id
stringlengths 5
16
| query
stringlengths 1
382
| pos
stringlengths 7
5.09k
| neg
stringlengths 23
5.09k
| qp
float64 0.4
1
| qn
float64 0.34
0.91
| margin
float64 0.02
0.3
|
---|---|---|---|---|---|---|
2004.06323
|
Long-range influence of manipulating disordered-insulators locally
|
Localization of wavefunctions is arguably the most familiar effect of
disorder in quantum systems. It has been recently argued [[V. Khemani, R.
Nandkishore, and S. L. Sondhi, Nature Physics, 11, 560 (2015)] that, contrary
to naive expectation, manipulation of a localized-site in the disordered medium
may produce a disturbance over a length-scale much larger than the
localization-length $\xi$. Here we report on the observation of this nonlocal
phenomenon in electronic transport experiment. Being a wave property,
visibility of this effect hinges upon quantum-coherence, and its spatial-scale
may be ultimately limited by the phase-coherent length of the disordered
insulator. Evidence for quantum coherence in the Anderson-insulating phase may
be obtained from magneto-resistance measurements which however are useful
mainly in thin-films. The technique used in this work offers an empirical
method to measure this fundamental aspect of Anderson-insulators even in
relatively thick samples.
|
Using a system of repulsive, soft particles as a model for a jammed solid, we
analyze its force network as characterized by the magnitude of the contact
force between two particles, the local contact angle subtended between three
particles, and the local coordination number. In particular, we measure the
local contact angle distribution as a function of the magnitude of the local
contact force. We find the suppression of small contact angles for locally
larger contact forces, suggesting the existence of chain-like correlations in
the locally larger contact forces. We couple this information with a
coordination number-spin state mapping to arrive at a Potts spin model with
frustration and correlated disorder to draw a potential connection between
jammed solids (no quenched disorder) and spin glasses (quenched disorder). We
use this connection to measure chaos due to marginality in the jammed system.
In addition, we present the replica solution of the one-dimensional, long-range
Potts glass as a potential toy building block for a jammed solid, where a sea
of weakly interacting spins provide for long-range interactions along a
chain-like backbone of more strongly interacting spins.
| 0.811442 | 0.680505 | 0.130937 |
2004.06324
|
Ultra-wideband Concurrent Ranging
|
We propose a novel concurrent ranging technique for distance estimation with
ultra-wideband (UWB) radios. Conventional schemes assume that the necessary
packet exchanges occur in isolation, to avoid collisions. Concurrent ranging
relies on the overlapping of replies from nearby responders to the same ranging
request issued by an initiator node. As UWB transmissions rely on short pulses,
the individual times of arrival can be discriminated by examining the channel
impulse response (CIR) of the initiator transceiver. By ranging against N
responders with a single, concurrent exchange, our technique drastically abates
network overhead, enabling higher ranging frequency with lower latency and
energy consumption w.r.t. conventional schemes.
Concurrent ranging can be implemented with a strawman approach requiring
minimal changes to standard schemes. Nevertheless, we empirically show that
this limits the attainable accuracy, reliability, and therefore applicability.
We identify the main challenges in realizing concurrent ranging without
dedicated hardware and tackle them by contributing several techniques, used in
synergy in our prototype based on the popular DW1000 transceiver. Our
evaluation, with static targets and a mobile robot, confirms that concurrent
ranging reliably achieves decimeter-level distance and position accuracy,
comparable to conventional schemes but at a fraction of the network and energy
cost.
|
In non-coherent wideband fading channels where energy rather than spectrum is
the limiting resource, peaky and non-peaky signaling schemes have long been
considered species apart, as the first approaches asymptotically the capacity
of a wideband AWGN channel with the same average SNR, whereas the second
reaches a peak rate at some finite critical bandwidth and then falls to zero as
bandwidth grows to infinity. In this paper it is shown that this distinction is
in fact an artifact of the limited attention paid in the past to the product
between the bandwidth and the fraction of time it is in use. This fundamental
quantity, called bandwidth occupancy, measures average bandwidth usage over
time. For all signaling schemes with the same bandwidth occupancy, achievable
rates approach to the wideband AWGN capacity within the same gap as the
bandwidth occupancy approaches its critical value, and decrease to zero as the
occupancy goes to infinity. This unified analysis produces quantitative
closed-form expressions for the ideal bandwidth occupancy, recovers the
existing capacity results for (non-)peaky signaling schemes, and unveils a
trade-off between the accuracy of approximating capacity with a generalized
Taylor polynomial and the accuracy with which the optimal bandwidth occupancy
can be bounded.
| 0.885429 | 0.726561 | 0.158868 |
2004.06325
|
The interacting Rice-Mele model -- bulk and boundaries
|
We investigate the interacting, one-dimensional Rice-Mele model, a
prototypical fermionic model of topological properties. To set the stage, we
firstly compute the single-particle spectral function, the local density, and
the boundary charge in the absence of interactions. The boundary charge is
fully determined by bulk properties indicating a bulk-boundary correspondence.
In a large parameter regime it agrees with the one obtained from an effective
low-energy theory (arXiv:2004.00463). Secondly, we investigate the robustness
of our results towards two-particle interactions. To resum the series of
leading logarithms for small gaps, which dismantle plain perturbation theory in
the interaction, we use an essentially analytical renormalization group
approach. It is controlled for small interactions and can directly be applied
to the microscopic lattice model. We benchmark the results against numerical
density matrix renormalization group data. The main interaction effect in the
bulk is a power-law renormalization of the gap with an interaction dependent
exponent. The important characteristics of the boundary charge are unaltered
and can be understood from the renormalized bulk properties, elevating the
bulk-boundary correspondence to the interacting regime. This requires a
consistent treatment not only of the low-energy gap renormalization but also of
the high-energy band width one. In contrast to low-energy field theories our
renormalization group approach also provides the latter. We show that the
interaction spoils the relation between the bulk properties and the number of
edge states, consistent with the observation that the Rice-Mele model with
finite potential modulation does not reveal any zero-energy edge states.
|
In this paper, we propose an {\it exact holographic mapping} which is a
unitary mapping from the Hilbert space of a lattice system in flat space
(boundary) to that of another lattice system in one higher dimension (bulk). By
defining the distance in the bulk system from two-point correlation functions,
we obtain an emergent bulk space-time geometry that is determined by the
boundary state and the mapping. As a specific example, we study the exact
holographic mapping for $(1+1)$-dimensional lattice Dirac fermions and explore
the emergent bulk geometry corresponding to different boundary states including
massless and massive states at zero temperature, and the massless system at
finite temperature. We also study two entangled one-dimensional chains and show
that the corresponding bulk geometry consists of two asymptotic regions
connected by a worm-hole. The quantum quench of the coupled chains is mapped to
dynamics of the worm-hole. In the end we discuss the general procedure of
applying this approach to interacting systems, and other open questions.
| 0.770497 | 0.629527 | 0.14097 |
2004.06326
|
On enhancing efficiency and accuracy of particle swarm optimization
algorithms
|
The particle swarm optimization (PSO) algorithm has been recently introduced
in the non--linear programming, becoming widely studied and used in a variety
of applications. Starting from its original formulation, many variants for
improvement and specialization of the PSO have been already proposed, but
without any definitive result, thus research in this area is nowadays still
rather active. This paper goes in this direction, by proposing some
modifications to the basic PSO algorithm, aiming at enhancements in aspects
that impact on the efficiency and accuracy of the optimization algorithm. In
particular, variants of PSO based on fuzzy logics and Bayesian theory have been
developed, which show better, or competitive, performances when compared to
both the basic PSO formulation and a few other optimization algorithms taken
from the literature.
