This is a experimental project. Feel free to send feedback!
Thesis Tide ranks papers based on their relevance to the fields, with the goal of making it easier to find the most relevant papers. It uses AI to analyze the content of papers and rank them!
A simple and fast radiochemical procedure for the sequential extraction of U, Np and Pu from small-volume seawater samples (<10 L) is presented. The method has been developed and optimize...
Useful Fields:
With the increased use of the internet and social networks for online discussions, the spread of toxic and inappropriate content on social networking sites has also increased. Several studies have bee...
Useful Fields:
We report a detailed study of soft-point-contact spectroscopy of the superconducting topological nodal-line semimetal SnNbSe with the superconducting transition tempe...
Useful Fields:
The multimodal language models (MLMs) based on generative pre-trained Transformer are considered powerful candidates for unifying various domains and tasks. MLMs developed for remote sensing (RS) have...
Useful Fields:
This study conducts a systematic assessment of the capabilities of 12 machine learning models and model variations in detecting economic ideology. As an evaluation benchmark, I use manifesto data span...
Useful Fields:
Low-Light Image Enhancement (LLIE) is a key task in computational photography and imaging. The problem of enhancing images captured during night or in dark environments has been well-studied in the im...
Useful Fields:
Implications of general properties of quantum field theory, such as causality, unitarity, and locality include constraints on the couplings of the effective field theory (EFT) coefficients. These cons...
Useful Fields:
Recent advances in wireless technologies have given rise to the emergence of vehicular ad hoc networks (VANETs). In such networks, the limited coverage of WiFi and the high mobility of the nodes gener...
Useful Fields:
Recent advances in van der Waals heterostructures have opened the new frontier of moiré physics, whereby tuning the interlayer twist angle or adjusting lattice parameter mismatch have led to a plethor...
Useful Fields:
The tunneling potential formalism, an alternative to the standard Coleman Euclidean approach, offers in a natural way a unified view of vacuum decays. In particular, I show in this talk how Coleman...
Useful Fields:
Peer-to-peer energy trading platforms enable direct electricity exchanges between peers who belong to the same energy community. In a semi-decentralized system, a community manager adheres to grid res...
Useful Fields:
Hypothesis exclusion is an information-theoretic task in which an experimenter aims at ruling out a false hypothesis from a finite set of known candidates, and an error occurs if and only if the hypot...
Useful Fields:
Under a condition that breaks the volume doubling barrier, we obtain a time polynomial structure result on the space of ancient caloric functions with polynomial growth on manifolds. As a byproduct,...
Useful Fields:
A code is said to be equidistant if the distance between any two distinct codewords of the code is the same. In this paper, we have studied equidistant single-orbit cyclic and quasi-cyclic subspace co...
Useful Fields:
Many non-traditional students in cybersecurity programs often lack access to advice from peers, family members and professors, which can hinder their educational experiences. Additionally, these stude...
Useful Fields:
It is well-known that the conditional mutual information of a quantum state is zero if, and only if, the quantum state is a quantum Markov chain. Replacing the Umegaki relative entropy in the definiti...
Useful Fields:
Values or principles are key elements of human society that influence people to behave and function according to an accepted standard set of social rules to maintain social order. As AI systems are be...
Useful Fields:
We present the e-Llama models: 8 billion and 70 billion parameter large language models that are adapted towards the e-commerce domain. These models are meant as foundation models with deep knowledge ...
Useful Fields:
For privacy and security concerns, the need to erase unwanted information from pre-trained vision models is becoming evident nowadays. In real-world scenarios, erasure requests originate at any time f...
Useful Fields:
For many applications, it is convenient to have good upper bounds for the norm of the inverse of a given matrix. In this paper, we obtain such bounds when A is a Nekrasov matrix, by means of a scaling...
Useful Fields: