### Congruences of algebraic automorphic forms and supercuspidal representations

Let $G$ be a connected reductive group over a totally real field $F$ which is compact modulo center at archimedean places. We find congruences modulo an arbitrary power of p between the space of arbitrary automorphic forms on $G(\mathbb A_F)$ and that of automorphic forms with supercuspidal components at p, provided that p is larger than the Coxeter number of the absolute Weyl group of $G$. We illustrate how such congruences can be applied in the construction of Galois representations. Our proof is based on type theory for representations of p-adic groups, generalizing the prototypical case of GL(2) in [arXiv:1506.04022, Section 7] to general reductive groups. We exhibit a plethora of new supercuspidal types consisting of arbitrarily small compact open subgroups and characters thereof. We expect these results of independent interest to have further applications. For example, we extend the result by Emerton--Pa\v{s}k\=unas on density of supercuspidal points from definite unitary groups to general $G$ as above.

### Congruences on K-theoretic Gromov--Witten invariants

We study K-theoretic Gromov--Witten invariants of projective hypersurfaces using a virtual localization formula under finite group actions. In particular, it provides all K-theoretic Gromov--Witten invariants of the quintic threefold modulo 41, up to genus 19 and degree 40. Applying the same idea to a K-theoretic version of FJRW theory, we determine it modulo 41 for the quintic polynomial with minimal group and narrow insertions, in every genus.

### An improved existence criterion and an optimal result

We are concerned with a semi-linear elliptic equation on a smooth bounded domain $\Omega$ of $\mathbb{R}^n,\,n\geq 5,$ which involves a critical nonlinearity and a linear term of the form $K(x)u^{(n+2)/(n-2)}$ and $\mu u,$ respectively. By using a test function procedure, we give an existence criterion involving the parameter $\mu$ and the function $K(x).$ For a particular case of $\Omega,\,K(x)$ and $n,$ we prove its optimality through a Pohozaev type identity.

### $C^*$-correspondence functoriality of Cuntz-Pimsner algebras

We construct a functor that maps $C^*$-correspondences to their Cuntz-Pimsner algebras. The objects in our domain category are $C^*$-correspondences, and the morphisms are the isomorphism classes of $C^*$-correspondences satisfying certain conditions. As an application, we recover a well-known result of Muhly and Solel. In fact, we show that functoriality leads us to a more generalized result: strongly Morita equivalent $C^*$-correspondences have Morita equivalent Cuntz-Pimsner algebras.

### Finite elements for Helmholtz equations with a nonlocal boundary condition

Numerical resolution of exterior Helmholtz problems requires some approach to domain truncation. As an alternative to approximate nonreflecting boundary conditions and invocation of the Dirichlet-to-Neumann map, we introduce a new, nonlocal boundary condition. This condition is exact and requires the evaluation of layer potentials involving the free space Green's function. However, it seems to work in general unstructured geometry, and Galerkin finite element discretization leads to convergence under the usual mesh constraints imposed by G{\aa}rding-type inequalities. The nonlocal boundary conditions are readily approximated by fast multipole methods, and the resulting linear system can be preconditioned by the purely local operator involving transmission boundary conditions.

### [6] 2009.08494

This letter proposes a pragmatic link adaptation algorithm considering power density offsets (PDOs) for next-generation uplink wireless channels. The proposed algorithm consists of PDO calculation between a physical uplink shared channel and its associated sounding reference signal, key channel state metric generation, and modulation and coding scheme (MCS) adaptation with respect to the PDO. Scaling is applied to estimated channel matrices based on multiple reference PDO points to generate corresponding reference mutual information (MI) values, followed by interpolation or extrapolation to obtain the adapted MI and ultimately MCS. The proposed algorithm has low complexity in terms of hardware implementation, while yielding satisfactory block error rates and throughput for a wide range of PDOs as shown by simulation results.

### A consequence of the relative Bogomolov conjecture

We propose a formulation of the relative Bogomolov conjecture and show that it gives an affirmative answer to a question of Mazur's concerning the uniformity of the Mordell-Lang conjecture for curves. In particular we show that the relative Bogomolov conjecture implies the uniform Manin-Mumford conjecture for curves. The proof is built up on our previous work "Uniformity in Mordell-Lang for curves".

### Intelligent Reflecting Surface Aided Pilot Contamination Attack and Its Countermeasure

Pilot contamination attack (PCA) in a time division duplex wireless communication system is considered, where an eavesdropper (Eve) attacks the reverse pilot transmission phase in order to wiretap the data transmitted from a transmitter, Alice, to a receiver, Bob. We propose a new PCA scheme for Eve, wherein Eve does not emit any signal by itself but uses an intelligent reflecting surface (IRS) to reflect the pilot sent by Bob to Alice. The proposed new PCA scheme, referred to as IRS-PCA, increases the signal leakage from Alice to the IRS during the data transmission phase, which is then reflected by the IRS to Eve in order to improve the wiretapping capability of Eve. The proposed IRS-PCA scheme disables many existing countermeasures on PCA due to the fact that with IRS-PCA, Eve no longer needs to know the pilot sequence of Bob, and therefore, poses severe threat to the security of the legitimate wireless communication system. In view of this, the problems of 1) IRS-PCA detection and 2) secure transmission under IRSPCA are considered in this paper. For IRS-PCA detection, a generalized cumulative sum (GCUSUM) detection procedure is proposed based on the framework of quickest detection, aiming at detecting the occurrence of IRS-PCA as soon as possible once it occurs. For secure transmission under IRS-PCA, a cooperative channel estimation scheme is proposed to estimate the channel of the IRS, based on which zero-forcing beamforming is designed to reduce signal leakage.