|
Modeling and optimization of metabolic networks has been one of the hottest
topics in computational systems biology within recent years. However, the
complexity and uncertainty of these networks in addition to the lack of
necessary data has resulted in more efforts to design and usage of more capable
models which fit to realistic conditions. In this paper, instead of optimizing
networks in equilibrium condition, the optimization of dynamic networks in
non-equilibrium states including low number of molecules has been studied using
a 2-D lattice simulation. A prototyped network has been simulated with such
approach, and has been optimized using Swarm Particle Algorithm the results of
which are presented in addition to the relevant plots.
| 0.895635 | 0.705505 | 0.19013 |
2004.06327
|
Convergence Rate of a Message-passing Algorithm for Solving Linear
Systems
|
This paper studies the convergence rate of a message-passing distributed
algorithm for solving a large-scale linear system. This problem is generalised
from the celebrated Gaussian Belief Propagation (BP) problem for statistical
learning and distributed signal processing, and this message-passing algorithm
is generalised from the well-celebrated Gaussian BP algorithm. Under the
assumption of generalised diagonal dominance, we reveal, through painstaking
derivations, several bounds on the convergence rate of the message-passing
algorithm. In particular, we show clearly how the convergence rate of the
algorithm can be explicitly bounded using the diagonal dominance properties of
the system. When specialised to the Gaussian BP problem, our work also offers
new theoretical insight into the behaviour of the BP algorithm because we use a
purely linear algebraic approach for convergence analysis.
|
In this paper, we consider a system in which multiple users communicate with
a destination with the help of multiple half-duplex relays. Based on the
compute-and-forward scheme, each relay, instead of decoding the users'
messages, decodes an integer-valued linear combination that relates the
transmitted messages. Then, it forwards the linear combination towards the
destination. Given these linear combinations, the destination may or may not
recover the transmitted messages since the linear combinations are not always
full rank. Therefore, we propose an algorithm where we optimize the precoding
factor at the users such that the probability that the equations are full rank
is increased and that the transmission rate is maximized. We show, through some
numerical examples, the effectiveness of our algorithm and the advantage of
performing precoding allocation at the users. Also, we show that this scheme
can outperform standard relaying techniques in certain regimes.
| 0.879028 | 0.706135 | 0.172893 |
2004.06328
|
Universal Approximation on the Hypersphere
|
It is well known that any continuous probability density function on
$\mathbb{R}^m$ can be approximated arbitrarily well by a finite mixture of
normal distributions, provided that the number of mixture components is
sufficiently large. The von-Mises-Fisher distribution, defined on the unit
hypersphere $S^m$ in $\mathbb{R}^{m+1}$, has properties that are analogous to
those of the multivariate normal on $\mathbb{R}^{m+1}$. We prove that any
continuous probability density function on $S^m$ can be approximated to
arbitrary degrees of accuracy by a finite mixture of von-Mises-Fisher
distributions.
|
The two main topics of this text are as follows: Firstly, three modifications
of the theorem of Beltrami will be presented for diffeomorphisms between
Riemannian manifolds and a space form which preserve the geodesic circles, the
geodesic hyperspheres, or the minimal surfaces, respectively. Secondly, it is
defined what it means for an infinitesimal deformation of a metric to preserve
the geodesics up to first order, and a corresponding infinitesimal version of
Beltrami's theorem is given.
| 0.78127 | 0.655017 | 0.126253 |
2004.06329
|
Replica analysis of overfitting in generalized linear models
|
Nearly all statistical inference methods were developed for the regime where
the number $N$ of data samples is much larger than the data dimension $p$.
Inference protocols such as maximum likelihood (ML) or maximum a posteriori
probability (MAP) are unreliable if $p=O(N)$, due to overfitting. This
limitation has for many disciplines with increasingly high-dimensional data
become a serious bottleneck. We recently showed that in Cox regression for
time-to-event data the overfitting errors are not just noise but take mostly
the form of a bias, and how with the replica method from statistical physics
once can model and predict this bias and the noise statistics. Here we extend
our approach to arbitrary generalized linear regression models (GLM), with
possibly correlated covariates. We analyse overfitting in ML/MAP inference
without having to specify data types or regression models, relying only on the
GLM form, and derive generic order parameter equations for the case of $L2$
priors. Second, we derive the probabilistic relationship between true and
inferred regression coefficients in GLMs, and show that, for the relevant
hyperparameter scaling and correlated covariates, the $L2$ regularization
causes a predictable direction change of the coefficient vector. Our results,
illustrated by application to linear, logistic, and Cox regression, enable one
to correct ML and MAP inferences in GLMs systematically for overfitting bias,
and thus extend their applicability into the hitherto forbidden regime
$p=O(N)$.
|
We present the detailed analysis of the spherical s+p spin glass model with
two competing interactions: among p spins and among s spins. The most
interesting case is the 2+p model with p > 3 for which a very rich phase
diagram occurs, including, next to the paramagnetic and the glassy phase
represented by the one step replica symmetry breaking ansatz typical of the
spherical p-spin model, other two amorphous phases. Transitions between two
contiguous phases can also be of different kind. The model can thus serve as
mean-field representation of amorphous-amorphous transitions (or transitions
between undercooled liquids of different structure). The model is analytically
solvable everywhere in the phase space, even in the limit where the infinite
replica symmetry breaking ansatz is required to yield a thermodynamically
stable phase.
| 0.820961 | 0.583112 | 0.237849 |
2004.06331
|
Hadron resonance gas with van der Waals interactions
|
An overview of a hadron resonance gas (HRG) model that includes van der Waals
interactions between hadrons is presented. Applications of the excluded volume
HRG model to heavy-ion collision data and lattice QCD equation of state are
discussed. A recently developed quantum van der Waals hadron resonance gas
model is covered as well. Applications of this model in the context of the QCD
critical point are elaborated.
|
Evidence for the existence of van der Waals loops in pressure p versus volume
v plots has for some time supported the belief that melting in two dimensions
is a first order phase transition. We report rather accurate equilibrium p(v)
curves for systems of hard disks obtained from long Monte Carlo simulations.
These curves, obtained in the constant volume ensemble, using periodic boundary
conditions, exhibit well defined van der Waals loops. We illustrate their
existence for finite systems that are known to undergo a continuous transition
in the thermodynamic limit. To this end, we obtain magnetization m versus
applied field curves from Monte Carlo simulations of the 2D Ising model, in the
constant m ensemble, at the critical point. Whether van der Waals loops for
disk systems behave in the thermodynamic limit as they do for the 2D Ising
model at the critical point cannot be ruled out. Thus, the often made claim
that melting in 2D is a first order phase transition, based on the evidence
that van der Waals loops exist, is not sound.
| 0.912494 | 0.726301 | 0.186193 |
2004.06332
|
Two-stage model and optimal SI-SNR for monaural multi-speaker speech
separation in noisy environment
|
In daily listening environments, speech is always distorted by background
noise, room reverberation and interference speakers. With the developing of
deep learning approaches, much progress has been performed on monaural
multi-speaker speech separation. Nevertheless, most studies in this area focus
on a simple problem setup of laboratory environment, which background noises
and room reverberations are not considered. In this paper, we propose a
two-stage model based on conv-TasNet to deal with the notable effects of noises
and interference speakers separately, where enhancement and separation are
conducted sequentially using deep dilated temporal convolutional networks
(TCN). In addition, we develop a new objective function named optimal
scale-invariant signal-noise ratio (OSI-SNR), which are better than original
SI-SNR at any circumstances. By jointly training the two-stage model with
OSI-SNR, our algorithm outperforms one-stage separation baselines
substantially.
|
Recognition systems are commonly designed to authenticate users at the access
control levels of a system. A number of voice recognition methods have been
developed using a pitch estimation process which are very vulnerable in low
Signal to Noise Ratio (SNR) environments thus, these programs fail to provide
the desired level of accuracy and robustness. Also, most text independent
speaker recognition programs are incapable of coping with unauthorized attempts
to gain access by tampering with the samples or reference database. The
proposed text-independent voice recognition system makes use of multilevel
cryptography to preserve data integrity while in transit or storage. Encryption
and decryption follow a transform based approach layered with pseudorandom
noise addition whereas for pitch detection, a modified version of the
autocorrelation pitch extraction algorithm is used. The experimental results
show that the proposed algorithm can decrypt the signal under test with
exponentially reducing Mean Square Error over an increasing range of SNR.
