id
stringlengths 5
16
| query
stringlengths 1
382
| pos
stringlengths 7
5.09k
| neg
stringlengths 23
5.09k
| qp
float64 0.4
1
| qn
float64 0.34
0.91
| margin
float64 0.02
0.3
|
---|---|---|---|---|---|---|
2004.06217
|
Bounds on the Index of Rotationally Symmetric Self-Shrinking Tori
|
Surfaces that evolve under mean curvature flow develop singularities in
finite time. One can model these singularities using self-shrinkers, which are
surfaces, like spheres or cylinders, that shrink by dilations under mean
curvature flow. As we approach the singular time, a surface will locally
resemble one of these self-shrinkers near the singular point. One can then ask
whether this situation is stable: If we perturb the initial surface, will we
get the same self-shrinker, or could we get a different one? If we can get a
different one, what is the dimension of the space of variations that we could
use to do so? This quantity is the index of the self-shrinker.
In this work, we prove an upper bound on the index of rotationally symmetric
self-shrinking tori in terms of their entropy and their maximum and minimum
radii. While there have been a few lower bound results in the literature, we
believe that this result is the first upper bound on the index of a
self-shrinker. Using the same methods, we obtain several additional results for
rotationally symmetric immersed tori: We prove a lower bound on the index of
tori in terms of their entropy, we prove a lower bound on the entropy of tori
in terms of their maximum and minimum radii, and we show that two
entropy-decreasing variations whose existence was proved by Liu actually have
simple formulas and eigenvalue $-1$. Additionally, we present some preliminary
results in higher dimensions and six potential directions for future work.
|
General-relativistic models of self-gravitating tori around black holes are
constructed with a self-consistent-field method in compactified coordinates.
The numerical code is highly accurate and robust, allowing for the construction
of models that exactly fill their Roche lobe, when a cusp exists. As a first
application, we focus on self-consistent models with cusp, having different
values of constant specific angular momentum. Scaling all results with the mass
of the black hole, we find evidence that models with constant specific angular
momentum that can fill their Roche lobe are still limited by $l<4M_{\rm BH}$
(as is the case for models constructed in a fixed background metric) even for
heavy tori.
| 0.840814 | 0.714261 | 0.126553 |
2004.06218
|
Precise mass and radius of a transiting super-Earth planet orbiting the
M dwarf TOI-1235: a planet in the radius gap?
|
We report the confirmation of a transiting planet around the bright, inactive
M0.5 V star TOI-1235 (TYC 4384-1735-1, V = 11.5 mag), whose transit signal was
detected in the photometric time series of Sectors 14, 20, and 21 of the TESS
space mission. We confirm the planetary nature of the transit signal, which has
a period of 3.44 d, by using precise radial velocity measurements with CARMENES
and HARPS-N spectrographs. A comparison of the properties derived for TOI-1235
b's with theoretical models reveals that the planet has a rocky composition,
with a bulk density slightly higher than Earth's. In particular, we measure a
mass of M_p = 5.9+/-0.6 M_Earth and a radius of R_p = 1.69+/-0.08 R_Earth,
which together result in a density of rho_p = 6.7+1.3-1.1 g/cm3. When compared
with other well-characterized exoplanetary systems, the particular combination
of planetary radius and mass puts our discovery in the radius gap, a transition
region between rocky planets and planets with significant atmospheric
envelopes, with few known members. While the exact location of the radius gap
for M dwarfs is still a matter of debate, our results constrain it to be
located at around 1.7 R_Earth or larger at the insolation levels received by
TOI-1235 b (~60 S_Earth), which makes it an extremely interesting object for
further studies of planet formation and atmospheric evolution.
|
Small planets are common around late-M dwarfs and can be detected through
highly precise photometry by the transit method. Planets orbiting nearby stars
are particularly important as they are often the best-suited for future
follow-up studies. We present observations of three nearby M-dwarfs referred to
as EIC-1, EIC-2, and EIC-3, and use them to search for transits and set limits
on the presence of planets. On most nights our observations are sensitive to
Earth-sized transiting planets, and photometric precision is similar to or
better than TESS for faint late-M dwarfs of the same magnitude (I=15 mag). We
present our photometry and transit search pipeline, which utilizes simple
median detrending in combination with transit least squares based transit
detection (Hippke & Heller 2019).For these targets, and transiting planets
between one and two Earth radii, we achieve an average transit detection
probability of 60% between periods of 0.5 and 2 days, 30% between 2 and 5
days,and 10% between 5 and 10 days. These sensitivities are conservative
compared to visual searches.
| 0.877713 | 0.762738 | 0.114975 |
2004.06219
|
Exploring entanglement in open cavity parametric oscillators: from
triply to doubly resonant cavities
|
We use a versatile model to evaluate the multipartite entanglement and the
nonclassical light generation in optical parametric oscillators, exploring the
differences between doubly and triply resonant cavity configurations. We
demonstrate the entanglement of the pump mode with converted fields in both
situations, and the fundamental differences of oscillators using parametric
down conversion and four wave mixing processes as the intracavity amplification
technique. The strong correlations involving the sidebands of the pump and
converted fields gives the signatures of a rich dynamic of multipartite
entanglement.
|
We consider a generalization of recently proposed non-Hermitian model for
resonant cavities coupled by a chiral mirror by taking into account number
non-conservation and nonlinear interactions. We analyze non-Hermitian quantum
dynamics of populations and entanglement of the cavity modes. We find that an
interplay of initial coherence and non-Hermitian coupling leads to a
counterintuitive population transfer. While an initially coherent cavity mode
is depleted, the other empty cavity can be populated more or less than the
initially filled one. Moreover, presence of nonlinearity yields population
collapse and revival as well as bipartite entanglement of the cavity modes. In
addition to coupled cavities, we point out that similar models can be found in
$\mathcal{PT}$ symmetric Bose-Hubbard dimers of Bose-Einstein condensates or in
coupled soliton-plasmon waveguides. We specifically illustrate quantum dynamics
of populations and entanglement in a heuristic model that we propose for a
soliton-plasmon system with soliton amplitude dependent asymmetric interaction.
Degree of asymmetry, nonlinearity and coherence are examined to control plasmon
excitations and soliton-plasmon entanglement. Relations to $\mathcal{PT}$
symmetric lasers and Jahn-Teller systems are pointed out.
| 0.912273 | 0.836823 | 0.07545 |
2004.06220
|
Embedded model discrepancy: A case study of Zika modeling
|
Mathematical models of epidemiological systems enable investigation of and
predictions about potential disease outbreaks. However, commonly used models
are often highly simplified representations of incredibly complex systems.
Because of these simplifications, the model output, of say new cases of a
disease over time, or when an epidemic will occur, may be inconsistent with
available data. In this case, we must improve the model, especially if we plan
to make decisions based on it that could affect human health and safety, but
direct improvements are often beyond our reach. In this work, we explore this
problem through a case study of the Zika outbreak in Brazil in 2016. We propose
an embedded discrepancy operator---a modification to the model equations that
requires modest information about the system and is calibrated by all relevant
data. We show that the new enriched model demonstrates greatly increased
consistency with real data. Moreover, the method is general enough to easily
apply to many other mathematical models in epidemiology.
|
An analytical treatment of a simple opinion model with contrarian behavior is
presented. The focus is on the stationary dynamics of the model and in
particular on the effect of inhomogeneities in the interaction topology on the
stationary behavior. We start from a micro-level Markov chain description of
the model. Markov chain aggregation is then used to derive a macro chain for
the complete graph as well as a meso-level description for the two-community
graph composed of two (weakly) coupled sub-communities. In both cases, a
detailed understanding of the model behavior is possible using Markov chain
tools. More importantly, however, this setting provides an analytical scenario
to study the discrepancy between the homogeneous mixing case and the model on a
slightly more complex topology. We show that memory effects are introduced at
the macro level when we aggregate over agent attributes without sensitivity to
the microscopic details and quantify these effects using concepts from
information theory. In this way, the method facilitates the analysis of the
relation between microscopic processes and a their aggregation to a macroscopic
level of description and informs about the complexity of a system introduced by
heterogeneous interaction relations.
| 0.834765 | 0.658928 | 0.175836 |
2004.06221
|
Some elliptic problems involving the gradient on general bounded and
exterior domains
|
In this article we consider the existence of positive singular solutions on
bounded domains and also classical solutions on exterior domains. First we
consider positive singular solutions of the following problems:
\begin{equation} \label{eq_abst_1}-\Delta u = (1+g(x)) | \nabla u|^p \qquad
\mbox{ in } B_1, \qquad u = 0 \mbox{ on } \;\; \partial B_1, \qquad \mbox{ and}
\end{equation}
\begin{equation} \label{eq_abst_2} -\Delta u = | \nabla u|^p \qquad \mbox{ in
} \Omega, \qquad u = 0 \mbox{ on } \;\; \partial \Omega. \end{equation}
In the first problem $B_1$ is the unit ball in $ \mathbb{R}^N$ and in the
second $\Omega$ is a bounded smooth domain in $ \mathbb{R}^N$. In both cases we
assume $ N \ge 3$, $ \frac{N}{N-1}<p<2$ and in the first problem we assume $ g
\ge 0$ is a H\"older continuous function with $g(0)=0$. We obtain positive
singular solutions in both cases. \\ For the second equation we also consider
the case of $\Omega$ an exterior domain $ \mathbb{R}^N$ where $N \ge 3$ and $ p
>\frac{N}{N-1}$. We prove the existence of a bounded positive classical
solution with the additional property that $ \nabla u(x) \cdot x>0$ for large
$|x|$.
|
We study solution techniques for an evolution equation involving second order
derivative in time and the spectral fractional powers, of order $s \in (0,1)$,
of symmetric, coercive, linear, elliptic, second-order operators in bounded
domains $\Omega$. We realize fractional diffusion as the Dirichlet-to-Neumann
map for a nonuniformly elliptic problem posed on the semi-infinite cylinder
$\mathcal{C} = \Omega \times (0,\infty)$. We thus rewrite our evolution problem
as a quasi-stationary elliptic problem with a dynamic boundary condition and
derive space, time, and space-time regularity estimates for its solution. The
latter problem exhibits an exponential decay in the extended dimension and thus
suggests a truncation that is suitable for numerical approximation. We propose
and analyze two fully discrete schemes. The discretization in time is based on
finite difference discretization techniques: trapezoidal and leapfrog schemes.
The discretization in space relies on the tensorization of a first-degree FEM
in $\Omega$ with a suitable $hp$-FEM in the extended variable. For both schemes
we derive stability and error estimates.
| 0.814198 | 0.780048 | 0.03415 |
2004.06222
|
Cascade Neural Ensemble for Identifying Scientifically Sound Articles
|
Background: A significant barrier to conducting systematic reviews and
meta-analysis is efficiently finding scientifically sound relevant articles.
Typically, less than 1% of articles match this requirement which leads to a
highly imbalanced task. Although feature-engineered and early neural networks
models were studied for this task, there is an opportunity to improve the
results.
Methods: We framed the problem of filtering articles as a classification
task, and trained and tested several ensemble architectures of SciBERT, a
variant of BERT pre-trained on scientific articles, on a manually annotated
dataset of about 50K articles from MEDLINE. Since scientifically sound articles
are identified through a multi-step process we proposed a novel cascade
ensemble analogous to the selection process. We compared the performance of the
cascade ensemble with a single integrated model and other types of ensembles as
well as with results from previous studies.
Results: The cascade ensemble architecture achieved 0.7505 F measure, an
impressive 49.1% error rate reduction, compared to a CNN model that was
previously proposed and evaluated on a selected subset of the 50K articles. On
the full dataset, the cascade ensemble achieved 0.7639 F measure, resulting in
an error rate reduction of 19.7% compared to the best performance reported in a
previous study that used the full dataset.
Conclusion: Pre-trained contextual encoder neural networks (e.g. SciBERT)
perform better than the models studied previously and manually created search
filters in filtering for scientifically sound relevant articles. The superior
performance achieved by the cascade ensemble is a significant result that
generalizes beyond this task and the dataset, and is analogous to query
optimization in IR and databases.
|
In a cascading power transmission outage, component outages propagate
non-locally, after one component outages, the next failure may be very distant,
both topologically and geographically. As a result, simple models of
topological contagion do not accurately represent the propagation of cascades
in power systems. However, cascading power outages do follow patterns, some of
which are useful in understanding and reducing blackout risk. This paper
describes a method by which the data from many cascading failure simulations
can be transformed into a graph-based model of influences that provides
actionable information about the many ways that cascades propagate in a
particular system. The resulting "influence graph" model is Markovian, in that
component outage probabilities depend only on the outages that occurred in the
prior generation. To validate the model we compare the distribution of cascade
sizes resulting from $n-2$ contingencies in a $2896$ branch test case to
cascade sizes in the influence graph. The two distributions are remarkably
similar. In addition, we derive an equation with which one can quickly identify
modifications to the proposed system that will substantially reduce cascade
propagation. With this equation one can quickly identify critical components
that can be improved to substantially reduce the risk of large cascading
blackouts.
| 0.873541 | 0.574149 | 0.299392 |
2004.06223
|
A Robust Reputation-based Group Ranking System and its Resistance to
Bribery
|
The spread of online reviews and opinions and its growing influence on
people's behavior and decisions, boosted the interest to extract meaningful
information from this data deluge. Hence, crowdsourced ratings of products and
services gained a critical role in business and governments. Current
state-of-the-art solutions rank the items with an average of the ratings
expressed for an item, with a consequent lack of personalization for the users,
and the exposure to attacks and spamming/spurious users. Using these ratings to
group users with similar preferences might be useful to present users with
items that reflect their preferences and overcome those vulnerabilities. In
this paper, we propose a new reputation-based ranking system, utilizing
multipartite rating subnetworks, which clusters users by their similarities
using three measures, two of them based on Kolmogorov complexity. We also study
its resistance to bribery and how to design optimal bribing strategies. Our
system is novel in that it reflects the diversity of preferences by (possibly)
assigning distinct rankings to the same item, for different groups of users. We
prove the convergence and efficiency of the system. By testing it on synthetic
and real data, we see that it copes better with spamming/spurious users, being
more robust to attacks than state-of-the-art approaches. Also, by clustering
users, the effect of bribery in the proposed multipartite ranking system is
dimmed, comparing to the bipartite case.
|
Permissioned blockchain, in which only known nodes are allowed to
participate, has been widely used by governments, companies, institutes and so
on. We study the case where permissioned blockchain is applied to the field of
horizontal strategic alliances to ensure that any participant of the alliance
who does not follow the regulation will be detected and punished for his
behavior afterward. We propose a general hierarchical model of permissioned
blockchain which includes three tiers: providers, collectors, and governors. To
utilize the overlap of collectors in gathering transactions from providers, we
introduce the reputation as a measure of the reliability of the collectors.
With the help of reputation system, governors will not need to check all
transactions uploaded by collectors. As a result, our protocol will have a
significant improvement in efficiency. Meanwhile, let us denote $T$ to be the
number of total transactions. Then the number of mistakes that governors suffer
is only asymptotically $O(\sqrt{T})$ when guided by our reputation mechanism,
as long as there exists a collector who behaves well. This result implies that
our protocol remains high performance. The reputation mechanism also provides
incentives for collectors to work honestly. To our knowledge, Our work is the
first one to give an analytical result on reputation mechanism in permissioned
blockchains. Furthermore, we demonstrate two typical cases where our model can
be well applied to.
| 0.852066 | 0.705799 | 0.146267 |
2004.06224
|
Modeling motional energy spectra and lattice light shifts in optical
lattice clocks
|
We develop a model to describe the motional (i.e., external degree of
freedom) energy spectra of atoms trapped in a one-dimensional optical lattice,
taking into account both axial and radial confinement relative to the lattice
axis. Our model respects the coupling between axial and radial degrees of
freedom, as well as other anharmonicities inherent in the confining potential.
We further demonstrate how our model can be used to characterize lattice light
shifts in optical lattice clocks, including shifts due to higher multipolar
(magnetic dipole and electric quadrupole) and higher order
(hyperpolarizability) coupling to the lattice field. We compare results for our
model with results from other lattice light shift models in the literature
under similar conditions.
|
We propose a fault tolerant loading scheme to produce an array of fermions in
an optical lattice of the high fidelity required for applications in quantum
information processing and the modelling of strongly correlated systems. A cold
reservoir of Fermions plays a dual role as a source of atoms to be loaded into
the lattice via a Raman process and as a heat bath for sympathetic cooling of
lattice atoms. Atoms are initially transferred into an excited motional state
in each lattice site, and then decay to the motional ground state, creating
particle-hole pairs in the reservoir. Atoms transferred into the ground
motional level are no longer coupled back to the reservoir, and doubly occupied
sites in the motional ground state are prevented by Pauli blocking. This scheme
has strong conceptual connections with optical pumping, and can be extended to
load high-fidelity patterns of atoms.
| 0.882205 | 0.794518 | 0.087688 |
2004.06225
|
Graded Lie structure on cohomology of some exact monoidal categories
|
For some exact monoidal categories, we describe explicitly a connection
between topological and algebraic definitions of the Lie bracket on the
extension algebra of the unit object. The topological definition, due to
Schwede and Hermann, involves loops in extension categories, and the algebraic
definition involves homotopy liftings as introduced by the first author. As a
consequence of our description, we prove that the topological definition indeed
yields a Gerstenhaber algebra structure in the monoidal category setting,
answering a question of Hermann. For use in proofs, we generalize
$A_{\infty}$-coderivation and homotopy lifting techniques from bimodule
categories to some exact monoidal categories.
|
The category of rational SO(2)-equivariant spectra admits an algebraic model.
That is, there is an abelian category A(SO(2)) whose derived category is
equivalent to the homotopy category of rational SO(2)-equivariant spectra. An
important question is: does this algebraic model capture the smash product of
spectra?
The category A(SO(2)) is known as Greenlees' standard model, it is an abelian
category that has no projective objects and is constructed from modules over a
non-Noetherian ring. Hence the standard techniques for constructing a monoidal
model structure cannot be applied. In this paper we construct a monoidal model
structure on A(SO(2)) and show that the derived product on the homotopy
category is compatible with the smash product of spectra. The method used is
related to techniques developed by the author in earlier joint work with
Roitzheim. That work constructed a monoidal model structure on Franke's exotic
model for the K_p-local stable homotopy category.
We also provide a monoidal Quillen equivalence to a simpler monoidal model
category R_*-modules that has explicit generating sets. Having monoidal model
structures on A(SO(2)) and R_*-modules removes a serious obstruction to
constructing a series of monoidal Quillen equivalences between the algebraic
model and rational SO(2)-equivariant spectra.
| 0.880393 | 0.824495 | 0.055898 |
2004.06226
|
Classifying CMB time-ordered data through deep neural networks
|
The Cosmic Microwave Background (CMB) has been measured over a wide range of
multipoles. Experiments with arc-minute resolution like the Atacama Cosmology
Telescope (ACT) have contributed to the measurement of primary and secondary
anisotropies, leading to remarkable scientific discoveries. Such findings
require careful data selection in order to remove poorly-behaved detectors and
unwanted contaminants. The current data classification methodology used by ACT
relies on several statistical parameters that are assessed and fine-tuned by an
expert. This method is highly time-consuming and band or season-specific, which
makes it less scalable and efficient for future CMB experiments. In this work,
we propose a supervised machine learning model to classify detectors of CMB
experiments. The model corresponds to a deep convolutional neural network. We
tested our method on real ACT data, using the 2008 season, 148 GHz, as training
set with labels provided by the ACT data selection software. The model learns
to classify time-streams starting directly from the raw data. For the season
and frequency considered during the training, we find that our classifier
reaches a precision of 99.8%. For 220 and 280 GHz data, season 2008, we
obtained 99.4% and 97.5% of precision, respectively. Finally, we performed a
cross-season test over 148 GHz data from 2009 and 2010 for which our model
reaches a precision of 99.8% and 99.5%, respectively. Our model is about 10x
faster than the current pipeline, making it potentially suitable for real-time
implementations.
|
In the last couple of decades, there has been major advancements in the
domain of missing data imputation. The techniques in the domain include amongst
others: Expectation Maximization, Neural Networks with Evolutionary Algorithms
or optimization techniques and K-Nearest Neighbor approaches to solve the
problem. The presence of missing data entries in databases render the tasks of
decision-making and data analysis nontrivial. As a result this area has
attracted a lot of research interest with the aim being to yield accurate and
time efficient and sensitive missing data imputation techniques especially when
time sensitive applications are concerned like power plants and winding
processes. In this article, considering arbitrary and monotone missing data
patterns, we hypothesize that the use of deep neural networks built using
autoencoders and denoising autoencoders in conjunction with genetic algorithms,
swarm intelligence and maximum likelihood estimator methods as novel data
imputation techniques will lead to better imputed values than existing
techniques. Also considered are the missing at random, missing completely at
random and missing not at random missing data mechanisms. We also intend to use
fuzzy logic in tandem with deep neural networks to perform the missing data
imputation tasks, as well as different building blocks for the deep neural
networks like Stacked Restricted Boltzmann Machines and Deep Belief Networks to
test our hypothesis. The motivation behind this article is the need for missing
data imputation techniques that lead to better imputed values than existing
methods with higher accuracies and lower errors.
| 0.83182 | 0.671309 | 0.160511 |
2004.06227
|
Monopoles And Landau-Ginzburg Models I
|
The end point of this series of papers is to construct the monopole Floer
homology for 3-manifolds with torus boundary. In the first paper, we explain
the idea from the standpoint of gauged Landau-Ginzburg models and address a few
model problems related to the compactness of moduli spaces, using a
Bochner-type formula associated to the gauged Witten equations.
|
We prove the existence of time periodic solution to the 3D Ginzburg-Landau
equation in weighted Sobolev spaces. We consider the cubic Ginzburg-Landau
equation with an external force $g$ satisfying the oddness condition
$g(-x,t)=-g(x,t)$. The existence of the periodic solution is proved for small
time-periodic external force. The stability of the time periodic solution is
also considered.
| 0.872412 | 0.778054 | 0.094358 |
2004.06228
|
Fractal basins of convergence of a seventh-order generalized
H\'enon-Heiles potential
|
This article aims to investigate the points of equilibrium and the associated
convergence basins in a seventh-order generalized H\'enon-Heiles potential.
Using the well-known Newton-Raphson iterator we numerically locate the position
of the points of equilibrium, while we also obtain their linear stability.
Furthermore, we demonstrate how the two variable parameters, entering the
generalized H\'enon-Heiles potential, affect the convergence dynamics of the
system as well as the fractal degree of the basin diagrams. The fractal degree
is derived by computing the (boundary) basin entropy as well as the uncertainty
dimension.
|
Let $f$ be a H\'enon-Sibony map (regular polynomial automorphism) of
$\mathbb{C}^k$ and let $\mu$ be the equilibrium measure of $f$. In this paper
we prove that $\mu$ is exponentially mixing for plurisubharmonic test
functions.
| 0.931375 | 0.730326 | 0.201049 |
2004.06229
|
Imitation Learning for Fashion Style Based on Hierarchical Multimodal
Representation
|
Fashion is a complex social phenomenon. People follow fashion styles from
demonstrations by experts or fashion icons. However, for machine agent,
learning to imitate fashion experts from demonstrations can be challenging,
especially for complex styles in environments with high-dimensional, multimodal
observations. Most existing research regarding fashion outfit composition
utilizes supervised learning methods to mimic the behaviors of style icons.
These methods suffer from distribution shift: because the agent greedily
imitates some given outfit demonstrations, it can drift away from one style to
another styles given subtle differences. In this work, we propose an
adversarial inverse reinforcement learning formulation to recover reward
functions based on hierarchical multimodal representation (HM-AIRL) during the
imitation process. The hierarchical joint representation can more
comprehensively model the expert composited outfit demonstrations to recover
the reward function. We demonstrate that the proposed HM-AIRL model is able to
recover reward functions that are robust to changes in multimodal observations,
enabling us to learn policies under significant variation between different
styles.
|
We explore the problem of learning to decompose spatial tasks into segments,
as exemplified by the problem of a painting robot covering a large object.