### A computational framework for evaluating the role of mobility on the propagation of epidemics on point processes

This paper is focused on SIS epidemic dynamics (also known as the contact process) on stationary Poisson point processes of the Euclidean plane, when the infection rate of a susceptible point is proportional to the number of infected points in a ball around it. Two models are discussed, the first with a static point process, and the second where points are subject to some random motion. For both models, we use conservation equations for moment measures to analyze the stationary point processes of infected and susceptible points. A heuristic factorization of the third moment measure is then proposed to derive simple polynomial equations allowing one to derive closed form approximations for the fraction of infected nodes and the steady state. These polynomial equations also lead to a phase diagram which tentatively delineates the regions of the space of parameters (population density, infection radius, infection and recovery rate, and motion rate) where the epidemic survives and those where there is extinction. According to this phase diagram, the survival of the epidemic is not always an increasing function of the motion rate. These results are substantiated by simulations on large two dimensional tori. These simulations show that the polynomial equations accurately predict the fraction of infected nodes when the epidemic survives. The phase diagram is also partly substantiated by the simulation of the mean survival time of the epidemic on large tori. The phase diagram accurately predicts the parameter regions where the mean survival time increases or decreases with the motion rate.

### Skein lasagna modules for 2-handlebodies

Morrison, Walker, and Wedrich used the blob complex to construct a generalization of Khovanov-Rozansky homology to links in the boundary of a 4-manifold. The degree zero part of their theory, called the skein lasagna module, admits an elementary definition in terms of certain diagrams in the 4-manifold. We give a description of the skein lasagna module for 4-manifolds without 1- and 3-handles, and present some explicit calculations for disk bundles over $S^2$.

### Riesz bases of port-Hamiltonian systems

The location of the spectrum and the Riesz basis property of well-posed homogeneous infinite-dimensional linear port-Hamiltonian systems on a 1D spatial domain are studied. It is shown that the Riesz basis property is equivalent to the fact that system operator generates a strongly continuous group. Moreover, in this situation the spectrum consists of eigenvalues only, located in a strip parallel to the imaginary axis and they can decomposed into finitely many sets having each a uniform gap.

### A categorical sl_2 action on some moduli spaces of sheaves

We study certain sequences of moduli spaces of sheaves on K3 surfaces, building on work of Markman. We show that these sequences can be given the structure of a geometric categorical sl_2 action in the sense of Cautis, Kamnitzer, and Licata. As a corollary, we get an equivalence between derived categories of some moduli spaces that are birational via stratified Mukai flops.

### The equivariant cohomology for semidirect product actions

The rational Borel equivariant cohomology for actions of a compact connected Lie group is determined by restriction of the action to a maximal torus. We show that a similar reduction holds for any compact Lie group $G$ when there is a closed subgroup $K$ such that the cohomology of the classifying space $BK$ is free over the cohomology of $BG$ for field coefficients. We study the particular case when $G$ is a semi-direct product and $K$ is its maximal elementary abelian 2-subgroup for cohomology with coefficients in a field of characteristic two. This provides a different approach to investigate the syzygy order of the equivariant cohomology of a space with a torus action and a compatible involution, and we relate this description with results for 2-torus actions.

### Realizations of non-commutative rational functions around a matrix centre, II: The lost-abbey conditions

In a previous paper the authors generalized classical results of minimal realizations of non-commutative (nc) rational functions, using nc Fornasini--Marchesini realizations which are centred at an arbitrary matrix point. In particular, it was proved that the domain of regularity of a nc rational function is contained in the invertibility set of a corresponding pencil of any minimal realization of the function. In this paper we prove an equality between the domain of a nc rational function and the domain of any of its minimal realizations. As for evaluations over stably finite algebras, we show that the domain of the realization w.r.t any such algebra coincides with the so called matrix domain of the function w.r.t the algebra. As a corollary we show that the domain of regularity and the stable extended domain coincide. In contrary to both the classical case and the scalar case -- where every matrix coefficients which satisfy the controllability and observability conditions can appear in a minimal realization of a nc rational function -- the matrix coefficients in our case have to satisfy certain equations, called linearized lost-abbey conditions, which are related to Taylor--Taylor expansions in nc function theory.