Further, it outperforms the conventional algorithms in actual identification
tasks even in noisy environments. The recognition rate thus obtained using the
proposed method is compared with other conventional methods used for speaker
identification.
| 0.857377 | 0.71016 | 0.147217 |
2004.06334
|
Automated Diabetic Retinopathy Grading using Deep Convolutional Neural
Network
|
Diabetic Retinopathy is a global health problem, influences 100 million
individuals worldwide, and in the next few decades, these incidences are
expected to reach epidemic proportions. Diabetic Retinopathy is a subtle eye
disease that can cause sudden, irreversible vision loss. The early-stage
Diabetic Retinopathy diagnosis can be challenging for human experts,
considering the visual complexity of fundus photography retinal images.
However, Early Stage detection of Diabetic Retinopathy can significantly alter
the severe vision loss problem. The competence of computer-aided detection
systems to accurately detect the Diabetic Retinopathy had popularized them
among researchers. In this study, we have utilized a pre-trained DenseNet121
network with several modifications and trained on APTOS 2019 dataset. The
proposed method outperformed other state-of-the-art networks in early-stage
detection and achieved 96.51% accuracy in severity grading of Diabetic
Retinopathy for multi-label classification and achieved 94.44% accuracy for
single-class classification method. Moreover, the precision, recall, f1-score,
and quadratic weighted kappa for our network was reported as 86%, 87%, 86%, and
91.96%, respectively. Our proposed architecture is simultaneously very simple,
accurate, and efficient concerning computational time and space.
|
We study the adaptation of convolutional neural networks to the complex
temporal radio signal domain. We compare the efficacy of radio modulation
classification using naively learned features against using expert features
which are widely used in the field today and we show significant performance
improvements. We show that blind temporal learning on large and densely encoded
time series using deep convolutional neural networks is viable and a strong
candidate approach for this task especially at low signal to noise ratio.
| 0.847079 | 0.66209 | 0.184989 |
2004.06335
|
The Continuity Equation of the Gauduchon Metrics
|
We study the continuity equation of the Gauduchon metrics and establish its
interval of maximal existence, which extends the continuity equation of the
K\"ahler metrics introduced by La Nave \& Tian for and of the Hermitian metrics
introduced by Sherman \& Weinkove. Our method is based on the solution to the
Gauduchon conjecture by Sz\'ekelyhidi, Tosatti \& Weinkove.
|
We study a Lagrangian numerical scheme for solution of a nonlinear drift
diffusion equation on an interval. The discretization is based on the
equation's gradient flow structure with respect to the Wasserstein distance.
The scheme inherits various properties of the continuous flow, like entropy
monotonicity, mass preservation, metric contraction and minimum/maximum
principles. As the main result, we give a proof of convergence in the limit of
vanishing mesh size under a CFL-type condition. We also present results from
numerical experiments.
| 0.922825 | 0.668761 | 0.254064 |
2004.06336
|
Anomalous photon thermal Hall effect
|
We predict an anomalous thermal Hall effect (ATHE) mediated by photons in
networks of Weyl semi-metals. Contrary to the photon thermal Hall effect in
magneto-optical systems which requires the application of an external magnetic
field the ATHE in a Weyl semi-metals network is an intrinsic property of these
systems. Since the Weyl semi-metals can exhibit a strong nonreciprocal response
in the infrared over a broad spectral range the magnitude of thermal Hall flux
in these systems can be relatively large compared to the primary flux. This
ATHE paves the way for a directional control of heat flux by localy tuning the
magnitude of temperature field without changing the direction of temperature
gradient.
|
We propose a new mechanism for the thermal Hall effect in exchange spin-wave
systems, which is induced by the magnon-phonon interaction. Using symmetry
arguments, we first show that this effect is quite general, and exists whenever
the mirror symmetry in the direction of the magnetization is broken. We then
demonstrate our result in a collinear ferromagnet on a square lattice, with
perpendicular easy-axis anisotropy and Dzyaloshinskii-Moriya interaction from
mirror symmetry breaking. We show that the thermal Hall conductivity is
controlled by the resonant contribution from the anti-crossing points between
the magnon and phonon branches, and estimate its size to be comparable to that
of the magnon mediated thermal Hall effect.
| 0.858501 | 0.776624 | 0.081877 |
2004.06337
|
Differentially Private AirComp Federated Learning with Power Adaptation
Harnessing Receiver Noise
|
Over-the-air computation (AirComp)-based federated learning (FL) enables
low-latency uploads and the aggregation of machine learning models by
exploiting simultaneous co-channel transmission and the resultant waveform
superposition. This study aims at realizing secure AirComp-based FL against
various privacy attacks where malicious central servers infer clients' private
data from aggregated global models. To this end, a differentially private
AirComp-based FL is designed in this study, where the key idea is to harness
receiver noise perturbation injected to aggregated global models inherently,
thereby preventing the inference of clients' private data. However, the
variance of the inherent receiver noise is often uncontrollable, which renders
the process of injecting an appropriate noise perturbation to achieve a desired
privacy level quite challenging. Hence, this study designs transmit power
control across clients, wherein the received signal level is adjusted
intentionally to control the noise perturbation levels effectively, thereby
achieving the desired privacy level. It is observed that a higher privacy level
requires lower transmit power, which indicates the tradeoff between the privacy
level and signal-to-noise ratio (SNR). To understand this tradeoff more fully,
the closed-form expressions of SNR (with respect to the privacy level) are
derived, and the tradeoff is analytically demonstrated. The analytical results
also demonstrate that among the configurable parameters, the number of
participating clients is a key parameter that enhances the received SNR under
the aforementioned tradeoff. The analytical results are validated through
numerical evaluations.
|
We formulate and study a cryptographic problem relevant to wireless: a
sender, Alice, wants to transmit private messages to two receivers, Bob and
Calvin, using unreliable wireless broadcast transmissions and short public
feedback from Bob and Calvin. We ask, at what rates can we broadcast the
private messages if we also provide (information-theoretic) unconditional
security guarantees that Bob and Calvin do not learn each-other's message? We
characterize the largest transmission rates to the two receivers, for any
protocol that provides unconditional security guarantees. We design a protocol
that operates at any rate-pair within the above region, uses very simple
interactions and operations, and is robust to misbehaving users.
| 0.889532 | 0.699742 | 0.18979 |
2004.06338
|
Transformer based Grapheme-to-Phoneme Conversion
|
Attention mechanism is one of the most successful techniques in deep learning
based Natural Language Processing (NLP). The transformer network architecture
is completely based on attention mechanisms, and it outperforms
sequence-to-sequence models in neural machine translation without recurrent and
convolutional layers. Grapheme-to-phoneme (G2P) conversion is a task of
converting letters (grapheme sequence) to their pronunciations (phoneme
sequence). It plays a significant role in text-to-speech (TTS) and automatic
speech recognition (ASR) systems. In this paper, we investigate the application
of transformer architecture to G2P conversion and compare its performance with
recurrent and convolutional neural network based approaches. Phoneme and word
error rates are evaluated on the CMUDict dataset for US English and the NetTalk
dataset. The results show that transformer based G2P outperforms the
convolutional-based approach in terms of word error rate and our results
significantly exceeded previous recurrent approaches (without attention)
regarding word and phoneme error rates on both datasets. Furthermore, the size
of the proposed model is much smaller than the size of the previous approaches.
