id
stringlengths
5
16
query
stringlengths
1
382
pos
stringlengths
7
5.09k
neg
stringlengths
23
5.09k
qp
float64
0.4
1
qn
float64
0.34
0.91
margin
float64
0.02
0.3
2004.06323
Long-range influence of manipulating disordered-insulators locally
Localization of wavefunctions is arguably the most familiar effect of disorder in quantum systems. It has been recently argued [[V. Khemani, R. Nandkishore, and S. L. Sondhi, Nature Physics, 11, 560 (2015)] that, contrary to naive expectation, manipulation of a localized-site in the disordered medium may produce a disturbance over a length-scale much larger than the localization-length $\xi$. Here we report on the observation of this nonlocal phenomenon in electronic transport experiment. Being a wave property, visibility of this effect hinges upon quantum-coherence, and its spatial-scale may be ultimately limited by the phase-coherent length of the disordered insulator. Evidence for quantum coherence in the Anderson-insulating phase may be obtained from magneto-resistance measurements which however are useful mainly in thin-films. The technique used in this work offers an empirical method to measure this fundamental aspect of Anderson-insulators even in relatively thick samples.
Using a system of repulsive, soft particles as a model for a jammed solid, we analyze its force network as characterized by the magnitude of the contact force between two particles, the local contact angle subtended between three particles, and the local coordination number. In particular, we measure the local contact angle distribution as a function of the magnitude of the local contact force. We find the suppression of small contact angles for locally larger contact forces, suggesting the existence of chain-like correlations in the locally larger contact forces. We couple this information with a coordination number-spin state mapping to arrive at a Potts spin model with frustration and correlated disorder to draw a potential connection between jammed solids (no quenched disorder) and spin glasses (quenched disorder). We use this connection to measure chaos due to marginality in the jammed system. In addition, we present the replica solution of the one-dimensional, long-range Potts glass as a potential toy building block for a jammed solid, where a sea of weakly interacting spins provide for long-range interactions along a chain-like backbone of more strongly interacting spins.
0.811442
0.680505
0.130937
2004.06324
Ultra-wideband Concurrent Ranging
We propose a novel concurrent ranging technique for distance estimation with ultra-wideband (UWB) radios. Conventional schemes assume that the necessary packet exchanges occur in isolation, to avoid collisions. Concurrent ranging relies on the overlapping of replies from nearby responders to the same ranging request issued by an initiator node. As UWB transmissions rely on short pulses, the individual times of arrival can be discriminated by examining the channel impulse response (CIR) of the initiator transceiver. By ranging against N responders with a single, concurrent exchange, our technique drastically abates network overhead, enabling higher ranging frequency with lower latency and energy consumption w.r.t. conventional schemes. Concurrent ranging can be implemented with a strawman approach requiring minimal changes to standard schemes. Nevertheless, we empirically show that this limits the attainable accuracy, reliability, and therefore applicability. We identify the main challenges in realizing concurrent ranging without dedicated hardware and tackle them by contributing several techniques, used in synergy in our prototype based on the popular DW1000 transceiver. Our evaluation, with static targets and a mobile robot, confirms that concurrent ranging reliably achieves decimeter-level distance and position accuracy, comparable to conventional schemes but at a fraction of the network and energy cost.
In non-coherent wideband fading channels where energy rather than spectrum is the limiting resource, peaky and non-peaky signaling schemes have long been considered species apart, as the first approaches asymptotically the capacity of a wideband AWGN channel with the same average SNR, whereas the second reaches a peak rate at some finite critical bandwidth and then falls to zero as bandwidth grows to infinity. In this paper it is shown that this distinction is in fact an artifact of the limited attention paid in the past to the product between the bandwidth and the fraction of time it is in use. This fundamental quantity, called bandwidth occupancy, measures average bandwidth usage over time. For all signaling schemes with the same bandwidth occupancy, achievable rates approach to the wideband AWGN capacity within the same gap as the bandwidth occupancy approaches its critical value, and decrease to zero as the occupancy goes to infinity. This unified analysis produces quantitative closed-form expressions for the ideal bandwidth occupancy, recovers the existing capacity results for (non-)peaky signaling schemes, and unveils a trade-off between the accuracy of approximating capacity with a generalized Taylor polynomial and the accuracy with which the optimal bandwidth occupancy can be bounded.
0.885429
0.726561
0.158868
2004.06325
The interacting Rice-Mele model -- bulk and boundaries
We investigate the interacting, one-dimensional Rice-Mele model, a prototypical fermionic model of topological properties. To set the stage, we firstly compute the single-particle spectral function, the local density, and the boundary charge in the absence of interactions. The boundary charge is fully determined by bulk properties indicating a bulk-boundary correspondence. In a large parameter regime it agrees with the one obtained from an effective low-energy theory (arXiv:2004.00463). Secondly, we investigate the robustness of our results towards two-particle interactions. To resum the series of leading logarithms for small gaps, which dismantle plain perturbation theory in the interaction, we use an essentially analytical renormalization group approach. It is controlled for small interactions and can directly be applied to the microscopic lattice model. We benchmark the results against numerical density matrix renormalization group data. The main interaction effect in the bulk is a power-law renormalization of the gap with an interaction dependent exponent. The important characteristics of the boundary charge are unaltered and can be understood from the renormalized bulk properties, elevating the bulk-boundary correspondence to the interacting regime. This requires a consistent treatment not only of the low-energy gap renormalization but also of the high-energy band width one. In contrast to low-energy field theories our renormalization group approach also provides the latter. We show that the interaction spoils the relation between the bulk properties and the number of edge states, consistent with the observation that the Rice-Mele model with finite potential modulation does not reveal any zero-energy edge states.
In this paper, we propose an {\it exact holographic mapping} which is a unitary mapping from the Hilbert space of a lattice system in flat space (boundary) to that of another lattice system in one higher dimension (bulk). By defining the distance in the bulk system from two-point correlation functions, we obtain an emergent bulk space-time geometry that is determined by the boundary state and the mapping. As a specific example, we study the exact holographic mapping for $(1+1)$-dimensional lattice Dirac fermions and explore the emergent bulk geometry corresponding to different boundary states including massless and massive states at zero temperature, and the massless system at finite temperature. We also study two entangled one-dimensional chains and show that the corresponding bulk geometry consists of two asymptotic regions connected by a worm-hole. The quantum quench of the coupled chains is mapped to dynamics of the worm-hole. In the end we discuss the general procedure of applying this approach to interacting systems, and other open questions.
0.770497
0.629527
0.14097
2004.06326
On enhancing efficiency and accuracy of particle swarm optimization algorithms
The particle swarm optimization (PSO) algorithm has been recently introduced in the non--linear programming, becoming widely studied and used in a variety of applications. Starting from its original formulation, many variants for improvement and specialization of the PSO have been already proposed, but without any definitive result, thus research in this area is nowadays still rather active. This paper goes in this direction, by proposing some modifications to the basic PSO algorithm, aiming at enhancements in aspects that impact on the efficiency and accuracy of the optimization algorithm. In particular, variants of PSO based on fuzzy logics and Bayesian theory have been developed, which show better, or competitive, performances when compared to both the basic PSO formulation and a few other optimization algorithms taken from the literature.
Modeling and optimization of metabolic networks has been one of the hottest topics in computational systems biology within recent years. However, the complexity and uncertainty of these networks in addition to the lack of necessary data has resulted in more efforts to design and usage of more capable models which fit to realistic conditions. In this paper, instead of optimizing networks in equilibrium condition, the optimization of dynamic networks in non-equilibrium states including low number of molecules has been studied using a 2-D lattice simulation. A prototyped network has been simulated with such approach, and has been optimized using Swarm Particle Algorithm the results of which are presented in addition to the relevant plots.
0.895635
0.705505
0.19013
2004.06327
Convergence Rate of a Message-passing Algorithm for Solving Linear Systems
This paper studies the convergence rate of a message-passing distributed algorithm for solving a large-scale linear system. This problem is generalised from the celebrated Gaussian Belief Propagation (BP) problem for statistical learning and distributed signal processing, and this message-passing algorithm is generalised from the well-celebrated Gaussian BP algorithm. Under the assumption of generalised diagonal dominance, we reveal, through painstaking derivations, several bounds on the convergence rate of the message-passing algorithm. In particular, we show clearly how the convergence rate of the algorithm can be explicitly bounded using the diagonal dominance properties of the system. When specialised to the Gaussian BP problem, our work also offers new theoretical insight into the behaviour of the BP algorithm because we use a purely linear algebraic approach for convergence analysis.
In this paper, we consider a system in which multiple users communicate with a destination with the help of multiple half-duplex relays. Based on the compute-and-forward scheme, each relay, instead of decoding the users' messages, decodes an integer-valued linear combination that relates the transmitted messages. Then, it forwards the linear combination towards the destination. Given these linear combinations, the destination may or may not recover the transmitted messages since the linear combinations are not always full rank. Therefore, we propose an algorithm where we optimize the precoding factor at the users such that the probability that the equations are full rank is increased and that the transmission rate is maximized. We show, through some numerical examples, the effectiveness of our algorithm and the advantage of performing precoding allocation at the users. Also, we show that this scheme can outperform standard relaying techniques in certain regimes.
0.879028
0.706135
0.172893
2004.06328
Universal Approximation on the Hypersphere
It is well known that any continuous probability density function on $\mathbb{R}^m$ can be approximated arbitrarily well by a finite mixture of normal distributions, provided that the number of mixture components is sufficiently large. The von-Mises-Fisher distribution, defined on the unit hypersphere $S^m$ in $\mathbb{R}^{m+1}$, has properties that are analogous to those of the multivariate normal on $\mathbb{R}^{m+1}$. We prove that any continuous probability density function on $S^m$ can be approximated to arbitrary degrees of accuracy by a finite mixture of von-Mises-Fisher distributions.
The two main topics of this text are as follows: Firstly, three modifications of the theorem of Beltrami will be presented for diffeomorphisms between Riemannian manifolds and a space form which preserve the geodesic circles, the geodesic hyperspheres, or the minimal surfaces, respectively. Secondly, it is defined what it means for an infinitesimal deformation of a metric to preserve the geodesics up to first order, and a corresponding infinitesimal version of Beltrami's theorem is given.
0.78127
0.655017
0.126253
2004.06329
Replica analysis of overfitting in generalized linear models
Nearly all statistical inference methods were developed for the regime where the number $N$ of data samples is much larger than the data dimension $p$. Inference protocols such as maximum likelihood (ML) or maximum a posteriori probability (MAP) are unreliable if $p=O(N)$, due to overfitting. This limitation has for many disciplines with increasingly high-dimensional data become a serious bottleneck. We recently showed that in Cox regression for time-to-event data the overfitting errors are not just noise but take mostly the form of a bias, and how with the replica method from statistical physics once can model and predict this bias and the noise statistics. Here we extend our approach to arbitrary generalized linear regression models (GLM), with possibly correlated covariates. We analyse overfitting in ML/MAP inference without having to specify data types or regression models, relying only on the GLM form, and derive generic order parameter equations for the case of $L2$ priors. Second, we derive the probabilistic relationship between true and inferred regression coefficients in GLMs, and show that, for the relevant hyperparameter scaling and correlated covariates, the $L2$ regularization causes a predictable direction change of the coefficient vector. Our results, illustrated by application to linear, logistic, and Cox regression, enable one to correct ML and MAP inferences in GLMs systematically for overfitting bias, and thus extend their applicability into the hitherto forbidden regime $p=O(N)$.
We present the detailed analysis of the spherical s+p spin glass model with two competing interactions: among p spins and among s spins. The most interesting case is the 2+p model with p > 3 for which a very rich phase diagram occurs, including, next to the paramagnetic and the glassy phase represented by the one step replica symmetry breaking ansatz typical of the spherical p-spin model, other two amorphous phases. Transitions between two contiguous phases can also be of different kind. The model can thus serve as mean-field representation of amorphous-amorphous transitions (or transitions between undercooled liquids of different structure). The model is analytically solvable everywhere in the phase space, even in the limit where the infinite replica symmetry breaking ansatz is required to yield a thermodynamically stable phase.
0.820961
0.583112
0.237849
2004.06331
Hadron resonance gas with van der Waals interactions
An overview of a hadron resonance gas (HRG) model that includes van der Waals interactions between hadrons is presented. Applications of the excluded volume HRG model to heavy-ion collision data and lattice QCD equation of state are discussed. A recently developed quantum van der Waals hadron resonance gas model is covered as well. Applications of this model in the context of the QCD critical point are elaborated.
Evidence for the existence of van der Waals loops in pressure p versus volume v plots has for some time supported the belief that melting in two dimensions is a first order phase transition. We report rather accurate equilibrium p(v) curves for systems of hard disks obtained from long Monte Carlo simulations. These curves, obtained in the constant volume ensemble, using periodic boundary conditions, exhibit well defined van der Waals loops. We illustrate their existence for finite systems that are known to undergo a continuous transition in the thermodynamic limit. To this end, we obtain magnetization m versus applied field curves from Monte Carlo simulations of the 2D Ising model, in the constant m ensemble, at the critical point. Whether van der Waals loops for disk systems behave in the thermodynamic limit as they do for the 2D Ising model at the critical point cannot be ruled out. Thus, the often made claim that melting in 2D is a first order phase transition, based on the evidence that van der Waals loops exist, is not sound.
0.912494
0.726301
0.186193
2004.06332
Two-stage model and optimal SI-SNR for monaural multi-speaker speech separation in noisy environment
In daily listening environments, speech is always distorted by background noise, room reverberation and interference speakers. With the developing of deep learning approaches, much progress has been performed on monaural multi-speaker speech separation. Nevertheless, most studies in this area focus on a simple problem setup of laboratory environment, which background noises and room reverberations are not considered. In this paper, we propose a two-stage model based on conv-TasNet to deal with the notable effects of noises and interference speakers separately, where enhancement and separation are conducted sequentially using deep dilated temporal convolutional networks (TCN). In addition, we develop a new objective function named optimal scale-invariant signal-noise ratio (OSI-SNR), which are better than original SI-SNR at any circumstances. By jointly training the two-stage model with OSI-SNR, our algorithm outperforms one-stage separation baselines substantially.
Recognition systems are commonly designed to authenticate users at the access control levels of a system. A number of voice recognition methods have been developed using a pitch estimation process which are very vulnerable in low Signal to Noise Ratio (SNR) environments thus, these programs fail to provide the desired level of accuracy and robustness. Also, most text independent speaker recognition programs are incapable of coping with unauthorized attempts to gain access by tampering with the samples or reference database. The proposed text-independent voice recognition system makes use of multilevel cryptography to preserve data integrity while in transit or storage. Encryption and decryption follow a transform based approach layered with pseudorandom noise addition whereas for pitch detection, a modified version of the autocorrelation pitch extraction algorithm is used. The experimental results show that the proposed algorithm can decrypt the signal under test with exponentially reducing Mean Square Error over an increasing range of SNR. Further, it outperforms the conventional algorithms in actual identification tasks even in noisy environments. The recognition rate thus obtained using the proposed method is compared with other conventional methods used for speaker identification.
0.857377
0.71016
0.147217
2004.06334
Automated Diabetic Retinopathy Grading using Deep Convolutional Neural Network
Diabetic Retinopathy is a global health problem, influences 100 million individuals worldwide, and in the next few decades, these incidences are expected to reach epidemic proportions. Diabetic Retinopathy is a subtle eye disease that can cause sudden, irreversible vision loss. The early-stage Diabetic Retinopathy diagnosis can be challenging for human experts, considering the visual complexity of fundus photography retinal images. However, Early Stage detection of Diabetic Retinopathy can significantly alter the severe vision loss problem. The competence of computer-aided detection systems to accurately detect the Diabetic Retinopathy had popularized them among researchers. In this study, we have utilized a pre-trained DenseNet121 network with several modifications and trained on APTOS 2019 dataset. The proposed method outperformed other state-of-the-art networks in early-stage detection and achieved 96.51% accuracy in severity grading of Diabetic Retinopathy for multi-label classification and achieved 94.44% accuracy for single-class classification method. Moreover, the precision, recall, f1-score, and quadratic weighted kappa for our network was reported as 86%, 87%, 86%, and 91.96%, respectively. Our proposed architecture is simultaneously very simple, accurate, and efficient concerning computational time and space.
We study the adaptation of convolutional neural networks to the complex temporal radio signal domain. We compare the efficacy of radio modulation classification using naively learned features against using expert features which are widely used in the field today and we show significant performance improvements. We show that blind temporal learning on large and densely encoded time series using deep convolutional neural networks is viable and a strong candidate approach for this task especially at low signal to noise ratio.
0.847079
0.66209
0.184989
2004.06335
The Continuity Equation of the Gauduchon Metrics
We study the continuity equation of the Gauduchon metrics and establish its interval of maximal existence, which extends the continuity equation of the K\"ahler metrics introduced by La Nave \& Tian for and of the Hermitian metrics introduced by Sherman \& Weinkove. Our method is based on the solution to the Gauduchon conjecture by Sz\'ekelyhidi, Tosatti \& Weinkove.
We study a Lagrangian numerical scheme for solution of a nonlinear drift diffusion equation on an interval. The discretization is based on the equation's gradient flow structure with respect to the Wasserstein distance. The scheme inherits various properties of the continuous flow, like entropy monotonicity, mass preservation, metric contraction and minimum/maximum principles. As the main result, we give a proof of convergence in the limit of vanishing mesh size under a CFL-type condition. We also present results from numerical experiments.
0.922825
0.668761
0.254064
2004.06336
Anomalous photon thermal Hall effect
We predict an anomalous thermal Hall effect (ATHE) mediated by photons in networks of Weyl semi-metals. Contrary to the photon thermal Hall effect in magneto-optical systems which requires the application of an external magnetic field the ATHE in a Weyl semi-metals network is an intrinsic property of these systems. Since the Weyl semi-metals can exhibit a strong nonreciprocal response in the infrared over a broad spectral range the magnitude of thermal Hall flux in these systems can be relatively large compared to the primary flux. This ATHE paves the way for a directional control of heat flux by localy tuning the magnitude of temperature field without changing the direction of temperature gradient.
We propose a new mechanism for the thermal Hall effect in exchange spin-wave systems, which is induced by the magnon-phonon interaction. Using symmetry arguments, we first show that this effect is quite general, and exists whenever the mirror symmetry in the direction of the magnetization is broken. We then demonstrate our result in a collinear ferromagnet on a square lattice, with perpendicular easy-axis anisotropy and Dzyaloshinskii-Moriya interaction from mirror symmetry breaking. We show that the thermal Hall conductivity is controlled by the resonant contribution from the anti-crossing points between the magnon and phonon branches, and estimate its size to be comparable to that of the magnon mediated thermal Hall effect.
0.858501
0.776624
0.081877
2004.06337
Differentially Private AirComp Federated Learning with Power Adaptation Harnessing Receiver Noise
Over-the-air computation (AirComp)-based federated learning (FL) enables low-latency uploads and the aggregation of machine learning models by exploiting simultaneous co-channel transmission and the resultant waveform superposition. This study aims at realizing secure AirComp-based FL against various privacy attacks where malicious central servers infer clients' private data from aggregated global models. To this end, a differentially private AirComp-based FL is designed in this study, where the key idea is to harness receiver noise perturbation injected to aggregated global models inherently, thereby preventing the inference of clients' private data. However, the variance of the inherent receiver noise is often uncontrollable, which renders the process of injecting an appropriate noise perturbation to achieve a desired privacy level quite challenging. Hence, this study designs transmit power control across clients, wherein the received signal level is adjusted intentionally to control the noise perturbation levels effectively, thereby achieving the desired privacy level. It is observed that a higher privacy level requires lower transmit power, which indicates the tradeoff between the privacy level and signal-to-noise ratio (SNR). To understand this tradeoff more fully, the closed-form expressions of SNR (with respect to the privacy level) are derived, and the tradeoff is analytically demonstrated. The analytical results also demonstrate that among the configurable parameters, the number of participating clients is a key parameter that enhances the received SNR under the aforementioned tradeoff. The analytical results are validated through numerical evaluations.
We formulate and study a cryptographic problem relevant to wireless: a sender, Alice, wants to transmit private messages to two receivers, Bob and Calvin, using unreliable wireless broadcast transmissions and short public feedback from Bob and Calvin. We ask, at what rates can we broadcast the private messages if we also provide (information-theoretic) unconditional security guarantees that Bob and Calvin do not learn each-other's message? We characterize the largest transmission rates to the two receivers, for any protocol that provides unconditional security guarantees. We design a protocol that operates at any rate-pair within the above region, uses very simple interactions and operations, and is robust to misbehaving users.