Inspired by the ability of classical decision tree algorithms to construct
structured partitions of their input spaces, we formulate the problem of
decomposing objects into segments as a parsing approach. We make the insight
that the derivation of a parse-tree that decomposes the object into segments
closely resembles a decision tree constructed by ID3, which can be done when
the ground-truth available. We learn to imitate an expert parsing oracle, such
that our neural parser can generalize to parse natural images without ground
truth. We introduce a novel deterministic policy gradient update, DRAG (i.e.,
DeteRministically AGgrevate) in the form of a deterministic actor-critic
variant of AggreVaTeD, to train our neural parser. From another perspective,
our approach is a variant of the Deterministic Policy Gradient suitable for the
imitation learning setting. The deterministic policy representation offered by
training our neural parser with DRAG allows it to outperform state of the art
imitation and reinforcement learning approaches.
| 0.893082 | 0.72197 | 0.171112 |
2004.06230
|
Power-Constrained Bandits
|
Contextual bandits often provide simple and effective personalization in
decision making problems, making them popular in many domains including digital
health. However, when bandits are deployed in the context of a scientific
study, the aim is not only to personalize for an individual, but also to
determine, with sufficient statistical power, whether or not the system's
intervention is effective. In this work, we develop a set of constraints and a
general meta-algorithm that can be used to both guarantee power constraints and
minimize regret. Our results demonstrate a number of existing algorithms can be
easily modified to satisfy the constraint without significant decrease in
average return. We also show that our modification is also robust to a variety
of model mis-specifications.
|
Bandit algorithms have various application in safety-critical systems, where
it is important to respect the system constraints that rely on the bandit's
unknown parameters at every round. In this paper, we formulate a linear
stochastic multi-armed bandit problem with safety constraints that depend
(linearly) on an unknown parameter vector. As such, the learner is unable to
identify all safe actions and must act conservatively in ensuring that her
actions satisfy the safety constraint at all rounds (at least with high
probability). For these bandits, we propose a new UCB-based algorithm called
Safe-LUCB, which includes necessary modifications to respect safety
constraints. The algorithm has two phases. During the pure exploration phase
the learner chooses her actions at random from a restricted set of safe actions
with the goal of learning a good approximation of the entire unknown safe set.
Once this goal is achieved, the algorithm begins a safe
exploration-exploitation phase where the learner gradually expands their
estimate of the set of safe actions while controlling the growth of regret. We
provide a general regret bound for the algorithm, as well as a problem
dependent bound that is connected to the location of the optimal action within
the safe set. We then propose a modified heuristic that exploits our problem
dependent analysis to improve the regret.
| 0.835859 | 0.809671 | 0.026189 |
2004.06231
|
Einsum Networks: Fast and Scalable Learning of Tractable Probabilistic
Circuits
|
Probabilistic circuits (PCs) are a promising avenue for probabilistic
modeling, as they permit a wide range of exact and efficient inference
routines. Recent ``deep-learning-style'' implementations of PCs strive for a
better scalability, but are still difficult to train on real-world data, due to
their sparsely connected computational graphs. In this paper, we propose Einsum
Networks (EiNets), a novel implementation design for PCs, improving prior art
in several regards. At their core, EiNets combine a large number of arithmetic
operations in a single monolithic einsum-operation, leading to speedups and
memory savings of up to two orders of magnitude, in comparison to previous
implementations. As an algorithmic contribution, we show that the
implementation of Expectation-Maximization (EM) can be simplified for PCs, by
leveraging automatic differentiation. Furthermore, we demonstrate that EiNets
scale well to datasets which were previously out of reach, such as SVHN and
CelebA, and that they can be used as faithful generative image models.
|
Sum-product networks (SPNs) are a class of probabilistic graphical models
that allow tractable marginal inference. However, the maximum a posteriori
(MAP) inference in SPNs is NP-hard. We investigate MAP inference in SPNs from
both theoretical and algorithmic perspectives. For the theoretical part, we
reduce general MAP inference to its special case without evidence and hidden
variables; we also show that it is NP-hard to approximate the MAP problem to
$2^{n^\epsilon}$ for fixed $0 \leq \epsilon < 1$, where $n$ is the input size.
For the algorithmic part, we first present an exact MAP solver that runs
reasonably fast and could handle SPNs with up to 1k variables and 150k arcs in
our experiments. We then present a new approximate MAP solver with a good
balance between speed and accuracy, and our comprehensive experiments on
real-world datasets show that it has better overall performance than existing
approximate solvers.
| 0.876872 | 0.751192 | 0.125679 |
2004.06232
|
A triple integral analog of a multiple zeta value
|
We establish the triple integral evaluation \[ \int_{1}^{\infty} \int_{0}^{1}
\int_{0}^{1} \frac{dz \, dy \, dx}{x(x+y)(x+y+z)}
= \frac{5}{24} \zeta(3), \] as well as the equivalent polylogarithmic double
sum \[ \sum_{k=1}^{\infty} \sum_{j=k}^{\infty} \frac{(-1)^{k-1}}{k^{2}} \,
\frac{1}{j \, 2^{j}}
= \frac{13}{24} \zeta(3). \] This double sum is related to, but less
approachable than, similar sums studied by Ramanujan. It is also reminiscent of
Euler's formula $\zeta(2,1) = \zeta(3)$, which is the simplest instance of
duality of multiple polylogarithms. We review this duality and apply it to
derive a companion identity. We also discuss approaches based on computer
algebra. All of our approaches ultimately require the introduction of
polylogarithms and nontrivial relations between them. It remains an open
challenge to relate the triple integral or the double sum to $\zeta(3)$
directly.
|
We show that the single trace heterotic N-point tree-level gauge amplitude
A_HET can be obtained from the corresponding type I amplitude A_I by the
single-valued (sv) projection: A_HET=sv(A_I). This projection maps multiple
zeta values to single-valued multiple zeta values. The latter represent a
subclass of multiple zeta values originating from single-valued multiple
polylogarithms at unity. Similar relations between open and closed string
amplitudes or amplitudes of different string vacua can be established. As a
consequence the alpha'-expansion of a closed string amplitude is dictated by
that of the corresponding open string amplitude. The combination of
single-valued projections, Kawai-Lewellen-Tye relations and Mellin
correspondence reveal a unity of all tree-level open and closed superstring
amplitudes together with the maximally supersymmetric Yang-Mills and
supergravity theories.
| 0.854307 | 0.74714 | 0.107167 |
2004.06233
|
Half-metallic compositional ranges for selected Heusler alloys
|
For a material that is a half-metal, there should exist a range of
compositions for half-metallicity. This compositional range can be expressed in
terms of electron count and computed. We investigate electronic and magnetic
properties of doped full- and half-Heusler alloys (stoichiometry XYZ2 and XYZ,
respectively) with elements X from groups 13-16 and periods 3-6 of the Periodic
Table, Y={Mn, Fe}, and Z={Co, Ni}. Using spin density functional theory, we
predict shifts of the Fermi energy in the doped and solid-solution alloys.
These predictions can be used for band-gap engineering of multicomponent
half-metals and provide the viable range of compositions, such as for a range
of n=x+y+z in (Co$_{2-z}Ni_z)$(Mn$_{1-y}$Fe$_{y}$)(Sn$_{1-x}$Sb$_{x}$). This
methodology for doped and chemically disordered half-metallic alloys offers a
design approach to electronic-structure engineering that can accelerate
development of half-metals for novel electronic and spintronic applications.
|
Using the nonlocal coherent-potential approximation we study the effect of
intersite spatial correlations on the transition from band insulator to metal
as well as from metal to Mott insulator in the "alloy analogy" approach to the
paramagnetic solution of the half-filled ionic Hubbard model. We find that
intersite spatial correlations enhance the metallic phase.
| 0.846365 | 0.665461 | 0.180904 |
2004.06235
|
ExTru: A Lightweight, Fast, and Secure Expirable Trust for the Internet
of Things
|
The resource-constrained nature of the Internet of Things (IoT) devices,
poses a challenge in designing a secure, reliable, and particularly
high-performance communication for this family of devices. Although
side-channel resistant ciphers (either block cipher or stream cipher) are the
well-suited solution to establish a guaranteed secure communication, the
energy-intensive nature of these ciphers makes them undesirable for
particularly lightweight IoT solutions. In this paper, we introduce ExTru, a
novel encrypted communication protocol based on stream ciphers that adds a
configurable switching & toggling network (CSTN) to not only boost the
performance of the communication in lightweight IoT devices, it also consumes
far less energy compared with the conventional side-channel resistant ciphers.
Although the overall structure of the proposed scheme is leaky against physical
attacks, such as side-channel or new scan-based Boolean satisfiability (SAT)
attack or algebraic attack, we introduce a dynamic encryption mechanism that
removes this vulnerability. We demonstrate how each communicated message in the
proposed scheme reduces the level of trust. Accordingly, since a specific
number of messages, N, could break the communication and extract the key, by
using the dynamic encryption mechanism, ExTru can re-initiate the level of
trust periodically after T messages where T<N, to protect the communication
against side-channel and scan-based attacks (e.g. SAT attack). Furthermore, we
demonstrate that by properly configuring the value of T, ExTru not only
increases the strength of security from per "device" to per "message", it also
significantly improves energy consumption as well as throughput in comparison
with an architecture that only uses a conventional side-channel resistant
block/stream cipher.
|
Mobile Crowd-Sensing (MCS) has appeared as a prospective solution for
large-scale data collection, leveraging built-in sensors and social
applications in mobile devices that enables a variety of Internet of Things
(IoT) services. However, the human involvement in MCS results in a high
possibility for unintentionally contributing corrupted and falsified data or
intentionally spreading disinformation for malevolent purposes, consequently
undermining IoT services. Therefore, recruiting trustworthy contributors plays
a crucial role in collecting high-quality data and providing better quality of
services while minimizing the vulnerabilities and risks to MCS systems. In this
article, a novel trust model called Experience-Reputation (E-R) is proposed for
evaluating trust relationships between any two mobile device users in a MCS
platform. To enable the E-R model, virtual interactions among the users are
manipulated by considering an assessment of the quality of contributed data
from such users. Based on these interactions, two indicators of trust called
Experience and Reputation are calculated accordingly. By incorporating the
Experience and Reputation trust indicators (TIs), trust relationships between
the users are established, evaluated and maintained. Based on these trust
relationships, a novel trust-based recruitment scheme is carried out for
selecting the most trustworthy MCS users to contribute to data sensing tasks.
In order to evaluate the performance and effectiveness of the proposed
trust-based mechanism as well as the E-R trust model, we deploy several
recruitment schemes in a MCS testbed which consists of both normal and
malicious users. The results highlight the strength of the trust-based scheme
as it delivers better quality for MCS services while being able to detect
malicious users.
| 0.860898 | 0.775168 | 0.085731 |
2004.06236
|
Oscillations modulating power law exponents in isotropic turbulence:
Where experiments and simulations agree and differ
|
Inertial-range features of turbulence are investigated using data from
experimental measurements of grid turbulence and direct numerical simulations
of isotropic turbulence simulated in a periodic box, both at the Taylor-scale
Reynolds number $R_\lambda \sim 1000$. In particular, oscillations modulating
the power-law scaling in the inertial range are examined for structure
functions up to sixth order moments. The oscillations in exponent ratios
decrease with increasing sample size in simulations though, in experiments,
they survive at a low value of $4$ parts in $1000$ even after massive
averaging. The two data sets are consistent in their intermittent character but
differ in small but observable respects. Neither the scaling exponents
themselves nor all the viscous effects are consistently reproduced by existing
models of intermittency.
|
Quasi-stationary far-from-equilibrium critical states of a two-component Bose
gas are studied in two spatial dimensions. After the system has undergone an
initial dynamical instability it approaches a non-thermal fixed point. At this
critical point the structure of the gas is characterised by ensembles of
(quasi-)topological defects such as vortices, skyrmions and solitons which give
rise to universal power-law behaviour of momentum correlation functions. The
resulting power-law spectra can be interpreted in terms of
strong-wave-turbulence cascades driven by particle transport into
long-wave-length excitations. Scaling exponents are determined on both sides of
the miscible-immiscible transition controlled by the ratio of the intra-species
to inter-species couplings. Making use of quantum turbulence methods, we
explain the specific values of the exponents from the presence of transient
(quasi-)topological defects.
| 0.903529 | 0.756463 | 0.147066 |
2004.06237
|
Estimation of Classification Rules from Partially Classified Data
|
We consider the situation where the observed sample contains some
observations whose class of origin is known (that is, they are classified with
respect to the g underlying classes of interest), and where the remaining
observations in the sample are unclassified (that is, their class labels are
unknown). For class-conditional distributions taken to be known up to a vector
of unknown parameters, the aim is to estimate the Bayes' rule of allocation for
the allocation of subsequent unclassified observations. Estimation on the basis
of both the classified and unclassified data can be undertaken in a
straightforward manner by fitting a g-component mixture model by maximum
likelihood (ML) via the EM algorithm in the situation where the observed data
can be assumed to be an observed random sample from the adopted mixture
distribution. This assumption applies if the missing-data mechanism is
ignorable in the terminology pioneered by Rubin (1976). An initial likelihood
approach was to use the so-called classification ML approach whereby the
missing labels are taken to be parameters to be estimated along with the
parameters of the class-conditional distributions. However, as it can lead to
inconsistent estimates, the focus of attention switched to the mixture ML
approach after the appearance of the EM algorithm (Dempster et al., 1977).
Particular attention is given here to the asymptotic relative efficiency (ARE)
of the Bayes' rule estimated from a partially classified sample. Lastly, we
consider briefly some recent results in situations where the missing label
pattern is non-ignorable for the purposes of ML estimation for the mixture
model.
|
We address zero-shot (ZS) learning, building upon prior work in hierarchical
classification by combining it with approaches based on semantic attribute
estimation. For both non-novel and novel image classes we compare multiple
formulations of the problem, starting with deep universal features in each
case. We investigate the effect of using different posterior probabilities as
inputs to the hierarchical classifier, comparing the performances of posteriors
derived from distances to SVM classifier boundaries with those of posteriors
based on semantic attribute estimation. Using a dataset consisting of 150
object classes from the ImageNet ILSVRC2012 data set, we find that the
hierarchical classification method that maximizes expected reward for non-novel
classes differs from the method that maximizes expected reward for novel
classes. We also show that using input posteriors based on semantic attributes
improves the expected reward for novel classes.
| 0.791446 | 0.68018 | 0.111266 |
2004.06238
|
Internal Neighbourhood Structures II: On Finite Sum of Subobjects
|
The main aim of this paper is to show that in any lextensive category with a
proper $({\mathsf{E}}, {\mathsf{M}})$ system such that the set of
$\mathsf{M}$-subobjects is a complete lattice, $\mathsf{M}$ is closed under
finite sums if and only if the monomorphisms in $\mathsf{E}$ are stable under
pullbacks along coproduct injections. It is also shown that a sum of closed
morphisms in $\mathsf{M}$ is again a closed morphism in $\mathsf{M}$ if and
only if the sum is in $\mathsf{M}$, the coproduct injections are closed and
reflect zero. As a consequence it is shown that the $\vee$-semilattice of
(closed) morphisms in $\mathsf{M}$ to a finite sum is a biproduct of the
$\vee$-semilattices of (closed) morphisms in $\mathsf{M}$ to the summands.
|
In the context of Synthetic Differential Geometry, we describe a notion of
higher connection with values in a cubical groupoid. We do this by exploiting a
certain structure of cubical complex derived from the first neighbourhood of
the diagonal of a manifold. This cubical complex consists of infinitesimal
parallelelpipeda.
| 0.768661 | 0.730857 | 0.037803 |
2004.06239
|
End-to-End Estimation of Multi-Person 3D Poses from Multiple Cameras
|
We present an approach to estimate 3D poses of multiple people from multiple
camera views. In contrast to the previous efforts which require to establish
cross-view correspondence based on noisy and incomplete 2D pose estimations, we
present an end-to-end solution which directly operates in the $3$D space,
therefore avoids making incorrect decisions in the 2D space. To achieve this
goal, the features in all camera views are warped and aggregated in a common 3D
space, and fed into Cuboid Proposal Network (CPN) to coarsely localize all
people. Then we propose Pose Regression Network (PRN) to estimate a detailed 3D
pose for each proposal. The approach is robust to occlusion which occurs
frequently in practice. Without bells and whistles, it outperforms the
state-of-the-arts on the public datasets. Code will be released at
https://github.com/microsoft/multiperson-pose-estimation-pytorch.
|
Stereo videos for the dynamic scenes often show unpleasant blurred effects
due to the camera motion and the multiple moving objects with large depth
variations. Given consecutive blurred stereo video frames, we aim to recover
the latent clean images, estimate the 3D scene flow and segment the multiple
moving objects. These three tasks have been previously addressed separately,
which fail to exploit the internal connections among these tasks and cannot
achieve optimality. In this paper, we propose to jointly solve these three
tasks in a unified framework by exploiting their intrinsic connections. To this
end, we represent the dynamic scenes with the piece-wise planar model, which
exploits the local structure of the scene and expresses various dynamic scenes.
Under our model, these three tasks are naturally connected and expressed as the
parameter estimation of 3D scene structure and camera motion (structure and
motion for the dynamic scenes). By exploiting the blur model constraint, the
moving objects and the 3D scene structure, we reach an energy minimization
formulation for joint deblurring, scene flow and segmentation. We evaluate our
approach extensively on both synthetic datasets and publicly available real
datasets with fast-moving objects, camera motion, uncontrolled lighting
conditions and shadows. Experimental results demonstrate that our method can
achieve significant improvement in stereo video deblurring, scene flow
estimation and moving object segmentation, over state-of-the-art methods.
| 0.881866 | 0.721423 | 0.160442 |
2004.06240
|
Broadband thermal beaming using multiple epsilon near zero materials
|
Controlling the directionality of an absorptive or thermally emissive
material is a fundamental challenge in contemporary materials and photonics
research. Over the past two decades, a range of photonic strategies have
enabled angular beaming of thermal emission, but only over narrow sets of
bandwidths. However, thermal radiation is inherently a broadband phenomenon,
and many emerging applications in imaging and energy require broad spectrum
control of emission and absorption. We currently lack the ability to constrain
thermal emission, as well as absorption, over arbitrary angles of incidence,
but consistently over a broad range of wavelengths. Here, we theoretically
propose and experimentally demonstrate a mechanism for broadband angular
selectivity in absorption and emission that leverages multiple materials that
exhibit a permittivity near zero, ENZ materials. We experimentally realize a
broadband directional thermal emitter by introducing a subwavelength photonic
film consisting of multiple oxides that exhibit epsilon near zero (ENZ) regions
in the long-wave infrared region. We obtain high emissivity (> 0.6) in the p
polarization from 7.7 to 11.5 micron over an angular range between 65 deg and
85 deg. Outside this range the photonic film is highly reflective. The
broadband nature of angular control enables strong radiative heat transfer only
at large angles and is directly observed through thermal imaging. The materials
and photonic strategy employed use abundant, low-cost materials that are fully
compatible with large-area deposition. By decoupling conventional limitations
on angular and spectral response, our approach opens new possibilities for
radiative heat transfer in a range of applications, including thermal
camouflaging, solar heating, radiative cooling and waste heat recovery.
|
The performance of the energy degrader in terms of beam properties directly
impacts the design and cost of cyclotron-based proton therapy centers. The aim
of this study is to evaluate the performances of different existing and novel
degrader materials. The quantitative estimate is based on detailed GEANT4
simulations that analyze the beam-matter interaction and provide a
determination of the beam emittance increase and transmission. Comparisons
between existing (aluminum, graphite, beryllium) and novel (boron carbide and
diamond) degrader materials are provided and evaluated against semi-analytical
models of multiple Coulomb scattering. The results showing a potential in
emittance reduction for novel materials are presented and discussed in detail.
| 0.81763 | 0.643507 | 0.174123 |
2004.06241
|
Derived Hecke action at $p$ and the ordinary $p$-adic cohomology of
arithmetic manifolds
|
We study the derived Hecke action at $p$ on the ordinary $p$-adic cohomology
of arithmetic subgroups of semisimple groups $\mathrm G(\mathbb Q)$, i.e., we
study the derived version of Hida's theory for ordinary Hecke algebras. This is
the analog at $\ell=p$ of derived Hecke actions studied by Venkatesh in the
tame case. We show that properties of the derived Hecke action at $p$ are
related to deep conjectures in Galois cohomology which are higher analogs of
the classical Leopoldt conjecture.
|
We prove the conjectured compatibility of $p$-adic fundamental lines with
specializations at motivic points for a wide class of $p$-adic families of
$p$-adic Galois representations (for instance, the families which arise from
$p$-adic families of automorphic representations of the unit group of a
quaternion algebra or of a totally definite unitary groups) and deduce the
compatibility of the Equivariant Tamagawa Number Conjectures for them. However,
we also show that fundamental lines are not compatible with arbitrary
characteristic zero specializations with values in a domain in general. This
points to the need to modify some conjectures on $p$-adic variation of special
values using completed cohomology.
| 0.941632 | 0.823738 | 0.117894 |
2004.06242
|
Projective structures on a hyperbolic 3-orbifold
|
We compute and analyse the moduli space of those real projective structures
on a hyperbolic 3-orbifold that are modelled on a single ideal tetrahedron in
projective space. Parameterisations are given in terms of classical invariants,
traces, and geometric invariants, cross ratios.
|
This paper is the ninth in a sequence on the structure of sets of solutions
to systems of equations in free and hyperbolic groups, projections of such sets
(Diophantine sets), and the structure of definable sets over free and
hyperbolic groups. In the ninth paper we associate a Diophantine set with a
definable set, and view it as the Diophantine envelope of the definable set. We
use the envelope and duo limit groups that were used in proving stability of
the theory of free and torsion-free hyperbolic groups [Se9], to study definable
equivalence relations, and in particular, to classify imaginaries over these
groups.
| 0.927605 | 0.770489 | 0.157116 |
2004.06243
|
PhICNet: Physics-Incorporated Convolutional Recurrent Neural Networks
for Modeling Dynamical Systems
|
Dynamical systems involving partial differential equations (PDEs) and
ordinary differential equations (ODEs) arise in many fields of science and
engineering. In this paper, we present a physics-incorporated deep learning
framework to model and predict the spatiotemporal evolution of dynamical
systems governed by partially-known inhomogenous PDEs with unobservable source
dynamics. We formulate our model PhICNet as a convolutional recurrent neural
network which is end-to-end trainable for spatiotemporal evolution prediction
of dynamical systems. Experimental results show the long-term prediction
capability of our model.
|
Based on the progress of image recognition, video recognition has been
extensively studied recently. However, most of the existing methods are focused
on short-term but not long-term video recognition, called contextual video
recognition. To address contextual video recognition, we use convolutional
recurrent neural networks (ConvRNNs) having a rich spatio-temporal information
processing capability, but ConvRNNs requires extensive computation that slows
down training. In this paper, inspired by the normalization and detrending
methods, we propose adaptive detrending (AD) for temporal normalization in
order to accelerate the training of ConvRNNs, especially for convolutional
gated recurrent unit (ConvGRU). AD removes internal covariate shift within a
sequence of each neuron in recurrent neural networks (RNNs) by subtracting a
trend. In the experiments for contextual recognition on ConvGRU, the results
show that (1) ConvGRU clearly outperforms the feed-forward neural networks, (2)
AD consistently offers a significant training acceleration and generalization
improvement, and (3) AD is further improved by collaborating with the existing
normalization methods.
| 0.90096 | 0.750481 | 0.150479 |
2004.06244
|
A reinforcement learning application of guided Monte Carlo Tree Search
algorithm for beam orientation selection in radiation therapy
|
Due to the large combinatorial problem, current beam orientation optimization
algorithms for radiotherapy, such as column generation (CG), are typically
heuristic or greedy in nature, leading to suboptimal solutions. We propose a
reinforcement learning strategy using Monte Carlo Tree Search capable of
finding a superior beam orientation set and in less time than CG.We utilized a
reinforcement learning structure involving a supervised learning network to
guide Monte Carlo tree search (GTS) to explore the decision space of beam
orientation selection problem. We have previously trained a deep neural network
(DNN) that takes in the patient anatomy, organ weights, and current beams, and
then approximates beam fitness values, indicating the next best beam to add.