|
This paper will describe a simulator developed by the authors to explore the
design of Fourier transform based multiplication using optics. Then it will
demonstrate an application to the problem of constructing an all-optical
modular multiplication circuit. That circuit implements a novel approximate
version of the Montgomery multiplication algorithm that enables the calculation
to be performed entirely in the analog domain. The results will be used to
corroborate the feasibility of scaling the design up to 16-bits without the
need for analog to digital conversions at intermediate steps.
| 0.833797 | 0.559917 | 0.27388 |
2004.06339
|
Local control of improper ferroelectric domains in YMnO$_3$
|
Improper ferroelectrics are described by two order parameters: a primary one,
driving a transition to long-range distortive, magnetic or otherwise
non-electric order, and the electric polarization, which is induced by the
primary order parameter as a secondary, complementary effect. Using
low-temperature scanning probe microscopy, we show that improper ferroelectric
domains in YMnO$_3$ can be locally switched by electric field poling. However,
subsequent temperature changes restore the as-grown domain structure as
determined by the primary lattice distortion. The backswitching is explained by
uncompensated bound charges occuring at the newly written domain walls due to
the lack of mobile screening charges at low temperature. Thus, the polarization
of improper ferroelectrics is in many ways subject to the same electrostatics
as in their proper counterparts, yet complemented by additional functionalities
arising from the primary order parameter. Tailoring the complex interplay
between primary order parameter, polarization, and electrostatics is therefore
likely to result in novel functionalities specific to improper ferroelectrics.
|
We investigate the strain dependence of the ferroelectric polarization and
the structure of the ferroelectric domain walls in the layered
perovskite-related barium fluorides, BaMF$_4$ (M=Mg, Zn). The unusual
"geometric ferroelectricity" in these materials is driven by the softening of a
single polar phonon mode consisting of rotations of the MF$_6$ octahedra
accompanied by polar displacements of the Ba cations, and in contrast to
conventional ferroelectrics involves minimal electronic rehybridization. We
therefore anticipate a different strain dependence of the polarization, and
alternative domain wall structures compared with those found in conventional
ferroelectric materials. Using first-principles calculations based on density
functional theory (DFT) within the general gradient approximation (GGA), we
calculate the variation of the crystal structure and the ferroelectric
polarization under both compressive and tensile strain. We perform structural
relaxations of neutral domain walls between oppositely oriented directions of
the ferroelectric polarization and calculate their corresponding energies to
determine which are most likely to form. We compare our results to literature
values for conventional perovskite oxides to provide a source of comparison for
understanding the ferroelectric properties of alternative non-oxide materials
such as the barium fluorides.
| 0.907445 | 0.745834 | 0.161611 |
2004.06340
|
Hierarchical and Modularly-Minimal Vertex Colorings
|
Cographs are exactly the hereditarily well-colored graphs, i.e., the graphs
for which a greedy vertex coloring of every induced subgraph uses only the
minimally necessary number of colors $\chi(G)$. We show that greedy colorings
are a special case of the more general hierarchical vertex colorings, which
recently were introduced in phylogenetic combinatorics. Replacing cotrees by
modular decomposition trees generalizes the concept of hierarchical colorings
to arbitrary graphs. We show that every graph has a modularly-minimal coloring
$\sigma$ satisfying $|\sigma(M)|=\chi(M)$ for every strong module $M$ of $G$.
This, in particular, shows that modularly-minimal colorings provide a useful
device to design efficient coloring algorithms for certain hereditary graph
classes. For cographs, the hierarchical colorings coincide with the
modularly-minimal coloring. As a by-product, we obtain a simple linear-time
algorithm to compute a modularly-minimal coloring of $P_4$-sparse graphs.
|
Let $G$ be a simple graph. A total dominator coloring of $G$, is a proper
coloring of the vertices of $G$ in which each vertex of the graph is adjacent
to every vertex of some color class. The total dominator chromatic (TDC) number
$\chi_d^t(G)$ of $G$, is the minimum number of colors among all total dominator
coloring of $G$. The neighbourhood corona of two graphs $G_1$ and $G_2$ is
denoted by $G_1 \star G_2$ and is the graph obtained by taking one copy of
$G_1$ and $|V(G_1)|$ copies of $G_2$, and joining the neighbours of the $i$th
vertex of $G_1$ to every vertex in the $i$th copy of $G_2$. In this paper, we
study the total dominator chromatic number of the neighbourhood of two graphs
and investigate the total dominator chromatic number of $r$-gluing of two
graphs. Stability (bondage number) of total dominator chromatic number of $G$
is the minimum number of vertices (edges) of $G$ whose removal changes the
TDC-number of $G$. We study the stability and bondage number of certatin
graphs.
| 0.892544 | 0.757052 | 0.135492 |
2004.06341
|
Stochastic batch size for adaptive regularization in deep network
optimization
|
We propose a first-order stochastic optimization algorithm incorporating
adaptive regularization applicable to machine learning problems in deep
learning framework. The adaptive regularization is imposed by stochastic
process in determining batch size for each model parameter at each optimization
iteration. The stochastic batch size is determined by the update probability of
each parameter following a distribution of gradient norms in consideration of
their local and global properties in the neural network architecture where the
range of gradient norms may vary within and across layers. We empirically
demonstrate the effectiveness of our algorithm using an image classification
task based on conventional network models applied to commonly used benchmark
datasets. The quantitative evaluation indicates that our algorithm outperforms
the state-of-the-art optimization algorithms in generalization while providing
less sensitivity to the selection of batch size which often plays a critical
role in optimization, thus achieving more robustness to the selection of
regularity.
|
We consider batch size selection for a general class of multivariate batch
means variance estimators, which are computationally viable for
high-dimensional Markov chain Monte Carlo simulations. We derive the asymptotic
mean squared error for this class of estimators. Further, we propose a
parametric technique for estimating optimal batch sizes and discuss practical
issues regarding the estimating process. Vector auto-regressive, Bayesian
logistic regression, and Bayesian dynamic space-time examples illustrate the
quality of the estimation procedure where the proposed optimal batch sizes
outperform current batch size selection methods.
| 0.92836 | 0.749747 | 0.178613 |
2004.06342
|
openACC. An open database of car-following experiments to study the
properties of commercial ACC systems
|
Commercial Adaptive Cruise Control (ACC) systems are increasingly available
as standard options in modern vehicles. At the same time, still little
information is openly available on how these systems actually operate and how
different is their behavior, depending on the vehicle manufacturer or model.T o
reduce this gap, the present paper summarizes the main features of the openACC,
an open-access database of different car-following experiments involving a
total of 16 vehicles, 11 of which equipped with state-of-the-art commercial ACC
systems. As more test campaigns will be carried out by the authors, OpenACC
will evolve accordingly. The activity is performed within the framework of the
openData policy of the European Commission Joint Research Centre with the
objective to engage the whole scientific community towards a better
understanding of the properties of ACC vehicles in view of anticipating their
possible impacts on traffic flow and prevent possible problems connected to
their widespread. A first preliminary analysis on the properties of the 11 ACC
systems is conducted in order to showcase the different research topics that
can be studied within this open science initiative.
|
Traffic Congestions and accidents are major concerns in today's
transportation systems. This thesis investigates how to optimize traffic flow
on highways, in particular for merging situations such as intersections where a
ramp leads onto the highway. In our work, cars are equipped with sensors that
can detect distance to neighboring cars, and communicate their velocity and
acceleration readings with one another. Sensor-enabled cars can locally
exchange sensed information about the traffic and adapt their behavior much
earlier than regular cars.