0.889532
0.699742
0.18979
2004.06338
Transformer based Grapheme-to-Phoneme Conversion
Attention mechanism is one of the most successful techniques in deep learning based Natural Language Processing (NLP). The transformer network architecture is completely based on attention mechanisms, and it outperforms sequence-to-sequence models in neural machine translation without recurrent and convolutional layers. Grapheme-to-phoneme (G2P) conversion is a task of converting letters (grapheme sequence) to their pronunciations (phoneme sequence). It plays a significant role in text-to-speech (TTS) and automatic speech recognition (ASR) systems. In this paper, we investigate the application of transformer architecture to G2P conversion and compare its performance with recurrent and convolutional neural network based approaches. Phoneme and word error rates are evaluated on the CMUDict dataset for US English and the NetTalk dataset. The results show that transformer based G2P outperforms the convolutional-based approach in terms of word error rate and our results significantly exceeded previous recurrent approaches (without attention) regarding word and phoneme error rates on both datasets. Furthermore, the size of the proposed model is much smaller than the size of the previous approaches.
This paper will describe a simulator developed by the authors to explore the design of Fourier transform based multiplication using optics. Then it will demonstrate an application to the problem of constructing an all-optical modular multiplication circuit. That circuit implements a novel approximate version of the Montgomery multiplication algorithm that enables the calculation to be performed entirely in the analog domain. The results will be used to corroborate the feasibility of scaling the design up to 16-bits without the need for analog to digital conversions at intermediate steps.
0.833797
0.559917
0.27388
2004.06339
Local control of improper ferroelectric domains in YMnO$_3$
Improper ferroelectrics are described by two order parameters: a primary one, driving a transition to long-range distortive, magnetic or otherwise non-electric order, and the electric polarization, which is induced by the primary order parameter as a secondary, complementary effect. Using low-temperature scanning probe microscopy, we show that improper ferroelectric domains in YMnO$_3$ can be locally switched by electric field poling. However, subsequent temperature changes restore the as-grown domain structure as determined by the primary lattice distortion. The backswitching is explained by uncompensated bound charges occuring at the newly written domain walls due to the lack of mobile screening charges at low temperature. Thus, the polarization of improper ferroelectrics is in many ways subject to the same electrostatics as in their proper counterparts, yet complemented by additional functionalities arising from the primary order parameter. Tailoring the complex interplay between primary order parameter, polarization, and electrostatics is therefore likely to result in novel functionalities specific to improper ferroelectrics.
We investigate the strain dependence of the ferroelectric polarization and the structure of the ferroelectric domain walls in the layered perovskite-related barium fluorides, BaMF$_4$ (M=Mg, Zn). The unusual "geometric ferroelectricity" in these materials is driven by the softening of a single polar phonon mode consisting of rotations of the MF$_6$ octahedra accompanied by polar displacements of the Ba cations, and in contrast to conventional ferroelectrics involves minimal electronic rehybridization. We therefore anticipate a different strain dependence of the polarization, and alternative domain wall structures compared with those found in conventional ferroelectric materials. Using first-principles calculations based on density functional theory (DFT) within the general gradient approximation (GGA), we calculate the variation of the crystal structure and the ferroelectric polarization under both compressive and tensile strain. We perform structural relaxations of neutral domain walls between oppositely oriented directions of the ferroelectric polarization and calculate their corresponding energies to determine which are most likely to form. We compare our results to literature values for conventional perovskite oxides to provide a source of comparison for understanding the ferroelectric properties of alternative non-oxide materials such as the barium fluorides.
0.907445
0.745834
0.161611
2004.06340
Hierarchical and Modularly-Minimal Vertex Colorings
Cographs are exactly the hereditarily well-colored graphs, i.e., the graphs for which a greedy vertex coloring of every induced subgraph uses only the minimally necessary number of colors $\chi(G)$. We show that greedy colorings are a special case of the more general hierarchical vertex colorings, which recently were introduced in phylogenetic combinatorics. Replacing cotrees by modular decomposition trees generalizes the concept of hierarchical colorings to arbitrary graphs. We show that every graph has a modularly-minimal coloring $\sigma$ satisfying $|\sigma(M)|=\chi(M)$ for every strong module $M$ of $G$. This, in particular, shows that modularly-minimal colorings provide a useful device to design efficient coloring algorithms for certain hereditary graph classes. For cographs, the hierarchical colorings coincide with the modularly-minimal coloring. As a by-product, we obtain a simple linear-time algorithm to compute a modularly-minimal coloring of $P_4$-sparse graphs.
Let $G$ be a simple graph. A total dominator coloring of $G$, is a proper coloring of the vertices of $G$ in which each vertex of the graph is adjacent to every vertex of some color class. The total dominator chromatic (TDC) number $\chi_d^t(G)$ of $G$, is the minimum number of colors among all total dominator coloring of $G$. The neighbourhood corona of two graphs $G_1$ and $G_2$ is denoted by $G_1 \star G_2$ and is the graph obtained by taking one copy of $G_1$ and $|V(G_1)|$ copies of $G_2$, and joining the neighbours of the $i$th vertex of $G_1$ to every vertex in the $i$th copy of $G_2$. In this paper, we study the total dominator chromatic number of the neighbourhood of two graphs and investigate the total dominator chromatic number of $r$-gluing of two graphs. Stability (bondage number) of total dominator chromatic number of $G$ is the minimum number of vertices (edges) of $G$ whose removal changes the TDC-number of $G$. We study the stability and bondage number of certatin graphs.
0.892544
0.757052
0.135492
2004.06341
Stochastic batch size for adaptive regularization in deep network optimization
We propose a first-order stochastic optimization algorithm incorporating adaptive regularization applicable to machine learning problems in deep learning framework. The adaptive regularization is imposed by stochastic process in determining batch size for each model parameter at each optimization iteration. The stochastic batch size is determined by the update probability of each parameter following a distribution of gradient norms in consideration of their local and global properties in the neural network architecture where the range of gradient norms may vary within and across layers. We empirically demonstrate the effectiveness of our algorithm using an image classification task based on conventional network models applied to commonly used benchmark datasets. The quantitative evaluation indicates that our algorithm outperforms the state-of-the-art optimization algorithms in generalization while providing less sensitivity to the selection of batch size which often plays a critical role in optimization, thus achieving more robustness to the selection of regularity.
We consider batch size selection for a general class of multivariate batch means variance estimators, which are computationally viable for high-dimensional Markov chain Monte Carlo simulations. We derive the asymptotic mean squared error for this class of estimators. Further, we propose a parametric technique for estimating optimal batch sizes and discuss practical issues regarding the estimating process. Vector auto-regressive, Bayesian logistic regression, and Bayesian dynamic space-time examples illustrate the quality of the estimation procedure where the proposed optimal batch sizes outperform current batch size selection methods.
0.92836
0.749747
0.178613
2004.06342
openACC. An open database of car-following experiments to study the properties of commercial ACC systems
Commercial Adaptive Cruise Control (ACC) systems are increasingly available as standard options in modern vehicles. At the same time, still little information is openly available on how these systems actually operate and how different is their behavior, depending on the vehicle manufacturer or model.T o reduce this gap, the present paper summarizes the main features of the openACC, an open-access database of different car-following experiments involving a total of 16 vehicles, 11 of which equipped with state-of-the-art commercial ACC systems. As more test campaigns will be carried out by the authors, OpenACC will evolve accordingly. The activity is performed within the framework of the openData policy of the European Commission Joint Research Centre with the objective to engage the whole scientific community towards a better understanding of the properties of ACC vehicles in view of anticipating their possible impacts on traffic flow and prevent possible problems connected to their widespread. A first preliminary analysis on the properties of the 11 ACC systems is conducted in order to showcase the different research topics that can be studied within this open science initiative.
Traffic Congestions and accidents are major concerns in today's transportation systems. This thesis investigates how to optimize traffic flow on highways, in particular for merging situations such as intersections where a ramp leads onto the highway. In our work, cars are equipped with sensors that can detect distance to neighboring cars, and communicate their velocity and acceleration readings with one another. Sensor-enabled cars can locally exchange sensed information about the traffic and adapt their behavior much earlier than regular cars. We propose proactive algorithms for merging different streams of sensor-enabled cars into a single stream. A proactive merging algorithm decouples the decision point from the actual merging point. Sensor-enabled cars allow us to decide where and when a car merges before it arrives at the actual merging point. This leads to a significant improvement in traffic flow as velocities can be adjusted appropriately. We compare proactive merging algorithms against the conventional priority-based merging algorithm in a controlled simulation environment. Experiment results show that proactive merging algorithms outperform the priority-based merging algorithm in terms of flow and delay.
0.884406
0.716165
0.168241
2004.06343
Code Completion using Neural Attention and Byte Pair Encoding
In this paper, we aim to do code completion based on implementing a Neural Network from Li et. al.. Our contribution is that we use an encoding that is in-between character and word encoding called Byte Pair Encoding (BPE). We use this on the source code files treating them as natural text without first going through the abstract syntax tree (AST). We have implemented two models: an attention-enhanced LSTM and a pointer network, where the pointer network was originally introduced to solve out of vocabulary problems. We are interested to see if BPE can replace the need for the pointer network for code completion.
Several B+-tree variants have been developed to exploit the performance potential of byte-addressable non-volatile memory (NVM). In this paper, we attentively investigate the properties of B+-tree and find that, a conventional B+-tree node is a linear structure in which key-value (KV) pairs are maintained from the zero offset of the node. These pairs are shifted in a unidirectional fashion for insertions and deletions. Inserting and deleting one KV pair may inflict a large amount of write amplifications due to shifting KV pairs. This badly impairs the performance of in-NVM B+-tree. In this paper, we propose a novel circular design for B+-tree. With regard to NVM's byte-addressability, our Circ-tree design embraces tree nodes in a circular structure without a fixed base address, and bidirectionally shifts KV pairs in a node for insertions and deletions to minimize write amplifications. We have implemented a prototype for Circ-Tree and conducted extensive experiments. Experimental results show that Circ-Tree significantly outperforms two state-of-the-art in-NVM B+-tree variants, i.e., NV-tree and FAST+FAIR, by up to 1.6x and 8.6x, respectively, in terms of write performance. The end-to-end comparison by running YCSB to KV store systems built on NV-tree, FAST+FAIR, and Circ-Tree reveals that Circ-Tree yields up to 29.3% and 47.4% higher write performance, respectively, than NV-tree and FAST+FAIR.
0.883013
0.634756
0.248257
2004.06344
Model Reduction for the Kuramoto-Sakaguchi Model: The Importance of Non-entrained Rogue Oscillators
The Kuramoto-Sakaguchi model for coupled phase oscillators with phase-frustration is often studied in the thermodynamic limit of infinitely many oscillators. Here we extend a model reduction method based on collective coordinates to capture the collective dynamics of finite size Kuramoto-Sakaguchi models. We find that the inclusion of the effects of rogue oscillators is essential to obtain an accurate description, in contrast to the original Kuramoto model where we show that their effects can be ignored. We further introduce a more accurate ansatz function to describe the shape of synchronized oscillators. Our results from this extended collective coordinate approach reduce in the thermodynamic limit to the well-known mean-field consistency relations. For finite networks we show that our model reduction describes the collective behavior accurately, reproducing the order parameter, the mean frequency of the synchronized cluster, and the size of the cluster at given coupling strength, as well as the critical coupling strength for partial and for global synchronization.
We show that self-organization occurs in the phase dynamics of soliton modelocking in paramet- ric frequency combs. Reduction of the Lugiato-Lefever equation (LLE) to a simpler set of phase equations reveals that this self-organization arises via mechanisms akin to those in the Kuramoto model for synchronization of coupled oscillators. In addition, our simulations show that the phase equations evolve to a broadband phase-locked state, analogous to the soliton formation process in the LLE. Our simplified equations intuitively explain the origin of the pump phase offset in soliton- modelocked parametric frequency combs. They also predict that the phase of the intracavity field undergoes an anti-symmetrization that precedes phase synchronization, and they clarify the role of chaotic states in soliton formation in parametric combs.
0.855002
0.740804
0.114198
2004.06345
Quantum repeater for continuous variable entanglement distribution
Quantum repeaters have been proposed as a way of extending the reach of quantum communication. First generation approaches use entanglement swapping to connect entangled links along a long distance channel. Recently, there have been proposals for first generation quantum repeaters for continuous variables. In this paper, we present an improved continuous variable repeater scheme using fully deterministic optimal Gaussian entanglement swapping. Our scheme uses the noiseless linear amplifier for entanglement distillation. We show that even with the simplest configuration of the noiseless linear amplifier, our scheme beats the PLOB bound for shorter distances and can offer orders of magnitude increases in the secret key rate over previous CV repeater schemes.
We establish a mapping between a continuous variable (CV) quantum system and a discrete quantum system of arbitrary dimension. This opens up the general possibility to perform any quantum information task with a CV system as if it were a discrete system of arbitrary dimension. The Einstein-Podolsky-Rosen state is mapped onto the maximally entangled state in any finite dimensional Hilbert space and thus can be considered as a universal resource of entanglement. As an explicit example of the formalism a two-mode CV entangled state is mapped onto a two-qutrit entangled state.
0.903957
0.78973
0.114227
2004.06346
Scission configuration of $^{239}$U from yields and kinetic information of fission fragments
The simultaneous measurement of the isotopic fission-fragment yields and fission-fragment velocities of $^{239}$U has been performed for the first time. The $^{239}$U fissioning system was produced in one-neutron transfer reactions between a $^{238}$U beam at 5.88 MeV/nucleon and a $^{9}$Be target. The combination of inverse kinematics at low energy and the use of the VAMOS++ spectrometer at the GANIL facility allows the isotopic identification of the full fission-fragment distribution and their velocity in the reference frame of the fissioning system. The proton and neutron content of the fragments at scission, their total kinetic and total excitation energy, as well as the neutron multiplicity were determined. Information from the scission point configuration is obtained from these observables and the correlation between them. The role of the octupole-deformed proton and neutron shells in the fission-fragment production is discussed.
The amount of emitted prompt neutrons from the fission fragments increases as a function of excitation energy. Yet it is not fully understood whether the increase in \nu(A) as a function of E_{n} is mass dependent. The share of excitation energies among the fragments is still under debate, but there are reasons to believe that the excess in neutron emission originates only from the heavy fragments, leaving \nu_{light}(A) almost unchanged. In this work we investigated the consequences of a mass-dependent increase in \nu(A) on the final mass and energy distributions. The assumptions on \nu(A) are essential when analysing measurements based on the 2E-technique. This choice showed to be significant on the measured observables. For example, the post-neutron emission mass yield distribution revealed changes up to 10-30%. The outcome of this work pinpoint the urgent need to determine \nu(A) experimentally, and in particular, how \nu(A) changes as a function of incident-neutron energy. Until then, many fission yields in the data libraries could be largely affected, since they were analysed based on another assumption on the neutron emission.
0.88104
0.818545
0.062495
2004.06347
Anomalous diffusion in Davydov quantum molecular chain model
We discuss anomalous relaxation processes in Davydov one-dimensional chain molecule that consists of an exciton and an acoustic phonon field as a thermal reservoir in the chain. We derive a kinetic equation for the exciton using the complex spectral representation of the Liouville-von Neumann operator. Due to the one-dimensionality, the momentum space separates into infinite sets of disjoint irreducible subspaces dynamically independent of one another. Hence, momentum relaxation occurs only within each subspace toward the Maxwell distribution. We obtain a hydrodynamic mode with transport coefficients, a sound velocity and a diffusion coefficient, defined in each subspace. Moreover, because the sound velocity has momentum dependence, phase mixing affects the broadening of the spatial distribution of the exciton in addition to the diffusion process. Due to the phase mixing the increase rate of the mean-square displacement of the exciton increases linearly with time and diverges in the long-time limit.
We unravel a new mechanism to describe the non-Arrhenius anomalous fast diffusion observed in the bcc phase of group IIIB and IVB metals from first-principles. The "phonon-assisted" mechanism incorporates the anharmonic phonon-phonon coupling effects into the vacancy-mediated diffusive jump description. We describe the effective jump frequency as the 2/3L<111> phonon frequency which coincides with the diffusive jump in the bcc phase of pure metals. We combine ab initio molecular dynamics with lattice dynamics calculations to perform temperature-dependent phonon analysis in a temperature range where bcc Ti is stabilized due to entropic effects arising from anharmonic lattice vibration.
0.858504
0.73772
0.120784
2004.06348
Distributed Privacy Preserving Iterative Summation Protocols
In this paper, we study the problem of summation evaluation of secrets. The secrets are distributed over a network of nodes that form a ring graph. Privacy-preserving iterative protocols for computing the sum of the secrets are proposed, which are compatible with node join and leave situations. Theoretic bounds are derived regarding the utility and accuracy, and the proposed protocols are shown to comply with differential privacy requirements. Based on utility, accuracy and privacy, we also provide guidance on appropriate selections of random noise parameters. Additionally, a few numerical examples that demonstrate their effectiveness are provided.
How to query a dataset in the way of preserving the privacy of individuals whose data is included in the dataset is an important problem. The information privacy model, a variant of Shannon's information theoretic model to the encryption systems, protects the privacy of an individual by controlling the amount of information of the individual's data obtained by each adversary from the query's output. This model also assumes that each adversary's uncertainty to the queried dataset is not so small in order to improve the data utility. In this paper, we prove some results to the group privacy and the composition privacy properties of this model, where the group privacy ensures a group of individuals' privacy is preserved, and where the composition privacy ensures multiple queries also preserve the privacy of an individual. Explicitly, we reduce the proof of the two properties to the estimation of the difference of two channel capacities. Our proofs are greatly benefited from some information-theoretic tools and approaches.
0.89954
0.78499
0.11455
2004.06349
Channel-Dependent Scheduling in Wireless Energy Transfer for Mobile Devices
Resonant Beam Charging (RBC) is the Wireless Power Transfer (WPT) technology, which can provide high-power, long-distance, mobile, and safe wireless charging for Internet of Things (IoT) devices. Supporting multiple IoT devices charging simultaneously is a significant feature of the RBC system. To optimize the multi-user charging performance, the transmitting power should be scheduled for charging all IoT devices simultaneously. In order to keep all IoT devices working as long as possible for fairness, we propose the First Access First Charge (FAFC) scheduling algorithm. Then, we formulate the scheduling parameters quantitatively for algorithm implementation. Finally, we analyze the performance of FAFC scheduling algorithm considering the impacts of the receiver number, the transmitting power and the charging time. Based on the analysis, we summarize the methods of improving the WPT performance for multiple IoT devices, which include limiting the receiver number, increasing the transmitting power, prolonging the charging time and improving the single-user's charging efficiency. The FAFC scheduling algorithm design and analysis provide a fair WPT solution for the multi-user RBC system.
During the last years, many improvements were made to the hardware capability of mobile devices. As mobile software also became more interactive and data processing intensive, the increased power demand could not be compensated by the improvements on battery technology. Adaptive systems can help to balance the demand of applications with the limitations of battery resources. For effective systems, the influence of multimedia quality on power consumption of the components of mobile devices needs to be better understood. In this paper, we analyze the impact of video quality and wireless network type on the energy consumption of a mobile device. We have found that the additional power consumption is up to 38% higher when a movie is played over a WiFi network instead from internal memory and 64% higher in case of a mobile network (3G). We have also discovered that a higher movie quality not only affects the power consumption of the CPU but also the power consumption of the WiFi unit by up to 58% and up to 72% respectively on mobile networks.
0.778632
0.715775
0.062857
2004.06350
Study of the transcendence of a family of generalized continued fractions
We study a family of generalized continued fractions, which are defined by a pair of substitution sequences in a finite alphabet. We prove that they are stammering sequences, in the sense of Adamczewski and Bugeaud. We also prove that this family consists of transcendental numbers which are not Liouvillian. We explore the partial quotients of their regular continued fraction expansions, arriving at no conclusion concerning their boundedness.
The algebra of exponential fields and their extensions is developed. The focus is on ELA-fields, which are algebraically closed with a surjective exponential map. In this context, finitely presented extensions are defined, it is shown that finitely generated strong extensions are finitely presented, and these extensions are classified. An algebraic construction is given of Zilber's pseudo-exponential fields. As applications of the general results and methods of the paper, it is shown that Zilber's fields are not model-complete, answering a question of Macintyre, and a precise statement is given explaining how Schanuel's conjecture answers all transcendence questions about exponentials and logarithms. Connections with the Kontsevich-Zagier, Grothendieck, and Andr\'e transcendence conjectures on periods are discussed, and finally some open problems are suggested.
0.876007
0.784521
0.091485
2004.06351
Global propagator for the massless Dirac operator and spectral asymptotics
We construct the propagator of the massless Dirac operator $W$ on a closed Riemannian 3-manifold as the sum of two invariantly defined oscillatory integrals, global in space and in time, with distinguished complex-valued phase functions. The two oscillatory integrals -- the positive and the negative propagators -- correspond to positive and negative eigenvalues of $W$, respectively. This enables us to provide a global invariant definition of the full symbols of the propagators (scalar matrix-functions on the cotangent bundle), a closed formula for the principal symbols and an algorithm for the explicit calculation of all their homogeneous components. Furthermore, we obtain small time expansions for principal and subprincipal symbols of the propagators in terms of geometric invariants. Lastly, we use our results to compute the third local Weyl coefficients in the asymptotic expansion of the eigenvalue counting functions of $W$.