This DNN is used to probabilistically guide the traversal of the branches of
the Monte Carlo decision tree to add a new beam to the plan. To test the
feasibility of the algorithm, we solved for 5-beam plans, using 13 test
prostate cancer patients, different from the 57 training and validation
patients originally trained the DNN. To show the strength of GTS to other
search methods, performances of three other search methods including a guided
search, uniform tree search and random search algorithms are also provided. On
average GTS outperforms all other methods, it find a solution better than CG in
237 seconds on average, compared to CG which takes 360 seconds, and outperforms
all other methods in finding a solution with lower objective function value in
less than 1000 seconds. Using our guided tree search (GTS) method we were able
to maintain a similar planning target volume (PTV) coverage within 1% error,
and reduce the organ at risk (OAR) mean dose for body, rectum, left and right
femoral heads, but a slight increase of 1% in bladder mean dose.
|
The landmark achievements of AlphaGo Zero have created great research
interest into self-play in reinforcement learning. In self-play, Monte Carlo
Tree Search is used to train a deep neural network, that is then used in tree
searches. Training itself is governed by many hyperparameters.There has been
surprisingly little research on design choices for hyper-parameter values and
loss-functions, presumably because of the prohibitive computational cost to
explore the parameter space. In this paper, we investigate 12 hyper-parameters
in an AlphaZero-like self-play algorithm and evaluate how these parameters
contribute to training. We use small games, to achieve meaningful exploration
with moderate computational effort. The experimental results show that training
is highly sensitive to hyper-parameter choices. Through multi-objective
analysis we identify 4 important hyper-parameters to further assess. To start,
we find surprising results where too much training can sometimes lead to lower
performance. Our main result is that the number of self-play iterations
subsumes MCTS-search simulations, game-episodes, and training epochs. The
intuition is that these three increase together as self-play iterations
increase, and that increasing them individually is sub-optimal. A consequence
of our experiments is a direct recommendation for setting hyper-parameter
values in self-play: the overarching outer-loop of self-play iterations should
be maximized, in favor of the three inner-loop hyper-parameters, which should
be set at lower values. A secondary result of our experiments concerns the
choice of optimization goals, for which we also provide recommendations.
| 0.91175 | 0.695348 | 0.216402 |
2004.06245
|
The BACCO Simulation Project: Exploiting the full power of large-scale
structure for cosmology
|
We present the BACCO project, a simulation framework specially designed to
provide highly-accurate predictions for the distribution of mass, galaxies, and
gas as a function of cosmological parameters. In this paper, we describe our
main suite of simulations (L $\sim2$ Gpc and $4320^3$ particles) and present
various validation tests. Using a cosmology-rescaling technique, we predict the
nonlinear mass power spectrum over the redshift range 0 < z < 1.5 and over
scales $10^{-2} < k/(h Mpc^{-1} ) < 5$ for 800 points in an 8-dimensional
cosmological parameter space. For an efficient interpolation of the results, we
build a Gaussian emulator which we test against other widely-used methods. Over
the whole range of scales considered, we expect our predictions to be accurate
at the 2% level for parameters in the minimal ${\Lambda}$CDM model and to 3%
when extended to dynamical dark energy and massive neutrinos. We make our
emulator publicly available under http://www.dipc.org/bacco
|
We carry out a suite of cosmological simulations of modified action f(R)
models where cosmic acceleration arises from an alteration of gravity instead
of dark energy. These models introduce an extra scalar degree of freedom which
enhances the force of gravity below the inverse mass or Compton scale of the
scalar. The simulations exhibit the so-called chameleon mechanism, necessary
for satisfying local constraints on gravity, where this scale depends on
environment, in particular the depth of the local gravitational potential. We
find that the chameleon mechanism can substantially suppress the enhancement of
power spectrum in the non-linear regime if the background field value is
comparable to or smaller than the depth of the gravitational potentials of
typical structures. Nonetheless power spectrum enhancements at intermediate
scales remain at a measurable level for models even when the expansion history
is indistinguishable from a cosmological constant, cold dark matter model.
Simple scaling relations that take the linear power spectrum into a non-linear
spectrum fail to capture the modifications of f(R) due to the change in
collapsed structures, the chameleon mechanism, and the time evolution of the
modifications.
| 0.885828 | 0.752953 | 0.132875 |
2004.06246
|
The Pair-Replica-Mean-Field Limit for Intensity-based Neural Networks
|
Replica-mean-field models have been proposed to decipher the activity of
neural networks via a multiply-and-conquer approach. In this approach, one
considers limit networks made of infinitely many replicas with the same basic
neural structure as that of the network of interest, but exchanging spikes in a
randomized manner. The key point is that these replica-mean-field networks are
tractable versions that retain important features of the finite structure of
interest. To date, the replica framework has been discussed for first-order
models, whereby elementary replica constituents are single neurons with
independent Poisson inputs. Here, we extend this replica framework to allow
elementary replica constituents to be composite objects, namely, pairs of
neurons. As they include pairwise interactions, these pair-replica models
exhibit non-trivial dependencies in their stationary dynamics, which cannot be
captured by first-order replica models. Our contributions are two-fold: $(i)$
We analytically characterize the stationary dynamics of a pair of
intensity-based neurons with independent Poisson input. This analysis involves
the reduction of a boundary-value problem related to a two-dimensional
transport equation to a system of Fredholm integral equations---a result of
independent interest. $(ii)$ We analyze the set of consistency equations
determining the full network dynamics of certain replica limits. These limits
are those for which replica constituents, be they single neurons or pairs of
neurons, form a partition of the network of interest. Both analyses are
numerically validated by computing input/output transfer functions for neuronal
pairs and by computing the correlation structure of certain pair-dominated
network dynamics.
|
Deep neural networks have achieved impressive results in computer vision and
machine learning. Unfortunately, state-of-the-art networks are extremely
compute and memory intensive which makes them unsuitable for mW-devices such as
IoT end-nodes. Aggressive quantization of these networks dramatically reduces
the computation and memory footprint. Binary-weight neural networks (BWNs)
follow this trend, pushing weight quantization to the limit. Hardware
accelerators for BWNs presented up to now have focused on core efficiency,
disregarding I/O bandwidth and system-level efficiency that are crucial for
deployment of accelerators in ultra-low power devices. We present Hyperdrive: a
BWN accelerator dramatically reducing the I/O bandwidth exploiting a novel
binary-weight streaming approach, which can be used for arbitrarily sized
convolutional neural network architecture and input resolution by exploiting
the natural scalability of the compute units both at chip-level and
system-level by arranging Hyperdrive chips systolically in a 2D mesh while
processing the entire feature map together in parallel. Hyperdrive achieves 4.3
TOp/s/W system-level efficiency (i.e., including I/Os)---3.1x higher than
state-of-the-art BWN accelerators, even if its core uses resource-intensive
FP16 arithmetic for increased robustness.
| 0.856147 | 0.701364 | 0.154783 |
2004.06248
|
Improved Sleeping Bandits with Stochastic Actions Sets and Adversarial
Rewards
|
In this paper, we consider the problem of sleeping bandits with stochastic
action sets and adversarial rewards. In this setting, in contrast to most work
in bandits, the actions may not be available at all times. For instance, some
products might be out of stock in item recommendation. The best existing
efficient (i.e., polynomial-time) algorithms for this problem only guarantee a
$O(T^{2/3})$ upper-bound on the regret. Yet, inefficient algorithms based on
EXP4 can achieve $O(\sqrt{T})$. In this paper, we provide a new computationally
efficient algorithm inspired by EXP3 satisfying a regret of order $O(\sqrt{T})$
when the availabilities of each action $i \in \cA$ are independent. We then
study the most general version of the problem where at each round available
sets are generated from some unknown arbitrary distribution (i.e., without the
independence assumption) and propose an efficient algorithm with $O(\sqrt {2^K
T})$ regret guarantee. Our theoretical results are corroborated with
experimental evaluations.
|
We study a general version of the adversarial online learning problem. We are
given a decision set $\mathcal{X}$ in a reflexive Banach space $X$ and a
sequence of reward vectors in the dual space of $X$. At each iteration, we
choose an action from $\mathcal{X}$, based on the observed sequence of previous
rewards. Our goal is to minimize regret, defined as the gap between the
realized reward and the reward of the best fixed action in hindsight. Using
results from infinite dimensional convex analysis, we generalize the method of
Dual Averaging (or Follow the Regularized Leader) to our setting and obtain
general upper bounds on the worst-case regret that subsume a wide range of
results from the literature. Under the assumption of uniformly continuous
rewards, we obtain explicit anytime regret bounds in a setting where the
decision set is the set of probability distributions on a compact metric space
$S$ whose Radon-Nikodym derivatives are elements of $L^p(S)$ for some $p > 1$.
Importantly, we make no convexity assumptions on either the set $S$ or the
reward functions. We also prove a general lower bound on the worst-case regret
for any online algorithm. We then apply these results to the problem of
learning in repeated continuous two-player zero-sum games, in which players'
strategy sets are compact metric spaces. In doing so, we first prove that if
both players play a Hannan-consistent strategy, then with probability 1 the
empirical distributions of play weakly converge to the set of Nash equilibria
of the game. We then show that, under mild assumptions, Dual Averaging on the
(infinite-dimensional) space of probability distributions indeed achieves
Hannan-consistency. Finally, we illustrate our results through numerical
examples.
| 0.912038 | 0.76494 | 0.147098 |
2004.06249
|
The photon vortex beam in rotating medium
|
In this paper we consider the photon vortex beam in the rotating medium,
where the rotating velocity acts as an effective vector potential. Using the
Riemann-Silberstein vector, we construct the photon wave function. Using the
Maxwell equations and the first-order Minkowski constitutive relations we get
the dynamic equations of photon in moving medium. For the stationary states,
the dynamic equations can be written as a Dirac-like equation. We obtain the
approximate photon vortex beam solutions by the given the medium's different
velocity distribution and find the diffracting and nondiffracting
Laguerre-Gaussian beam solutions in the rotating medium. For the diffracting
Laguerre-Gaussian beams, we acquire new terms arising from the rotation that
can change the Gouy phase, and then accordingly infer the rotation behavior of
the photon interference pattern. Furthermore, in our theory we obtain the
Landau levels structure of transverse photon energy in the nondiffracting
Laguerre-Gaussian beam solutions.
|
An optical vortex (phase singularity) with a high topological strength
resides on the axis of a high-order light beam. The breakup of this vortex
under elliptic perturbation into a straight row of unit strength vortices is
described. This behavior is studied in helical Ince-Gauss beams and astigmatic,
generalized Hermite-Laguerre-Gauss beams, which are perturbations of
Laguerre-Gauss beams. Approximations of these beams are derived for small
perturbation, in which a neighborhood of the axis can be approximated by a
polynomial in the complex plane: a Chebyshev polynomial for Ince-Gauss beams,
and a Hermite polynomial for astigmatic beams.
| 0.908427 | 0.824663 | 0.083765 |
2004.06250
|
Penetration of a supersonic particle at the interface in a binary
complex plasma
|
The penetration of a supersonic particle at the interface was studied in a
binary complex plasma. Inspired by the experiments performed in the PK-3 Plus
Laboratory on board the International Space Station, Langevin dynamics
simulations were carried out. The evolution of Mach cone at the interface was
observed, where a kink of the lateral wake front was observed at the interface.
By comparing the evolution of axial and radial velocity, we show that the
interface solitary wave is non-linear. The dependence of the background
particle dynamics in the vicinity of the interface on the penetration direction
reveals that the disparity of the mobility may be the cause of various
interface effects.
|
Irradiation of a solid with intense plasma ion beams produced by Rod Plasma
Injector is a strongly nonequilibrium process, which enables achieving a number
of effects which are impossible to be achieved with other method. In the paper,
the process of plasma ion beam propagation regarding its time and energy
distributions and the process of ion penetration of solids, resulting with ion
implementation and temperature growth have been analyzed mathematically on
basis of experimental data. Results of numerical calculations have been
presented concerning temperature and dopant density time evolution.
| 0.909714 | 0.739201 | 0.170513 |
2004.06251
|
Scalar and Spinor Effective Actions in Global de Sitter
|
In this paper, we compute the effective action of both a scalar field and a
Dirac spinor field in the global de Sitter space of any dimension $d$ using the
in-/out-state formalism. We show that there is particle production in even
dimensions for both scalar field and spinor field. The in-out vacuum amplitude
$Z_{in/out}$ is divergent at late times. By using dimensional regularization,
we extract the finite part of $\log Z_{in/out}$ for $d$ even and the
logarithmically divergent part of $\log Z_{in/out}$ for $d$ odd. We also find
that the regularized in-out vacuum amplitude equals the ratio of determinants
associated with different quantizations in $AdS_d$ upon the identification of
certain parameters in the two theories.
|
We study the wave equation for a minimally coupled massive scalar in
D-dimensional de Sitter space. We compute the absorption cross section to
investigate its cosmological horizon in the southern diamond. By analogy of the
quantum mechanics, it is found that there is no absorption in de Sitter space.
This means that de Sitter space is usually in thermal equilibrium, like the
black hole in anti de Sitter space. It confirms that the cosmological horizon
not only emits radiation but also absorbs that previously emitted by itself at
the same rate, keeping the curvature radius of de Sitter space fixed.
| 0.87367 | 0.783018 | 0.090653 |
2004.06252
|
Operator Sampling for Shot-frugal Optimization in Variational Algorithms
|
Quantum chemistry is a near-term application for quantum computers. This
application may be facilitated by variational quantum-classical algorithms
(VQCAs), although a concern for VQCAs is the large number of measurements
needed for convergence, especially for chemical accuracy. Here we introduce a
strategy for reducing the number of measurements (i.e., shots) by randomly
sampling operators $h_i$ from the overall Hamiltonian $H = \sum_i c_i h_i$. In
particular, we employ weighted sampling, which is important when the $c_i$'s
are highly non-uniform, as is typical in chemistry. We integrate this strategy
with an adaptive optimizer developed recently by our group to construct an
improved optimizer called Rosalin (Random Operator Sampling for Adaptive
Learning with Individual Number of shots). Rosalin implements stochastic
gradient descent while adapting the shot noise for each partial derivative and
randomly assigning the shots amongst the $h_i$ according to a weighted
distribution. We implement this and other optimizers to find the ground states
of molecules H$_2$, LiH, and BeH$_2$, without and with quantum hardware noise,
and Rosalin outperforms other optimizers in most cases.
|
In Part I (arXiv:1911.00619) of this article, we proposed an importance
sampling algorithm to compute rare-event probabilities in forward uncertainty
quantification problems. The algorithm, which we termed the "Bayesian Inverse
Monte Carlo (BIMC) method", was shown to be optimal for problems in which the
input-output operator is nearly linear. But applying the original BIMC to
highly nonlinear systems can lead to several different failure modes. In this
paper, we modify the BIMC method to extend its applicability to a wider class
of systems. The modified algorithm, which we call "Adaptive-BIMC (A-BIMC)", has
two stages. In the first stage, we solve a sequence of optimization problems to
roughly identify those regions of parameter space which trigger the rare-event.
In the second stage, we use the stage one results to construct a mixture of
Gaussians that can be then used in an importance sampling algorithm to estimate
rare event probability. We propose using a local surrogate that minimizes
costly forward solves. The effectiveness of A-BIMC is demonstrated via several
synthetic examples. Yet again, the modified algorithm is prone to failure. We
systematically identify conditions under which it fails to lead to an effective
importance sampling distribution.
| 0.782099 | 0.731125 | 0.050974 |
2004.06253
|
Astrometric precision of centering algorithms based on model fitting
|
We provide a basis to select the optimal algorithm according to the specific
observational conditions in ground-based astrometry, and clarify the loss of
precision in the case of not achieving optimum. The principle of the centering
algorithms based on model fitting is analyzed by the method of maximum
likelihood. The effective point spread function (ePSF) algorithm, which can
construct an accurate model to fit the star image, and the most widely used
Gaussian centering algorithm are chosen to investigate the effect of different
factors on centering precision. A series of synthetic star images with
different backgrounds, full width at half maximums (FWHMs) and profiles are
processed by these algorithms. The profiles include the actual profiles
extracted from observations and the theoretical profiles, the spatial variation
of the PSF across the detector is also taken into account. Each algorithm is
applied to the observations obtained from Yunnan observatory to verify the
simulation results. The simulations show that ePSF fitting is obviously more
precise than Gaussian fitting for a Gaussian profile star with high
signal-to-noise ratio (SNR). When the center of star profile becomes sharp, or
the SNR of the star decreases, the advantage of ePSF fitting will gradually
decrease. The high precision of ePSF fitting is due to its appropriate weight
in the weighted least squares fitting. However, a similar method using the same
weight, the weighted Gaussian fitting, turned out to be poor under some
conditions. The reduction results of practical observations show good agree
with the simulations. For a frame of CCD image with enough stars to construct
accurate ePSFs, ePSF fitting can approach the Cramer-Rao (CR) bound. Other
centering algorithms may achieve the same precision under suitable conditions,
but will show poor precision when not used properly.
|
The extensive penetration of wind farms (WFs) presents challenges to the
operation of distribution networks (DNs). Building a probability distribution
of the aggregated wind power forecast error is of great value for decision
making. However, as a result of recent government incentives, many WFs are
being newly built with little historical data for training distribution models.
Moreover, WFs with different stakeholders may refuse to submit the raw data to
a data center for model training. To address these problems, a Gaussian mixture
model (GMM) is applied to build the distribution of the aggregated wind power
forecast error; then, the maximum a posteriori (MAP) estimation method is
adopted to overcome the limited training data problem in GMM parameter
estimation. Next, a distributed MAP estimation method is developed based on the
average consensus filter algorithm to address the data privacy issue. The
distribution control center is introduced into the distributed estimation
process to acquire more precise estimation results and better adapt to the DN
control architecture. The effectiveness of the proposed algorithm is
empirically verified using historical data.
| 0.843325 | 0.658611 | 0.184714 |
2004.06254
|
Robustness Comparison of Scheduling Algorithms in MapReduce Framework
|
Parallel computing is the fundamental base for MapReduce framework in Hadoop.
Each data chunk is replicated over 3 servers for increasing availability of
data and decreasing probability of data loss. Hence, the 3 servers that have
Map task stored on their disk are fastest servers to process them, which are
called local servers. All servers in the same rack as local servers are called
rack-local servers that are slower than local servers since data chunk
associated with Map task should be fetched through top of the rack switch. All
other servers are called remote servers that are slowest servers since they
need to fetch data from a local server in another rack, so data should be
transmitted through at least 2 top of rack switches and a core switch. Note
that number of switches in path of data transfer depends on internal network
structure of data centers. The First-In-First-Out (FIFO) and Hadoop Fair
Scheduler (HFS) algorithms do not take rack structure of data centers into
account, so they are known to not be heavy-traffic delay optimal or even
throughput optimal. The recent advances on scheduling for data centers
considering rack structure of them and heterogeneity of servers resulted in
state-of-the-art Balanced-PANDAS algorithm that outperforms classic MaxWeight
algorithm. In both Balanced-PANDAS and MaxWeight algorithms, processing rate of
local, rack-local, and remote servers are assumed to be known. However, with
the change of traffic over time in addition to estimation errors of processing
rates, it is not realistic to consider processing rates to be known. In this
work, we study robustness of Balanced-PANDAS and MaxWeight algorithms in terms
of inaccurate estimations of processing rates. We observe that Balanced-PANDAS
is not as sensitive as MaxWeight on the accuracy of processing rates, making it
more appealing to use in data centers.
|
In this paper, we propose a distributed throughput-optimal ad hoc wireless
network scheduling algorithm, which is motivated by the celebrated simplex
algorithm for solving linear programming (LP) problems. The scheduler stores a
sparse set of basic schedules, and chooses the max-weight basic schedule for
transmission in each time slot. At the same time, the scheduler tries to update
the set of basic schedules by searching for a new basic schedule in a
throughput increasing direction. We show that both of the above procedures can
be achieved in a distributed manner. Specifically, we propose an average
consensus based link contending algorithm to implement the distributed max
weight scheduling. Further, we show that the basic schedule update can be
implemented using CSMA mechanisms, which is similar to the one proposed by
Jiang et al. Compared to the optimal distributed scheduler in Jiang's paper,
where schedules change in a random walk fashion, our algorithm has a better
delay performance by achieving faster schedule transitions in the steady state.
The performance of the algorithm is finally confirmed by simulation results.
| 0.805991 | 0.689424 | 0.116567 |
2004.06255
|
Equivalence of two optimality conditions for polyhedral functions
|
In the paper we study two different optimality conditions for polyhedral
functions. First one follows from the optimality conditions in terms of
coexhausters, which are families of convex compact sets, that allow one to
approximate the increment of the studied function at a considered point in the
form of minmax or maxmin of affine functions. Second one is obtained in one of
the recent publications and is used as a core result for constructing a new
optimization algorithm for finding a minimum of a piecewise affine function. A
piecewise affine function is an important object for different areas of
research while coexhausters are an effective tool for the study of a wide class
of nonsmooth functions. That is why it is important to show a connection
between this two types of conditions and prove their equivalence. This is the
main aim of the present paper.
|
We address the problem of minimizing a convex smooth function $f(x)$ over a
compact polyhedral set $D$ given a stochastic zeroth-order constraint feedback
model. This problem arises in safety-critical machine learning applications,
such as personalized medicine and robotics. In such cases, one needs to ensure
constraints are satisfied while exploring the decision space to find optimum of
the loss function. We propose a new variant of the Frank-Wolfe algorithm, which
applies to the case of uncertain linear constraints. Using robust optimization,
we provide the convergence rate of the algorithm while guaranteeing feasibility
of all iterates, with high probability.
| 0.901414 | 0.799835 | 0.101579 |
2004.06256
|
Hydrogenated Fullerenes (Fulleranes) in Space
|
Since the first laboratory synthesis of C$_{60}$ in 1985, fullerene-related
species have been proposed to interpret various astronomical features. After
more than 25 years' efforts, several circumstellar and interstellar features
have been convincingly assigned to C$_{60}$, C$_{70}$, and C$_{60}^+$. These
successes resulted from the recent advancements in observational, experimental,
as well as computational techniques, and re-stimulated interest in searching
for fullerene derivatives in space. As one of the most important fullerene
derivatives, hydrogenated fullerene (fullerane) is likely to exist in
circumstellar and interstellar conditions. This review gives an overview of the
chemical properties and spectral signals of fulleranes focusing on those
relevant to astronomy. We summarize previous proposals of fulleranes as the
carrier of astronomical features at UV, optical, infrared, and radio
wavelengths, and discuss the arguments favoring or disfavoring the presence of
fulleranes in astronomical environments. Although no unambiguous detection of
fulleranes in space has yet been reported, there are plausible evidences for
supporting the formation of certain fullerane isomers.
|
In this paper, we investigated the electronic structure of some endohedral
fullerenes containing rare earth nitride and the stability of their
benzyne-adducts by PM7, the semiempirical Hatree-Fock method.
| 0.864477 | 0.751636 | 0.112841 |
2004.06257
|
Kitaev-Anderson spin liquid
|
The bond-disordered Kitaev model attracts much attention due to the
experimental relevance in $\alpha$-RuCl$_3$ and $A_3$LiIr$_2$O$_6$ ($A=$ H, D,
Ag, $\textit{etc.}$). Applying a magnetic field to break the time-reversal
symmetry leads to a strong modulation in mass terms for Dirac cones. Because of
the smallness of the flux gap of the Kitaev model, a small bond disorder can
have large influence on itinerant Majorana fermions, and Majorana fermions will
be in the Anderson localization state immediately. We call this immobile liquid
state Kitaev-Anderson liquid state with two localized Majorana fermions, one
frozen by gauge fluctuations and the other localized by disordered mass terms.