We propose proactive algorithms for merging different streams of
sensor-enabled cars into a single stream. A proactive merging algorithm
decouples the decision point from the actual merging point. Sensor-enabled cars
allow us to decide where and when a car merges before it arrives at the actual
merging point. This leads to a significant improvement in traffic flow as
velocities can be adjusted appropriately. We compare proactive merging
algorithms against the conventional priority-based merging algorithm in a
controlled simulation environment. Experiment results show that proactive
merging algorithms outperform the priority-based merging algorithm in terms of
flow and delay.
| 0.884406 | 0.716165 | 0.168241 |
2004.06343
|
Code Completion using Neural Attention and Byte Pair Encoding
|
In this paper, we aim to do code completion based on implementing a Neural
Network from Li et. al.. Our contribution is that we use an encoding that is
in-between character and word encoding called Byte Pair Encoding (BPE). We use
this on the source code files treating them as natural text without first going
through the abstract syntax tree (AST). We have implemented two models: an
attention-enhanced LSTM and a pointer network, where the pointer network was
originally introduced to solve out of vocabulary problems. We are interested to
see if BPE can replace the need for the pointer network for code completion.
|
Several B+-tree variants have been developed to exploit the performance
potential of byte-addressable non-volatile memory (NVM). In this paper, we
attentively investigate the properties of B+-tree and find that, a conventional
B+-tree node is a linear structure in which key-value (KV) pairs are maintained
from the zero offset of the node. These pairs are shifted in a unidirectional
fashion for insertions and deletions. Inserting and deleting one KV pair may
inflict a large amount of write amplifications due to shifting KV pairs. This
badly impairs the performance of in-NVM B+-tree. In this paper, we propose a
novel circular design for B+-tree. With regard to NVM's byte-addressability,
our Circ-tree design embraces tree nodes in a circular structure without a
fixed base address, and bidirectionally shifts KV pairs in a node for
insertions and deletions to minimize write amplifications. We have implemented
a prototype for Circ-Tree and conducted extensive experiments. Experimental
results show that Circ-Tree significantly outperforms two state-of-the-art
in-NVM B+-tree variants, i.e., NV-tree and FAST+FAIR, by up to 1.6x and 8.6x,
respectively, in terms of write performance. The end-to-end comparison by
running YCSB to KV store systems built on NV-tree, FAST+FAIR, and Circ-Tree
reveals that Circ-Tree yields up to 29.3% and 47.4% higher write performance,
respectively, than NV-tree and FAST+FAIR.
| 0.883013 | 0.634756 | 0.248257 |
2004.06344
|
Model Reduction for the Kuramoto-Sakaguchi Model: The Importance of
Non-entrained Rogue Oscillators
|
The Kuramoto-Sakaguchi model for coupled phase oscillators with
phase-frustration is often studied in the thermodynamic limit of infinitely
many oscillators. Here we extend a model reduction method based on collective
coordinates to capture the collective dynamics of finite size
Kuramoto-Sakaguchi models. We find that the inclusion of the effects of rogue
oscillators is essential to obtain an accurate description, in contrast to the
original Kuramoto model where we show that their effects can be ignored. We
further introduce a more accurate ansatz function to describe the shape of
synchronized oscillators. Our results from this extended collective coordinate
approach reduce in the thermodynamic limit to the well-known mean-field
consistency relations. For finite networks we show that our model reduction
describes the collective behavior accurately, reproducing the order parameter,
the mean frequency of the synchronized cluster, and the size of the cluster at
given coupling strength, as well as the critical coupling strength for partial
and for global synchronization.
|
We show that self-organization occurs in the phase dynamics of soliton
modelocking in paramet- ric frequency combs. Reduction of the Lugiato-Lefever
equation (LLE) to a simpler set of phase equations reveals that this
self-organization arises via mechanisms akin to those in the Kuramoto model for
synchronization of coupled oscillators. In addition, our simulations show that
the phase equations evolve to a broadband phase-locked state, analogous to the
soliton formation process in the LLE. Our simplified equations intuitively
explain the origin of the pump phase offset in soliton- modelocked parametric
frequency combs. They also predict that the phase of the intracavity field
undergoes an anti-symmetrization that precedes phase synchronization, and they
clarify the role of chaotic states in soliton formation in parametric combs.
| 0.855002 | 0.740804 | 0.114198 |
2004.06345
|
Quantum repeater for continuous variable entanglement distribution
|
Quantum repeaters have been proposed as a way of extending the reach of
quantum communication. First generation approaches use entanglement swapping to
connect entangled links along a long distance channel. Recently, there have
been proposals for first generation quantum repeaters for continuous variables.
In this paper, we present an improved continuous variable repeater scheme using
fully deterministic optimal Gaussian entanglement swapping. Our scheme uses the
noiseless linear amplifier for entanglement distillation. We show that even
with the simplest configuration of the noiseless linear amplifier, our scheme
beats the PLOB bound for shorter distances and can offer orders of magnitude
increases in the secret key rate over previous CV repeater schemes.
|
We establish a mapping between a continuous variable (CV) quantum system and
a discrete quantum system of arbitrary dimension. This opens up the general
possibility to perform any quantum information task with a CV system as if it
were a discrete system of arbitrary dimension. The Einstein-Podolsky-Rosen
state is mapped onto the maximally entangled state in any finite dimensional
Hilbert space and thus can be considered as a universal resource of
entanglement. As an explicit example of the formalism a two-mode CV entangled
state is mapped onto a two-qutrit entangled state.
| 0.903957 | 0.78973 | 0.114227 |
2004.06346
|
Scission configuration of $^{239}$U from yields and kinetic information
of fission fragments
|
The simultaneous measurement of the isotopic fission-fragment yields and
fission-fragment velocities of $^{239}$U has been performed for the first time.
The $^{239}$U fissioning system was produced in one-neutron transfer reactions
between a $^{238}$U beam at 5.88 MeV/nucleon and a $^{9}$Be target. The
combination of inverse kinematics at low energy and the use of the VAMOS++
spectrometer at the GANIL facility allows the isotopic identification of the
full fission-fragment distribution and their velocity in the reference frame of
the fissioning system. The proton and neutron content of the fragments at
scission, their total kinetic and total excitation energy, as well as the
neutron multiplicity were determined. Information from the scission point
configuration is obtained from these observables and the correlation between
them. The role of the octupole-deformed proton and neutron shells in the
fission-fragment production is discussed.
|
The amount of emitted prompt neutrons from the fission fragments increases as
a function of excitation energy. Yet it is not fully understood whether the
increase in \nu(A) as a function of E_{n} is mass dependent. The share of
excitation energies among the fragments is still under debate, but there are
reasons to believe that the excess in neutron emission originates only from the
heavy fragments, leaving \nu_{light}(A) almost unchanged. In this work we
investigated the consequences of a mass-dependent increase in \nu(A) on the
final mass and energy distributions. The assumptions on \nu(A) are essential
when analysing measurements based on the 2E-technique. This choice showed to be
significant on the measured observables. For example, the post-neutron emission
mass yield distribution revealed changes up to 10-30%. The outcome of this work
pinpoint the urgent need to determine \nu(A) experimentally, and in particular,
how \nu(A) changes as a function of incident-neutron energy. Until then, many
fission yields in the data libraries could be largely affected, since they were
analysed based on another assumption on the neutron emission.
