| Total: 1000
We propose a new node centrality measure in networks, the lobby index, which is inspired by Hirsch's h-index. It is shown that in scale free networks the l-index has power tail with exponent square of the exponent of the degree distribution one. Properties of the l-index and extensions are discussed.
This is a review of Hossenfelder's book, 'Lost in Math: How Beauty Leads Physics Astray'. The book gives a breezy exposition of the present situation in fundamental physics, and raises important questions: both about the content of the physics, and the way physics research is organized. I first state my main disagreements. Then, I mostly praise the book: I concentrate on Hossenfelder's discussion of supersymmetry, naturalness and the multiverse.
The Terahertz (0.1-10 THz) band has been envisioned as one of the promising spectrum bands to support ultra-broadband sixth-generation (6G) and beyond communications. In this paper, a wideband channel measurement campaign in a 500- square-meter indoor lobby at 306-321 GHz is presented. The measurement system consists of a vector network analyzer (VNA)-based channel sounder, and a directional antenna equipped at the receiver to resolve multi-path components (MPCs) in the angular domain. In particular, 21 positions and 3780 channel impulse responses (CIRs) are measured in the lobby, including the line-of-sight (LoS), non-line-of-sight (NLoS) and obstructed-line-of-sight (OLoS) cases. The multi-path characteristics are summarized as follows. First, the main scatterers in the lobby include the glass, the pillar, and the LED screen. Second, best direction and omni-directional path losses are analyzed. Compared with the close-in path loss model, the optimal path loss offset in the alpha-beta path loss model exceeds 86 dB in the LoS case, and accordingly, the exponent decreases to 1.57 and below. Third, more than 10 clusters are observed in OLoS and NLoS cases, compared to 2.17 clusters on average in the LoS case. Fourth, the average power dispersion of MPCs is smaller in both temporal and angular domains in the LoS case, compared with the NLoS and OLoS counterparts. Finally, in contrast to hallway scenarios measured in previous works at the same frequency band, the lobby which is larger in dimension and square in shape, features larger path losses and smaller delay and angular spreads.
Since the standardization of IPv6 in 1998, both versions of the Internet Protocol have coexisted in the Internet. Clients usually run algorithms such as Happy Eyeballs, to decide whether to connect to an IPv4 or IPv6 endpoint for dual-stack domains. To identify whether two addresses belong to the same device or service, researchers have proposed different forms of alias resolution techniques. Similarly, one can also form siblings of IPv4 and IPv6 addresses belonging to the same device. Traditionally, all of these approaches have focused on individual IP addresses. In this work, we propose the concept of "sibling prefixes", where we extend the definition of an IPv4-IPv6 sibling to two IP prefixe-one IPv4 prefix and its sibling IPv6 prefix. We present a technique based on large-scale DNS resolution data to identify 76k IPv4-IPv6 sibling prefixes. We find sibling prefixes to be relatively stable over time. We present SP-Tuner algorithm to tune the CIDR size of sibling prefixes and improve the perfect match siblings from 52% to 82%. For more than half of sibling prefixes, the organization names for their IPv4 and IPv6 origin ASes are identical, and 60% of all sibling prefixes have at least one of the prefixes with a valid ROV status in RPKI. Furthermore, we identify sibling prefixes in 24 hypergiant and CDN networks. Finally, we plan to regularly publish a list of sibling prefixes to be used by network operators and fellow researchers in dual-stack studies.
A rook path is a path on lattice points in the plane in which any proper horizontal step to the right or vertical step north is allowed. If, in addition, one allow bishop steps, that is, proper diagonal steps of slope 1, then one has queen paths. A rook or queen path is Catalan if it starts at the origin and stays strictly to the left of the line y = x-1. We give explicit formulas for the ordinary generating function of the number of Catalan rook and queen paths finishing at (n,n). These generating functions are algebraic; indeed, they satisfy quadratic equations. In the second version, we also consider paths with "spider steps", that is, proper steps on lattice points with slope strictly greater than one. In the third version, we give step-enumerator versions of our results.
In this paper we study queen's graphs, which encode the moves by a queen on an n×m chess board, through the lens of chip-firing games. We prove that their gonality is equal to nm minus the independence number of the graph, and give a one-to-one correspondence between maximum independent sets and classes of positive rank divisors achieving gonality. We also prove an identical result for toroidal queen's graphs.