This paper deals with the massive three-dimensional Dirac operator coupled with a Lorentz scalar shell interaction supported on a compact smooth surface. The rigorous definition of the operator involves suitable transmission conditions along the surface. After showing the self-adjointness of the resulting operator we switch to the investigation of its spectral properties, in particular, to the existence and non-existence of eigenvalues. In the case of an attractive coupling, we study the eigenvalue asymptotics as the mass becomes large and show that the behavior of the individual eigenvalues and their total number are governed by an effective Schr\"odinger operator on the boundary with an external Yang-Mills potential and a curvature-induced potential.
0.885361
0.828516
0.056845
2004.06352
Lenstool-HPC: A High Performance Computing based mass modelling tool for cluster-scale gravitational lenses
With the upcoming generation of telescopes, cluster scale strong gravitational lenses will act as an increasingly relevant probe of cosmology and dark matter. The better resolved data produced by current and future facilities requires faster and more efficient lens modeling software. Consequently, we present Lenstool-HPC, a strong gravitational lens modeling and map generation tool based on High Performance Computing (HPC) techniques and the renowned Lenstool software. We also showcase the HPC concepts needed for astronomers to increase computation speed through massively parallel execution on supercomputers. Lenstool-HPC was developed using lens modelling algorithms with high amounts of parallelism. Each algorithm was implemented as a highly optimised CPU, GPU and Hybrid CPU-GPU version. The software was deployed and tested on the Piz Daint cluster of the Swiss National Supercomputing Centre (CSCS). Lenstool-HPC perfectly parallel lens map generation and derivative computation achieves a factor 30 speed-up using only 1 GPUs compared to Lenstool. Lenstool-HPC hybrid Lens-model fit generation tested at Hubble Space Telescope precision is scalable up to 200 CPU-GPU nodes and is faster than Lenstool using only 4 CPU-GPU nodes.
The advent of new deep+wide photometric lensing surveys will open up the possibility of direct measurements of the dark matter halos of dwarf galaxies. The HSC wide survey will be the first with the statistical capability of measuring the lensing signal with high signal-to-noise at log(M*)=8. At this same mass scale, LSST will have the most overall constraining power with a predicted signal-to-noise for the galaxy-galaxy lensing signal around dwarfs of SN=200. WFIRST and LSST will have the greatest potential to push below the log(M*) = 7 mass scale thanks to the depth of their imaging data. Studies of the dark matter halos of dwarf galaxies at z=0.1 with gravitational lensing are soon within reach. However, further work will be required to develop optimized strategies for extracting dwarfs samples from these surveys, determining redshifts, and accurately measuring lensing on small radial scales. Dwarf lensing will be a new and powerful tool to constrain the halo masses and inner density slopes of dwarf galaxies and to distinguish between baryonic feedback and modified dark matter scenarios.
0.898974
0.727754
0.17122
2004.06353
Knowledge Elicitation using Deep Metric Learning and Psychometric Testing
Knowledge present in a domain is well expressed as relationships between corresponding concepts. For example, in zoology, animal species form complex hierarchies; in genomics, the different (parts of) molecules are organized in groups and subgroups based on their functions; plants, molecules, and astronomical objects all form complex taxonomies. Nevertheless, when applying supervised machine learning (ML) in such domains, we commonly reduce the complex and rich knowledge to a fixed set of labels, and induce a model shows good generalization performance with respect to these labels. The main reason for such a reductionist approach is the difficulty in eliciting the domain knowledge from the experts. Developing a label structure with sufficient fidelity and providing comprehensive multi-label annotation can be exceedingly labor-intensive in many real-world applications. In this paper, we provide a method for efficient hierarchical knowledge elicitation (HKE) from experts working with high-dimensional data such as images or videos. Our method is based on psychometric testing and active deep metric learning. The developed models embed the high-dimensional data in a metric space where distances are semantically meaningful, and the data can be organized in a hierarchical structure. We provide empirical evidence with a series of experiments on a synthetically generated dataset of simple shapes, and Cifar 10 and Fashion-MNIST benchmarks that our method is indeed successful in uncovering hierarchical structures.
In this work, we propose a straightforward method to derive Elliptic Curve Digital Signature Algorithm (ECDSA) key pairs from embeddings created using Deep Learning and Metric Learning approaches. We also show that these keys allows the derivation of cryptocurrencies (such as Bitcoin) addresses that can be used to transfer and receive funds, allowing novel Blockchain-based applications that can be used to transfer funds or data directly to domains such as image, text, sound or any other domain where Deep Learning can extract high-quality embeddings; providing thus a novel integration between the properties of the Blockchain-based technologies such as trust minimization and decentralization together with the high-quality learned representations from Deep Learning techniques.
0.750142
0.619352
0.13079
2004.06354
A Linux Kernel Scheduler Extension for Multi-core Systems
The Linux kernel is mostly designed for multi-programed environments, but high-performance applications have other requirements. Such applications are run standalone, and usually rely on runtime systems to distribute the application's workload on worker threads, one per core. However, due to current OSes limitations, it is not feasible to track whether workers are actually running or blocked due to, for instance, a requested resource. For I/O intensive applications, this leads to a significant performance degradation given that the core of a blocked thread becomes idle until it is able to run again. In this paper, we present the proof-of-concept of a Linux kernel extension denoted User-Monitored Threads (UMT) which tackles this problem. Our extension allows a user-space process to be notified of when the selected threads become blocked or unblocked, making it possible for a runtime to schedule additional work on the idle core. We implemented the extension on the Linux Kernel 5.1 and adapted the Nanos6 runtime of the OmpSs-2 programming model to take advantage of it. The whole prototype was tested on two applications which, on the tested hardware and the appropriate conditions, reported speedups of almost 2x.
We study an uplink multi secondary user (SU) cognitive radio system suffering statistical heterogeneity among SUs' channels. This heterogeneity may result in differentiated delay performances to these SUs and result in harmful interference to the PU. We first derive an explicit closed-form expression for the average delay in terms of an arbitrary power-control policy. Then, we propose a delay-optimal closed-form scheduling and power-control policy that can provide the required average delay guarantees to all SUs besides protecting the PU from harmful interference. We support our findings by extensive system simulations and show that it outperforms existing policies substantially.
0.801119
0.598921
0.202197
2004.06355
On the interplay between physical and content priors in deep learning for computational imaging
Deep learning (DL) has been applied extensively in many computational imaging problems, often leading to superior performance over traditional iterative approaches. However, two important questions remain largely unanswered: first, how well can the trained neural network generalize to objects very different from the ones in training? This is particularly important in practice, since large-scale annotated examples similar to those of interest are often not available during training. Second, has the trained neural network learnt the underlying (inverse) physics model, or has it merely done something trivial, such as memorizing the examples or point-wise pattern matching? This pertains to the interpretability of machine-learning based algorithms. In this work, we use the Phase Extraction Neural Network (PhENN), a deep neural network (DNN) for quantitative phase retrieval in a lensless phase imaging system as the standard platform and show that the two questions are related and share a common crux: the choice of the training examples. Moreover, we connect the strength of the regularization effect imposed by a training set to the training process with the Shannon entropy of images in the dataset. That is, the higher the entropy of the training images, the weaker the regularization effect can be imposed. We also discover that weaker regularization effect leads to better learning of the underlying propagation model, i.e. the weak object transfer function, applicable for weakly scattering objects under the weak object approximation. Finally, simulation and experimental results show that better cross-domain generalization performance can be achieved if DNN is trained on a higher-entropy database, e.g. the ImageNet, than if the same DNN is trained on a lower-entropy database, e.g. MNIST, as the former allows the underlying physics model be learned better than the latter.
E-Learning uses electronic media, information & communication technologies to provide education to the masses. E-learning deliver hypertext, text, audio, images, animation and videos using desktop standalone computer, local area network based intranet and internet based contents. While producing an e-learning content or course-ware, a major decision making factor is whether to use audio for the benefit of the end users. Generally, three types of audio can be used in e-learning: narration, music and sound effect. This paper shows that the use of proper audio based on contents type and subject can make the content more interesting as well as help the end users to better understand the contents.
0.777873
0.538163
0.23971
2004.06356
Direct measurement of interfacial Dzyaloshinskii-Moriya interaction at the few-layer MoS$_{\rm 2}$/Ni$_{80}$Fe$_{20}$ interface
We report on a direct measurement of sizable interfacial Dzyaloshinskii-Moriya interaction (iDMI) at the interface of two-dimensional transition metal dichalcogenide (2D-TMD), MoS$_{\rm 2}$ and Ni$_{80}$Fe$_{20}$ (Py) using Brillouin light scattering spectroscopy. A clear asymmetry in spin-wave dispersion is measured in MoS$_{\rm 2}$/Py/Ta, while no such asymmetry is detected in the reference Py/Ta system. A linear scaling of the DMI constant with the inverse of Py thickness indicates the interfacial origin of the observed DMI. We further observe an enhancement of DMI constant in 3-4 layer MoS$_{\rm 2}$/Py system (by 58$\%$) as compared to 2 layer MoS$_{\rm 2}$/Py which is caused by a higher density of MoO$_{\rm 3}$ defect species in the case of 3-4 layer MoS$_{\rm 2}$. The results open possibilities of spin-orbitronic applications utilizing the 2D-TMD based heterostructures.
We have investigated the topological Hall effect (THE) in MnGa/Pt and MnGa/Ta bilayers induced by interfacial Dzyaloshinskii-Moriya interaction (DMI). The most evident THE signals have been found based on the MnGa films with small critical DMI energy constant Dc. The large topological portion of the Hall signal from the total Hall signal has been extracted in the whole temperature range from 5 to 300 K. These results open up the exploration of the DMI induced magnetic behavior based on the bulk perpendicular magnetic anisotropy materials for fundamental physics and magnetic storage technologies.
0.908192
0.783028
0.125164
2004.06357
Connecting shear localization with the long-range correlated polarized stress fields in granular materials
Understanding the connection between the inherent structural characteristics of amorphous solids and their dynamical responses, is essential in physics and material sciences and is equally vital in geotechnical and civil engineering, and geophysics. Here we discover a deep connection between shear localization, the self-organized cooperative particle rearrangements, and the intrinsic structures of internal stresses in an isotropically jammed granular material subject to pure shear. The system consists of bi-disperse photoelastic disks, permitting internal stress measurement and single-particle tracking. Specifically, we find strong (anti)correlations between the micro shear bands and the two polarized stress fields along the two directions of maximal shear. By exploring the tensorial characteristics and the rotational symmetry of force network, we further discover that those long-range correlated polarized stress fields form a condensate with a continuous rotation symmetry. Hence, we reveal that the profound connection between the structure and dynamics is a result of the spontaneous symmetry breaking of the condensate, providing a novel mechanism to understand the emergent behavior of shear localization. Finally, we provide the first experimental evidence of long-range correlated inherent shear stress in an isotropically jammed granular system.
A heterogeneous brittle material characterized by a random field of local toughness Kc(x) can be represented by an equivalent homogeneous medium of toughness, Keff. Homogenization refers to a process of estimating Keff from the local field Kc(x). An approach based on a perturbative expansion of the stress intensity factor along a rough crack front shows the occurrence of different regimes depending on the correlation length of the local toughness field in the direction of crack propagation. A `"weak pinning" regime takes place for long correlation lengths, where the effective toughness is the average of the local toughness. For shorter correlation lengths, a transition to "strong pinning" occurs leading to a much higher effective toughness, and characterized by a propagation regime consisting in jumps between pinning configurations.
0.880982
0.788335
0.092647
2004.06358
Speech Translation and the End-to-End Promise: Taking Stock of Where We Are
Over its three decade history, speech translation has experienced several shifts in its primary research themes; moving from loosely coupled cascades of speech recognition and machine translation, to exploring questions of tight coupling, and finally to end-to-end models that have recently attracted much attention. This paper provides a brief survey of these developments, along with a discussion of the main challenges of traditional approaches which stem from committing to intermediate representations from the speech recognizer, and from training cascaded models separately towards different objectives. Recent end-to-end modeling techniques promise a principled way of overcoming these issues by allowing joint training of all model components and removing the need for explicit intermediate representations. However, a closer look reveals that many end-to-end models fall short of solving these issues, due to compromises made to address data scarcity. This paper provides a unifying categorization and nomenclature that covers both traditional and recent approaches and that may help researchers by highlighting both trade-offs and open research questions.
Speech enhancement model is used to map a noisy speech to a clean speech. In the training stage, an objective function is often adopted to optimize the model parameters. However, in most studies, there is an inconsistency between the model optimization criterion and the evaluation criterion on the enhanced speech. For example, in measuring speech intelligibility, most of the evaluation metric is based on a short-time objective intelligibility (STOI) measure, while the frame based minimum mean square error (MMSE) between estimated and clean speech is widely used in optimizing the model. Due to the inconsistency, there is no guarantee that the trained model can provide optimal performance in applications. In this study, we propose an end-to-end utterance-based speech enhancement framework using fully convolutional neural networks (FCN) to reduce the gap between the model optimization and evaluation criterion. Because of the utterance-based optimization, temporal correlation information of long speech segments, or even at the entire utterance level, can be considered when perception-based objective functions are used for the direct optimization. As an example, we implement the proposed FCN enhancement framework to optimize the STOI measure. Experimental results show that the STOI of test speech is better than conventional MMSE-optimized speech due to the consistency between the training and evaluation target. Moreover, by integrating the STOI in model optimization, the intelligibility of human subjects and automatic speech recognition (ASR) system on the enhanced speech is also substantially improved compared to those generated by the MMSE criterion.
0.872864
0.723019
0.149845
2004.06359
Trans-iron Ge, As, Se, and heavier elements in the dwarf metal-poor stars, HD~19445, HD~84937, HD~94028, HD~140283, and HD~160617
Spectra of unevolved metal-poor halo stars uniquely reflect the elemental abundances incorporated during the earliest Galactic epoch. Their heavy-element content is well understood as the products of neutron capture on iron-peak elements. However, the lightest elements just past the iron peak, with atomic number 30<Z<52, show striking abundance patterns open to several interpretations. Understanding their nature may illuminate the diverse halo, thick disk, or extragalactic origins of metal-poor stars. For five metal-poor dwarfs, we analyzed high-resolution echelle UV spectra from the Hubble Space Telescope Imaging Spectrograph, as well as archival optical echelle spectra. The goal was to derive reliable halo dwarf abundances and uncertainties for six trans-iron elements from UV spectra, and optical abundances for four additional trans-Fe elements and two well-understood heavier elements. Our two independent analyses showed that the largest source of discrepancy is UV continuum placement. Once rectified, the internal results agree to 0.2 dex for moderately-unblended, moderately strong lines. Our results similarly agree with previous work, except where new data and unidentified Fe I lines are important. We show that these heavily congregate blueward of 2000A and redward of 2600A. Our exclusion of trans-Fe lines blended by such lines proved critical for arsenic. A metallicity-dependent odd-even effect is uncovered among trans-Fe elements: an odd-Z element abundance is depressed relative to those of adjacent even-Z elements, especially at low metallicity. This is supported by previous studies of Sr-Y-Zr, and also appears in some theoretical calculations. To date, no calculations predict the high Mo/Ge ratio, independent of Mo/Fe, that we find in all five stars.
In order to distinguish between regular and chaotic planetary orbits we apply a new technique called MEGNO in a wide neighbourhood of orbital parameters determined using standard two-body Keplerian fits for HD 12661, HD 38529, HD 37124 and HD 160691 planetary systems. We show that the currently announced orbital parameters place these systems in very different situations from the point of view of dynamical stability. While HD 38529 and HD 37124 are located within large stability zones in the phase space around their determined orbits, the preliminary orbits in HD 160691 are highly unstable. The orbital parameters of the HD 12661 planets are located in a border region between stable and unstable dynamical regimes, so while its currently determined orbital parameters produce stable regular orbits, a minor change within the margin of error of just one parameter may result in a chaotic dynamical system.
0.855289
0.641825
0.213464
2004.06360
Simultaneous Diagonalization via congruence of matrices and some applications in optimization
Simultaneous diagonalization via congruence (SDC) of matrices has been a long standing problem [Potpourri of conjectures and open questions in nonlinear analysis and optimization, SIAM Rev., 49 (2007), pp. 255-273]. The best attempts so far can only deal with the problem for two matrices and for more than two matrices under the existence assumption of a semidefinite matrix pencil [Jiang, R., Duan, L.: Simultaneous diagonalization of matrices and its applications in quadratically constrained quadratic programming, SIAM J. Optim. Vol. 26, No. 3, 1649-1668 (2016)]. In this paper, the problem will be solved for any number of real symmetric matrices without any assumption. We first propose necessary and sufficient SDC conditions in case at least one of the matrices is nonsingular. If all the matrices are singular, we show that the matrices can always be decomposed into diagonal blocks such that the SDC of given matrices is then equivalently transferred to the SDC of the sub-matrices. Importantly, the sub-matrices now contain at least one nonsingular matrix. Two important applications of the SDC for quadratically constrained quadratic programming problems and maximizing a sum of generalized Rayleigh quotients will be introduced.
The high-order relations between the content in social media sharing platforms are frequently modeled by a hypergraph. Either hypergraph Laplacian matrix or the adjacency matrix is a big matrix. Randomized algorithms are used for low-rank factorizations in order to approximately decompose and eventually invert such big matrices fast. Here, block randomized Singular Value Decomposition (SVD) via subspace iteration is integrated within adaptive hypergraph weight estimation for image tagging, as a first approach. Specifically, creating low-rank submatrices along the main diagonal by tessellation permits fast matrix inversions via randomized SVD. Moreover, a second approach is proposed for solving the linear system in the optimization problem of hypergraph learning by employing the conjugate gradient method. Both proposed approaches achieve high accuracy in image tagging measured by F1 score and succeed to reduce the computational requirements of adaptive hypergraph weight estimation.
0.911268
0.744866
0.166402
2004.06361
Modelling and docking of Indian SARS-CoV-2 spike protein 1 with ACE2: implications for co-morbidity and therapeutic intervention
Presently, India bears amongst the highest burden of non-communicable diseases such as diabetes mellitus (DM), hypertension (HT), and cardio vascular disease (CVD) and thus represents a vulnerable target to the SARS-CoV-2/COVID-19 pandemic. Involvement of the angiotensin converting enzyme 2 (ACE2) in susceptibility to infection and pathogenesis by SARS-CoV-2 is currently an actively pursued research area. An increased susceptibility to infection in individuals with DM, HT and CVD together with higher levels of circulating ACE2 in these settings presents a scenario where interaction with soluble ACE2 may result in disseminated virus-receptor complexes that could enhance virus acquisition and pathogenesis. Thus, understanding the SARS-CoV-2 receptor binding domain-ACE2 interaction, both membrane bound and in the cell free context may contribute to elucidating the role of co-morbidities in increased susceptibility to infection and pathogenesis. Both Azithromycin and Hydroxychloroquine (HCQ) have shown efficacy in mitigating viral carriage in infected individuals. Furthermore, each of these compounds generate active metabolites which in turn may also modulate virus-receptor interaction and thus influence clinical outcomes. In this study, we model the structural interaction of S1 with both full-length and soluble ACE2. Additionally, therapeutic drugs and their active metabolites were docked with soluble ACE2 protein. Our results show that S1 from either of the reported Indian sequences can bind both full-length and soluble ACE2, albeit with varying affinity that can be attributed to a reported substitution in the RBD. Furthermore, both Azythromycin and HCQ together with their active metabolites can allosterically affect, to a range of extents, binding of S1 to ACE2.
The osmotic virial coefficient $B_2$ of globular protein solutions is calculated as a function of added salt concentration at fixed pH by computer simulations of the ``primitive model''. The salt and counter-ions as well as a discrete charge pattern on the protein surface are explicitly incorporated. For parameters roughly corresponding to lysozyme, we find that $B_2$ first decreases with added salt concentration up to a threshold concentration, then increases to a maximum, and then decreases again upon further raising the ionic strength. Our studies demonstrate that the existence of a discrete charge pattern on the protein surface profoundly influences the effective interactions and that non-linear Poisson Boltzmann and Derjaguin-Landau-Verwey-Overbeek (DLVO) theory fail for large ionic strength. The observed non-monotonicity of $B_2$ is compared to experiments. Implications for protein crystallization are discussed.
