
The distance duality relation (DDR) is valid in Riemannian spacetime. The
astronomical data hint that the universe may have certain preferred direction.
If the universe is described by anisotropic cosmological models based on
Riemannian spacetime, then DDR still valid. If the anisotropy universe is
described by other models which are not based on Riemannian spacetime, then DDR
is violated. Thus, DDR could be used to test the validity of these anisotropic
cosmological models. In this paper, we perform anisotropic DDR parametrization
with the dipolar structures. The DDR is tested by comparing the luminosity
distance from typeIa supernovae (Union 2.1 and JLA compilations) and the
angular diameter distance from strong gravitational lensing (SL) systems at the
same redshift. It is shown that, the DDR is valid with the Union2.1
compilation, while is violated more than 1$\sigma$ confidence level with the
JLA compilation. Additionally, we verify the statistical signification of our
method with Monte Carlo simulations. Due to the large uncertainty of available
data, no strong evidence is found to violate the DDR in the anisotropic models.

Sparse representations using data dictionaries provide an efficient model
particularly for signals that do not enjoy alternate analytic sparsifying
transformations. However, solving inverse problems with sparsifying
dictionaries can be computationally expensive, especially when the dictionary
under consideration has a large number of atoms. In this paper, we incorporate
additional structure on to dictionarybased sparse representations for visual
signals to enable speedups when solving sparse approximation problems. The
specific structure that we endow onto sparse models is that of a multiscale
modeling where the sparse representation at each scale is constrained by the
sparse representation at coarser scales. We show that this crossscale
predictive model delivers significant speedups, often in the range of
1060$\times$, with little loss in accuracy for linear inverse problems
associated with images, videos, and light fields.

Randomness extractors, which extract high quality (almostuniform) random
bits from biased random sources, are important objects both in theory and in
practice. While there have been significant progress in obtaining near optimal
constructions of randomness extractors in various settings, the computational
complexity of randomness extractors is still much less studied. In particular,
it is not clear whether randomness extractors with good parameters can be
computed in several interesting complexity classes that are much weaker than P.
In this paper we study randomness extractors in the following two models of
computation: (1) constantdepth circuits (AC0), and (2) the local computation
model. Previous work in these models, such as [Vio05a], [GVW15] and [BG13],
only achieve constructions with weak parameters. In this work we give explicit
constructions of randomness extractors with much better parameters. As an
application, we use our AC0 extractors to study pseudorandom generators in AC0,
and show that we can construct both cryptographic pseudorandom generators
(under reasonable computational assumptions) and unconditional pseudorandom
generators for space bounded computation with very good parameters.
Our constructions combine several previous techniques in randomness
extractors, as well as introduce new techniques to reduce or preserve the
complexity of extractors, which may be of independent interest. These include
(1) a general way to reduce the error of strong seeded extractors while
preserving the AC0 property and small locality, and (2) a seeded randomness
condenser with small locality.

Deep Reinforcement Learning (RL) recently emerged as one of the most
competitive approaches for learning in sequential decision making problems with
fully observable environments, e.g., computer Go. However, very little work has
been done in deep RL to handle partially observable environments. We propose a
new architecture called Actionspecific Deep Recurrent QNetwork (ADRQN) to
enhance learning performance in partially observable domains. Actions are
encoded by a fully connected layer and coupled with a convolutional observation
to form an actionobservation pair. The time series of actionobservation pairs
are then integrated by an LSTM layer that learns latent states based on which a
fully connected layer computes Qvalues as in conventional Deep QNetworks
(DQNs). We demonstrate the effectiveness of our new architecture in several
partially observable domains, including flickering Atari games.

We suggest that the vacuum field equation in Finsler spacetime is equivalent
to vanishing of Ricci scalar. Schwarzschild metric can be deduced from a
solution of our field equation if the spacetime preserve spherical symmetry.
Supposing spacetime to preserve the symmetry of "Finslerian sphere", we find a
nonRiemannian exact solution of the Finslerian vacuum field equation. The
solution is similar to the Schwarzschild metric. It reduces to Schwarzschild
metric while the Finslerian parameter $\epsilon$ vanishes. It is proved that
the Finslerian covariant derivative of the geometrical part of the
gravitational field equation is conserved. The interior solution is also given.
We get solutions of geodesic equation in such a Schwarzschildlike spacetime,
and show that the geodesic equation returns to the counterpart in Newton's
gravity at weak field approximation. The celestial observations give constraint
on the Finslerian parameter $\epsilon<10^{4}$. And the recent MichelsonMorley
experiment requires $\epsilon<10^{16}$. The counterpart of Birkhoff's theorem
exist in Finslerian vacuum. It shows that the Finslerian gravitational field
with the symmetry of "Finslerian sphere" in vacuum must be static.