The quantization of the thermal Hall conductivity $\kappa/T$ disappears by a
quantum Hall transition induced by a small disorder, and $\kappa/T$ shows a
rapid crossover into the Kitaev-Anderson liquid with a negligible Hall current.
Especially, the critical disorder strength $\delta J_{c1} \sim 0.05$ in the
unit of the Kitaev interaction would have many implications for the stability
of Kitaev spin liquids.
|
Bond-dependent magnetic interactions can generate exotic topological states
such as Kitaev and frustrated spin liquids. Experimentally determining the
values of bond-dependent interactions in magnetic materials is a challenging
but crucial problem. Here, I show that each symmetry-allowed nearest-neighbor
interaction on triangular and honeycomb lattices has a distinct signature in
paramagnetic neutron-diffraction data, and that such data actually contain
sufficient information to determine the spin Hamiltonian unambiguously via
unconstrained fits. Moreover, I show that bond-dependent interactions can often
be extracted from powder-averaged data. These results facilitate experimental
determination of the spin Hamiltonians of candidate topological materials.
| 0.848345 | 0.752102 | 0.096243 |
2004.06258
|
Propagation of terahertz waves in a dust acoustic wave
|
The propagation of terahertz waves in a dust acoustic wave is investigated
numerically. By assuming a sinus profile of the dust number density in the dust
acoustic waves, the transmission properties are calculated using finite
difference time domain method. It shows that the dust acoustic wave can
function similarly as a Bragg filter to block the terahertz waves of a certain
wavelength. The bandwidth of the filter depends on the density profile of the
dust acoustic wave.
|
In this paper we consider a mathematical model for photoacoustic imaging
which takes into account attenuation due to thermodynamic dissipation. The
propagation of acoustic (compressional) waves is governed by a scalar wave
equation coupled to the heat equation for the excess temperature. We seek to
recover the initial acoustic profile from knowledge of acoustic measurements at
the boundary.
We recognize that this inverse problem is a special case of boundary
observability for a thermoelastic system. This leads to the use of
control/observability tools to prove the unique and stable recovery of the
initial acoustic profile in the weak thermoelastic coupling regime. This
approach is constructive, yielding a solvable equation for the unknown acoustic
profile. Moreover, the solution to this reconstruction equation can be
approximated numerically using the conjugate gradient method. If certain
geometrical conditions for the wave speed are satisfied, this approach is
well--suited for variable media and for measurements on a subset of the
boundary. We also present a numerical implementation of the proposed
reconstruction algorithm.
| 0.939607 | 0.685635 | 0.253972 |
2004.06259
|
Deep Learning for Quantitative Susceptibility Mapping without Labels
|
Current deep learning (DL) techniques for quantitative susceptibility mapping
(QSM) reconstruction demonstrated improved performance of QSM reconstruction
compared with conventional non-DL methods. However, these end-to-end supervised
DL techniques usually require a large amount of labeled training pairs and can
be limited to the inherent difficulties of measuring `ground-truth' in QSM. In
light of these, we presented an unsupervised DL method for QSM inversion
denoted as uQSM. Without accessing to QSM labels, uQSM was trained to perform
QSM reconstruction using the physical model. When evaluating multi-orientation
QSM datasets, uQSM results have achieved higher levels of quantitative accuracy
compared to TKD, TV-FANSI, and MEDI approaches. Additionally, uQSM can better
preserve susceptibility anisotropy and microstructures in comparison with
QSMnet and COSMOS. In addition, uQSM was evaluated on a large number of
single-orientation QSM datasets. Visual assessment showed that uQSM
outperformed conventional non-DL QSM reconstruction methods.
|
We propose a new framework called Noise2Blur (N2B) for training robust image
denoising models without pre-collected paired noisy/clean images. The training
of the model requires only some (or even one) noisy images, some random
unpaired clean images, and noise-free but blurred labels obtained by predefined
filtering of the noisy images. The N2B model consists of two parts: a denoising
network and a noise extraction network. First, the noise extraction network
learns to output a noise map using the noise information from the denoising
network under the guidence of the blurred labels. Then, the noise map is added
to a clean image to generate a new ``noisy/clean'' image pair. Using the new
image pair, the denoising network learns to generate clean and high-quality
images from noisy observations. These two networks are trained simultaneously
and mutually aid each other to learn the mappings of noise to clean/blur.
Experiments on several denoising tasks show that the denoising performance of
N2B is close to that of other denoising CNNs trained with pre-collected paired
data.
| 0.826445 | 0.723397 | 0.103048 |
2004.06260
|
Dynamics of a modified Leslie-Gower system with diffusion in
heterogeneous environment
|
We investigate the dynamics of a diffusive Lotka-Volterra predator-prey
system with modified Leslie-Gower and Holling type II functional response in
spatially heterogeneous environment. First, we prove that the trivial steady
state and one of two semi-trivial steady states are always linearly unstable,
and the linear stability of the other semi-trivial steady state changes as the
parameters vary. Second, when the semi-trivial steady state is not linearly
unstable, we further obtain that it is globally asymptotically stable. The
proof is based on the method of upper and lower solutions and the global
dynamics of a competition-diffusion system. Finally, we establish the existence
and the stability of a unique positive steady state, and the persistence of the
two species under some suitable conditions.
|
Development of resistance limits transferability of most anticancer therapies
into curative treatment and understanding mechanisms beyond it remains a big
challenge. Many high resolution experimental observations show enormous
intratumor heterogeneity at molecular, genetic and cellular levels which is
made responsible for emerging resistance to therapy. Therefore, researchers
search techniques to influence development of intratumor heterogeneity, which
requires understanding its role within the context of integrative, logically
consistent, framework, such as evolutionary theory. Although it is agreed that
intratumor heterogeneity increases probability of the emergence of therapy
resistant clones, more instructive role of its structure in the process of
cancer dynamics and metastasis is needed. In the paper, intratumor
heterogeneity is viewed as a product of two, in general stochastic, processes,
evolutionary optimization and changing environment, respectively. In
evolutionary theory, common risk-diversifying strategy displayed by isogenic
populations in unpredictably changing environments is bet-hedging. We suggest,
that the structure of intratumor heterogeneity is evolutionary trait evolving
to maximize the clonal fitness in changing (or uncertain) environment and that
its structure corresponds to bet-hedging strategy. We advocate our view by
reviewing and combining important cancer relevant concepts.
| 0.831137 | 0.634726 | 0.196412 |
2004.06261
|
Room-temperature coherent control of implanted defect spins in silicon
carbide
|
Recently, vacancy-related spin defects in silicon carbide (SiC) have been
demonstrated to be potentially suitable for versatile quantum interface
building and scalable quantum network construction. Significant efforts have
been undertaken to identify spin systems in SiC and to extend their quantum
capabilities using large-scale growth and advanced nanofabrication methods.
Here we demonstrated a type of spin defect in the 4H polytype of SiC generated
via hydrogen ion implantation with high-temperature post-annealing, which is
different from any known defects. These spin defects can be optically addressed
and coherently controlled even at room temperature, and their fluorescence
spectrum and optically detected magnetic resonance spectra are different from
those of any previously discovered defects. Moreover, the generation of these
defects can be well controlled by optimizing the annealing temperature after
implantation. These defects demonstrate high thermal stability with coherently
controlled electron spins, facilitating their application in quantum sensing
and masers under harsh conditions.
|
Silicon carbide is a promising platform for single photon sources, quantum
bits (qubits) and nanoscale sensors based on individual color centers. Towards
this goal, we develop a scalable array of nanopillars incorporating single
silicon vacancy centers in 4H-SiC, readily available for efficient interfacing
with free-space objective and lensed-fibers. A commercially obtained substrate
is irradiated with 2 MeV electron beams to create vacancies. Subsequent
lithographic process forms 800 nm tall nanopillars with 400-1,400 nm diameters.
We obtain high collection efficiency, up to 22 kcounts/s optical saturation
rates from a single silicon vacancy center, while preserving the single photon
emission and the optically induced electron-spin polarization properties. Our
study demonstrates silicon carbide as a readily available platform for scalable
quantum photonics architecture relying on single photon sources and qubits.
| 0.896592 | 0.805451 | 0.091141 |
2004.06262
|
A Lightweight Solution of Industrial Computed Tomography with
Convolutional Neural Network
|
As an advanced non-destructive testing and quality control technique,
industrial computed tomography (ICT) has found many applications in smart
manufacturing. The existing ICT devices are usually bulky and involve mass data
processing and transmission. It results in a low efficiency and cannot keep
pace with smart manufacturing. In this paper, with the support from Internet of
things (IoT) and convolutional neural network (CNN), we proposed a lightweight
solution of ICT devices for smart manufacturing. It consists of efforts from
two aspects: distributed hardware allocation and data reduction. At the first
aspect, ICT devices are separated into four functional units: data acquisition,
cloud storage, computing center and control terminals. They are distributed and
interconnected by IoT. Only the data acquisition unit still remains in the
production lines. This distribution not only slims the ICT device, but also
permits the share of the same functional units. At the second aspect, in the
data acquisition unit, sparse sampling strategy is adopted to reduce the raw
data and singular value decomposition (SVD) is used to compress these data.
They are then transmitted to the cloud storage. At the computing center, an ICT
image reconstruction algorithm and a CNN are applied to these compressed sparse
sampling data to obtain high quality CT images. The experiments with practical
ICT data have been executed to demonstrate the validity of the proposed
solution. The results indicate that this solution can achieve a drastic data
reduction, a storage space save and an efficiency improvement without
significant image degradation. The presented work has been helpful to push the
applications of ICT in smart manufacturing.
|
Neuro-inspired recurrent neural network algorithms, such as echo state
networks, are computationally lightweight and thereby map well onto untethered
devices. The baseline echo state network algorithms are shown to be efficient
in solving small-scale spatio-temporal problems. However, they underperform for
complex tasks that are characterized by multi-scale structures. In this
research, an intrinsic plasticity-infused modular deep echo state network
architecture is proposed to solve complex and multiple timescale temporal
tasks. It outperforms state-of-the-art for time series prediction tasks.
| 0.870061 | 0.655807 | 0.214253 |
2004.06263
|
Coresets for Clustering in Euclidean Spaces: Importance Sampling is
Nearly Optimal
|
Given a collection of $n$ points in $\mathbb{R}^d$, the goal of the
$(k,z)$-clustering problem is to find a subset of $k$ "centers" that minimizes
the sum of the $z$-th powers of the Euclidean distance of each point to the
closest center. Special cases of the $(k,z)$-clustering problem include the
$k$-median and $k$-means problems. Our main result is a unified two-stage
importance sampling framework that constructs an $\varepsilon$-coreset for the
$(k,z)$-clustering problem. Compared to the results for $(k,z)$-clustering in
[Feldman and Langberg, STOC 2011], our framework saves a $\varepsilon^2 d$
factor in the coreset size. Compared to the results for $(k,z)$-clustering in
[Sohler and Woodruff, FOCS 2018], our framework saves a
$\operatorname{poly}(k)$ factor in the coreset size and avoids the
$\exp(k/\varepsilon)$ term in the construction time. Specifically, our coreset
for $k$-median ($z=1$) has size $\tilde{O}(\varepsilon^{-4} k)$ which, when
compared to the result in [Sohler and Woodruff, STOC 2018], saves a $k$ factor
in the coreset size. Our algorithmic results rely on a new dimensionality
reduction technique that connects two well-known shape fitting problems:
subspace approximation and clustering, and may be of independent interest. We
also provide a size lower bound of $\Omega\left(k\cdot \min \left\{2^{z/20},d
\right\}\right)$ for a $0.01$-coreset for $(k,z)$-clustering, which has a
linear dependence of size on $k$ and an exponential dependence on $z$ that
matches our algorithmic results.
|
We address the problem of sensing the curvature of a manifold by performing
measurements on a particle constrained to the manifold itself. In particular,
we consider situations where the dynamics of the particle is quantum mechanical
and the manifold is a surface embedded in the three-dimensional Euclidean
space. We exploit ideas and tools from quantum estimation theory to quantify
the amount of information encoded into a state of the particle, and to seek for
optimal probing schemes, able to actually extract this information. Explicit
results are found for a free probing particle and in the presence of a magnetic
field. We also address precision achievable by position measurement, and show
that it provides a nearly optimal detection scheme, at least to estimate the
radius of a sphere or a cylinder.
| 0.87471 | 0.631967 | 0.242742 |
2004.06264
|
Splitting properties of linear differential systems with small delays
|
We investigate singular perturbation problems caused by small delays in the
view of pseudo-exponential dichotomy. For a general linear non-autonomous
retarded differential equation with small delay, previous works established the
existence of a pseudo-exponential dichotomy. The main objective of this paper
is to give a detailed analysis of three splitting properties of this dichotomy.
By obtaining serval new estimates and giving the explicit expressions of the
bounds and the exponents associated with this dichotomy, we prove that as the
delay tends to zero, the spectral gap approaches to infinity, and the angular
distance and the separation index associated with this dichotomy are bounded
from below by a positive constant which is independent of the delay.
|
We introduce and discuss Fr\'echet differentiability for maps between
Fr\'echet spaces. For delay differential equations $x'(t)=f(x_t)$ we construct
a continuous semiflow of continuously differentiable solution operators
$x_0\mapsto x_t$, $t\ge0$, on submanifolds of the Fr\'echet space
$C^1((-\infty,0],\mathbb{R}^n)$, and establish local invariant manifolds at
stationary points by means of transversality and embedding properties. The
results apply to examples with unbounded but locally bounded delay.
| 0.813145 | 0.729041 | 0.084105 |
2004.06265
|
On the Origin of an F-corona decrease revealed by the Parker Solar Probe
|
The first-year results from the Parker Solar Probe (PSP) reveal a gradual
decrease of F-coronal dust from distances of $D=0.166-0.336$ AU (or the inner
elongations of $\sim 9.22- 18.69~R_{\odot}$) to the Sun, which cannot be
explained by the dust sublimation scenario that predicts a dust-free-zone
$\lesssim 4-5R_{\odot}$. In this paper, we attempt to explain this puzzle using
our newly introduced mechanism of dust destruction so-called Radiative Torque
Disruption (RATD) mechanism. We demonstrate that RATD rapidly breaks large
grains into nanoparticles so that they can be efficiently destroyed by
nonthermal sputtering induced by bombardment of energetic protons from slow
solar winds. This joint effect extends the dust-free-zone established by
thermal sublimation to $R_{dfz}\sim 8R_{\odot}$, which is called a new
dust-free-zone. Beyond this new dust-free-zone, we find that the dust mass
decreases gradually from $R\sim 42R_{\odot}$ toward the Sun due to partial
removal of nanodust by nonthermal sputtering. This feature can successfully
reproduce the gradual decrease of the F-corona between $19-9R_{\odot}$ observed
by the PSP. Finally, the RATD mechanism can efficiently produce nanoparticles
usually observed in the inner solar system.
|
Small, impulsive jets commonly occur throughout the solar corona, but are
especially visible in coronal holes. Evidence is mounting that jets are part of
a continuum of eruptions that extends to much larger coronal mass ejections and
eruptive flares. Because coronal-hole jets originate in relatively simple
magnetic structures, they offer an ideal testbed for theories of energy buildup
and release in the full range of solar eruptions. We analyzed an equatorial
coronal-hole jet observed by SDO/AIA on 09 January 2014, in which the
magnetic-field structure was consistent with the embedded-bipole topology that
we identified and modeled previously as an origin of coronal jets. In addition,
this event contained a mini-filament, which led to important insights into the
energy storage and release mechanisms. SDO/HMI magnetograms revealed footpoint
motions in the primary minority-polarity region at the eruption site, but show
negligible flux emergence or cancellation for at least 16 hours before the
eruption. Therefore, the free energy powering this jet probably came from
magnetic shear concentrated at the polarity inversion line within the embedded
bipole. We find that the observed activity sequence and its interpretation
closely match the predictions of the breakout jet model, strongly supporting
the hypothesis that the breakout model can explain solar eruptions on a wide
range of scales.
| 0.805889 | 0.785793 | 0.020096 |
2004.06266
|
Evolution Features and Behavior Characters of Friendship Networks on
Campus Life
|
Analyzing and mining students' behaviors and interactions from big data is an
essential part of education data mining. Based on the data of campus smart
cards, which include not only static demographic information but also dynamic
behavioral data from more than 30000 anonymous students, in this paper, the
evolution features of friendship and the relations between behavior characters
and student interactions are investigated. On the one hand, four different
evolving friendship networks are constructed by means of the friend ties
proposed in this paper, which are extracted from monthly consumption records.
In addition, the features of the giant connected components (GCCs) of
friendship networks are analyzed via social network analysis (SNA) and
percolation theory. On the other hand, two high-level behavior characters,
orderliness and diligence, are adopted to analyze their associations with
student interactions. Our experiment/empirical results indicate that the sizes
of friendship networks have declined with time growth and both the small-world
effect and power-law degree distribution are found in friendship networks.
Second, the results of the assortativity coefficient of both orderliness and
diligence verify that there are strong peer effects among students. Finally,
the percolation analysis of orderliness on friendship networks shows that a
phase transition exists, which is enlightening in that swarm intelligence can
be realized by intervening the key students near the transition point.
|
We consider the criticality for firing structures of a simplified
integrate-and-fire neural model on the regular network, small-world network,
and random networks. We simplify an integrate-and-fire model suggested by
Levina, Herrmann and Geisel (LHG). In our model we set up the synaptic strength
as a constant value. We observed the power law behaviors of the probability
distribution of the avalanche size and the life time of the avalanche. The
critical exponents in the small-world network and the random network were the
same as those in the fully connected network. However, in the regular
one-dimensional ring, the model does not show the critical behaviors. In the
simplified LHG model, the short-cuts are crucial role in the self-organized
criticality. The simplified LHG model in three types of networks such as the
fully connected network, the small-world network, and random network belong to
the same universality class.
| 0.865046 | 0.6675 | 0.197546 |
2004.06267
|
RealMonoDepth: Self-Supervised Monocular Depth Estimation for General
Scenes
|
We present a generalised self-supervised learning approach for monocular
estimation of the real depth across scenes with diverse depth ranges from
1--100s of meters. Existing supervised methods for monocular depth estimation
require accurate depth measurements for training. This limitation has led to
the introduction of self-supervised methods that are trained on stereo image
pairs with a fixed camera baseline to estimate disparity which is transformed
to depth given known calibration. Self-supervised approaches have demonstrated
impressive results but do not generalise to scenes with different depth ranges
or camera baselines. In this paper, we introduce RealMonoDepth a
self-supervised monocular depth estimation approach which learns to estimate
the real scene depth for a diverse range of indoor and outdoor scenes. A novel
loss function with respect to the true scene depth based on relative depth
scaling and warping is proposed. This allows self-supervised training of a
single network with multiple data sets for scenes with diverse depth ranges
from both stereo pair and in the wild moving camera data sets. A comprehensive
performance evaluation across five benchmark data sets demonstrates that
RealMonoDepth provides a single trained network which generalises depth
estimation across indoor and outdoor scenes, consistently outperforming
previous self-supervised approaches.
|
We show how to train a fully convolutional neural network to perform inverse
rendering from a single, uncontrolled image. The network takes an RGB image as
input, regresses albedo and normal maps from which we compute lighting
coefficients. Our network is trained using large uncontrolled image collections
without ground truth. By incorporating a differentiable renderer, our network
can learn from self-supervision. Since the problem is ill-posed we introduce
additional supervision: 1. We learn a statistical natural illumination prior,
2. Our key insight is to perform offline multiview stereo (MVS) on images
containing rich illumination variation. From the MVS pose and depth maps, we
can cross project between overlapping views such that Siamese training can be
used to ensure consistent estimation of photometric invariants. MVS depth also
provides direct coarse supervision for normal map estimation. We believe this
is the first attempt to use MVS supervision for learning inverse rendering.
| 0.91977 | 0.787394 | 0.132376 |
2004.06268
|
Materials Requirements of High-Speed and Low-Power Spin-Orbit-Torque
Magnetic Random-Access Memory
|
As spin-orbit-torque magnetic random-access memory (SOT-MRAM) is gathering
great interest as the next-generation low-power and high-speed on-chip cache
memory applications, it is critical to analyze the magnetic tunnel junction
(MTJ) properties needed to achieve sub-ns, and ~fJ write operation when
integrated with CMOS access transistors. In this paper, a 2T-1MTJ cell-level
modeling framework for in-plane type Y SOT-MRAM suggests that high spin Hall
conductivity and moderate SOT material sheet resistance are preferred. We
benchmark write energy and speed performances of type Y SOT cells based on
various SOT materials experimentally reported in the literature, including
heavy metals, topological insulators and semimetals. We then carry out detailed
benchmarking of SOT material Pt, beta-W, and BixSe(1-x) with different
thickness and resistivity. We further discuss how our 2T-1MTJ model can be
expanded to analyze other variations of SOT-MRAM, including perpendicular (type
Z) and type X SOT-MRAM, two-terminal SOT-MRAM, as well as spin-transfer-torque
(STT) and voltage-controlled magnetic anisotropy (VCMA)-assisted SOT-MRAM. This
work will provide essential guidelines for SOT-MRAM materials, devices, and
circuits research in the future.
|
Despite the potential advantages of information storage in
antiferromagnetically coupled materials, it remains unclear whether one can
control the magnetic moment orientation efficiently because of the cancelled
magnetic moment. Here, we report spin-orbit torque induced magnetization
switching of ferrimagnetic Co1-xTbx films with perpendicular magnetic
anisotropy. Current induced switching is demonstrated in all of the studied
film compositions, including those near the magnetization compensation point.
The spin-orbit torque induced effective field is further quantified in the
domain wall motion regime. A divergent behavior that scales with the inverse of
magnetic moment is confirmed close to the compensation point, which is
consistent with angular momentum conservation. Moreover, we also quantify the
Dzyaloshinskii-Moriya interaction energy in the Ta/Co1-xTbx system and we find
that the energy density increases as a function of the Tb concentration. The
demonstrated spin-orbit torque switching, in combination with the fast magnetic
dynamics and minimal net magnetization of ferrimagnetic alloys, promises
spintronic devices that are faster and with higher density than traditional
ferromagnetic systems.
| 0.860087 | 0.775888 | 0.084199 |
2004.06269
|
Generalized principal eigenvalues of convex nonlinear elliptic operators
in $\mathbb{R}^N$
|
We study the generalized eigenvalue problem in $\mathbb{R}^N$ for a general
convex nonlinear elliptic operator which is locally elliptic and positively
$1$-homogeneous. Generalizing article of Berestycki and Rossi in [Comm. Pure
Appl. Math. 68 (2015), no. 6, 1014-1065] we consider three different notions of
generalized eigenvalues and compare them. We also discuss the maximum
principles and uniqueness of principal eigenfunctions.
|
We study the following nonlinear elliptic problem [-\Delta u =F^{'} (u) in
{\mathbb R}^n] where $F(u)$ is a periodic function. Moser (1986) showed that
for any minimal and nonself-intersecting solution, there exist $ \alpha \in
{\mathbb R}^n$ and $ C>0$ such that [(*) | u- \alpha \cdot x | \leq C.] He also
showed the existence of solutions with any prescribed $\alpha \in {\mathbb
R}^n$. In this note, we first prove that any solution satisfying (*) with
nonzero vector $\alpha$ must be one dimensional. Then we show that in ${\mathbb
R}^2$, for any positive integer $d\geq 1$ there exists a solution with
polynomial growth $|x|^d$.
| 0.935166 | 0.768599 | 0.166567 |
2004.06270
|
Pykat: Python package for modelling precision optical interferometers
|
\textsc{Pykat} is a Python package which extends the popular optical
interferometer modelling software \textsc{Finesse}. It provides a more modern
and efficient user interface for conducting complex numerical simulations, as
well as enabling the use of Python's extensive scientific software ecosystem.