### The quotient criterion in equivariant cohomology for elementary $2$-abelian group actions

Let $G$ be a 2-elementary abelian group and $X$ be a manifold with a locally standard action of $G$. We provide a criterion to determine the syzygy order of the $G$-equivariant cohomology of $X$ with coefficients over a field of characteristic two using a complex associated to the cohomology of the face filtration of the manifold with corners $X/G$. This result is the real version of the quotient criterion for locally standard torus actions developed by M. Franz in arXiv:1205.4462z .

### Positive Solutions For a Schrödinger-Bopp-Podolsky system in $\mathbb R^{3}$

We consider the following Schr\"odinger-Bopp-Podolsky system in $\mathbb R^{3}$ $$\left\{ \begin{array}{c} -\varepsilon^{2} \Delta u + V(x)u + \phi u = f(u)\\ -\varepsilon^{2} \Delta \phi + \varepsilon^{4} \Delta^{2}\phi = 4\pi u^{2}\\ \end{array} \right.$$ where $\varepsilon > 0$ with $V:\mathbb{R}^{3} \rightarrow \mathbb{R}, f:\mathbb{R} \rightarrow \mathbb{R}$ satisfy suitable assumptions. By using variational methods, we prove that the number of positive solutions is estimated below by the Ljusternick-Schnirelmann category of $M$, the set of minima of the potential $V$.

### Radio number of Hamming graphs of diameter 3

For $G$ a simple, connected graph, a vertex labeling $f:V(G)\rightarrow \mathbb{Z}_+$ is called a $\textit{radio labeling of}$ $G$ if it satisfies $|f(u)-f(v)|\geq \operatorname{diam}(G) + 1 - d(u,v)$ for all distinct vertices $u,v\in V(G)$. The $\textit{radio number}$ of $G$ is the minimal span over all radio labelings of $G$. If a bijective radio labeling onto $\{1,2,...,|V(G)|\}$ exists, $G$ is called a $\textit{radio graceful graph}$. We determine the radio number of all diameter $3$ Hamming graphs and show that an infinite subset of them is radio graceful.

### Numerical Testing of a New Positivity-Preserving Interpolation Algorithm

An important component of a number of computational modeling algorithms is an interpolation method that preserves the positivity of the function being interpolated. This report describes the numerical testing of a new positivity-preserving algorithm that is designed to be used when interpolating from a solution defined on one grid to different spatial grid. The motivating application is a numerical weather prediction (NWP) code that uses spectral elements as the discretization choice for its dynamics core and Cartesian product meshes for the evaluation of its physics routines. This combination of spectral elements, which use nonuniformly spaced quadrature/collocation points, and uniformly-spaced Cartesian meshes combined with the desire to maintain positivity when moving between these necessitates our work. This new approach is evaluated against several typical algorithms in use on a range of test problems in one or more space dimensions. The results obtained show that the new method is competitive in terms of observed accuracy while at the same time preserving the underlying positivity of the functions being interpolated.

### A stabilizer free weak Galerkin finite element method on polytopal mesh: Part III

A weak Galerkin (WG) finite element method without stabilizers was introduced in [J. Comput. Appl. Math., 371 (2020). arXiv:1906.06634] on polytopal mesh. Then it was improved in [arXiv:2008.13631] with order one superconvergence. The goal of this paper is to develop a new stabilizer free WG method on polytopal mesh. This method has convergence rates two orders higher than the optimal convergence rates for the corresponding WG solution in both an energy norm and the $L^2$ norm. The numerical examples are tested for low and high order elements in two and three dimensional spaces.

### Deformations of Hopf algebras by partial actions

In this work we study the deformation of a Hopf algebra $H$ by a partial action of $H$ on its ground field $\Bbbk$ through the partial smash product algebra $\underline{\Bbbk # H}$. We introduce the concept of $\lambda$-Hopf algebra such as a Hopf algebra obtained as a partial smash product algebra, as well as we show that, indeed, every Hopf algebra is a $\lambda$-Hopf algebra. Moreover, we develop a method to compute partial actions of a given Hopf algebra on its ground field and, as an application, we exhibit all partial actions of such type for some families of Hopf algebras.

### The Poincare lemma for codifferential, anticoexact forms, and applications to physics

The linear homotopy theory for codifferential operator on Riemannian manifolds is developed in analogy to the theory for exterior derivative. A new class of anticoexact forms that exist locally in a star-shaped region is defined. Their application to physics, including vacuum Dirac-K\"{a}hler equation, coupled Maxwell-Kalb-Ramond system of equations occurring in a bosonic string theory and its reduction to the Dirac equation, is presented.

