Show newer

The dimension spectrum of the infinitely generated Apollonian gasket arxiv.org/abs/2504.17835

Heat kernels, intrinsic contractivity and ergodicity of discrete-time Markov chains killed by potentials arxiv.org/abs/2504.17879

Heat kernels, intrinsic contractivity and ergodicity of discrete-time Markov chains killed by potentials

We study discrete-time Markov chains on countably infinite state spaces, which are perturbed by rather general confining (i.e.\ growing at infinity) potentials. Using a discrete-time analogue of the classical Feynman--Kac formula, we obtain two-sided estimates for the $n$-step heat kernels $u_n(x,y)$ of the perturbed chain. These estimates are of the form $u_n(x,y)\asymp λ_0^nϕ_0(x)\widehatϕ_0(y)+F_n(x,y)$, where $ϕ_0$ (and $\widehatϕ_0$) are the (dual) eigenfunctions for the lowest eigenvalue $λ_0$; the perturbation $F_n(x,y)$ is explicitly given, and it vanishes if either $x$ or $y$ is in a bounded set. The key assumptions are that the chain is uniformly lazy and that the \enquote{direct step property} (DSP) is satisfied. This means that the chain is more likely to move from state $x$ to state $y$ in a single step rather than in two or more steps. Starting from the form of the heat kernel estimate, we define the intrinsic (or ground-state transformed) chains and we introduce time-dependent ultracontractivity notions -- asymptotic and progressive intrinsic ultracontractivity -- which we can link to the growth behaviour of the confining potential; this allows us to consider arbitrarily slow growing potentials. These new notions of ultracontractivity also lead to a characterization of uniform (quasi-)ergodicity of the perturbed and the ground-state transformed Markov chains. At the end of the paper, we give various examples that illustrate how our findings relate to existing models, e.g.\ nearest-neighbour walks on infinite graphs, subordinate processes or non-reversible Markov chains.

arXiv.org

Multivariate Newton Interpolation in Downward Closed Spaces Reaches the Optimal Geometric Approximation Rates for Bos--Levenberg--Trefethen Functions arxiv.org/abs/2504.17899

Multivariate Newton Interpolation in Downward Closed Spaces Reaches the Optimal Geometric Approximation Rates for Bos--Levenberg--Trefethen Functions

We extend the univariate Newton interpolation algorithm to arbitrary spatial dimensions and for any choice of downward-closed polynomial space, while preserving its quadratic runtime and linear storage cost. The generalisation supports any choice of the provided notion of non-tensorial unisolvent interpolation nodes, whose number coincides with the dimension of the chosen-downward closed space. Specifically, we prove that by selecting Leja-ordered Chebyshev-Lobatto or Leja nodes, the optimal geometric approximation rates for a class of analytic functions -- termed Bos--Levenberg--Trefethen functions -- are achieved and extend to the derivatives of the interpolants. In particular, choosing Euclidean degree results in downward-closed spaces whose dimension only grows sub-exponentially with spatial dimension, while delivering approximation rates close to, or even matching those of the tensorial maximum-degree case, mitigating the curse of dimensionality. Several numerical experiments demonstrate the performance of the resulting multivariate Newton interpolation compared to state-of-the-art alternatives and validate our theoretical results.

arXiv.org

Higher Koszul duality and $n$-affineness arxiv.org/abs/2504.16935

Higher Koszul duality and $n$-affineness

We study $\mathbb{E}_n$-Koszul duality for pairs of algebras of the form $\mathrm{C}_{\bullet}(Ω^{n}_*X;\Bbbk) \leftrightarrow \mathrm{C}^{\bullet}(X;\Bbbk)$, and the closely related question of $n$-affineness for Betti stacks. It was expected, but not known, that $\mathbb{E}_n$-Koszul duality should induce a kind of Morita equivalence between categories of iterated modules. We establish this rigorously by proving that the $(\infty,n)$-category of iterated modules over $\mathrm{C}_{\bullet}(Ω_*^{n+1}X;\Bbbk)$ is equivalent to the $(\infty,n)$-category of quasi-coherent sheaves of $(\infty,n-1)$-categories on $\mathrm{cSpec}(\mathrm{C}^{\bullet}(X;\Bbbk))$, where $\mathrm{cSpec}(\mathrm{C}^{\bullet}(X;\Bbbk))$ is the cospectrum of $\mathrm{C}^{\bullet}(X;\Bbbk)$. By the monodromy equivalence, these categories are also equivalent to the category of higher local systems on $X$, $n\mathbf{LocSysCat}^{n-1}(X;\Bbbk)$. Our result is new already in the classical case $n=1$, although it can be seen to recover well known formulations of $\mathbb{E}_1$-Koszul duality as a Morita equivalence of module categories (up to appropriate completions of the $t$-structures). We also investigate (higher) affineness properties of Betti stacks. We give a complete characterization of $n$-affine Betti stacks, in terms of the $0$-affineness of their iterated loop space. As a consequence, we prove that $n$-truncated Betti stacks are $n$-affine; and that $π_{n+1}(X)$ is an obstruction to $n$-affineness.

arXiv.org

A Coding-Enhanced Jamming Approach for Secure Semantic Communication over Wiretap Channels arxiv.org/abs/2504.16960 .IV .IT

A Coding-Enhanced Jamming Approach for Secure Semantic Communication over Wiretap Channels