In this paper we highlight the relationship between \textsc{Pykat} and
\textsc{Finesse}, how it is used, and provide an illustrative example of how it
has helped to better understand the characteristics of the current generation
of gravitational wave interferometers.
|
There is an emerging trend of embedding knowledge graphs (KGs) in continuous
vector spaces in order to use those for machine learning tasks. Recently, many
knowledge graph embedding (KGE) models have been proposed that learn low
dimensional representations while trying to maintain the structural properties
of the KGs such as the similarity of nodes depending on their edges to other
nodes. KGEs can be used to address tasks within KGs such as the prediction of
novel links and the disambiguation of entities. They can also be used for
downstream tasks like question answering and fact-checking. Overall, these
tasks are relevant for the semantic web community. Despite their popularity,
the reproducibility of KGE experiments and the transferability of proposed KGE
models to research fields outside the machine learning community can be a major
challenge. Therefore, we present the KEEN Universe, an ecosystem for knowledge
graph embeddings that we have developed with a strong focus on reproducibility
and transferability. The KEEN Universe currently consists of the Python
packages PyKEEN (Python KnowlEdge EmbeddiNgs), BioKEEN (Biological KnowlEdge
EmbeddiNgs), and the KEEN Model Zoo for sharing trained KGE models with the
community.
| 0.877788 | 0.58345 | 0.294338 |
2004.06272
|
Bidirectional Graph Reasoning Network for Panoptic Segmentation
|
Recent researches on panoptic segmentation resort to a single end-to-end
network to combine the tasks of instance segmentation and semantic
segmentation. However, prior models only unified the two related tasks at the
architectural level via a multi-branch scheme or revealed the underlying
correlation between them by unidirectional feature fusion, which disregards the
explicit semantic and co-occurrence relations among objects and background.
Inspired by the fact that context information is critical to recognize and
localize the objects, and inclusive object details are significant to parse the
background scene, we thus investigate on explicitly modeling the correlations
between object and background to achieve a holistic understanding of an image
in the panoptic segmentation task. We introduce a Bidirectional Graph Reasoning
Network (BGRNet), which incorporates graph structure into the conventional
panoptic segmentation network to mine the intra-modular and intermodular
relations within and between foreground things and background stuff classes. In
particular, BGRNet first constructs image-specific graphs in both instance and
semantic segmentation branches that enable flexible reasoning at the proposal
level and class level, respectively. To establish the correlations between
separate branches and fully leverage the complementary relations between things
and stuff, we propose a Bidirectional Graph Connection Module to diffuse
information across branches in a learnable fashion. Experimental results
demonstrate the superiority of our BGRNet that achieves the new
state-of-the-art performance on challenging COCO and ADE20K panoptic
segmentation benchmarks.
|
Text segmentation plays an important role in various Natural Language
Processing (NLP) tasks like summarization, context understanding, document
indexing and document noise removal. Previous methods for this task require
manual feature engineering, huge memory requirements and large execution times.
To the best of our knowledge, this paper is the first one to present a novel
supervised neural approach for text segmentation. Specifically, we propose an
attention-based bidirectional LSTM model where sentence embeddings are learned
using CNNs and the segments are predicted based on contextual information. This
model can automatically handle variable sized context information. Compared to
the existing competitive baselines, the proposed model shows a performance
improvement of ~7% in WinDiff score on three benchmark datasets.
| 0.915996 | 0.688901 | 0.227095 |
2004.06273
|
Compaction Self-Assembly of Ultralow-Binder-Content Thermoplastic
Composites Based on Lunar Soil Simulant
|
In a recent study, we developed ultralow-binder-content (UBC) structural
materials based on lunar soil simulant and thermoset binders. In the current
research, we investigated thermoplastic binders. Compared to thermosets,
advanced thermoplastics could be more UV resistant, more durable, more robust,
and recyclable. Our main technology is the compaction self-assembly (CSA). By
using only ~4 wt% polyetherketoneketone (PEKK) binder, the thermoplastic-binder
UBC composite was stronger than typical steel-reinforced concrete. The CSA
operation was separate from the curing process. This study may provide an
important in-situ resource utilization method for large-scale construction on
Moon.
|
A new experimental set-up using a differential pressure transducer was
developed, that enables the monitoring of volume changes in cyclic triaxial
tests on unsaturated soils. Calibration tests were performed in order to
analyze the performance of the set-up, especially in terms of loading
frequencies. Based on calibration results, a low frequency of 0.05 Hz was
adopted for the tests carried out on the unsaturated loess from northern
France. Five water contents were considered in the tests. The obtained results
have confirmed the efficiency of the new system for volume change monitoring
under cyclic loading. The effect of water content on the cyclic behavior of
loess was clearly evidenced. Finally, some suggestions were made to improve the
accuracy of the system.
| 0.921128 | 0.649357 | 0.27177 |
2004.06274
|
Dissipation range of the energy spectrum in high Reynolds number
turbulence
|
We seek to understand the kinetic energy spectrum in the dissipation range of
fully developed turbulence. The data are obtained by direct numerical
simulations (DNS) of forced Navier-Stokes equations in a periodic domain, for
Taylor-scale Reynolds numbers up to $R_\lambda=650$, with excellent small-scale
resolution of $k_{max}\eta \approx 6$ for all cases (and additionally at
$R_\lambda=1300$ with $k_{max}\eta\approx3$), where $k_{max}$ is the maximum
resolved wavenumber and $\eta$ is the Kolmogorov length scale. We find that,
for a limited range of wavenumbers $k$ past the bottleneck in the range $0.1
\lesssim k\eta \lesssim0.5$, the spectra for all $R_\lambda$ display a
universal stretched exponential behavior of the form $\exp(-k^{2/3})$, in rough
accordance with recent theoretical predictions. The stretched exponential fit
in the near dissipation range $1 \lesssim k\eta \lesssim 4$ does not possess a
unique exponent, which decreases with increasing $R_\lambda$. This region can
be regarded as a crossover between the stretched exponential behavior and the
far dissipation range $k\eta > 6$, in which analytical arguments as well as DNS
data with superfine resolution (S. Khurshid et al., Phys.~Rev.~Fluids 3,
082601, 2018) suggest a $\exp(-k)$ dependence. We remark on the connection to
the multifractal model which hypothesizes a pseudo-algebraic law.
|
A scaling relation for the high frequency regime of streamwise energy spectra
(in frequency domain) in the near-wall region is proposed. This is based on the
dimensional analysis approach of \cite{perry1977} and \cite{Zamalloa2014}
together with the hypothesis that the small-scale fluctuations in the near-wall
region should only depend on the viscous scales, analogous to the Prandtl's
law-of-the-wall for the mean flow. This allows us to examine the lower bound
for the high frequency regime where law-of-the-wall in spectra would hold.
Observations in high-Reynolds-number turbulent boundary layer data indicate
that a conservative estimate for the start of this high frequency regime is
$f^+$ = 0.005 (which corresponds to 200 viscous time-units) across a range of
wall-normal positions and Reynolds numbers. This is sufficient to capture the
energetic viscous-scaled motions such as the near-wall streaks, which has a
time scale of approximately 100 viscous units. This scaling relation and the
spectral collapse is consistent with the observations in internal flows at
lower Reynolds numbers \cite{Zamalloa2014}.
| 0.883844 | 0.852125 | 0.031719 |
2004.06275
|
An interface/boundary-unfitted eXtended HDG method for linear elasticity
problems
|
An interface/boundary-unfitted eXtended hybridizable discontinuous Galerkin
(X-HDG) method of arbitrary order is proposed for linear elasticity interface
problems on unfitted meshes with respect to the interface and domain boundary.
The method uses piecewise polynomials of degrees $k\ (>= 1)$ and $k-1$
respectively for the displacement and stress approximations in the interior of
elements inside the subdomains separated by the interface, and piecewise
polynomials of degree $k$ for the numerical traces of the displacement on the
inter-element boundaries inside the subdomains and on the interface/boundary of
the domain. Optimal error estimates in $L^2$-norm for the stress and
displacement are derived, which are uniform with respect to the Lam\'e constant
$\lambda$. Finally, numerical experiments confirm the theoretical results and
show that the method also applies to the case of crack-tip domain.
|
In this paper, we propose a hybridized discontinuous Galerkin(HDG) method
with reduced stabilization for the Poisson equation. The reduce stabilization
proposed here enables us to use piecewise polynomials of degree $k$ and $k-1$
for the approximations of element and inter-element unknowns, respectively,
unlike the standard HDG methods. We provide the error estimates in the energy
and $L^2$ norms under the chunkiness condition. In the case of $k=1$, it can be
shown that the proposed method is closely related to the Crouzeix-Raviart
nonconforming finite element method. Numerical results are presented to verify
the validity of the proposed method.
| 0.874482 | 0.792171 | 0.08231 |
2004.06276
|
Quantum Black Hole Seismology II: Applications to Astrophysical Black
Holes
|
With the advent of gravitational wave astronomy, searching for gravitational
wave echoes from black holes (BHs) is becoming an interesting probe of their
quantum nature near their horizons. Newborn BHs may be strong emitters of
echoes, as they accompany large perturbations in the surrounding spacetime upon
formation. Utilizing the Quantum Black Hole Seismology framework (Oshita et al.
2020), we study the expected echoes upon BH formation resulting from neutron
star mergers and failed supernovae. For BH remnants from neutron star mergers,
we evaluate the consistency of these models with the recent claim on the
existence of echoes following the neutron star merger event GW170817. We find
that the claimed echoes in GW170817, if real, suggest that overtones contribute
a significant amount of energy in the ringdown of the remnant BH. We finally
discuss the detectability of echoes from failed supernovae by second and
third-generation gravitational wave detectors, and find that current (future)
detectors constrain physical reflectivity models for events occurring within a
few Mpc (a few x 10 Mpc). Detecting such echo signals may significantly
constrain the maximum mass and equation of state of neutron stars.
|
Assuming that general relativity is the correct theory of gravity in the
strong field limit, can gravitational wave observations distinguish between
black hole and other compact object sources? Alternatively, can gravitational
wave observations provide a test of one of the fundamental predictions of
general relativity? Here we describe a definitive test of the hypothesis that
observations of damped, sinusoidal gravitational waves originated from a black
hole or, alternatively, that nature respects the general relativistic no-hair
theorem. For astrophysical black holes, which have a negligible charge-to-mass
ratio, the black hole quasi-normal mode spectrum is characterized entirely by
the black hole mass and angular momentum and is unique to black holes. In a
different theory of gravity, or if the observed radiation arises from a
different source (e.g., a neutron star, strange matter or boson star), the
spectrum will be inconsistent with that predicted for general relativistic
black holes. We give a statistical characterization of the consistency between
the noisy observation and the theoretical predictions of general relativity,
together with a numerical example.
| 0.835359 | 0.757718 | 0.077642 |
2004.06277
|
A Demonstration of Issues with Value-Based Multiobjective Reinforcement
Learning Under Stochastic State Transitions
|
We report a previously unidentified issue with model-free, value-based
approaches to multiobjective reinforcement learning in the context of
environments with stochastic state transitions. An example multiobjective
Markov Decision Process (MOMDP) is used to demonstrate that under such
conditions these approaches may be unable to discover the policy which
maximises the Scalarised Expected Return, and in fact may converge to a
Pareto-dominated solution. We discuss several alternative methods which may be
more suitable for maximising SER in MOMDPs with stochastic transitions.
|
Deep reinforcement learning has over the past few years shown great potential
in learning near-optimal control in complex simulated environments with little
visible information. Rainbow (Q-Learning) and PPO (Policy Optimisation) have
shown outstanding performance in a variety of tasks, including Atari 2600,
MuJoCo, and Roboschool test suite. While these algorithms are fundamentally
different, both suffer from high variance, low sample efficiency, and
hyperparameter sensitivity that in practice, make these algorithms a no-go for
critical operations in the industry.
On the other hand, model-based reinforcement learning focuses on learning the
transition dynamics between states in an environment. If these environment
dynamics are adequately learned, a model-based approach is perhaps the most
sample efficient method for learning agents to act in an environment optimally.
The traits of model-based reinforcement are ideal for real-world environments
where sampling is slow and for mission-critical operations. In the warehouse
industry, there is an increasing motivation to minimise time and to maximise
production. Currently, autonomous agents act suboptimally using handcrafted
policies for significant portions of the state-space.
In this paper, we present The Dreaming Variational Autoencoder v2 (DVAE-2), a
model-based reinforcement learning algorithm that increases sample efficiency,
hence enable algorithms with low sample efficiency function better in
real-world environments. We introduce Deep Warehouse, a simulated environment
for industry-near testing of autonomous agents in grid-based warehouses.
Finally, we illustrate that DVAE-2 improves the sample efficiency for the Deep
Warehouse compared to model-free methods.
| 0.93222 | 0.756428 | 0.175793 |
2004.06278
|
Squares: A Fast Counter-Based RNG
|
In this article, we present a new counter-based random number generator (RNG)
based on John von Neumann's middle square. We've discovered that only three
rounds of squaring are sufficient to provide satisfactory random data. This
appears to be one of the fastest counter-based RNGs.
|
New scintillation counters have been designed and constructed for the CDF
upgrade in order to complete the muon coverage of the central CDF detector, and
to extend this coverage to larger pseudorapidity. A novel light collection
technique using wavelength shifting fibers, together with high quality
polystyrene-based scintillator resulted in compact counters with good and
stable light collection efficiency over lengths extending up to 320 cm. Their
design and construction is described and results of their initial performance
are reported.
| 0.863073 | 0.626128 | 0.236945 |
2004.06279
|
Theory of wavepacket transport under narrow gaps and spatial textures:
non-adiabaticity and semiclassicality
|
We generalise the celebrated semiclassical wavepacket approach from the
adiabatic to the non-adiabatic regime. A unified description covering both of
these regimes is particularly desired for systems with spatially varying band
structures where band gaps of various sizes are simultaneously present, e.g. in
moir\'{e} patterns. For a single wavepacket, alternative to the previous
derivation by Lagrangian variational approach, we show that the same
semiclassical equations of motion can be obtained by introducing a
spatial-texture-induced force operator similar to the Ehrenfest theorem. For
semiclassically computing the current, the ensemble of wavepackets based on
adiabatic dynamics is shown to well correspond to a phase-space fluid for which
the fluid's mass and velocity are two distinguishable properties. This
distinction is not inherited to the ensemble of wavepackets with the
non-adiabatic dynamics. We extend the adiabatic kinetic theory to the
non-adiabatic regime by taking into account decoherence, whose joint action
with electric field favours certain form of inter-band coherence. The
steady-state density matrix as a function of the phase-space variables is then
phenomenologically obtained for calculating the transport current. The result,
applicable with a finite electric field, expectedly reproduces the known
adiabatic limit by taking the electric field to be infinitesimal, and therefore
attains a unified description from the adiabatic to the non-adiabatic
situations.
|
The laser control of photodissociation branching in a diatomic molecule is
demonstrated to be effectively achieved with use of the complete reflection
phenomenon. The phenomenon and the control condition can be nicely formulated
by the semiclassical (Zhu-Nakamura) theory. The method is applied to the
branching between I($^2 P_{3/2}$) (HI $\to$ H + I) and I$^*(^2 P_{1/2})$ (HI
$\to$ H + I$^*$) formation, and nearly complete control is shown to be possible
by appropriately choosing an initial vibrational state and laser frequency in
spite of the fact that there are three electronically excited states involved.
Numerical calculations of the corresponding wavepacket dynamics confirm the
results.
| 0.905666 | 0.740199 | 0.165468 |
2004.06280
|
An Analysis of Python's Topics, Trends, and Technologies Through Mining
Stack Overflow Discussions
|
Python is a popular, widely used, and general-purpose programming language.
In spite of its ever-growing community, researchers have not performed much
analysis on Python's topics, trends, and technologies which provides insights
for developers about Python community trends and main issues. In this article,
we examine the main topics related to this language being discussed by
developers on one of the most popular Q\&A websites, Stack Overflow, as well as
temporal trends through mining 2461876 posts. To be more useful for the
software engineers, we study what Python provides as the alternative to popular
technologies offered by common programming languages like Java. Our results
indicate that discussions about Python standard features, web programming, and
scientific programming. Programming in areas such as mathematics, data science,
statistics, machine learning, natural language processing (NLP), and so forth.
are the most popular areas in the Python community. At the same time, areas
related to scientific programming are steadily receiving more attention from
the Python developers.
|
Among the vast information available on the web, social media streams capture
what people currently pay attention to and how they feel about certain topics.
Awareness of such trending topics plays a crucial role in multimedia systems
such as trend aware recommendation and automatic vocabulary selection for video
concept detection systems.
Correctly utilizing trending topics requires a better understanding of their
various characteristics in different social media streams. To this end, we
present the first comprehensive study across three major online and social
media streams, Twitter, Google, and Wikipedia, covering thousands of trending
topics during an observation period of an entire year. Our results indicate
that depending on one's requirements one does not necessarily have to turn to
Twitter for information about current events and that some media streams
strongly emphasize content of specific categories. As our second key
contribution, we further present a novel approach for the challenging task of
forecasting the life cycle of trending topics in the very moment they emerge.
Our fully automated approach is based on a nearest neighbor forecasting
technique exploiting our assumption that semantically similar topics exhibit
similar behavior.
We demonstrate on a large-scale dataset of Wikipedia page view statistics
that forecasts by the proposed approach are about 9-48k views closer to the
actual viewing statistics compared to baseline methods and achieve a mean
average percentage error of 45-19% for time periods of up to 14 days.
| 0.854552 | 0.694331 | 0.160221 |
2004.06281
|
xQSM-Quantitative Susceptibility Mapping with Octave Convolutional
Neural Networks
|
Quantitative susceptibility mapping (QSM) is a valuable magnetic resonance
imaging (MRI) contrast mechanism that has demonstrated broad clinical
applications. However, the image reconstruction of QSM is challenging due to
its ill-posed dipole inversion process. In this study, a new deep learning
method for QSM reconstruction, namely xQSM, was designed by introducing
modified state-of-the-art octave convolutional layers into the U-net backbone.
The xQSM method was compared with recently-proposed U-net-based and
conventional regularization-based methods, using peak signal to noise ratio
(PSNR), structural similarity (SSIM), and region-of-interest measurements. The
results from a numerical phantom, a simulated human brain, four in vivo healthy
human subjects, a multiple sclerosis patient, a glioblastoma patient, as well
as a healthy mouse brain showed that the xQSM led to suppressed artifacts than
the conventional methods, and enhanced susceptibility contrast, particularly in
the iron-rich deep grey matter region, than the original U-net, consistently.
The xQSM method also substantially shortened the reconstruction time from
minutes using conventional iterative methods to only a few seconds.
|
We propose a new encoder-decoder approach to learn distributed sentence
representations that are applicable to multiple purposes. The model is learned
by using a convolutional neural network as an encoder to map an input sentence
into a continuous vector, and using a long short-term memory recurrent neural
network as a decoder. Several tasks are considered, including sentence
reconstruction and future sentence prediction. Further, a hierarchical
encoder-decoder model is proposed to encode a sentence to predict multiple
future sentences. By training our models on a large collection of novels, we
obtain a highly generic convolutional sentence encoder that performs well in
practice. Experimental results on several benchmark datasets, and across a
broad range of applications, demonstrate the superiority of the proposed model
over competing methods.
| 0.874988 | 0.641033 | 0.233956 |
2004.06282
|
Fusion Structure from Exchange Symmetry in (2+1)-Dimensions
|
While the principles behind the exotic statistical behaviour of anyons are
well-documented in the literature, a similar treatment for the origins of their
fusion structure is often neglected. In this paper, we seek to clarify the
matter. By considering the action of braiding on quasiparticles in two spatial
dimensions, we describe the fusion structure amongst the superselection sectors
of the system. Exchange symmetry is formulated in terms of the motion group and
we recover the boson-fermion superselection rule in three spatial dimensions.
We then adapt our formulation of exchange symmetry for the two-dimensonal case.
Given a system of $n$ quasiparticles, we see that the action of a specific
$n$-braid $\beta_{n}$ uniquely specifies its superselection sectors. We prove
several braid identities for $\beta_{n}$ that allow us to recover the fusion
structure of anyons. Finally, we give an overview of the braiding and fusion
structure of quasiparticles in the usual setting of braided $6j$ fusion systems
and observe some $R$-matrix identities that follow from the action of
$\beta_{n}$. These identities give an ansatz for the form of the monodromy
operator which agrees with the ribbon property.
|
We classify tensors with maximal and next to maximal dimensional symmetry
groups under a natural genericity assumption (1-genericity), in dimensions
greater than 13. In other words, we classify minimal dimensional orbits in the
space of (m,m,m) tensors assuming 1-genericity. Our study uncovers new tensors
with striking geometry. This paper was motivated by Strassen's laser method for
bounding the exponent of matrix multiplication. The best known tensor for the
laser method is the large Coppersmith-Winograd tensor, and our study began with
the observation that it has a large symmetry group, of dimension m^2/2 +m/2. We
show that in odd dimensions, this is the largest possible for a 1-generic
tensor, but in even dimensions we exhibit a tensor with a larger dimensional
symmetry group. In the course of the proof, we classify nondegenerate bilinear
forms with large dimensional stabilizers, which may be of interest in its own
right.
| 0.830758 | 0.763278 | 0.06748 |
2004.06283
|
Non-Hermitian Floquet second order topological insulators in
periodically quenched lattices
|
Higher-order topological phases are characterized by protected states
localized at the corners or hinges of the system. By applying time-periodic
quenches to a two-dimensional lattice with balanced gain and loss, we obtain a
rich variety of non-Hermitian Floquet second order topological insulating
phases. Each of the phases is characterized by a pair of integer topological
invariants, which predict the numbers of Floquet corner modes at zero and $\pi$
quasienergies. We establish the topological phase diagram of the model, and
find a series of non-Hermiticity induced transitions between different Floquet
second order topological phases. We further generalize the mean chiral
displacement to two-dimensional non-Hermitian systems, and use it to extract
the topological invariants of our model dynamically. This work thus extend the
study of higher-order topological matter to more generic nonequilibrium
settings, in which the interplay between Floquet engineering and
non-Hermiticity yields fascinating new phases.
|
We propose a route towards creating a metamaterial that behaves as a photonic
Chern insulator, through homogenization of an array of gyromagnetic cylinders.
We show that such an array can exhibit non-trivial topological effects,
including topologically non-trivial band gaps and one-way edge states, when it
can be homogenized to an effective medium model that has the Berry curvature
strongly peaked at the wavevector k=0. The non-trivial band topology depends
only on the parameters of the cylinders and the cylinders' density, and can be
realized in a wide variety of different lattices including periodic,
quasi-periodic and random lattices. Our system provides a platform to explore
the interplay between disorder and topology and also opens a route towards
synthesis of topological meta-materials based on the self-assembly approach.
| 0.928366 | 0.832626 | 0.095739 |
2004.06284
|
Wireless Information and Power Transfer for IoT Applications in Overlay
Cognitive Radio Networks
|
This paper proposes and investigates an overlay spectrum sharing system in
conjunction with the simultaneous wireless information and power transfer
(SWIPT) to enable communications for the Internet of Things (IoT) applications.