0.846162
0.643153
0.203009
2004.06363
Particle Gibbs Sampling for Bayesian Phylogenetic inference
The combinatorial sequential Monte Carlo (CSMC) has been demonstrated to be an efficient complementary method to the standard Markov chain Monte Carlo (MCMC) for Bayesian phylogenetic tree inference using biological sequences. It is appealing to combine the CSMC and MCMC in the framework of the particle Gibbs (PG) sampler to jointly estimate the phylogenetic trees and evolutionary parameters. However, the Markov chain of the particle Gibbs may mix poorly if the underlying SMC suffers from the path degeneracy issue. Some remedies, including the particle Gibbs with ancestor sampling and the interacting particle MCMC, have been proposed to improve the PG. But they either cannot be applied to or remain inefficient for the combinatorial tree space. We introduce a novel CSMC method by proposing a more efficient proposal distribution. It also can be combined into the particle Gibbs sampler framework to infer parameters in the evolutionary model. The new algorithm can be easily parallelized by allocating samples over different computing cores. We validate that the developed CSMC can sample trees more efficiently in various particle Gibbs samplers via numerical experiments. Our implementation is available at https://github.com/liangliangwangsfu/phyloPMCMC
We consider the inference of the structure of an undirected graphical model in an exact Bayesian framework. More specifically we aim at achieving the inference with close-form posteriors, avoiding any sampling step. This task would be intractable without any restriction on the considered graphs, so we limit our exploration to mixtures of spanning trees. We consider the inference of the structure of an undirected graphical model in a Bayesian framework. To avoid convergence issues and highly demanding Monte Carlo sampling, we focus on exact inference. More specifically we aim at achieving the inference with close-form posteriors, avoiding any sampling step. To this aim, we restrict the set of considered graphs to mixtures of spanning trees. We investigate under which conditions on the priors - on both tree structures and parameters - exact Bayesian inference can be achieved. Under these conditions, we derive a fast an exact algorithm to compute the posterior probability for an edge to belong to {the tree model} using an algebraic result called the Matrix-Tree theorem. We show that the assumption we have made does not prevent our approach to perform well on synthetic and flow cytometry data.
0.877566
0.779414
0.098152
2004.06364
Polar nano-clusters in nominally paraelectric ceramics demonstrating high microwave tunability for wireless communication
Dielectric materials, with high tunability at microwave frequencies, are key components in the design of microwave communication systems. Dense Ba0.6Sr0.4TiO3 (BST) ceramics, with different grain sizes, were prepared in order to optimise the dielectric tunability via polar nano cluster effects. Dielectric permittivity and loss measurements were carried at both high and low frequencies and were supported by results from X-ray powder diffraction, scanning and transmission electron microscopies, Raman spectroscopy and piezoresponse force microscopy. The concentration of polar nano clusters, whose sizes are found to be in the range 20 to 50 nm, and the dielectric tunability increase with increasing grain size. A novel method for measurement of the microwave tunability in bulk dielectrics is presented. The highest tunability of 32% is achieved in ceramics with an average grain size of 10 um. The tunability of BST ceramics with applied DC field is demonstrated in a prototype small resonant antenna.
We realize quantum gates for path qubits with a high-speed, polarization-independent and tunable beam splitter. Two electro-optical modulators act in a Mach-Zehnder interferometer as high-speed phase shifters and rapidly tune its splitting ratio. We test its performance with heralded single photons, observing a polarization-independent interference contrast above 95%. The switching time is about 5.6 ns, and a maximal repetition rate is 2.5 MHz. We demonstrate tunable feed-forward operations of a single-qubit gate of path-encoded qubits and a two-qubit gate via measurement-induced interaction between two photons.
0.867977
0.635526
0.232451
2004.06365
An updated discussion of the solar abundance problem
We discuss the level of agreement of a new generation of standard solar models (SSMs), Barcelona 2016 or B16 for short, with helioseismic and solar neutrino data, confirming that models implementing the AGSS09met surface abundances, based on refined three-dimensional hydrodynamical simulations of the solar atmosphere, do not not reproduce helioseismic constraints. We clarify that this solar abundance problem can be equally solved by a change of the composition and/or of the opacity of the solar plasma, since effects produced by variations of metal abundances are equivalent to those produced by suitable modifications of the solar opacity profile. We discuss the importance of neutrinos produced in the CNO cycle for removing the composition-opacity degeneracy and the perspectives for their future detection.
Using the HST Goddard High Resolution Spectrograph (GHRS), we have obtained high S/N echelle observations of the weak interstellar N I 1160, 1161 A absorption doublet toward the stars Gamma Cas, Lambda Ori, Iota Ori, Kappa Ori, Delta Sco, and Kappa Sco. In combination with a previous GHRS measurement of N I toward Zeta Oph, these new observations yield a mean interstellar gas phase nitrogen abundance (per 10$^6$ H atoms) of 10$^6$ N/H = 75 +/- 4. There are no statistically significant variations in the measured N abundances from sightline to sightline and no evidence of density-dependent depletion from the gas-phase. Since N is not expected to be depleted much into dust grains in these diffuse sightlines, its gas-phase abundance should reflect the total interstellar abundance. Consequently, the GHRS observations imply that the abundance of interstellar nitrogen (gas plus grains) in the local Milky Way is about 80% of the solar system value of 10$^6$ N/H = 93 +/- 16. Although this interstellar abundance deficit is somewhat less than that recently found for oxygen and krypton with GHRS, the solar N abundance and the N I oscillator strengths are too uncertain to definitively rule out either a solar ISM N abundance or a 2/3 solar ISM N abundance similar to that of O and Kr.
0.82839
0.745628
0.082761
2004.06366
Simple Multi-Resolution Representation Learning for Human Pose Estimation
Human pose estimation - the process of recognizing human keypoints in a given image - is one of the most important tasks in computer vision and has a wide range of applications including movement diagnostics, surveillance, or self-driving vehicle. The accuracy of human keypoint prediction is increasingly improved thanks to the burgeoning development of deep learning. Most existing methods solved human pose estimation by generating heatmaps in which the ith heatmap indicates the location confidence of the ith keypoint. In this paper, we introduce novel network structures referred to as multiresolution representation learning for human keypoint prediction. At different resolutions in the learning process, our networks branch off and use extra layers to learn heatmap generation. We firstly consider the architectures for generating the multiresolution heatmaps after obtaining the lowest-resolution feature maps. Our second approach allows learning during the process of feature extraction in which the heatmaps are generated at each resolution of the feature extractor. The first and second approaches are referred to as multi-resolution heatmap learning and multi-resolution feature map learning respectively. Our architectures are simple yet effective, achieving good performance. We conducted experiments on two common benchmarks for human pose estimation: MS-COCO and MPII dataset.
This study presents a new network (i.e., PoseLifter) that can lift a 2D human pose to an absolute 3D pose in a camera coordinate system. The proposed network estimates the absolute 3D location of a target subject and generates an improved 3D relative pose estimation compared with existing pose-lifting methods. Using the PoseLifter with a 2D pose estimator in a cascade fashion can estimate a 3D human pose from a single RGB image. In this case, we empirically prove that using realistic 2D poses synthesized with the real error distribution of 2D body joints considerably improves the performance of our PoseLifter. The proposed method is applied to public datasets to achieve state-of-the-art 2D-to-3D pose lifting and 3D human pose estimation.
0.841674
0.761271
0.080403
2004.06367
Enumerating Chemical Graphs with Mono-block 2-Augmented Tree Structure from Given Upper and Lower Bounds on Path Frequencies
We consider a problem of enumerating chemical graphs from given constraints concerning their structures, which has an important application to a novel method for the inverse QSAR/QSPR recently proposed. In this paper, the structure of a chemical graph is specified by a feature vector each of whose entries represents the frequency of a prescribed path. We call a graph a 2-augmented tree if it is obtained from a tree (an acyclic graph) by adding edges between two pairs of nonadjacent vertices. Given a set of feature vectors as the interval between upper and lower bounds of feature vectors, we design an efficient algorithm for enumerating chemical 2-augmented trees that satisfy the path frequency specified by some feature vector in the set. We implemented the proposed algorithm and conducted some computational experiments.
Improved upper and lower bounds on the number of square-free ternary words are obtained. The upper bound is based on the enumeration of square-free ternary words up to length 110. The lower bound is derived by constructing generalised Brinkhuis triples. The problem of finding such triples can essentially be reduced to a combinatorial problem, which can efficiently be treated by computer. In particular, it is shown that the number of square-free ternary words of length n grows at least as 65^(n/40), replacing the previous best lower bound of 2^(n/17).
0.897391
0.749636
0.147755
2004.06368
Managing Industrial Communication Delays with Software-Defined Networking
Recent technological advances have fostered the development of complex industrial cyber-physical systems which demand real-time communication with delay guarantees. The consequences of delay requirement violation in such systems may become increasingly severe. In this paper, we propose a contract-based fault-resilient methodology which aims at managing the communication delays of real-time flows in industries. With this objective, we present a light-weight mechanism to estimate end-to-end delay in the network in which the clocks of the switches are not synchronized. The mechanism aims at providing high level of accuracy with lower communication overhead. We then propose a contract-based framework using software-defined networking where the components are associated with delay contracts and a resilience manager. The proposed resilience management framework contains: (1) contracts which state guarantees about components behaviors, (2) observers which are responsible to detect contract failure (fault), (3) monitors to detect events such as run-time changes in the delay requirements and link failure, (4) control logic to take suitable decisions based on the type of the fault, (5) resilience manager to decide response strategies containing the best course of action as per the control logic decision. Finally, we present a delay-aware path finding algorithm which is used to route/reroute the real-time flows to provide resiliency in the case of faults and, to adapt to the changes in the network state. Performance of the proposed framework is evaluated with the Ryu SDN controller and Mininet network emulator.
Heterogeneous networks (HetNets) as a combination of macro cells and small cells are used to increase the cellular network's capacity, and present a perfect solution for high-speed communications. Increasing area spectrum efficiency and capacity of HetNets largely depends on the high speed of backhaul links. One effective way which is currently utilized in HetNets is the use of full-duplex (FD) technology that potentially doubles the spectral efficiency without the need for additional spectrum. On the other hand, one of the most critical network design requirements is delay, which is a key representation of the quality of service (QoS) in modern cellular networks. In this paper, by utilizing tools from the stochastic geometry, we analyze the local delay for downlink (DL) channel, which is typically defined as the mean number of required time slots for a successful communication. Given imperfect self-interference (SI) cancellation in practical FD communications, we utilize duplex mode (half-duplex (HD) or FD) for each user based on the distance from its serving base station (BS). Further, we aim to investigate the energy efficiency (EE) for both duplexing modes, i.e., HD and FD, by considering local delay. We conduct extensive simulations to validate system performance in terms of local delay versus different system key parameters.
0.82721
0.702308
0.124902
2004.06369
On the difference of coefficients of univalent functions
For $f\in \mathcal{S}$, the class of normalized functions, analytic and univalent in the unit disk $\mathbb{D}$ and given by $f(z)=z+\sum_{n=2}^{\infty} a_n z^n$ for $z\in \mathbb{D}$, we give an upper bound for the coefficient difference $|a_4|-|a_3|$ when $f\in \mathcal{S}$. This provides an improved bound in the case $n=3$ of Grispan's 1976 general bound $||a_{n+1}|-|a_n||\le 3.61\dots .$ Other coefficients bounds, and bounds for the second and third Hankel determinants when $f\in \mathcal{S}$ are found when either $a_2=0,$ or $a_3=0$.
Smith et al. recently gave the sufficient and necessary conditions for the boundedness of Volterra type operators on Banach spaces of bounded analytic functions when the symbol functions are univalent. In this paper, we give the complete characterizations of the conditions for the boundedness and compactness of Volterra type operators $T_g$ and their companion operators $S_g$ between weighted Banach spaces of analytic functions, which essentially generalize their works.
0.848681
0.780621
0.06806
2004.06370
Exact MAP-Inference by Confining Combinatorial Search with LP Relaxation
We consider the MAP-inference problem for graphical models, which is a valued constraint satisfaction problem defined on real numbers with a natural summation operation. We propose a family of relaxations (different from the famous Sherali-Adams hierarchy), which naturally define lower bounds for its optimum. This family always contains a tight relaxation and we give an algorithm able to find it and therefore, solve the initial non-relaxed NP-hard problem. The relaxations we consider decompose the original problem into two non-overlapping parts: an easy LP-tight part and a difficult one. For the latter part a combinatorial solver must be used. As we show in our experiments, in a number of applications the second, difficult part constitutes only a small fraction of the whole problem. This property allows to significantly reduce the computational time of the combinatorial solver and therefore solve problems which were out of reach before.
We introduce constructions of exact Lagrangian cobordisms with cylindrical Legendrian ends and study their invariants which arise from Symplectic Field Theory. A pair $(X,L)$ consisting of an exact symplectic manifold $X$ and an exact Lagrangian cobordism $L\subset X$ which agrees with cylinders over Legendrian links $\Lambda_+$ and $\Lambda_-$ at the positive and negative ends induces a differential graded algebra (DGA) map from the Legendrian contact homology DGA of $\Lambda_+$ to that of $\Lambda_-$. We give a gradient flow tree description of the DGA maps for certain pairs $(X,L)$, which in turn yields a purely combinatorial description of the cobordism map for elementary cobordisms, i.e., cobordisms that correspond to certain local modifications of Legendrian knots. As an application, we find exact Lagrangian surfaces that fill a fixed Legendrian link and are not isotopic through exact Lagrangian surfaces.
0.863021
0.59715
0.265871
2004.06372
Complex scaling applied ex post to real-scaled Hermitian energy spectrum
I consider a finite basis set problem, where Hamiltonian is scaled through a coordinate, such that $H(x) \to H(xe^\eta)$ and $\eta$ is a free parameter. The famous method of complex scaling is obtained for $\eta$ imaginary, while the so called stationary graph is obtained for $\eta$ real defined. I focus on an occurrence of exceptional points (EPs) in the complex plane of $\eta$ due to the interaction between quasi-stationary states (resonances) and quasi-continuum states. The EPs mark a transition between adiabatic and diabatic representations of these interacting states. The complex resonance energy gets stabilized only as $Im\, \eta$ is large. That is, not in the vicinity of one EP, but in an area where many remote EPs contribute. This can be taken into account by constructing a diabatic Hamiltonian for a common neighborhood of several EPs using small Hamiltonians valid at individual EPs proximities. Such a Hamiltonian imitates the spectrum of the original complex scaled Hamiltonian.
In the recent years a generalization of Hermiticity was investigated using a complex deformation H=p^2 +x^2(ix)^\epsilon of the harmonic oscillator Hamiltonian, where \epsilon is a real parameter. These complex Hamiltonians, possessing PT symmetry (the product of parity and time reversal), can have real spectrum. We will consider the most simple case: \epsilon even. In this paper we describe all self-adjoint (Hermitian) and at the same time PT symmetric operators associated to H=p^2 +x^2(ix)^\epsilon. Surprisingly it turns out that there are a large class of self-adjoint operators associated to H=p^2 +x^2(ix)^\epsilon which are not PT symmetric.
0.790482
0.75409
0.036391
2004.06373
Oversampling for Imbalanced Time Series Data
Many important real-world applications involve time-series data with skewed distribution. Compared to conventional imbalance learning problems, the classification of imbalanced time-series data is more challenging due to high dimensionality and high inter-variable correlation. This paper proposes a structure preserving Oversampling method to combat the High-dimensional Imbalanced Time-series classification (OHIT). OHIT first leverages a density-ratio based shared nearest neighbor clustering algorithm to capture the modes of minority class in high-dimensional space. It then for each mode applies the shrinkage technique of large-dimensional covariance matrix to obtain accurate and reliable covariance structure. Finally, OHIT generates the structure-preserving synthetic samples based on multivariate Gaussian distribution by using the estimated covariance matrices. Experimental results on several publicly available time-series datasets (including unimodal and multi-modal) demonstrate the superiority of OHIT against the state-of-the-art oversampling algorithms in terms of F-value, G-mean, and AUC.
Many real world data mining applications involve obtaining predictive models using data sets with strongly imbalanced distributions of the target variable. Frequently, the least common values of this target variable are associated with events that are highly relevant for end users (e.g. fraud detection, unusual returns on stock markets, anticipation of catastrophes, etc.). Moreover, the events may have different costs and benefits, which when associated with the rarity of some of them on the available training data creates serious problems to predictive modelling techniques. This paper presents a survey of existing techniques for handling these important applications of predictive analytics. Although most of the existing work addresses classification tasks (nominal target variables), we also describe methods designed to handle similar problems within regression tasks (numeric target variables). In this survey we discuss the main challenges raised by imbalanced distributions, describe the main approaches to these problems, propose a taxonomy of these methods and refer to some related problems within predictive modelling.
0.881051
0.74377
0.137281
2004.06374
Addressing Packet Dropping Misbehavior using Metaheuristic Approach: A Survey
A Mobile Ad hoc Network can be said as a collection of mobile nodes, which builds a dynamic topology and a resource constrained network. Due to dynamic nature routing is challenging in MANET. In Mobile Ad hoc Networks different type of attack is possible. By manipulation in routing and attacks against data are reasoned by malicious nodes. MANETs are susceptible to various attacks from selfish nodes. To defeat those problems security is demanded for preventing node from various attacks. Metaheuristic techniques are used for addressing a problem found in ad hoc networks such as routing, security and optimization. A lot of research has been carried out for secure routing process with metaheuristic approaches. In this paper, we present survey of metaheuristic approach to improve routing process by enhancing the security and optimization among different nodes in mobile ad hoc networks.
Random linear network coding can be used in peer-to-peer networks to increase the efficiency of content distribution and distributed storage. However, these systems are particularly susceptible to Byzantine attacks. We quantify the impact of Byzantine attacks on the coded system by evaluating the probability that a receiver node fails to correctly recover a file. We show that even for a small probability of attack, the system fails with overwhelming probability. We then propose a novel signature scheme that allows packet-level Byzantine detection. This scheme allows one-hop containment of the contamination, and saves bandwidth by allowing nodes to detect and drop the contaminated packets. We compare the net cost of our signature scheme with various other Byzantine schemes, and show that when the probability of Byzantine attacks is high, our scheme is the most bandwidth efficient.
0.757218
0.711779
0.045439
2004.06375
A Primal-Dual Solver for Large-Scale Tracking-by-Assignment
We propose a fast approximate solver for the combinatorial problem known as tracking-by-assignment, which we apply to cell tracking. The latter plays a key role in discovery in many life sciences, especially in cell and developmental biology. So far, in the most general setting this problem was addressed by off-the-shelf solvers like Gurobi, whose run time and memory requirements rapidly grow with the size of the input. In contrast, for our method this growth is nearly linear. Our contribution consists of a new (1) decomposable compact representation of the problem; (2) dual block-coordinate ascent method for optimizing the decomposition-based dual; and (3) primal heuristics that reconstructs a feasible integer solution based on the dual information. Compared to solving the problem with Gurobi, we observe an up to~60~times speed-up, while reducing the memory footprint significantly. We demonstrate the efficacy of our method on real-world tracking problems.
In this paper we propose a distributed dual gradient algorithm for minimizing linearly constrained separable convex problems and analyze its rate of convergence. In particular, we prove that under the assumption of strong convexity and Lipshitz continuity of the gradient of the primal objective function we have a global error bound type property for the dual problem. Using this error bound property we devise a fully distributed dual gradient scheme, i.e. a gradient scheme based on a weighted step size, for which we derive global linear rate of convergence for both dual and primal suboptimality and for primal feasibility violation. Many real applications, e.g. distributed model predictive control, network utility maximization or optimal power flow, can be posed as linearly constrained separable convex problems for which dual gradient type methods from literature have sublinear convergence rate. In the present paper we prove for the first time that in fact we can achieve linear convergence rate for such algorithms when they are used for solving these applications. Numerical simulations are also provided to confirm our theory.
0.845757
0.704203
0.141555
2004.06376
Footprints and Free Space from a Single Color Image
Understanding the shape of a scene from a single color image is a formidable computer vision task. However, most methods aim to predict the geometry of surfaces that are visible to the camera, which is of limited use when planning paths for robots or augmented reality agents. Such agents can only move when grounded on a traversable surface, which we define as the set of classes which humans can also walk over, such as grass, footpaths and pavement. Models which predict beyond the line of sight often parameterize the scene with voxels or meshes, which can be expensive to use in machine learning frameworks. We introduce a model to predict the geometry of both visible and occluded traversable surfaces, given a single RGB image as input. We learn from stereo video sequences, using camera poses, per-frame depth and semantic segmentation to form training data, which is used to supervise an image-to-image network. We train models from the KITTI driving dataset, the indoor Matterport dataset, and from our own casually captured stereo footage. We find that a surprisingly low bar for spatial coverage of training scenes is required. We validate our algorithm against a range of strong baselines, and include an assessment of our predictions for a path-planning task.
Matching people across multiple camera views known as person re-identification, is a challenging problem due to the change in visual appearance caused by varying lighting conditions. The perceived color of the subject appears to be different with respect to illumination. Previous works use color as it is or address these challenges by designing color spaces focusing on a specific cue. In this paper, we propose a data driven approach for learning color patterns from pixels sampled from images across two camera views. The intuition behind this work is that, even though pixel values of same color would be different across views, they should be encoded with the same values. We model color feature generation as a learning problem by jointly learning a linear transformation and a dictionary to encode pixel values. We also analyze different photometric invariant color spaces. Using color as the only cue, we compare our approach with all the photometric invariant color spaces and show superior performance over all of them. Combining with other learned low-level and high-level features, we obtain promising results in ViPER, Person Re-ID 2011 and CAVIAR4REID datasets.
