This is a experimental project. Feel free to send feedback!
Thesis Tide ranks papers based on their relevance to the fields, with the goal of making it easier to find the most relevant papers. It uses AI to analyze the content of papers and rank them!
In this paper, we focus on (no)existence and asymptotic behavior of solutions for the double critical Maxwell equation involving with the Hardy, Hardy-Sobolev, Sobolev critical exponents. The existenc...
Useful Fields:
Microswimmers play an important role in shaping the world around us. The squirmer is a simple model for microswimmer whose cilia oscillations on its spherical surface induce an effective slip velocity...
Useful Fields:
Recommender systems (RS) play a critical role in delivering personalized content across various online platforms, leveraging collaborative filtering (CF) as a key technique to generate recommendations...
Useful Fields:
We present the application of the image coaddition algorithm, Up-sampling and PSF Deconvolution Coaddition (UPDC), for stacking multiple exposure images captured by the James Webb Space Telescope (JWS...
Useful Fields:
Designing integrated circuits involves substantial complexity, posing challenges in revealing its potential applications - from custom digital cells to analog circuits. Despite extensive research over...
Useful Fields:
Graph generation is one of the most challenging tasks in recent years, and its core is to learn the ground truth distribution hiding in the training data. However, training data may not be available d...
Useful Fields:
We introduce, for the first time, a cohomology-based Gromov-Hausdorff ultrametric method to analyze 1-dimensional and higher-dimensional (co)homology groups, focusing on loops, voids, and higher-dimen...
Useful Fields:
An important aspect of deploying face recognition (FR) algorithms in real-world applications is their ability to learn new face identities from a continuous data stream. However, the online training o...
Useful Fields:
This paper studies the application of the DDPG algorithm in trajectory-tracking tasks and proposes a trajectorytracking control method combined with Frenet coordinate system. By converting the vehicle...
Useful Fields:
We develop rigorous approximation and near optimality results for the optimal control of a system which is connected to a controller over a finite rate noiseless channel. While structural results on t...
Useful Fields:
We analyze the effect that online algorithms have on the environment that they are learning. As a motivation, consider recommendation systems that use online algorithms to learn optimal product recomm...
Useful Fields:
Recent advances in semiconductor spin qubits have achieved linear arrays exceeding ten qubits. Moving to two-dimensional (2D) qubit arrays is a critical next step to advance towards fault-tolerant imp...
Useful Fields:
Topological Data Analysis (TDA) has recently gained significant attention in the field of financial prediction. However, the choice of point cloud construction methods, topological feature representat...
Useful Fields:
In harmonic analysis, studies of inequalities of Riesz potential in various function spaces have a very important place. Variable exponent Morrey type spaces and the examines of the boundedness of suc...
Useful Fields:
This paper presents a novel training matrix design for spatial modulation (SM) systems, by introducing a new class of two-dimensional (2D) arrays called sparse zero correlation zone (SZCZ) arrays. An ...
Useful Fields:
We establish a family of inequalities that hold true on any points in any space. We prove that the validity of these inequalities does not follow from any propert...
Useful Fields:
Effective iterative decoding of short BCH codes faces two primary challenges: identifying an appropriate parity-check matrix and accelerating decoder convergence. To address these issues, we propose a...
Useful Fields:
We consider a random walk in an i.i.d. random environment on Zd and study properties of its large deviation rate function at the origin. It was proved by Comets, Gantert and Zeitouni in dimension d = ...
Useful Fields:
The escalating threat of phishing emails has become increasingly sophisticated with the rise of Large Language Models (LLMs). As attackers exploit LLMs to craft more convincing and evasive phishing em...
Useful Fields:
Deep learning (DL) methods have shown remarkable successes in medical image segmentation, often using large amounts of annotated data for model training. However, acquiring a large number of diverse l...
Useful Fields: