id
stringlengths
5
16
query
stringlengths
1
382
pos
stringlengths
7
5.09k
neg
stringlengths
23
5.09k
qp
float64
0.4
1
qn
float64
0.34
0.91
margin
float64
0.02
0.3
2004.06217
Bounds on the Index of Rotationally Symmetric Self-Shrinking Tori
Surfaces that evolve under mean curvature flow develop singularities in finite time. One can model these singularities using self-shrinkers, which are surfaces, like spheres or cylinders, that shrink by dilations under mean curvature flow. As we approach the singular time, a surface will locally resemble one of these self-shrinkers near the singular point. One can then ask whether this situation is stable: If we perturb the initial surface, will we get the same self-shrinker, or could we get a different one? If we can get a different one, what is the dimension of the space of variations that we could use to do so? This quantity is the index of the self-shrinker. In this work, we prove an upper bound on the index of rotationally symmetric self-shrinking tori in terms of their entropy and their maximum and minimum radii. While there have been a few lower bound results in the literature, we believe that this result is the first upper bound on the index of a self-shrinker. Using the same methods, we obtain several additional results for rotationally symmetric immersed tori: We prove a lower bound on the index of tori in terms of their entropy, we prove a lower bound on the entropy of tori in terms of their maximum and minimum radii, and we show that two entropy-decreasing variations whose existence was proved by Liu actually have simple formulas and eigenvalue $-1$. Additionally, we present some preliminary results in higher dimensions and six potential directions for future work.
General-relativistic models of self-gravitating tori around black holes are constructed with a self-consistent-field method in compactified coordinates. The numerical code is highly accurate and robust, allowing for the construction of models that exactly fill their Roche lobe, when a cusp exists. As a first application, we focus on self-consistent models with cusp, having different values of constant specific angular momentum. Scaling all results with the mass of the black hole, we find evidence that models with constant specific angular momentum that can fill their Roche lobe are still limited by $l<4M_{\rm BH}$ (as is the case for models constructed in a fixed background metric) even for heavy tori.
0.840814
0.714261
0.126553
2004.06218
Precise mass and radius of a transiting super-Earth planet orbiting the M dwarf TOI-1235: a planet in the radius gap?
We report the confirmation of a transiting planet around the bright, inactive M0.5 V star TOI-1235 (TYC 4384-1735-1, V = 11.5 mag), whose transit signal was detected in the photometric time series of Sectors 14, 20, and 21 of the TESS space mission. We confirm the planetary nature of the transit signal, which has a period of 3.44 d, by using precise radial velocity measurements with CARMENES and HARPS-N spectrographs. A comparison of the properties derived for TOI-1235 b's with theoretical models reveals that the planet has a rocky composition, with a bulk density slightly higher than Earth's. In particular, we measure a mass of M_p = 5.9+/-0.6 M_Earth and a radius of R_p = 1.69+/-0.08 R_Earth, which together result in a density of rho_p = 6.7+1.3-1.1 g/cm3. When compared with other well-characterized exoplanetary systems, the particular combination of planetary radius and mass puts our discovery in the radius gap, a transition region between rocky planets and planets with significant atmospheric envelopes, with few known members. While the exact location of the radius gap for M dwarfs is still a matter of debate, our results constrain it to be located at around 1.7 R_Earth or larger at the insolation levels received by TOI-1235 b (~60 S_Earth), which makes it an extremely interesting object for further studies of planet formation and atmospheric evolution.
Small planets are common around late-M dwarfs and can be detected through highly precise photometry by the transit method. Planets orbiting nearby stars are particularly important as they are often the best-suited for future follow-up studies. We present observations of three nearby M-dwarfs referred to as EIC-1, EIC-2, and EIC-3, and use them to search for transits and set limits on the presence of planets. On most nights our observations are sensitive to Earth-sized transiting planets, and photometric precision is similar to or better than TESS for faint late-M dwarfs of the same magnitude (I=15 mag). We present our photometry and transit search pipeline, which utilizes simple median detrending in combination with transit least squares based transit detection (Hippke & Heller 2019).For these targets, and transiting planets between one and two Earth radii, we achieve an average transit detection probability of 60% between periods of 0.5 and 2 days, 30% between 2 and 5 days,and 10% between 5 and 10 days. These sensitivities are conservative compared to visual searches.
0.877713
0.762738
0.114975
2004.06219
Exploring entanglement in open cavity parametric oscillators: from triply to doubly resonant cavities
We use a versatile model to evaluate the multipartite entanglement and the nonclassical light generation in optical parametric oscillators, exploring the differences between doubly and triply resonant cavity configurations. We demonstrate the entanglement of the pump mode with converted fields in both situations, and the fundamental differences of oscillators using parametric down conversion and four wave mixing processes as the intracavity amplification technique. The strong correlations involving the sidebands of the pump and converted fields gives the signatures of a rich dynamic of multipartite entanglement.
We consider a generalization of recently proposed non-Hermitian model for resonant cavities coupled by a chiral mirror by taking into account number non-conservation and nonlinear interactions. We analyze non-Hermitian quantum dynamics of populations and entanglement of the cavity modes. We find that an interplay of initial coherence and non-Hermitian coupling leads to a counterintuitive population transfer. While an initially coherent cavity mode is depleted, the other empty cavity can be populated more or less than the initially filled one. Moreover, presence of nonlinearity yields population collapse and revival as well as bipartite entanglement of the cavity modes. In addition to coupled cavities, we point out that similar models can be found in $\mathcal{PT}$ symmetric Bose-Hubbard dimers of Bose-Einstein condensates or in coupled soliton-plasmon waveguides. We specifically illustrate quantum dynamics of populations and entanglement in a heuristic model that we propose for a soliton-plasmon system with soliton amplitude dependent asymmetric interaction. Degree of asymmetry, nonlinearity and coherence are examined to control plasmon excitations and soliton-plasmon entanglement. Relations to $\mathcal{PT}$ symmetric lasers and Jahn-Teller systems are pointed out.
0.912273
0.836823
0.07545
2004.06220
Embedded model discrepancy: A case study of Zika modeling
Mathematical models of epidemiological systems enable investigation of and predictions about potential disease outbreaks. However, commonly used models are often highly simplified representations of incredibly complex systems. Because of these simplifications, the model output, of say new cases of a disease over time, or when an epidemic will occur, may be inconsistent with available data. In this case, we must improve the model, especially if we plan to make decisions based on it that could affect human health and safety, but direct improvements are often beyond our reach. In this work, we explore this problem through a case study of the Zika outbreak in Brazil in 2016. We propose an embedded discrepancy operator---a modification to the model equations that requires modest information about the system and is calibrated by all relevant data. We show that the new enriched model demonstrates greatly increased consistency with real data. Moreover, the method is general enough to easily apply to many other mathematical models in epidemiology.
An analytical treatment of a simple opinion model with contrarian behavior is presented. The focus is on the stationary dynamics of the model and in particular on the effect of inhomogeneities in the interaction topology on the stationary behavior. We start from a micro-level Markov chain description of the model. Markov chain aggregation is then used to derive a macro chain for the complete graph as well as a meso-level description for the two-community graph composed of two (weakly) coupled sub-communities. In both cases, a detailed understanding of the model behavior is possible using Markov chain tools. More importantly, however, this setting provides an analytical scenario to study the discrepancy between the homogeneous mixing case and the model on a slightly more complex topology. We show that memory effects are introduced at the macro level when we aggregate over agent attributes without sensitivity to the microscopic details and quantify these effects using concepts from information theory. In this way, the method facilitates the analysis of the relation between microscopic processes and a their aggregation to a macroscopic level of description and informs about the complexity of a system introduced by heterogeneous interaction relations.
0.834765
0.658928
0.175836
2004.06221
Some elliptic problems involving the gradient on general bounded and exterior domains
In this article we consider the existence of positive singular solutions on bounded domains and also classical solutions on exterior domains. First we consider positive singular solutions of the following problems: \begin{equation} \label{eq_abst_1}-\Delta u = (1+g(x)) | \nabla u|^p \qquad \mbox{ in } B_1, \qquad u = 0 \mbox{ on } \;\; \partial B_1, \qquad \mbox{ and} \end{equation} \begin{equation} \label{eq_abst_2} -\Delta u = | \nabla u|^p \qquad \mbox{ in } \Omega, \qquad u = 0 \mbox{ on } \;\; \partial \Omega. \end{equation} In the first problem $B_1$ is the unit ball in $ \mathbb{R}^N$ and in the second $\Omega$ is a bounded smooth domain in $ \mathbb{R}^N$. In both cases we assume $ N \ge 3$, $ \frac{N}{N-1}<p<2$ and in the first problem we assume $ g \ge 0$ is a H\"older continuous function with $g(0)=0$. We obtain positive singular solutions in both cases. \\ For the second equation we also consider the case of $\Omega$ an exterior domain $ \mathbb{R}^N$ where $N \ge 3$ and $ p >\frac{N}{N-1}$. We prove the existence of a bounded positive classical solution with the additional property that $ \nabla u(x) \cdot x>0$ for large $|x|$.
We study solution techniques for an evolution equation involving second order derivative in time and the spectral fractional powers, of order $s \in (0,1)$, of symmetric, coercive, linear, elliptic, second-order operators in bounded domains $\Omega$. We realize fractional diffusion as the Dirichlet-to-Neumann map for a nonuniformly elliptic problem posed on the semi-infinite cylinder $\mathcal{C} = \Omega \times (0,\infty)$. We thus rewrite our evolution problem as a quasi-stationary elliptic problem with a dynamic boundary condition and derive space, time, and space-time regularity estimates for its solution. The latter problem exhibits an exponential decay in the extended dimension and thus suggests a truncation that is suitable for numerical approximation. We propose and analyze two fully discrete schemes. The discretization in time is based on finite difference discretization techniques: trapezoidal and leapfrog schemes. The discretization in space relies on the tensorization of a first-degree FEM in $\Omega$ with a suitable $hp$-FEM in the extended variable. For both schemes we derive stability and error estimates.
0.814198
0.780048
0.03415
2004.06222
Cascade Neural Ensemble for Identifying Scientifically Sound Articles
Background: A significant barrier to conducting systematic reviews and meta-analysis is efficiently finding scientifically sound relevant articles. Typically, less than 1% of articles match this requirement which leads to a highly imbalanced task. Although feature-engineered and early neural networks models were studied for this task, there is an opportunity to improve the results. Methods: We framed the problem of filtering articles as a classification task, and trained and tested several ensemble architectures of SciBERT, a variant of BERT pre-trained on scientific articles, on a manually annotated dataset of about 50K articles from MEDLINE. Since scientifically sound articles are identified through a multi-step process we proposed a novel cascade ensemble analogous to the selection process. We compared the performance of the cascade ensemble with a single integrated model and other types of ensembles as well as with results from previous studies. Results: The cascade ensemble architecture achieved 0.7505 F measure, an impressive 49.1% error rate reduction, compared to a CNN model that was previously proposed and evaluated on a selected subset of the 50K articles. On the full dataset, the cascade ensemble achieved 0.7639 F measure, resulting in an error rate reduction of 19.7% compared to the best performance reported in a previous study that used the full dataset. Conclusion: Pre-trained contextual encoder neural networks (e.g. SciBERT) perform better than the models studied previously and manually created search filters in filtering for scientifically sound relevant articles. The superior performance achieved by the cascade ensemble is a significant result that generalizes beyond this task and the dataset, and is analogous to query optimization in IR and databases.
In a cascading power transmission outage, component outages propagate non-locally, after one component outages, the next failure may be very distant, both topologically and geographically. As a result, simple models of topological contagion do not accurately represent the propagation of cascades in power systems. However, cascading power outages do follow patterns, some of which are useful in understanding and reducing blackout risk. This paper describes a method by which the data from many cascading failure simulations can be transformed into a graph-based model of influences that provides actionable information about the many ways that cascades propagate in a particular system. The resulting "influence graph" model is Markovian, in that component outage probabilities depend only on the outages that occurred in the prior generation. To validate the model we compare the distribution of cascade sizes resulting from $n-2$ contingencies in a $2896$ branch test case to cascade sizes in the influence graph. The two distributions are remarkably similar. In addition, we derive an equation with which one can quickly identify modifications to the proposed system that will substantially reduce cascade propagation. With this equation one can quickly identify critical components that can be improved to substantially reduce the risk of large cascading blackouts.
0.873541
0.574149
0.299392
2004.06223
A Robust Reputation-based Group Ranking System and its Resistance to Bribery
The spread of online reviews and opinions and its growing influence on people's behavior and decisions, boosted the interest to extract meaningful information from this data deluge. Hence, crowdsourced ratings of products and services gained a critical role in business and governments. Current state-of-the-art solutions rank the items with an average of the ratings expressed for an item, with a consequent lack of personalization for the users, and the exposure to attacks and spamming/spurious users. Using these ratings to group users with similar preferences might be useful to present users with items that reflect their preferences and overcome those vulnerabilities. In this paper, we propose a new reputation-based ranking system, utilizing multipartite rating subnetworks, which clusters users by their similarities using three measures, two of them based on Kolmogorov complexity. We also study its resistance to bribery and how to design optimal bribing strategies. Our system is novel in that it reflects the diversity of preferences by (possibly) assigning distinct rankings to the same item, for different groups of users. We prove the convergence and efficiency of the system. By testing it on synthetic and real data, we see that it copes better with spamming/spurious users, being more robust to attacks than state-of-the-art approaches. Also, by clustering users, the effect of bribery in the proposed multipartite ranking system is dimmed, comparing to the bipartite case.
Permissioned blockchain, in which only known nodes are allowed to participate, has been widely used by governments, companies, institutes and so on. We study the case where permissioned blockchain is applied to the field of horizontal strategic alliances to ensure that any participant of the alliance who does not follow the regulation will be detected and punished for his behavior afterward. We propose a general hierarchical model of permissioned blockchain which includes three tiers: providers, collectors, and governors. To utilize the overlap of collectors in gathering transactions from providers, we introduce the reputation as a measure of the reliability of the collectors. With the help of reputation system, governors will not need to check all transactions uploaded by collectors. As a result, our protocol will have a significant improvement in efficiency. Meanwhile, let us denote $T$ to be the number of total transactions. Then the number of mistakes that governors suffer is only asymptotically $O(\sqrt{T})$ when guided by our reputation mechanism, as long as there exists a collector who behaves well. This result implies that our protocol remains high performance. The reputation mechanism also provides incentives for collectors to work honestly. To our knowledge, Our work is the first one to give an analytical result on reputation mechanism in permissioned blockchains. Furthermore, we demonstrate two typical cases where our model can be well applied to.
0.852066
0.705799
0.146267
2004.06224
Modeling motional energy spectra and lattice light shifts in optical lattice clocks
We develop a model to describe the motional (i.e., external degree of freedom) energy spectra of atoms trapped in a one-dimensional optical lattice, taking into account both axial and radial confinement relative to the lattice axis. Our model respects the coupling between axial and radial degrees of freedom, as well as other anharmonicities inherent in the confining potential. We further demonstrate how our model can be used to characterize lattice light shifts in optical lattice clocks, including shifts due to higher multipolar (magnetic dipole and electric quadrupole) and higher order (hyperpolarizability) coupling to the lattice field. We compare results for our model with results from other lattice light shift models in the literature under similar conditions.
We propose a fault tolerant loading scheme to produce an array of fermions in an optical lattice of the high fidelity required for applications in quantum information processing and the modelling of strongly correlated systems. A cold reservoir of Fermions plays a dual role as a source of atoms to be loaded into the lattice via a Raman process and as a heat bath for sympathetic cooling of lattice atoms. Atoms are initially transferred into an excited motional state in each lattice site, and then decay to the motional ground state, creating particle-hole pairs in the reservoir. Atoms transferred into the ground motional level are no longer coupled back to the reservoir, and doubly occupied sites in the motional ground state are prevented by Pauli blocking. This scheme has strong conceptual connections with optical pumping, and can be extended to load high-fidelity patterns of atoms.
0.882205
0.794518
0.087688
2004.06225
Graded Lie structure on cohomology of some exact monoidal categories
For some exact monoidal categories, we describe explicitly a connection between topological and algebraic definitions of the Lie bracket on the extension algebra of the unit object. The topological definition, due to Schwede and Hermann, involves loops in extension categories, and the algebraic definition involves homotopy liftings as introduced by the first author. As a consequence of our description, we prove that the topological definition indeed yields a Gerstenhaber algebra structure in the monoidal category setting, answering a question of Hermann. For use in proofs, we generalize $A_{\infty}$-coderivation and homotopy lifting techniques from bimodule categories to some exact monoidal categories.
The category of rational SO(2)-equivariant spectra admits an algebraic model. That is, there is an abelian category A(SO(2)) whose derived category is equivalent to the homotopy category of rational SO(2)-equivariant spectra. An important question is: does this algebraic model capture the smash product of spectra? The category A(SO(2)) is known as Greenlees' standard model, it is an abelian category that has no projective objects and is constructed from modules over a non-Noetherian ring. Hence the standard techniques for constructing a monoidal model structure cannot be applied. In this paper we construct a monoidal model structure on A(SO(2)) and show that the derived product on the homotopy category is compatible with the smash product of spectra. The method used is related to techniques developed by the author in earlier joint work with Roitzheim. That work constructed a monoidal model structure on Franke's exotic model for the K_p-local stable homotopy category. We also provide a monoidal Quillen equivalence to a simpler monoidal model category R_*-modules that has explicit generating sets. Having monoidal model structures on A(SO(2)) and R_*-modules removes a serious obstruction to constructing a series of monoidal Quillen equivalences between the algebraic model and rational SO(2)-equivariant spectra.
0.880393
0.824495
0.055898
2004.06226
Classifying CMB time-ordered data through deep neural networks
The Cosmic Microwave Background (CMB) has been measured over a wide range of multipoles. Experiments with arc-minute resolution like the Atacama Cosmology Telescope (ACT) have contributed to the measurement of primary and secondary anisotropies, leading to remarkable scientific discoveries. Such findings require careful data selection in order to remove poorly-behaved detectors and unwanted contaminants. The current data classification methodology used by ACT relies on several statistical parameters that are assessed and fine-tuned by an expert. This method is highly time-consuming and band or season-specific, which makes it less scalable and efficient for future CMB experiments. In this work, we propose a supervised machine learning model to classify detectors of CMB experiments. The model corresponds to a deep convolutional neural network. We tested our method on real ACT data, using the 2008 season, 148 GHz, as training set with labels provided by the ACT data selection software. The model learns to classify time-streams starting directly from the raw data. For the season and frequency considered during the training, we find that our classifier reaches a precision of 99.8%. For 220 and 280 GHz data, season 2008, we obtained 99.4% and 97.5% of precision, respectively. Finally, we performed a cross-season test over 148 GHz data from 2009 and 2010 for which our model reaches a precision of 99.8% and 99.5%, respectively. Our model is about 10x faster than the current pipeline, making it potentially suitable for real-time implementations.
In the last couple of decades, there has been major advancements in the domain of missing data imputation. The techniques in the domain include amongst others: Expectation Maximization, Neural Networks with Evolutionary Algorithms or optimization techniques and K-Nearest Neighbor approaches to solve the problem. The presence of missing data entries in databases render the tasks of decision-making and data analysis nontrivial. As a result this area has attracted a lot of research interest with the aim being to yield accurate and time efficient and sensitive missing data imputation techniques especially when time sensitive applications are concerned like power plants and winding processes. In this article, considering arbitrary and monotone missing data patterns, we hypothesize that the use of deep neural networks built using autoencoders and denoising autoencoders in conjunction with genetic algorithms, swarm intelligence and maximum likelihood estimator methods as novel data imputation techniques will lead to better imputed values than existing techniques. Also considered are the missing at random, missing completely at random and missing not at random missing data mechanisms. We also intend to use fuzzy logic in tandem with deep neural networks to perform the missing data imputation tasks, as well as different building blocks for the deep neural networks like Stacked Restricted Boltzmann Machines and Deep Belief Networks to test our hypothesis. The motivation behind this article is the need for missing data imputation techniques that lead to better imputed values than existing methods with higher accuracies and lower errors.
0.83182
0.671309
0.160511
2004.06227
Monopoles And Landau-Ginzburg Models I
The end point of this series of papers is to construct the monopole Floer homology for 3-manifolds with torus boundary. In the first paper, we explain the idea from the standpoint of gauged Landau-Ginzburg models and address a few model problems related to the compactness of moduli spaces, using a Bochner-type formula associated to the gauged Witten equations.
We prove the existence of time periodic solution to the 3D Ginzburg-Landau equation in weighted Sobolev spaces. We consider the cubic Ginzburg-Landau equation with an external force $g$ satisfying the oddness condition $g(-x,t)=-g(x,t)$. The existence of the periodic solution is proved for small time-periodic external force. The stability of the time periodic solution is also considered.
0.872412
0.778054
0.094358
2004.06228
Fractal basins of convergence of a seventh-order generalized H\'enon-Heiles potential
This article aims to investigate the points of equilibrium and the associated convergence basins in a seventh-order generalized H\'enon-Heiles potential. Using the well-known Newton-Raphson iterator we numerically locate the position of the points of equilibrium, while we also obtain their linear stability. Furthermore, we demonstrate how the two variable parameters, entering the generalized H\'enon-Heiles potential, affect the convergence dynamics of the system as well as the fractal degree of the basin diagrams. The fractal degree is derived by computing the (boundary) basin entropy as well as the uncertainty dimension.
Let $f$ be a H\'enon-Sibony map (regular polynomial automorphism) of $\mathbb{C}^k$ and let $\mu$ be the equilibrium measure of $f$. In this paper we prove that $\mu$ is exponentially mixing for plurisubharmonic test functions.
0.931375
0.730326
0.201049
2004.06229
Imitation Learning for Fashion Style Based on Hierarchical Multimodal Representation
Fashion is a complex social phenomenon. People follow fashion styles from demonstrations by experts or fashion icons. However, for machine agent, learning to imitate fashion experts from demonstrations can be challenging, especially for complex styles in environments with high-dimensional, multimodal observations. Most existing research regarding fashion outfit composition utilizes supervised learning methods to mimic the behaviors of style icons. These methods suffer from distribution shift: because the agent greedily imitates some given outfit demonstrations, it can drift away from one style to another styles given subtle differences. In this work, we propose an adversarial inverse reinforcement learning formulation to recover reward functions based on hierarchical multimodal representation (HM-AIRL) during the imitation process. The hierarchical joint representation can more comprehensively model the expert composited outfit demonstrations to recover the reward function. We demonstrate that the proposed HM-AIRL model is able to recover reward functions that are robust to changes in multimodal observations, enabling us to learn policies under significant variation between different styles.
We explore the problem of learning to decompose spatial tasks into segments, as exemplified by the problem of a painting robot covering a large object. Inspired by the ability of classical decision tree algorithms to construct structured partitions of their input spaces, we formulate the problem of decomposing objects into segments as a parsing approach. We make the insight that the derivation of a parse-tree that decomposes the object into segments closely resembles a decision tree constructed by ID3, which can be done when the ground-truth available. We learn to imitate an expert parsing oracle, such that our neural parser can generalize to parse natural images without ground truth. We introduce a novel deterministic policy gradient update, DRAG (i.e., DeteRministically AGgrevate) in the form of a deterministic actor-critic variant of AggreVaTeD, to train our neural parser. From another perspective, our approach is a variant of the Deterministic Policy Gradient suitable for the imitation learning setting. The deterministic policy representation offered by training our neural parser with DRAG allows it to outperform state of the art imitation and reinforcement learning approaches.
0.893082
0.72197
0.171112
2004.06230
Power-Constrained Bandits
Contextual bandits often provide simple and effective personalization in decision making problems, making them popular in many domains including digital health. However, when bandits are deployed in the context of a scientific study, the aim is not only to personalize for an individual, but also to determine, with sufficient statistical power, whether or not the system's intervention is effective. In this work, we develop a set of constraints and a general meta-algorithm that can be used to both guarantee power constraints and minimize regret. Our results demonstrate a number of existing algorithms can be easily modified to satisfy the constraint without significant decrease in average return. We also show that our modification is also robust to a variety of model mis-specifications.
Bandit algorithms have various application in safety-critical systems, where it is important to respect the system constraints that rely on the bandit's unknown parameters at every round. In this paper, we formulate a linear stochastic multi-armed bandit problem with safety constraints that depend (linearly) on an unknown parameter vector. As such, the learner is unable to identify all safe actions and must act conservatively in ensuring that her actions satisfy the safety constraint at all rounds (at least with high probability). For these bandits, we propose a new UCB-based algorithm called Safe-LUCB, which includes necessary modifications to respect safety constraints. The algorithm has two phases. During the pure exploration phase the learner chooses her actions at random from a restricted set of safe actions with the goal of learning a good approximation of the entire unknown safe set. Once this goal is achieved, the algorithm begins a safe exploration-exploitation phase where the learner gradually expands their estimate of the set of safe actions while controlling the growth of regret. We provide a general regret bound for the algorithm, as well as a problem dependent bound that is connected to the location of the optimal action within the safe set. We then propose a modified heuristic that exploits our problem dependent analysis to improve the regret.
0.835859
0.809671
0.026189
2004.06231
Einsum Networks: Fast and Scalable Learning of Tractable Probabilistic Circuits
Probabilistic circuits (PCs) are a promising avenue for probabilistic modeling, as they permit a wide range of exact and efficient inference routines. Recent ``deep-learning-style'' implementations of PCs strive for a better scalability, but are still difficult to train on real-world data, due to their sparsely connected computational graphs. In this paper, we propose Einsum Networks (EiNets), a novel implementation design for PCs, improving prior art in several regards. At their core, EiNets combine a large number of arithmetic operations in a single monolithic einsum-operation, leading to speedups and memory savings of up to two orders of magnitude, in comparison to previous implementations. As an algorithmic contribution, we show that the implementation of Expectation-Maximization (EM) can be simplified for PCs, by leveraging automatic differentiation. Furthermore, we demonstrate that EiNets scale well to datasets which were previously out of reach, such as SVHN and CelebA, and that they can be used as faithful generative image models.
Sum-product networks (SPNs) are a class of probabilistic graphical models that allow tractable marginal inference. However, the maximum a posteriori (MAP) inference in SPNs is NP-hard. We investigate MAP inference in SPNs from both theoretical and algorithmic perspectives. For the theoretical part, we reduce general MAP inference to its special case without evidence and hidden variables; we also show that it is NP-hard to approximate the MAP problem to $2^{n^\epsilon}$ for fixed $0 \leq \epsilon < 1$, where $n$ is the input size. For the algorithmic part, we first present an exact MAP solver that runs reasonably fast and could handle SPNs with up to 1k variables and 150k arcs in our experiments. We then present a new approximate MAP solver with a good balance between speed and accuracy, and our comprehensive experiments on real-world datasets show that it has better overall performance than existing approximate solvers.
0.876872
0.751192
0.125679
2004.06232
A triple integral analog of a multiple zeta value
We establish the triple integral evaluation \[ \int_{1}^{\infty} \int_{0}^{1} \int_{0}^{1} \frac{dz \, dy \, dx}{x(x+y)(x+y+z)} = \frac{5}{24} \zeta(3), \] as well as the equivalent polylogarithmic double sum \[ \sum_{k=1}^{\infty} \sum_{j=k}^{\infty} \frac{(-1)^{k-1}}{k^{2}} \, \frac{1}{j \, 2^{j}} = \frac{13}{24} \zeta(3). \] This double sum is related to, but less approachable than, similar sums studied by Ramanujan. It is also reminiscent of Euler's formula $\zeta(2,1) = \zeta(3)$, which is the simplest instance of duality of multiple polylogarithms. We review this duality and apply it to derive a companion identity. We also discuss approaches based on computer algebra. All of our approaches ultimately require the introduction of polylogarithms and nontrivial relations between them. It remains an open challenge to relate the triple integral or the double sum to $\zeta(3)$ directly.
We show that the single trace heterotic N-point tree-level gauge amplitude A_HET can be obtained from the corresponding type I amplitude A_I by the single-valued (sv) projection: A_HET=sv(A_I). This projection maps multiple zeta values to single-valued multiple zeta values. The latter represent a subclass of multiple zeta values originating from single-valued multiple polylogarithms at unity. Similar relations between open and closed string amplitudes or amplitudes of different string vacua can be established. As a consequence the alpha'-expansion of a closed string amplitude is dictated by that of the corresponding open string amplitude. The combination of single-valued projections, Kawai-Lewellen-Tye relations and Mellin correspondence reveal a unity of all tree-level open and closed superstring amplitudes together with the maximally supersymmetric Yang-Mills and supergravity theories.
0.854307
0.74714
0.107167
2004.06233
Half-metallic compositional ranges for selected Heusler alloys
For a material that is a half-metal, there should exist a range of compositions for half-metallicity. This compositional range can be expressed in terms of electron count and computed. We investigate electronic and magnetic properties of doped full- and half-Heusler alloys (stoichiometry XYZ2 and XYZ, respectively) with elements X from groups 13-16 and periods 3-6 of the Periodic Table, Y={Mn, Fe}, and Z={Co, Ni}. Using spin density functional theory, we predict shifts of the Fermi energy in the doped and solid-solution alloys. These predictions can be used for band-gap engineering of multicomponent half-metals and provide the viable range of compositions, such as for a range of n=x+y+z in (Co$_{2-z}Ni_z)$(Mn$_{1-y}$Fe$_{y}$)(Sn$_{1-x}$Sb$_{x}$). This methodology for doped and chemically disordered half-metallic alloys offers a design approach to electronic-structure engineering that can accelerate development of half-metals for novel electronic and spintronic applications.
Using the nonlocal coherent-potential approximation we study the effect of intersite spatial correlations on the transition from band insulator to metal as well as from metal to Mott insulator in the "alloy analogy" approach to the paramagnetic solution of the half-filled ionic Hubbard model. We find that intersite spatial correlations enhance the metallic phase.
0.846365
0.665461
0.180904
2004.06235
ExTru: A Lightweight, Fast, and Secure Expirable Trust for the Internet of Things
The resource-constrained nature of the Internet of Things (IoT) devices, poses a challenge in designing a secure, reliable, and particularly high-performance communication for this family of devices. Although side-channel resistant ciphers (either block cipher or stream cipher) are the well-suited solution to establish a guaranteed secure communication, the energy-intensive nature of these ciphers makes them undesirable for particularly lightweight IoT solutions. In this paper, we introduce ExTru, a novel encrypted communication protocol based on stream ciphers that adds a configurable switching & toggling network (CSTN) to not only boost the performance of the communication in lightweight IoT devices, it also consumes far less energy compared with the conventional side-channel resistant ciphers. Although the overall structure of the proposed scheme is leaky against physical attacks, such as side-channel or new scan-based Boolean satisfiability (SAT) attack or algebraic attack, we introduce a dynamic encryption mechanism that removes this vulnerability. We demonstrate how each communicated message in the proposed scheme reduces the level of trust. Accordingly, since a specific number of messages, N, could break the communication and extract the key, by using the dynamic encryption mechanism, ExTru can re-initiate the level of trust periodically after T messages where T<N, to protect the communication against side-channel and scan-based attacks (e.g. SAT attack). Furthermore, we demonstrate that by properly configuring the value of T, ExTru not only increases the strength of security from per "device" to per "message", it also significantly improves energy consumption as well as throughput in comparison with an architecture that only uses a conventional side-channel resistant block/stream cipher.
Mobile Crowd-Sensing (MCS) has appeared as a prospective solution for large-scale data collection, leveraging built-in sensors and social applications in mobile devices that enables a variety of Internet of Things (IoT) services. However, the human involvement in MCS results in a high possibility for unintentionally contributing corrupted and falsified data or intentionally spreading disinformation for malevolent purposes, consequently undermining IoT services. Therefore, recruiting trustworthy contributors plays a crucial role in collecting high-quality data and providing better quality of services while minimizing the vulnerabilities and risks to MCS systems. In this article, a novel trust model called Experience-Reputation (E-R) is proposed for evaluating trust relationships between any two mobile device users in a MCS platform. To enable the E-R model, virtual interactions among the users are manipulated by considering an assessment of the quality of contributed data from such users. Based on these interactions, two indicators of trust called Experience and Reputation are calculated accordingly. By incorporating the Experience and Reputation trust indicators (TIs), trust relationships between the users are established, evaluated and maintained. Based on these trust relationships, a novel trust-based recruitment scheme is carried out for selecting the most trustworthy MCS users to contribute to data sensing tasks. In order to evaluate the performance and effectiveness of the proposed trust-based mechanism as well as the E-R trust model, we deploy several recruitment schemes in a MCS testbed which consists of both normal and malicious users. The results highlight the strength of the trust-based scheme as it delivers better quality for MCS services while being able to detect malicious users.
0.860898
0.775168
0.085731
2004.06236
Oscillations modulating power law exponents in isotropic turbulence: Where experiments and simulations agree and differ
Inertial-range features of turbulence are investigated using data from experimental measurements of grid turbulence and direct numerical simulations of isotropic turbulence simulated in a periodic box, both at the Taylor-scale Reynolds number $R_\lambda \sim 1000$. In particular, oscillations modulating the power-law scaling in the inertial range are examined for structure functions up to sixth order moments. The oscillations in exponent ratios decrease with increasing sample size in simulations though, in experiments, they survive at a low value of $4$ parts in $1000$ even after massive averaging. The two data sets are consistent in their intermittent character but differ in small but observable respects. Neither the scaling exponents themselves nor all the viscous effects are consistently reproduced by existing models of intermittency.
Quasi-stationary far-from-equilibrium critical states of a two-component Bose gas are studied in two spatial dimensions. After the system has undergone an initial dynamical instability it approaches a non-thermal fixed point. At this critical point the structure of the gas is characterised by ensembles of (quasi-)topological defects such as vortices, skyrmions and solitons which give rise to universal power-law behaviour of momentum correlation functions. The resulting power-law spectra can be interpreted in terms of strong-wave-turbulence cascades driven by particle transport into long-wave-length excitations. Scaling exponents are determined on both sides of the miscible-immiscible transition controlled by the ratio of the intra-species to inter-species couplings. Making use of quantum turbulence methods, we explain the specific values of the exponents from the presence of transient (quasi-)topological defects.
0.903529
0.756463
0.147066
2004.06237
Estimation of Classification Rules from Partially Classified Data
We consider the situation where the observed sample contains some observations whose class of origin is known (that is, they are classified with respect to the g underlying classes of interest), and where the remaining observations in the sample are unclassified (that is, their class labels are unknown). For class-conditional distributions taken to be known up to a vector of unknown parameters, the aim is to estimate the Bayes' rule of allocation for the allocation of subsequent unclassified observations. Estimation on the basis of both the classified and unclassified data can be undertaken in a straightforward manner by fitting a g-component mixture model by maximum likelihood (ML) via the EM algorithm in the situation where the observed data can be assumed to be an observed random sample from the adopted mixture distribution. This assumption applies if the missing-data mechanism is ignorable in the terminology pioneered by Rubin (1976). An initial likelihood approach was to use the so-called classification ML approach whereby the missing labels are taken to be parameters to be estimated along with the parameters of the class-conditional distributions. However, as it can lead to inconsistent estimates, the focus of attention switched to the mixture ML approach after the appearance of the EM algorithm (Dempster et al., 1977). Particular attention is given here to the asymptotic relative efficiency (ARE) of the Bayes' rule estimated from a partially classified sample. Lastly, we consider briefly some recent results in situations where the missing label pattern is non-ignorable for the purposes of ML estimation for the mixture model.
We address zero-shot (ZS) learning, building upon prior work in hierarchical classification by combining it with approaches based on semantic attribute estimation. For both non-novel and novel image classes we compare multiple formulations of the problem, starting with deep universal features in each case. We investigate the effect of using different posterior probabilities as inputs to the hierarchical classifier, comparing the performances of posteriors derived from distances to SVM classifier boundaries with those of posteriors based on semantic attribute estimation. Using a dataset consisting of 150 object classes from the ImageNet ILSVRC2012 data set, we find that the hierarchical classification method that maximizes expected reward for non-novel classes differs from the method that maximizes expected reward for novel classes. We also show that using input posteriors based on semantic attributes improves the expected reward for novel classes.
0.791446
0.68018
0.111266
2004.06238
Internal Neighbourhood Structures II: On Finite Sum of Subobjects
The main aim of this paper is to show that in any lextensive category with a proper $({\mathsf{E}}, {\mathsf{M}})$ system such that the set of $\mathsf{M}$-subobjects is a complete lattice, $\mathsf{M}$ is closed under finite sums if and only if the monomorphisms in $\mathsf{E}$ are stable under pullbacks along coproduct injections. It is also shown that a sum of closed morphisms in $\mathsf{M}$ is again a closed morphism in $\mathsf{M}$ if and only if the sum is in $\mathsf{M}$, the coproduct injections are closed and reflect zero. As a consequence it is shown that the $\vee$-semilattice of (closed) morphisms in $\mathsf{M}$ to a finite sum is a biproduct of the $\vee$-semilattices of (closed) morphisms in $\mathsf{M}$ to the summands.
In the context of Synthetic Differential Geometry, we describe a notion of higher connection with values in a cubical groupoid. We do this by exploiting a certain structure of cubical complex derived from the first neighbourhood of the diagonal of a manifold. This cubical complex consists of infinitesimal parallelelpipeda.
0.768661
0.730857
0.037803
2004.06239
End-to-End Estimation of Multi-Person 3D Poses from Multiple Cameras
We present an approach to estimate 3D poses of multiple people from multiple camera views. In contrast to the previous efforts which require to establish cross-view correspondence based on noisy and incomplete 2D pose estimations, we present an end-to-end solution which directly operates in the $3$D space, therefore avoids making incorrect decisions in the 2D space. To achieve this goal, the features in all camera views are warped and aggregated in a common 3D space, and fed into Cuboid Proposal Network (CPN) to coarsely localize all people. Then we propose Pose Regression Network (PRN) to estimate a detailed 3D pose for each proposal. The approach is robust to occlusion which occurs frequently in practice. Without bells and whistles, it outperforms the state-of-the-arts on the public datasets. Code will be released at https://github.com/microsoft/multiperson-pose-estimation-pytorch.
Stereo videos for the dynamic scenes often show unpleasant blurred effects due to the camera motion and the multiple moving objects with large depth variations. Given consecutive blurred stereo video frames, we aim to recover the latent clean images, estimate the 3D scene flow and segment the multiple moving objects. These three tasks have been previously addressed separately, which fail to exploit the internal connections among these tasks and cannot achieve optimality. In this paper, we propose to jointly solve these three tasks in a unified framework by exploiting their intrinsic connections. To this end, we represent the dynamic scenes with the piece-wise planar model, which exploits the local structure of the scene and expresses various dynamic scenes. Under our model, these three tasks are naturally connected and expressed as the parameter estimation of 3D scene structure and camera motion (structure and motion for the dynamic scenes). By exploiting the blur model constraint, the moving objects and the 3D scene structure, we reach an energy minimization formulation for joint deblurring, scene flow and segmentation. We evaluate our approach extensively on both synthetic datasets and publicly available real datasets with fast-moving objects, camera motion, uncontrolled lighting conditions and shadows. Experimental results demonstrate that our method can achieve significant improvement in stereo video deblurring, scene flow estimation and moving object segmentation, over state-of-the-art methods.
0.881866
0.721423
0.160442
2004.06240
Broadband thermal beaming using multiple epsilon near zero materials
Controlling the directionality of an absorptive or thermally emissive material is a fundamental challenge in contemporary materials and photonics research. Over the past two decades, a range of photonic strategies have enabled angular beaming of thermal emission, but only over narrow sets of bandwidths. However, thermal radiation is inherently a broadband phenomenon, and many emerging applications in imaging and energy require broad spectrum control of emission and absorption. We currently lack the ability to constrain thermal emission, as well as absorption, over arbitrary angles of incidence, but consistently over a broad range of wavelengths. Here, we theoretically propose and experimentally demonstrate a mechanism for broadband angular selectivity in absorption and emission that leverages multiple materials that exhibit a permittivity near zero, ENZ materials. We experimentally realize a broadband directional thermal emitter by introducing a subwavelength photonic film consisting of multiple oxides that exhibit epsilon near zero (ENZ) regions in the long-wave infrared region. We obtain high emissivity (> 0.6) in the p polarization from 7.7 to 11.5 micron over an angular range between 65 deg and 85 deg. Outside this range the photonic film is highly reflective. The broadband nature of angular control enables strong radiative heat transfer only at large angles and is directly observed through thermal imaging. The materials and photonic strategy employed use abundant, low-cost materials that are fully compatible with large-area deposition. By decoupling conventional limitations on angular and spectral response, our approach opens new possibilities for radiative heat transfer in a range of applications, including thermal camouflaging, solar heating, radiative cooling and waste heat recovery.
The performance of the energy degrader in terms of beam properties directly impacts the design and cost of cyclotron-based proton therapy centers. The aim of this study is to evaluate the performances of different existing and novel degrader materials. The quantitative estimate is based on detailed GEANT4 simulations that analyze the beam-matter interaction and provide a determination of the beam emittance increase and transmission. Comparisons between existing (aluminum, graphite, beryllium) and novel (boron carbide and diamond) degrader materials are provided and evaluated against semi-analytical models of multiple Coulomb scattering. The results showing a potential in emittance reduction for novel materials are presented and discussed in detail.
0.81763
0.643507
0.174123
2004.06241
Derived Hecke action at $p$ and the ordinary $p$-adic cohomology of arithmetic manifolds
We study the derived Hecke action at $p$ on the ordinary $p$-adic cohomology of arithmetic subgroups of semisimple groups $\mathrm G(\mathbb Q)$, i.e., we study the derived version of Hida's theory for ordinary Hecke algebras. This is the analog at $\ell=p$ of derived Hecke actions studied by Venkatesh in the tame case. We show that properties of the derived Hecke action at $p$ are related to deep conjectures in Galois cohomology which are higher analogs of the classical Leopoldt conjecture.
We prove the conjectured compatibility of $p$-adic fundamental lines with specializations at motivic points for a wide class of $p$-adic families of $p$-adic Galois representations (for instance, the families which arise from $p$-adic families of automorphic representations of the unit group of a quaternion algebra or of a totally definite unitary groups) and deduce the compatibility of the Equivariant Tamagawa Number Conjectures for them. However, we also show that fundamental lines are not compatible with arbitrary characteristic zero specializations with values in a domain in general. This points to the need to modify some conjectures on $p$-adic variation of special values using completed cohomology.
0.941632
0.823738
0.117894
2004.06242
Projective structures on a hyperbolic 3-orbifold
We compute and analyse the moduli space of those real projective structures on a hyperbolic 3-orbifold that are modelled on a single ideal tetrahedron in projective space. Parameterisations are given in terms of classical invariants, traces, and geometric invariants, cross ratios.
This paper is the ninth in a sequence on the structure of sets of solutions to systems of equations in free and hyperbolic groups, projections of such sets (Diophantine sets), and the structure of definable sets over free and hyperbolic groups. In the ninth paper we associate a Diophantine set with a definable set, and view it as the Diophantine envelope of the definable set. We use the envelope and duo limit groups that were used in proving stability of the theory of free and torsion-free hyperbolic groups [Se9], to study definable equivalence relations, and in particular, to classify imaginaries over these groups.
0.927605
0.770489
0.157116
2004.06243
PhICNet: Physics-Incorporated Convolutional Recurrent Neural Networks for Modeling Dynamical Systems
Dynamical systems involving partial differential equations (PDEs) and ordinary differential equations (ODEs) arise in many fields of science and engineering. In this paper, we present a physics-incorporated deep learning framework to model and predict the spatiotemporal evolution of dynamical systems governed by partially-known inhomogenous PDEs with unobservable source dynamics. We formulate our model PhICNet as a convolutional recurrent neural network which is end-to-end trainable for spatiotemporal evolution prediction of dynamical systems. Experimental results show the long-term prediction capability of our model.
Based on the progress of image recognition, video recognition has been extensively studied recently. However, most of the existing methods are focused on short-term but not long-term video recognition, called contextual video recognition. To address contextual video recognition, we use convolutional recurrent neural networks (ConvRNNs) having a rich spatio-temporal information processing capability, but ConvRNNs requires extensive computation that slows down training. In this paper, inspired by the normalization and detrending methods, we propose adaptive detrending (AD) for temporal normalization in order to accelerate the training of ConvRNNs, especially for convolutional gated recurrent unit (ConvGRU). AD removes internal covariate shift within a sequence of each neuron in recurrent neural networks (RNNs) by subtracting a trend. In the experiments for contextual recognition on ConvGRU, the results show that (1) ConvGRU clearly outperforms the feed-forward neural networks, (2) AD consistently offers a significant training acceleration and generalization improvement, and (3) AD is further improved by collaborating with the existing normalization methods.