Considered is a cooperative cognitive radio network, where two IoT devices
(IoDs) exchange their information and also provide relay assistance to a pair
of primary users (PUs). Different from most existing works, in this paper, both
IoDs can harvest energy from the radio-frequency (RF) signals received from the
PUs. By utilizing the harvested energy, they provide relay cooperation to PUs
and realize their own communications. For harvesting energy, a time-switching
(TS) based approach is adopted at both IoDs. With the proposed scheme, one
round of bidirectional information exchange for both primary and IoT systems is
performed in four phases, i.e., one energy harvesting (EH) phase and three
information processing (IP) phases. Both IoDs rely on the decode-and-forward
operation to facilitate relaying, whereas the PUs employ selection combining
(SC) technique. For investigating the performance of the considered network,
this paper first provides exact expressions of user outage probability (OP) for
the primary and IoT systems under Nakagami-m fading. Then, by utilizing the
expressions of user OP, the system throughput and energy efficiency are
quantified together with the average end-to-end transmission time. Numerical
and simulation results are provided to give useful insights into the system
behavior and to highlight the impact of various system/channel parameters.
|
A systematic design of adaptive waveform for Wireless Power Transfer (WPT)
has recently been proposed and shown through simulations to lead to significant
performance benefits compared to traditional non-adaptive and heuristic
waveforms. In this study, we design the first prototype of a closed-loop
wireless power transfer system with adaptive waveform optimization based on
Channel State Information acquisition. The prototype consists of three
important blocks, namely the channel estimator, the waveform optimizer, and the
energy harvester. Software Defined Radio (SDR) prototyping tools are used to
implement a wireless power transmitter and a channel estimator, and a voltage
doubler rectenna is designed to work as an energy harvester. A channel adaptive
waveform with 8 sinewaves is shown through experiments to improve the average
harvested DC power at the rectenna output by 9.8% to 36.8% over a non-adaptive
design with the same number of sinewaves.
| 0.890874 | 0.748789 | 0.142085 |
2004.06285
|
Further results on the rainbow vertex-disconnection of graphs
|
Let $G$ be a nontrivial connected and vertex-colored graph. A subset $X$ of
the vertex set of $G$ is called rainbow if any two vertices in $X$ have
distinct colors. The graph $G$ is called \emph{rainbow vertex-disconnected} if
for any two vertices $x$ and $y$ of $G$, there exists a vertex subset $S$ such
that when $x$ and $y$ are nonadjacent, $S$ is rainbow and $x$ and $y$ belong to
different components of $G-S$; whereas when $x$ and $y$ are adjacent, $S+x$ or
$S+y$ is rainbow and $x$ and $y$ belong to different components of $(G-xy)-S$.
Such a vertex subset $S$ is called a \emph{rainbow vertex-cut} of $G$. For a
connected graph $G$, the \emph{rainbow vertex-disconnection number} of $G$,
denoted by $rvd(G)$, is the minimum number of colors that are needed to make
$G$ rainbow vertex-disconnected.
In this paper, we obtain the bounds of rainbow vertex-disconnection number of
a graph in terms of the minimum degree and maximum degree of the graph. We
characterize the graphs of order $n$ with rainbow vertex-disconnection number
$n-1$ and obtain the maximum size of graph $G$ with $rvd(G)=n-1$. Moreover, we
get the sharp threshold function for the property $rvd(G(n,p))=n$ and prove
that almost all graphs $G$ have $rvd(G)=rvd(\overline{G})=n$. Finally, we
obtain some Nordhaus-Gaddum-type results $n-5\leq rvd(G)+rvd(\overline{G})\leq
2n$ and $n-1\leq rvd(G)\cdot rvd(\overline{G})\leq n^2$ for the rainbow
vertex-disconnection numbers of nontrivial connected graphs $G$ and
$\overline{G}$ with order $n\geq 24$.
|
Considering a natural generalization of the Ruzsa-Szemer\'edi problem, we
prove that for any fixed positive integers $r,s$ with $r<s$, there are graphs
on $n$ vertices containing $n^{r}e^{-O(\sqrt{\log{n}})}=n^{r-o(1)}$ copies of
$K_s$ such that any $K_r$ is contained in at most one $K_s$. We also give
bounds for the generalized rainbow Tur\'an problem $\operatorname{ex}(n,
H,$rainbow-$F)$ when $F$ is complete. In particular, we answer a question of
Gerbner, M\'esz\'aros, Methuku and Palmer, showing that there are properly
edge-coloured graphs on $n$ vertices with $n^{r-1-o(1)}$ copies of $K_r$ such
that no $K_r$ is rainbow.
| 0.886383 | 0.792808 | 0.093576 |
2004.06286
|
Transfer Learning for EEG-Based Brain-Computer Interfaces: A Review of
Progresses Since 2016
|
A brain-computer interface (BCI) enables a user to communicate directly with
a computer using the brain signals. Electroencephalogram (EEG) is the most
frequently used input signal in BCIs. However, EEG signals are weak, easily
contaminated by interferences and noise, non-stationary for the same subject,
and varying among different subjects. So, it is difficult to build a generic
pattern recognition model in an EEG-based BCI system that is optimal for
different subjects, in different sessions, for different devices and tasks.
Usually a calibration session is needed to collect some subject-specific data
for a new subject, which is time-consuming and user-unfriendly. Transfer
learning (TL), which can utilize data or knowledge from similar or relevant
subjects/sessions/devices/tasks to facilitate the learning for a new
subject/session/device/task, is frequently used to alleviate this calibration
requirement. This paper reviews journal publications on TL approaches in
EEG-based BCIs in the last few years, i.e., since 2016. Six paradigms and
applications -- motor imagery (MI), event related potentials (ERP),
steady-state visual evoked potentials (SSVEP), affective BCIs (aBCI),
regression problems, and adversarial attacks -- are considered. For each
paradigm/application, we group the TL approaches into cross-subject/session,
cross-device, and cross-task settings and review them separately. Observations
and conclusions are made at the end of the paper, which may point to future
research directions.
|
At present, artificial intelligence in the form of machine learning is making
impressive progress, especially the field of deep learning (DL) [1]. Deep
learning algorithms have been inspired from the beginning by nature,
specifically by the human brain, in spite of our incomplete knowledge about its
brain function. Learning from nature is a two-way process as discussed in
[2][3][4], computing is learning from neuroscience, while neuroscience is
quickly adopting information processing models. The question is, what can the
inspiration from computational nature at this stage of the development
contribute to deep learning and how much models and experiments in machine
learning can motivate, justify and lead research in neuroscience and cognitive
science and to practical applications of artificial intelligence.
| 0.888269 | 0.661674 | 0.226595 |
2004.06287
|
Development of ultra-pure NaI(Tl) detector for COSINE-200 experiment
|
The annual modulation signal observed by the DAMA experiment is a long
standing question in the community of dark matter direct detection. This
necessitates an independent verification for its origin using the same
detection technique. The COSINE-100 experiment has been operating with 106~kg
of low-background NaI(Tl) detectors providing interesting checks for the DAMA
signal. However, due to higher background in the NaI(Tl) crystals used in
COSINE-100 relative to those used for DAMA, it was difficult to reach final
conclusions. Since the start of COSINE-100 data taking in 2016, we also have
initiated a program to develop ultra-pure NaI(Tl) crystals for COSINE-200, the
next phase of the experiment. The program includes efforts of raw powder
purification, ultra-pure NaI(Tl) crystal growth, and detector assembly. With
extensive research and development of NaI(Tl) crystal growth, we have
successfully grown a few Tl-doped crystals with high radio-purity. A high light
yield has been achieved with our detector assembly technique. Here we report
the ultra-pure NaI(Tl) detector developments at the Institute for Basic
Science, Korea. The technique developed here will be applied to the production
of ultra-pure NaI(Tl) detectors for the COSINE-200 experiment.
|
At present the results in the field of direct dark matter search are in
tension: the positive claim of DAMA/LIBRA versus null results from other
experiments. However, the comparison of the results of different experiments
involves model dependencies, in particular because of the different target
materials in use. The COSINUS R&D project aims to operate NaI as a cryogenic
calorimeter. Such a detector would not only allow for a direct comparison to
DAMA/LIBRA, but would also provide a low(er) nuclear recoil threshold and
particle discrimination.
| 0.868305 | 0.771384 | 0.096921 |
2004.06288
|
Towards Robust Classification with Image Quality Assessment
|
Recent studies have shown that deep convolutional neural networks (DCNN) are
vulnerable to adversarial examples and sensitive to perceptual quality as well
as the acquisition condition of images. These findings raise a big concern for
the adoption of DCNN-based applications for critical tasks. In the literature,
various defense strategies have been introduced to increase the robustness of
DCNN, including re-training an entire model with benign noise injection,
adversarial examples, or adding extra layers. In this paper, we investigate the
connection between adversarial manipulation and image quality, subsequently
propose a protective mechanism that doesnt require re-training a DCNN. Our
method combines image quality assessment with knowledge distillation to detect
input images that would trigger a DCCN to produce egregiously wrong results.
Using the ResNet model trained on ImageNet as an example, we demonstrate that
the detector can effectively identify poor quality and adversarial images.
|
Purpose: The aim of this phantom study was to evaluate the influence of
patient alignment on the image quality by a C-arm flat-panel detector computer
tomography (CACT).
Materials and Methods: An ACR phantom placed in two opposite directions along
the z-Axis was imaged using a CACT. Image acquisition was performed by three
different image acquisition protocols using fixed X-ray tube voltages of 81,
102 and 125 kVp. The images were reconstructed with four different convolution
kernels, i.e. normal, sharp, soft and very soft. Image quality was assessed in
terms of high contrast image quality using the modulation transfer function
(MTF) and low contrast image quality by assessing the signal-to-noise ratio
(SNR) and contrast-to-noise ratios (CNR) as well as reliability of density
measurements. Furthermore, the dose intensity profiles parallel and
perpendicular to the patient support were measured free-in-air.
Results: The intensity profile of the CACT measured by the detector system
free-in-air showed that the anode heel effect is not in the longitudinal
direction to the z-axis. The image noises measured in Setup A for the air and
bone inserts were systematically higher compared to those measured in Setup B,
in average about 3% and 4% for the air and bone inserts, respectively. An
opposite behavior has been observed for the polyethylene, water-equivalent and
acrylic inserts. The corresponding image noises were in average about 4%, 6%
and 2% lower measured in Setup A compared to those measured in Setup B. SNR for
all inserts behaves inversely to the image noise.
Conclusion: The patient alignment has a minor influence on the image quality
of CACT. This effect is not based on the X-ray anode heel effect. It is caused
mainly. This effect is caused mainly by the non-symmetrical rotation of the
CACT.
| 0.751663 | 0.625055 | 0.126607 |
2004.06289
|
On Vickrey's Income Averaging
|
We consider a small set of axioms for income averaging -- recursivity,
continuity, and the boundary condition for the present. These properties yield
a unique averaging function that is the density of the reflected Brownian
motion with a drift started at the current income and moving over the past
incomes. When averaging is done over the short past, the weighting function is
asymptotically converging to a Gaussian. When averaging is done over the long
horizon, the weighing function converges to the exponential distribution. For
all intermediate averaging scales, we derive an explicit solution that
interpolates between the two.
|
Historical studies of labor markets frequently lack data on individual
income. The occupational income score (OCCSCORE) is often used as an
alternative measure of labor market outcomes. We consider the consequences of
using OCCSCORE when researchers are interested in earnings regressions. We
estimate race and gender earnings gaps in modern decennial Censuses as well as
the 1915 Iowa State Census. Using OCCSCORE biases results towards zero and can
result in estimated gaps of the wrong sign. We use a machine learning approach
to construct a new adjusted score based on industry, occupation, and
demographics. The new income score provides estimates closer to earnings
regressions. Lastly, we consider the consequences for estimates of
intergenerational mobility elasticities.
| 0.843039 | 0.709834 | 0.133205 |
2004.06290
|
A global nonhydrostatic dynamical core on cubed sphere using
multi-moment finite volume method: formulation and preliminary test
|
A nonhydrostatic dynamical core has been developed by using the multi-moment
finite volume method that ensures the rigorous numerical conservation. To
represent the spherical geometry free of polar problems, the cubed-sphere grid
is adopted. A fourth-order multi-moment discretization formulation is applied
to the nonhydrostatic governing equations cast in local curvilinear coordinates
on each patch of cubed sphere through a gnomonic projection. In vertical
direction, the height-based terrain-following grid is used to represent the
topography. To get around the CFL stability restriction imposed by relatively
small grid spacing in the vertical direction, the dimensional-splitting time
integration using the HEVI (Horizontal Explicit and Vertical Implicit) strategy
is implemented by applying the IMEX Runge-Kutta scheme. The proposed dynamical
core preserves the fourth-order accuracy in spherical geometry and has been
verified by the widely-used benchmark tests. The results of our numerical
experiments show that the present numerical core has superior solution quality
and great practical potential as a platform for atmospheric models. A new
unified model for numerical weather prediction and global atmospheric
circulation simulation based on this dynamical core is under development.
|
Among the algorithms that are likely to play a major role in future exascale
computing, the fast multipole method (FMM) appears as a rising star. Our
previous recent work showed scaling of an FMM on GPU clusters, with problem
sizes in the order of billions of unknowns. That work led to an extremely
parallel FMM, scaling to thousands of GPUs or tens of thousands of CPUs. This
paper reports on a a campaign of performance tuning and scalability studies
using multi-core CPUs, on the Kraken supercomputer. All kernels in the FMM were
parallelized using OpenMP, and a test using 10^7 particles randomly distributed
in a cube showed 78% efficiency on 8 threads. Tuning of the
particle-to-particle kernel using SIMD instructions resulted in 4x speed-up of
the overall algorithm on single-core tests with 10^3 - 10^7 particles. Parallel
scalability was studied in both strong and weak scaling. The strong scaling
test used 10^8 particles and resulted in 93% parallel efficiency on 2048
processes for the non-SIMD code and 54% for the SIMD-optimized code (which was
still 2x faster). The weak scaling test used 10^6 particles per process, and
resulted in 72% efficiency on 32,768 processes, with the largest calculation
taking about 40 seconds to evaluate more than 32 billion unknowns. This work
builds up evidence for our view that FMM is poised to play a leading role in
exascale computing, and we end the paper with a discussion of the features that
make it a particularly favorable algorithm for the emerging heterogeneous and
massively parallel architectural landscape.
| 0.869602 | 0.691209 | 0.178393 |
2004.06291
|
Modeling, state estimation, and optimal control for the US COVID-19
outbreak
|
The novel coronavirus SARS-CoV-2 and resulting COVID-19 disease have had an
unprecedented spread and continue to cause a increasing number of fatalities
worldwide. While vaccines are still under development, social distancing,
extensive testing, and quarantine of confirmed infected subjects remain the
most effective measures to contain the pandemic. These measures carry a
significant socioeconomic cost. In this work, we introduce a novel
optimization-based decision-making framework for managing the COVID-19 outbreak
in the US. This includes modeling the dynamics of affected populations,
estimating the model parameters and hidden states from data, and an optimal
control strategy for sequencing social distancing and testing events such that
the number of infections is minimized. The analysis of our extensive
computational efforts reveals that social distancing and quarantining are most
effective when implemented early, with quarantining of confirmed infected
subjects having a much higher impact. Further, we find that "on-off" policies
alternating between strict social distancing and relaxing such restrictions can
be effective at "flattening" the curve while likely minimizing social and
economic cost.
|
A proactive approach to raise awareness while preventing misinformation is a
modern-day challenge in all domains including healthcare. Such awareness and
sensitization approaches to prevention and containment are important components
of a strong healthcare system, especially in the times of outbreaks such as the
ongoing Covid-19 pandemic. However, there is a fine balance between continuous
awareness-raising by providing new information and the risk of misinformation.
In this work, we address this gap by creating a life-long learning application
that delivers authentic information to users in Hindi, the most widely used
local language in India. It does this by matching sources of verified and
authentic information such as the WHO reports against daily news by using
machine learning and natural language processing. It delivers the narrated
content in Hindi by using state-of-the-art text to speech engines. Finally, the
approach allows user input for continuous improvement of news feed relevance on
a daily basis. We demonstrate a focused application of this approach for Water,
Sanitation, Hygiene as it is critical in the containment of the currently
raging Covid-19 pandemic through the WashKaro android application. Thirteen
combinations of pre-processing strategies, word-embeddings, and similarity
metrics were evaluated by eight human users via calculation of agreement
statistics. The best performing combination achieved a Cohen's Kappa of 0.54
and was deployed in the WashKaro application back-end. Interventional studies
for evaluating the effectiveness of the WashKaro application for preventing
WASH-related diseases are planned to be carried out in the Mohalla clinics that
provided 3.5 Million consults in 2019 in Delhi, India. Additionally, the
application also features human-curated and vetted information to reach out to
the community as audio-visual content in local languages.
| 0.859574 | 0.704403 | 0.155171 |
2004.06292
|
Gelato: Feedback-driven and Guided Security Analysis of Client-side Web
Applications
|
Even though a lot of effort has been invested in analyzing client-side web
applications during the past decade, the existing tools often fail to deal with
the complexity of modern JavaScript applications. However, from an attacker
point of view, the client side of such web applications can reveal invaluable
information about the server side. In this paper, first we study the existing
tools and enumerate the most crucial features a security-aware client-side
analysis should be supporting. Next, we propose GELATO to detect
vulnerabilities in modern client-side JavaScript applications that are built
upon complex libraries and frameworks. In particular, we take the first step in
closing the gap between state-aware crawling and client-side security analysis
by proposing a feedback-driven security-aware guided crawler that is able to
analyze complex frameworks automatically, and increase the coverage of
security-sensitive parts of the program efficiently. Moreover, we propose a new
lightweight client-side taint analysis that outperforms the start-of-the-art
tools, requires no modification to browsers, and reports non-trivial taint
flows on modern JavaScript applications.
|
In the standard web browser programming model, third-party scripts included
in an application execute with the same privilege as the application's own
code. This leaves the application's confidential data vulnerable to theft and
leakage by malicious code and inadvertent bugs in the third-party scripts.
Security mechanisms in modern browsers (the same-origin policy, cross-origin
resource sharing and content security policies) are too coarse to suit this
programming model. All these mechanisms (and their extensions) describe whether
or not a script can access certain data, whereas the meaningful requirement is
to allow untrusted scripts access to confidential data that they need and to
prevent the scripts from leaking data on the side. Motivated by this gap, we
propose WebPol, a policy mechanism that allows a website developer to include
fine-grained policies on confidential application data in the familiar syntax
of the JavaScript programming language. The policies can be associated with any
webpage element, and specify what aspects of the element can be accessed by
which third-party domains. A script can access data that the policy allows it
to, but it cannot pass the data (or data derived from it) to other scripts or
remote hosts in contravention of the policy. To specify the policies, we expose
a small set of new native APIs in JavaScript. Our policies can be enforced
using any of the numerous existing proposals for information flow tracking in
web browsers. We have integrated our policies into one such proposal that we
use to evaluate performance overheads and to test our examples.
| 0.882933 | 0.759516 | 0.123416 |
2004.06293
|
Collapse of the Fano Resonance Caused by the Nonlocality of the Majorana
State
|
One of the main features of the Majorana state, which attracts a considerable
current interest to these excitations in solid-state systems, is related to its
nonlocal character. It is demonstrated that the direct consequence of such
nonlocality is the collapse of the Fano resonance manifesting itself in the
conductance of an asymmetric interference device, the arms of which are
connected by a one-dimensional topological superconductor. In the framework of
the spinless model, it is shown that the predicted effect is associated with an
increase in the multiplicity of the degeneracy of the zero-energy state of the
structure arising at a specific case of the Kitaev model. Such an increase
leads to the formation of a bound state in the continuum.
|
We theoretically investigate phosphorene zigzag nanorribons as a platform for
constriction engineering. In the presence of a constriction at the upper edge,
quantum confinement of edge protected states reveals resonant tunnelling
Breit-Wigner transmission peaks, if the upper edge is uncoupled to the lower
edge. Coupling between edges in thin constrictions gives rise to Fano-like and
anti-resonances in the transmission spectrum of the system.
| 0.894665 | 0.674972 | 0.219693 |
2004.06294
|
A High Coverage Camera Assisted Received Signal Strength Ratio Algorithm
for Indoor Visible Light Positioning
|
In this paper, a high coverage algorithm termed enhanced camera assisted
received signal strength ratio (eCA-RSSR) positioning algorithm is proposed for
visible light positioning (VLP) systems. The basic idea of eCA-RSSR is to
utilize visual information captured by the camera to estimate the incidence
angles of visible lights first. Based on the incidence angles, eCA-RSSR
utilizes the received signal strength ratio (RSSR) calculated by the photodiode
(PD) to estimate the ratios of the distances between the LEDs and the receiver.
Based on an Euclidean plane geometry theorem, eCA-RSSR transforms the ratios of
the distances into the absolute values. In this way, eCA-RSSR only requires 3
LEDs for both orientation-free 2D and 3D positioning, implying that eCA-RSSR
can achieve high coverage. Based on the absolute values of the distances, the
linear least square method is employed to estimate the position of the
receiver. Therefore, for the receiver having a small distance between the PD
and the camera, the accuracy of eCA-RSSR does not depend on the starting values
of the non-linear least square method and the complexity of eCA-RSSR is low.
Furthermore, since the distance between the PD and camera can significantly
affect the performance of eCA-RSSR, we further propose a compensation algorithm
for eCA-RSSR based on the single-view geometry. Simulation results show that
eCA-RSSR can achieve centimeter-level accuracy over 80% indoor area for both
the receivers having a small and a large distance between the PD and the
camera.
|
The efficiency of wireless technology depends upon the seamless connectivity
to the user at anywhere any time.Heterogeneous wireless networks are an
integration of different networks with diversified technologies. The most
essential requirement for Seamless vertical handover is that the received
signal strength should always be healthy. Mobile device enabled with multiple
wireless technologies makes it possible to maintain seamless connectivity in
highly dynamic environment.Since the available bandwidth is limited and the
number of users is growing rapidly, it is a real challenge to maintain the
received signal strength in a healthy stage.In this work, the proposed, cost
effective parametric estimation for vertical handover shows that the received
signal strength maintains a healthy level by considering the novel concept.
| 0.888541 | 0.652186 | 0.236355 |
2004.06295
|
Cross-Lingual Semantic Role Labeling with High-Quality Translated
Training Corpus
|
Many efforts of research are devoted to semantic role labeling (SRL) which is
crucial for natural language understanding. Supervised approaches have achieved
impressing performances when large-scale corpora are available for
resource-rich languages such as English. While for the low-resource languages
with no annotated SRL dataset, it is still challenging to obtain competitive
performances. Cross-lingual SRL is one promising way to address the problem,
which has achieved great advances with the help of model transferring and
annotation projection. In this paper, we propose a novel alternative based on
corpus translation, constructing high-quality training datasets for the target
languages from the source gold-standard SRL annotations. Experimental results
on Universal Proposition Bank show that the translation-based method is highly
effective, and the automatic pseudo datasets can improve the target-language
SRL performances significantly.
|
We investigate end-to-end speech-to-text translation on a corpus of
audiobooks specifically augmented for this task. Previous works investigated
the extreme case where source language transcription is not available during
learning nor decoding, but we also study a midway case where source language
transcription is available at training time only. In this case, a single model
is trained to decode source speech into target text in a single pass.