### Practical Dynamic SC-Flip Polar Decoders: Algorithm and Implementation

SC-Flip (SCF) is a low-complexity polar code decoding algorithm with improved performance, and is an alternative to high-complexity (CRC)-aided SC-List (CA-SCL) decoding. However, the performance improvement of SCF is limited since it can correct up to only one channel error ($\omega=1$). Dynamic SCF (DSCF) algorithm tackles this problem by tackling multiple errors ($\omega \geq 1$), but it requires logarithmic and exponential computations, which make it infeasible for practical applications. In this work, we propose simplifications and approximations to make DSCF practically feasible. First, we reduce the transcendental computations of DSCF decoding to a constant approximation. Then, we show how to incorporate special node decoding techniques into DSCF algorithm, creating the Fast-DSCF decoding. Next, we reduce the search span within the special nodes to further reduce the computational complexity. Following, we describe a hardware architecture for the Fast-DSCF decoder, in which we introduce additional simplifications such as metric normalization and sorter length reduction. All the simplifications and approximations are shown to have minimal impact on the error-correction performance, and the reported Fast-DSCF decoder is the only SCF-based architecture that can correct multiple errors. The Fast-DSCF decoders synthesized using TSMC $65$nm CMOS technology can achieve a $1.25$, $1.06$ and $0.93$ Gbps throughput for $\omega \in \{1,2,3\}$, respectively. Compared to the state-of-the-art fast CA-SCL decoders with equivalent FER performance, the proposed decoders are up to $5.8\times$ more area-efficient. Finally, observations at energy dissipation indicate that the Fast-DSCF is more energy-efficient than its CA-SCL-based counterparts.

### Constructing highly regular expanders from hyperbolic Coxeter groups

A graph $X$ is defined inductively to be $(a_0,\dots,a_{n-1})$-regular if $X$ is $a_0$-regular and for every vertex $v$ of $X$, the sphere of radius $1$ around $v$ is an $(a_1,\dots,a_{n-1})$-regular graph. Such a graph $X$ is said to be highly regular (HR) of level $n$ if $a_{n-1}\neq 0$. Chapman, Linial and Peled studied HR-graphs of level 2 and provided several methods to construct families of graphs which are expanders "globally and locally". They ask whether such HR-graphs of level 3 exist. In this paper we show how the theory of Coxeter groups, and abstract regular polytopes and their generalisations, can lead to such graphs. Given a Coxeter system $(W,S)$ and a subset $M$ of $S$, we construct highly regular quotients of the 1-skeleton of the associated Wythoffian polytope $\mathcal{P}_{W,M}$, which form an infinite family of expander graphs when $(W,S)$ is indefinite and $\mathcal{P}_{W,M}$ has finite vertex links. The regularity of the graphs in this family can be deduced from the Coxeter diagram of $(W,S)$. The expansion stems from applying superapproximation to the congruence subgroups of the linear group $W$. This machinery gives a rich collection of families of HR-graphs, with various interesting properties, and in particular answers affirmatively the question asked by Chapman, Linial and Peled.

### On the Enumeration of Sweep-Covers and Their Relation to Raney Numbers

We define a new structure for collections of nodes in trees which are called "Sweep-Covers" for their 'covering' of all the nodes in the tree by some ancestor-descendent relationship. Then, we analyze an algorithm for finding all sweep covers of a given size in any tree. The complexity of the algorithm is analyzed on a class of infinite $\Delta$-ary trees with constant path lengths between the $\Delta$-star internal nodes. The lower bound of the complexity on these infinite trees is proven to be the Raney numbers due to how Raney trees embed onto the infinite trees of bounded out-degree.

### Improved recovery guarantees and sampling strategies for TV minimization in compressive imaging

In this paper, we consider the use of Total Variation (TV) minimization for compressive imaging; that is, image reconstruction from subsampled measurements. Focusing on two important imaging modalities -- namely, Fourier imaging and structured binary imaging via the Walsh--Hadamard transform -- we derive uniform recovery guarantees asserting stable and robust recovery for arbitrary random sampling strategies. Using this, we then derive a class of theoretically-optimal sampling strategies. For Fourier sampling, we show recovery of an image with approximately $s$-sparse gradient from $m \gtrsim_d s \cdot \log^2(s) \cdot \log^4(N)$ measurements, in $d \geq 1$ dimensions. When $d = 2$, this improves the current state-of-the-art result by a factor of $\log(s) \cdot \log(N)$. It also extends it to arbitrary dimensions $d \geq 2$. For Walsh sampling, we prove that $m \gtrsim_d s \cdot \log^2(s) \cdot \log^2(N/s) \cdot \log^3(N)$ measurements suffice in $d \geq 2$ dimensions. To the best of our knowledge, this is the first recovery guarantee for structured binary sampling with TV minimization.

### The Ruelle zeta function at zero for nearly hyperbolic 3-manifolds

We show that for a generic conformal metric perturbation of a hyperbolic 3-manifold $\Sigma$, the order of vanishing of the Ruelle zeta function at zero equals $4-b_1(\Sigma)$, contrary to the hyperbolic case where it is equal to $4-2b_1(\Sigma)$. The result is proved by developing a suitable perturbation theory that exploits the natural pairing between resonant and co-resonant differential forms. To obtain a metric conformal perturbation we need to establish the non-vanishing of the pushforward of a certain product of resonant and co-resonant states and we achieve this by a suitable regularisation argument. Along the way we describe geometrically all resonant differential forms (at zero) for a closed hyperbolic 3-manifold and study the semisimplicity of the Lie derivative.