0.90096
0.750481
0.150479
2004.06244
A reinforcement learning application of guided Monte Carlo Tree Search algorithm for beam orientation selection in radiation therapy
Due to the large combinatorial problem, current beam orientation optimization algorithms for radiotherapy, such as column generation (CG), are typically heuristic or greedy in nature, leading to suboptimal solutions. We propose a reinforcement learning strategy using Monte Carlo Tree Search capable of finding a superior beam orientation set and in less time than CG.We utilized a reinforcement learning structure involving a supervised learning network to guide Monte Carlo tree search (GTS) to explore the decision space of beam orientation selection problem. We have previously trained a deep neural network (DNN) that takes in the patient anatomy, organ weights, and current beams, and then approximates beam fitness values, indicating the next best beam to add. This DNN is used to probabilistically guide the traversal of the branches of the Monte Carlo decision tree to add a new beam to the plan. To test the feasibility of the algorithm, we solved for 5-beam plans, using 13 test prostate cancer patients, different from the 57 training and validation patients originally trained the DNN. To show the strength of GTS to other search methods, performances of three other search methods including a guided search, uniform tree search and random search algorithms are also provided. On average GTS outperforms all other methods, it find a solution better than CG in 237 seconds on average, compared to CG which takes 360 seconds, and outperforms all other methods in finding a solution with lower objective function value in less than 1000 seconds. Using our guided tree search (GTS) method we were able to maintain a similar planning target volume (PTV) coverage within 1% error, and reduce the organ at risk (OAR) mean dose for body, rectum, left and right femoral heads, but a slight increase of 1% in bladder mean dose.
The landmark achievements of AlphaGo Zero have created great research interest into self-play in reinforcement learning. In self-play, Monte Carlo Tree Search is used to train a deep neural network, that is then used in tree searches. Training itself is governed by many hyperparameters.There has been surprisingly little research on design choices for hyper-parameter values and loss-functions, presumably because of the prohibitive computational cost to explore the parameter space. In this paper, we investigate 12 hyper-parameters in an AlphaZero-like self-play algorithm and evaluate how these parameters contribute to training. We use small games, to achieve meaningful exploration with moderate computational effort. The experimental results show that training is highly sensitive to hyper-parameter choices. Through multi-objective analysis we identify 4 important hyper-parameters to further assess. To start, we find surprising results where too much training can sometimes lead to lower performance. Our main result is that the number of self-play iterations subsumes MCTS-search simulations, game-episodes, and training epochs. The intuition is that these three increase together as self-play iterations increase, and that increasing them individually is sub-optimal. A consequence of our experiments is a direct recommendation for setting hyper-parameter values in self-play: the overarching outer-loop of self-play iterations should be maximized, in favor of the three inner-loop hyper-parameters, which should be set at lower values. A secondary result of our experiments concerns the choice of optimization goals, for which we also provide recommendations.
0.91175
0.695348
0.216402
2004.06245
The BACCO Simulation Project: Exploiting the full power of large-scale structure for cosmology
We present the BACCO project, a simulation framework specially designed to provide highly-accurate predictions for the distribution of mass, galaxies, and gas as a function of cosmological parameters. In this paper, we describe our main suite of simulations (L $\sim2$ Gpc and $4320^3$ particles) and present various validation tests. Using a cosmology-rescaling technique, we predict the nonlinear mass power spectrum over the redshift range 0 < z < 1.5 and over scales $10^{-2} < k/(h Mpc^{-1} ) < 5$ for 800 points in an 8-dimensional cosmological parameter space. For an efficient interpolation of the results, we build a Gaussian emulator which we test against other widely-used methods. Over the whole range of scales considered, we expect our predictions to be accurate at the 2% level for parameters in the minimal ${\Lambda}$CDM model and to 3% when extended to dynamical dark energy and massive neutrinos. We make our emulator publicly available under http://www.dipc.org/bacco
We carry out a suite of cosmological simulations of modified action f(R) models where cosmic acceleration arises from an alteration of gravity instead of dark energy. These models introduce an extra scalar degree of freedom which enhances the force of gravity below the inverse mass or Compton scale of the scalar. The simulations exhibit the so-called chameleon mechanism, necessary for satisfying local constraints on gravity, where this scale depends on environment, in particular the depth of the local gravitational potential. We find that the chameleon mechanism can substantially suppress the enhancement of power spectrum in the non-linear regime if the background field value is comparable to or smaller than the depth of the gravitational potentials of typical structures. Nonetheless power spectrum enhancements at intermediate scales remain at a measurable level for models even when the expansion history is indistinguishable from a cosmological constant, cold dark matter model. Simple scaling relations that take the linear power spectrum into a non-linear spectrum fail to capture the modifications of f(R) due to the change in collapsed structures, the chameleon mechanism, and the time evolution of the modifications.
0.885828
0.752953
0.132875
2004.06246
The Pair-Replica-Mean-Field Limit for Intensity-based Neural Networks
Replica-mean-field models have been proposed to decipher the activity of neural networks via a multiply-and-conquer approach. In this approach, one considers limit networks made of infinitely many replicas with the same basic neural structure as that of the network of interest, but exchanging spikes in a randomized manner. The key point is that these replica-mean-field networks are tractable versions that retain important features of the finite structure of interest. To date, the replica framework has been discussed for first-order models, whereby elementary replica constituents are single neurons with independent Poisson inputs. Here, we extend this replica framework to allow elementary replica constituents to be composite objects, namely, pairs of neurons. As they include pairwise interactions, these pair-replica models exhibit non-trivial dependencies in their stationary dynamics, which cannot be captured by first-order replica models. Our contributions are two-fold: $(i)$ We analytically characterize the stationary dynamics of a pair of intensity-based neurons with independent Poisson input. This analysis involves the reduction of a boundary-value problem related to a two-dimensional transport equation to a system of Fredholm integral equations---a result of independent interest. $(ii)$ We analyze the set of consistency equations determining the full network dynamics of certain replica limits. These limits are those for which replica constituents, be they single neurons or pairs of neurons, form a partition of the network of interest. Both analyses are numerically validated by computing input/output transfer functions for neuronal pairs and by computing the correlation structure of certain pair-dominated network dynamics.
Deep neural networks have achieved impressive results in computer vision and machine learning. Unfortunately, state-of-the-art networks are extremely compute and memory intensive which makes them unsuitable for mW-devices such as IoT end-nodes. Aggressive quantization of these networks dramatically reduces the computation and memory footprint. Binary-weight neural networks (BWNs) follow this trend, pushing weight quantization to the limit. Hardware accelerators for BWNs presented up to now have focused on core efficiency, disregarding I/O bandwidth and system-level efficiency that are crucial for deployment of accelerators in ultra-low power devices. We present Hyperdrive: a BWN accelerator dramatically reducing the I/O bandwidth exploiting a novel binary-weight streaming approach, which can be used for arbitrarily sized convolutional neural network architecture and input resolution by exploiting the natural scalability of the compute units both at chip-level and system-level by arranging Hyperdrive chips systolically in a 2D mesh while processing the entire feature map together in parallel. Hyperdrive achieves 4.3 TOp/s/W system-level efficiency (i.e., including I/Os)---3.1x higher than state-of-the-art BWN accelerators, even if its core uses resource-intensive FP16 arithmetic for increased robustness.
0.856147
0.701364
0.154783
2004.06248
Improved Sleeping Bandits with Stochastic Actions Sets and Adversarial Rewards
In this paper, we consider the problem of sleeping bandits with stochastic action sets and adversarial rewards. In this setting, in contrast to most work in bandits, the actions may not be available at all times. For instance, some products might be out of stock in item recommendation. The best existing efficient (i.e., polynomial-time) algorithms for this problem only guarantee a $O(T^{2/3})$ upper-bound on the regret. Yet, inefficient algorithms based on EXP4 can achieve $O(\sqrt{T})$. In this paper, we provide a new computationally efficient algorithm inspired by EXP3 satisfying a regret of order $O(\sqrt{T})$ when the availabilities of each action $i \in \cA$ are independent. We then study the most general version of the problem where at each round available sets are generated from some unknown arbitrary distribution (i.e., without the independence assumption) and propose an efficient algorithm with $O(\sqrt {2^K T})$ regret guarantee. Our theoretical results are corroborated with experimental evaluations.
We study a general version of the adversarial online learning problem. We are given a decision set $\mathcal{X}$ in a reflexive Banach space $X$ and a sequence of reward vectors in the dual space of $X$. At each iteration, we choose an action from $\mathcal{X}$, based on the observed sequence of previous rewards. Our goal is to minimize regret, defined as the gap between the realized reward and the reward of the best fixed action in hindsight. Using results from infinite dimensional convex analysis, we generalize the method of Dual Averaging (or Follow the Regularized Leader) to our setting and obtain general upper bounds on the worst-case regret that subsume a wide range of results from the literature. Under the assumption of uniformly continuous rewards, we obtain explicit anytime regret bounds in a setting where the decision set is the set of probability distributions on a compact metric space $S$ whose Radon-Nikodym derivatives are elements of $L^p(S)$ for some $p > 1$. Importantly, we make no convexity assumptions on either the set $S$ or the reward functions. We also prove a general lower bound on the worst-case regret for any online algorithm. We then apply these results to the problem of learning in repeated continuous two-player zero-sum games, in which players' strategy sets are compact metric spaces. In doing so, we first prove that if both players play a Hannan-consistent strategy, then with probability 1 the empirical distributions of play weakly converge to the set of Nash equilibria of the game. We then show that, under mild assumptions, Dual Averaging on the (infinite-dimensional) space of probability distributions indeed achieves Hannan-consistency. Finally, we illustrate our results through numerical examples.
0.912038
0.76494
0.147098
2004.06249
The photon vortex beam in rotating medium
In this paper we consider the photon vortex beam in the rotating medium, where the rotating velocity acts as an effective vector potential. Using the Riemann-Silberstein vector, we construct the photon wave function. Using the Maxwell equations and the first-order Minkowski constitutive relations we get the dynamic equations of photon in moving medium. For the stationary states, the dynamic equations can be written as a Dirac-like equation. We obtain the approximate photon vortex beam solutions by the given the medium's different velocity distribution and find the diffracting and nondiffracting Laguerre-Gaussian beam solutions in the rotating medium. For the diffracting Laguerre-Gaussian beams, we acquire new terms arising from the rotation that can change the Gouy phase, and then accordingly infer the rotation behavior of the photon interference pattern. Furthermore, in our theory we obtain the Landau levels structure of transverse photon energy in the nondiffracting Laguerre-Gaussian beam solutions.
An optical vortex (phase singularity) with a high topological strength resides on the axis of a high-order light beam. The breakup of this vortex under elliptic perturbation into a straight row of unit strength vortices is described. This behavior is studied in helical Ince-Gauss beams and astigmatic, generalized Hermite-Laguerre-Gauss beams, which are perturbations of Laguerre-Gauss beams. Approximations of these beams are derived for small perturbation, in which a neighborhood of the axis can be approximated by a polynomial in the complex plane: a Chebyshev polynomial for Ince-Gauss beams, and a Hermite polynomial for astigmatic beams.
0.908427
0.824663
0.083765
2004.06250
Penetration of a supersonic particle at the interface in a binary complex plasma
The penetration of a supersonic particle at the interface was studied in a binary complex plasma. Inspired by the experiments performed in the PK-3 Plus Laboratory on board the International Space Station, Langevin dynamics simulations were carried out. The evolution of Mach cone at the interface was observed, where a kink of the lateral wake front was observed at the interface. By comparing the evolution of axial and radial velocity, we show that the interface solitary wave is non-linear. The dependence of the background particle dynamics in the vicinity of the interface on the penetration direction reveals that the disparity of the mobility may be the cause of various interface effects.
Irradiation of a solid with intense plasma ion beams produced by Rod Plasma Injector is a strongly nonequilibrium process, which enables achieving a number of effects which are impossible to be achieved with other method. In the paper, the process of plasma ion beam propagation regarding its time and energy distributions and the process of ion penetration of solids, resulting with ion implementation and temperature growth have been analyzed mathematically on basis of experimental data. Results of numerical calculations have been presented concerning temperature and dopant density time evolution.
0.909714
0.739201
0.170513
2004.06251
Scalar and Spinor Effective Actions in Global de Sitter
In this paper, we compute the effective action of both a scalar field and a Dirac spinor field in the global de Sitter space of any dimension $d$ using the in-/out-state formalism. We show that there is particle production in even dimensions for both scalar field and spinor field. The in-out vacuum amplitude $Z_{in/out}$ is divergent at late times. By using dimensional regularization, we extract the finite part of $\log Z_{in/out}$ for $d$ even and the logarithmically divergent part of $\log Z_{in/out}$ for $d$ odd. We also find that the regularized in-out vacuum amplitude equals the ratio of determinants associated with different quantizations in $AdS_d$ upon the identification of certain parameters in the two theories.
We study the wave equation for a minimally coupled massive scalar in D-dimensional de Sitter space. We compute the absorption cross section to investigate its cosmological horizon in the southern diamond. By analogy of the quantum mechanics, it is found that there is no absorption in de Sitter space. This means that de Sitter space is usually in thermal equilibrium, like the black hole in anti de Sitter space. It confirms that the cosmological horizon not only emits radiation but also absorbs that previously emitted by itself at the same rate, keeping the curvature radius of de Sitter space fixed.
0.87367
0.783018
0.090653
2004.06252
Operator Sampling for Shot-frugal Optimization in Variational Algorithms
Quantum chemistry is a near-term application for quantum computers. This application may be facilitated by variational quantum-classical algorithms (VQCAs), although a concern for VQCAs is the large number of measurements needed for convergence, especially for chemical accuracy. Here we introduce a strategy for reducing the number of measurements (i.e., shots) by randomly sampling operators $h_i$ from the overall Hamiltonian $H = \sum_i c_i h_i$. In particular, we employ weighted sampling, which is important when the $c_i$'s are highly non-uniform, as is typical in chemistry. We integrate this strategy with an adaptive optimizer developed recently by our group to construct an improved optimizer called Rosalin (Random Operator Sampling for Adaptive Learning with Individual Number of shots). Rosalin implements stochastic gradient descent while adapting the shot noise for each partial derivative and randomly assigning the shots amongst the $h_i$ according to a weighted distribution. We implement this and other optimizers to find the ground states of molecules H$_2$, LiH, and BeH$_2$, without and with quantum hardware noise, and Rosalin outperforms other optimizers in most cases.
In Part I (arXiv:1911.00619) of this article, we proposed an importance sampling algorithm to compute rare-event probabilities in forward uncertainty quantification problems. The algorithm, which we termed the "Bayesian Inverse Monte Carlo (BIMC) method", was shown to be optimal for problems in which the input-output operator is nearly linear. But applying the original BIMC to highly nonlinear systems can lead to several different failure modes. In this paper, we modify the BIMC method to extend its applicability to a wider class of systems. The modified algorithm, which we call "Adaptive-BIMC (A-BIMC)", has two stages. In the first stage, we solve a sequence of optimization problems to roughly identify those regions of parameter space which trigger the rare-event. In the second stage, we use the stage one results to construct a mixture of Gaussians that can be then used in an importance sampling algorithm to estimate rare event probability. We propose using a local surrogate that minimizes costly forward solves. The effectiveness of A-BIMC is demonstrated via several synthetic examples. Yet again, the modified algorithm is prone to failure. We systematically identify conditions under which it fails to lead to an effective importance sampling distribution.
0.782099
0.731125
0.050974
2004.06253
Astrometric precision of centering algorithms based on model fitting
We provide a basis to select the optimal algorithm according to the specific observational conditions in ground-based astrometry, and clarify the loss of precision in the case of not achieving optimum. The principle of the centering algorithms based on model fitting is analyzed by the method of maximum likelihood. The effective point spread function (ePSF) algorithm, which can construct an accurate model to fit the star image, and the most widely used Gaussian centering algorithm are chosen to investigate the effect of different factors on centering precision. A series of synthetic star images with different backgrounds, full width at half maximums (FWHMs) and profiles are processed by these algorithms. The profiles include the actual profiles extracted from observations and the theoretical profiles, the spatial variation of the PSF across the detector is also taken into account. Each algorithm is applied to the observations obtained from Yunnan observatory to verify the simulation results. The simulations show that ePSF fitting is obviously more precise than Gaussian fitting for a Gaussian profile star with high signal-to-noise ratio (SNR). When the center of star profile becomes sharp, or the SNR of the star decreases, the advantage of ePSF fitting will gradually decrease. The high precision of ePSF fitting is due to its appropriate weight in the weighted least squares fitting. However, a similar method using the same weight, the weighted Gaussian fitting, turned out to be poor under some conditions. The reduction results of practical observations show good agree with the simulations. For a frame of CCD image with enough stars to construct accurate ePSFs, ePSF fitting can approach the Cramer-Rao (CR) bound. Other centering algorithms may achieve the same precision under suitable conditions, but will show poor precision when not used properly.
The extensive penetration of wind farms (WFs) presents challenges to the operation of distribution networks (DNs). Building a probability distribution of the aggregated wind power forecast error is of great value for decision making. However, as a result of recent government incentives, many WFs are being newly built with little historical data for training distribution models. Moreover, WFs with different stakeholders may refuse to submit the raw data to a data center for model training. To address these problems, a Gaussian mixture model (GMM) is applied to build the distribution of the aggregated wind power forecast error; then, the maximum a posteriori (MAP) estimation method is adopted to overcome the limited training data problem in GMM parameter estimation. Next, a distributed MAP estimation method is developed based on the average consensus filter algorithm to address the data privacy issue. The distribution control center is introduced into the distributed estimation process to acquire more precise estimation results and better adapt to the DN control architecture. The effectiveness of the proposed algorithm is empirically verified using historical data.
0.843325
0.658611
0.184714
2004.06254
Robustness Comparison of Scheduling Algorithms in MapReduce Framework
Parallel computing is the fundamental base for MapReduce framework in Hadoop. Each data chunk is replicated over 3 servers for increasing availability of data and decreasing probability of data loss. Hence, the 3 servers that have Map task stored on their disk are fastest servers to process them, which are called local servers. All servers in the same rack as local servers are called rack-local servers that are slower than local servers since data chunk associated with Map task should be fetched through top of the rack switch. All other servers are called remote servers that are slowest servers since they need to fetch data from a local server in another rack, so data should be transmitted through at least 2 top of rack switches and a core switch. Note that number of switches in path of data transfer depends on internal network structure of data centers. The First-In-First-Out (FIFO) and Hadoop Fair Scheduler (HFS) algorithms do not take rack structure of data centers into account, so they are known to not be heavy-traffic delay optimal or even throughput optimal. The recent advances on scheduling for data centers considering rack structure of them and heterogeneity of servers resulted in state-of-the-art Balanced-PANDAS algorithm that outperforms classic MaxWeight algorithm. In both Balanced-PANDAS and MaxWeight algorithms, processing rate of local, rack-local, and remote servers are assumed to be known. However, with the change of traffic over time in addition to estimation errors of processing rates, it is not realistic to consider processing rates to be known. In this work, we study robustness of Balanced-PANDAS and MaxWeight algorithms in terms of inaccurate estimations of processing rates. We observe that Balanced-PANDAS is not as sensitive as MaxWeight on the accuracy of processing rates, making it more appealing to use in data centers.
In this paper, we propose a distributed throughput-optimal ad hoc wireless network scheduling algorithm, which is motivated by the celebrated simplex algorithm for solving linear programming (LP) problems. The scheduler stores a sparse set of basic schedules, and chooses the max-weight basic schedule for transmission in each time slot. At the same time, the scheduler tries to update the set of basic schedules by searching for a new basic schedule in a throughput increasing direction. We show that both of the above procedures can be achieved in a distributed manner. Specifically, we propose an average consensus based link contending algorithm to implement the distributed max weight scheduling. Further, we show that the basic schedule update can be implemented using CSMA mechanisms, which is similar to the one proposed by Jiang et al. Compared to the optimal distributed scheduler in Jiang's paper, where schedules change in a random walk fashion, our algorithm has a better delay performance by achieving faster schedule transitions in the steady state. The performance of the algorithm is finally confirmed by simulation results.
0.805991
0.689424
0.116567
2004.06255
Equivalence of two optimality conditions for polyhedral functions
In the paper we study two different optimality conditions for polyhedral functions. First one follows from the optimality conditions in terms of coexhausters, which are families of convex compact sets, that allow one to approximate the increment of the studied function at a considered point in the form of minmax or maxmin of affine functions. Second one is obtained in one of the recent publications and is used as a core result for constructing a new optimization algorithm for finding a minimum of a piecewise affine function. A piecewise affine function is an important object for different areas of research while coexhausters are an effective tool for the study of a wide class of nonsmooth functions. That is why it is important to show a connection between this two types of conditions and prove their equivalence. This is the main aim of the present paper.
We address the problem of minimizing a convex smooth function $f(x)$ over a compact polyhedral set $D$ given a stochastic zeroth-order constraint feedback model. This problem arises in safety-critical machine learning applications, such as personalized medicine and robotics. In such cases, one needs to ensure constraints are satisfied while exploring the decision space to find optimum of the loss function. We propose a new variant of the Frank-Wolfe algorithm, which applies to the case of uncertain linear constraints. Using robust optimization, we provide the convergence rate of the algorithm while guaranteeing feasibility of all iterates, with high probability.
0.901414
0.799835
0.101579
2004.06256
Hydrogenated Fullerenes (Fulleranes) in Space
Since the first laboratory synthesis of C$_{60}$ in 1985, fullerene-related species have been proposed to interpret various astronomical features. After more than 25 years' efforts, several circumstellar and interstellar features have been convincingly assigned to C$_{60}$, C$_{70}$, and C$_{60}^+$. These successes resulted from the recent advancements in observational, experimental, as well as computational techniques, and re-stimulated interest in searching for fullerene derivatives in space. As one of the most important fullerene derivatives, hydrogenated fullerene (fullerane) is likely to exist in circumstellar and interstellar conditions. This review gives an overview of the chemical properties and spectral signals of fulleranes focusing on those relevant to astronomy. We summarize previous proposals of fulleranes as the carrier of astronomical features at UV, optical, infrared, and radio wavelengths, and discuss the arguments favoring or disfavoring the presence of fulleranes in astronomical environments. Although no unambiguous detection of fulleranes in space has yet been reported, there are plausible evidences for supporting the formation of certain fullerane isomers.
In this paper, we investigated the electronic structure of some endohedral fullerenes containing rare earth nitride and the stability of their benzyne-adducts by PM7, the semiempirical Hatree-Fock method.