The detection of gravitational waves (GWs) provides a powerful tool to
constrain the cosmological parameters. In this paper, we investigate the
possibility of using GWs as standard sirens in testing the anisotropy of the
universe. We consider the GW signals produced by the coalescence of binary
black hole systems and simulate hundreds of GW events from the advanced Laser
Interferometer GravitationalWave Observatory (LIGO) and Virgo. It is found
that the anisotropy of the universe can be tightly constrained if the redshift
of the GW source is precisely known. The anisotropic amplitude can be
constrained with an accuracy comparable to the Union2.1 complication of typeIa
supernovae if $\gtrsim 400$ GW events are observed. As for the preferred
direction, $\gtrsim 800$ GW events are needed in order to achieve the accuracy
of Union2.1. With 800 GW events, the probability of pseudo anisotropic signals
with an amplitude comparable to Union2.1 is negligible. These results show that
GWs can provide a complementary tool to supernovae in testing the anisotropy of
the universe.

We have obtained Finslerian RessinerNordstrom solution where it is
asymptotic to a Finsler spacetime with constant flag curvature while
$r\rightarrow\infty$. The covariant derivative of modified Einstein tensor in
Finslerian gravitational field equation for this solution is conserved. The
symmetry of the special Finslerian RessinerNordstrom spacetime, namely,
Finsler spacetime with constant flag curvature, has been investigated. It
admits six independent Killing vectors. The Finslerian RessinerNordstrom
solution differs from RessinerNordstrom metric only in two dimensional
subspace. And our solution requires that its two dimensional subspace have
constant flag curvature. We have obtained eigenfunction of Finslerian Laplace
operator of "Finslerian sphere", namely, a special subspace with positive
constant flag curvature. The eigenfunction is of the form
$\bar{Y}_l^m=Y_l^m+\epsilon^2(C_{l+2}^m Y_{l+2}^m+C_{l2}^m Y_{l2}^m)$ in
powers of Finslerian parameter $\epsilon$, where $C_{l+2}^m$ and $C_{l2}^m$
are constant. However, the eigenvalue depends on both $l$ and $m$. The
eigenvalues corresponded to $Y_1^0$ remain the same with Riemannian Laplace
operator and the eigenvalues corresponded to $Y_1^{\pm1}$ are different. This
fact just reflect the symmetry of "Finslerian sphere", which admits a
rotational symmetry along $z$axis and breaks other symmetry of Riemannian
sphere. The eigenfunction of Finslerian Laplace operator implies that monopolar
and dipolar terms of multipole expansion of gravitational potential are
unchanged and other multipole terms are changed.

Deep Reinforcement Learning (RL) recently emerged as one of the most
competitive approaches for learning in sequential decision making problems with
fully observable environments, e.g., computer Go. However, very little work has
been done in deep RL to handle partially observable environments. We propose a
new architecture called Actionspecific Deep Recurrent QNetwork (ADRQN) to
enhance learning performance in partially observable domains. Actions are
encoded by a fully connected layer and coupled with a convolutional observation
to form an actionobservation pair. The time series of actionobservation pairs
are then integrated by an LSTM layer that learns latent states based on which a
fully connected layer computes Qvalues as in conventional Deep QNetworks
(DQNs). We demonstrate the effectiveness of our new architecture in several
partially observable domains, including flickering Atari games.

Existing approaches towards single image dehazing including both modelbased
and learningbased heavily rely on the estimation of socalled transmission
maps. Despite its conceptual simplicity, using transmission maps as an
intermediate step often makes it more difficult to optimize the perceptual
quality of reconstructed images. To overcome this weakness, we propose a direct
deep learning approach toward image dehazing bypassing the step of transmission
map estimation and facilitating endtoend perceptual optimization. Our
technical contributions are mainly threefold. First, based on the analogy
between dehazing and denoising, we propose to directly learn a nonlinear
mapping from the space of degraded images to that of hazefree ones via
recursive deep residual learning; Second, inspired by the success of generative
adversarial networks (GAN), we propose to optimize the perceptual quality of
dehazed images by introducing a discriminator and a loss function adaptive to
hazy conditions; Third, we propose to remove notorious halolike artifacts at
large scene depth discontinuities by a novel application of guided filtering.
Extensive experimental results have shown that the subjective qualities of
dehazed images by the proposed perceptually optimized GAN (POGAN) are often
more favorable than those by existing stateoftheart approaches especially
when hazy condition varies.