As semantic communication (SemCom) gains increasing attention as a novel communication paradigm, ensuring the security of transmitted semantic information over open wireless channels becomes crucial. Existing secure SemCom solutions often lack explicit control over security. To address this, we propose a coding-enhanced jamming approach for secure SemCom over wiretap channels. This approach integrates deep joint source and channel coding (DeepJSCC) with neural network-based digital modulation, enabling controlled jamming through two-layer superposition coding. The outer constellation sequence encodes the source image, while the inner constellation sequence, derived from a secret image, acts as the jamming signal. By minimizing the mutual information between the outer and inner constellation sequences, the jamming effect is enhanced. The jamming signal is superposed on the outer constellation sequence, preventing the eavesdropper from recovering the source image. The power allocation coefficient (PAC) in the superposition coding can be adjusted to control system security. Experiments show that our approach matches existing methods in security while significantly improving reconstruction performance across varying channel signal-to-noise ratios (SNRs) and compression ratios.

arXiv.org

Uniform treatments of Bernoulli numbers, Stirling numbers, and their generating functions arxiv.org/abs/2504.16965

Uniform treatments of Bernoulli numbers, Stirling numbers, and their generating functions

In this paper, by virtue of a determinantal formula for derivatives of the ratio between two differentiable functions, in view of the Faà di Bruno formula, and with the help of several identities and closed-form formulas for the partial Bell polynomials $\operatorname{B}_{n,k}$, the author establishes thirteen Maclaurin series expansions of the functions \begin{align*} &\ln\frac{\operatorname{e}^x+1}{2}, && \ln\frac{\operatorname{e}^x-1}{x}, && \ln\cosh x, \\ &\ln\frac{\sinh x}{x}, && \biggl[\frac{\ln(1+x)}{x}\biggr]^r, && \biggl(\frac{\operatorname{e}^x-1}{x}\biggr)^r \end{align*} for $r=\pm\frac{1}{2}$ and $r\in\mathbb{R}$ in terms of the Dirichlet eta function $η(1-2k)$, the Riemann zeta function $ζ(1-2k)$, and the Stirling numbers of the first and second kinds $s(n,k)$ and $S(n,k)$. presents four determinantal expressions and three recursive relations for the Bernoulli numbers $B_{2n}$. finds out three closed-form formulas for the Bernoulli numbers $B_{2n}$ and the generalized Bernoulli numbers $B_n^{(r)}$ in terms of the Stirling numbers of the second kind $S(n,k)$, and deduce two combinatorial identities for the Stirling numbers of the second kind $S(n,k)$. acquires two combinatorial identities, which can be regarded as diagonal recursive relations, involving the Stirling numbers of the first and second kinds $s(n,k)$ and $S(n,k)$. recovers an integral representation and a closed-form formula, and establish an alternative explicit and closed-form formula, for the Bernoulli numbers of the second kind $b_n$ in terms of the Stirling numbers of the first kind $s(n,k)$. obtains three identities connecting the Stirling numbers of the first and second kinds $s(n,k)$ and $S(n,k)$.

arXiv.org

Relationship between H\"{o}lder Divergence and Functional Density Power Divergence: Intersection and Generalization arxiv.org/abs/2504.17008 .IT

Relationship between Hölder Divergence and Functional Density Power Divergence: Intersection and Generalization

In this study, we discuss the relationship between two families of density-power-based divergences with functional degrees of freedom -- the Hölder divergence and the functional density power divergence (FDPD) -- based on their intersection and generalization. These divergence families include the density power divergence and the $γ$-divergence as special cases. First, we prove that the intersection of the Hölder divergence and the FDPD is limited to a general divergence family introduced by Jones et al. (Biometrika, 2001). Subsequently, motivated by the fact that Hölder's inequality is used in the proofs of nonnegativity for both the Hölder divergence and the FDPD, we define a generalized divergence family, referred to as the $ξ$-Hölder divergence. The nonnegativity of the $ξ$-Hölder divergence is established through a combination of the inequalities used to prove the nonnegativity of the Hölder divergence and the FDPD. Furthermore, we derive an inequality between the composite scoring rules corresponding to different FDPDs based on the $ξ$-Hölder divergence. Finally, we prove that imposing the mathematical structure of the Hölder score on a composite scoring rule results in the $ξ$-Hölder divergence.

arXiv.org

Universal Methods for Nonlinear Spectral Problems arxiv.org/abs/2504.17012

Universal Methods for Nonlinear Spectral Problems

Nonlinear spectral problems arise across a range of fields, including mechanical vibrations, fluid-solid interactions, and photonic crystals. Discretizing infinite-dimensional nonlinear spectral problems often introduces significant computational challenges, particularly spectral pollution and invisibility, which can distort or obscure the true underlying spectrum. We present the first general, convergent computational method for computing the spectra and pseudospectra of nonlinear spectral problems. Our approach uses new results on nonlinear injection moduli and requires only minimal continuity assumptions: specifically, continuity with respect to the gap metric on operator graphs, making it applicable to a broad class of problems. We use the Solvability Complexity Index (SCI) hierarchy, which has recently been used to resolve the classical linear problem, to systematically classify the computational complexity of nonlinear spectral problems. Our results establish the optimality of the method and reveal that Hermiticity does not necessarily simplify the computational complexity of these nonlinear problems. Comprehensive examples -- including nonlinear shifts, Klein--Gordon equations, wave equations with acoustic boundary conditions, time-fractional beam equations, and biologically inspired delay differential equations -- demonstrate the robustness, accuracy, and broad applicability of our methodology.

arXiv.org
Show older
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.