0.864477
0.751636
0.112841
2004.06257
Kitaev-Anderson spin liquid
The bond-disordered Kitaev model attracts much attention due to the experimental relevance in $\alpha$-RuCl$_3$ and $A_3$LiIr$_2$O$_6$ ($A=$ H, D, Ag, $\textit{etc.}$). Applying a magnetic field to break the time-reversal symmetry leads to a strong modulation in mass terms for Dirac cones. Because of the smallness of the flux gap of the Kitaev model, a small bond disorder can have large influence on itinerant Majorana fermions, and Majorana fermions will be in the Anderson localization state immediately. We call this immobile liquid state Kitaev-Anderson liquid state with two localized Majorana fermions, one frozen by gauge fluctuations and the other localized by disordered mass terms. The quantization of the thermal Hall conductivity $\kappa/T$ disappears by a quantum Hall transition induced by a small disorder, and $\kappa/T$ shows a rapid crossover into the Kitaev-Anderson liquid with a negligible Hall current. Especially, the critical disorder strength $\delta J_{c1} \sim 0.05$ in the unit of the Kitaev interaction would have many implications for the stability of Kitaev spin liquids.
Bond-dependent magnetic interactions can generate exotic topological states such as Kitaev and frustrated spin liquids. Experimentally determining the values of bond-dependent interactions in magnetic materials is a challenging but crucial problem. Here, I show that each symmetry-allowed nearest-neighbor interaction on triangular and honeycomb lattices has a distinct signature in paramagnetic neutron-diffraction data, and that such data actually contain sufficient information to determine the spin Hamiltonian unambiguously via unconstrained fits. Moreover, I show that bond-dependent interactions can often be extracted from powder-averaged data. These results facilitate experimental determination of the spin Hamiltonians of candidate topological materials.
0.848345
0.752102
0.096243
2004.06258
Propagation of terahertz waves in a dust acoustic wave
The propagation of terahertz waves in a dust acoustic wave is investigated numerically. By assuming a sinus profile of the dust number density in the dust acoustic waves, the transmission properties are calculated using finite difference time domain method. It shows that the dust acoustic wave can function similarly as a Bragg filter to block the terahertz waves of a certain wavelength. The bandwidth of the filter depends on the density profile of the dust acoustic wave.
In this paper we consider a mathematical model for photoacoustic imaging which takes into account attenuation due to thermodynamic dissipation. The propagation of acoustic (compressional) waves is governed by a scalar wave equation coupled to the heat equation for the excess temperature. We seek to recover the initial acoustic profile from knowledge of acoustic measurements at the boundary. We recognize that this inverse problem is a special case of boundary observability for a thermoelastic system. This leads to the use of control/observability tools to prove the unique and stable recovery of the initial acoustic profile in the weak thermoelastic coupling regime. This approach is constructive, yielding a solvable equation for the unknown acoustic profile. Moreover, the solution to this reconstruction equation can be approximated numerically using the conjugate gradient method. If certain geometrical conditions for the wave speed are satisfied, this approach is well--suited for variable media and for measurements on a subset of the boundary. We also present a numerical implementation of the proposed reconstruction algorithm.
0.939607
0.685635
0.253972
2004.06259
Deep Learning for Quantitative Susceptibility Mapping without Labels
Current deep learning (DL) techniques for quantitative susceptibility mapping (QSM) reconstruction demonstrated improved performance of QSM reconstruction compared with conventional non-DL methods. However, these end-to-end supervised DL techniques usually require a large amount of labeled training pairs and can be limited to the inherent difficulties of measuring `ground-truth' in QSM. In light of these, we presented an unsupervised DL method for QSM inversion denoted as uQSM. Without accessing to QSM labels, uQSM was trained to perform QSM reconstruction using the physical model. When evaluating multi-orientation QSM datasets, uQSM results have achieved higher levels of quantitative accuracy compared to TKD, TV-FANSI, and MEDI approaches. Additionally, uQSM can better preserve susceptibility anisotropy and microstructures in comparison with QSMnet and COSMOS. In addition, uQSM was evaluated on a large number of single-orientation QSM datasets. Visual assessment showed that uQSM outperformed conventional non-DL QSM reconstruction methods.
We propose a new framework called Noise2Blur (N2B) for training robust image denoising models without pre-collected paired noisy/clean images. The training of the model requires only some (or even one) noisy images, some random unpaired clean images, and noise-free but blurred labels obtained by predefined filtering of the noisy images. The N2B model consists of two parts: a denoising network and a noise extraction network. First, the noise extraction network learns to output a noise map using the noise information from the denoising network under the guidence of the blurred labels. Then, the noise map is added to a clean image to generate a new ``noisy/clean'' image pair. Using the new image pair, the denoising network learns to generate clean and high-quality images from noisy observations. These two networks are trained simultaneously and mutually aid each other to learn the mappings of noise to clean/blur. Experiments on several denoising tasks show that the denoising performance of N2B is close to that of other denoising CNNs trained with pre-collected paired data.
0.826445
0.723397
0.103048
2004.06260
Dynamics of a modified Leslie-Gower system with diffusion in heterogeneous environment
We investigate the dynamics of a diffusive Lotka-Volterra predator-prey system with modified Leslie-Gower and Holling type II functional response in spatially heterogeneous environment. First, we prove that the trivial steady state and one of two semi-trivial steady states are always linearly unstable, and the linear stability of the other semi-trivial steady state changes as the parameters vary. Second, when the semi-trivial steady state is not linearly unstable, we further obtain that it is globally asymptotically stable. The proof is based on the method of upper and lower solutions and the global dynamics of a competition-diffusion system. Finally, we establish the existence and the stability of a unique positive steady state, and the persistence of the two species under some suitable conditions.
Development of resistance limits transferability of most anticancer therapies into curative treatment and understanding mechanisms beyond it remains a big challenge. Many high resolution experimental observations show enormous intratumor heterogeneity at molecular, genetic and cellular levels which is made responsible for emerging resistance to therapy. Therefore, researchers search techniques to influence development of intratumor heterogeneity, which requires understanding its role within the context of integrative, logically consistent, framework, such as evolutionary theory. Although it is agreed that intratumor heterogeneity increases probability of the emergence of therapy resistant clones, more instructive role of its structure in the process of cancer dynamics and metastasis is needed. In the paper, intratumor heterogeneity is viewed as a product of two, in general stochastic, processes, evolutionary optimization and changing environment, respectively. In evolutionary theory, common risk-diversifying strategy displayed by isogenic populations in unpredictably changing environments is bet-hedging. We suggest, that the structure of intratumor heterogeneity is evolutionary trait evolving to maximize the clonal fitness in changing (or uncertain) environment and that its structure corresponds to bet-hedging strategy. We advocate our view by reviewing and combining important cancer relevant concepts.
0.831137
0.634726
0.196412
2004.06261
Room-temperature coherent control of implanted defect spins in silicon carbide
Recently, vacancy-related spin defects in silicon carbide (SiC) have been demonstrated to be potentially suitable for versatile quantum interface building and scalable quantum network construction. Significant efforts have been undertaken to identify spin systems in SiC and to extend their quantum capabilities using large-scale growth and advanced nanofabrication methods. Here we demonstrated a type of spin defect in the 4H polytype of SiC generated via hydrogen ion implantation with high-temperature post-annealing, which is different from any known defects. These spin defects can be optically addressed and coherently controlled even at room temperature, and their fluorescence spectrum and optically detected magnetic resonance spectra are different from those of any previously discovered defects. Moreover, the generation of these defects can be well controlled by optimizing the annealing temperature after implantation. These defects demonstrate high thermal stability with coherently controlled electron spins, facilitating their application in quantum sensing and masers under harsh conditions.
Silicon carbide is a promising platform for single photon sources, quantum bits (qubits) and nanoscale sensors based on individual color centers. Towards this goal, we develop a scalable array of nanopillars incorporating single silicon vacancy centers in 4H-SiC, readily available for efficient interfacing with free-space objective and lensed-fibers. A commercially obtained substrate is irradiated with 2 MeV electron beams to create vacancies. Subsequent lithographic process forms 800 nm tall nanopillars with 400-1,400 nm diameters. We obtain high collection efficiency, up to 22 kcounts/s optical saturation rates from a single silicon vacancy center, while preserving the single photon emission and the optically induced electron-spin polarization properties. Our study demonstrates silicon carbide as a readily available platform for scalable quantum photonics architecture relying on single photon sources and qubits.
0.896592
0.805451
0.091141
2004.06262
A Lightweight Solution of Industrial Computed Tomography with Convolutional Neural Network
As an advanced non-destructive testing and quality control technique, industrial computed tomography (ICT) has found many applications in smart manufacturing. The existing ICT devices are usually bulky and involve mass data processing and transmission. It results in a low efficiency and cannot keep pace with smart manufacturing. In this paper, with the support from Internet of things (IoT) and convolutional neural network (CNN), we proposed a lightweight solution of ICT devices for smart manufacturing. It consists of efforts from two aspects: distributed hardware allocation and data reduction. At the first aspect, ICT devices are separated into four functional units: data acquisition, cloud storage, computing center and control terminals. They are distributed and interconnected by IoT. Only the data acquisition unit still remains in the production lines. This distribution not only slims the ICT device, but also permits the share of the same functional units. At the second aspect, in the data acquisition unit, sparse sampling strategy is adopted to reduce the raw data and singular value decomposition (SVD) is used to compress these data. They are then transmitted to the cloud storage. At the computing center, an ICT image reconstruction algorithm and a CNN are applied to these compressed sparse sampling data to obtain high quality CT images. The experiments with practical ICT data have been executed to demonstrate the validity of the proposed solution. The results indicate that this solution can achieve a drastic data reduction, a storage space save and an efficiency improvement without significant image degradation. The presented work has been helpful to push the applications of ICT in smart manufacturing.
Neuro-inspired recurrent neural network algorithms, such as echo state networks, are computationally lightweight and thereby map well onto untethered devices. The baseline echo state network algorithms are shown to be efficient in solving small-scale spatio-temporal problems. However, they underperform for complex tasks that are characterized by multi-scale structures. In this research, an intrinsic plasticity-infused modular deep echo state network architecture is proposed to solve complex and multiple timescale temporal tasks. It outperforms state-of-the-art for time series prediction tasks.
0.870061
0.655807
0.214253
2004.06263
Coresets for Clustering in Euclidean Spaces: Importance Sampling is Nearly Optimal
Given a collection of $n$ points in $\mathbb{R}^d$, the goal of the $(k,z)$-clustering problem is to find a subset of $k$ "centers" that minimizes the sum of the $z$-th powers of the Euclidean distance of each point to the closest center. Special cases of the $(k,z)$-clustering problem include the $k$-median and $k$-means problems. Our main result is a unified two-stage importance sampling framework that constructs an $\varepsilon$-coreset for the $(k,z)$-clustering problem. Compared to the results for $(k,z)$-clustering in [Feldman and Langberg, STOC 2011], our framework saves a $\varepsilon^2 d$ factor in the coreset size. Compared to the results for $(k,z)$-clustering in [Sohler and Woodruff, FOCS 2018], our framework saves a $\operatorname{poly}(k)$ factor in the coreset size and avoids the $\exp(k/\varepsilon)$ term in the construction time. Specifically, our coreset for $k$-median ($z=1$) has size $\tilde{O}(\varepsilon^{-4} k)$ which, when compared to the result in [Sohler and Woodruff, STOC 2018], saves a $k$ factor in the coreset size. Our algorithmic results rely on a new dimensionality reduction technique that connects two well-known shape fitting problems: subspace approximation and clustering, and may be of independent interest. We also provide a size lower bound of $\Omega\left(k\cdot \min \left\{2^{z/20},d \right\}\right)$ for a $0.01$-coreset for $(k,z)$-clustering, which has a linear dependence of size on $k$ and an exponential dependence on $z$ that matches our algorithmic results.
We address the problem of sensing the curvature of a manifold by performing measurements on a particle constrained to the manifold itself. In particular, we consider situations where the dynamics of the particle is quantum mechanical and the manifold is a surface embedded in the three-dimensional Euclidean space. We exploit ideas and tools from quantum estimation theory to quantify the amount of information encoded into a state of the particle, and to seek for optimal probing schemes, able to actually extract this information. Explicit results are found for a free probing particle and in the presence of a magnetic field. We also address precision achievable by position measurement, and show that it provides a nearly optimal detection scheme, at least to estimate the radius of a sphere or a cylinder.
0.87471
0.631967
0.242742
2004.06264
Splitting properties of linear differential systems with small delays
We investigate singular perturbation problems caused by small delays in the view of pseudo-exponential dichotomy. For a general linear non-autonomous retarded differential equation with small delay, previous works established the existence of a pseudo-exponential dichotomy. The main objective of this paper is to give a detailed analysis of three splitting properties of this dichotomy. By obtaining serval new estimates and giving the explicit expressions of the bounds and the exponents associated with this dichotomy, we prove that as the delay tends to zero, the spectral gap approaches to infinity, and the angular distance and the separation index associated with this dichotomy are bounded from below by a positive constant which is independent of the delay.
We introduce and discuss Fr\'echet differentiability for maps between Fr\'echet spaces. For delay differential equations $x'(t)=f(x_t)$ we construct a continuous semiflow of continuously differentiable solution operators $x_0\mapsto x_t$, $t\ge0$, on submanifolds of the Fr\'echet space $C^1((-\infty,0],\mathbb{R}^n)$, and establish local invariant manifolds at stationary points by means of transversality and embedding properties. The results apply to examples with unbounded but locally bounded delay.
0.813145
0.729041
0.084105
2004.06265
On the Origin of an F-corona decrease revealed by the Parker Solar Probe
The first-year results from the Parker Solar Probe (PSP) reveal a gradual decrease of F-coronal dust from distances of $D=0.166-0.336$ AU (or the inner elongations of $\sim 9.22- 18.69~R_{\odot}$) to the Sun, which cannot be explained by the dust sublimation scenario that predicts a dust-free-zone $\lesssim 4-5R_{\odot}$. In this paper, we attempt to explain this puzzle using our newly introduced mechanism of dust destruction so-called Radiative Torque Disruption (RATD) mechanism. We demonstrate that RATD rapidly breaks large grains into nanoparticles so that they can be efficiently destroyed by nonthermal sputtering induced by bombardment of energetic protons from slow solar winds. This joint effect extends the dust-free-zone established by thermal sublimation to $R_{dfz}\sim 8R_{\odot}$, which is called a new dust-free-zone. Beyond this new dust-free-zone, we find that the dust mass decreases gradually from $R\sim 42R_{\odot}$ toward the Sun due to partial removal of nanodust by nonthermal sputtering. This feature can successfully reproduce the gradual decrease of the F-corona between $19-9R_{\odot}$ observed by the PSP. Finally, the RATD mechanism can efficiently produce nanoparticles usually observed in the inner solar system.
Small, impulsive jets commonly occur throughout the solar corona, but are especially visible in coronal holes. Evidence is mounting that jets are part of a continuum of eruptions that extends to much larger coronal mass ejections and eruptive flares. Because coronal-hole jets originate in relatively simple magnetic structures, they offer an ideal testbed for theories of energy buildup and release in the full range of solar eruptions. We analyzed an equatorial coronal-hole jet observed by SDO/AIA on 09 January 2014, in which the magnetic-field structure was consistent with the embedded-bipole topology that we identified and modeled previously as an origin of coronal jets. In addition, this event contained a mini-filament, which led to important insights into the energy storage and release mechanisms. SDO/HMI magnetograms revealed footpoint motions in the primary minority-polarity region at the eruption site, but show negligible flux emergence or cancellation for at least 16 hours before the eruption. Therefore, the free energy powering this jet probably came from magnetic shear concentrated at the polarity inversion line within the embedded bipole. We find that the observed activity sequence and its interpretation closely match the predictions of the breakout jet model, strongly supporting the hypothesis that the breakout model can explain solar eruptions on a wide range of scales.
0.805889
0.785793
0.020096
2004.06266
Evolution Features and Behavior Characters of Friendship Networks on Campus Life
Analyzing and mining students' behaviors and interactions from big data is an essential part of education data mining. Based on the data of campus smart cards, which include not only static demographic information but also dynamic behavioral data from more than 30000 anonymous students, in this paper, the evolution features of friendship and the relations between behavior characters and student interactions are investigated. On the one hand, four different evolving friendship networks are constructed by means of the friend ties proposed in this paper, which are extracted from monthly consumption records. In addition, the features of the giant connected components (GCCs) of friendship networks are analyzed via social network analysis (SNA) and percolation theory. On the other hand, two high-level behavior characters, orderliness and diligence, are adopted to analyze their associations with student interactions. Our experiment/empirical results indicate that the sizes of friendship networks have declined with time growth and both the small-world effect and power-law degree distribution are found in friendship networks. Second, the results of the assortativity coefficient of both orderliness and diligence verify that there are strong peer effects among students. Finally, the percolation analysis of orderliness on friendship networks shows that a phase transition exists, which is enlightening in that swarm intelligence can be realized by intervening the key students near the transition point.
We consider the criticality for firing structures of a simplified integrate-and-fire neural model on the regular network, small-world network, and random networks. We simplify an integrate-and-fire model suggested by Levina, Herrmann and Geisel (LHG). In our model we set up the synaptic strength as a constant value. We observed the power law behaviors of the probability distribution of the avalanche size and the life time of the avalanche. The critical exponents in the small-world network and the random network were the same as those in the fully connected network. However, in the regular one-dimensional ring, the model does not show the critical behaviors. In the simplified LHG model, the short-cuts are crucial role in the self-organized criticality. The simplified LHG model in three types of networks such as the fully connected network, the small-world network, and random network belong to the same universality class.
0.865046
0.6675
0.197546
2004.06267
RealMonoDepth: Self-Supervised Monocular Depth Estimation for General Scenes
We present a generalised self-supervised learning approach for monocular estimation of the real depth across scenes with diverse depth ranges from 1--100s of meters. Existing supervised methods for monocular depth estimation require accurate depth measurements for training. This limitation has led to the introduction of self-supervised methods that are trained on stereo image pairs with a fixed camera baseline to estimate disparity which is transformed to depth given known calibration. Self-supervised approaches have demonstrated impressive results but do not generalise to scenes with different depth ranges or camera baselines. In this paper, we introduce RealMonoDepth a self-supervised monocular depth estimation approach which learns to estimate the real scene depth for a diverse range of indoor and outdoor scenes. A novel loss function with respect to the true scene depth based on relative depth scaling and warping is proposed. This allows self-supervised training of a single network with multiple data sets for scenes with diverse depth ranges from both stereo pair and in the wild moving camera data sets. A comprehensive performance evaluation across five benchmark data sets demonstrates that RealMonoDepth provides a single trained network which generalises depth estimation across indoor and outdoor scenes, consistently outperforming previous self-supervised approaches.
We show how to train a fully convolutional neural network to perform inverse rendering from a single, uncontrolled image. The network takes an RGB image as input, regresses albedo and normal maps from which we compute lighting coefficients. Our network is trained using large uncontrolled image collections without ground truth. By incorporating a differentiable renderer, our network can learn from self-supervision. Since the problem is ill-posed we introduce additional supervision: 1. We learn a statistical natural illumination prior, 2. Our key insight is to perform offline multiview stereo (MVS) on images containing rich illumination variation. From the MVS pose and depth maps, we can cross project between overlapping views such that Siamese training can be used to ensure consistent estimation of photometric invariants. MVS depth also provides direct coarse supervision for normal map estimation. We believe this is the first attempt to use MVS supervision for learning inverse rendering.
0.91977
0.787394
0.132376
2004.06268
Materials Requirements of High-Speed and Low-Power Spin-Orbit-Torque Magnetic Random-Access Memory
As spin-orbit-torque magnetic random-access memory (SOT-MRAM) is gathering great interest as the next-generation low-power and high-speed on-chip cache memory applications, it is critical to analyze the magnetic tunnel junction (MTJ) properties needed to achieve sub-ns, and ~fJ write operation when integrated with CMOS access transistors. In this paper, a 2T-1MTJ cell-level modeling framework for in-plane type Y SOT-MRAM suggests that high spin Hall conductivity and moderate SOT material sheet resistance are preferred. We benchmark write energy and speed performances of type Y SOT cells based on various SOT materials experimentally reported in the literature, including heavy metals, topological insulators and semimetals. We then carry out detailed benchmarking of SOT material Pt, beta-W, and BixSe(1-x) with different thickness and resistivity. We further discuss how our 2T-1MTJ model can be expanded to analyze other variations of SOT-MRAM, including perpendicular (type Z) and type X SOT-MRAM, two-terminal SOT-MRAM, as well as spin-transfer-torque (STT) and voltage-controlled magnetic anisotropy (VCMA)-assisted SOT-MRAM. This work will provide essential guidelines for SOT-MRAM materials, devices, and circuits research in the future.
Despite the potential advantages of information storage in antiferromagnetically coupled materials, it remains unclear whether one can control the magnetic moment orientation efficiently because of the cancelled magnetic moment. Here, we report spin-orbit torque induced magnetization switching of ferrimagnetic Co1-xTbx films with perpendicular magnetic anisotropy. Current induced switching is demonstrated in all of the studied film compositions, including those near the magnetization compensation point. The spin-orbit torque induced effective field is further quantified in the domain wall motion regime. A divergent behavior that scales with the inverse of magnetic moment is confirmed close to the compensation point, which is consistent with angular momentum conservation. Moreover, we also quantify the Dzyaloshinskii-Moriya interaction energy in the Ta/Co1-xTbx system and we find that the energy density increases as a function of the Tb concentration. The demonstrated spin-orbit torque switching, in combination with the fast magnetic dynamics and minimal net magnetization of ferrimagnetic alloys, promises spintronic devices that are faster and with higher density than traditional ferromagnetic systems.
0.860087
0.775888
0.084199
2004.06269
Generalized principal eigenvalues of convex nonlinear elliptic operators in $\mathbb{R}^N$
We study the generalized eigenvalue problem in $\mathbb{R}^N$ for a general convex nonlinear elliptic operator which is locally elliptic and positively $1$-homogeneous. Generalizing article of Berestycki and Rossi in [Comm. Pure Appl. Math. 68 (2015), no. 6, 1014-1065] we consider three different notions of generalized eigenvalues and compare them. We also discuss the maximum principles and uniqueness of principal eigenfunctions.