Targetoriented sentiment classification aims at classifying sentiment
polarities over individual opinion targets in a sentence. RNN with attention
seems a good fit for the characteristics of this task, and indeed it achieves
the stateoftheart performance. After reexamining the drawbacks of attention
mechanism and the obstacles that block CNN to perform well in this
classification task, we propose a new model to overcome these issues. Instead
of attention, our model employs a CNN layer to extract salient features from
the transformed word representations originated from a bidirectional RNN
layer. Between the two layers, we propose a component to generate
targetspecific representations of words in the sentence, meanwhile incorporate
a mechanism for preserving the original contextual information from the RNN
layer. Experiments show that our model achieves a new stateoftheart
performance on a few benchmarks.

Aspect Term Extraction (ATE), a key subtask in AspectBased Sentiment
Analysis, aims to extract explicit aspect expressions from online user reviews.
We present a new framework for tackling ATE. It can exploit two useful clues,
namely opinion summary and aspect detection history. Opinion summary is
distilled from the whole input sentence, conditioned on each current token for
aspect prediction, and thus the tailormade summary can help aspect prediction
on this token. Another clue is the information of aspect detection history, and
it is distilled from the previous aspect predictions so as to leverage the
coordinate structure and tagging schema constraints to upgrade the aspect
prediction. Experimental results over four benchmark datasets clearly
demonstrate that our framework can outperform all stateoftheart methods.

The topological invariants of a periodic system can be used to define the
topological phase of each band and determine the existence of topological
interface states within a certain bandgap. Here, we propose a scheme based on
the full phase diagrams, and design the topological interface states within any
specified bandgaps. As an example, here we propose a kind of onedimensional
phononic crystals. By connecting two semiinfinite structures with different
topological phases, the interface states within any specific bandgap or their
combinations can be achieved in a rational manner. The existence of interface
states in a single bandgap, in all odd bandgaps, in all even bandgaps, or in
all bandgaps, are verified in simulations and experiments. The scheme of full
phase diagrams we introduce here can be extended to other kinds of periodic
systems, such as photonic crystals and designer plasmonic crystals.

We construct Cartan subalgebras in all classifiable stably finite C*algebras
which are unital or stably projectionless with trivial pairing between Ktheory
and traces.

We study two basic problems regarding edit error, i.e. document exchange and
error correcting codes for edit errors (insdel codes). For message length $n$
and edit error upper bound $k$, it is known that in both problems the optimal
sketch size or the optimal number of redundant bits is $\Theta(k \log
\frac{n}{k})$. However, known constructions are far from achieving these
bounds.
We significantly improve previous results on both problems. For document
exchange, we give an efficient deterministic protocol with sketch size
$O(k\log^2 \frac{n}{k})$. This significantly improves the previous best known
deterministic protocol, which has sketch size $O(k^2 + k \log^2 n)$
(Belazzougui15). For binary insdel codes, we obtain the following results:
1. An explicit binary insdel code which encodes an $n$bit message $x$
against $k$ errors with redundancy $O(k \log^2 \frac{n}{k})$. In particular
this implies an explicit family of binary insdel codes that can correct
$\varepsilon$ fraction of insertions and deletions with rate $1O(\varepsilon
\log^2 (\frac{1}{\varepsilon}))=1\widetilde{O}(\varepsilon)$.
2. An explicit binary insdel code which encodes an $n$bit message $x$
against $k$ errors with redundancy $O(k \log n)$. This is the first explicit
construction of binary insdel codes that has optimal redundancy for a wide
range of error parameters $k$, and this brings our understanding of binary
insdel codes much closer to that of standard binary error correcting codes.
In obtaining our results we introduce the notion of \emph{$\varepsilon$self
matching hash functions} and \emph{$\varepsilon$synchronization hash
functions}. We believe our techniques can have further applications in the
literature.

We show that the Liouville property and Reiter's condition are equivalent for
semigroupoids. This result applies to semigroups as well as semigroup actions.
In the special case of measured groupoids and locally compact groupoids, our
result proves Kaimanovich's conjecture of the equivalence of amenability and
the Liouville property.