Queen Daniela of Sardinia is asleep at the center of a round room at the top of the tower in her castle. She is accompanied by her faithful servant, Eva. Suddenly, they are awakened by cries of "Fire". The room is pitch black and they are disoriented. There is exactly one exit from the room somewhere along its boundary. They must find it as quickly as possible in order to save the life of the queen. It is known that with two people searching while moving at maximum speed 1 anywhere in the room, the room can be evacuated (i.e., with both people exiting) in 1+2π3+√3≈4.8264 time units and this is optimal~[Czyzowicz et al., DISC'14], assuming that the first person to find the exit can directly guide the other person to the exit using her voice. Somewhat surprisingly, in this paper we show that if the goal is to save the queen (possibly leaving Eva behind to die in the fire) there is a slightly better strategy. We prove that this "priority" version of evacuation can be solved in time at most 4.81854. Furthermore, we show that any strategy for saving the queen requires time at least 3+π/6+√3/2≈4.3896 in the worst case. If one or both of the queen's other servants (Biddy and/or Lili) are with her, we show that the time bounds can be improved to 3.8327 for two servants, and 3.3738 for three servants. Finally we show lower bounds for these cases of 3.6307 (two servants) and 3.2017 (three servants). The case of n≥4 is the subject of an independent study by Queen Daniela's Royal Scientific Team.
We discussed the criterion for usefully comparing an irreversible cycle with a reversible one, and show that the lost work cannot be determined by the usual cycle diagrams, contrary to what has been found in the literature. To better understand the lost work concept and its role in entropy generation, we present a conceptual model that uses Carnot cycles to describe thermal and mechanical irreversibility, which also instructively reveals that heat and lost work are the two sides of the same coin, this coin being the entropy generation. This study, addressing issues that are virtually absent from the literature, is expected to be not only relevant from a scientific standpoint but also useful for physics teachers and students.
We present the fundamental equation for a system and for a process, and by considering irreversibility within the system, we show that the lost work concept emerges naturally from the formalism. We then argue that if irreversibility is considered within the surroundings the lost work becomes what is known as exergy. Therefore, lost work and exergy are two views of the same concept, which in turn integrates a broader and more fundamental concept: entropy generation. It is our opinion that the clarification of the meanings of lost work and exergy, as well as the discussion that leads to an understanding of their differences and similarities, has not received the attention in the literature that it deserves. This paper fills that gap, and it is hoped that the discussion of these two concepts here will be useful for both students and teachers.
Thermonuclear supernovae, or Type-Ia supernovae (SNeIa), are an essential tool of cosmology. Precise cosmological constraints are extracted from a Hubble diagram defined by homogeneous distance indicators, but supernova homogeneity is not guaranteed. The degree of heterogeneity within the SNeIa parent population is unknown. In addition, event selections and standardization procedures are based on empirical, optically-measured observables rather than fundamental thermonuclear properties. Systematics are a natural consequence of event selection from a diverse parent population. Quantifying the impact of diversity-driven systematics is crucial to optimizing SNeIa as cosmic probes. In this work, the empirical observables are used to calibrate previously unidentified diversity-driven systematic uncertainties. The foundation of this approach is the concept of "supernova siblings'', two or more supernovae hosted by the same parent galaxy. Sibling-based calibrations isolate intrinsic differences between supernovae; they control for source distance and host galaxy dependencies that can conceal systematics or lead to their underestimation. Newly calibrated distance modulus uncertainties are approximately an order of magnitude larger than previously reported. The physical origin of these uncertainties is plausibly attributed to the diverse thermonuclear scenarios responsible for SNeIa and the inhomogeneous apparent magnitudes induced by this diversity. Systematics mitigation strategies are discussed. Cosmological parameter constraints extracted from a re-analysis of the Pantheon+ SNeIa dataset are weaker than previously reported. Agreement with early-Universe parameter estimates is achieved for a ΛCDM cosmology, including a reduction of the Hubble Tension from ∼5σ to <1σ.
Model extraction attacks currently pose a non-negligible threat to the security and privacy of deep learning models. By querying the model with a small dataset and usingthe query results as the ground-truth labels, an adversary can steal a piracy model with performance comparable to the original model. Two key issues that cause the threat are, on the one hand, accurate and unlimited queries can be obtained by the adversary; on the other hand, the adversary can aggregate the query results to train the model step by step. The existing defenses usually employ model watermarking or fingerprinting to protect the ownership. However, these methods cannot proactively prevent the violation from happening. To mitigate the threat, we propose QUEEN (QUEry unlEarNing) that proactively launches counterattacks on potential model extraction attacks from the very beginning. To limit the potential threat, QUEEN has sensitivity measurement and outputs perturbation that prevents the adversary from training a piracy model with high performance. In sensitivity measurement, QUEEN measures the single query sensitivity by its distance from the center of its cluster in the feature space. To reduce the learning accuracy of attacks, for the highly sensitive query batch, QUEEN applies query unlearning, which is implemented by gradient reverse to perturb the softmax output such that the piracy model will generate reverse gradients to worsen its performance unconsciously. Experiments show that QUEEN outperforms the state-of-the-art defenses against various model extraction attacks with a relatively low cost to the model accuracy. The artifact is publicly available at https://anonymous.4open.science/r/queen implementation-5408/.