### Loci of the Brocard Points over Selected Triangle Families

We study the loci of the Brocard points over two selected families of triangles: (i) 2 vertices fixed on a circumference and a third one which sweeps it, (ii) Poncelet 3-periodics in the homothetic ellipse pair. Loci obtained include circles, ellipses, and teardrop-like curves. We derive expressions for both curves and their areas. We also study the locus of the vertices of Brocard triangles over the homothetic and Brocard-poristic Poncelet families.

### Bounds for Learning Lossless Source Coding

This paper asks a basic question: how much training is required to beat a universal source coder? Traditionally, there have been two types of source coders: fixed, optimum coders such as Huffman coders; and universal source coders, such as Lempel-Ziv The paper considers a third type of source coders: learned coders. These are coders that are trained on data of a particular type, and then used to encode new data of that type. This is a type of coder that has recently become very popular for (lossy) image and video coding. The paper consider two criteria for performance of learned coders: the average performance over training data, and a guaranteed performance over all training except for some error probability $P_e$. In both cases the coders are evaluated with respect to redundancy. The paper considers the IID binary case and binary Markov chains. In both cases it is shown that the amount of training data required is very moderate: to code sequences of length $l$ the amount of training data required to beat a universal source coder is $m=K\frac{l}{\log l}$, where the constant in front depends the case considered.

### SISTA: learning optimal transport costs under sparsity constraints

In this paper, we describe a novel iterative procedure called SISTA to learn the underlying cost in optimal transport problems. SISTA is a hybrid between two classical methods, coordinate descent ("S"-inkhorn) and proximal gradient descent ("ISTA"). It alternates between a phase of exact minimization over the transport potentials and a phase of proximal gradient descent over the parameters of the transport cost. We prove that this method converges linearly, and we illustrate on simulated examples that it is significantly faster than both coordinate descent and ISTA. We apply it to estimating a model of migration, which predicts the flow of migrants using country-specific characteristics and pairwise measures of dissimilarity between countries. This application demonstrates the effectiveness of machine learning in quantitative social sciences.

### Observers Design for Inertial Navigation Systems: A Brief Tutorial

The design of navigation observers able to simultaneously estimate the position, linear velocity and orientation of a vehicle in a three-dimensional space is crucial in many robotics and aerospace applications. This problem was mainly dealt with using the extended Kalman filter and its variants which proved to be instrumental in many practical applications. Although practically efficient, the lack of strong stability guarantees of these algorithms motivated the emergence of a new class of geometric navigation observers relying on Riemannian geometry tools, leading to provable strong stability properties. The objective of this brief tutorial is to provide an overview of the existing estimation schemes, as well as some recently developed geometric nonlinear observers, for autonomous navigation systems relying on inertial measurement unit (IMU) and landmark measurements.

### Prism graphs in tropical plane curves

Any smooth tropical plane curve contains a distinguished trivalent graph called its skeleton. In 2020 Morrison and Tewari proved that the so-called big face graphs cannot be the skeleta of tropical curves for genus $12$ and greater. In this paper we answer an open question they posed to extend their result to the prism graphs, proving that they are the skeleton of a smooth tropical plane curve precisely when the genus is at most $11$. Our main tool is a classification of lattice polygons with two points than can simultaneously view all others, without having any one point that can observe all others.

### The Newform $K$-Type and $p$-adic Spherical Harmonics

Let $K := \mathrm{GL}_n(\mathcal{O})$ denote the maximal compact subgroup of $\mathrm{GL}_n(F)$ with $F$ a nonarchimedean local field. We study the decomposition of the space of square-integrable functions on the unit sphere in $F^n$ into irreducible $K$-modules; for $F = \mathbb{Q}_p$, these are the $p$-adic analogues of spherical harmonics. As an application, we characterise the newform and conductor exponent of a generic irreducible admissible smooth representation of $\mathrm{GL}_n(F)$ in terms of distinguished $K$-types. Finally, we compare our results to analogous results in the archimedean setting.

### The Capacity of Multi-user Private Information Retrieval for Computationally Limited Databases

We present a private information retrieval (PIR) scheme that allows a user to retrieve a single message from an arbitrary number of databases by colluding with other users while hiding the desired message index. This scheme is of particular significance when there is only one accessible database -- a special case that turns out to be more challenging for PIR in the multi-database case. The upper bound for privacy-preserving capacity for these scenarios is $C=(1+\frac{1}{S}+\cdots+\frac{1}{S^{K-1}})^{-1}$, where $K$ is the number of messages and $S$ represents the quantity of information sources such as $S=N+U-1$ for $U$ users and $N$ databases. We show that the proposed information retrieval scheme attains the capacity bound even when only one database is present, which differs from most existing works that hinge on the access to multiple databases in order to hide user privacy. Unlike the multi-database case, this scheme capitalizes on the inability for a database to cross-reference queries made by multiple users due to computational complexity.