0.783176
0.740887
0.042289
2004.06377
Baryon number fluctuations induced by hadronic interactions at low temperature and large chemical potential
We investigate the density fluctuations induced by hadronic interactions at low temperatures and large chemical potentials after the hadronization of quark-gluon plasma~(QGP). We analyze the structures of net-baryon number kurtosis and skewness and elaborate on their relations with the nuclear liquid-gas~(LG) phase transition and hadronic interactions above the critical temperature. Combining with the relevant experimental projects at RHIC/NICA/FAIR/J-PARC/HIAF with collision energies from $200\,$GeV to $1.8\,$GeV, we propose a double-peak structure of kurtosis (skewness) as a function of collision energy, which can be taken to identify the chiral phase transition and the nuclear liquid-gas phase transition. In particular, the fluctuation distributions at low temperatures provide a new method to explore hadronic interactions and nuclear liquid-gas transition.
We discuss the potential of the experimental programme at NICA to investigate the QCD phase diagram and particularly the position of the critical line at large baryon-chemical potential with accurate measurements of particle multiplicities. We briefly review the present status and we outline the tasks to be accomplished both theoretically and the experimentally to make hadronic abundances a sensitive probe.
0.882552
0.819449
0.063103
2004.06379
Enhanced third-harmonic generation induced by nonlinear field resonances in plasmonic-graphene metasurfaces
Nonlinear metasurfaces offer new paradigm for boosting optical effect beyond limitations of conventional materials. In this work, we present an alternative way to produce pronounced third-harmonic generation (THG) based on nonlinear field resonances rather than linear field enhancement, which is a typical strategy for achieving strong nonlinear response. By designing and studying a nonlinear plasmonic-graphene metasurface at terahertz regime with hybrid guided modes and bound states in the continuum modes, it is found that a THG with a narrow bandwidth can be observed, thanks to the strong resonance between generated weak THG field and these modes. Such strong nonlinear field resonance greatly enhances the photon-photon interactions, thus resulting in a large effective nonlinear coefficient of the whole system. This finding provides new opportunity for studying nonlinear optical metasurfaces.
A graphene layer on top of a dielectric can dramatically influence ability of the material to radiative heat transfer. This property of graphene is used to improve the performance and reduce costs of near-field thermophotovoltaic cells. Instead of low bandgap semiconductors it is proposed to use graphene-on-silicon Schottky photovoltaic cells. One layer of graphene absorbs around 90% of incoming radiation and increases the heat transfer. This is due to excitation of plasmons in graphene, which are automatically tuned in resonance with the emitted light in the mid infrared range. The absorbed radiation excites electron-hole pairs in graphene, which are separated by the surface field induced by the Schottky barrier. For a quasi-monochromatic source the generated power is one order of magnitude larger and efficiency is on the same level as for semiconductor photovoltaic cells.
0.933552
0.727322
0.20623
2004.06380
A Survey of Energy Efficient Schemes in Ad-hoc Networks
Ad hoc network is a collection of different types of nodes, which are connected in heterogeneous or homogeneous manner. It is also known as self-organizing-wireless network. The dynamic nature of ad hoc networks make them more attractive, which is used in many different applications. Every coin has two sides: one is the advantage part and other is disadvantages, in the same manner nature of ad hoc network make it more attractive from one side in other hand there are some issues too. Energy efficiency is a core factor which effects on ad hoc network in terms of battery life, throughput, overhead of messages, transmission error. For solving issues of energy constraints, different mechanisms are proposed by various researchers. In this paper, we survey various existing schemes which attempt to improve energy efficiency of different types of ad hoc routing protocol to increase network lifetime. Furthermore we outline future scope of these existing schemes which may help researches to carry out further research in this direction.
Network coding has proved its efficiency in increasing the network performance for traditional ad-hoc networks. In this paper, we investigate using network coding for enhancing the throughput of multi-hop cognitive radio networks. We formulate the network coding throughput maximization problem as a graph theory problem, where different constraints and primary users' characteristics are mapped to the graph structure. We then show that the optimal solution to this problem in NP-hard and propose a heuristic algorithm to efficiently solve it. Evaluation of the proposed algorithm through NS2 simulations shows that we can increase the throughput of the constrained secondary users' network by 150\% to 200\% for a wide range of scenarios covering different primary users' densities, traffic loads, and spectrum availability.
0.86717
0.763189
0.103981
2004.06381
Test Automation Process Improvement in a DevOpsTeam: Experience Report
How to successfully conduct test automation process improvement (TAPI) for continuous development, consisting of iterative software development, continuous testing, and delivery, is the challenge faced by many software organizations. In this paper, we present an experience report on TAPI in one DevOps team in F-Secure (a Finnish software company). The team builds Windows application software and exists in F-Secure's TAPI culture. The team self-reports high satisfaction and maturity in test automation for continuous development. To study their TAPI, we reviewed a collection of experience notes, team reflection reports and telemetry result reports. Then several meetings were held to discuss the details. We found that based on the understanding of the team, test automation maturity for continuous development is defined as a set of indicators, e.g., the increasing speed to release, improving the productivity of the team, high test efficiency. Second, the team indicated that a set of critical success factors have a major impact on successfully carrying out its TAPI, e.g., incremental approach, the whole team effort, test tool choice and architecture, telemetry. Third, we compare the TAPI practices in the observed team with the practices described in prior literature. The team believes that the existing test automation maturity approaches should include the identified practices like the whole team effort to build a more comprehensive test automation improvement model for the software industry.
For more than a decade Vytelingum's Adaptive-Aggressive (AA) algorithm has been recognized as the best-performing automated auction-market trading-agent strategy currently known in the AI/Agents literature; in this paper, we demonstrate that it is in fact routinely outperformed by another algorithm when exhaustively tested across a sufficiently wide range of market scenarios. The novel step taken here is to use large-scale compute facilities to brute-force exhaustively evaluate AA in a variety of market environments based on those used for testing it in the original publications. Our results show that even in these simple environments AA is consistently out-performed by IBM's GDX algorithm, first published in 2002. We summarize here results from more than one million market simulation experiments, orders of magnitude more testing than was reported in the original publications that first introduced AA. A 2019 ICAART paper by Cliff claimed that AA's failings were revealed by testing it in more realistic experiments, with conditions closer to those found in real financial markets, but here we demonstrate that even in the simple experiment conditions that were used in the original AA papers, exhaustive testing shows AA to be outperformed by GDX. We close this paper with a discussion of the methodological implications of our work: any results from previous papers where any one trading algorithm is claimed to be superior to others on the basis of only a few thousand trials are probably best treated with some suspicion now. The rise of cloud computing means that the compute-power necessary to subject trading algorithms to millions of trials over a wide range of conditions is readily available at reasonable cost: we should make use of this; exhaustive testing such as is shown here should be the norm in future evaluations and comparisons of new trading algorithms.
0.84029
0.581706
0.258584
2004.06382
Kinship Identification through Joint Learning Using Kinship Verification Ensemble
While kinship verification is a well-exploited task which only identifies whether or not two people are kins, kinship identification is the task to further identify the particular type of kinships and is not well exploited yet. We found that a naive extension of kinship verification cannot solve the identification properly. This is because the existing verification networks are individually trained on specific kinships and do not consider the context between different kinship types. Also, the existing kinship verification dataset has a biased positive-negative distribution, which is different from real-world distribution. To solve it, we propose a novel kinship identification approach through the joint training of kinship verification ensembles and a Joint Identification Module. We also propose to rebalance the training dataset to make it realistic. Rigorous experiments demonstrate the superiority of performance on kinship identification task. It also demonstrates significant performance improvement of kinship verification when trained on the same unbiased data.
Ensemble learning of $K$ nonlinear perceptrons, which determine their outputs by sign functions, is discussed within the framework of online learning and statistical mechanics. One purpose of statistical learning theory is to theoretically obtain the generalization error. This paper shows that ensemble generalization error can be calculated by using two order parameters, that is, the similarity between a teacher and a student, and the similarity among students. The differential equations that describe the dynamical behaviors of these order parameters are derived in the case of general learning rules. The concrete forms of these differential equations are derived analytically in the cases of three well-known rules: Hebbian learning, perceptron learning and AdaTron learning. Ensemble generalization errors of these three rules are calculated by using the results determined by solving their differential equations. As a result, these three rules show different characteristics in their affinity for ensemble learning, that is ``maintaining variety among students." Results show that AdaTron learning is superior to the other two rules with respect to that affinity.
0.90998
0.630418
0.279561
2004.06383
Extending Adversarial Attacks to Produce Adversarial Class Probability Distributions
Despite the remarkable performance and generalization levels of deep learning models in a wide range of artificial intelligence tasks, it has been demonstrated that these models can be easily fooled by the addition of imperceptible but malicious perturbations to natural inputs. These altered inputs are known in the literature as adversarial examples. In this paper we propose a novel probabilistic framework to generalize and extend adversarial attacks in order to produce a desired probability distribution for the classes when we apply the attack method to a large number of inputs. This novel attack strategy provides the attacker with greater control over the target model, and increases the complexity of detecting that the model is being attacked. We introduce three different strategies to efficiently generate such attacks, and illustrate our approach extending DeepFool, a state-of-the-art attack algorithm to generate adversarial examples. We also experimentally validate our approach for the spoken command classification task, an exemplary machine learning problem in the audio domain. Our results demonstrate that we can closely approximate any probability distribution for the classes while maintaining a high fooling rate and by injecting imperceptible perturbations to the inputs.
SentiNet is a novel detection framework for localized universal attacks on neural networks. These attacks restrict adversarial noise to contiguous portions of an image and are reusable with different images---constraints that prove useful for generating physically-realizable attacks. Unlike most other works on adversarial detection, SentiNet does not require training a model or preknowledge of an attack prior to detection. Our approach is appealing due to the large number of possible mechanisms and attack-vectors that an attack-specific defense would have to consider. By leveraging the neural network's susceptibility to attacks and by using techniques from model interpretability and object detection as detection mechanisms, SentiNet turns a weakness of a model into a strength. We demonstrate the effectiveness of SentiNet on three different attacks---i.e., data poisoning attacks, trojaned networks, and adversarial patches (including physically realizable attacks)--- and show that our defense is able to achieve very competitive performance metrics for all three threats. Finally, we show that SentiNet is robust against strong adaptive adversaries, who build adversarial patches that specifically target the components of SentiNet's architecture.
0.852599
0.757989
0.09461
2004.06384
Incorporating Uncertain Segmentation Information into Chinese NER for Social Media Text
Chinese word segmentation is necessary to provide word-level information for Chinese named entity recognition (NER) systems. However, segmentation error propagation is a challenge for Chinese NER while processing colloquial data like social media text. In this paper, we propose a model (UIcwsNN) that specializes in identifying entities from Chinese social media text, especially by leveraging ambiguous information of word segmentation. Such uncertain information contains all the potential segmentation states of a sentence that provides a channel for the model to infer deep word-level characteristics. We propose a trilogy (i.e., candidate position embedding -> position selective attention -> adaptive word convolution) to encode uncertain word segmentation information and acquire appropriate word-level representation. Experiments results on the social media corpus show that our model alleviates the segmentation error cascading trouble effectively, and achieves a significant performance improvement of more than 2% over previous state-of-the-art methods.
In this paper we introduce a dynamic programming algorithm to perform linear text segmentation by global minimization of a segmentation cost function which consists of: (a) within-segment word similarity and (b) prior information about segment length. The evaluation of the segmentation accuracy of the algorithm on a text collection consisting of Greek texts showed that the algorithm achieves high segmentation accuracy and appears to be very innovating and promissing.
0.87992
0.771257
0.108664
2004.06385
Particle productions and anisotropic flows from the AMPT model for Cu+Au collisions at $\sqrt{s_{NN}}=200$ GeV
We use the string melting version of a multi-phase transport (AMPT) model to study Cu+Au collisions at $\sqrt{s_{NN}}=200$ GeV. The rapidity distributions of identified hadrons show asymmetric dependences on rapidity. In addition, elliptic and triangular flows at mid-rapidity from the AMPT model for pions, kaons, and protons agree reasonably with the experimental data up to $p_{T}\sim1$ GeV$/c$. We then investigate the forward/backward asymmetry of $v_2$ and $v_3$. We find that these anisotropic flows are larger on the Au-going side than the Cu-going side, while the asymmetry tends to go away in very peripheral collisions. We also make predictions on transverse momentum spectra of identified hadrons and longitudinal decorrelations of charged particles, where the average decorrelation of elliptic flow in asymmetric Cu+Au collisions is found to be stronger than that in Au+Au collisions.
During RHIC 2010 run, STAR has collected a large amount of minimum-bias, central and high $p_{T}$ trigger data in Au+Au collisions at $\sqrt{s_{NN}} = 39$, 62.4 and 200 GeV with detector configuration for minimum photonic conversion background. In this article we report on a new high precision measurement of non-photonic electron mid-rapidity invariant yield, improved nuclear modification factor and $v_{2}$ in Au+Au collisions at $\sqrt{s_{NN}} = 200$ GeV. We also present measurements of mid-rapidity invariant yield at $\sqrt{s_{NN}} = 62.4$ and $v_{2}$ at $\sqrt{s_{NN}} = 39$ and 62.4 GeV.
0.917713
0.797967
0.119746
2004.06386
Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services
Distributed anonymity services, such as onion routing networks or cryptocurrency tumblers, promise privacy protection without trusted third parties. While the security of these services is often well-researched, security implications of their required bootstrapping processes are usually neglected: Users either jointly conduct the anonymization themselves, or they need to rely on a set of non-colluding privacy peers. However, the typically small number of privacy peers enable single adversaries to mimic distributed services. We thus present AnonBoot, a Sybil-resistant medium to securely bootstrap distributed anonymity services via public blockchains. AnonBoot enforces that peers periodically create a small proof of work to refresh their eligibility for providing secure anonymity services. A pseudo-random, locally replicable bootstrapping process using on-chain entropy then prevents biasing the election of eligible peers. Our evaluation using Bitcoin as AnonBoot's underlying blockchain shows its feasibility to maintain a trustworthy repository of 1000 peers with only a small storage footprint while supporting arbitrarily large user bases on top of most blockchains.
Distributed Leger Technologies (DLTs), most notably Blockchain technologies, bring decentralised platforms that eliminate a single trusted third party and avoid the notorious single point of failure vulnerability. Since Nakamoto's Bitcoin cryptocurrency system, an enormous number of decentralised applications have been proposed on top of these technologies, aiming at more transparency and trustworthiness than their traditional counterparts. These applications spread over a lot of areas, e.g. financial services, healthcare, transportation, supply chain management, and cloud computing. While Blockchain brings transparency and decentralised trust intuitively due to the consensus of a (very large) group of nodes (or, miners), it introduces very subtle implications for other desirable properties such as privacy. In this work, we demonstrate these subtle implications for Blockchain-based searchable encryption solutions, which are one specific use case of cloud computing services. These solutions rely on Blockchain to achieve both the standard privacy property and the new fairness property, which requires that search operations are carried out faithfully and are rewarded accordingly. We show that directly replacing the server in an existing searchable encryption solution with a Blockchain will cause undesirable operational cost, privacy loss, and security vulnerabilities. The analysis results indicate that a dedicated server is still needed to achieve the desired privacy guarantee. To this end, we propose two frameworks which can be instantiated based on most existing searchable encryption schemes. Through analysing these two frameworks, we affirmatively show that a carefully engineered Blockchain-based solution can achieve the desired fairness property while preserving the privacy guarantee of the original searchable encryption scheme simultaneously.
0.917347
0.784712
0.132635
2004.06387
The Cosmological Spinor
We build upon previous investigation of the one-dimensional conformal symmetry of the Friedman-Lema\^ itre-Robertson-Walker (FLRW) cosmology of a free scalar field and make it explicit through a reformulation of the theory at the classical level in terms of a manifestly $\textrm{SL}(2,\mathbb{R})$-invariant action principle. The new tool is a canonical transformation of the cosmological phase space to write it in terms of a spinor, i.e. a pair of complex variables that transform under the fundamental representation of $\textrm{SU}(1,1)\sim\textrm{SL}(2,\mathbb{R})$. The resulting FLRW Hamiltonian constraint is simply quadratic in the spinor and FLRW cosmology is written as a Schr\"odinger-like action principle. Conformal transformations can then be written as proper-time dependent $\textrm{SL}(2,\mathbb{R})$ transformations. We conclude with possible generalizations of FLRW to arbitrary quadratic Hamiltonian and discuss the interpretation of the spinor as a gravitationally-dressed matter field or matter-dressed geometry observable.
Relying on a mathematical analogy of the pure states of the two-qubit system of quantum information theory with four-component spinors we introduce the concept of the intrinsic entanglement of spinors. To explore its physical sense we study the entanglement capabilities of the spin representation of (pseudo-) conformal transformations in (3+1)-dimensional Minkowski space-time. We find that only those tensor product structures can sensibly be introduced in spinor space for which a given spinor is not entangled.
0.821185
0.755141
0.066044
2004.06388
Regularized Iterative Method for Ill-posed Linear Systems Based on Matrix Splitting
In this paper, the concept of matrix splitting is introduced to solve a large sparse ill-posed linear system via Tikhonov's regularization. In the regularization process, we convert the ill-posed system to a well-posed system. The convergence of such a well-posed system is discussed by using different types of matrix splittings. Comparison analysis of both systems are studied by operating certain types of weak splittings. Further, we have extended the double splitting of [Song J and Song Y, Calcolo 48(3), 245-260, 2011] to double weak splitting of type II for nonsingular symmetric matrices. In addition to that, some more comparison results are presented with the help of such weak double splittings of type I and type II.
We prove that the classic logarithmic barrier problem is equivalent to a particular logarithmic barrier positive relaxation problem with barrier and scaling parameters. Based on the equivalence, a line-search primal-dual interior-point relaxation method for nonlinear programs is presented. Our method does not require any primal or dual iterates to be interior-points, which is prominently different from the existing interior-point methods in the literature. A new logarithmic barrier penalty function dependent on both primal and dual variables is used to prompt the global convergence of the method, where the penalty parameter is updated adaptively. Without assuming any regularity condition, it is proved that our method will terminate at an approximate KKT point of the original problem provided the barrier parameter tends zero. Otherwise, either an approximate infeasible stationary point or an approximate singular stationary point of the original problem will be found. Some preliminary numerical results are reported, including the results for a well-posed problem for which many line-search interior-point methods were demonstrated not to be globally convergent, a feasible problem for which the LICQ and the MFCQ fail to hold at the solution and an infeasible problem, and for some standard test problems of the CUTE collection. These results show that our algorithm is not only efficient for well-posed feasible problems, but also is applicable for some ill-posed feasible problems and some even infeasible problems.
0.882948
0.665919
0.217029
2004.06389
Tag Embedding Based Personalized Point Of Interest Recommendation System
Personalized Point of Interest recommendation is very helpful for satisfying users' needs at new places. In this article, we propose a tag embedding based method for Personalized Recommendation of Point Of Interest. We model the relationship between tags corresponding to Point Of Interest. The model provides representative embedding corresponds to a tag in a way that related tags will be closer. We model Point of Interest-based on tag embedding and also model the users (user profile) based on the Point Of Interest rated by them. finally, we rank the user's candidate Point Of Interest based on cosine similarity between user's embedding and Point of Interest's embedding. Further, we find the parameters required to model user by discrete optimizing over different measures (like ndcg@5, MRR, ...). We also analyze the result while considering the same parameters for all users and individual parameters for each user. Along with it we also analyze the effect on the result while changing the dataset to model the relationship between tags. Our method also minimizes the privacy leak issue. We used TREC Contextual Suggestion 2016 Phase 2 dataset and have significant improvement over all the measures on the state of the art method. It improves ndcg@5 by 12.8%, p@5 by 4.3%, and MRR by 7.8%, which shows the effectiveness of the method.
The past few years have witnessed the great success of recommender systems, which can significantly help users find out personalized items for them from the information era. One of the most widely applied recommendation methods is the Matrix Factorization (MF). However, most of researches on this topic have focused on mining the direct relationships between users and items. In this paper, we optimize the standard MF by integrating the user clustering regularization term. Our model considers not only the user-item rating information, but also takes into account the user interest. We compared the proposed model with three typical other methods: User-Mean (UM), Item-Mean (IM) and standard MF. Experimental results on a real-world dataset, \emph{MovieLens}, show that our method performs much better than other three methods in the accuracy of recommendation.