We study the following nonlinear elliptic problem [-\Delta u =F^{'} (u) in {\mathbb R}^n] where $F(u)$ is a periodic function. Moser (1986) showed that for any minimal and nonself-intersecting solution, there exist $ \alpha \in {\mathbb R}^n$ and $ C>0$ such that [(*) | u- \alpha \cdot x | \leq C.] He also showed the existence of solutions with any prescribed $\alpha \in {\mathbb R}^n$. In this note, we first prove that any solution satisfying (*) with nonzero vector $\alpha$ must be one dimensional. Then we show that in ${\mathbb R}^2$, for any positive integer $d\geq 1$ there exists a solution with polynomial growth $|x|^d$.
0.935166
0.768599
0.166567
2004.06270
Pykat: Python package for modelling precision optical interferometers
\textsc{Pykat} is a Python package which extends the popular optical interferometer modelling software \textsc{Finesse}. It provides a more modern and efficient user interface for conducting complex numerical simulations, as well as enabling the use of Python's extensive scientific software ecosystem. In this paper we highlight the relationship between \textsc{Pykat} and \textsc{Finesse}, how it is used, and provide an illustrative example of how it has helped to better understand the characteristics of the current generation of gravitational wave interferometers.
There is an emerging trend of embedding knowledge graphs (KGs) in continuous vector spaces in order to use those for machine learning tasks. Recently, many knowledge graph embedding (KGE) models have been proposed that learn low dimensional representations while trying to maintain the structural properties of the KGs such as the similarity of nodes depending on their edges to other nodes. KGEs can be used to address tasks within KGs such as the prediction of novel links and the disambiguation of entities. They can also be used for downstream tasks like question answering and fact-checking. Overall, these tasks are relevant for the semantic web community. Despite their popularity, the reproducibility of KGE experiments and the transferability of proposed KGE models to research fields outside the machine learning community can be a major challenge. Therefore, we present the KEEN Universe, an ecosystem for knowledge graph embeddings that we have developed with a strong focus on reproducibility and transferability. The KEEN Universe currently consists of the Python packages PyKEEN (Python KnowlEdge EmbeddiNgs), BioKEEN (Biological KnowlEdge EmbeddiNgs), and the KEEN Model Zoo for sharing trained KGE models with the community.
0.877788
0.58345
0.294338
2004.06272
Bidirectional Graph Reasoning Network for Panoptic Segmentation
Recent researches on panoptic segmentation resort to a single end-to-end network to combine the tasks of instance segmentation and semantic segmentation. However, prior models only unified the two related tasks at the architectural level via a multi-branch scheme or revealed the underlying correlation between them by unidirectional feature fusion, which disregards the explicit semantic and co-occurrence relations among objects and background. Inspired by the fact that context information is critical to recognize and localize the objects, and inclusive object details are significant to parse the background scene, we thus investigate on explicitly modeling the correlations between object and background to achieve a holistic understanding of an image in the panoptic segmentation task. We introduce a Bidirectional Graph Reasoning Network (BGRNet), which incorporates graph structure into the conventional panoptic segmentation network to mine the intra-modular and intermodular relations within and between foreground things and background stuff classes. In particular, BGRNet first constructs image-specific graphs in both instance and semantic segmentation branches that enable flexible reasoning at the proposal level and class level, respectively. To establish the correlations between separate branches and fully leverage the complementary relations between things and stuff, we propose a Bidirectional Graph Connection Module to diffuse information across branches in a learnable fashion. Experimental results demonstrate the superiority of our BGRNet that achieves the new state-of-the-art performance on challenging COCO and ADE20K panoptic segmentation benchmarks.
Text segmentation plays an important role in various Natural Language Processing (NLP) tasks like summarization, context understanding, document indexing and document noise removal. Previous methods for this task require manual feature engineering, huge memory requirements and large execution times. To the best of our knowledge, this paper is the first one to present a novel supervised neural approach for text segmentation. Specifically, we propose an attention-based bidirectional LSTM model where sentence embeddings are learned using CNNs and the segments are predicted based on contextual information. This model can automatically handle variable sized context information. Compared to the existing competitive baselines, the proposed model shows a performance improvement of ~7% in WinDiff score on three benchmark datasets.
0.915996
0.688901
0.227095
2004.06273
Compaction Self-Assembly of Ultralow-Binder-Content Thermoplastic Composites Based on Lunar Soil Simulant
In a recent study, we developed ultralow-binder-content (UBC) structural materials based on lunar soil simulant and thermoset binders. In the current research, we investigated thermoplastic binders. Compared to thermosets, advanced thermoplastics could be more UV resistant, more durable, more robust, and recyclable. Our main technology is the compaction self-assembly (CSA). By using only ~4 wt% polyetherketoneketone (PEKK) binder, the thermoplastic-binder UBC composite was stronger than typical steel-reinforced concrete. The CSA operation was separate from the curing process. This study may provide an important in-situ resource utilization method for large-scale construction on Moon.
A new experimental set-up using a differential pressure transducer was developed, that enables the monitoring of volume changes in cyclic triaxial tests on unsaturated soils. Calibration tests were performed in order to analyze the performance of the set-up, especially in terms of loading frequencies. Based on calibration results, a low frequency of 0.05 Hz was adopted for the tests carried out on the unsaturated loess from northern France. Five water contents were considered in the tests. The obtained results have confirmed the efficiency of the new system for volume change monitoring under cyclic loading. The effect of water content on the cyclic behavior of loess was clearly evidenced. Finally, some suggestions were made to improve the accuracy of the system.
0.921128
0.649357
0.27177
2004.06274
Dissipation range of the energy spectrum in high Reynolds number turbulence
We seek to understand the kinetic energy spectrum in the dissipation range of fully developed turbulence. The data are obtained by direct numerical simulations (DNS) of forced Navier-Stokes equations in a periodic domain, for Taylor-scale Reynolds numbers up to $R_\lambda=650$, with excellent small-scale resolution of $k_{max}\eta \approx 6$ for all cases (and additionally at $R_\lambda=1300$ with $k_{max}\eta\approx3$), where $k_{max}$ is the maximum resolved wavenumber and $\eta$ is the Kolmogorov length scale. We find that, for a limited range of wavenumbers $k$ past the bottleneck in the range $0.1 \lesssim k\eta \lesssim0.5$, the spectra for all $R_\lambda$ display a universal stretched exponential behavior of the form $\exp(-k^{2/3})$, in rough accordance with recent theoretical predictions. The stretched exponential fit in the near dissipation range $1 \lesssim k\eta \lesssim 4$ does not possess a unique exponent, which decreases with increasing $R_\lambda$. This region can be regarded as a crossover between the stretched exponential behavior and the far dissipation range $k\eta > 6$, in which analytical arguments as well as DNS data with superfine resolution (S. Khurshid et al., Phys.~Rev.~Fluids 3, 082601, 2018) suggest a $\exp(-k)$ dependence. We remark on the connection to the multifractal model which hypothesizes a pseudo-algebraic law.
A scaling relation for the high frequency regime of streamwise energy spectra (in frequency domain) in the near-wall region is proposed. This is based on the dimensional analysis approach of \cite{perry1977} and \cite{Zamalloa2014} together with the hypothesis that the small-scale fluctuations in the near-wall region should only depend on the viscous scales, analogous to the Prandtl's law-of-the-wall for the mean flow. This allows us to examine the lower bound for the high frequency regime where law-of-the-wall in spectra would hold. Observations in high-Reynolds-number turbulent boundary layer data indicate that a conservative estimate for the start of this high frequency regime is $f^+$ = 0.005 (which corresponds to 200 viscous time-units) across a range of wall-normal positions and Reynolds numbers. This is sufficient to capture the energetic viscous-scaled motions such as the near-wall streaks, which has a time scale of approximately 100 viscous units. This scaling relation and the spectral collapse is consistent with the observations in internal flows at lower Reynolds numbers \cite{Zamalloa2014}.
0.883844
0.852125
0.031719
2004.06275
An interface/boundary-unfitted eXtended HDG method for linear elasticity problems
An interface/boundary-unfitted eXtended hybridizable discontinuous Galerkin (X-HDG) method of arbitrary order is proposed for linear elasticity interface problems on unfitted meshes with respect to the interface and domain boundary. The method uses piecewise polynomials of degrees $k\ (>= 1)$ and $k-1$ respectively for the displacement and stress approximations in the interior of elements inside the subdomains separated by the interface, and piecewise polynomials of degree $k$ for the numerical traces of the displacement on the inter-element boundaries inside the subdomains and on the interface/boundary of the domain. Optimal error estimates in $L^2$-norm for the stress and displacement are derived, which are uniform with respect to the Lam\'e constant $\lambda$. Finally, numerical experiments confirm the theoretical results and show that the method also applies to the case of crack-tip domain.
In this paper, we propose a hybridized discontinuous Galerkin(HDG) method with reduced stabilization for the Poisson equation. The reduce stabilization proposed here enables us to use piecewise polynomials of degree $k$ and $k-1$ for the approximations of element and inter-element unknowns, respectively, unlike the standard HDG methods. We provide the error estimates in the energy and $L^2$ norms under the chunkiness condition. In the case of $k=1$, it can be shown that the proposed method is closely related to the Crouzeix-Raviart nonconforming finite element method. Numerical results are presented to verify the validity of the proposed method.
0.874482
0.792171
0.08231
2004.06276
Quantum Black Hole Seismology II: Applications to Astrophysical Black Holes
With the advent of gravitational wave astronomy, searching for gravitational wave echoes from black holes (BHs) is becoming an interesting probe of their quantum nature near their horizons. Newborn BHs may be strong emitters of echoes, as they accompany large perturbations in the surrounding spacetime upon formation. Utilizing the Quantum Black Hole Seismology framework (Oshita et al. 2020), we study the expected echoes upon BH formation resulting from neutron star mergers and failed supernovae. For BH remnants from neutron star mergers, we evaluate the consistency of these models with the recent claim on the existence of echoes following the neutron star merger event GW170817. We find that the claimed echoes in GW170817, if real, suggest that overtones contribute a significant amount of energy in the ringdown of the remnant BH. We finally discuss the detectability of echoes from failed supernovae by second and third-generation gravitational wave detectors, and find that current (future) detectors constrain physical reflectivity models for events occurring within a few Mpc (a few x 10 Mpc). Detecting such echo signals may significantly constrain the maximum mass and equation of state of neutron stars.
Assuming that general relativity is the correct theory of gravity in the strong field limit, can gravitational wave observations distinguish between black hole and other compact object sources? Alternatively, can gravitational wave observations provide a test of one of the fundamental predictions of general relativity? Here we describe a definitive test of the hypothesis that observations of damped, sinusoidal gravitational waves originated from a black hole or, alternatively, that nature respects the general relativistic no-hair theorem. For astrophysical black holes, which have a negligible charge-to-mass ratio, the black hole quasi-normal mode spectrum is characterized entirely by the black hole mass and angular momentum and is unique to black holes. In a different theory of gravity, or if the observed radiation arises from a different source (e.g., a neutron star, strange matter or boson star), the spectrum will be inconsistent with that predicted for general relativistic black holes. We give a statistical characterization of the consistency between the noisy observation and the theoretical predictions of general relativity, together with a numerical example.
0.835359
0.757718
0.077642
2004.06277
A Demonstration of Issues with Value-Based Multiobjective Reinforcement Learning Under Stochastic State Transitions
We report a previously unidentified issue with model-free, value-based approaches to multiobjective reinforcement learning in the context of environments with stochastic state transitions. An example multiobjective Markov Decision Process (MOMDP) is used to demonstrate that under such conditions these approaches may be unable to discover the policy which maximises the Scalarised Expected Return, and in fact may converge to a Pareto-dominated solution. We discuss several alternative methods which may be more suitable for maximising SER in MOMDPs with stochastic transitions.
Deep reinforcement learning has over the past few years shown great potential in learning near-optimal control in complex simulated environments with little visible information. Rainbow (Q-Learning) and PPO (Policy Optimisation) have shown outstanding performance in a variety of tasks, including Atari 2600, MuJoCo, and Roboschool test suite. While these algorithms are fundamentally different, both suffer from high variance, low sample efficiency, and hyperparameter sensitivity that in practice, make these algorithms a no-go for critical operations in the industry. On the other hand, model-based reinforcement learning focuses on learning the transition dynamics between states in an environment. If these environment dynamics are adequately learned, a model-based approach is perhaps the most sample efficient method for learning agents to act in an environment optimally. The traits of model-based reinforcement are ideal for real-world environments where sampling is slow and for mission-critical operations. In the warehouse industry, there is an increasing motivation to minimise time and to maximise production. Currently, autonomous agents act suboptimally using handcrafted policies for significant portions of the state-space. In this paper, we present The Dreaming Variational Autoencoder v2 (DVAE-2), a model-based reinforcement learning algorithm that increases sample efficiency, hence enable algorithms with low sample efficiency function better in real-world environments. We introduce Deep Warehouse, a simulated environment for industry-near testing of autonomous agents in grid-based warehouses. Finally, we illustrate that DVAE-2 improves the sample efficiency for the Deep Warehouse compared to model-free methods.
0.93222
0.756428
0.175793
2004.06278
Squares: A Fast Counter-Based RNG
In this article, we present a new counter-based random number generator (RNG) based on John von Neumann's middle square. We've discovered that only three rounds of squaring are sufficient to provide satisfactory random data. This appears to be one of the fastest counter-based RNGs.
New scintillation counters have been designed and constructed for the CDF upgrade in order to complete the muon coverage of the central CDF detector, and to extend this coverage to larger pseudorapidity. A novel light collection technique using wavelength shifting fibers, together with high quality polystyrene-based scintillator resulted in compact counters with good and stable light collection efficiency over lengths extending up to 320 cm. Their design and construction is described and results of their initial performance are reported.
0.863073
0.626128
0.236945
2004.06279
Theory of wavepacket transport under narrow gaps and spatial textures: non-adiabaticity and semiclassicality
We generalise the celebrated semiclassical wavepacket approach from the adiabatic to the non-adiabatic regime. A unified description covering both of these regimes is particularly desired for systems with spatially varying band structures where band gaps of various sizes are simultaneously present, e.g. in moir\'{e} patterns. For a single wavepacket, alternative to the previous derivation by Lagrangian variational approach, we show that the same semiclassical equations of motion can be obtained by introducing a spatial-texture-induced force operator similar to the Ehrenfest theorem. For semiclassically computing the current, the ensemble of wavepackets based on adiabatic dynamics is shown to well correspond to a phase-space fluid for which the fluid's mass and velocity are two distinguishable properties. This distinction is not inherited to the ensemble of wavepackets with the non-adiabatic dynamics. We extend the adiabatic kinetic theory to the non-adiabatic regime by taking into account decoherence, whose joint action with electric field favours certain form of inter-band coherence. The steady-state density matrix as a function of the phase-space variables is then phenomenologically obtained for calculating the transport current. The result, applicable with a finite electric field, expectedly reproduces the known adiabatic limit by taking the electric field to be infinitesimal, and therefore attains a unified description from the adiabatic to the non-adiabatic situations.
The laser control of photodissociation branching in a diatomic molecule is demonstrated to be effectively achieved with use of the complete reflection phenomenon. The phenomenon and the control condition can be nicely formulated by the semiclassical (Zhu-Nakamura) theory. The method is applied to the branching between I($^2 P_{3/2}$) (HI $\to$ H + I) and I$^*(^2 P_{1/2})$ (HI $\to$ H + I$^*$) formation, and nearly complete control is shown to be possible by appropriately choosing an initial vibrational state and laser frequency in spite of the fact that there are three electronically excited states involved. Numerical calculations of the corresponding wavepacket dynamics confirm the results.
0.905666
0.740199
0.165468
2004.06280
An Analysis of Python's Topics, Trends, and Technologies Through Mining Stack Overflow Discussions
Python is a popular, widely used, and general-purpose programming language. In spite of its ever-growing community, researchers have not performed much analysis on Python's topics, trends, and technologies which provides insights for developers about Python community trends and main issues. In this article, we examine the main topics related to this language being discussed by developers on one of the most popular Q\&A websites, Stack Overflow, as well as temporal trends through mining 2461876 posts. To be more useful for the software engineers, we study what Python provides as the alternative to popular technologies offered by common programming languages like Java. Our results indicate that discussions about Python standard features, web programming, and scientific programming. Programming in areas such as mathematics, data science, statistics, machine learning, natural language processing (NLP), and so forth. are the most popular areas in the Python community. At the same time, areas related to scientific programming are steadily receiving more attention from the Python developers.
Among the vast information available on the web, social media streams capture what people currently pay attention to and how they feel about certain topics. Awareness of such trending topics plays a crucial role in multimedia systems such as trend aware recommendation and automatic vocabulary selection for video concept detection systems. Correctly utilizing trending topics requires a better understanding of their various characteristics in different social media streams. To this end, we present the first comprehensive study across three major online and social media streams, Twitter, Google, and Wikipedia, covering thousands of trending topics during an observation period of an entire year. Our results indicate that depending on one's requirements one does not necessarily have to turn to Twitter for information about current events and that some media streams strongly emphasize content of specific categories. As our second key contribution, we further present a novel approach for the challenging task of forecasting the life cycle of trending topics in the very moment they emerge. Our fully automated approach is based on a nearest neighbor forecasting technique exploiting our assumption that semantically similar topics exhibit similar behavior. We demonstrate on a large-scale dataset of Wikipedia page view statistics that forecasts by the proposed approach are about 9-48k views closer to the actual viewing statistics compared to baseline methods and achieve a mean average percentage error of 45-19% for time periods of up to 14 days.
0.854552
0.694331
0.160221
2004.06281
xQSM-Quantitative Susceptibility Mapping with Octave Convolutional Neural Networks
Quantitative susceptibility mapping (QSM) is a valuable magnetic resonance imaging (MRI) contrast mechanism that has demonstrated broad clinical applications. However, the image reconstruction of QSM is challenging due to its ill-posed dipole inversion process. In this study, a new deep learning method for QSM reconstruction, namely xQSM, was designed by introducing modified state-of-the-art octave convolutional layers into the U-net backbone. The xQSM method was compared with recently-proposed U-net-based and conventional regularization-based methods, using peak signal to noise ratio (PSNR), structural similarity (SSIM), and region-of-interest measurements. The results from a numerical phantom, a simulated human brain, four in vivo healthy human subjects, a multiple sclerosis patient, a glioblastoma patient, as well as a healthy mouse brain showed that the xQSM led to suppressed artifacts than the conventional methods, and enhanced susceptibility contrast, particularly in the iron-rich deep grey matter region, than the original U-net, consistently. The xQSM method also substantially shortened the reconstruction time from minutes using conventional iterative methods to only a few seconds.
We propose a new encoder-decoder approach to learn distributed sentence representations that are applicable to multiple purposes. The model is learned by using a convolutional neural network as an encoder to map an input sentence into a continuous vector, and using a long short-term memory recurrent neural network as a decoder. Several tasks are considered, including sentence reconstruction and future sentence prediction. Further, a hierarchical encoder-decoder model is proposed to encode a sentence to predict multiple future sentences. By training our models on a large collection of novels, we obtain a highly generic convolutional sentence encoder that performs well in practice. Experimental results on several benchmark datasets, and across a broad range of applications, demonstrate the superiority of the proposed model over competing methods.
0.874988
0.641033
0.233956
2004.06282
Fusion Structure from Exchange Symmetry in (2+1)-Dimensions
While the principles behind the exotic statistical behaviour of anyons are well-documented in the literature, a similar treatment for the origins of their fusion structure is often neglected. In this paper, we seek to clarify the matter. By considering the action of braiding on quasiparticles in two spatial dimensions, we describe the fusion structure amongst the superselection sectors of the system. Exchange symmetry is formulated in terms of the motion group and we recover the boson-fermion superselection rule in three spatial dimensions. We then adapt our formulation of exchange symmetry for the two-dimensonal case. Given a system of $n$ quasiparticles, we see that the action of a specific $n$-braid $\beta_{n}$ uniquely specifies its superselection sectors. We prove several braid identities for $\beta_{n}$ that allow us to recover the fusion structure of anyons. Finally, we give an overview of the braiding and fusion structure of quasiparticles in the usual setting of braided $6j$ fusion systems and observe some $R$-matrix identities that follow from the action of $\beta_{n}$. These identities give an ansatz for the form of the monodromy operator which agrees with the ribbon property.
We classify tensors with maximal and next to maximal dimensional symmetry groups under a natural genericity assumption (1-genericity), in dimensions greater than 13. In other words, we classify minimal dimensional orbits in the space of (m,m,m) tensors assuming 1-genericity. Our study uncovers new tensors with striking geometry. This paper was motivated by Strassen's laser method for bounding the exponent of matrix multiplication. The best known tensor for the laser method is the large Coppersmith-Winograd tensor, and our study began with the observation that it has a large symmetry group, of dimension m^2/2 +m/2. We show that in odd dimensions, this is the largest possible for a 1-generic tensor, but in even dimensions we exhibit a tensor with a larger dimensional symmetry group. In the course of the proof, we classify nondegenerate bilinear forms with large dimensional stabilizers, which may be of interest in its own right.
0.830758
0.763278
0.06748
2004.06283
Non-Hermitian Floquet second order topological insulators in periodically quenched lattices
Higher-order topological phases are characterized by protected states localized at the corners or hinges of the system. By applying time-periodic quenches to a two-dimensional lattice with balanced gain and loss, we obtain a rich variety of non-Hermitian Floquet second order topological insulating phases. Each of the phases is characterized by a pair of integer topological invariants, which predict the numbers of Floquet corner modes at zero and $\pi$ quasienergies. We establish the topological phase diagram of the model, and find a series of non-Hermiticity induced transitions between different Floquet second order topological phases. We further generalize the mean chiral displacement to two-dimensional non-Hermitian systems, and use it to extract the topological invariants of our model dynamically. This work thus extend the study of higher-order topological matter to more generic nonequilibrium settings, in which the interplay between Floquet engineering and non-Hermiticity yields fascinating new phases.
We propose a route towards creating a metamaterial that behaves as a photonic Chern insulator, through homogenization of an array of gyromagnetic cylinders. We show that such an array can exhibit non-trivial topological effects, including topologically non-trivial band gaps and one-way edge states, when it can be homogenized to an effective medium model that has the Berry curvature strongly peaked at the wavevector k=0. The non-trivial band topology depends only on the parameters of the cylinders and the cylinders' density, and can be realized in a wide variety of different lattices including periodic, quasi-periodic and random lattices. Our system provides a platform to explore the interplay between disorder and topology and also opens a route towards synthesis of topological meta-materials based on the self-assembly approach.