Supernova (SN) siblings -- two or more SNe in the same parent galaxy -- are useful tools for exploring progenitor stellar populations as well as properties of the host galaxies such as distance, star formation rate, dust extinction, and metallicity. Since the average SN rate for a Milky Way-type galaxy is just one per century, a large imaging survey is required to discover an appreciable sample of SN siblings. From the wide-field Zwicky Transient Facility (ZTF) Bright Transient Survey (BTS; which aims for spectroscopic completeness for all transients which peak brighter than r<18.5 mag) we present 10 SN siblings in 5 parent galaxies. For each of these families we analyze the SN's location within the host and its underlying stellar population, finding agreement with expectations that SNe from more massive progenitors are found nearer to their host core and in regions of more active star formation. We also present an analysis of the relative rates of core collapse and thermonuclear SN siblings, finding a significantly lower ratio than past SN sibling samples due to the unbiased nature of the ZTF.
We introduce a generic model for spouse's pensions. The generic model allows for the modeling of various types of spouse's pensions with payments commencing at the death of the insured. We derive abstract formulas for cashflows and liabilities corresponding to common types of spouse's pensions. We show how the standard formulas from the Danish G82 concession can be obtained as a special case of our generic model. We also derive expressions for liabilities for spouse's pensions in models more advanced than found in the G82 concession. The generic nature of our model and results furthermore enable the calculation of cashflows and liabilities using simple estimates of marital behaviour among a population.
A trademark of eusocial insect species is reproductive division of labor, in which workers forego their own reproduction while the queen produces almost all offspring. The presence of the queen is key for maintaining social harmony, but the specific role of the queen in the evolution of eusociality remains unclear. A long-discussed scenario is that a queen either behaviorally or chemically sterilizes her workers. However, the demographic and ecological conditions that enable such manipulation are unknown. Accordingly, we propose a simple model of evolutionary dynamics that is based on haplodiploid genetics. We consider a mutation that acts in a queen, causing her to control the reproductive behavior of her workers. Our mathematical analysis yields precise conditions for the evolutionary emergence and stability of queen-induced worker sterility. These conditions do not depend on the queen's mating frequency. Moreover, we find that queen control is always established if it increases colony reproductive efficiency and can evolve even if it decreases colony efficiency. We further outline the conditions under which queen control is evolutionarily stable against invasion by mutant, reproductive workers.
The Red Queen's notion "It takes all the running you can do, to keep in the same place" has been applied within evolutionary biology, politics and economics. We find that a generalized version in which an adaptive Red Queen (e.g. insurgency) sporadically edges ahead of a Blue King (e.g. military), explains the progress curves for fatal insurgent attacks against the coalition military within individual provinces in Afghanistan and Iraq. Remarkably regular mathematical relations emerge which suggest a prediction formula for the timing of the n'th future fatal day, and provide a common framework for understanding how insurgents fight in different regions. Our findings are consistent with a Darwinian selection hypothesis which favors a weak species which can adapt rapidly, and establish an unexpected conceptual connection to the physics of correlated walks.
User-generated family trees are invaluable for constructing population-scale family networks and studying population dynamics over many generations and far into the past. Family trees contain information on individuals such as birth and death places and years, and kinship ties, e.g., parent-child, spouse, and sibling relationships. Such information about individuals in family trees makes it possible to extract migration networks over time. Despite the recent advances, existing spatial and temporal abstraction techniques for time-variant flow data have limitations due to the lack of knowledge on the effect of temporal partitioning on flow patterns. In this study, we extracted state-to-state migration patterns over a period of 150 years between 1776 and 1926 from a cleaned, geocoded and connected family trees from Rootsweb.com. We used birthplaces and birthyears of parents and children to extract intergenerational migration flows between states. To reveal the temporal trends of migration patterns, we evaluated three temporal partitioning strategies: (1) predefined periods in American history, (2) overlapping time periods with fixed length, and (3) time periods with variable length, which have approximately equal volume of moves per time period. To account for the effect of geographic proximity and flow volumes in migration flows, we transformed the raw flows into modularity flows using a double-constrained a gravity model. Our preliminary results revealed longitudinal population mobility in the U.S. on such a large spatial and temporal scale.