### Can You Take Komjath's Inaccessible Away

In this paper we aim to compare Kurepa trees and Aronszajn trees. Moreover, we analyze the affect of large cardinal assumptions on this comparison. Using the the method of walks on ordinals, we will show it is consistent with ZFC that there is a Kurepa tree and every Kurepa tree contains a Souslin subtree, if there is an inaccessible cardinal. This is stronger than Komjath's theorem that asserts the same consistency from two inaccessible cardinals. We will show that our large cardinal assumption is optimal, i.e. if every Kurepa tree has an Aronszajn subtree then $\omega_2$ is inaccessible in the constructible universe \textsc{L}. Moreover, we prove it is consistent with ZFC that there is a Kurepa tree $T$ such that if $U \subset T$ is a Kurepa tree with the inherited order from $T$, then $U$ has an Aronszajn subtree. This theorem uses no large cardinal assumption. Our last theorem immediately implies the following: assume $\textrm{MA}_{\omega_2}$ holds and $\omega_2$ is not a Mahlo cardinal in $\textsc{L}$. Then there is a Kurepa tree with the property that every Kurepa subset has an Aronszajn subtree. Our work entails proving a new lemma about Todorcevic's $\rho$ function which might be useful in other contexts.

### Simultaneous Linearization of Diffeomorphisms of Isotropic Manifolds

Suppose that $M$ is a closed isotropic Riemannian manifold and that $R_1,...,R_m$ generate the isometry group of $M$. Let $f_1,...,f_m$ be smooth perturbations of these isometries. We show that the $f_i$ are simultaneously conjugate to isometries if and only if their associated uniform Bernoulli random walk has all Lyapunov exponents zero. This extends a linearization result of Dolgopyat and Krikorian from $S^n$ to real, complex, and quaternionic projective spaces. In addition, we identify and remedy an oversight in that earlier work.

### Galvin's Question on non-$σ$-Well Ordered Total Order

Assume $\mathcal{C}$ is the class of all linear orders $L$ such that $L$ is not a countable union of well ordered sets, and every uncountable subset of $L$ contains a copy of $\omega_1$. We show it is consistent that $\mathcal{C}$ has minimal elements. This answers an old question due to Galvin.

### On the Boomerang Uniformity of Permutations of Low Carlitz Rank

Finding permutation polynomials with low differential and boomerang uniformityis an important topic in S-box designs of many block ciphers. For example, AES chooses the inverse function as its S-box, which is differentially 4-uniform and boomerang 6-uniform. Also there has been considerable research on many non-quadratic permutations which are obtained by modifying certain set of points from the inverse function. In this paper, we give a novel approach that shows that plenty of existing modifications of the inverse function are in fact affine equivalent to permutations of low Carlitz rank and those modifications cannot be APN (almost perfect nonlinear) unless the Carlitz rank is very large. Using nice properties of the permutations of Carlitz form, we present the complete list of permutations of Carlitz rank 3 having the boomerang uniformity six, and also give the complete classification of the differential uniformity of permutations of Carlitz rank 3. We also provide, up to affine equivalence, all the involutory permutations of Carlitz rank 3 having the boomerang uniformity six.

### Conjecture: 100% of elliptic surfaces over $\mathbb{Q}$ have rank zero

Based on an equation for the rank of an elliptic surface over $\mathbb{Q}$ which appears in the work of Nagao, Rosen, and Silverman, we conjecture that 100% of elliptic surfaces have rank $0$ when ordered by the size of the coefficients of their Weierstrass equations, and present a probabilistic heuristic to justify this conjecture. We then discuss how it would follow from either understanding of certain $L$-functions, or from understanding of the local behaviour of the surfaces. Finally, we make a conjecture about ranks of elliptic surfaces over finite fields, and highlight some experimental evidence supporting it.

### On Khovanov Homology of Quasi-Alternating Links

We prove that the length of any gap in the differential grading of the Khovanov homology of any quasi-alternating link is one. As a consequence, we obtain that the length of any gap in the Jones polynomial of any such link is one. This establishes a weaker version of Conjecture 2.3 in [5]. Moreover, we obtain a lower bound for the determinant of any such link in terms of the breadth of its Jones polynomial. This establishes a weaker version of Conjecture 3.8 in [16]. The main tool in obtaining this result is proving the Knight Move Conjecture [2] for the class of quasi-alternating links.

