System monitoring is an established tool to measure the utilization and health of HPC systems. Usually system monitoring infrastructures make no conn…

In this article we consider combinatorial markets with valuations only for singletons and pairs of buy/sell-orders for swapping two items in equal qu…

Purpose: Recently, several attempts were conducted to transfer deep learning to medical image reconstruction. An increasingly number of publications …

In this paper, we propose to utilize intelligent reflecting surfaces (IRSs) for enhancing the physical layer security of wireless communications syst…

Although extensively investigated, the capacity of the two-hop half-duplex (HD) relay channel is not fully understood. In particular, a capacity expr…

A hybrid-parallel direct-numerical-simulation method with application to turbulent Taylor-Couette flow is presented. The Navier-Stokes equations are …

We have surveyed the in-plane transport properties of the graphene twist bilayer using (i) a low-energy effective Hamiltonian for the underlying elec…

Open cellular solids usually possess random microstructures that may contain a characteristic length scale, such as the cell size. This gives rise to…

We report the discovery of an eclipsing binary -- PTF1 J072456$+$125301-- composed of a subdwarf B (sdB) star ($g'=17.2^m$) with a faint companion. S…

This is the fourth installment in our series on implementing the discontinuous Galerkin (DG) method as an open source MATLAB /GNU Octave toolbox. Sim…

Lesion segmentation is a crucial step for the characterization of tumors in breast MR images. In this work, we presented a comparison of 3 unsupervised segmentation methods for the task of MRI breast lesions to evaluate their performance. The algori…

Accurate segmentation of breast lesions is a crucial step in evaluating the characteristics of tumors. However, this is a challenging task, since bre…

In order to efficiently use the future generations of supercomputers, fault tolerance and power consumption are two of the prime challenges anticipat…

We address the problem of noise and interference corrupted channel estimation in massive MIMO systems. Interference, which originates from pilot reus…

In this paper, we investigate a communication system comprised of an energy harvesting (EH) source which harvests radio frequency (RF) energy from an…

Stencil algorithms on regular lattices appear in many fields of computational science, and much effort has been put into optimized implementations. S…

The computational complexity of naive, sampling-based uncertainty quantification for 3D partial differential equations is extremely high. Multilevel …

In this paper, we investigate the capacity of the Gaussian two-hop full-duplex (FD) relay channel with residual self-interference. This channel is co…

We pursue a novel morphometric analysis to detect sources in very-high-energy gamma-ray counts maps by structural deviations from the background nois…

We provide a method for the generation of effective continuum Hamiltonians that goes beyond the well known k.p method in being equally effective in b…

We present the most extensive analysis of Fourier-based X-ray timing properties of the black hole binary Cygnus X-1 to date, based on 12 years of bi-…

By signing up you accept our content policy

Already have an account? Sign in

No a member yet? Create an account