A growing area of research in epidemiology is the identification of health-related sibling spillover effects, or the effect of one individual's exposure on their sibling's outcome. The health and health care of family members may be inextricably confounded by unobserved factors, rendering identification of spillover effects within families particularly challenging. We demonstrate a gain-score regression method for identifying exposure-to-outcome spillover effects within sibling pairs in a linear fixed effects framework. The method can identify the exposure-to-outcome spillover effect if only one sibling's exposure affects the other's outcome; and it identifies the difference between the spillover effects if both siblings' exposures affect the others' outcomes. The method fails in the presence of outcome-to-exposure spillover and outcome-to-outcome spillover. Analytic results and Monte Carlo simulations demonstrate the method and its limitations. To exercise this method, we estimate the spillover effect of a child's preterm birth on an older sibling's literacy skills, measured by the Phonological Awarenesses Literacy Screening-Kindergarten test. We analyze 20,010 sibling pairs from a population-wide, Wisconsin-based (United States) birth cohort. Without covariate adjustment, we estimate that preterm birth modestly decreases an older sibling's test score (-2.11 points; 95% confidence interval: -3.82, -0.40 points). In conclusion, gain-scores are a promising strategy for identifying exposure-to-outcome spillovers in sibling pairs while controlling for sibling-invariant unobserved confounding in linear settings.
We study the lobby index (l-index for short) as a local node centrality measure for complex networks. The l-inde is compared with degree (a local measure), betweenness and Eigenvector centralities (two global measures) in the case of biological network (Yeast interaction protein-protein network) and a linguistic network (Moby Thesaurus II). In both networks, the l-index has poor correlation with betweenness but correlates with degree and Eigenvector. Being a local measure, one can take advantage by using the l-index because it carries more information about its neighbors when compared with degree centrality, indeed it requires less time to compute when compared with Eigenvector centrality. Results suggests that l-index produces better results than degree and Eigenvector measures for ranking purposes, becoming suitable as a tool to perform this task.
This paper aims at finding a subclass of DTDs that covers many of the real-world DTDs while offering a polynomial-time complexity for deciding the XPath satisfiability problem. In our previous work, we proposed RW-DTDs, which cover most of the real-world DTDs (26 out of 27 real-world DTDs and 1406 out of 1407 DTD rules). However, under RW-DTDs, XPath satisfiability with only child, descendant-or-self, and sibling axes is tractable. In this paper, we propose MRW-DTDs, which are slightly smaller than RW-DTDs but have tractability on XPath satisfiability with parent axes or qualifiers. MRW-DTDs are a proper superclass of duplicate-free DTDs proposed by Montazerian et al., and cover 24 out of the 27 real-world DTDs and 1403 out of the 1407 DTD rules. Under MRW-DTDs, we show that XPath satisfiability problems with (1) child, parent, and sibling axes, and (2) child and sibling axes and qualifiers are both tractable, which are known to be intractable under RW-DTDs.
The aim of this paper is to find lost siblings of the Sun by analyzing high resolution spectra. Finding solar siblings will enable us to constrain the parameters of the parental cluster and the birth place of the Sun in the Galaxy. The solar siblings can be identified by accurate measurements of metallicity, stellar age and elemental abundances for solar neighbourhood stars. The solar siblings candidates were kinematically selected based on their proper motions, parallaxes and colours. Stellar parameters were determined through a purely spectroscopic approach and partly physical method, respectively. Comparing synthetic with observed spectra, elemental abundances were computed based on the stellar parameters obtained using a partly physical method. A chemical tagging technique was used to identify the solar siblings. We present stellar parameters, stellar ages, and detailed elemental abundances for Na, Mg, Al, Si, Ca, Ti, Cr, Fe, and Ni for 32 solar sibling candidates. Our abundances analysis shows that four stars are chemically homogenous together with the Sun. Technique of chemical tagging gives us a high probability that they might be from the same open cluster. Only one candidate HIP 40317 which has solar metallicity and age could be a solar sibling. We performed simulations of the Sun's birth cluster in analytical Galactic model and found that most of the radial velocities of the solar siblings lie in the range −10≤Vr≤10 km s−1, which is smaller than the radial velocity of HIP 40317 (Vr=34.2 km s−1), under different Galactic parameters and different initial conditions of the Sun's birth cluster. The sibling status for HIP 40317 is not directly supported by our dynamical analysis.
