper, we conduct an analysis of embedding-based retrieval launched in early 2021 on our social network search engine, and define two main categories of failures introduced by it, integrity and junkiness. The former refers to issues such as hate speech and offensive content that can severely harm user experience, while the latter includes irrelevant results like fuzzy text matching or language mismatches. Efficient methods during model inference are further proposed to resolve the issue, including indexing treatments and targeted user cohort treatments, etc. Though being simple, we show the methods have good offline NDCG and online A/B tests metrics gain in practice. We analyze the reasons for the improvements, pointing out that our methods are only preliminary attempts to this important but challenging problem. We put forward potential future directions to explore.

en cs.IR, cs.AI
arXiv Open Access 2021
Multimedia Technology Applications and Algorithms: A Survey

Palak Tiwary, Sanjida Ahmed

Multimedia related research and development has evolved rapidly in the last few years with advancements in hardware, software and network infrastructures. As a result, multimedia has been integrated into domains like Healthcare and Medicine, Human facial feature extraction and tracking, pose recognition, disparity estimation, etc. This survey gives an overview of the various multimedia technologies and algorithms developed in the domains mentioned.

en cs.MM, cs.CV
arXiv Open Access 2020
Detecting Trojaned DNNs Using Counterfactual Attributions

Karan Sikka, Indranil Sur, Susmit Jha et al.

We target the problem of detecting Trojans or backdoors in DNNs. Such models behave normally with typical inputs but produce specific incorrect predictions for inputs poisoned with a Trojan trigger. Our approach is based on a novel observation that the trigger behavior depends on a few ghost neurons that activate on trigger pattern and exhibit abnormally higher relative attribution for wrong decisions when activated. Further, these trigger neurons are also active on normal inputs of the target class. Thus, we use counterfactual attributions to localize these ghost neurons from clean inputs and then incrementally excite them to observe changes in the model's accuracy. We use this information for Trojan detection by using a deep set encoder that enables invariance to the number of model classes, architecture, etc. Our approach is implemented in the TrinityAI tool that exploits the synergies between trustworthiness, resilience, and interpretability challenges in deep learning. We evaluate our approach on benchmarks with high diversity in model architectures, triggers, etc. We show consistent gains (+10%) over state-of-the-art methods that rely on the susceptibility of the DNN to specific adversarial attacks, which in turn requires strong assumptions on the nature of the Trojan attack.

en cs.LG, cs.AI
arXiv Open Access 2019
Knowledge-incorporating ESIM models for Response Selection in Retrieval-based Dialog Systems

Jatin Ganhotra, Siva Sankalp Patel, Kshitij Fadnis

Goal-oriented dialog systems, which can be trained end-to-end without manually encoding domain-specific features, show tremendous promise in the customer support use-case e.g. flight booking, hotel reservation, technical support, student advising etc. These dialog systems must learn to interact with external domain knowledge to achieve the desired goal e.g. recommending courses to a student, booking a table at a restaurant etc. This paper presents extended Enhanced Sequential Inference Model (ESIM) models: a) K-ESIM (Knowledge-ESIM), which incorporates the external domain knowledge and b) T-ESIM (Targeted-ESIM), which leverages information from similar conversations to improve the prediction accuracy. Our proposed models and the baseline ESIM model are evaluated on the Ubuntu and Advising datasets in the Sentence Selection track of the latest Dialog System Technology Challenge (DSTC7), where the goal is to find the correct next utterance, given a partial conversation, from a set of candidates. Our preliminary results suggest that incorporating external knowledge sources and leveraging information from similar dialogs leads to performance improvements for predicting the next utterance.

en cs.CL, cs.AI
arXiv Open Access 2015
Memoir on Divisibility Sequences

Masum Billal

The purpose of this memoir is to discuss two very interesting properties of integer sequences. One is the law of apparition and the other is the law of repetition. Both have been extensively studied by mathematicians such as Ward, Lucas, Lehmer, Hall, etc. However, due to the lack of a proper survey in this area, many results have been rediscovered many decades later. This along with the necessity of the usefulness of such theory calls for a survey on this topic.

en math.NT
arXiv Open Access 2015
Semi-infinite jellium: Step potential model

P. P. Kostrobij, B. M. Markovych

The surface energy, the one-particle distribution function of electrons, etc. of a semi-bounded metal within the framework of the semi-infinite jellium are calculated. The influence of the potential barrier height on these characteristics is studied. The barrier height is found from the condition of the minimum of the surface energy. The surface energy is positive in the entire domain of the Wigner-Seitz radius of metals, and it is in sufficiently good agreement with experimental data.

en cond-mat.stat-mech
arXiv Open Access 2014
Endpoints of multi-valued weak contractions on the metric space valued in partially ordered groups

Congdian Cheng

We introduce the metric space valued in partially ordered groups, and define the convergence of sequences and the multi-valued weak contractions, etc., on the space. We then establish endpoint theorems for the defined maps. Our contributions extend the theory of cone metric space constructed by Huang and Zhang (2007) and some recent results on the fixed point and endpoint theory, such as the endpoint theorem given by Amini-Harandi (2010).