We primarily study a special a weighted lowrank approximation of matrices
and then apply it to solve the background modeling problem. We propose two
algorithms for this purpose: one operates in the batch mode on the entire data
and the other one operates in the batchincremental mode on the data and
naturally captures more background variations and computationally more
effective. Moreover, we propose a robust technique that learns the background
frame indices from the data and does not require any training frames. We
demonstrate through extensive experiments that by inserting a simple weight in
the Frobenius norm, it can be made robust to the outliers similar to the
$\ell_1$ norm. Our methods match or outperform several stateoftheart online
and batch background modeling methods in virtually all quantitative and
qualitative measures.

We present explicit constructions of nonmalleable codes with respect to the
following tampering classes. (i) Linear functions composed with splitstate
adversaries: In this model, the codeword is first tampered by a splitstate
adversary, and then the whole tampered codeword is further tampered by a linear
function. (ii) Interleaved splitstate adversary: Here the codeword is
partitioned in an unknown (but fixed) way, and then tampered by a splitstate
adversary. (iii) Bounded communication splitstate model: In this model, the
splitstate adversaries are allowed to participate in a communication protocol
(with bounded communication budget) to tamper the codeword. Our results are the
first explicit constructions of nonmalleable codes in any of these tampering
models.
We derive all our nonmalleable codes from explicit constructions of seedless
nonmalleable extractors. We believe that our results on seedless nonmalleable
extractors and the techniques developed are of independent interest. Using our
techniques, we also give an improved extractor for an unknown interleaving of
two independent sources.

The recent line of study on randomness extractors has been a great success,
resulting in exciting new techniques, new connections, and breakthroughs to
long standing open problems in several seemingly different topics. These
include seeded nonmalleable extractors, privacy amplification protocols with
an active adversary, independent source extractors (and explicit Ramsey
graphs), and nonmalleable codes in the split state model. However, in all
cases there is still a gap to optimum and the motivation to close this gap
remains strong.
In this paper, we introduce a set of new techniques to further push the
frontier in the above questions. Our techniques lead to improvements in all of
the above questions, and in several cases partially optimal constructions.
Specifically, we obtain: 1. A seeded nonmalleable extractor with seed length
$O(log n)+log^{1+o(1)}(1/\epsilon) and entropy requirement O(log log
n+log(1/\epsilon)), where the entropy requirement is asymptotically optimal by
a recent result of Gur and Shinkar \cite{GurS17}; 2. A tworound privacy
amplification protocol with optimal entropy loss for security parameter up to
\Omega(k), which solves the privacy amplification problem completely; 3. A
twosource extractor for entropy O(\frac{log n log log n}{log log log n}),
which also gives an explicit Ramsey graph on N vertices with no clique or
independent set of size (log N)^{O(\frac{log log log N}{log log log log N})};
and 4. The first explicit nonmalleable code in the 2split state model with
\emph{constant} rate, which has been a major goal in the study of nonmalleable
codes for quite some time. One small caveat is that the error of this code is
only (an arbitrarily small) constant, but we can also achieve negligible error
with rate \Omega(log log log n/log log n), which already improves the rate in
\cite{Li17} exponentially.

We compute Ktheory for the reduced group C*algebras of generalized
Lamplighter groups.

Synchronization strings are recently introduced by Haeupler and Shahrasbi
(STOC 2017) in the study of codes for correcting insertion and deletion errors
(insdel codes). They showed that for any parameter $\varepsilon>0$,
synchronization strings of arbitrary length exist over an alphabet whose size
depends only on $\varepsilon$. Specifically, they obtained an alphabet size of
$O(\varepsilon^{4})$, which left an open question on where the minimal size of
such alphabets lies between $\Omega(\varepsilon^{1})$ and
$O(\varepsilon^{4})$. In this work, we partially bridge this gap by providing
an improved lower bound of $\Omega(\varepsilon^{3/2})$, and an improved upper
bound of $O(\varepsilon^{2})$. We also provide fast explicit constructions of
synchronization strings over small alphabets.
Further, along the lines of previous work on similar combinatorial objects,
we study the extremal question of the smallest possible alphabet size over
which synchronization strings can exist for some constant $\varepsilon < 1$. We
show that one can construct $\varepsilon$synchronization strings over
alphabets of size four while no such string exists over binary alphabets. This
reduces the extremal question to whether synchronization strings exist over
ternary alphabets.