Experimental results show that it is possible to train compact and efficient
end-to-end speech translation models in this setup. We also distribute the
corpus and hope that our speech translation baseline on this corpus will be
challenged in the future.
| 0.89473 | 0.693603 | 0.201126 |
2004.06296
|
Eigen selection in spectral clustering: a theory guided practice
|
Based on a Gaussian mixture type model , we derive an eigen selection
procedure that improves the usual spectral clustering in high-dimensional
settings. Concretely, we derive the asymptotic expansion of the spiked
eigenvalues under eigenvalue multiplicity and eigenvalue ratio concentration
results, giving rise to the first theory-backed eigen selection procedure in
spectral clustering. The resulting eigen-selected spectral clustering (ESSC)
algorithm enjoys better stability and compares favorably against canonical
alternatives. We demonstrate the advantages of ESSC using extensive simulation
and multiple real data studies.
|
In social network analysis, automatic social circle detection in ego-networks
is becoming a fundamental and important task, with many potential applications
such as user privacy protection or interest group recommendation. So far, most
studies have focused on addressing two questions, namely, how to detect
overlapping circles and how to detect circles using a combination of network
structure and network node attributes. This paper asks an orthogonal research
question, that is, how to detect circles based on network structures that are
(usually) described by multiple views? Our investigation begins with crawling
ego-networks from Twitter and employing classic techniques to model their
structures by six views, including user relationships, user interactions and
user content. We then apply both standard and our modified multi-view spectral
clustering techniques to detect social circles in these ego-networks. Based on
extensive automatic and manual experimental evaluations, we deliver two major
findings: first, multi-view clustering techniques perform better than common
single-view clustering techniques, which only use one view or naively integrate
all views for detection, second, the standard multi-view clustering technique
is less robust than our modified technique, which selectively transfers
information across views based on an assumption that sparse network structures
are (potentially) incomplete. In particular, the second finding makes us
believe a direct application of standard clustering on potentially incomplete
networks may yield biased results. We lightly examine this issue in theory,
where we derive an upper bound for such bias by integrating theories of
spectral clustering and matrix perturbation, and discuss how it may be affected
by several network characteristics.
| 0.9336 | 0.734336 | 0.199264 |
2004.06297
|
Smart Inference for Multidigit Convolutional Neural Network based
Barcode Decoding
|
Barcodes are ubiquitous and have been used in most of critical daily
activities for decades. However, most of traditional decoders require
well-founded barcode under a relatively standard condition. While wilder
conditioned barcodes such as underexposed, occluded, blurry, wrinkled and
rotated are commonly captured in reality, those traditional decoders show
weakness of recognizing. Several works attempted to solve those challenging
barcodes, but many limitations still exist. This work aims to solve the
decoding problem using deep convolutional neural network with the possibility
of running on portable devices. Firstly, we proposed a special modification of
inference based on the feature of having checksum and test-time augmentation,
named as Smart Inference (SI) in prediction phase of a trained model. SI
considerably boosts accuracy and reduces the false prediction for trained
models. Secondly, we have created a large practical evaluation dataset of real
captured 1D barcode under various challenging conditions to test our methods
vigorously, which is publicly available for other researchers. The experiments'
results demonstrated the SI effectiveness with the highest accuracy of 95.85%
which outperformed many existing decoders on the evaluation set. Finally, we
successfully minimized the best model by knowledge distillation to a shallow
model which is shown to have high accuracy (90.85%) with good inference speed
of 34.2 ms per image on a real edge device.
|
Gravitational-wave data analysis is rapidly absorbing techniques from deep
learning, with a focus on convolutional networks and related methods that treat
noisy time series as images. We pursue an alternative approach, in which
waveforms are first represented as weighted sums over reduced bases
(reduced-order modeling); we then train artificial neural networks to map
gravitational-wave source parameters into basis coefficients. Statistical
inference proceeds directly in coefficient space, where it is theoretically
straightforward and computationally efficient. The neural networks also provide
analytic waveform derivatives, which are useful for gradient-based sampling
schemes. We demonstrate fast and accurate coefficient interpolation for the
case of a four-dimensional binary-inspiral waveform family, and discuss
promising applications of our framework in parameter estimation.
| 0.903244 | 0.669236 | 0.234009 |
2004.06299
|
Trusted Wireless Monitoring based on Distributed Ledgers over NB-IoT
Connectivity
|
The data collected from Internet of Things (IoT) devices on various emissions
or pollution, can have a significant economic value for the stakeholders. This
makes it prone to abuse or tampering and brings forward the need to integrate
IoT with a Distributed Ledger Technology (DLT) to collect, store, and protect
the IoT data. However, DLT brings an additional overhead to the frugal IoT
connectivity and symmetrizes the IoT traffic, thus changing the usual
assumption that IoT is uplink-oriented. We have implemented a platform that
integrates DLTs with a monitoring system based on narrowband IoT (NB-IoT). We
evaluate the performance and discuss the tradeoffs in two use cases: data
authorization and real-time monitoring.
|
By leveraging the concept of mobile edge computing (MEC), massive amount of
data generated by a large number of Internet of Things (IoT) devices could be
offloaded to MEC server at the edge of wireless network for further
computational intensive processing. However, due to the resource constraint of
IoT devices and wireless network, both the communications and computation
resources need to be allocated and scheduled efficiently for better system
performance. In this paper, we propose a joint computation offloading and
multi-user scheduling algorithm for IoT edge computing system to minimize the
long-term average weighted sum of delay and power consumption under stochastic
traffic arrival. We formulate the dynamic optimization problem as an
infinite-horizon average-reward continuous-time Markov decision process (CTMDP)
model. One critical challenge in solving this MDP problem for the multi-user
resource control is the curse-of-dimensionality problem, where the state space
of the MDP model and the computation complexity increase exponentially with the
growing number of users or IoT devices. In order to overcome this challenge, we
use the deep reinforcement learning (RL) techniques and propose a neural
network architecture to approximate the value functions for the post-decision
system states. The designed algorithm to solve the CTMDP problem supports
semi-distributed auction-based implementation, where the IoT devices submit
bids to the BS to make the resource control decisions centrally. Simulation
results show that the proposed algorithm provides significant performance
improvement over the baseline algorithms, and also outperforms the RL
algorithms based on other neural network architectures.
| 0.84629 | 0.644178 | 0.202113 |
2004.06300
|
Witness-based Approach for Scaling Distributed Ledgers to Massive IoT
Scenarios
|
Distributed Ledger Technologies (DLTs) are playing a major role in building
security and trust in Internet of Things (IoT) systems. However, IoT
deployments with a large number of devices, such as in environment monitoring
applications, generate and send massive amounts of data. This would generate
vast number of transactions that must be processed within the distributed
ledger. In this work, we first demonstrate that the Proof of Work (PoW)
blockchain fails to scale in a sizable IoT connectivity infrastructure. To
solve this problem, we present a lightweight distributed ledger scheme to
integrate PoW blockchain into IoT. In our scheme, we classify transactions into
two types: 1) global transactions, which must be processed by global blockchain
nodes and 2) local transactions, which can be processed locally by entities
called witnesses. Performance evaluation demonstrates that our proposed scheme
improves the scalability of integrated blockchain and IoT monitoring systems by
processing a fraction of the transactions, inversely proportional to the number
of witnesses, locally. Hence, reducing the number of global transactions.
|
Internet of Things (IoT) is a system of interrelated devices that can be used
to allow large-scale collection and analysis of data. However, as it grew, IoT
networks were not capable of managing the data from these services. As a
result, cloud computing was introduced to address the need for datacentres for
IoT networks. As the technology evolved, the demand for a proper means of
supporting and managing crowdsensing and real-time data increased, and cloud
servers could no longer keep up with the large volumes of incoming data. This
demand brought rise to fog computing. It became an extension to the cloud and
allowed resources to be allocated around the network effectively. Its
integration to IoT reduced the strain towards the cloud servers. However,
issues in high power consumption at the end device and data management
constraints surfaced. This paper proposes two approaches to alleviate these
issues to keep fog computing remain as a reliable option for IoT-related
applications. We created an IoT-based sensing framework that used an urban
sound classification model. Through active low and high power states and
resource reallocation, we created a network configuration. We tested this
configuration against IoT frameworks that use the default fog and cloud setups.
The results improved the framework's end device power consumption and server
latency. Overall, with the proposed framework, fog computing was proven to be
capable of supporting a scalable IoT framework for urban sound sensing.
| 0.847966 | 0.692207 | 0.155759 |
2004.06301
|
Robust Modelling of Reflectance Pulse Oximetry for SpO$_2$ Estimation
|
Continuous monitoring of blood oxygen saturation levels is vital for patients
with pulmonary disorders. Traditionally, SpO$_2$ monitoring has been carried
out using transmittance pulse oximeters due to its dependability. However,
SpO$_2$ measurement from transmittance pulse oximeters is limited to peripheral
regions. This becomes a disadvantage at very low temperatures as blood
perfusion to the peripherals decreases. On the other hand, reflectance pulse
oximeters can be used at various sites like finger, wrist, chest and forehead.
Additionally, reflectance pulse oximeters can be scaled down to affordable
patches that do not interfere with the user's diurnal activities. However,
accurate SpO$_2$ estimation from reflectance pulse oximeters is challenging due
to its patient dependent, subjective nature of measurement. Recently, a Machine
Learning (ML) method was used to model reflectance waveforms onto SpO$_2$
obtained from transmittance waveforms. However, the generalizability of the
model to new patients was not tested. In light of this, the current work
implemented multiple ML based approaches which were subsequently found to be
incapable of generalizing to new patients. Furthermore, a minimally calibrated
data driven approach was utilized in order to obtain SpO$_2$ from reflectance
PPG waveforms. The proposed solution produces an average mean absolute error of
1.81\% on unseen patients which is well within the clinically permissible error
of 2\%. Two statistical tests were conducted to establish the effectiveness of
the proposed method.
|
Cell assemblies manipulation by optogenetics is pivotal to advance
neuroscience and neuroengineering. In in vivo applications, photostimulation
often broadly addresses a population of cells simultaneously, leading to
feed-forward and to reverberating responses in recurrent microcircuits. The
former arise from direct activation of targets downstream, and are
straightforward to interpret. The latter are consequence of feedback
connectivity and may reflect a variety of time-scales and complex dynamical
properties. We investigated wide-field photostimulation in cortical networks in
vitro, employing substrate-integrated microelectrode arrays and long-term
cultured neuronal networks. We characterized the effect of brief light pulses,
while restricting the expression of channelrhodopsin to principal neurons. We
evoked robust reverberating responses, oscillating in the physiological gamma
frequency range, and found that such a frequency could be reliably manipulated
varying the light pulse duration, not its intensity. By pharmacology,
mathematical modelling, and intracellular recordings, we conclude that gamma
oscillations likely emerge as in vivo from the excitatory-inhibitory interplay
and that, unexpectedly, the light stimuli transiently facilitate excitatory
synaptic transmission. Of relevance for in vitro models of (dys)functional
cortical microcircuitry and in vivo manipulations of cell assemblies, we give
for the first time evidence of network-level consequences of the alteration of
synaptic physiology by optogenetics
| 0.873748 | 0.602549 | 0.271199 |
2004.06302
|
Few-Shot Single-View 3-D Object Reconstruction with Compositional Priors
|
The impressive performance of deep convolutional neural networks in
single-view 3D reconstruction suggests that these models perform non-trivial
reasoning about the 3D structure of the output space. However, recent work has
challenged this belief, showing that complex encoder-decoder architectures
perform similarly to nearest-neighbor baselines or simple linear decoder models
that exploit large amounts of per category data in standard benchmarks. On the
other hand settings where 3D shape must be inferred for new categories with few
examples are more natural and require models that generalize about shapes. In
this work we demonstrate experimentally that naive baselines do not apply when
the goal is to learn to reconstruct novel objects using very few examples, and
that in a \emph{few-shot} learning setting, the network must learn concepts
that can be applied to new categories, avoiding rote memorization. To address
deficiencies in existing approaches to this problem, we propose three
approaches that efficiently integrate a class prior into a 3D reconstruction
model, allowing to account for intra-class variability and imposing an implicit
compositional structure that the model should learn. Experiments on the popular
ShapeNet database demonstrate that our method significantly outperform existing
baselines on this task in the few-shot setting.
|
Statistical image reconstruction (SIR) methods have shown potential to
substantially improve the image quality of low-dose X-ray computed tomography
(CT) as compared to the conventional filtered back-projection (FBP) method for
various clinical tasks. According to the maximum a posterior (MAP) estimation,
the SIR methods can be typically formulated by an objective function consisting
of two terms: (1) data-fidelity (or equivalently, data-fitting or
data-mismatch) term modeling the statistics of projection measurements, and (2)
regularization (or equivalently, prior or penalty) term reflecting prior
knowledge or expectation on the characteristics of the image to be
reconstructed. Existing SIR methods for low-dose CT can be divided into two
groups: (1) those that use calibrated transmitted photon counts (before
log-transform) with penalized maximum likelihood (pML) criterion, and (2) those
that use calibrated line-integrals (after log-transform) with penalized
weighted least-squares (PWLS) criterion. Accurate statistical modeling of the
projection measurements is a prerequisite for SIR, while the regularization
term in the objective function also plays a critical role for successful image
reconstruction. This paper reviews several statistical models on CT projection
measurements and various regularization strategies incorporating prior
knowledge or expected properties of the image to be reconstructed, which
together formulate the objective function of the SIR methods for low-dose X-ray
CT.
| 0.817578 | 0.697915 | 0.119663 |
2004.06303
|
Quantifying Community Characteristics of Maternal Mortality Using Social
Media
|
While most mortality rates have decreased in the US, maternal mortality has
increased and is among the highest of any OECD nation. Extensive public health
research is ongoing to better understand the characteristics of communities
with relatively high or low rates. In this work, we explore the role that
social media language can play in providing insights into such community
characteristics. Analyzing pregnancy-related tweets generated in US counties,
we reveal a diverse set of latent topics including Morning Sickness, Celebrity
Pregnancies, and Abortion Rights. We find that rates of mentioning these topics
on Twitter predicts maternal mortality rates with higher accuracy than standard
socioeconomic and risk variables such as income, race, and access to
health-care, holding even after reducing the analysis to six topics chosen for
their interpretability and connections to known risk factors. We then
investigate psychological dimensions of community language, finding the use of
less trustful, more stressed, and more negative affective language is
significantly associated with higher mortality rates, while trust and negative
affect also explain a significant portion of racial disparities in maternal
mortality. We discuss the potential for these insights to inform actionable
health interventions at the community-level.
|
Inspired by diachronic word analysis from the field of natural language
processing, we propose an approach for uncovering temporal insights regarding
user roles from social networks using graph embedding methods. Specifically, we
apply the role embedding algorithm, struc2vec, to a collection of social
networks exhibiting either "loyal" or "vagrant" characteristics derived from
the popular online social news aggregation website Reddit. For each subreddit,
we extract nine months of data and create network role embeddings on
consecutive time windows. We are then able to compare and contrast how user
roles change over time by aligning the resulting temporal embeddings spaces. In
particular, we analyse temporal role embeddings from an individual and a
community-level perspective for both loyal and vagrant communities present on
Reddit.
| 0.899224 | 0.702 | 0.197225 |
2004.06304
|
Discrimination of electronic recoils from nuclear recoils in two-phase
xenon time projection chambers
|
We present a comprehensive analysis of electronic recoil vs. nuclear recoil
discrimination in liquid/gas xenon time projection chambers, using calibration
data from the 2013 and 2014-16 runs of the Large Underground Xenon (LUX)
experiment. We observe strong charge-to-light discrimination enhancement with
increased event energy. For events with S1 = 120 detected photons, i.e.
equivalent to a nuclear recoil energy of $\sim$100 keV, we observe an
electronic recoil background acceptance of $<10^{-5}$ at a nuclear recoil
signal acceptance of 50%. We also observe modest electric field dependence of
the discrimination power, which peaks at a field of around 300 V/cm over the
range of fields explored in this study (50-500 V/cm). In the WIMP search region
of S1 = 1-80 phd, the minimum electronic recoil leakage we observe is
${(7.3\pm0.6)\times10^{-4}}$, which is obtained for a drift field of 240-290
V/cm. Pulse shape discrimination is utilized to improve our results, and we
find that, at low energies and low fields, there is an additional reduction in
background leakage by a factor of up to 3. We develop an empirical model for
recombination fluctuations which, when used alongside the Noble Element
Scintillation Technique (NEST) simulation package, correctly reproduces the
skewness of the electronic recoil data. We use this updated simulation to study
the width of the electronic recoil band, finding that its dominant contribution
comes from electron-ion recombination fluctuations, followed in magnitude of
contribution by fluctuations in the S1 signal, fluctuations in the S2 signal,
and fluctuations in the total number of quanta produced for a given energy
deposition.
|
The COHERENT collaboration's primary objective is to measure coherent elastic
neutrino-nucleus scattering (CEvNS) using the unique, high-quality source of
tens-of-MeV neutrinos provided by the Spallation Neutron Source (SNS) at Oak
Ridge National Laboratory (ORNL). In spite of its large cross section, the
CEvNS process has never been observed, due to tiny energies of the resulting
nuclear recoils which are out of reach for standard neutrino detectors. The
measurement of CEvNS has now become feasible, thanks to the development of
ultra-sensitive technology for rare decay and weakly-interacting massive
particle (dark matter) searches. The CEvNS cross section is cleanly predicted
in the standard model; hence its measurement provides a standard model test. It
is relevant for supernova physics and supernova-neutrino detection, and enables
validation of dark-matter detector background and detector-response models. In
the long term, precision measurement of CEvNS will address questions of nuclear
structure. COHERENT will deploy multiple detector technologies in a phased
approach: a 14-kg CsI[Na] scintillating crystal, 15 kg of p-type point-contact
germanium detectors, and 100 kg of liquid xenon in a two-phase time projection
chamber. Following an extensive background measurement campaign, a location in
the SNS basement has proven to be neutron-quiet and suitable for deployment of
the COHERENT detector suite. The simultaneous deployment of the three COHERENT
detector subsystems will test the $N^2$ dependence of the cross section and
ensure an unambiguous discovery of CEvNS. This document describes concisely the
COHERENT physics motivations, sensitivity and plans for measurements at the SNS
to be accomplished on a four-year timescale.
| 0.902178 | 0.7196 | 0.182578 |
2004.06305
|
VehicleNet: Learning Robust Visual Representation for Vehicle
Re-identification
|
One fundamental challenge of vehicle re-identification (re-id) is to learn
robust and discriminative visual representation, given the significant
intra-class vehicle variations across different camera views. As the existing
vehicle datasets are limited in terms of training images and viewpoints, we
propose to build a unique large-scale vehicle dataset (called VehicleNet) by
harnessing four public vehicle datasets, and design a simple yet effective
two-stage progressive approach to learning more robust visual representation
from VehicleNet. The first stage of our approach is to learn the generic
representation for all domains (i.e., source vehicle datasets) by training with
the conventional classification loss. This stage relaxes the full alignment
between the training and testing domains, as it is agnostic to the target
vehicle domain. The second stage is to fine-tune the trained model purely based
on the target vehicle set, by minimizing the distribution discrepancy between
our VehicleNet and any target domain. We discuss our proposed multi-source
dataset VehicleNet and evaluate the effectiveness of the two-stage progressive
representation learning through extensive experiments. We achieve the
state-of-art accuracy of 86.07% mAP on the private test set of AICity
Challenge, and competitive results on two other public vehicle re-id datasets,
i.e., VeRi-776 and VehicleID. We hope this new VehicleNet dataset and the
learned robust representations can pave the way for vehicle re-id in the
real-world environments.
|
In this paper, we present an attention mechanism scheme to improve person
re-identification task. Inspired by biology, we propose Self Attention Grid
(SAG) to discover the most informative parts from a high-resolution image using
its internal representation. In particular, given an input image, the proposed
model is fed with two copies of the same image and consists of two branches.
The upper branch processes the high-resolution image and learns high
dimensional feature representation while the lower branch processes the
low-resolution image and learn a filtering attention grid. We apply a max
filter operation to non-overlapping sub-regions on the high feature
representation before element-wise multiplied with the output of the second
branch. The feature maps of the second branch are subsequently weighted to
reflect the importance of each patch of the grid using a softmax operation. Our
attention module helps the network learn the most discriminative visual
features of multiple image regions and is specifically optimized to attend
feature representation at different levels. Extensive experiments on three
large-scale datasets show that our self-attention mechanism significantly
improves the baseline model and outperforms various state-of-art models by a
large margin.
| 0.916793 | 0.758483 | 0.15831 |
2004.06306
|
Group Testing for COVID-19: How to Stop Worrying and Test More
|
The corona virus disease 2019 (COVID-19) caused by the novel corona virus has
an exponential rate of infection. COVID-19 is particularly notorious as the
onset of symptoms in infected patients are usually delayed and there exists a
large number of asymptomatic carriers. In order to prevent overwhelming of
medical facilities and large fatality rate, early stage testing and diagnosis
are key requirements. In this article, we discuss the methodologies from the
group testing literature and its relevance to COVID-19 diagnosis. Specifically,
we investigate the efficiency of group testing using polymerase chain reaction
(PCR) for COVID-19. Group testing is a method in which multiple samples are
pooled together in groups and fewer tests are performed on these groups to
discern all the infected samples. We study the effect of dilution due to
pooling in group testing and show that group tests can perform well even in the
presence of dilution effects. We present multiple group testing algorithms that
could reduce the number of tests performed for COVID-19 diagnosis. We analyze
the efficiency of these tests and provide insights on their practical
relevance. With the use of algorithms described here, test plans can be
developed that can enable testing centers to increase the number of diagnosis
performed without increasing the number of PCR tests. The codes for generating
test plans are available online at [1].
|
Given a composite null hypothesis H, test supermartingales are non-negative
supermartingales with respect to H with initial value 1. Large values of test
supermartingales provide evidence against H. As a result, test supermartingales
are an effective tool for rejecting H, particularly when the p-values obtained
are very small and serve as certificates against the null hypothesis. Examples
include the rejection of local realism as an explanation of Bell test
experiments in the foundations of physics and the certification of entanglement
in quantum information science. Test supermartingales have the advantage of
being adaptable during an experiment and allowing for arbitrary stopping rules.
By inversion of acceptance regions, they can also be used to determine
confidence sets. We use an example to compare the performance of test
supermartingales for computing p-values and confidence intervals to
Chernoff-Hoeffding bounds and the "exact" p-value. The example is the problem
of inferring the probability of success in a sequence of Bernoulli trials.
There is a cost in using a technique that has no restriction on stopping rules,
and for a particular test supermartingale, our study quantifies this cost.
| 0.864982 | 0.618691 | 0.246291 |
2004.06307
|
Sense and Sensibility: Characterizing Social Media Users Regarding the
Use of Controversial Terms for COVID-19
|
With the world-wide development of 2019 novel coronavirus, although WHO has
officially announced the disease as COVID-19, one controversial term - "Chinese
Virus" is still being used by a great number of people. In the meantime, global
online media coverage about COVID-19-related racial attacks increases steadily,
most of which are anti-Chinese or anti-Asian. As this pandemic becomes
increasingly severe, more people start to talk about it on social media
platforms such as Twitter. When they refer to COVID-19, there are mainly two
ways: using controversial terms like "Chinese Virus" or "Wuhan Virus", or using
non-controversial terms like "Coronavirus". In this study, we attempt to
characterize the Twitter users who use controversial terms and those who use
non-controversial terms. We use the Tweepy API to retrieve 17 million related
tweets and the information of their authors. We find significant differences
between these two groups of Twitter users across their demographics, user-level
features like the number of followers, political following status, as well as
their geo-locations. Moreover, we apply classification models to predict
Twitter users who are more likely to use controversial terms. To our best
knowledge, this is the first large-scale social media-based study to
characterize users with respect to their usage of controversial terms during a
major crisis.
|
After the first infected patient detected in Wuhan, China in December, 2019
with the severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) virus,
the COVID-19 (CO means corona, VI is virus, D is disease, 19 is the year of
discovery) disease spread globally due to its high contagious nature and became
an ongoing pandemic. Also, the lack of vaccines and efficacious drugs to treat
infected patients is a great problem to cope this pandemic. The approved drugs
for similar health problems, reported potential drugs but not yet approved
clinically or under clinical trial, and molecules from medicinal plants
extracts are investigated randomly to deal with the COVID-19 infection.