en math.FA
arXiv Open Access 2014
Study of Gesture Recognition methods and augmented reality

Sandeep Vasave, Amol Plave

With the growing technology, we humans always need something that stands out from the other thing. Gestures are most desirable source to Communicate with the Machines. Human Computer Interaction finds its importance when it comes to working with the Human gestures to control the computer applications. Usually we control the applications using mouse, keyboard, laser pointers etc. but, with the recent advent in the technology it has even left behind their usage by introducing more efficient techniques to control applications. There are many Gesture Recognition techniques that have been implemented using image processing in the past. However recognizing the gestures in the noisy background has always been a difficult task to achieve. In the proposed system, we are going to use one such technique called Augmentation in Image processing to control Media Player. We will recognize Gestures using which we are going to control the operations on Media player. Augmentation usually is one step ahead when it comes to virtual reality. It has no restrictions on the background. Moreover it also does not rely on certain things like gloves, color pointers etc. for recognizing the gesture. This system mainly appeals to those users who always looks out for a better option that makes their interaction with computer more simpler or easier.

en cs.HC
CrossRef Open Access 1990
Renaissance Execution and Marlovian Elocution: The Drama of Death

Karen Cunningham

Interpretations of violence in Christopher Marlowe's plays have emphasized biographical, literary, and philosophical roots over social and historical conditions. If, however, we glance out Marlowe's window at contemporary rituals, we can enlarge these views of staged violence. His numerous references to official methods of persecution—from boiling to pressing, from branding to beheading—are not only projections of dramatic character but also revisions of corresponding Tudor social practices: public executions and their kin, torture. Although these entertainments provide Marlowe with ready-made elements for dramatizing tragedies of will, he uses those elements to turn theatricality against itself and to expose the fraudulent core of such exhibitions, even as he acknowledges their thematic power. Exaggerating the profound ambiguity of artifice, Marlowe undermines the moralizing that accompanies spectacles of punishment and transforms a theater of pain into a drama of subversion.

arXiv Open Access 2000
Thermodynamics of trapped interacting bosons in one dimension

Shi-Jian Gu, You-Quan Li, Zu-Jian Ying

On the basis of Bethe ansatz solution of bosons with delta-function interaction in a one-dimensional potential well, the thermodynamics equilibrium of the system in finite temperature is studied by using the strategy of Yang and Yang. The thermodynamics quantities, such as specific heat etc. are obtained for the cases of strong coupling limit and weak coupling limit respectively.

en cond-mat, hep-th
arXiv Open Access 1994
Probabilistic Tagging with Feature Structures

Andre Kempe

The described tagger is based on a hidden Markov model and uses tags composed of features such as part-of-speech, gender, etc. The contextual probability of a tag (state transition probability) is deduced from the contextual probabilities of its feature-value-pairs. This approach is advantageous when the available training corpus is small and the tag set large, which can be the case with morphologically rich languages.

en cs.CL
arXiv Open Access 1997
2/3 Splitting in SUSY GUT -- Higgs as Goldstone Boson

Z. Berezhiani

We briefly review the GIFT (Goltstones instead of Fine Tuning) mechanism which provides a promising solution to the doublet-triplet splitting problem and some other puzzles of the supersymmetric grand unification as are the $μ$-problem, the fermion mass problem, etc. It can be naturally implemented by extending the minimal SUSY SU(5) model to the gauge SU(6) theory.

en hep-ph
arXiv Open Access 2005
Fundamental Physical Constants: Looking from Different Angles

Savely G. Karshenboim

We consider fundamental physical constants which are among a few of the most important pieces of information we have learned about Nature after its intensive centuries-long studies. We discuss their multifunctional role in modern physics including problems related to the art of measurement, natural and practical units, origin of the constants, their possible calculability and variability etc.

en physics.atom-ph, physics.gen-ph
arXiv Open Access 2002
Wavefront depinning transition in discrete one-dimensional reaction-diffusion systems

A. Carpio, L. L. Bonilla

Pinning and depinning of wavefronts are ubiquitous features of spatially discrete systems describing a host of phenomena in physics, biology, etc. A large class of discrete systems is described by overdamped chains of nonlinear oscillators with nearest-neighbor coupling and controlled by constant external forces. A theory of the depinning transition for these systems, including scaling laws and asymptotics of wavefronts, is presented and confirmed by numerical calculations.

en cond-mat.mtrl-sci
arXiv Open Access 2006
Calculus of the embedding functor and spaces of knots

Ismar Volic

We give an overview of how calculus of the embedding functor can be used for the study of long knots and summarize various results connecting the calculus approach to the rational homotopy type of spaces of long knots, collapse of the Vassiliev spectral sequence, Hochschild homology of the Poisson operad, finite type knot invariants, etc. Some open questions and conjectures of interest are given throughout.

en math.AT, math.GT

Halaman 52 dari 2190