Designing a scheme that can achieve a good performance in predicting single
person activities and group activities is a challenging task. In this paper, we
propose a novel robust and efficient human activity recognition scheme called
ReHAR, which can be used to handle single person activities and group
activities prediction. First, we generate an optical flow image for each video
frame. Then, both video frames and their corresponding optical flow images are
fed into a Single Frame Representation Model to generate representations.
Finally, an LSTM is used to pre dict the final activities based on the
generated representations. The whole model is trained endtoend to allow
meaningful representations to be generated for the final activity recognition.
We evaluate ReHAR using two wellknown datasets: the NCAA Basketball Dataset
and the UCFSports Action Dataset. The experimental results show that the pro
posed ReHAR achieves a higher activity recognition accuracy with an order of
magnitude shorter computation time compared to the stateoftheart methods.

We demonstrate a ventilated metamaterial absorber operating at low frequency
(< 500 Hz).With only two layers of the absorption units, highefficiency
absorption (> 90%) has been achieved in both simulations and experiments. This
highefficiency absorption under ventilation condition is originated from the
weak coupling of the two identical split tube resonators constituting the
absorber, which leads to the hybridization of the degenerate eigenmodes and
breaks the absorption upper limit of 50% for conventional transmissive
symmetric acoustic absorbers. The absorber can also be extended to an array and
work in free space. The absorber should have potential applications in acoustic
engineering where both noise reduction and ventilation are required.

We demonstrate that a strong asymmetric transmission for forward and backward
propagation of tilted circular polarized optical waves is supported by
ultrathin epsilonnearzero hyperbolic slabs. We find that, remarkably, this
effect is solely triggered by anisotropy without resorting to any breaking of
reciprocity and chiral symmetries or spatial nonlocal effects. In addition, we
show that the asymmetric transmission undergoes a dramatic enhancement if the
slab is hyperbolic in the epsilonnearzero regime. This happens since, close
to epsilonnearzero point, the hyperbolic dispersion activates etalon
resonances where extraordinary waves accumulate propagation phase even though
the slab is ultrathin. The proposed strategy holds promise for realizing
ultracompact and efficient polarization devices at different frequency bands.

Collective migration dominates many phenomena, from cell movement in living
systems to abiotic selfpropelling particles. Focusing on the early stages of
tumor evolution, we enunciate the principles involved in cell dynamics and
highlight their implications in understanding similar behavior in seemingly
unrelated soft glassy materials and possibly chemokineinduced migration of
CD8$^{+}$ T cells. We performed simulations of tumor invasion using a minimal
three dimensional model, accounting for cell elasticity and adhesive cellcell
interactions as well as cell birth and death to establish that cell growth
ratedependent tumor expansion results in the emergence of distinct topological
niches. Cells at the periphery move with higher velocity perpendicular to the
tumor boundary, while motion of interior cells is slower and isotropic. The
mean square displacement, $\Delta(t)$, of cells exhibits glassy behavior at
times comparable to the cell cycle time, while exhibiting superdiffusive
behavior, $\Delta (t) \approx t^{\alpha}$ ($\alpha > 1$), at longer times. We
derive the value of $\alpha \approx 1.33$ using a field theoretic approach
based on stochastic quantization. In the process we establish the universality
of superdiffusion in a class of seemingly unrelated nonequilibrium systems.
Super diffusion at long times arises only if there is an imbalance between cell
birth and death rates. Our findings for the collective migration, which also
suggests that tumor evolution occurs in a polarized manner, are in quantitative
agreement with {\it in vitro} experiments. Although set in the context of tumor
invasion the findings should also hold in describing collective motion in
growing cells and in active systems where creation and annihilation of
particles play a role.

Image demosaicing  one of the most important early stages in digital camera
pipelines  addressed the problem of reconstructing a fullresolution image
from socalled colorfilterarrays. Despite tremendous progress made in the
pase decade, a fundamental issue that remains to be addressed is how to assure
the visual quality of reconstructed images especially in the presence of noise
corruption. Inspired by recent advances in generative adversarial networks
(GAN), we present a novel deep learning approach toward joint demosaicing and
denoising (JDD) with perceptual optimization in order to ensure the visual
quality of reconstructed images. The key contributions of this work include: 1)
we have developed a GANbased approach toward image demosacing in which a
discriminator network with both perceptual and adversarial loss functions are
used for quality assurance; 2) we propose to optimize the perceptual quality of
reconstructed images by the proposed GAN in an endtoend manner. Such
endtoend optimization of GAN is particularly effective for jointly exploiting
the gain brought by each modular component (e.g., residue learning in the
generative network and perceptual loss in the discriminator network). Our
extensive experimental results have shown convincingly improved performance
over existing stateoftheart methods in terms of both subjective and
objective quality metrics with a comparable computational cost.