0.907988
0.744733
0.163255
2004.06390
Personalized Re-ranking for Improving Diversity in Live Recommender Systems
Users of industrial recommender systems are normally suggesteda list of items at one time. Ideally, such list-wise recommendationshould provide diverse and relevant options to the users. However, in practice, list-wise recommendation is implemented as top-N recommendation. Top-N recommendation selects the first N items from candidates to display. The list is generated by a ranking function, which is learned from labeled data to optimize accuracy.However, top-N recommendation may lead to suboptimal, as it focuses on accuracy of each individual item independently and overlooks mutual influence between items. Therefore, we propose a personalized re-ranking model for improving diversity of the recommendation list in real recommender systems. The proposed re-ranking model can be easily deployed as a follow-up component after any existing ranking function. The re-ranking model improves the diversity by employing personalized Determinental Point Process (DPP). DPP has been applied in some recommender systems to improve the diversity and increase the user engagement.However, DPP does not take into account the fact that users may have individual propensities to the diversity. To overcome such limitation, our re-ranking model proposes a personalized DPP to model the trade-off between accuracy and diversity for each individual user. We implement and deploy the personalized DPP model on alarge scale industrial recommender system. Experimental results on both offline and online demonstrate the efficiency of our proposed re-ranking model.
Recommending appropriate items to users is crucial in many e-commerce platforms that contain implicit data as users' browsing, purchasing and streaming history. One common approach consists in selecting the N most relevant items to each user, for a given N, which is called top-N recommendation. To do so, recommender systems rely on various kinds of information, like item and user features, past interest of users for items, browsing history and trust between users. However, they often use only one or two such pieces of information, which limits their performance. In this paper, we design and implement GraFC2T2, a general graph-based framework to easily combine and compare various kinds of side information for top-N recommendation. It encodes content-based features, temporal and trust information into a complex graph, and uses personalized PageRank on this graph to perform recommendation. We conduct experiments on Epinions and Ciao datasets, and compare obtained performances using F1-score, Hit ratio and MAP evaluation metrics, to systems based on matrix factorization and deep learning. This shows that our framework is convenient for such explorations, and that combining different kinds of information indeed improves recommendation in general.
0.855013
0.789753
0.065259
2004.06391
Author Name Disambiguation in Bibliographic Databases: A Survey
Entity resolution is a challenging and hot research area in the field of Information Systems since last decade. Author Name Disambiguation (AND) in Bibliographic Databases (BD) like DBLP , Citeseer , and Scopus is a specialized field of entity resolution. Given many citations of underlying authors, the AND task is to find which citations belong to the same author. In this survey, we start with three basic AND problems, followed by need for solution and challenges. A generic, five-step framework is provided for handling AND issues. These steps are; (1) Preparation of dataset (2) Selection of publication attributes (3) Selection of similarity metrics (4) Selection of models and (5) Clustering Performance evaluation. Categorization and elaboration of similarity metrics and methods are also provided. Finally, future directions and recommendations are given for this dynamic area of research.
We introduce a new task, visual sense disambiguation for verbs: given an image and a verb, assign the correct sense of the verb, i.e., the one that describes the action depicted in the image. Just as textual word sense disambiguation is useful for a wide range of NLP tasks, visual sense disambiguation can be useful for multimodal tasks such as image retrieval, image description, and text illustration. We introduce VerSe, a new dataset that augments existing multimodal datasets (COCO and TUHOI) with sense labels. We propose an unsupervised algorithm based on Lesk which performs visual sense disambiguation using textual, visual, or multimodal embeddings. We find that textual embeddings perform well when gold-standard textual annotations (object labels and image descriptions) are available, while multimodal embeddings perform well on unannotated images. We also verify our findings by using the textual and multimodal embeddings as features in a supervised setting and analyse the performance of visual sense disambiguation task. VerSe is made publicly available and can be downloaded at: https://github.com/spandanagella/verse.
0.884297
0.665716
0.218581
2004.06392
Non-associative algebras
A non-associative algebra over a field $\mathbb{K}$ is a $\mathbb{K}$-vector space $A$ equipped with a bilinear operation \[ {A\times A\to A\colon\; (x,y)\mapsto x\cdot y=xy}. \] The collection of all non-associative algebras over $\mathbb{K}$, together with the product-preserving linear maps between them, forms a variety of algebras: the category $\mathsf{Alg}_\mathbb{K}$. The multiplication need not satisfy any additional properties, such as associativity or the existence of a unit. Familiar categories such as the varieties of associative algebras, Lie algebras, etc. may be found as subvarieties of $\mathsf{Alg}_\mathbb{K}$ by imposing equations, here $x(yz)=(xy)z$ (associativity) or $xy =- yx$ and $x(yz)+z(xy)+ y(zx)=0$ (anti-commutativity and the Jacobi identity), respectively. The aim of these lectures is to explain some basic notions of categorical algebra from the point of view of non-associative algebras, and vice versa. As a rule, the presence of the vector space structure makes things easier to understand here than in other, less richly structured categories. We explore concepts like normal subobjects and quotients, coproducts and protomodularity. On the other hand, we discuss the role of (non-associative) polynomials, homogeneous equations, and how additional equations lead to reflective subcategories.
In this paper we introduce color Hom-Akivis algebras and prove that the commutator of any color non-associative Hom-algebra structure map leads to a color Hom-akivis algebra. We give various constructions of color Hom-Akivis algebras. Next we study flexible and alternative color Hom-Akivis algebras. Likewise color Hom-Akivis algebras, we introduce non-commutative color Hom-Leibniz-Poisson algebras and presente several constructions. Moreover we give the relationship between Hom-dialgebras and Hom-Leibniz-Poisson algebras; i.e. a Hom-dialgebras give rise to a Hom-Leibniz-Poisson algebra. Finally we show that twisting a color Hom-Leibniz module structure map by a color Hom-Leibniz algebra endomorphism, we get another one.
0.885012
0.808178
0.076834
2004.06393
Equivariant calculus on $\mu$-character and $\mu$K-stability of polarized schemes
We introduce and study $\mu$K-stability of polarized schemes with respect to general test configurations as an algebro-geometric aspect of $\mu$-cscK metric we introduced in the last paper. There are two fundamental ingeredients. On one hand, we develop a framework on `derivative of relative equivariant intersection', which we name equivariant calculus. As a part of equivariant calculus, we establish convergence results on some infinite series of equivariant cohomology classes given by relative equivariant intersection, based on a basic observation on the Cartan model of equivariant cohomology. On the other hand, we derive an equivariant character $\bm{\mu}^\lambda$ called $\mu$-character for equivariant family of polarized schemes from the equivariant intersection formula of the log of the $\mu$-volume functional. The derivative of the $\mu$-character not even yields $\mu$-Futaki invariant, but also produces an analogue of the equivariant first Chern class of CM line bundle, which is irrational in our general $\mu$K-stability setup. The product invites us to approach the compactification problem on the moduli space of Fano manifolds with K\"ahler--Ricci solitons.
The $\tau^\pm$, highly polarized in the direction of the incident beam, can be obtained from the $e^\pm$ collider with the polarized incident $e^-$ (and preferably also the $e^+$) beam. This polarization vector $\longvec w_i=(w_1+w_2)/(1+w_1w_2) \widehat e_z$ can be used to construct the $T$ odd rotationally invariant product $(\longvec w_i\times\longvec p_\mu)$. $\longvec w_\mu$, where $w_1$ and $w_2$ are longitudinal polarization vectors of $e^-$ and $e^+$ respectively; $\longvec p_\mu$ and $\longvec w_\mu$ are the momentum and polarization of the muon in the decay $\tau^-\rarrow \mu^-+ \bar\nu_\mu+\nu_\tau$. T is violated by the existence of such a term. CP can be tested by comparing it with a similar term in $\tau^+$ decay. If T violation in such a decay is milliweak or stronger, one can find it using the proposed polarized $\tau$-charm factory with luminosity of $1 \sim 3 \times 10^{33}/\cm^2/\sec$. One can test whether T (and CP) violation is due to the charged Higgs boson exchange by doing a similar experiment for the $\mu^\pm$ decay.
0.90921
0.668355
0.240855
2004.06394
Level-set inequalities on fractional maximal distribution functions and applications to regularity theory
The aim of this paper is to establish an abstract theory based on the so-called fractional-maximal distribution functions (FMDs). From the rough ideas introduced in~\cite{AM2007}, we develop and prove some abstract results related to the level-set inequalities and norm-comparisons by using the language of such FMDs. Particularly interesting is the applicability of our approach that has been shown in regularity and Calder\'on-Zygmund type estimates. In this paper, due to our research experience, we will establish global regularity estimates for two types of general quasilinear problems (problems with divergence form and double obstacles), via fractional-maximal operators and FMDs. The range of applications of these abstract results is large. Apart from these two examples of the regularity theory for elliptic equations discussed, it is also promising to indicate further possible applications of our approach for other special topics.
Empirical demand models used for counterfactual predictions and welfare analysis must be rationalizable, i.e. theoretically consistent with utility maximization by heterogeneous consumers. We show that for binary choice under general unobserved heterogeneity, rationalizability is equivalent to a pair of Slutsky-like shape-restrictions on choice-probability functions. The forms of these restrictions differ from Slutsky-inequalities for continuous goods. Unlike McFadden-Richter's stochastic revealed preference, our shape-restrictions (a) are global, i.e. their forms do not depend on which and how many budget-sets are observed, (b) are closed-form, hence easy to impose on parametric/semi/non-parametric models in practical applications, and (c) provide computationally simple, theory-consistent bounds on demand and welfare predictions on counterfactual budget-sets.
0.878185
0.697045
0.18114
2004.06395
Towards Realistic Optimization Benchmarks: A Questionnaire on the Properties of Real-World Problems
Benchmarks are a useful tool for empirical performance comparisons. However, one of the main shortcomings of existing benchmarks is that it remains largely unclear how they relate to real-world problems. What does an algorithm's performance on a benchmark say about its potential on a specific real-world problem? This work aims to identify properties of real-world problems through a questionnaire on real-world single-, multi-, and many-objective optimization problems. Based on initial responses, a few challenges that have to be considered in the design of realistic benchmarks can already be identified. A key point for future work is to gather more responses to the questionnaire to allow an analysis of common combinations of properties. In turn, such common combinations can then be included in improved benchmark suites. To gather more data, the reader is invited to participate in the questionnaire at: https://tinyurl.com/opt-survey
To solve a real-world problem, the modeler usually needs to make a trade-off between model complexity and usefulness. This is also true for robust optimization, where a wide range of models for uncertainty, so-called uncertainty sets, have been proposed. However, while these sets have been mainly studied from a theoretical perspective, there is little research comparing different sets regarding their usefulness for a real-world problem. In this paper we consider a network design problem in a telecommunications context. We need to invest into the infrastructure, such that there is sufficient capacity for future demand which is not known with certainty. There is a penalty for an unsatisfied realized demand, which needs to be outsourced. We consider three approaches to model demand: using a discrete uncertainty set, using a polyhedral uncertainty set, and using the mean of a per-commodity fitted zero-inflated uniform distribution. While the first two models are used as part of a robust optimization setting, the last model represents a simple stochastic optimization setting. We compare these approaches on an efficiency frontier real-world data taken from the online library SNDlib and observe that, contrary to current research trends, robust optimization using the polyhedral uncertainty set may result in less efficient solutions.
0.919398
0.755361
0.164037
2004.06396
Atmospheric Characterization via Broadband Color Filters on the PLAnetary Transits and Oscillations of stars (PLATO) Mission
We assess broadband color filters for the two fast cameras on the PLAnetary Transits and Oscillations (PLATO) of stars space mission with respect to exoplanetary atmospheric characterization. We focus on Ultra Hot Jupiters and Hot Jupiters placed 25pc and 100pc away from the Earth and low mass low density planets placed 10pc and 25pc away. Our analysis takes as input literature values for the difference in transit depth between the broadband lower (500 to 675nm) wavelength interval (hereafter referred to as blue) and the upper (675-1125nm) broadband wavelength interval (hereafter referred to as red) for transmission, occultation and phase curve analyses. Planets orbiting main sequence central stars with stellar classes F, G, K and M are investigated. We calculate the signal-to-noise ratio with respect to photon and instrument noise for detecting the difference in transit depth between the two spectral intervals. Results suggest that bulk atmospheric composition and planetary geometric albedos could be detected for (Ultra) Hot Jupiters up to about 100pc (about 25pc) with strong (moderate) Rayleigh extinction. Phase curve information could be extracted for Ultra Hot Jupiters orbiting K and G dwarf stars up to 25pc away. For low mass low density planets, basic atmospheric types (primary and water-dominated) and the presence of sub-micron hazes in the upper atmosphere could be distinguished for up to a handful of cases up to about 10pc.
The Kepler Mission is monitoring the brightness of ~150,000 stars searching for evidence of planetary transits. As part of the "Hunt for Exomoons with Kepler" (HEK) project, we report a planetary system with two confirmed planets and one candidate planet discovered using the publicly available data for KOI-872. Planet b transits the host star with a period P_b=33.6d and exhibits large transit timing variations indicative of a perturber. Dynamical modeling uniquely detects an outer nontransiting planet c near the 5:3 resonance (P_c=57.0d) of mass 0.37 times that of Jupiter. Transits of a third planetary candidate are also found: a 1.7-Earth radius super-Earth with a 6.8d period. Our analysis indicates a system with nearly coplanar and circular orbits, reminiscent of the orderly arrangement within the solar system.
0.907226
0.765512
0.141713
2004.06397
On the ice-nucleating potential of warm hydrometeors in mixed-phase clouds
The question whether or not the presence of warm hydrometeors in clouds may play a significant role in the nucleation of new ice particles has been debated for several decades. While the early works of Fukuta and Lee (1986) and Baker (1991) indicated that it might be irrelevant, the more recent study of Prabhakaran et al. (2019) [arXiv:1906.06129] suggested otherwise. In this work, we are aiming to quantify the ice-nucleating potential using high-fidelity flow simulation techniques around a single hydrometeor and use favorable considerations to upscale the effects to a collective of ice particles in clouds. While we find that ice nucleation may be enhanced in the vicinity of a warm hydrometeor by several orders of magnitude and that the affected volume of air is much larger than previously estimated, it is very unlikely that this effect alone causes the rapid enhancement of ice nucleation observed in some types of clouds, mainly due to the low initial volumetric ice concentration. Nonetheless, it is suggested to implement this effect into existing cloud models in order to investigate second-order effects such as ice nucleus preactivation or enhancement after the onset of glaciation.
First-order phase transitions that proceed via nucleation of bubbles are described by the homogeneous nucleation theory of Langer. The nucleation rate is one of the most interesting parameters of these transitions. In previous works we have computed nucleation rates with two different methods: (A) employing coarse-grained potentials; (B) by means of a saddle-point approximation, using dimensionally regularized field theory. In this article we compare the results of the two approaches in order to test their reliability and to determine the regions of applicability. We find a very good agreement.
0.893515
0.728966
0.164549
2004.06398
The closed fragment of IL is PSPACE hard
In this paper from 2011 we consider $\textbf{IL}_0$, the closed fragment of the basic interpretability logic $\textbf{IL}$. We show that we can translate $\textbf{GL}_1$, the one variable fragment of G\"odel-L\"ob's provabilty logic $\textbf{GL}$, into $\textbf{IL}_0$. Invoking a result on the PSPACE completeness of $\textbf{GL}_1$ we obtain the PSPACE hardness of $\textbf{IL}_0$.
Prostate cancer (PCa) is the most common cancer in men in the United States. Multiparametic magnetic resonance imaging (mp-MRI) has been explored by many researchers to targeted prostate biopsies and radiation therapy. However, assessment on mp-MRI can be subjective, development of computer-aided diagnosis systems to automatically delineate the prostate gland and the intraprostratic lesions (ILs) becomes important to facilitate with radiologists in clinical practice. In this paper, we first study the implementation of the Mask-RCNN model to segment the prostate and ILs. We trained and evaluated models on 120 patients from two different cohorts of patients. We also used 2D U-Net and 3D U-Net as benchmarks to segment the prostate and compared the model's performance. The contour variability of ILs using the algorithm was also benchmarked against the interobserver variability between two different radiation oncologists on 19 patients. Our results indicate that the Mask-RCNN model is able to reach state-of-art performance in the prostate segmentation and outperforms several competitive baselines in ILs segmentation.
0.764521
0.608847
0.155673
2004.06399
Joint growth rate measurements from redshift-space distortions and peculiar velocities in the 6dF Galaxy Survey
We present a new model for the cross-covariance between galaxy redshift-space distortions and peculiar velocities. We combine this with the auto-covariance models of both probes in a fully self-consistent, maximum-likelihood method, allowing us to extract enhanced cosmological parameter constraints. When applying our method to the 6-degree Field Galaxy Survey (6dFGS), our constraint on the growth rate of structure is $f\sigma_8 = 0.384 \pm 0.052 \rm{(stat)} \pm 0.061 \rm{(sys)}$ and our constraint for the redshift-space distortion parameter is $\beta = 0.289^{+0.044}_{-0.043} \rm{(stat)} \pm 0.049 \rm{(sys)}$. We find that the statistical uncertainty for the growth rate of structure is reduced by 64% when using the complete covariance model compared to the redshift-space distortion auto-covariance model and 50% when compared to using the peculiar velocity auto-covariance model. Our constraints are consistent with those from the literature on combining multiple tracers of large-scale structure, as well as those from other 6dFGS analyses. Our measurement is also consistent with the standard cosmological model.
Redshift-space distortions (RSD) offer an attractive method to measure the growth of cosmic structure on large scales, and combining with the measurement of the cosmic expansion history, it can be used as cosmological tests of gravity. With the advent of future galaxy redshift surveys aiming at precisely measuring the RSD, an accurate modeling of RSD going beyond linear theory is a critical issue in order to detect or disprove small deviations from general relativity (GR). While several improved models of RSD have been recently proposed based on the perturbation theory (PT), the framework of these models heavily relies on GR. Here, we put forward a new PT prescription for RSD in general modified gravity models. As a specific application, we present theoretical predictions of the redshift-space power spectra in f(R) gravity model, and compare them with N-body simulations. Using the PT template that takes into account the effects of both modifications of gravity and RSD properly, we successfully recover the fiducial model parameter in N-body simulations in an unbiased way. On the other hand, we found it difficult to detect the scale dependence of the growth rate in a model-independent way based on GR templates.
0.849773
0.791506
0.058267
2004.06400
Segregated quantum phases of dipolar bosonic mixtures in two-dimensional optical lattices
We identify the quantum phases in a binary mixture of dipolar bosons in 2D optical lattices. Our study is motivated by the recent experimental realization of binary dipolar condensate mixture of Er-Dy [Phys. Rev. Lett. 121, 213601 (2018)]. We model the system using the extended two-species Bose-Hubbard model and calculate the ground state phase diagrams using mean field theory. For selected cases we also obtain analytical phase boundaries using the site decoupled mean field theory. For comparison we also examine the phase diagram of two-species Bose-Hubbard model. Our results show that the quantum phases with the long range intra-species interaction phase separate with no phase ordering. The introduction of the long range inter-species interaction modifies the quantum phases of the system. It leads to the emergence of phase separated quantum phases with phase ordering. The transition from the phase separated quantum phases without phase ordering to phase ordered ones breaks the inversion symmetry.
We study the ground state magnetic properties of ferromagnetic spinor Bose-Einstein condensates confined in a deep optical lattices. In the Mott insulator regime, the ``mini-condensates'' at each lattice site behave as mesoscopic spin magnets that can interact with neighboring sites through both the static magnetic dipolar interaction and the light-induced dipolar interaction. We show that such an array of spin magnets can undergo a ferromagnetic or anti-ferromagnetic phase transition under the magnetic dipolar interaction depending on the dimension of the confining optical lattice. The ground-state spin configurations and related magnetic properties are investigated in detail.
0.90256
0.8122
0.09036
2004.06401
Huygens' cycloidal pendulum: an elementary derivation
A pedagogical derivation of the Huygens cycloidal pendulum, suitable for high-school students, is here presented. Our derivation rests only on simple algebraic and geometrical tricks, without the need of any Calculus concept.
Using the damped pendulum system we introduce the averaging method to study the periodic solutions of a dynamical system with small perturbation. We provide sufficient conditions for the existence of periodic solutions with small amplitude of the non--linear perturbed damped pendulum. The averaging theory provides a useful means to study dynamical systems, accessible to Master and PhD students.
0.942806
0.785797
0.157009
2004.06402
StandardGAN: Multi-source Domain Adaptation for Semantic Segmentation of Very High Resolution Satellite Images by Data Standardization
Domain adaptation for semantic segmentation has recently been actively studied to increase the generalization capabilities of deep learning models. The vast majority of the domain adaptation methods tackle single-source case, where the model trained on a single source domain is adapted to a target domain. However, these methods have limited practical real world applications, since usually one has multiple source domains with different data distributions. In this work, we deal with the multi-source domain adaptation problem. Our method, namely StandardGAN, standardizes each source and target domains so that all the data have similar data distributions. We then use the standardized source domains to train a classifier and segment the standardized target domain. We conduct extensive experiments on two remote sensing data sets, in which the first one consists of multiple cities from a single country, and the other one contains multiple cities from different countries. Our experimental results show that the standardized data generated by StandardGAN allow the classifiers to generate significantly better segmentation.