Deep learning techniques have gained a lot of traction in the field of NLP research. The aim of this paper is to predict the age and gender of an individual by inspecting their written text. We propose a supervised BERT-based classification technique in order to predict the age and gender of bloggers. The dataset used contains 681284 rows of data, with the information of the blogger's age, gender, and text of the blog written by them. We compare our algorithm to previous works in the same domain and achieve a better accuracy and F1 score. The accuracy reported for the prediction of age group was 84.2%, while the accuracy for the prediction of gender was 86.32%. This study relies on the raw capabilities of BERT to predict the classes of textual data efficiently. This paper shows promising capability in predicting the demographics of the author with high accuracy and can have wide applicability across multiple domains.
Recent experimental findings of several mesons and baryons with "beauty" and "charm" as flavors remind us of the days when strangeness was discovered, and how its inclusion led to SU(3)-flavor symmetry with enormous success in the classification of the "proliferated" states into SU(3) multiplets. One of the key elements was the successful application of the first order perturbation in symmetry breaking, albeit what then appeared to be huge mass differences, and the prediction of new states that were confirmed by experiments. In this note, we venture into the past and, applying the same techniques, predict some new "beauty-" and "charm-" flavored hadrons. If these new states are confirmed experimentally, it may provide a useful phenomenological model for classifying numerous states that are found to be in the PDG data and could invite further theoretical challenges towards our understanding of symmetry breaking.
Sibling fixed effects (FE) models are useful for estimating causal treatment effects while offsetting unobserved sibling-invariant confounding. However, treatment estimates are biased if an individual's outcome affects their sibling's outcome. We propose a robustness test for assessing the presence of outcome-to-outcome interference in linear two-sibling FE models. We regress a gain-score--the difference between siblings' continuous outcomes--on both siblings' treatments and on a pre-treatment observed FE. Under certain restrictions, the observed FE's partial regression coefficient signals the presence of outcome-to-outcome interference. Monte Carlo simulations demonstrated the robustness test under several models. We found that an observed FE signaled outcome-to-outcome spillover if it was directly associated with an sibling-invariant confounder of treatments and outcomes, directly associated with a sibling's treatment, or directly and equally associated with both siblings' outcomes. However, the robustness test collapsed if the observed FE was directly but differentially associated with siblings' outcomes or if outcomes affected siblings' treatments.
A hard challenge in developing practical face recognition (FR) attacks is due to the black-box nature of the target FR model, i.e., inaccessible gradient and parameter information to attackers. While recent research took an important step towards attacking black-box FR models through leveraging transferability, their performance is still limited, especially against online commercial FR systems that can be pessimistic (e.g., a less than 50% ASR--attack success rate on average). Motivated by this, we present Sibling-Attack, a new FR attack technique for the first time explores a novel multi-task perspective (i.e., leveraging extra information from multi-correlated tasks to boost attacking transferability). Intuitively, Sibling-Attack selects a set of tasks correlated with FR and picks the Attribute Recognition (AR) task as the task used in Sibling-Attack based on theoretical and quantitative analysis. Sibling-Attack then develops an optimization framework that fuses adversarial gradient information through (1) constraining the cross-task features to be under the same space, (2) a joint-task meta optimization framework that enhances the gradient compatibility among tasks, and (3) a cross-task gradient stabilization method which mitigates the oscillation effect during attacking. Extensive experiments demonstrate that Sibling-Attack outperforms state-of-the-art FR attack techniques by a non-trivial margin, boosting ASR by 12.61% and 55.77% on average on state-of-the-art pre-trained FR models and two well-known, widely used commercial FR systems.
We prove several results about three families of graphs. For queen graphs, defined from the usual moves of a chess queen, we find the edge-chromatic number in almost all cases. In the unproved case, we have a conjecture supported by a vast amount of computation, which involved the development of a new edge-coloring algorithm. The conjecture is that the edge-chromatic number is the maximum degree, except when simple arithmetic forces the edge-chromatic number to be one greater than the maximum degree. For Mycielski graphs, we strengthen an old result that the graphs are Hamiltonian by showing that they are Hamilton-connected (except M(3), which is a cycle). For Keller graphs G(d), we establish, in all cases, the exact value of the chromatic number, the edge-chromatic number, and the independence number, and we get the clique covering number in all cases except 5 <= d <= 7. We also investigate Hamiltonian decompositions of Keller graphs, obtaining them up to G(6).