| 0.88104 | 0.818545 | 0.062495 |
2004.06347
|
Anomalous diffusion in Davydov quantum molecular chain model
|
We discuss anomalous relaxation processes in Davydov one-dimensional chain
molecule that consists of an exciton and an acoustic phonon field as a thermal
reservoir in the chain. We derive a kinetic equation for the exciton using the
complex spectral representation of the Liouville-von Neumann operator. Due to
the one-dimensionality, the momentum space separates into infinite sets of
disjoint irreducible subspaces dynamically independent of one another. Hence,
momentum relaxation occurs only within each subspace toward the Maxwell
distribution. We obtain a hydrodynamic mode with transport coefficients, a
sound velocity and a diffusion coefficient, defined in each subspace. Moreover,
because the sound velocity has momentum dependence, phase mixing affects the
broadening of the spatial distribution of the exciton in addition to the
diffusion process. Due to the phase mixing the increase rate of the mean-square
displacement of the exciton increases linearly with time and diverges in the
long-time limit.
|
We unravel a new mechanism to describe the non-Arrhenius anomalous fast
diffusion observed in the bcc phase of group IIIB and IVB metals from
first-principles. The "phonon-assisted" mechanism incorporates the anharmonic
phonon-phonon coupling effects into the vacancy-mediated diffusive jump
description. We describe the effective jump frequency as the 2/3L<111> phonon
frequency which coincides with the diffusive jump in the bcc phase of pure
metals. We combine ab initio molecular dynamics with lattice dynamics
calculations to perform temperature-dependent phonon analysis in a temperature
range where bcc Ti is stabilized due to entropic effects arising from
anharmonic lattice vibration.
| 0.858504 | 0.73772 | 0.120784 |
2004.06348
|
Distributed Privacy Preserving Iterative Summation Protocols
|
In this paper, we study the problem of summation evaluation of secrets. The
secrets are distributed over a network of nodes that form a ring graph.
Privacy-preserving iterative protocols for computing the sum of the secrets are
proposed, which are compatible with node join and leave situations. Theoretic
bounds are derived regarding the utility and accuracy, and the proposed
protocols are shown to comply with differential privacy requirements. Based on
utility, accuracy and privacy, we also provide guidance on appropriate
selections of random noise parameters. Additionally, a few numerical examples
that demonstrate their effectiveness are provided.
|
How to query a dataset in the way of preserving the privacy of individuals
whose data is included in the dataset is an important problem. The information
privacy model, a variant of Shannon's information theoretic model to the
encryption systems, protects the privacy of an individual by controlling the
amount of information of the individual's data obtained by each adversary from
the query's output. This model also assumes that each adversary's uncertainty
to the queried dataset is not so small in order to improve the data utility. In
this paper, we prove some results to the group privacy and the composition
privacy properties of this model, where the group privacy ensures a group of
individuals' privacy is preserved, and where the composition privacy ensures
multiple queries also preserve the privacy of an individual. Explicitly, we
reduce the proof of the two properties to the estimation of the difference of
two channel capacities. Our proofs are greatly benefited from some
information-theoretic tools and approaches.
| 0.89954 | 0.78499 | 0.11455 |
2004.06349
|
Channel-Dependent Scheduling in Wireless Energy Transfer for Mobile
Devices
|
Resonant Beam Charging (RBC) is the Wireless Power Transfer (WPT) technology,
which can provide high-power, long-distance, mobile, and safe wireless charging
for Internet of Things (IoT) devices. Supporting multiple IoT devices charging
simultaneously is a significant feature of the RBC system. To optimize the
multi-user charging performance, the transmitting power should be scheduled for
charging all IoT devices simultaneously. In order to keep all IoT devices
working as long as possible for fairness, we propose the First Access First
Charge (FAFC) scheduling algorithm. Then, we formulate the scheduling
parameters quantitatively for algorithm implementation. Finally, we analyze the
performance of FAFC scheduling algorithm considering the impacts of the
receiver number, the transmitting power and the charging time. Based on the
analysis, we summarize the methods of improving the WPT performance for
multiple IoT devices, which include limiting the receiver number, increasing
the transmitting power, prolonging the charging time and improving the
single-user's charging efficiency. The FAFC scheduling algorithm design and
analysis provide a fair WPT solution for the multi-user RBC system.
|
During the last years, many improvements were made to the hardware capability
of mobile devices. As mobile software also became more interactive and data
processing intensive, the increased power demand could not be compensated by
the improvements on battery technology. Adaptive systems can help to balance
the demand of applications with the limitations of battery resources. For
effective systems, the influence of multimedia quality on power consumption of
the components of mobile devices needs to be better understood. In this paper,
we analyze the impact of video quality and wireless network type on the energy
consumption of a mobile device. We have found that the additional power
consumption is up to 38% higher when a movie is played over a WiFi network
instead from internal memory and 64% higher in case of a mobile network (3G).
We have also discovered that a higher movie quality not only affects the power
consumption of the CPU but also the power consumption of the WiFi unit by up to
58% and up to 72% respectively on mobile networks.
| 0.778632 | 0.715775 | 0.062857 |
2004.06350
|
Study of the transcendence of a family of generalized continued
fractions
|
We study a family of generalized continued fractions, which are defined by a
pair of substitution sequences in a finite alphabet. We prove that they are
stammering sequences, in the sense of Adamczewski and Bugeaud. We also prove
that this family consists of transcendental numbers which are not Liouvillian.
We explore the partial quotients of their regular continued fraction
expansions, arriving at no conclusion concerning their boundedness.
|
The algebra of exponential fields and their extensions is developed. The
focus is on ELA-fields, which are algebraically closed with a surjective
exponential map. In this context, finitely presented extensions are defined, it
is shown that finitely generated strong extensions are finitely presented, and
these extensions are classified. An algebraic construction is given of Zilber's
pseudo-exponential fields. As applications of the general results and methods
of the paper, it is shown that Zilber's fields are not model-complete,
answering a question of Macintyre, and a precise statement is given explaining
how Schanuel's conjecture answers all transcendence questions about
exponentials and logarithms. Connections with the Kontsevich-Zagier,
Grothendieck, and Andr\'e transcendence conjectures on periods are discussed,
and finally some open problems are suggested.
| 0.876007 | 0.784521 | 0.091485 |
2004.06351
|
Global propagator for the massless Dirac operator and spectral
asymptotics
|
We construct the propagator of the massless Dirac operator $W$ on a closed
Riemannian 3-manifold as the sum of two invariantly defined oscillatory
integrals, global in space and in time, with distinguished complex-valued phase
functions. The two oscillatory integrals -- the positive and the negative
propagators -- correspond to positive and negative eigenvalues of $W$,
respectively. This enables us to provide a global invariant definition of the
full symbols of the propagators (scalar matrix-functions on the cotangent
bundle), a closed formula for the principal symbols and an algorithm for the
explicit calculation of all their homogeneous components. Furthermore, we
obtain small time expansions for principal and subprincipal symbols of the
propagators in terms of geometric invariants. Lastly, we use our results to
compute the third local Weyl coefficients in the asymptotic expansion of the
eigenvalue counting functions of $W$.
|
This paper deals with the massive three-dimensional Dirac operator coupled
with a Lorentz scalar shell interaction supported on a compact smooth surface.
The rigorous definition of the operator involves suitable transmission
conditions along the surface. After showing the self-adjointness of the
resulting operator we switch to the investigation of its spectral properties,
in particular, to the existence and non-existence of eigenvalues. In the case
of an attractive coupling, we study the eigenvalue asymptotics as the mass
becomes large and show that the behavior of the individual eigenvalues and
their total number are governed by an effective Schr\"odinger operator on the
boundary with an external Yang-Mills potential and a curvature-induced
potential.
| 0.885361 | 0.828516 | 0.056845 |
2004.06352
|
Lenstool-HPC: A High Performance Computing based mass modelling tool for
cluster-scale gravitational lenses
|
With the upcoming generation of telescopes, cluster scale strong
gravitational lenses will act as an increasingly relevant probe of cosmology
and dark matter. The better resolved data produced by current and future
facilities requires faster and more efficient lens modeling software.