### The Stability of Low-Density Parity-Check Codes and Some of Its Consequences

We study the stability of low-density parity-check (LDPC) codes under blockwise or bitwise maximum $\textit{a posteriori}$ (MAP) decoding, where transmission takes place over a binary-input memoryless output-symmetric channel. Our study stems from the consideration of constructing universal capacity-achieving codes under low-complexity decoding algorithms, where universality refers to the fact that we are considering a family of channels with equal capacity. Consider, e.g., the right-regular sequence by Shokrollahi and the heavy-tail Poisson sequence by Luby $\textit{et al}$. Both sequences are provably capacity-achieving under belief propagation (BP) decoding when transmission takes place over the binary erasure channel (BEC). In this paper we show that many existing capacity-achieving sequences of LDPC codes are not universal under BP decoding. We reveal that the key to showing this non-universality result is determined by the stability of the underlying codes. More concretely, for an ordered and complete channel family and a sequence of LDPC code ensembles, we determine a stability threshold associated with them, which further gives rise to a sufficient condition such that the sequence is not universal under BP decoding. Furthermore, we show that the same stability threshold applies to blockwise or bitwise MAP decoding as well. We present how stability can determine an upper bound on the corresponding blockwise or bitwise MAP threshold, revealing the operational significance of the stability threshold.

### Remarks on some compact symplectic solvmanifolds

We study the hard Lefschetz property on compact symplectic solvmanifolds, i.e., compact quotients $M=\Gamma\backslash G$ of a simply-connected solvable Lie group $G$ by a lattice $\Gamma$, admitting a symplectic structure.

### An integral Suzuki-type fixed point theorem with application

In this paper, we present an integral Suzuki-type fixed point theorem for multivalued mappings defined on a complete metric space in terms of the \'{C}iri\'{c} integral contractions. As an application, we will prove an existence and uniqueness theorem for a functional equation arising in dynamic programming of continuous multistage decision processes.

### Low Density Parity Check Code (LDPC Codes) Overview

This paper basically expresses the core fundamentals and brief overview of the research of R. G. GALLAGER [1] on Low-Density Parity-Check (LDPC) codes and various parameters related to LDPC codes like, encoding and decoding of LDPC codes, code rate, parity check matrix, tanner graph. We also discuss advantages and applications as well as the usage of LDPC codes in 5G technology. We have simulated encoding and decoding of LDPC codes and have acquired results in terms of BER vs SNR graph in MATLAB software. This report was submitted as an assignment in Nirma University

### Global Linear Convergence of Evolution Strategies on More Than Smooth Strongly Convex Functions

Evolution strategies (ESs) are zero-order stochastic black-box optimization heuristics invariant to monotonic transformations of the objective function. They evolve a multivariate normal distribution, from which candidate solutions are generated. Among different variants, CMA-ES is nowadays recognized as one of the state-of-the-art zero-order optimizers for difficult problems. Albeit ample empirical evidence that ESs with a step-size control mechanism converge linearly, theoretical guarantees of linear convergence of ESs have been established only on limited classes of functions. In particular, theoretical results on convex functions are missing, where zero-order and also first order optimization methods are often analyzed. In this paper, we establish almost sure linear convergence and a bound on the expected hitting time of an ES, namely the (1 + 1)-ES with (generalized) one-fifth success rule and an abstract covariance matrix adaptation with bounded condition number, on a broad class of functions. The analysis holds for monotonic transformations of positively homogeneous functions and of quadratically bounded functions, the latter of which particularly includes monotonic transformation of strongly convex functions with Lipschitz continuous gradient. As far as the authors know, this is the first work that proves linear convergence of ES on such a broad class of functions.

### Hybrid Digital-Analog Beamforming and MIMO Radar with OTFS Modulation

Motivated by future automotive applications, we study some joint radar target detection and parameter estimation problems where the transmitter, equipped with a mono-static MIMO radar, wishes to detect multiple targets and then estimate their respective parameters, while simultaneously communicating information data using orthogonal time frequency space (OTFS) modulation. Assuming that the number of radio frequency chains is smaller than the number of antennas over the mmWave frequency band, we design hybrid digital-analog beamforming at the radar transmitter adapted to different operating phases. The first scenario considers a wide angular beam in order to perform the target detection and parameter estimation, while multicasting a common message to all possible active users. The second scenario considers narrow angular beams to send information streams individually to the already detected users and simultaneously keep tracking of their respective parameters. Under this setup, we propose an efficient maximum likelihood scheme combined with hybrid beamforming to jointly perform target detection and parameter estimation. Our numerical results demonstrate that the proposed algorithm is able to reliably detect multiple targets with a sufficient number of antennas and achieves the Cram\'er-Rao lower bound for radar parameter estimation such as delay, Doppler and angle-of-arrival (AoA).

### Additive Models for Symmetric Positive-Definite Matrices, Riemannian Manifolds and Lie groups

In this paper an additive regression model for a symmetric positive-definite matrix valued response and multiple scalar predictors is proposed. The model exploits the abelian group structure inherited from either the Log-Cholesky metric or the Log-Euclidean framework that turns the space of symmetric positive-definite matrices into a Riemannian manifold and further a bi-invariant Lie group. The additive model for responses in the space of symmetric positive-definite matrices with either of these metrics is shown to connect to an additive model on a tangent space. This connection not only entails an efficient algorithm to estimate the component functions but also allows to generalize the proposed additive model to general Riemannian manifolds that might not have a Lie group structure. Optimal asymptotic convergence rates and normality of the estimated component functions are also established. Numerical studies show that the proposed model enjoys superior numerical performance, especially when there are multiple predictors. The practical merits of the proposed model are demonstrated by analyzing diffusion tensor brain imaging data.