0.928366
0.832626
0.095739
2004.06284
Wireless Information and Power Transfer for IoT Applications in Overlay Cognitive Radio Networks
This paper proposes and investigates an overlay spectrum sharing system in conjunction with the simultaneous wireless information and power transfer (SWIPT) to enable communications for the Internet of Things (IoT) applications. Considered is a cooperative cognitive radio network, where two IoT devices (IoDs) exchange their information and also provide relay assistance to a pair of primary users (PUs). Different from most existing works, in this paper, both IoDs can harvest energy from the radio-frequency (RF) signals received from the PUs. By utilizing the harvested energy, they provide relay cooperation to PUs and realize their own communications. For harvesting energy, a time-switching (TS) based approach is adopted at both IoDs. With the proposed scheme, one round of bidirectional information exchange for both primary and IoT systems is performed in four phases, i.e., one energy harvesting (EH) phase and three information processing (IP) phases. Both IoDs rely on the decode-and-forward operation to facilitate relaying, whereas the PUs employ selection combining (SC) technique. For investigating the performance of the considered network, this paper first provides exact expressions of user outage probability (OP) for the primary and IoT systems under Nakagami-m fading. Then, by utilizing the expressions of user OP, the system throughput and energy efficiency are quantified together with the average end-to-end transmission time. Numerical and simulation results are provided to give useful insights into the system behavior and to highlight the impact of various system/channel parameters.
A systematic design of adaptive waveform for Wireless Power Transfer (WPT) has recently been proposed and shown through simulations to lead to significant performance benefits compared to traditional non-adaptive and heuristic waveforms. In this study, we design the first prototype of a closed-loop wireless power transfer system with adaptive waveform optimization based on Channel State Information acquisition. The prototype consists of three important blocks, namely the channel estimator, the waveform optimizer, and the energy harvester. Software Defined Radio (SDR) prototyping tools are used to implement a wireless power transmitter and a channel estimator, and a voltage doubler rectenna is designed to work as an energy harvester. A channel adaptive waveform with 8 sinewaves is shown through experiments to improve the average harvested DC power at the rectenna output by 9.8% to 36.8% over a non-adaptive design with the same number of sinewaves.
0.890874
0.748789
0.142085
2004.06285
Further results on the rainbow vertex-disconnection of graphs
Let $G$ be a nontrivial connected and vertex-colored graph. A subset $X$ of the vertex set of $G$ is called rainbow if any two vertices in $X$ have distinct colors. The graph $G$ is called \emph{rainbow vertex-disconnected} if for any two vertices $x$ and $y$ of $G$, there exists a vertex subset $S$ such that when $x$ and $y$ are nonadjacent, $S$ is rainbow and $x$ and $y$ belong to different components of $G-S$; whereas when $x$ and $y$ are adjacent, $S+x$ or $S+y$ is rainbow and $x$ and $y$ belong to different components of $(G-xy)-S$. Such a vertex subset $S$ is called a \emph{rainbow vertex-cut} of $G$. For a connected graph $G$, the \emph{rainbow vertex-disconnection number} of $G$, denoted by $rvd(G)$, is the minimum number of colors that are needed to make $G$ rainbow vertex-disconnected. In this paper, we obtain the bounds of rainbow vertex-disconnection number of a graph in terms of the minimum degree and maximum degree of the graph. We characterize the graphs of order $n$ with rainbow vertex-disconnection number $n-1$ and obtain the maximum size of graph $G$ with $rvd(G)=n-1$. Moreover, we get the sharp threshold function for the property $rvd(G(n,p))=n$ and prove that almost all graphs $G$ have $rvd(G)=rvd(\overline{G})=n$. Finally, we obtain some Nordhaus-Gaddum-type results $n-5\leq rvd(G)+rvd(\overline{G})\leq 2n$ and $n-1\leq rvd(G)\cdot rvd(\overline{G})\leq n^2$ for the rainbow vertex-disconnection numbers of nontrivial connected graphs $G$ and $\overline{G}$ with order $n\geq 24$.
Considering a natural generalization of the Ruzsa-Szemer\'edi problem, we prove that for any fixed positive integers $r,s$ with $r<s$, there are graphs on $n$ vertices containing $n^{r}e^{-O(\sqrt{\log{n}})}=n^{r-o(1)}$ copies of $K_s$ such that any $K_r$ is contained in at most one $K_s$. We also give bounds for the generalized rainbow Tur\'an problem $\operatorname{ex}(n, H,$rainbow-$F)$ when $F$ is complete. In particular, we answer a question of Gerbner, M\'esz\'aros, Methuku and Palmer, showing that there are properly edge-coloured graphs on $n$ vertices with $n^{r-1-o(1)}$ copies of $K_r$ such that no $K_r$ is rainbow.
0.886383
0.792808
0.093576
2004.06286
Transfer Learning for EEG-Based Brain-Computer Interfaces: A Review of Progresses Since 2016
A brain-computer interface (BCI) enables a user to communicate directly with a computer using the brain signals. Electroencephalogram (EEG) is the most frequently used input signal in BCIs. However, EEG signals are weak, easily contaminated by interferences and noise, non-stationary for the same subject, and varying among different subjects. So, it is difficult to build a generic pattern recognition model in an EEG-based BCI system that is optimal for different subjects, in different sessions, for different devices and tasks. Usually a calibration session is needed to collect some subject-specific data for a new subject, which is time-consuming and user-unfriendly. Transfer learning (TL), which can utilize data or knowledge from similar or relevant subjects/sessions/devices/tasks to facilitate the learning for a new subject/session/device/task, is frequently used to alleviate this calibration requirement. This paper reviews journal publications on TL approaches in EEG-based BCIs in the last few years, i.e., since 2016. Six paradigms and applications -- motor imagery (MI), event related potentials (ERP), steady-state visual evoked potentials (SSVEP), affective BCIs (aBCI), regression problems, and adversarial attacks -- are considered. For each paradigm/application, we group the TL approaches into cross-subject/session, cross-device, and cross-task settings and review them separately. Observations and conclusions are made at the end of the paper, which may point to future research directions.
At present, artificial intelligence in the form of machine learning is making impressive progress, especially the field of deep learning (DL) [1]. Deep learning algorithms have been inspired from the beginning by nature, specifically by the human brain, in spite of our incomplete knowledge about its brain function. Learning from nature is a two-way process as discussed in [2][3][4], computing is learning from neuroscience, while neuroscience is quickly adopting information processing models. The question is, what can the inspiration from computational nature at this stage of the development contribute to deep learning and how much models and experiments in machine learning can motivate, justify and lead research in neuroscience and cognitive science and to practical applications of artificial intelligence.
0.888269
0.661674
0.226595
2004.06287
Development of ultra-pure NaI(Tl) detector for COSINE-200 experiment
The annual modulation signal observed by the DAMA experiment is a long standing question in the community of dark matter direct detection. This necessitates an independent verification for its origin using the same detection technique. The COSINE-100 experiment has been operating with 106~kg of low-background NaI(Tl) detectors providing interesting checks for the DAMA signal. However, due to higher background in the NaI(Tl) crystals used in COSINE-100 relative to those used for DAMA, it was difficult to reach final conclusions. Since the start of COSINE-100 data taking in 2016, we also have initiated a program to develop ultra-pure NaI(Tl) crystals for COSINE-200, the next phase of the experiment. The program includes efforts of raw powder purification, ultra-pure NaI(Tl) crystal growth, and detector assembly. With extensive research and development of NaI(Tl) crystal growth, we have successfully grown a few Tl-doped crystals with high radio-purity. A high light yield has been achieved with our detector assembly technique. Here we report the ultra-pure NaI(Tl) detector developments at the Institute for Basic Science, Korea. The technique developed here will be applied to the production of ultra-pure NaI(Tl) detectors for the COSINE-200 experiment.
At present the results in the field of direct dark matter search are in tension: the positive claim of DAMA/LIBRA versus null results from other experiments. However, the comparison of the results of different experiments involves model dependencies, in particular because of the different target materials in use. The COSINUS R&D project aims to operate NaI as a cryogenic calorimeter. Such a detector would not only allow for a direct comparison to DAMA/LIBRA, but would also provide a low(er) nuclear recoil threshold and particle discrimination.
0.868305
0.771384
0.096921
2004.06288
Towards Robust Classification with Image Quality Assessment
Recent studies have shown that deep convolutional neural networks (DCNN) are vulnerable to adversarial examples and sensitive to perceptual quality as well as the acquisition condition of images. These findings raise a big concern for the adoption of DCNN-based applications for critical tasks. In the literature, various defense strategies have been introduced to increase the robustness of DCNN, including re-training an entire model with benign noise injection, adversarial examples, or adding extra layers. In this paper, we investigate the connection between adversarial manipulation and image quality, subsequently propose a protective mechanism that doesnt require re-training a DCNN. Our method combines image quality assessment with knowledge distillation to detect input images that would trigger a DCCN to produce egregiously wrong results. Using the ResNet model trained on ImageNet as an example, we demonstrate that the detector can effectively identify poor quality and adversarial images.
Purpose: The aim of this phantom study was to evaluate the influence of patient alignment on the image quality by a C-arm flat-panel detector computer tomography (CACT). Materials and Methods: An ACR phantom placed in two opposite directions along the z-Axis was imaged using a CACT. Image acquisition was performed by three different image acquisition protocols using fixed X-ray tube voltages of 81, 102 and 125 kVp. The images were reconstructed with four different convolution kernels, i.e. normal, sharp, soft and very soft. Image quality was assessed in terms of high contrast image quality using the modulation transfer function (MTF) and low contrast image quality by assessing the signal-to-noise ratio (SNR) and contrast-to-noise ratios (CNR) as well as reliability of density measurements. Furthermore, the dose intensity profiles parallel and perpendicular to the patient support were measured free-in-air. Results: The intensity profile of the CACT measured by the detector system free-in-air showed that the anode heel effect is not in the longitudinal direction to the z-axis. The image noises measured in Setup A for the air and bone inserts were systematically higher compared to those measured in Setup B, in average about 3% and 4% for the air and bone inserts, respectively. An opposite behavior has been observed for the polyethylene, water-equivalent and acrylic inserts. The corresponding image noises were in average about 4%, 6% and 2% lower measured in Setup A compared to those measured in Setup B. SNR for all inserts behaves inversely to the image noise. Conclusion: The patient alignment has a minor influence on the image quality of CACT. This effect is not based on the X-ray anode heel effect. It is caused mainly. This effect is caused mainly by the non-symmetrical rotation of the CACT.
0.751663
0.625055
0.126607
2004.06289
On Vickrey's Income Averaging
We consider a small set of axioms for income averaging -- recursivity, continuity, and the boundary condition for the present. These properties yield a unique averaging function that is the density of the reflected Brownian motion with a drift started at the current income and moving over the past incomes. When averaging is done over the short past, the weighting function is asymptotically converging to a Gaussian. When averaging is done over the long horizon, the weighing function converges to the exponential distribution. For all intermediate averaging scales, we derive an explicit solution that interpolates between the two.
Historical studies of labor markets frequently lack data on individual income. The occupational income score (OCCSCORE) is often used as an alternative measure of labor market outcomes. We consider the consequences of using OCCSCORE when researchers are interested in earnings regressions. We estimate race and gender earnings gaps in modern decennial Censuses as well as the 1915 Iowa State Census. Using OCCSCORE biases results towards zero and can result in estimated gaps of the wrong sign. We use a machine learning approach to construct a new adjusted score based on industry, occupation, and demographics. The new income score provides estimates closer to earnings regressions. Lastly, we consider the consequences for estimates of intergenerational mobility elasticities.
0.843039
0.709834
0.133205
2004.06290
A global nonhydrostatic dynamical core on cubed sphere using multi-moment finite volume method: formulation and preliminary test
A nonhydrostatic dynamical core has been developed by using the multi-moment finite volume method that ensures the rigorous numerical conservation. To represent the spherical geometry free of polar problems, the cubed-sphere grid is adopted. A fourth-order multi-moment discretization formulation is applied to the nonhydrostatic governing equations cast in local curvilinear coordinates on each patch of cubed sphere through a gnomonic projection. In vertical direction, the height-based terrain-following grid is used to represent the topography. To get around the CFL stability restriction imposed by relatively small grid spacing in the vertical direction, the dimensional-splitting time integration using the HEVI (Horizontal Explicit and Vertical Implicit) strategy is implemented by applying the IMEX Runge-Kutta scheme. The proposed dynamical core preserves the fourth-order accuracy in spherical geometry and has been verified by the widely-used benchmark tests. The results of our numerical experiments show that the present numerical core has superior solution quality and great practical potential as a platform for atmospheric models. A new unified model for numerical weather prediction and global atmospheric circulation simulation based on this dynamical core is under development.
Among the algorithms that are likely to play a major role in future exascale computing, the fast multipole method (FMM) appears as a rising star. Our previous recent work showed scaling of an FMM on GPU clusters, with problem sizes in the order of billions of unknowns. That work led to an extremely parallel FMM, scaling to thousands of GPUs or tens of thousands of CPUs. This paper reports on a a campaign of performance tuning and scalability studies using multi-core CPUs, on the Kraken supercomputer. All kernels in the FMM were parallelized using OpenMP, and a test using 10^7 particles randomly distributed in a cube showed 78% efficiency on 8 threads. Tuning of the particle-to-particle kernel using SIMD instructions resulted in 4x speed-up of the overall algorithm on single-core tests with 10^3 - 10^7 particles. Parallel scalability was studied in both strong and weak scaling. The strong scaling test used 10^8 particles and resulted in 93% parallel efficiency on 2048 processes for the non-SIMD code and 54% for the SIMD-optimized code (which was still 2x faster). The weak scaling test used 10^6 particles per process, and resulted in 72% efficiency on 32,768 processes, with the largest calculation taking about 40 seconds to evaluate more than 32 billion unknowns. This work builds up evidence for our view that FMM is poised to play a leading role in exascale computing, and we end the paper with a discussion of the features that make it a particularly favorable algorithm for the emerging heterogeneous and massively parallel architectural landscape.
0.869602
0.691209
0.178393
2004.06291
Modeling, state estimation, and optimal control for the US COVID-19 outbreak
The novel coronavirus SARS-CoV-2 and resulting COVID-19 disease have had an unprecedented spread and continue to cause a increasing number of fatalities worldwide. While vaccines are still under development, social distancing, extensive testing, and quarantine of confirmed infected subjects remain the most effective measures to contain the pandemic. These measures carry a significant socioeconomic cost. In this work, we introduce a novel optimization-based decision-making framework for managing the COVID-19 outbreak in the US. This includes modeling the dynamics of affected populations, estimating the model parameters and hidden states from data, and an optimal control strategy for sequencing social distancing and testing events such that the number of infections is minimized. The analysis of our extensive computational efforts reveals that social distancing and quarantining are most effective when implemented early, with quarantining of confirmed infected subjects having a much higher impact. Further, we find that "on-off" policies alternating between strict social distancing and relaxing such restrictions can be effective at "flattening" the curve while likely minimizing social and economic cost.
A proactive approach to raise awareness while preventing misinformation is a modern-day challenge in all domains including healthcare. Such awareness and sensitization approaches to prevention and containment are important components of a strong healthcare system, especially in the times of outbreaks such as the ongoing Covid-19 pandemic. However, there is a fine balance between continuous awareness-raising by providing new information and the risk of misinformation. In this work, we address this gap by creating a life-long learning application that delivers authentic information to users in Hindi, the most widely used local language in India. It does this by matching sources of verified and authentic information such as the WHO reports against daily news by using machine learning and natural language processing. It delivers the narrated content in Hindi by using state-of-the-art text to speech engines. Finally, the approach allows user input for continuous improvement of news feed relevance on a daily basis. We demonstrate a focused application of this approach for Water, Sanitation, Hygiene as it is critical in the containment of the currently raging Covid-19 pandemic through the WashKaro android application. Thirteen combinations of pre-processing strategies, word-embeddings, and similarity metrics were evaluated by eight human users via calculation of agreement statistics. The best performing combination achieved a Cohen's Kappa of 0.54 and was deployed in the WashKaro application back-end. Interventional studies for evaluating the effectiveness of the WashKaro application for preventing WASH-related diseases are planned to be carried out in the Mohalla clinics that provided 3.5 Million consults in 2019 in Delhi, India. Additionally, the application also features human-curated and vetted information to reach out to the community as audio-visual content in local languages.
0.859574
0.704403
0.155171
2004.06292
Gelato: Feedback-driven and Guided Security Analysis of Client-side Web Applications
Even though a lot of effort has been invested in analyzing client-side web applications during the past decade, the existing tools often fail to deal with the complexity of modern JavaScript applications. However, from an attacker point of view, the client side of such web applications can reveal invaluable information about the server side. In this paper, first we study the existing tools and enumerate the most crucial features a security-aware client-side analysis should be supporting. Next, we propose GELATO to detect vulnerabilities in modern client-side JavaScript applications that are built upon complex libraries and frameworks. In particular, we take the first step in closing the gap between state-aware crawling and client-side security analysis by proposing a feedback-driven security-aware guided crawler that is able to analyze complex frameworks automatically, and increase the coverage of security-sensitive parts of the program efficiently. Moreover, we propose a new lightweight client-side taint analysis that outperforms the start-of-the-art tools, requires no modification to browsers, and reports non-trivial taint flows on modern JavaScript applications.
In the standard web browser programming model, third-party scripts included in an application execute with the same privilege as the application's own code. This leaves the application's confidential data vulnerable to theft and leakage by malicious code and inadvertent bugs in the third-party scripts. Security mechanisms in modern browsers (the same-origin policy, cross-origin resource sharing and content security policies) are too coarse to suit this programming model. All these mechanisms (and their extensions) describe whether or not a script can access certain data, whereas the meaningful requirement is to allow untrusted scripts access to confidential data that they need and to prevent the scripts from leaking data on the side. Motivated by this gap, we propose WebPol, a policy mechanism that allows a website developer to include fine-grained policies on confidential application data in the familiar syntax of the JavaScript programming language. The policies can be associated with any webpage element, and specify what aspects of the element can be accessed by which third-party domains. A script can access data that the policy allows it to, but it cannot pass the data (or data derived from it) to other scripts or remote hosts in contravention of the policy. To specify the policies, we expose a small set of new native APIs in JavaScript. Our policies can be enforced using any of the numerous existing proposals for information flow tracking in web browsers. We have integrated our policies into one such proposal that we use to evaluate performance overheads and to test our examples.
0.882933
0.759516
0.123416
2004.06293
Collapse of the Fano Resonance Caused by the Nonlocality of the Majorana State
One of the main features of the Majorana state, which attracts a considerable current interest to these excitations in solid-state systems, is related to its nonlocal character. It is demonstrated that the direct consequence of such nonlocality is the collapse of the Fano resonance manifesting itself in the conductance of an asymmetric interference device, the arms of which are connected by a one-dimensional topological superconductor. In the framework of the spinless model, it is shown that the predicted effect is associated with an increase in the multiplicity of the degeneracy of the zero-energy state of the structure arising at a specific case of the Kitaev model. Such an increase leads to the formation of a bound state in the continuum.
We theoretically investigate phosphorene zigzag nanorribons as a platform for constriction engineering. In the presence of a constriction at the upper edge, quantum confinement of edge protected states reveals resonant tunnelling Breit-Wigner transmission peaks, if the upper edge is uncoupled to the lower edge. Coupling between edges in thin constrictions gives rise to Fano-like and anti-resonances in the transmission spectrum of the system.
0.894665
0.674972
0.219693
2004.06294
A High Coverage Camera Assisted Received Signal Strength Ratio Algorithm for Indoor Visible Light Positioning
In this paper, a high coverage algorithm termed enhanced camera assisted received signal strength ratio (eCA-RSSR) positioning algorithm is proposed for visible light positioning (VLP) systems. The basic idea of eCA-RSSR is to utilize visual information captured by the camera to estimate the incidence angles of visible lights first. Based on the incidence angles, eCA-RSSR utilizes the received signal strength ratio (RSSR) calculated by the photodiode (PD) to estimate the ratios of the distances between the LEDs and the receiver. Based on an Euclidean plane geometry theorem, eCA-RSSR transforms the ratios of the distances into the absolute values. In this way, eCA-RSSR only requires 3 LEDs for both orientation-free 2D and 3D positioning, implying that eCA-RSSR can achieve high coverage. Based on the absolute values of the distances, the linear least square method is employed to estimate the position of the receiver. Therefore, for the receiver having a small distance between the PD and the camera, the accuracy of eCA-RSSR does not depend on the starting values of the non-linear least square method and the complexity of eCA-RSSR is low. Furthermore, since the distance between the PD and camera can significantly affect the performance of eCA-RSSR, we further propose a compensation algorithm for eCA-RSSR based on the single-view geometry. Simulation results show that eCA-RSSR can achieve centimeter-level accuracy over 80% indoor area for both the receivers having a small and a large distance between the PD and the camera.
The efficiency of wireless technology depends upon the seamless connectivity to the user at anywhere any time.Heterogeneous wireless networks are an integration of different networks with diversified technologies. The most essential requirement for Seamless vertical handover is that the received signal strength should always be healthy. Mobile device enabled with multiple wireless technologies makes it possible to maintain seamless connectivity in highly dynamic environment.Since the available bandwidth is limited and the number of users is growing rapidly, it is a real challenge to maintain the received signal strength in a healthy stage.In this work, the proposed, cost effective parametric estimation for vertical handover shows that the received signal strength maintains a healthy level by considering the novel concept.
0.888541
0.652186
0.236355
2004.06295
Cross-Lingual Semantic Role Labeling with High-Quality Translated Training Corpus
Many efforts of research are devoted to semantic role labeling (SRL) which is crucial for natural language understanding. Supervised approaches have achieved impressing performances when large-scale corpora are available for resource-rich languages such as English. While for the low-resource languages with no annotated SRL dataset, it is still challenging to obtain competitive performances. Cross-lingual SRL is one promising way to address the problem, which has achieved great advances with the help of model transferring and annotation projection. In this paper, we propose a novel alternative based on corpus translation, constructing high-quality training datasets for the target languages from the source gold-standard SRL annotations. Experimental results on Universal Proposition Bank show that the translation-based method is highly effective, and the automatic pseudo datasets can improve the target-language SRL performances significantly.
We investigate end-to-end speech-to-text translation on a corpus of audiobooks specifically augmented for this task. Previous works investigated the extreme case where source language transcription is not available during learning nor decoding, but we also study a midway case where source language transcription is available at training time only. In this case, a single model is trained to decode source speech into target text in a single pass. Experimental results show that it is possible to train compact and efficient end-to-end speech translation models in this setup. We also distribute the corpus and hope that our speech translation baseline on this corpus will be challenged in the future.