Consequently, we present Lenstool-HPC, a strong gravitational lens modeling
and map generation tool based on High Performance Computing (HPC) techniques
and the renowned Lenstool software. We also showcase the HPC concepts needed
for astronomers to increase computation speed through massively parallel
execution on supercomputers.
Lenstool-HPC was developed using lens modelling algorithms with high amounts
of parallelism. Each algorithm was implemented as a highly optimised CPU, GPU
and Hybrid CPU-GPU version. The software was deployed and tested on the Piz
Daint cluster of the Swiss National Supercomputing Centre (CSCS).
Lenstool-HPC perfectly parallel lens map generation and derivative
computation achieves a factor 30 speed-up using only 1 GPUs compared to
Lenstool. Lenstool-HPC hybrid Lens-model fit generation tested at Hubble Space
Telescope precision is scalable up to 200 CPU-GPU nodes and is faster than
Lenstool using only 4 CPU-GPU nodes.
|
The advent of new deep+wide photometric lensing surveys will open up the
possibility of direct measurements of the dark matter halos of dwarf galaxies.
The HSC wide survey will be the first with the statistical capability of
measuring the lensing signal with high signal-to-noise at log(M*)=8. At this
same mass scale, LSST will have the most overall constraining power with a
predicted signal-to-noise for the galaxy-galaxy lensing signal around dwarfs of
SN=200. WFIRST and LSST will have the greatest potential to push below the
log(M*) = 7 mass scale thanks to the depth of their imaging data. Studies of
the dark matter halos of dwarf galaxies at z=0.1 with gravitational lensing are
soon within reach. However, further work will be required to develop optimized
strategies for extracting dwarfs samples from these surveys, determining
redshifts, and accurately measuring lensing on small radial scales. Dwarf
lensing will be a new and powerful tool to constrain the halo masses and inner
density slopes of dwarf galaxies and to distinguish between baryonic feedback
and modified dark matter scenarios.
| 0.898974 | 0.727754 | 0.17122 |
2004.06353
|
Knowledge Elicitation using Deep Metric Learning and Psychometric
Testing
|
Knowledge present in a domain is well expressed as relationships between
corresponding concepts. For example, in zoology, animal species form complex
hierarchies; in genomics, the different (parts of) molecules are organized in
groups and subgroups based on their functions; plants, molecules, and
astronomical objects all form complex taxonomies. Nevertheless, when applying
supervised machine learning (ML) in such domains, we commonly reduce the
complex and rich knowledge to a fixed set of labels, and induce a model shows
good generalization performance with respect to these labels. The main reason
for such a reductionist approach is the difficulty in eliciting the domain
knowledge from the experts. Developing a label structure with sufficient
fidelity and providing comprehensive multi-label annotation can be exceedingly
labor-intensive in many real-world applications. In this paper, we provide a
method for efficient hierarchical knowledge elicitation (HKE) from experts
working with high-dimensional data such as images or videos. Our method is
based on psychometric testing and active deep metric learning. The developed
models embed the high-dimensional data in a metric space where distances are
semantically meaningful, and the data can be organized in a hierarchical
structure. We provide empirical evidence with a series of experiments on a
synthetically generated dataset of simple shapes, and Cifar 10 and
Fashion-MNIST benchmarks that our method is indeed successful in uncovering
hierarchical structures.
|
In this work, we propose a straightforward method to derive Elliptic Curve
Digital Signature Algorithm (ECDSA) key pairs from embeddings created using
Deep Learning and Metric Learning approaches. We also show that these keys
allows the derivation of cryptocurrencies (such as Bitcoin) addresses that can
be used to transfer and receive funds, allowing novel Blockchain-based
applications that can be used to transfer funds or data directly to domains
such as image, text, sound or any other domain where Deep Learning can extract
high-quality embeddings; providing thus a novel integration between the
properties of the Blockchain-based technologies such as trust minimization and
decentralization together with the high-quality learned representations from
Deep Learning techniques.
| 0.750142 | 0.619352 | 0.13079 |
2004.06354
|
A Linux Kernel Scheduler Extension for Multi-core Systems
|
The Linux kernel is mostly designed for multi-programed environments, but
high-performance applications have other requirements. Such applications are
run standalone, and usually rely on runtime systems to distribute the
application's workload on worker threads, one per core. However, due to current
OSes limitations, it is not feasible to track whether workers are actually
running or blocked due to, for instance, a requested resource. For I/O
intensive applications, this leads to a significant performance degradation
given that the core of a blocked thread becomes idle until it is able to run
again. In this paper, we present the proof-of-concept of a Linux kernel
extension denoted User-Monitored Threads (UMT) which tackles this problem. Our
extension allows a user-space process to be notified of when the selected
threads become blocked or unblocked, making it possible for a runtime to
schedule additional work on the idle core. We implemented the extension on the
Linux Kernel 5.1 and adapted the Nanos6 runtime of the OmpSs-2 programming
model to take advantage of it. The whole prototype was tested on two
applications which, on the tested hardware and the appropriate conditions,
reported speedups of almost 2x.
|
We study an uplink multi secondary user (SU) cognitive radio system suffering
statistical heterogeneity among SUs' channels. This heterogeneity may result in
differentiated delay performances to these SUs and result in harmful
interference to the PU. We first derive an explicit closed-form expression for
the average delay in terms of an arbitrary power-control policy. Then, we
propose a delay-optimal closed-form scheduling and power-control policy that
can provide the required average delay guarantees to all SUs besides protecting
the PU from harmful interference. We support our findings by extensive system
simulations and show that it outperforms existing policies substantially.
| 0.801119 | 0.598921 | 0.202197 |
2004.06355
|
On the interplay between physical and content priors in deep learning
for computational imaging
|
Deep learning (DL) has been applied extensively in many computational imaging
problems, often leading to superior performance over traditional iterative
approaches. However, two important questions remain largely unanswered: first,
how well can the trained neural network generalize to objects very different
from the ones in training? This is particularly important in practice, since
large-scale annotated examples similar to those of interest are often not
available during training. Second, has the trained neural network learnt the
underlying (inverse) physics model, or has it merely done something trivial,
such as memorizing the examples or point-wise pattern matching? This pertains
to the interpretability of machine-learning based algorithms. In this work, we
use the Phase Extraction Neural Network (PhENN), a deep neural network (DNN)
for quantitative phase retrieval in a lensless phase imaging system as the
standard platform and show that the two questions are related and share a
common crux: the choice of the training examples. Moreover, we connect the
strength of the regularization effect imposed by a training set to the training
process with the Shannon entropy of images in the dataset. That is, the higher
the entropy of the training images, the weaker the regularization effect can be
imposed. We also discover that weaker regularization effect leads to better
learning of the underlying propagation model, i.e. the weak object transfer
function, applicable for weakly scattering objects under the weak object
approximation. Finally, simulation and experimental results show that better
cross-domain generalization performance can be achieved if DNN is trained on a
higher-entropy database, e.g. the ImageNet, than if the same DNN is trained on
a lower-entropy database, e.g. MNIST, as the former allows the underlying
physics model be learned better than the latter.
|
E-Learning uses electronic media, information & communication technologies to
provide education to the masses. E-learning deliver hypertext, text, audio,
images, animation and videos using desktop standalone computer, local area
network based intranet and internet based contents. While producing an
e-learning content or course-ware, a major decision making factor is whether to
use audio for the benefit of the end users. Generally, three types of audio can
be used in e-learning: narration, music and sound effect. This paper shows that
the use of proper audio based on contents type and subject can make the content
more interesting as well as help the end users to better understand the
contents.