Molecular docking, one of the best approach to search therapeutically potent
drugs/molecules in real time with possible hope to apply on COVID-19. In this
communication, molecular docking studies of 18 ligands were carried out with
the three important proteins of SARS-CoV-2, i.e., RNA-dependent RNA polymerase
(RdRp), angiotensin-converting enzyme 2 (ACE2) and spike glycoprotein (SGp).
From the obtained results, we observed that all the tested molecules showed
better dock score in compared to the hydroxychloroquine claimed to be effective
against COVID-19. Combining the dock score and other medicinal properties, we
believe the limonin can be further explored for potential use against COVID-19.
| 0.890253 | 0.675719 | 0.214535 |
2004.06309
|
Iterative frequency-domain seismic wave solvers based on multi-level
domain-decomposition preconditioners
|
Frequency-domain full-waveform inversion (FWI) is suitable for long-offset
stationary-recording acquisition, since reliable subsurface models can be
reconstructed with a few frequencies and attenuation is easily implemented
without computational overhead. In the frequency domain, wave modelling is a
Helmholtz-type boundary-value problem which requires to solve a large and
sparse system of linear equations per frequency with multiple right-hand sides
(sources). This system can be solved with direct or iterative methods. While
the former are suitable for FWI application on 3D dense OBC acquisitions
covering spatial domains of moderate size, the later should be the approach of
choice for sparse node acquisitions covering large domains (more than 50
millions of unknowns). Fast convergence of iterative solvers for Helmholtz
problems remains however challenging due to the non definiteness of the
Helmholtz operator, hence requiring efficient preconditioners. In this study,
we use the Krylov subspace GMRES iterative solver combined with a multi-level
domain-decomposition preconditioner. Discretization relies on continuous finite
elements on unstructured tetrahedral meshes to comply with complex geometries
and adapt the size of the elements to the local wavelength ($h$-adaptivity). We
assess the convergence and the scalability of our method with the acoustic 3D
SEG/EAGE Overthrust model up to a frequency of 20~Hz and discuss its efficiency
for multi right-hand side processing.
|
In this paper, we propose a space-time least-squares isogeometric method to
solve parabolic evolution problems, well suited for high-degree smooth splines
in the space-time domain. We focus on the linear solver and its computational
efficiency: thanks to the proposed formulation and to the tensor-product
construction of space-time splines, we can design a preconditioner whose
application requires the solution of a Sylvester-like equation, which is
performed efficiently by the fast diagonalization method. The preconditioner is
robust w.r.t. spline degree and mesh size. The computational time required for
its application, for a serial execution, is almost proportional to the number
of degrees-of-freedom and independent of the polynomial degree. The proposed
approach is also well-suited for parallelization.
| 0.861528 | 0.77565 | 0.085878 |
2004.06310
|
Asymptotics of the stress concentration in high-contrast elastic
composites
|
A long-standing area of materials science research has been the study of
electrostatic, magnetic, and elastic fields in composite with densely packed
inclusions whose material properties differ from that of the background. For a
general elliptic system, when the coefficients are piecewise H\"{o}lder
continuous and uniformly bounded, an $\varepsilon$-independent bound of the
gradient was obtained by Li and Nirenberg \cite{ln}, where $\varepsilon$
represents the distance between the interfacial surfaces. However, in
high-contrast composites, when $\varepsilon$ tends to zero, the stress always
concentrates in the narrow regions. As a contrast to the uniform boundedness
result of Li and Nirenberg, in order to investigate the role of $\varepsilon$
played in such kind of concentration phenomenon, in this paper we establish the
blow-up asymptotic expressions of the gradients of solutions to the Lam\'{e}
system with partially infinite coefficients in dimensions two and three. We
discover the relationship between the blow-up rate of the stress and the
relative convexity of adjacent surfaces, and find a family of blow-up factor
matrices with respect to the boundary data. Therefore, this work completely
solves the Babu\u{s}ka problem on blow-up analysis of stress concentration in
high-contrast composite media. Moreover, as a byproduct, we establish an
extended Flaherty-Keller formula on the effective elastic property of a
periodic composite with densely packed fibers, which is related to the
``Vigdergauz microstructure'' in the shape optimizition of fibers.
|
Lateral interactions of oxygen adatoms derived from first-principles
calculations of the O-Pd(100) system had been claimed to include trio- and
quattro terms beside pair interactions. This paper is dedicated to extend an
earlier model for substrate strain mediated interactions between adatom pairs
to include trio- and quattro terms. While monomers (sitting on high symmetric
sites) are supposed to create isotropic stress on the substrate, dimers would
create anisotropic stress. The requirement of mechanical equilibrium allows to
formulate the elastic energy as a sum of pair-, trio- and quattro terms, solved
by respective an eigenvalue problems. Resulting interactions are strongly angle
dependent and also reflect the elastic anisotropy of the substrate. A continuum
elastic model supports the long range character of the elastic interaction but
should also describe some short range features. For the elastically isotropic
tungsten substrate a closed solution for quattro interactions is presented, for
trio inter cations numerical values are given.
| 0.865499 | 0.701064 | 0.164434 |
2004.06311
|
Public Health Policy: COVID-19 Epidemic and SEIR Model with Asymptomatic
Viral Carriers
|
We measure the effect of different public health regulations to the spread of
COVID-19, based on a SEIRA model -- a SEIR model including asymptomatic
transmissions. The cumulative confirmed cases and death show nonlinear positive
relationship with the value of asymptomatic rate. Based on this model, we
analyze the inhibit effects to COVID-19 of three types of public health
policies, i.e. isolation of laboratory confirmed cases, general personal
protection and quarantine (lock-down). The simulations conclude that the
isolation display limited effects to the asymptomatic viral carriers. The
general personal protection and quarantine perform similar effects when the
their percentages of participants are same. When the total proportion of
asymptomatic, mild symptomatic and neglected patients is 40%, only depends on
isolation policy may lead to an additional 75% infections, compared with
general personal protection or quarantine with an efficiency 80%. At end, we
provide seven recommendations of public health intervention before and during
an aerial transmitted epidemic (COVID-19).
|
Influenza epidemics each year cause hundreds of thousands of deaths worldwide
and put high loads on health care systems, in France and elsewhere. A main
concern for resource planning in public health is the risk of an extreme and
dangerous epidemic. Sizes of epidemics are measured by the number of visits to
doctors caused by Influenza Like Illness (ILI), and health care planning relies
on prediction of ILI rates. We use recent results on the multivariate
Generalized Pareto (GP) distributions in Extreme Value Statistics to develop
methods for real-time prediction of risks of exceeding very high levels and for
detection of unusual and potentially very dangerous epidemics. Based on the
observation of the two first weeks of the epidemic, the GP method for real-time
prediction is employed to predict ILI rates of the third week and the total
size of the epidemic for extreme influenza epidemics in France. We then apply a
general anomaly detection framework to the ILI rates during the three first
weeks of the epidemic for early detection of unusual extreme epidemics. As an
additional input to resource planning we use standard methods from extreme
value statistics to estimate risk of exceedance of high ILI levels in future
years. The new methods are expected to be broadly applicable in health care
planning and in many other areas of science and technology.
| 0.885592 | 0.71851 | 0.167082 |
2004.06312
|
(1, 2) and weak (1, 3) homotopies on knot projections
|
In this paper, we obtain the necessary and sufficient condition that two knot
projections are related by a finite sequence of the first and second flat
Reidemeister moves (Theorem 1). We also consider an equivalence relation that
is called weak (1, 3) homotopy. This equivalence relation occurs by the first
flat Reidemeister move and one of the third flat Reidemeister moves. We
introduce a map sending weak (1, 3) homotopy classes to knot isotopy classes
(Sec. 3). Using the map, we determine which knot projections are trivialized
under weak (1, 3) homotopy (Corollary 3).
|
We show that the Bousfield-Kan spectral sequence which computes the rational
homotopy groups of the space of long knots in ${\mathbb R}^d$, where $d\ge 4$,
collapses at the $E^2$ page. The main ingredients in the proof are Sinha's
cosimplicial model for the space of long knots and a coformality result for the
little balls operad.
| 0.932564 | 0.82708 | 0.105484 |
2004.06313
|
Random connection models in the thermodynamic regime: central limit
theorems for add-one cost stabilizing functionals
|
The paper deals with a random connection model, a random graph whose vertices
are given by a homogeneous Poisson point process on $\R^d$, and edges are
independently drawn with probability depending on the locations of the two end
points. We establish central limit theorems (CLT) for general functionals on
this graph under minimal assumptions that are a combination of the weak
stabilization for the-one cost and a $(2+\delta)$-moment condition. As a
consequence, CLTs for isomorphic subgraph counts, isomorphic component counts,
the number of connected components, and Betti numbers are then derived.
|
We study limits of the largest connected components (viewed as metric spaces)
obtained by critical percolation on uniformly chosen graphs and configuration
models with heavy-tailed degrees. For rank-one inhomogeneous random graphs,
such results were derived by Bhamidi, van der Hofstad, Sen [Probab. Theory
Relat. Fields 2018]. We develop general principles under which the identical
scaling limits as the rank-one case can be obtained. Of independent interest,
we derive refined asymptotics for various susceptibility functions and the
maximal diameter in the barely subcritical regime.
| 0.853749 | 0.770528 | 0.083221 |
2004.06314
|
Critical analysis of two-dimensional classical XY model using tensor
renormalization group
|
We consider the two-dimensional classical XY model on a square lattice in the
thermodynamic limit using tensor renormalization group and precisely determine
the critical temperature corresponding to the Berezinskii-Kosterlitz-Thouless
(BKT) phase transition.
|
We numerically obtain the conformal spectrum of several classical spin models
on a two-dimensional lattice with open boundaries, for every boundary fixed
point obtained by the Cardy's derivation [J. L. Cardy, Nucl. Phys. B 324, 581
(1989)]. In order to extract accurate conformal data, we implement the tensor
network renormalization algorithm [G. Evenbly and G. Vidal, Phys. Rev. Lett.
115, 180405 (2015)] extended so as to be applicable to a square lattice with
open boundaries. We successfully compute the boundary conformal spectrum
consistent with the underlying boundary conformal field theories (BCFTs) for
the Ising, tri-critical Ising, and 3-state Potts models on the lattice, which
allows us to confirm the validity of the BCFT analyses for the surface critical
behaviors of those lattice models.
| 0.905986 | 0.802817 | 0.103169 |
2004.06315
|
Hard and soft x-ray photoemission spectroscopy study of the new Kondo
system SmO thin film
|
SmO thin film is a new Kondo system showing a resistivity upturn around 10 K
and was theoretically proposed to have a topologically nontrivial band
structure. We have performed hard x-ray and soft x-ray photoemission
spectroscopy to elucidate the electronic structure of SmO. From the Sm 3$d$
core-level spectra, we have estimated the valence of Sm to be $\sim$2.96,
proving that the Sm has a mixed valence. The valence-band photoemission spectra
exhibit a clear Fermi edge originating from the Sm 5$d$-derived band. The
present finding is consistent with the theory suggesting a possible topological
state in SmO and show that rare-earth monoxides or their heterostructures can
be a new playground for the interplay of strong electron correlation and
spin-orbit coupling.
|
Thin films of magnesium doped zinc oxide (MZO) were synthesized using the sol
gel method and annealed at different temperatures under ambient condition. The
morphological properties of the post annealed MZO films were investigated using
X ray diffraction (XRD) while atomic force microscopy (AFM) was employed to
probe the topographical alteration of the films. The optical properties of the
post annealed MZO films were examined by UV visible spectroscopy and the Tauc
method was used to estimate the optical band gap. The studies revealed that,
with the rise of annealing temperature the crystallinity and the surface
roughness of the MZO films were increased whereas the optical transmittance and
the energy bandgap were decreased.
| 0.90433 | 0.718505 | 0.185826 |
2004.06317
|
The Haagerup property for twisted groupoid dynamical systems
|
We introduce the Haagerup property for twisted groupoid $C^*$-dynamical
systems in terms of naturally defined positive-definite operator-valued
multipliers. By developing a version of `the Haagerup trick' we prove this
property is equivalent to the Haagerup property of the reduced crossed product
$C^*$-algebra with respect to the canonical conditional expectation $E$. This
extends a theorem of Dong and Ruan for discrete group actions, and implies that
a given Cartan inclusion of separable $C^*$-algebras has the Haagerup property
if and only if the associated Weyl groupoid has the Haagerup property in the
sense of Tu. We use the latter statement to prove that every separable
$C^*$-algebra which has the Haagerup property with respect to some Cartan
subalgebra satisfies the Universal Coefficient Theorem. This generalizes a
recent result of Barlak and Li on the UCT for nuclear Cartan pairs.
|
Let G be a group acting cocompactly without inversion on a tree X, with all
vertex and edge stabilizers isomorphic to the same free abelian group Z^n. We
prove that G has the Haagerup Property if and only if G is weakly amenable, and
we give a necessary and sufficient condition for this to happen. In particular,
denoting by d the rank of the fundamental group of the graph X modded out by G,
we deduce that G has the Haagerup Property if either d=0, d=1, or n=1. In these
three cases, we show that the L^p-compression rate of G is 1, and that its
equivariant L^p-compression rate is max{1/p,1/2} (provided G is non-amenable).
We also discuss quasi-isometric embeddings of G into a product of finitely many
regular trivalent trees.
| 0.882866 | 0.798147 | 0.084719 |
2004.06318
|
Relationship between classical features of quantum transformations
|
We relate two notions of classicality for quantum transformations often
arising in popular subtheories of quantum mechanics: covariance of the Wigner
representation of the theory and the existence of a transformation
noncontextual ontological model of the theory. We show that covariance implies
transformation noncontextuality. The converse holds provided that the
underlying ontological model is the one given by the Wigner representation. In
addition, we investigate the relationships of covariance and transformation
noncontextuality with the existence of a positivity preserving quasiprobability
distribution for the transformations of the theory. We conclude that covariance
implies transformation noncontextuality, which implies positivity preservation.
Therefore the violation of the latter is a stronger notion of nonclassicality
than the violation of the former.
|
Contextuality is a non-classical behaviour that can be exhibited by quantum
systems. It is increasingly studied for its relationship to
quantum-over-classical advantages in informatic tasks. To date, it has largely
been studied in discrete variable scenarios, where observables take values in
discrete and usually finite sets. Practically, on the other hand,
continuous-variable scenarios offer some of the most promising candidates for
implementing quantum computations and informatic protocols. Here we set out a
framework for treating contextuality in continuous-variable scenarios. It is
shown that the Fine--Abramsky--Brandenburger theorem extends to this setting,
an important consequence of which is that nonlocality can be viewed as a
special case of contextuality, as in the discrete case. The contextual
fraction, a quantifiable measure of contextuality that bears a precise
relationship to Bell inequality violations and quantum advantages, can also be
defined in this setting. It is shown to be a non-increasing monotone with
respect to classical operations that include binning to discretise data.
Finally, we consider how the contextual fraction can be formulated as an
infinite linear program, and calculated with increasing accuracy using
semi-definite programming approximations.
| 0.842969 | 0.791194 | 0.051775 |
2004.06319
|
Adaptive radial basis function generated finite-difference (RBF-FD) on
non-uniform nodes using $p$-refinement
|
Radial basis functions-generated finite difference methods (RBF-FDs) have
been gaining popularity recently. In particular, the RBF-FD based on
polyharmonic splines (PHS) augmented with multivariate polynomials (PHS+poly)
has been found significantly effective. For the approximation order of RBF-FDs'
weights on scattered nodes, one can already find mathematical theories in the
literature. Many practical problems in numerical analysis, however, do not
require a uniform node-distribution. Instead, they would be better suited if
specific areas of the domain, where complicated physics needed to be resolved,
had a relatively higher node-density compared to the rest of the domain. In
this work, we proposed a practical adaptive RBF-FD with a user-defined order of
convergence with respect to the total number of (possibly scattered and
non-uniform) data points $N$. Our algorithm outputs a sparse differentiation
matrix with the desired approximation order. Numerical examples are provided to
show that the proposed adaptive RBF-FD method yields the expected
$N$-convergence even for highly non-uniform node-distributions. The proposed
method also reduces the number of non-zero elements in the linear system
without sacrificing accuracy.
|
The paper considers a time-adaptive method for determination of drug efficacy
in a parameter identification problem (PIP) for system of ordinary differential
equations (ODE) which describe dynamics of the primary HIV infection.
Optimization approach to solve this problem is presented and a posteriori error
estimates in the Tikhonov functional and Lagrangian are formulated. Based on
these estimates a time adaptive algorithm is formulated and numerically tested
for different scenarios of noisy observations of virus population function.
Numerical results show significant improvement of reconstruction of drug
efficacy parameter when using time adaptive mesh refinement compared to usual
gradient method applied on a uniform time mesh.
| 0.905895 | 0.695308 | 0.210586 |
2004.06320
|
A2D2: Audi Autonomous Driving Dataset
|
Research in machine learning, mobile robotics, and autonomous driving is
accelerated by the availability of high quality annotated data. To this end, we
release the Audi Autonomous Driving Dataset (A2D2). Our dataset consists of
simultaneously recorded images and 3D point clouds, together with 3D bounding
boxes, semantic segmentation, instance segmentation, and data extracted from
the automotive bus. Our sensor suite consists of six cameras and five LiDAR
units, providing full 360 degree coverage. The recorded data is time
synchronized and mutually registered. Annotations are for non-sequential
frames: 41,277 frames with semantic segmentation image and point cloud labels,
of which 12,497 frames also have 3D bounding box annotations for objects within
the field of view of the front camera. In addition, we provide 392,556
sequential frames of unannotated sensor data for recordings in three cities in
the south of Germany. These sequences contain several loops. Faces and vehicle
number plates are blurred due to GDPR legislation and to preserve anonymity.
A2D2 is made available under the CC BY-ND 4.0 license, permitting commercial
use subject to the terms of the license. Data and further information are
available at http://www.a2d2.audi.
|
Illumination effects in images, specifically cast shadows and shading, have
been shown to decrease the performance of deep neural networks on a large
number of vision-based detection, recognition and segmentation tasks in urban
driving scenes. A key factor that contributes to this performance gap is the
lack of `time-of-day' diversity within real, labeled datasets. There have been
impressive advances in the realm of image to image translation in transferring
previously unseen visual effects into a dataset, specifically in day to night
translation. However, it is not easy to constrain what visual effects, let
alone illumination effects, are transferred from one dataset to another during
the training process. To address this problem, we propose deep learning
framework, called Shadow Transfer, that can relight complex outdoor scenes by
transferring realistic shadow, shading, and other lighting effects onto a
single image. The novelty of the proposed framework is that it is both
self-supervised, and is designed to operate on sensor and label information
that is easily available in autonomous vehicle datasets. We show the
effectiveness of this method on both synthetic and real datasets, and we
provide experiments that demonstrate that the proposed method produces images
of higher visual quality than state of the art image to image translation
methods.
| 0.905861 | 0.673582 | 0.232279 |
2004.06321
|
Sequential Batch Learning in Finite-Action Linear Contextual Bandits
|
We study the sequential batch learning problem in linear contextual bandits
with finite action sets, where the decision maker is constrained to split
incoming individuals into (at most) a fixed number of batches and can only
observe outcomes for the individuals within a batch at the batch's end.
Compared to both standard online contextual bandits learning or offline policy
learning in contexutal bandits, this sequential batch learning problem provides
a finer-grained formulation of many personalized sequential decision making
problems in practical applications, including medical treatment in clinical
trials, product recommendation in e-commerce and adaptive experiment design in
crowdsourcing.
We study two settings of the problem: one where the contexts are arbitrarily
generated and the other where the contexts are \textit{iid} drawn from some
distribution. In each setting, we establish a regret lower bound and provide an
algorithm, whose regret upper bound nearly matches the lower bound. As an
important insight revealed therefrom, in the former setting, we show that the
number of batches required to achieve the fully online performance is
polynomial in the time horizon, while for the latter setting, a
pure-exploitation algorithm with a judicious batch partition scheme achieves
the fully online performance even when the number of batches is less than
logarithmic in the time horizon. Together, our results provide a near-complete
characterization of sequential decision making in linear contextual bandits
when batch constraints are present.
|
We consider the minimax setup for Gaussian one-armed bandit problem, i.e. the
two-armed bandit problem with Gaussian distributions of incomes and known
distribution corresponding to the first arm. This setup naturally arises when
the optimization of batch data processing is considered and there are two
alternative processing methods available with a priori known efficiency of the
first method. One should estimate the efficiency of the second method and
provide predominant usage of the most efficient of both them. According to the
main theorem of the theory of games minimax strategy and minimax risk are
searched for as Bayesian ones corresponding to the worst-case prior
distribution. As a result, we obtain the recursive integro-difference equation
and the second order partial differential equation in the limiting case as the
number of batches goes to infinity. This makes it possible to determine minimax
risk and minimax strategy by numerical methods. If the number of batches is
large enough we show that batch data processing almost does not influence the
control performance, i.e. the value of the minimax risk. Moreover, in case of
Bernoulli incomes and large number of batches, batch data processing provides
almost the same minimax risk as the optimal one-by-one data processing.
| 0.912003 | 0.795608 | 0.116395 |
2004.06322
|
Structural dynamics in thermal-treatment of amorphous indium-oxide films
|
Thermally-treating amorphous indium-oxide films is used in various basic
studies as a means of tuning the system disorder. In this process the
resistance of a given sample decreases while its amorphous structure and
chemical composition is preserved. The main effect of the process is an
increase in the system density which in turn leads to improved interatomic
overlap which is easily detected as improved conductivity. A similar effect has
been observed in studies of other amorphous systems that were subjected to
pressure. In the current work we show that the Raman spectra of amorphous
indium-oxide change in response to thermal-treatment in a similar way as in
pressure experiments performed on other disordered and amorphous systems. We
present a study of how thermal-treatment changes the system dynamics by
monitoring the resistance versus time of indium-oxide films following various
stages of thermal-treatment. The time dependence of the sample resistance fits
the stretched exponential law with parameters that change systematically with
further annealing. Implication of these results to slow dynamics phenomena that
are governed by the Kohlrausch's law are discussed.
|
We report very large bandgap enhancement in SrTiO3 (STO) films (fabricated by
pulsed laser deposition below 800 {\deg}C), which can be up to 20% greater than
the bulk value, depending on the deposition temperature. The origin is
comprehensively investigated and finally attributed to Sr/Ti antisite point
defects, supported by density functional theory calculations. More importantly,
the bandgap enhancement can be utilized to tailor the electronic and magnetic
phases of the two-dimensional electron gas (2DEG) in STO-based interface
systems. For example, the oxygen-vacancy-induced 2DEG (2DEG-V) at the interface
between amorphous LaAlO3 and STO films is more localized and the ferromagnetic
order in the STO-film-based 2DEG-V can be clearly seen from low-temperature
magnetotransport measurements. This opens an attractive path to tailor
electronic, magnetic and optical properties of STO-based oxide interface
systems under intensive focus in the oxide electronics community. Meanwhile,
our study provides key insight into the origin of the fundamental issue that
STO films are difficult to be doped into the fully metallic state by oxygen
vacancies.
| 0.902923 | 0.730839 | 0.172084 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.