0.89473
0.693603
0.201126
2004.06296
Eigen selection in spectral clustering: a theory guided practice
Based on a Gaussian mixture type model , we derive an eigen selection procedure that improves the usual spectral clustering in high-dimensional settings. Concretely, we derive the asymptotic expansion of the spiked eigenvalues under eigenvalue multiplicity and eigenvalue ratio concentration results, giving rise to the first theory-backed eigen selection procedure in spectral clustering. The resulting eigen-selected spectral clustering (ESSC) algorithm enjoys better stability and compares favorably against canonical alternatives. We demonstrate the advantages of ESSC using extensive simulation and multiple real data studies.
In social network analysis, automatic social circle detection in ego-networks is becoming a fundamental and important task, with many potential applications such as user privacy protection or interest group recommendation. So far, most studies have focused on addressing two questions, namely, how to detect overlapping circles and how to detect circles using a combination of network structure and network node attributes. This paper asks an orthogonal research question, that is, how to detect circles based on network structures that are (usually) described by multiple views? Our investigation begins with crawling ego-networks from Twitter and employing classic techniques to model their structures by six views, including user relationships, user interactions and user content. We then apply both standard and our modified multi-view spectral clustering techniques to detect social circles in these ego-networks. Based on extensive automatic and manual experimental evaluations, we deliver two major findings: first, multi-view clustering techniques perform better than common single-view clustering techniques, which only use one view or naively integrate all views for detection, second, the standard multi-view clustering technique is less robust than our modified technique, which selectively transfers information across views based on an assumption that sparse network structures are (potentially) incomplete. In particular, the second finding makes us believe a direct application of standard clustering on potentially incomplete networks may yield biased results. We lightly examine this issue in theory, where we derive an upper bound for such bias by integrating theories of spectral clustering and matrix perturbation, and discuss how it may be affected by several network characteristics.
0.9336
0.734336
0.199264
2004.06297
Smart Inference for Multidigit Convolutional Neural Network based Barcode Decoding
Barcodes are ubiquitous and have been used in most of critical daily activities for decades. However, most of traditional decoders require well-founded barcode under a relatively standard condition. While wilder conditioned barcodes such as underexposed, occluded, blurry, wrinkled and rotated are commonly captured in reality, those traditional decoders show weakness of recognizing. Several works attempted to solve those challenging barcodes, but many limitations still exist. This work aims to solve the decoding problem using deep convolutional neural network with the possibility of running on portable devices. Firstly, we proposed a special modification of inference based on the feature of having checksum and test-time augmentation, named as Smart Inference (SI) in prediction phase of a trained model. SI considerably boosts accuracy and reduces the false prediction for trained models. Secondly, we have created a large practical evaluation dataset of real captured 1D barcode under various challenging conditions to test our methods vigorously, which is publicly available for other researchers. The experiments' results demonstrated the SI effectiveness with the highest accuracy of 95.85% which outperformed many existing decoders on the evaluation set. Finally, we successfully minimized the best model by knowledge distillation to a shallow model which is shown to have high accuracy (90.85%) with good inference speed of 34.2 ms per image on a real edge device.
Gravitational-wave data analysis is rapidly absorbing techniques from deep learning, with a focus on convolutional networks and related methods that treat noisy time series as images. We pursue an alternative approach, in which waveforms are first represented as weighted sums over reduced bases (reduced-order modeling); we then train artificial neural networks to map gravitational-wave source parameters into basis coefficients. Statistical inference proceeds directly in coefficient space, where it is theoretically straightforward and computationally efficient. The neural networks also provide analytic waveform derivatives, which are useful for gradient-based sampling schemes. We demonstrate fast and accurate coefficient interpolation for the case of a four-dimensional binary-inspiral waveform family, and discuss promising applications of our framework in parameter estimation.
0.903244
0.669236
0.234009
2004.06299
Trusted Wireless Monitoring based on Distributed Ledgers over NB-IoT Connectivity
The data collected from Internet of Things (IoT) devices on various emissions or pollution, can have a significant economic value for the stakeholders. This makes it prone to abuse or tampering and brings forward the need to integrate IoT with a Distributed Ledger Technology (DLT) to collect, store, and protect the IoT data. However, DLT brings an additional overhead to the frugal IoT connectivity and symmetrizes the IoT traffic, thus changing the usual assumption that IoT is uplink-oriented. We have implemented a platform that integrates DLTs with a monitoring system based on narrowband IoT (NB-IoT). We evaluate the performance and discuss the tradeoffs in two use cases: data authorization and real-time monitoring.
By leveraging the concept of mobile edge computing (MEC), massive amount of data generated by a large number of Internet of Things (IoT) devices could be offloaded to MEC server at the edge of wireless network for further computational intensive processing. However, due to the resource constraint of IoT devices and wireless network, both the communications and computation resources need to be allocated and scheduled efficiently for better system performance. In this paper, we propose a joint computation offloading and multi-user scheduling algorithm for IoT edge computing system to minimize the long-term average weighted sum of delay and power consumption under stochastic traffic arrival. We formulate the dynamic optimization problem as an infinite-horizon average-reward continuous-time Markov decision process (CTMDP) model. One critical challenge in solving this MDP problem for the multi-user resource control is the curse-of-dimensionality problem, where the state space of the MDP model and the computation complexity increase exponentially with the growing number of users or IoT devices. In order to overcome this challenge, we use the deep reinforcement learning (RL) techniques and propose a neural network architecture to approximate the value functions for the post-decision system states. The designed algorithm to solve the CTMDP problem supports semi-distributed auction-based implementation, where the IoT devices submit bids to the BS to make the resource control decisions centrally. Simulation results show that the proposed algorithm provides significant performance improvement over the baseline algorithms, and also outperforms the RL algorithms based on other neural network architectures.
0.84629
0.644178
0.202113
2004.06300
Witness-based Approach for Scaling Distributed Ledgers to Massive IoT Scenarios
Distributed Ledger Technologies (DLTs) are playing a major role in building security and trust in Internet of Things (IoT) systems. However, IoT deployments with a large number of devices, such as in environment monitoring applications, generate and send massive amounts of data. This would generate vast number of transactions that must be processed within the distributed ledger. In this work, we first demonstrate that the Proof of Work (PoW) blockchain fails to scale in a sizable IoT connectivity infrastructure. To solve this problem, we present a lightweight distributed ledger scheme to integrate PoW blockchain into IoT. In our scheme, we classify transactions into two types: 1) global transactions, which must be processed by global blockchain nodes and 2) local transactions, which can be processed locally by entities called witnesses. Performance evaluation demonstrates that our proposed scheme improves the scalability of integrated blockchain and IoT monitoring systems by processing a fraction of the transactions, inversely proportional to the number of witnesses, locally. Hence, reducing the number of global transactions.
Internet of Things (IoT) is a system of interrelated devices that can be used to allow large-scale collection and analysis of data. However, as it grew, IoT networks were not capable of managing the data from these services. As a result, cloud computing was introduced to address the need for datacentres for IoT networks. As the technology evolved, the demand for a proper means of supporting and managing crowdsensing and real-time data increased, and cloud servers could no longer keep up with the large volumes of incoming data. This demand brought rise to fog computing. It became an extension to the cloud and allowed resources to be allocated around the network effectively. Its integration to IoT reduced the strain towards the cloud servers. However, issues in high power consumption at the end device and data management constraints surfaced. This paper proposes two approaches to alleviate these issues to keep fog computing remain as a reliable option for IoT-related applications. We created an IoT-based sensing framework that used an urban sound classification model. Through active low and high power states and resource reallocation, we created a network configuration. We tested this configuration against IoT frameworks that use the default fog and cloud setups. The results improved the framework's end device power consumption and server latency. Overall, with the proposed framework, fog computing was proven to be capable of supporting a scalable IoT framework for urban sound sensing.
0.847966
0.692207
0.155759
2004.06301
Robust Modelling of Reflectance Pulse Oximetry for SpO$_2$ Estimation
Continuous monitoring of blood oxygen saturation levels is vital for patients with pulmonary disorders. Traditionally, SpO$_2$ monitoring has been carried out using transmittance pulse oximeters due to its dependability. However, SpO$_2$ measurement from transmittance pulse oximeters is limited to peripheral regions. This becomes a disadvantage at very low temperatures as blood perfusion to the peripherals decreases. On the other hand, reflectance pulse oximeters can be used at various sites like finger, wrist, chest and forehead. Additionally, reflectance pulse oximeters can be scaled down to affordable patches that do not interfere with the user's diurnal activities. However, accurate SpO$_2$ estimation from reflectance pulse oximeters is challenging due to its patient dependent, subjective nature of measurement. Recently, a Machine Learning (ML) method was used to model reflectance waveforms onto SpO$_2$ obtained from transmittance waveforms. However, the generalizability of the model to new patients was not tested. In light of this, the current work implemented multiple ML based approaches which were subsequently found to be incapable of generalizing to new patients. Furthermore, a minimally calibrated data driven approach was utilized in order to obtain SpO$_2$ from reflectance PPG waveforms. The proposed solution produces an average mean absolute error of 1.81\% on unseen patients which is well within the clinically permissible error of 2\%. Two statistical tests were conducted to establish the effectiveness of the proposed method.
Cell assemblies manipulation by optogenetics is pivotal to advance neuroscience and neuroengineering. In in vivo applications, photostimulation often broadly addresses a population of cells simultaneously, leading to feed-forward and to reverberating responses in recurrent microcircuits. The former arise from direct activation of targets downstream, and are straightforward to interpret. The latter are consequence of feedback connectivity and may reflect a variety of time-scales and complex dynamical properties. We investigated wide-field photostimulation in cortical networks in vitro, employing substrate-integrated microelectrode arrays and long-term cultured neuronal networks. We characterized the effect of brief light pulses, while restricting the expression of channelrhodopsin to principal neurons. We evoked robust reverberating responses, oscillating in the physiological gamma frequency range, and found that such a frequency could be reliably manipulated varying the light pulse duration, not its intensity. By pharmacology, mathematical modelling, and intracellular recordings, we conclude that gamma oscillations likely emerge as in vivo from the excitatory-inhibitory interplay and that, unexpectedly, the light stimuli transiently facilitate excitatory synaptic transmission. Of relevance for in vitro models of (dys)functional cortical microcircuitry and in vivo manipulations of cell assemblies, we give for the first time evidence of network-level consequences of the alteration of synaptic physiology by optogenetics
0.873748
0.602549
0.271199
2004.06302
Few-Shot Single-View 3-D Object Reconstruction with Compositional Priors
The impressive performance of deep convolutional neural networks in single-view 3D reconstruction suggests that these models perform non-trivial reasoning about the 3D structure of the output space. However, recent work has challenged this belief, showing that complex encoder-decoder architectures perform similarly to nearest-neighbor baselines or simple linear decoder models that exploit large amounts of per category data in standard benchmarks. On the other hand settings where 3D shape must be inferred for new categories with few examples are more natural and require models that generalize about shapes. In this work we demonstrate experimentally that naive baselines do not apply when the goal is to learn to reconstruct novel objects using very few examples, and that in a \emph{few-shot} learning setting, the network must learn concepts that can be applied to new categories, avoiding rote memorization. To address deficiencies in existing approaches to this problem, we propose three approaches that efficiently integrate a class prior into a 3D reconstruction model, allowing to account for intra-class variability and imposing an implicit compositional structure that the model should learn. Experiments on the popular ShapeNet database demonstrate that our method significantly outperform existing baselines on this task in the few-shot setting.
Statistical image reconstruction (SIR) methods have shown potential to substantially improve the image quality of low-dose X-ray computed tomography (CT) as compared to the conventional filtered back-projection (FBP) method for various clinical tasks. According to the maximum a posterior (MAP) estimation, the SIR methods can be typically formulated by an objective function consisting of two terms: (1) data-fidelity (or equivalently, data-fitting or data-mismatch) term modeling the statistics of projection measurements, and (2) regularization (or equivalently, prior or penalty) term reflecting prior knowledge or expectation on the characteristics of the image to be reconstructed. Existing SIR methods for low-dose CT can be divided into two groups: (1) those that use calibrated transmitted photon counts (before log-transform) with penalized maximum likelihood (pML) criterion, and (2) those that use calibrated line-integrals (after log-transform) with penalized weighted least-squares (PWLS) criterion. Accurate statistical modeling of the projection measurements is a prerequisite for SIR, while the regularization term in the objective function also plays a critical role for successful image reconstruction. This paper reviews several statistical models on CT projection measurements and various regularization strategies incorporating prior knowledge or expected properties of the image to be reconstructed, which together formulate the objective function of the SIR methods for low-dose X-ray CT.
0.817578
0.697915
0.119663
2004.06303
Quantifying Community Characteristics of Maternal Mortality Using Social Media
While most mortality rates have decreased in the US, maternal mortality has increased and is among the highest of any OECD nation. Extensive public health research is ongoing to better understand the characteristics of communities with relatively high or low rates. In this work, we explore the role that social media language can play in providing insights into such community characteristics. Analyzing pregnancy-related tweets generated in US counties, we reveal a diverse set of latent topics including Morning Sickness, Celebrity Pregnancies, and Abortion Rights. We find that rates of mentioning these topics on Twitter predicts maternal mortality rates with higher accuracy than standard socioeconomic and risk variables such as income, race, and access to health-care, holding even after reducing the analysis to six topics chosen for their interpretability and connections to known risk factors. We then investigate psychological dimensions of community language, finding the use of less trustful, more stressed, and more negative affective language is significantly associated with higher mortality rates, while trust and negative affect also explain a significant portion of racial disparities in maternal mortality. We discuss the potential for these insights to inform actionable health interventions at the community-level.
Inspired by diachronic word analysis from the field of natural language processing, we propose an approach for uncovering temporal insights regarding user roles from social networks using graph embedding methods. Specifically, we apply the role embedding algorithm, struc2vec, to a collection of social networks exhibiting either "loyal" or "vagrant" characteristics derived from the popular online social news aggregation website Reddit. For each subreddit, we extract nine months of data and create network role embeddings on consecutive time windows. We are then able to compare and contrast how user roles change over time by aligning the resulting temporal embeddings spaces. In particular, we analyse temporal role embeddings from an individual and a community-level perspective for both loyal and vagrant communities present on Reddit.
0.899224
0.702
0.197225
2004.06304
Discrimination of electronic recoils from nuclear recoils in two-phase xenon time projection chambers
We present a comprehensive analysis of electronic recoil vs. nuclear recoil discrimination in liquid/gas xenon time projection chambers, using calibration data from the 2013 and 2014-16 runs of the Large Underground Xenon (LUX) experiment. We observe strong charge-to-light discrimination enhancement with increased event energy. For events with S1 = 120 detected photons, i.e. equivalent to a nuclear recoil energy of $\sim$100 keV, we observe an electronic recoil background acceptance of $<10^{-5}$ at a nuclear recoil signal acceptance of 50%. We also observe modest electric field dependence of the discrimination power, which peaks at a field of around 300 V/cm over the range of fields explored in this study (50-500 V/cm). In the WIMP search region of S1 = 1-80 phd, the minimum electronic recoil leakage we observe is ${(7.3\pm0.6)\times10^{-4}}$, which is obtained for a drift field of 240-290 V/cm. Pulse shape discrimination is utilized to improve our results, and we find that, at low energies and low fields, there is an additional reduction in background leakage by a factor of up to 3. We develop an empirical model for recombination fluctuations which, when used alongside the Noble Element Scintillation Technique (NEST) simulation package, correctly reproduces the skewness of the electronic recoil data. We use this updated simulation to study the width of the electronic recoil band, finding that its dominant contribution comes from electron-ion recombination fluctuations, followed in magnitude of contribution by fluctuations in the S1 signal, fluctuations in the S2 signal, and fluctuations in the total number of quanta produced for a given energy deposition.
The COHERENT collaboration's primary objective is to measure coherent elastic neutrino-nucleus scattering (CEvNS) using the unique, high-quality source of tens-of-MeV neutrinos provided by the Spallation Neutron Source (SNS) at Oak Ridge National Laboratory (ORNL). In spite of its large cross section, the CEvNS process has never been observed, due to tiny energies of the resulting nuclear recoils which are out of reach for standard neutrino detectors. The measurement of CEvNS has now become feasible, thanks to the development of ultra-sensitive technology for rare decay and weakly-interacting massive particle (dark matter) searches. The CEvNS cross section is cleanly predicted in the standard model; hence its measurement provides a standard model test. It is relevant for supernova physics and supernova-neutrino detection, and enables validation of dark-matter detector background and detector-response models. In the long term, precision measurement of CEvNS will address questions of nuclear structure. COHERENT will deploy multiple detector technologies in a phased approach: a 14-kg CsI[Na] scintillating crystal, 15 kg of p-type point-contact germanium detectors, and 100 kg of liquid xenon in a two-phase time projection chamber. Following an extensive background measurement campaign, a location in the SNS basement has proven to be neutron-quiet and suitable for deployment of the COHERENT detector suite. The simultaneous deployment of the three COHERENT detector subsystems will test the $N^2$ dependence of the cross section and ensure an unambiguous discovery of CEvNS. This document describes concisely the COHERENT physics motivations, sensitivity and plans for measurements at the SNS to be accomplished on a four-year timescale.
0.902178
0.7196
0.182578
2004.06305
VehicleNet: Learning Robust Visual Representation for Vehicle Re-identification
One fundamental challenge of vehicle re-identification (re-id) is to learn robust and discriminative visual representation, given the significant intra-class vehicle variations across different camera views. As the existing vehicle datasets are limited in terms of training images and viewpoints, we propose to build a unique large-scale vehicle dataset (called VehicleNet) by harnessing four public vehicle datasets, and design a simple yet effective two-stage progressive approach to learning more robust visual representation from VehicleNet. The first stage of our approach is to learn the generic representation for all domains (i.e., source vehicle datasets) by training with the conventional classification loss. This stage relaxes the full alignment between the training and testing domains, as it is agnostic to the target vehicle domain. The second stage is to fine-tune the trained model purely based on the target vehicle set, by minimizing the distribution discrepancy between our VehicleNet and any target domain. We discuss our proposed multi-source dataset VehicleNet and evaluate the effectiveness of the two-stage progressive representation learning through extensive experiments. We achieve the state-of-art accuracy of 86.07% mAP on the private test set of AICity Challenge, and competitive results on two other public vehicle re-id datasets, i.e., VeRi-776 and VehicleID. We hope this new VehicleNet dataset and the learned robust representations can pave the way for vehicle re-id in the real-world environments.
In this paper, we present an attention mechanism scheme to improve person re-identification task. Inspired by biology, we propose Self Attention Grid (SAG) to discover the most informative parts from a high-resolution image using its internal representation. In particular, given an input image, the proposed model is fed with two copies of the same image and consists of two branches. The upper branch processes the high-resolution image and learns high dimensional feature representation while the lower branch processes the low-resolution image and learn a filtering attention grid. We apply a max filter operation to non-overlapping sub-regions on the high feature representation before element-wise multiplied with the output of the second branch. The feature maps of the second branch are subsequently weighted to reflect the importance of each patch of the grid using a softmax operation. Our attention module helps the network learn the most discriminative visual features of multiple image regions and is specifically optimized to attend feature representation at different levels. Extensive experiments on three large-scale datasets show that our self-attention mechanism significantly improves the baseline model and outperforms various state-of-art models by a large margin.
0.916793
0.758483
0.15831
2004.06306
Group Testing for COVID-19: How to Stop Worrying and Test More
The corona virus disease 2019 (COVID-19) caused by the novel corona virus has an exponential rate of infection. COVID-19 is particularly notorious as the onset of symptoms in infected patients are usually delayed and there exists a large number of asymptomatic carriers. In order to prevent overwhelming of medical facilities and large fatality rate, early stage testing and diagnosis are key requirements. In this article, we discuss the methodologies from the group testing literature and its relevance to COVID-19 diagnosis. Specifically, we investigate the efficiency of group testing using polymerase chain reaction (PCR) for COVID-19. Group testing is a method in which multiple samples are pooled together in groups and fewer tests are performed on these groups to discern all the infected samples. We study the effect of dilution due to pooling in group testing and show that group tests can perform well even in the presence of dilution effects. We present multiple group testing algorithms that could reduce the number of tests performed for COVID-19 diagnosis. We analyze the efficiency of these tests and provide insights on their practical relevance. With the use of algorithms described here, test plans can be developed that can enable testing centers to increase the number of diagnosis performed without increasing the number of PCR tests. The codes for generating test plans are available online at [1].
Given a composite null hypothesis H, test supermartingales are non-negative supermartingales with respect to H with initial value 1. Large values of test supermartingales provide evidence against H. As a result, test supermartingales are an effective tool for rejecting H, particularly when the p-values obtained are very small and serve as certificates against the null hypothesis. Examples include the rejection of local realism as an explanation of Bell test experiments in the foundations of physics and the certification of entanglement in quantum information science. Test supermartingales have the advantage of being adaptable during an experiment and allowing for arbitrary stopping rules. By inversion of acceptance regions, they can also be used to determine confidence sets. We use an example to compare the performance of test supermartingales for computing p-values and confidence intervals to Chernoff-Hoeffding bounds and the "exact" p-value. The example is the problem of inferring the probability of success in a sequence of Bernoulli trials. There is a cost in using a technique that has no restriction on stopping rules, and for a particular test supermartingale, our study quantifies this cost.
0.864982
0.618691
0.246291
2004.06307
Sense and Sensibility: Characterizing Social Media Users Regarding the Use of Controversial Terms for COVID-19
With the world-wide development of 2019 novel coronavirus, although WHO has officially announced the disease as COVID-19, one controversial term - "Chinese Virus" is still being used by a great number of people. In the meantime, global online media coverage about COVID-19-related racial attacks increases steadily, most of which are anti-Chinese or anti-Asian. As this pandemic becomes increasingly severe, more people start to talk about it on social media platforms such as Twitter. When they refer to COVID-19, there are mainly two ways: using controversial terms like "Chinese Virus" or "Wuhan Virus", or using non-controversial terms like "Coronavirus". In this study, we attempt to characterize the Twitter users who use controversial terms and those who use non-controversial terms. We use the Tweepy API to retrieve 17 million related tweets and the information of their authors. We find significant differences between these two groups of Twitter users across their demographics, user-level features like the number of followers, political following status, as well as their geo-locations. Moreover, we apply classification models to predict Twitter users who are more likely to use controversial terms. To our best knowledge, this is the first large-scale social media-based study to characterize users with respect to their usage of controversial terms during a major crisis.