Semantic image segmentation is a fundamental task in image understanding. Per-pixel semantic labelling of an image benefits greatly from the ability to consider region consistency both locally and globally. However, many Fully Convolutional Network based methods do not impose such consistency, which may give rise to noisy and implausible predictions. We address this issue by proposing a dense multi-label network module that is able to encourage the region consistency at different levels. This simple but effective module can be easily integrated into any semantic segmentation systems. With comprehensive experiments, we show that the dense multi-label can successfully remove the implausible labels and clear the confusion so as to boost the performance of semantic segmentation systems.
0.915779
0.77967
0.136109
2004.06403
PASTRAMI: Privacy-preserving, Auditable, Scalable & Trustworthy Auctions for Multiple Items
Decentralised cloud computing platforms enable individuals to offer and rent resources in a peer-to-peer fashion. They must assign resources from multiple sellers to multiple buyers and derive prices that match the interests and capacities of both parties. The assignment process must be decentralised, fair and transparent, but also protect the privacy of buyers. We present PASTRAMI, a decentralised platform enabling trustworthy assignments of items and prices between a large number of sellers and bidders, through the support of multi-item auctions. PASTRAMI uses threshold blind signatures and commitment schemes to provide strong privacy guarantees while making bidders accountable. It leverages the Ethereum blockchain for auditability, combining efficient off-chain computations with novel, on-chain proofs of misbehaviour. Our evaluation of PASTRAMI using Filecoin workloads show its ability to efficiently produce trustworthy assignments between thousands of buyers and sellers.
Despite the impressive performance of standard random forests (RF), its theoretical properties have not been thoroughly understood. In this paper, we propose a novel RF framework, dubbed multinomial random forest (MRF), to discuss the consistency and privacy-preservation. Instead of deterministic greedy split rule, the MRF adopts two impurity-based multinomial distributions to randomly select a split feature and a split value respectively. Theoretically, we prove the consistency of the proposed MRF and analyze its privacy-preservation within the framework of differential privacy. We also demonstrate with multiple datasets that its performance is on par with the standard RF. To the best of our knowledge, MRF is the first consistent RF variant that has comparable performance to the standard RF.
0.865631
0.723066
0.142565
2004.06404
Study of $\Delta$ excitations in medium-mass nuclei with peripheral heavy ion charge-exchange reactions
Isobaric charge-exchange reactions induced by peripheral collisions of $^{112}$Sn ions accelerated up to 1$A$ GeV have been for the first time investigated at the GSI facilities. The high-resolving power of the FRS spectrometer allows to obtain $(p, n)$-type isobaric charge-exchange cross sections with an uncertainty of $3.5\%$ and to separate quasi-elastic and inelastic components in the missing-energy spectra of the ejectiles. The inelastic component is associated to the excitation of $\Delta$(1232) isobar resonance and the emission of pions in s-wave both in the target and projectile nucleus, while the quasi-elastic contribution is associated to the nuclear spin-isospin response of nucleon-hole excitations. An apparent shift of the $\Delta$-resonance peak of $\sim$63 MeV is observed when comparing the missing-energy spectra obtained from the measurements with proton and carbon targets. A detailed analysis, performed with a theoretical model for the reactions, indicates that this observation can be simply interpreted as a change in the relative magnitude between the contribution of the excitation of the resonance in the target and in the projectile, and not as real energy shift.
Assuming a binary reaction mechanism, the yield of isotopes near the heaviest $N=Z$ neutron-deficit nucleus $^{100}$Sn is studied with a microscopic transport model. The large influence of nuclear shell structure and isotope composition of the colliding nuclei on the production of exotic nuclei is demonstrated. It is shown that the reaction $^{54}$Fe+$^{106}$Cd seems to be most favourable for producing primary exotic Sn isotopes which may survive if the excitation energy in the entrance reaction channel is less than about 100 MeV. In the case of large differences in the charge (mass) numbers between entrance and exit channels the light fragment yield is essentially fed from the decay of excited primary heavier fragments. The existence of optimal energies for the production of some oxygen isotopes in the binary mechanism is demonstrated for the $^{32}$S+$^{197}$Au reaction.
0.828289
0.792203
0.036086
2004.06405
HPRL -- International cooperation to identify and monitor priority nuclear data needs for nuclear applications
The OECD-NEA High Priority Request List (HPRL) is a point of reference to guide and stimulate the improvement of nuclear data for nuclear energy and other applications, and a tool to bridge the gap between data users and producers. The HPRL is application-driven and the requests are submitted by nuclear data users or representatives of the user's communities. A panel of international experts reviews and monitors the requests in the framework of an Expert Group mandated by the NEA Nuclear Science Committee Working Party on International Nuclear Data Evaluation Cooperation (WPEC). After approval, individual requests are classified to three categories: high priority requests, general requests, and special purpose requests (e.g., dosimetry, standards). The HPRL is hosted by the NEA in the form of a relational database publicly available on the web. This paper provides an overview of HPRL entries, status and outlook. Examples of requests successfully completed are given and new requests are described with emphasis on updated nuclear data needs in the fields of nuclear energy, neutron standards and dosimetry.
Using the unintegrated gluon distribution obtained from numerical simulations of the Balitsky-Kovchegov equation with running coupling, we obtain a very good description of RHIC data on single inclusive hadron production at forward rapidities in both p+p and d+Au collisions. No K-factors are needed for charged hadrons, whereas for pion production a rapidity independent K-factor of order 1/3 is needed. Extrapolating to LHC energies, we calculate nuclear modification factors for light hadrons in p+Pb collision, as well as the contribution of initial state effects to the suppression of the nuclear modification factor in Pb+Pb collisions.
0.893261
0.621617
0.271644
2004.06406
Magnetic breakdown spectrum of a Kramers-Weyl semimetal
We calculate the Landau levels of a Kramers-Weyl semimetal thin slab in a perpendicular magnetic field $B$. The coupling of Fermi arcs on opposite surfaces broadens the Landau levels with a band width that oscillates periodically in $1/B$. We interpret the spectrum in terms of a one-dimensional superlattice induced by magnetic breakdown at Weyl points. The band width oscillations may be observed as $1/B$-periodic magnetoconductance oscillations, at weaker fields and higher temperatures than the Shubnikov-de Haas oscillations due to Landau level quantization. No such spectrum appears in a generic Weyl semimetal, the Kramers degeneracy at time-reversally invariant momenta is essential.
The physical realization of Chern insulators is of fundamental and practical interest, as they are predicted to host the quantum anomalous Hall effect (QAHE) and topologically protected chiral edge states which can carry dissipationless current. The realization of the QAHE state has however been challenging because of the complex heterostructures and sub-Kelvin temperatures required. Time-reversal symmetry breaking Weyl semimetals, being essentially stacks of Chern insulators with inter-layer coupling, may provide a new platform for the higher temperature realization of robust QAHE edge states. In this work we present a combined scanning tunneling spectroscopy and theoretical investigation of a newly discovered magnetic Weyl semimetal, Co3Sn2S2. Using modeling and numerical simulations we find that chiral edge states can be localized on partially exposed Kagome planes on the surface of a Weyl semimetal. Correspondingly, our STM dI/dV maps on narrow kagome Co3Sn terraces show linearly dispersing quantum well like states, which can be attributed to hybridized chiral edge modes. Our experiment and theory results suggest a new paradigm for studying chiral edge modes in time-reversal breaking Weyl semimetals. More importantly, this work leads a practical route for realizing higher temperature QAHE.
0.875304
0.774502
0.100802
2004.06407
Non-convex Feedback Optimization with Input and Output Constraints
In this paper, we present a novel control scheme for feedback optimization. That is, we propose a discrete-time controller that can steer the steady state of a physical plant to the solution of a constrained optimization problem without numerically solving the problem. Our controller can be interpreted as a discretization of a continuous-time projected gradient flow. Compared to other schemes used for feedback optimization, such as saddle-point flows or inexact penalty methods, our algorithm combines several desirable properties: It asymptotically enforces constraints on the plant steady-state outputs, and temporary constraint violations can be easily quantified. Our algorithm requires only reduced model information in the form of steady-state input-output sensitivities of the plant. Further, as we prove in this paper, global convergence is guaranteed even for non-convex problems. Finally, our algorithm is straightforward to tune, since the step-size is the only tuning parameter.
We investigate the effect of feedback delay on the outage probability of multiple-input single-output (MISO) fading channels. Channel state information at the transmitter (CSIT) is a delayed version of the channel state information available at the receiver (CSIR). We consider two cases of CSIR: (a) perfect CSIR and (b) CSI estimated at the receiver using training symbols. With perfect CSIR, under a short-term power constraint, we determine: (a) the outage probability for beamforming with imperfect CSIT (BF-IC) analytically, and (b) the optimal spatial power allocation (OSPA) scheme that minimizes outage numerically. Results show that, for delayed CSIT, BF-IC is close to optimal for low SNR and uniform spatial power allocation (USPA) is close to optimal at high SNR. Similarly, under a long-term power constraint, we show that BF-IC is close to optimal for low SNR and USPA is close to optimal at high SNR. With imperfect CSIR, we obtain an upper bound on the outage probability with USPA and BF-IC. Results show that the loss in performance due to imperfection in CSIR is not significant, if the training power is chosen appropriately.
0.828411
0.690141
0.13827
2004.06408
Anomalous magnetohydrodynamics with constant anisotropic electric conductivities
We study anomalous magnetohydrodynamics in a longitudinal boost invariant Bjorken flow with constant anisotropic electric conductivities as outlined in Ref. [1]. For simplicity, we consider a neutral fluid and a force-free magnetic field in the transverse direction. We derived analytic solutions of the electromagnetic fields in the laboratory frame, the chiral density, and the energy density as functions of proper time.
It is found that the amphoteric refraction, i.e. the refraction can be either positive or negative depending on the incident angles, could occur at a planar interface associated with a uniaxially anisotropic positive index media (PIM) or an anisotropic negative index media (NIM). Particularly, the anomalous negative refraction can occur at a planar interface from an isotropic PIM to an anisotropic PIM, whereas the anomalous positive refraction occurs at the interface from an isotropic PIM to an anisotropic NIM. The optimal conditions to yield the two unusual refractions are obtained. The difference of the two types of amphoteric refraction is discussed.
0.883967
0.718376
0.165591
2004.06409
Divergence-Based Adaptive Extreme Video Completion
Extreme image or video completion, where, for instance, we only retain 1% of pixels in random locations, allows for very cheap sampling in terms of the required pre-processing. The consequence is, however, a reconstruction that is challenging for humans and inpainting algorithms alike. We propose an extension of a state-of-the-art extreme image completion algorithm to extreme video completion. We analyze a color-motion estimation approach based on color KL-divergence that is suitable for extremely sparse scenarios. Our algorithm leverages the estimate to adapt between its spatial and temporal filtering when reconstructing the sparse randomly-sampled video. We validate our results on 50 publicly-available videos using reconstruction PSNR and mean opinion scores.
The PredNet architecture by Lotter et al. combines a biologically plausible architecture called Predictive Coding with self-supervised video prediction in order to learn the complex structure of the visual world. While the architecture has drawn a lot of attention and various extensions of the model exist, there is a lack of a critical analysis. We fill in the gap by evaluating PredNet, both as an implementation of Predictive Coding theory and as a self-supervised video prediction model, using a challenging video action classification dataset. We also design an extended architecture to test if conditioning future frame predictions on the action class of the video and vise-versa improves the model performance. With substantial evidence, we show that PredNet does not completely follow the principles of Predictive Coding. Our comprehensive analysis and results are aimed to guide future research based on PredNet or similar architectures based on the Predictive Coding theory.
0.871913
0.690409
0.181504
2004.06410
High-intensity pulsed ion beam treatment of amorphous iron-based metal alloy
Abstract The results of intense pulsed ion beam (IPIB) treatment of the soft magnetic amorphous alloy of a FINEMET-type are presented. Foil produced from the alloy was irradiated with short (about 100 ns) pulses of carbon ions and protons with energy of up to 300 keV and an energy density of up to 7 J/cm2. X-ray diffraction, M\"ossbauer spectroscopy and magnetic measurements were used to investigate structural and magnetic properties of irradiated foils. It is shown that the foil remains intact after the treatment, and the crystal structure still amorphous. Spontaneous magnetization vector is found to lie almost along perpendicular to the foil plane after irradiation, whereas for the initial amorphous foil it belongs to the plane. The magnetic properties of the foil undergo changes: the coercive force decreases, the saturation induction increases slightly, and the magnetization curve has shallower slope.
The laser-driven acceleration of high quality proton beams from a double-layer target, comprised of a high-Z ion layer and a thin disk of hydrogen, is investigated with three-dimensional particle-in-cell simulations in the case of oblique incidence of a laser pulse. It is shown that the proton beam energy reaches its maximum at a certain incidence angle of the laser pulse, where it can be much greater than the energy at normal incidence. The proton beam propagates at some angle with respect to the target surface normal, as determined by the proton energy and the incidence angle.
0.850289
0.688358
0.161931
2004.06411
Effective cylindrical cell decompositions for restricted sub-Pfaffian sets
The o-minimal structure generated by the restricted Pfaffian functions, known as restricted sub-Pfaffian sets, admits a natural measure of complexity in terms of a format $\mathcal{F}$, recording information like the number of variables and quantifiers involved in the definition of the set, and a degree $D$ recording the degrees of the equations involved. Khovanskii and later Gabrielov and Vorobjov have established many effective estimates for the geometric complexity of sub-Pfaffian sets in terms of these parameters. It is often important in applications that these estimates are polynomial in $D$. Despite much research done in this area, it is still not known whether cell decomposition, the foundational operation of o-minimal geometry, preserves polynomial dependence on $D$. We slightly modify the usual notions of format and degree and prove that with these revised notions this does in fact hold. As one consequence we also obtain the first polynomial (in $D$) upper bounds for the sum of Betti numbers of sets defined using quantified formulas in the restricted sub-Pfaffian structure.
Rod-like bacteria maintain their cylindrical shapes with remarkable precision during growth. However, they are also capable to adapt their shapes to external forces and constraints, for example by growing into narrow or curved confinements. Despite being one of the simplest morphologies, we are still far from a full understanding of how shape is robustly regulated, and how bacteria obtain their near-perfect cylindrical shapes with excellent precision. However, recent experimental and theoretical findings suggest that cell-wall geometry and mechanical stress play important roles in regulating cell shape in rod-like bacteria. We review our current understanding of the cell wall architecture and the growth dynamics, and discuss possible candidates for regulatory cues of shape regulation in the absence or presence of external constraints. Finally, we suggest further future experimental and theoretical directions, which may help to shed light on this fundamental problem.
0.828517
0.633202
0.195316
2004.06412
Quantifying entanglement of parametric down-converted states in all degrees of freedom
The amount of entanglement that exists in a parametric down-converted state is investigated in terms of all the degrees of freedom of the state. We quantify the amount of entanglement by the Schmidt number of the state, represented as a pure bipartite state by tagging the down-converted photons in terms of orthogonal states of polarization with the aid of type II phase-matching. To facilitate our calculations, we use a Wigner functional approach, which allows the incorporation of the full infinite dimensional spatiotemporal degrees of freedom. A quantitative example with reasonably achievable experimental conditions is considered to demonstrate that extremely large Schmidt numbers are achievable.
I show that two distant parties can transform pure entangled states to arbitrary pure states by stochastic local operations and classical communication (SLOCC) at the single copy level, if they share bound entangled states. This is the effect of bound entanglement since this entanglement processing is impossible by SLOCC alone. Similar effect of bound entanglement occurs in three qubits where two incomparable entangled states of GHZ and W can be inter-converted. In general multipartite settings composed by $N$ distant parties, all $N$-partite pure entangled states are inter-convertible by SLOCC with the assistance of bound entangled states with positive partial transpose.
0.919038
0.813832
0.105206
2004.06413
On the Possibility of Having Roman Pots around IP8 in Run 4 and Beyond
Proton trajectories along LHC beam 1 (clockwise direction) in the vicinity of the LHCb Interaction Point (IP8) for the most recent LHC Run 4 optics (HLLHC1.5) were presented. On this basis, three possible locations of forward proton detectors were identified: 150, 180 and 430 m from IP8. For these locations geometric acceptances were estimated. For the proton relative energy loss, $\xi$, these limits are $0.05 < \xi \lesssim 0.1$, $0.025 < \xi \lesssim 0.1$ and $0.003 < \xi < 0.013$, respectively. The influence of boost of the central system due to the acceptance of LHCb detector on $\xi$ was discussed. Finally, the impact of pile-up was presented.
A 30-day contiguous photometric run with the MOST satellite on the WN5-6b star WR 110 (HD 165688) reveals a fundamental periodicity of P = 4.08 +/- 0.55 days along with a number of harmonics at periods P/n, with n ~ 2,3,4,5 and 6, and a few other possible stray periodicities and/or stochastic variability on timescales longer than about a day. Spectroscopic RV studies fail to reveal any plausible companion with a period in this range. Therefore, we conjecture that the observed light-curve cusps of amplitude ~ 0.01 mag that recur at a 4.08 day timescale may arise in the inner parts, or at the base of, a corotating interaction region (CIR) seen in emission as it rotates around with the star at constant angular velocity. The hard X-ray component seen in WR 110 could then be a result of a high velocity component of the CIR shock interacting with the ambient wind at several stellar radii. Given that most hot, luminous stars showing CIRs have two CIR arms, it is possible that either the fundamental period is 8.2 days or, more likely in the case of WR 110, there is indeed a second weaker CIR arm for P = 4.08 days, that occurs ~ two thirds of a rotation period after the main CIR. If this interpretation is correct, WR 110 therefore joins the ranks with three other single WR stars, all WN, with confirmed CIR rotation periods (WR 1, WR 6, and WR 134), albeit with WR 110 having by far the lowest amplitude photometric modulation. This illustrates the power of being able to secure intense, continuous high-precision photometry from space-based platforms such as MOST. It also opens the door to revealing low-amplitude photometric variations in other WN stars, where previous attempts have failed. If all WN stars have CIRs at some level, this could be important for revealing sources of magnetism or pulsation in addition to rotation periods.
0.649753
0.584833
0.06492
2004.06414
Look, Knave
We examine a recursive sequence in which $s_n$ is a literal description of what the binary expansion of the previous term $s_{n-1}$ is not. By adapting a technique of Conway, we determine limiting behaviour of $\{s_n\}$ and dynamics of a related self-map of $2^{\mathbb{N}}$. Our main result is the existence and uniqueness of a pair of binary sequences, each the compliment-description of the other. We also take every opportunity to make puns.
In this we briefly cover the covariant approach to describe inertial forces in general relativity and in particular look at the behaviour of the cumulative drag index for stationary Kerr geometry.
0.502769
0.447382
0.055387
2004.06415
Exterior products of operators and superoptimal analytic approximation
We give a new algorithm for the construction of the unique superoptimal analytic approximant of a given continuous matrix-valued function on the unit circle, making use of exterior powers of operators in preference to spectral or {\em Wiener-Masani} factorizations.
We derive the absolutely anticommuting (anti-)dual-BRST symmetry transformations for the appropriate Lagrangian densities of the (3 + 1)-dimensional (4D) free Abelian 2-form gauge theory, under which, the total gauge-fixing term remains invariant. These symmetry transformations are the analogue of the co-exterior derivative of differential geometry, in the same sense, as the absolutely anticommuting (anti-)BRST symmetry transformations are the analogue of the exterior derivative. A bosonic symmetry transformation is shown to be the analogue of the Laplacian operator. The algebraic structures of these symmetry transformations are derived and they are demonstrated to be the reminiscent of the algebra obeyed by the de Rham cohomological operators of differential geometry.
0.882889
0.715688
0.167201
2004.06416
Relativistic X-ray jets from the black hole X-ray binary MAXI J1820+070
The black hole MAXI J1820+070 was discovered during its 2018 outburst and was extensively monitored across the electromagnetic spectrum. Following the detection of relativistic radio jets, we obtained four Chandra X-ray observations taken between 2018 November and 2019 May, along with radio observations conducted with the VLA and MeerKAT arrays. We report the discovery of X-ray sources associated with the radio jets moving at relativistic velocities with a possible deceleration at late times. The broadband spectra of the jets are consistent with synchrotron radiation from particles accelerated up to very high energies (>10 TeV) by shocks produced by the jets interacting with the interstellar medium. The minimal internal energy estimated from the X-ray observations for the jets is $\sim 10^{41}$ erg, significantly larger than the energy calculated from the radio flare alone, suggesting most of the energy is possibly not radiated at small scales but released through late-time interactions.