### HDGlab: An open-source implementation of the hybridisable discontinuous Galerkin method in MATLAB

This paper presents HDGlab, an open source MATLAB implementation of the hybridisable discontinuous Galerkin (HDG) method. The main goal is to provide a detailed description of both the HDG method for elliptic problems and its implementation available in HDGlab. Ultimately, this is expected to make this relatively new advanced discretisation method more accessible to the computational engineering community. HDGlab presents some features not available in other implementations of the HDG method that can be found in the free domain. First, it implements high-order polynomial shape functions up to degree nine, with both equally-spaced and Fekete nodal distributions. Second, it supports curved isoparametric simplicial elements in two and three dimensions. Third, it supports non-uniform degree polynomial approximations and it provides a flexible structure to devise degree adaptivity strategies. Finally, an interface with the open-source high-order mesh generator Gmsh is provided to facilitate its application to practical engineering problems.

### Automatic Differentiation to Simultaneously Identify Nonlinear Dynamics and Extract Noise Probability Distributions from Data

The sparse identification of nonlinear dynamics (SINDy) is a regression framework for the discovery of parsimonious dynamic models and governing equations from time-series data. As with all system identification methods, noisy measurements compromise the accuracy and robustness of the model discovery procedure. In this work, we develop a variant of the SINDy algorithm that integrates automatic differentiation and recent time-stepping constrained motivated by Rudy et al. for simultaneously (i) denoising the data, (ii) learning and parametrizing the noise probability distribution, and (iii) identifying the underlying parsimonious dynamical system responsible for generating the time-series data. Thus within an integrated optimization framework, noise can be separated from signal, resulting in an architecture that is approximately twice as robust to noise as state-of-the-art methods, handling as much as 40% noise on a given time-series signal and explicitly parametrizing the noise probability distribution. We demonstrate this approach on several numerical examples, from Lotka-Volterra models to the spatio-temporal Lorenz 96 model. Further, we show the method can identify a diversity of probability distributions including Gaussian, uniform, Gamma, and Rayleigh.

### Disordered complex networks: energy optimal lattices and persistent homology

Disordered complex networks are of fundamental interest as stochastic models for information transmission over wireless networks. Well-known networks based on the Poisson point process model have limitations vis-a-vis network efficiency, whereas strongly correlated alternatives, such as those based on random matrix spectra (RMT), have tractability and robustness issues. In this work, we demonstrate that network models based on random perturbations of Euclidean lattices interpolate between Poisson and rigidly structured networks, and allow us to achieve the best of both worlds : significantly improve upon the Poisson model in terms of network efficacy measured by the Signal to Interference plus Noise Ratio (abbrv. SINR) and the related concept of coverage probabilities, at the same time retaining a considerable measure of mathematical and computational simplicity and robustness to erasure and noise. We investigate the optimal choice of the base lattice in this model, connecting it to the celebrated problem optimality of Euclidean lattices with respect to the Epstein Zeta function, which is in turn related to notions of lattice energy. This leads us to the choice of the triangular lattice in 2D and face centered cubic lattice in 3D. We demonstrate that the coverage probability decreases with increasing strength of perturbation, eventually converging to that of the Poisson network. In the regime of low disorder, we approximately characterize the statistical law of the coverage function. In 2D, we determine the disorder strength at which the PTL and the RMT networks are the closest measured by comparing their network topologies via a comparison of their Persistence Diagrams . We demonstrate that the PTL network at this disorder strength can be taken to be an effective substitute for the RMT network model, while at the same time offering the advantages of greater tractability.

### Equivalence of three quantum algorithms: Privacy amplification, error correction, and data compression

Privacy amplification (PA) is an indispensable component in classical and quantum cryptography. Error correction (EC) and data compression (DC) algorithms are also indispensable in classical and quantum information theory. We here study quantum algorithms of these three types (PA, EC, and DC) in the one-shot scenario, and show that they all become equivalent if modified properly. As an application of this equivalence, we take previously known security bounds of PA, and translate them into coding theorems for EC and DC which have not been obtained previously. Further, we apply these results to simplify and improve our previous result that the two prevalent approaches to the security proof of quantum key distribution (QKD) are equivalent. We also propose a new method to simplify the security proof of QKD.

### Deviation bound for non-causal machine learning

Concentration inequality are widely used for analysing machines learning algorithms. However, current concentration inequalities cannot be applied to the most popular deep neural network, notably in NLP processing. This is mostly due to the non-causal nature of this data. In this paper, a framework for modelling non-causal random fields is provided. A McDiarmid-type concentration inequality is obtained for this framework. In order to do so, we introduce a local i.i.d approximation of the non-causal random field.

### An infection process near criticality: Influence of the initial condition

We investigate how the initial number of infected individuals affects the behavior of the critical susceptible-infected-recovered process. We analyze the outbreak size distribution, duration of the outbreaks, and the role of fluctuations.