After the first infected patient detected in Wuhan, China in December, 2019 with the severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) virus, the COVID-19 (CO means corona, VI is virus, D is disease, 19 is the year of discovery) disease spread globally due to its high contagious nature and became an ongoing pandemic. Also, the lack of vaccines and efficacious drugs to treat infected patients is a great problem to cope this pandemic. The approved drugs for similar health problems, reported potential drugs but not yet approved clinically or under clinical trial, and molecules from medicinal plants extracts are investigated randomly to deal with the COVID-19 infection. Molecular docking, one of the best approach to search therapeutically potent drugs/molecules in real time with possible hope to apply on COVID-19. In this communication, molecular docking studies of 18 ligands were carried out with the three important proteins of SARS-CoV-2, i.e., RNA-dependent RNA polymerase (RdRp), angiotensin-converting enzyme 2 (ACE2) and spike glycoprotein (SGp). From the obtained results, we observed that all the tested molecules showed better dock score in compared to the hydroxychloroquine claimed to be effective against COVID-19. Combining the dock score and other medicinal properties, we believe the limonin can be further explored for potential use against COVID-19.
0.890253
0.675719
0.214535
2004.06309
Iterative frequency-domain seismic wave solvers based on multi-level domain-decomposition preconditioners
Frequency-domain full-waveform inversion (FWI) is suitable for long-offset stationary-recording acquisition, since reliable subsurface models can be reconstructed with a few frequencies and attenuation is easily implemented without computational overhead. In the frequency domain, wave modelling is a Helmholtz-type boundary-value problem which requires to solve a large and sparse system of linear equations per frequency with multiple right-hand sides (sources). This system can be solved with direct or iterative methods. While the former are suitable for FWI application on 3D dense OBC acquisitions covering spatial domains of moderate size, the later should be the approach of choice for sparse node acquisitions covering large domains (more than 50 millions of unknowns). Fast convergence of iterative solvers for Helmholtz problems remains however challenging due to the non definiteness of the Helmholtz operator, hence requiring efficient preconditioners. In this study, we use the Krylov subspace GMRES iterative solver combined with a multi-level domain-decomposition preconditioner. Discretization relies on continuous finite elements on unstructured tetrahedral meshes to comply with complex geometries and adapt the size of the elements to the local wavelength ($h$-adaptivity). We assess the convergence and the scalability of our method with the acoustic 3D SEG/EAGE Overthrust model up to a frequency of 20~Hz and discuss its efficiency for multi right-hand side processing.
In this paper, we propose a space-time least-squares isogeometric method to solve parabolic evolution problems, well suited for high-degree smooth splines in the space-time domain. We focus on the linear solver and its computational efficiency: thanks to the proposed formulation and to the tensor-product construction of space-time splines, we can design a preconditioner whose application requires the solution of a Sylvester-like equation, which is performed efficiently by the fast diagonalization method. The preconditioner is robust w.r.t. spline degree and mesh size. The computational time required for its application, for a serial execution, is almost proportional to the number of degrees-of-freedom and independent of the polynomial degree. The proposed approach is also well-suited for parallelization.
0.861528
0.77565
0.085878
2004.06310
Asymptotics of the stress concentration in high-contrast elastic composites
A long-standing area of materials science research has been the study of electrostatic, magnetic, and elastic fields in composite with densely packed inclusions whose material properties differ from that of the background. For a general elliptic system, when the coefficients are piecewise H\"{o}lder continuous and uniformly bounded, an $\varepsilon$-independent bound of the gradient was obtained by Li and Nirenberg \cite{ln}, where $\varepsilon$ represents the distance between the interfacial surfaces. However, in high-contrast composites, when $\varepsilon$ tends to zero, the stress always concentrates in the narrow regions. As a contrast to the uniform boundedness result of Li and Nirenberg, in order to investigate the role of $\varepsilon$ played in such kind of concentration phenomenon, in this paper we establish the blow-up asymptotic expressions of the gradients of solutions to the Lam\'{e} system with partially infinite coefficients in dimensions two and three. We discover the relationship between the blow-up rate of the stress and the relative convexity of adjacent surfaces, and find a family of blow-up factor matrices with respect to the boundary data. Therefore, this work completely solves the Babu\u{s}ka problem on blow-up analysis of stress concentration in high-contrast composite media. Moreover, as a byproduct, we establish an extended Flaherty-Keller formula on the effective elastic property of a periodic composite with densely packed fibers, which is related to the ``Vigdergauz microstructure'' in the shape optimizition of fibers.
Lateral interactions of oxygen adatoms derived from first-principles calculations of the O-Pd(100) system had been claimed to include trio- and quattro terms beside pair interactions. This paper is dedicated to extend an earlier model for substrate strain mediated interactions between adatom pairs to include trio- and quattro terms. While monomers (sitting on high symmetric sites) are supposed to create isotropic stress on the substrate, dimers would create anisotropic stress. The requirement of mechanical equilibrium allows to formulate the elastic energy as a sum of pair-, trio- and quattro terms, solved by respective an eigenvalue problems. Resulting interactions are strongly angle dependent and also reflect the elastic anisotropy of the substrate. A continuum elastic model supports the long range character of the elastic interaction but should also describe some short range features. For the elastically isotropic tungsten substrate a closed solution for quattro interactions is presented, for trio inter cations numerical values are given.
0.865499
0.701064
0.164434
2004.06311
Public Health Policy: COVID-19 Epidemic and SEIR Model with Asymptomatic Viral Carriers
We measure the effect of different public health regulations to the spread of COVID-19, based on a SEIRA model -- a SEIR model including asymptomatic transmissions. The cumulative confirmed cases and death show nonlinear positive relationship with the value of asymptomatic rate. Based on this model, we analyze the inhibit effects to COVID-19 of three types of public health policies, i.e. isolation of laboratory confirmed cases, general personal protection and quarantine (lock-down). The simulations conclude that the isolation display limited effects to the asymptomatic viral carriers. The general personal protection and quarantine perform similar effects when the their percentages of participants are same. When the total proportion of asymptomatic, mild symptomatic and neglected patients is 40%, only depends on isolation policy may lead to an additional 75% infections, compared with general personal protection or quarantine with an efficiency 80%. At end, we provide seven recommendations of public health intervention before and during an aerial transmitted epidemic (COVID-19).
Influenza epidemics each year cause hundreds of thousands of deaths worldwide and put high loads on health care systems, in France and elsewhere. A main concern for resource planning in public health is the risk of an extreme and dangerous epidemic. Sizes of epidemics are measured by the number of visits to doctors caused by Influenza Like Illness (ILI), and health care planning relies on prediction of ILI rates. We use recent results on the multivariate Generalized Pareto (GP) distributions in Extreme Value Statistics to develop methods for real-time prediction of risks of exceeding very high levels and for detection of unusual and potentially very dangerous epidemics. Based on the observation of the two first weeks of the epidemic, the GP method for real-time prediction is employed to predict ILI rates of the third week and the total size of the epidemic for extreme influenza epidemics in France. We then apply a general anomaly detection framework to the ILI rates during the three first weeks of the epidemic for early detection of unusual extreme epidemics. As an additional input to resource planning we use standard methods from extreme value statistics to estimate risk of exceedance of high ILI levels in future years. The new methods are expected to be broadly applicable in health care planning and in many other areas of science and technology.
0.885592
0.71851
0.167082
2004.06312
(1, 2) and weak (1, 3) homotopies on knot projections
In this paper, we obtain the necessary and sufficient condition that two knot projections are related by a finite sequence of the first and second flat Reidemeister moves (Theorem 1). We also consider an equivalence relation that is called weak (1, 3) homotopy. This equivalence relation occurs by the first flat Reidemeister move and one of the third flat Reidemeister moves. We introduce a map sending weak (1, 3) homotopy classes to knot isotopy classes (Sec. 3). Using the map, we determine which knot projections are trivialized under weak (1, 3) homotopy (Corollary 3).
We show that the Bousfield-Kan spectral sequence which computes the rational homotopy groups of the space of long knots in ${\mathbb R}^d$, where $d\ge 4$, collapses at the $E^2$ page. The main ingredients in the proof are Sinha's cosimplicial model for the space of long knots and a coformality result for the little balls operad.
0.932564
0.82708
0.105484
2004.06313
Random connection models in the thermodynamic regime: central limit theorems for add-one cost stabilizing functionals
The paper deals with a random connection model, a random graph whose vertices are given by a homogeneous Poisson point process on $\R^d$, and edges are independently drawn with probability depending on the locations of the two end points. We establish central limit theorems (CLT) for general functionals on this graph under minimal assumptions that are a combination of the weak stabilization for the-one cost and a $(2+\delta)$-moment condition. As a consequence, CLTs for isomorphic subgraph counts, isomorphic component counts, the number of connected components, and Betti numbers are then derived.
We study limits of the largest connected components (viewed as metric spaces) obtained by critical percolation on uniformly chosen graphs and configuration models with heavy-tailed degrees. For rank-one inhomogeneous random graphs, such results were derived by Bhamidi, van der Hofstad, Sen [Probab. Theory Relat. Fields 2018]. We develop general principles under which the identical scaling limits as the rank-one case can be obtained. Of independent interest, we derive refined asymptotics for various susceptibility functions and the maximal diameter in the barely subcritical regime.
0.853749
0.770528
0.083221
2004.06314
Critical analysis of two-dimensional classical XY model using tensor renormalization group
We consider the two-dimensional classical XY model on a square lattice in the thermodynamic limit using tensor renormalization group and precisely determine the critical temperature corresponding to the Berezinskii-Kosterlitz-Thouless (BKT) phase transition.
We numerically obtain the conformal spectrum of several classical spin models on a two-dimensional lattice with open boundaries, for every boundary fixed point obtained by the Cardy's derivation [J. L. Cardy, Nucl. Phys. B 324, 581 (1989)]. In order to extract accurate conformal data, we implement the tensor network renormalization algorithm [G. Evenbly and G. Vidal, Phys. Rev. Lett. 115, 180405 (2015)] extended so as to be applicable to a square lattice with open boundaries. We successfully compute the boundary conformal spectrum consistent with the underlying boundary conformal field theories (BCFTs) for the Ising, tri-critical Ising, and 3-state Potts models on the lattice, which allows us to confirm the validity of the BCFT analyses for the surface critical behaviors of those lattice models.
0.905986
0.802817
0.103169
2004.06315
Hard and soft x-ray photoemission spectroscopy study of the new Kondo system SmO thin film
SmO thin film is a new Kondo system showing a resistivity upturn around 10 K and was theoretically proposed to have a topologically nontrivial band structure. We have performed hard x-ray and soft x-ray photoemission spectroscopy to elucidate the electronic structure of SmO. From the Sm 3$d$ core-level spectra, we have estimated the valence of Sm to be $\sim$2.96, proving that the Sm has a mixed valence. The valence-band photoemission spectra exhibit a clear Fermi edge originating from the Sm 5$d$-derived band. The present finding is consistent with the theory suggesting a possible topological state in SmO and show that rare-earth monoxides or their heterostructures can be a new playground for the interplay of strong electron correlation and spin-orbit coupling.
Thin films of magnesium doped zinc oxide (MZO) were synthesized using the sol gel method and annealed at different temperatures under ambient condition. The morphological properties of the post annealed MZO films were investigated using X ray diffraction (XRD) while atomic force microscopy (AFM) was employed to probe the topographical alteration of the films. The optical properties of the post annealed MZO films were examined by UV visible spectroscopy and the Tauc method was used to estimate the optical band gap. The studies revealed that, with the rise of annealing temperature the crystallinity and the surface roughness of the MZO films were increased whereas the optical transmittance and the energy bandgap were decreased.
0.90433
0.718505
0.185826
2004.06317
The Haagerup property for twisted groupoid dynamical systems
We introduce the Haagerup property for twisted groupoid $C^*$-dynamical systems in terms of naturally defined positive-definite operator-valued multipliers. By developing a version of `the Haagerup trick' we prove this property is equivalent to the Haagerup property of the reduced crossed product $C^*$-algebra with respect to the canonical conditional expectation $E$. This extends a theorem of Dong and Ruan for discrete group actions, and implies that a given Cartan inclusion of separable $C^*$-algebras has the Haagerup property if and only if the associated Weyl groupoid has the Haagerup property in the sense of Tu. We use the latter statement to prove that every separable $C^*$-algebra which has the Haagerup property with respect to some Cartan subalgebra satisfies the Universal Coefficient Theorem. This generalizes a recent result of Barlak and Li on the UCT for nuclear Cartan pairs.
Let G be a group acting cocompactly without inversion on a tree X, with all vertex and edge stabilizers isomorphic to the same free abelian group Z^n. We prove that G has the Haagerup Property if and only if G is weakly amenable, and we give a necessary and sufficient condition for this to happen. In particular, denoting by d the rank of the fundamental group of the graph X modded out by G, we deduce that G has the Haagerup Property if either d=0, d=1, or n=1. In these three cases, we show that the L^p-compression rate of G is 1, and that its equivariant L^p-compression rate is max{1/p,1/2} (provided G is non-amenable). We also discuss quasi-isometric embeddings of G into a product of finitely many regular trivalent trees.
0.882866
0.798147
0.084719
2004.06318
Relationship between classical features of quantum transformations
We relate two notions of classicality for quantum transformations often arising in popular subtheories of quantum mechanics: covariance of the Wigner representation of the theory and the existence of a transformation noncontextual ontological model of the theory. We show that covariance implies transformation noncontextuality. The converse holds provided that the underlying ontological model is the one given by the Wigner representation. In addition, we investigate the relationships of covariance and transformation noncontextuality with the existence of a positivity preserving quasiprobability distribution for the transformations of the theory. We conclude that covariance implies transformation noncontextuality, which implies positivity preservation. Therefore the violation of the latter is a stronger notion of nonclassicality than the violation of the former.
Contextuality is a non-classical behaviour that can be exhibited by quantum systems. It is increasingly studied for its relationship to quantum-over-classical advantages in informatic tasks. To date, it has largely been studied in discrete variable scenarios, where observables take values in discrete and usually finite sets. Practically, on the other hand, continuous-variable scenarios offer some of the most promising candidates for implementing quantum computations and informatic protocols. Here we set out a framework for treating contextuality in continuous-variable scenarios. It is shown that the Fine--Abramsky--Brandenburger theorem extends to this setting, an important consequence of which is that nonlocality can be viewed as a special case of contextuality, as in the discrete case. The contextual fraction, a quantifiable measure of contextuality that bears a precise relationship to Bell inequality violations and quantum advantages, can also be defined in this setting. It is shown to be a non-increasing monotone with respect to classical operations that include binning to discretise data. Finally, we consider how the contextual fraction can be formulated as an infinite linear program, and calculated with increasing accuracy using semi-definite programming approximations.
0.842969
0.791194
0.051775
2004.06319
Adaptive radial basis function generated finite-difference (RBF-FD) on non-uniform nodes using $p$-refinement
Radial basis functions-generated finite difference methods (RBF-FDs) have been gaining popularity recently. In particular, the RBF-FD based on polyharmonic splines (PHS) augmented with multivariate polynomials (PHS+poly) has been found significantly effective. For the approximation order of RBF-FDs' weights on scattered nodes, one can already find mathematical theories in the literature. Many practical problems in numerical analysis, however, do not require a uniform node-distribution. Instead, they would be better suited if specific areas of the domain, where complicated physics needed to be resolved, had a relatively higher node-density compared to the rest of the domain. In this work, we proposed a practical adaptive RBF-FD with a user-defined order of convergence with respect to the total number of (possibly scattered and non-uniform) data points $N$. Our algorithm outputs a sparse differentiation matrix with the desired approximation order. Numerical examples are provided to show that the proposed adaptive RBF-FD method yields the expected $N$-convergence even for highly non-uniform node-distributions. The proposed method also reduces the number of non-zero elements in the linear system without sacrificing accuracy.
The paper considers a time-adaptive method for determination of drug efficacy in a parameter identification problem (PIP) for system of ordinary differential equations (ODE) which describe dynamics of the primary HIV infection. Optimization approach to solve this problem is presented and a posteriori error estimates in the Tikhonov functional and Lagrangian are formulated. Based on these estimates a time adaptive algorithm is formulated and numerically tested for different scenarios of noisy observations of virus population function. Numerical results show significant improvement of reconstruction of drug efficacy parameter when using time adaptive mesh refinement compared to usual gradient method applied on a uniform time mesh.
0.905895
0.695308
0.210586
2004.06320
A2D2: Audi Autonomous Driving Dataset
Research in machine learning, mobile robotics, and autonomous driving is accelerated by the availability of high quality annotated data. To this end, we release the Audi Autonomous Driving Dataset (A2D2). Our dataset consists of simultaneously recorded images and 3D point clouds, together with 3D bounding boxes, semantic segmentation, instance segmentation, and data extracted from the automotive bus. Our sensor suite consists of six cameras and five LiDAR units, providing full 360 degree coverage. The recorded data is time synchronized and mutually registered. Annotations are for non-sequential frames: 41,277 frames with semantic segmentation image and point cloud labels, of which 12,497 frames also have 3D bounding box annotations for objects within the field of view of the front camera. In addition, we provide 392,556 sequential frames of unannotated sensor data for recordings in three cities in the south of Germany. These sequences contain several loops. Faces and vehicle number plates are blurred due to GDPR legislation and to preserve anonymity. A2D2 is made available under the CC BY-ND 4.0 license, permitting commercial use subject to the terms of the license. Data and further information are available at http://www.a2d2.audi.
Illumination effects in images, specifically cast shadows and shading, have been shown to decrease the performance of deep neural networks on a large number of vision-based detection, recognition and segmentation tasks in urban driving scenes. A key factor that contributes to this performance gap is the lack of `time-of-day' diversity within real, labeled datasets. There have been impressive advances in the realm of image to image translation in transferring previously unseen visual effects into a dataset, specifically in day to night translation. However, it is not easy to constrain what visual effects, let alone illumination effects, are transferred from one dataset to another during the training process. To address this problem, we propose deep learning framework, called Shadow Transfer, that can relight complex outdoor scenes by transferring realistic shadow, shading, and other lighting effects onto a single image. The novelty of the proposed framework is that it is both self-supervised, and is designed to operate on sensor and label information that is easily available in autonomous vehicle datasets. We show the effectiveness of this method on both synthetic and real datasets, and we provide experiments that demonstrate that the proposed method produces images of higher visual quality than state of the art image to image translation methods.
0.905861
0.673582
0.232279
2004.06321
Sequential Batch Learning in Finite-Action Linear Contextual Bandits
We study the sequential batch learning problem in linear contextual bandits with finite action sets, where the decision maker is constrained to split incoming individuals into (at most) a fixed number of batches and can only observe outcomes for the individuals within a batch at the batch's end. Compared to both standard online contextual bandits learning or offline policy learning in contexutal bandits, this sequential batch learning problem provides a finer-grained formulation of many personalized sequential decision making problems in practical applications, including medical treatment in clinical trials, product recommendation in e-commerce and adaptive experiment design in crowdsourcing. We study two settings of the problem: one where the contexts are arbitrarily generated and the other where the contexts are \textit{iid} drawn from some distribution. In each setting, we establish a regret lower bound and provide an algorithm, whose regret upper bound nearly matches the lower bound. As an important insight revealed therefrom, in the former setting, we show that the number of batches required to achieve the fully online performance is polynomial in the time horizon, while for the latter setting, a pure-exploitation algorithm with a judicious batch partition scheme achieves the fully online performance even when the number of batches is less than logarithmic in the time horizon. Together, our results provide a near-complete characterization of sequential decision making in linear contextual bandits when batch constraints are present.
We consider the minimax setup for Gaussian one-armed bandit problem, i.e. the two-armed bandit problem with Gaussian distributions of incomes and known distribution corresponding to the first arm. This setup naturally arises when the optimization of batch data processing is considered and there are two alternative processing methods available with a priori known efficiency of the first method. One should estimate the efficiency of the second method and provide predominant usage of the most efficient of both them. According to the main theorem of the theory of games minimax strategy and minimax risk are searched for as Bayesian ones corresponding to the worst-case prior distribution. As a result, we obtain the recursive integro-difference equation and the second order partial differential equation in the limiting case as the number of batches goes to infinity. This makes it possible to determine minimax risk and minimax strategy by numerical methods. If the number of batches is large enough we show that batch data processing almost does not influence the control performance, i.e. the value of the minimax risk. Moreover, in case of Bernoulli incomes and large number of batches, batch data processing provides almost the same minimax risk as the optimal one-by-one data processing.
0.912003
0.795608
0.116395
2004.06322
Structural dynamics in thermal-treatment of amorphous indium-oxide films
Thermally-treating amorphous indium-oxide films is used in various basic studies as a means of tuning the system disorder. In this process the resistance of a given sample decreases while its amorphous structure and chemical composition is preserved. The main effect of the process is an increase in the system density which in turn leads to improved interatomic overlap which is easily detected as improved conductivity. A similar effect has been observed in studies of other amorphous systems that were subjected to pressure. In the current work we show that the Raman spectra of amorphous indium-oxide change in response to thermal-treatment in a similar way as in pressure experiments performed on other disordered and amorphous systems. We present a study of how thermal-treatment changes the system dynamics by monitoring the resistance versus time of indium-oxide films following various stages of thermal-treatment. The time dependence of the sample resistance fits the stretched exponential law with parameters that change systematically with further annealing. Implication of these results to slow dynamics phenomena that are governed by the Kohlrausch's law are discussed.
We report very large bandgap enhancement in SrTiO3 (STO) films (fabricated by pulsed laser deposition below 800 {\deg}C), which can be up to 20% greater than the bulk value, depending on the deposition temperature. The origin is comprehensively investigated and finally attributed to Sr/Ti antisite point defects, supported by density functional theory calculations. More importantly, the bandgap enhancement can be utilized to tailor the electronic and magnetic phases of the two-dimensional electron gas (2DEG) in STO-based interface systems. For example, the oxygen-vacancy-induced 2DEG (2DEG-V) at the interface between amorphous LaAlO3 and STO films is more localized and the ferromagnetic order in the STO-film-based 2DEG-V can be clearly seen from low-temperature magnetotransport measurements. This opens an attractive path to tailor electronic, magnetic and optical properties of STO-based oxide interface systems under intensive focus in the oxide electronics community. Meanwhile, our study provides key insight into the origin of the fundamental issue that STO films are difficult to be doped into the fully metallic state by oxygen vacancies.
0.902923
0.730839
0.172084