Black hole binaries exhibit dramatic changes in their X-ray spectral and timing properties over time, providing important clues about the physical processes that occur in these systems. Black holes and black hole candidates are prime targets for RXTE with observational goals including the study of extreme gravitational fields and jet formation mechanisms. The great wealth of data from RXTE has helped us to learn about these systems as well as raising new questions about accreting black holes. RXTE observations have allowed us to study a wide range of black hole science topics including the connection between the accretion disk and jets, the geometry of the inner accretion flow, and the physical changes that occur between spectral states. In this presentation, I discuss significant results on these topics that have been obtained for persistent and transient black holes over the past several years, and I present results from our program of X-ray and radio observations during the decays of black hole transient outbursts.
0.91357
0.782249
0.131321
2004.06417
Resilient Self-Debugging Software Protection
Debuggers are a popular reverse engineering and tampering tool. Self-debugging is an effective technique for applications to defend themselves against hostile debuggers. In penetration tests on state-of-the-art self-debugging, we observed several opportunities through which it could be attacked, however. We therefore improved upon the existing technique, making it more resilient by introducing reciprocal debugging and making the transfers of control between protected application and self-debugger more stealthy. This paper presents the improved self-debugging design, and details our research efforts into realizing reciprocal debugging. In our evaluation we show that the improved design is significantly harder for attackers to defeat.
The paper refers to CRUTIAL, CRitical UTility InfrastructurAL Resilience, a European project within the research area of Critical Information Infrastructure Protection, with a specific focus on the infrastructures operated by power utilities, widely recognized as fundamental to national and international economy, security and quality of life. Such infrastructures faced with the recent market deregulations and the multiple interdependencies with other infrastructures are becoming more and more vulnerable to various threats, including accidental failures and deliberate sabotage and malicious attacks. The subject of CRUTIAL research are small scale networked ICT systems used to control and manage the electric power grid, in which artifacts controlling the physical process of electricity transportation need to be connected with corporate and societal applications performing management and maintenance functionality. The peculiarity of such ICT-supported systems is that they are related to the power system dynamics and its emergency conditions. Specific effort need to be devoted by the Electric Power community and by the Information Technology community to influence the technological progress in order to allow commercial intelligent electronic devices to be effectively deployed for the protection of citizens against cyber threats to electric power management and control systems. A well-founded know-how needs to be built inside the industrial power sector to allow all the involved stakeholders to achieve their service objectives without compromising the resilience properties of the logical and physical assets that support the electric power provision.
0.877923
0.623455
0.254467
2004.06418
Uniform preconditioners of linear complexity for problems of negative order
We propose a multi-level type operator that can be used in the framework of operator (or Cald\'{e}ron) preconditioning to construct uniform preconditioners for negative order operators discretized by piecewise polynomials on a family of possibly locally refined partitions. The cost of applying this multi-level operator scales linearly in the number of mesh cells. Therefore, it provides a uniform preconditioner that can be applied in linear complexity when used within the preconditioning framework from our earlier work [Math. of Comp., 322(89) (2020), pp. 645-674].
The delay Lyapunov equation is an important matrix boundary-value problem which arises as an analogue of the Lyapunov equation in the study of time-delay systems $\dot{x}(t) = A_0x(t)+A_1x(t-\tau)+B_0u(t)$. We propose a new algorithm for the solution of the delay Lyapunov equation. Our method is based on the fact that the delay Lyapunov equation can be expressed as a linear system of equations, whose unknown is the value $U(\tau/2)\in\mathbb{R}^{n\times n}$, i.e., the delay Lyapunov matrix at time $\tau/2$. This linear matrix equation with $n^2$ unknowns is solved by adapting a preconditioned iterative method such as GMRES. The action of the $n^2\times n^2$ matrix associated to this linear system can be computed by solving a coupled matrix initial-value problem. A preconditioner for the iterative method is proposed based on solving a T-Sylvester equation $MX+X^TN=C$, for which there are methods available in the literature. We prove that the preconditioner is effective under certain assumptions. The efficiency of the approach is illustrated by applying it to a time-delay system stemmingfrom the discretization of a partial differential equation with delay. Approximate solutions to this problem can be obtained for problems of size up to $n\approx 1000$, i.e., a linear system with $n^2\approx 10^6$ unknowns, a dimension which is outside of the capabilities of the other existing methods for the delay Lyapunov equation.
0.88882
0.707687
0.181133
2004.06419
Neutron Stars Merger Remnants
Binary neutron star mergers observations are a unique way to constrain fundamental physics and astrophysics at the extreme. The interpretation of gravitational-wave events and their electromagnetic counterparts crucially rely on general-relativistic models of the merger outcome and remnant properties. Quantitative models can be obtainted only with numerical relativity simulations in 3+1 dimensions that include detailed input physics for the nuclear matter and weak interactions. This review summarizes our current understanding of the merger's remnant focusing on some of the aspects that are relevant for multimessenger observations.
The merger of binary neutron stars (BNSs) can lead to large amplifications of the magnetic field due to the development of turbulence and instabilities in the fluid, such as the Kelvin-Helmholtz shear instability, which drive small-scale dynamo activity. In order to properly resolve such instabilities and obtain the correct magnetic field amplification, one would need to employ resolutions that are currently unfeasible in global general relativistic magnetohydrodynamic (GRMHD) simulations of BNS mergers. Here, we present a subgrid model that allows global simulations to take into account the small-scale amplification of the magnetic field which is caused by the development of turbulence during BNS mergers. Assuming dynamo saturation, we show that magnetar-level fields ($\sim 10^{16}\,{\rm G}$) can be easily reached, and should therefore be expected from the merger of magnetized BNSs. The total magnetic energy can reach values up to $\sim 10^{51}\,{\rm erg}$ and the post-merger remnant can therefore emit strong electromagnetic signals and possibly produce short gamma-ray bursts.
0.854005
0.783944
0.070061
2004.06420
Stress testing and systemic risk measures using multivariate conditional probability
The multivariate conditional probability distribution quantifies the effects of a set of variables onto the statistical properties of another set of variables. In the study of systemic risk in the financial system, the multivariate conditional probability distribution can be used for stress-testing by quantifying the propagation of losses from a set of `stressing' variables to another set of `stressed' variables. Here it is described how to compute such conditional probability distributions for the vast family of multivariate elliptical distributions, which includes the multivariate Student-t and the multivariate Normal distributions. Simple measures of stress impact and systemic risk are also proposed. An application to the US equity market illustrates the potentials of this approach.
The paper proposes a new approach to model risk measurement based on the Wasserstein distance between two probability measures. It formulates the theoretical motivation resulting from the interpretation of fictitious adversary of robust risk management. The proposed approach accounts for equivalent and non-equivalent probability measures and incorporates the economic reality of the fictitious adversary. It provides practically feasible results that overcome the restriction of considering only models implying probability measures equivalent to the reference model. The Wasserstein approach suits for various types of model risk problems, ranging from the single-asset hedging risk problem to the multi-asset allocation problem. The robust capital market line, accounting for the correlation risk, is not achievable with other non-parametric approaches.
0.901222
0.713866
0.187356
2004.06421
Efficient State Read-out for Quantum Machine Learning Algorithms
Many quantum machine learning (QML) algorithms that claim speed-up over their classical counterparts only generate quantum states as solutions instead of their final classical description. The additional step to decode quantum states into classical vectors normally will destroy the quantum advantage in most scenarios because all existing tomographic methods require runtime that is polynomial with respect to the state dimension. In this Letter, we present an efficient readout protocol that yields the classical vector form of the generated state, so it will achieve the end-to-end advantage for those quantum algorithms. Our protocol suits the case that the output state lies in the row space of the input matrix, of rank $r$, that is stored in the quantum random access memory. The quantum resources for decoding the state in $\ell_2$-norm with $\epsilon$ error require $\text{poly}(r,1/\epsilon)$ copies of the output state and $\text{poly}(r, \kappa^r,1/\epsilon)$ queries to the input oracles, where $\kappa$ is the condition number of the input matrix. With our read-out protocol, we completely characterise the end-to-end resources for quantum linear equation solvers and quantum singular value decomposition. One of our technical tools is an efficient quantum algorithm for performing the Gram-Schmidt orthonormal procedure, which we believe, will be of independent interest.
We devise new quantum algorithms that exponentially speeds up the training and prediction procedures of twin support vector machines (TSVM). To train TSVMs using quantum methods, we demonstrate how to prepare the desired input states according to classical data, and these states are used in the quantum algorithm for the system of linear equations. In the prediction process, we employ a quantum circuit to estimate the distances from a new sample to the hyperplanes and then make a decision. The proposed quantum algorithms can learn two non-parallel hyperplanes and classify a new sample by comparing the distances from the sample to the two hyperplanes in $O(\log mn)$ time, where $m$ is the sample size and $n$ is the dimension of each data point. In contrast, the corresponding classical algorithm requires polynomial time for both the training and prediction procedures.
0.873885
0.827518
0.046367
2004.06422
An explainability study of the constant Q cepstral coefficient spoofing countermeasure for automatic speaker verification
Anti-spoofing for automatic speaker verification is now a well established area of research, with three competitive challenges having been held in the last 6 years. A great deal of research effort over this time has been invested into the development of front-end representations tailored to the spoofing detection task. One such approach known as constant Q cepstral coefficients (CQCCs) have been shown to be especially effective in detecting attacks implemented with a unit selection based speech synthesis algorithm. Despite their success, they largely fail in detecting other forms of spoofing attack where more traditional front-end representations give substantially better results. Similar differences were also observed in the most recent, 2019 edition of the ASVspoof challenge series. This paper reports our attempts to help explain these observations. The explanation is shown to lie in the level of attention paid by each front-end to different sub-band components of the spectrum. Thus far, surprisingly little has been learned about what artefacts are being detected by spoofing countermeasures. Our work hence aims to shed light upon signal or spectrum level artefacts that serve to distinguish different forms of spoofing attack from genuine, bone fide speech. With a better understanding of these artefacts we will be better positioned to design more reliable countermeasures.
Speaker verification systems usually suffer from the mismatch problem between training and evaluation data, such as speaker population mismatch, the channel and environment variations. In order to address this issue, it requires the system to have good generalization ability on unseen data. In this work, we incorporate Bayesian neural networks (BNNs) into the deep neural network (DNN) x-vector speaker verification system to improve the system's generalization ability. With the weight uncertainty modeling provided by BNNs, we expect the system could generalize better on the evaluation data and make verification decisions more accurately. Our experiment results indicate that the DNN x-vector system could benefit from BNNs especially when the mismatch problem is severe for evaluations using out-of-domain data. Specifically, results show that the system could benefit from BNNs by a relative EER decrease of 2.66% and 2.32% respectively for short- and long-utterance in-domain evaluations. Additionally, the fusion of DNN x-vector and Bayesian x-vector systems could achieve further improvement. Moreover, experiments conducted by out-of-domain evaluations, e.g. models trained on Voxceleb1 while evaluated on NIST SRE10 core test, suggest that BNNs could bring a larger relative EER decrease of around 4.69%.
0.887468
0.737176
0.150292
2004.06423
Color filter arrays based on dielectric metasurface elements
Digital imaging has been steadily improving over the past decades and we are moving towards a wide use of multi- and hyperspectral cameras. A key component of such imaging systems are color filter arrays, which define the spectrum of light detected by each camera pixel. Hence, it is essential to develop a variable, robust and scalable way for controlling the transmission of light. Nanostructured surfaces, also known as metasurfaces, offer a promising solution as their transmission spectra can be controlled by shaping the wavelength-dependent scattering properties of their constituting elements. Here we present, metasurfaces based on silicon nanodisks, which provide filter functions with amplitudes reaching 70-90% of transmission, and well suitable for RGB and CMY color filter arrays, the initial stage towards the further development of hyperspectral filters. We suggest and discuss possible ways to expand the color gamut and improve the color values of such optical filters.
Advances in the field of plasmonics, that is, nanophotonics based on optical properties of metal nanostructures, paved the way for the development of ultrasensitive biological sensors and other devices whose operating principles are based on localization of an electromagnetic field at the nanometer scale. However, high dissipative losses of metal nanostructures limit their performance in many modern areas, including metasurfaces, metamaterials, and optical interconnections, which required the development of new devices that combine them with high refractive index dielectric nanoparticles. Resulting metal-dielectric (hybrid) nanostructures demonstrated many superior properties from the point of view of practical application, including moderate dissipative losses, resonant optical magnetic response, strong nonlinear optical properties, which made the development in this field the vanguard of the modern light science. This review is devoted to the current state of theoretical and experimental studies of hybrid metal-dielectric nanoantennas and nanostructures based on them, capable of selective scattering light waves, amplifying and transmitting optical signals in the desired direction, controlling the propagation of such signals, and generating optical harmonics.
0.871711
0.751774
0.119936
2004.06424
Coupled cluster theory in materials science
In this tutorial-style review we discuss basic concepts of coupled cluster theory and recent developments that increase its computational efficiency for calculations of molecules, solids and materials in general. We will touch upon the connection between coupled cluster theory and the random-phase approximation that is widely used in the field of solid-state physics. We will discuss various approaches to improve the computational performance without compromising on accuracy. These approaches include large-scale parallel design as well as techniques that reduce the pre-factor of the computational complexity. A central part of this article discusses the convergence of calculated properties to the thermodynamic limit, which is of significant importance for reliable predictions of materials properties and constitutes an additional challenge compared to calculations of large molecules. We mention technical aspects of computer code implementations of periodic coupled cluster theories in different numerical frameworks of the one-electron orbital basis; the projector-augmented-wave formalism using a plane wave basis set and the numeric atom-centered-orbital (NAO) with resolution-of-identity. We will discuss results and the possible scope of these implementations and how they can help advance the current state of the art in electronic structure theory calculations of materials.
Deterministic enhancement of the superconducting (SC) critical temperature $T_c$ is a long-standing goal in material science. One strategy is engineering a material at the nanometer scale such that quantum confinement strengthens the electron pairing, thus increasing the superconducting energy gap $\Delta$, as was observed for individual nanoparticles. A true phase-coherent SC condensate, however, can exist only on larger scales and requires a finite phase stiffness $J$. In the case of coupled aluminium (Al) nanograins, $T_c$ can exceed that of bulk Al by a factor of three, but despite several proposals the relevant mechanism at play is not yet understood. Here we use optical spectroscopy on granular Al to disentangle the evolution of the fundamental SC energy scales, $\Delta$ and $J$, as a function of grain coupling. Starting from well-coupled arrays, $\Delta$ grows with progressive grain decoupling, causing the increasing of $T_c$. As the grain-coupling is further suppressed, $\Delta$ saturates while $T_c$ decreases, concomitantly with a sharp decline of $J$. This crossover to a phase-driven SC transition is accompanied by an optical gap persisting above $T_c$. These findings identify granular Al as an ideal playground to test the basic mechanisms that enhance superconductivity by nano-inhomogeneity.
0.878576
0.724848
0.153727
2004.06425
Computing Bayes: Bayesian Computation from 1763 to the 21st Century
The Bayesian statistical paradigm uses the language of probability to express uncertainty about the phenomena that generate observed data. Probability distributions thus characterize Bayesian inference, with the rules of probability used to transform prior probability distributions for all unknowns - models, parameters, latent variables - into posterior distributions, subsequent to the observation of data. Conducting Bayesian inference requires the evaluation of integrals in which these probability distributions appear. Bayesian computation is all about evaluating such integrals in the typical case where no analytical solution exists. This paper takes the reader on a chronological tour of Bayesian computation over the past two and a half centuries. Beginning with the one-dimensional integral first confronted by Bayes in 1763, through to recent problems in which the unknowns number in the millions, we place all computational problems into a common framework, and describe all computational methods using a common notation. The aim is to help new researchers in particular - and more genrally those interested in adopting a Bayesian approach to empirical work - {make sense of the plethora of computational techniques that are now on offer; understand when and why different methods are useful; and see the links that do exist, between them all.
Sequential Monte Carlo has become a standard tool for Bayesian Inference of complex models. This approach can be computationally demanding, especially when initialized from the prior distribution. On the other hand, deter-ministic approximations of the posterior distribution are often available with no theoretical guaranties. We propose a bridge sampling scheme starting from such a deterministic approximation of the posterior distribution and targeting the true one. The resulting Shortened Bridge Sampler (SBS) relies on a sequence of distributions that is determined in an adaptive way. We illustrate the robustness and the efficiency of the methodology on a large simulation study. When applied to network datasets, SBS inference leads to different statistical conclusions from the one supplied by the standard variational Bayes approximation.
0.864203
0.769683
0.09452
2004.06426
Structural, magnetic, and electronic evolution of the spin-ladder system BaFe$_2$S$_{3-x}$Se$_x$ with isoelectronic substitution
We report experimental studies of a series of BaFe$_2$S$_{3-x}$Se$_x$ ($0\leq x\leq3$) single crystals and powder specimens using x-ray diffraction, neutron diffraction, muon spin relaxation, and electrical transport measurements. A structural transformation from Cmcm (BaFe$_2$S$_3$) to Pnma (BaFe$_2$Se$_3$) was identified around $x = 0.7\sim 1$. Neutron diffraction measurements on the samples with $x$ = 0.2, 0.4, and 0.7 reveal that the N$\'{e}$el temperature of the stripe antiferromagnetic order is gradually suppressed from $\sim$120 to 85 K, while the magnitude of the ordered Fe$^{2+}$ moments shows very little variation. Similarly, the block antiferromagnetic order in BaFe$_2$Se$_3$ remains robust for $1.5\leq x\leq3$ with negligible variation in the ordered moment and a slight decrease of the N$\'{e}$el temperature from 250 K ($x=3$) to 225 K ($x=1.5$). The sample with $x=1$ near the Cmcm and Pnma border shows coexisting, two-dimensional, short-range stripe- and block-type antiferromagnetic correlations. The system remains insulating for all $x$, but the thermal activation gap shows an abrupt increase when traversing the boundary from the Cmcm stripe phase to the Pnma block phase. The results demonstrate that the crystal structure, magnetic order, and electronic properties are strongly coupled in the BaFe$_2$S$_{3-x}$Se$_x$ system.
The perovskite SrIrO3 is an exotic narrow-band metal owing to a confluence of the strengths of the spin-orbit coupling (SOC) and the electron-electron correlations. It has been proposed that topological and magnetic insulating phases can be achieved by tuning the SOC, Hubbard interactions, and/or lattice symmetry. Here, we report that the substitution of nonmagnetic, isovalent Sn4+ for Ir4+ in the SrIr1-xSnxO3 perovskites synthesized under high pressure leads to a metal-insulator transition to an antiferromagnetic (AF) phase at TN > 225 K. The continuous change of the cell volume as detected by x-ray diffraction and the lamda-shape transition of the specific heat on cooling through TN demonstrate that the metal-insulator transition is of second-order. Neutron powder diffraction results indicate that the Sn substitution enlarges an octahedral-site distortion that reduces the SOC relative to the spin-spin exchange interaction and results in the type-G AF spin ordering below TN. Measurement of high-temperature magnetic susceptibility shows the evolution of magnetic coupling in the paramagnetic phase typical of weak itinerant-electron magnetism in the Sn-substituted samples. A reduced structural symmetry in the magnetically ordered phase leads to an electron gap opening at the Brillouin zone boundary below TN in the same way as proposed by Slater.
0.886922
0.795332
0.09159
2004.06427
Jointly Modeling Aspect and Sentiment with Dynamic Heterogeneous Graph Neural Networks
Target-Based Sentiment Analysis aims to detect the opinion aspects (aspect extraction) and the sentiment polarities (sentiment detection) towards them. Both the previous pipeline and integrated methods fail to precisely model the innate connection between these two objectives. In this paper, we propose a novel dynamic heterogeneous graph to jointly model the two objectives in an explicit way. Both the ordinary words and sentiment labels are treated as nodes in the heterogeneous graph, so that the aspect words can interact with the sentiment information. The graph is initialized with multiple types of dependencies, and dynamically modified during real-time prediction. Experiments on the benchmark datasets show that our model outperforms the state-of-the-art models. Further analysis demonstrates that our model obtains significant performance gain on the challenging instances under multiple-opinion aspects and no-opinion aspect situations.
Community detection has long been an important yet challenging task to analyze complex networks with a focus on detecting topological structures of graph data. Essentially, real-world graph data contains various features, node and edge types which dynamically vary over time, and this invalidates most existing community detection approaches. To cope with these issues, this paper proposes the heterogeneous-temporal graph convolutional networks (HTGCN) to detect communities from hetergeneous and temporal graphs. Particularly, we first design a heterogeneous GCN component to acquire feature representations for each heterogeneous graph at each time step. Then, a residual compressed aggregation component is proposed to represent "dynamic" features for "varying" communities, which are then aggregated with "static" features extracted from current graph. Extensive experiments are evaluated on two real-world datasets, i.e., DBLP and IMDB. The promising results demonstrate that the proposed HTGCN is superior to both benchmark and the state-of-the-art approaches, e.g., GCN, GAT, GNN, LGNN, HAN and STAR, with respect to a number of evaluation criteria.
0.905107
0.747183
0.157924