| 0.777873 | 0.538163 | 0.23971 |
2004.06356
|
Direct measurement of interfacial Dzyaloshinskii-Moriya interaction at
the few-layer MoS$_{\rm 2}$/Ni$_{80}$Fe$_{20}$ interface
|
We report on a direct measurement of sizable interfacial
Dzyaloshinskii-Moriya interaction (iDMI) at the interface of two-dimensional
transition metal dichalcogenide (2D-TMD), MoS$_{\rm 2}$ and Ni$_{80}$Fe$_{20}$
(Py) using Brillouin light scattering spectroscopy. A clear asymmetry in
spin-wave dispersion is measured in MoS$_{\rm 2}$/Py/Ta, while no such
asymmetry is detected in the reference Py/Ta system. A linear scaling of the
DMI constant with the inverse of Py thickness indicates the interfacial origin
of the observed DMI. We further observe an enhancement of DMI constant in 3-4
layer MoS$_{\rm 2}$/Py system (by 58$\%$) as compared to 2 layer MoS$_{\rm
2}$/Py which is caused by a higher density of MoO$_{\rm 3}$ defect species in
the case of 3-4 layer MoS$_{\rm 2}$. The results open possibilities of
spin-orbitronic applications utilizing the 2D-TMD based heterostructures.
|
We have investigated the topological Hall effect (THE) in MnGa/Pt and MnGa/Ta
bilayers induced by interfacial Dzyaloshinskii-Moriya interaction (DMI). The
most evident THE signals have been found based on the MnGa films with small
critical DMI energy constant Dc. The large topological portion of the Hall
signal from the total Hall signal has been extracted in the whole temperature
range from 5 to 300 K. These results open up the exploration of the DMI induced
magnetic behavior based on the bulk perpendicular magnetic anisotropy materials
for fundamental physics and magnetic storage technologies.
| 0.908192 | 0.783028 | 0.125164 |
2004.06357
|
Connecting shear localization with the long-range correlated polarized
stress fields in granular materials
|
Understanding the connection between the inherent structural characteristics
of amorphous solids and their dynamical responses, is essential in physics and
material sciences and is equally vital in geotechnical and civil engineering,
and geophysics. Here we discover a deep connection between shear localization,
the self-organized cooperative particle rearrangements, and the intrinsic
structures of internal stresses in an isotropically jammed granular material
subject to pure shear. The system consists of bi-disperse photoelastic disks,
permitting internal stress measurement and single-particle tracking.
Specifically, we find strong (anti)correlations between the micro shear bands
and the two polarized stress fields along the two directions of maximal shear.
By exploring the tensorial characteristics and the rotational symmetry of force
network, we further discover that those long-range correlated polarized stress
fields form a condensate with a continuous rotation symmetry. Hence, we reveal
that the profound connection between the structure and dynamics is a result of
the spontaneous symmetry breaking of the condensate, providing a novel
mechanism to understand the emergent behavior of shear localization. Finally,
we provide the first experimental evidence of long-range correlated inherent
shear stress in an isotropically jammed granular system.
|
A heterogeneous brittle material characterized by a random field of local
toughness Kc(x) can be represented by an equivalent homogeneous medium of
toughness, Keff. Homogenization refers to a process of estimating Keff from the
local field Kc(x). An approach based on a perturbative expansion of the stress
intensity factor along a rough crack front shows the occurrence of different
regimes depending on the correlation length of the local toughness field in the
direction of crack propagation. A `"weak pinning" regime takes place for long
correlation lengths, where the effective toughness is the average of the local
toughness. For shorter correlation lengths, a transition to "strong pinning"
occurs leading to a much higher effective toughness, and characterized by a
propagation regime consisting in jumps between pinning configurations.
| 0.880982 | 0.788335 | 0.092647 |
2004.06358
|
Speech Translation and the End-to-End Promise: Taking Stock of Where We
Are
|
Over its three decade history, speech translation has experienced several
shifts in its primary research themes; moving from loosely coupled cascades of
speech recognition and machine translation, to exploring questions of tight
coupling, and finally to end-to-end models that have recently attracted much
attention. This paper provides a brief survey of these developments, along with
a discussion of the main challenges of traditional approaches which stem from
committing to intermediate representations from the speech recognizer, and from
training cascaded models separately towards different objectives.
Recent end-to-end modeling techniques promise a principled way of overcoming
these issues by allowing joint training of all model components and removing
the need for explicit intermediate representations. However, a closer look
reveals that many end-to-end models fall short of solving these issues, due to
compromises made to address data scarcity. This paper provides a unifying
categorization and nomenclature that covers both traditional and recent
approaches and that may help researchers by highlighting both trade-offs and
open research questions.
|
Speech enhancement model is used to map a noisy speech to a clean speech. In
the training stage, an objective function is often adopted to optimize the
model parameters. However, in most studies, there is an inconsistency between
the model optimization criterion and the evaluation criterion on the enhanced
speech. For example, in measuring speech intelligibility, most of the
evaluation metric is based on a short-time objective intelligibility (STOI)
measure, while the frame based minimum mean square error (MMSE) between
estimated and clean speech is widely used in optimizing the model. Due to the
inconsistency, there is no guarantee that the trained model can provide optimal
performance in applications. In this study, we propose an end-to-end
utterance-based speech enhancement framework using fully convolutional neural
networks (FCN) to reduce the gap between the model optimization and evaluation
criterion. Because of the utterance-based optimization, temporal correlation
information of long speech segments, or even at the entire utterance level, can
be considered when perception-based objective functions are used for the direct
optimization. As an example, we implement the proposed FCN enhancement
framework to optimize the STOI measure. Experimental results show that the STOI
of test speech is better than conventional MMSE-optimized speech due to the
consistency between the training and evaluation target. Moreover, by
integrating the STOI in model optimization, the intelligibility of human
subjects and automatic speech recognition (ASR) system on the enhanced speech
is also substantially improved compared to those generated by the MMSE
criterion.
| 0.872864 | 0.723019 | 0.149845 |
2004.06359
|
Trans-iron Ge, As, Se, and heavier elements in the dwarf metal-poor
stars, HD~19445, HD~84937, HD~94028, HD~140283, and HD~160617
|
Spectra of unevolved metal-poor halo stars uniquely reflect the elemental
abundances incorporated during the earliest Galactic epoch. Their heavy-element
content is well understood as the products of neutron capture on iron-peak
elements. However, the lightest elements just past the iron peak, with atomic
number 30<Z<52, show striking abundance patterns open to several
interpretations. Understanding their nature may illuminate the diverse halo,
thick disk, or extragalactic origins of metal-poor stars. For five metal-poor
dwarfs, we analyzed high-resolution echelle UV spectra from the Hubble Space
Telescope Imaging Spectrograph, as well as archival optical echelle spectra.
The goal was to derive reliable halo dwarf abundances and uncertainties for six
trans-iron elements from UV spectra, and optical abundances for four additional
trans-Fe elements and two well-understood heavier elements. Our two independent
analyses showed that the largest source of discrepancy is UV continuum
placement. Once rectified, the internal results agree to 0.2 dex for
moderately-unblended, moderately strong lines. Our results similarly agree with
previous work, except where new data and unidentified Fe I lines are important.
We show that these heavily congregate blueward of 2000A and redward of 2600A.
Our exclusion of trans-Fe lines blended by such lines proved critical for
arsenic. A metallicity-dependent odd-even effect is uncovered among trans-Fe
elements: an odd-Z element abundance is depressed relative to those of adjacent
even-Z elements, especially at low metallicity. This is supported by previous
studies of Sr-Y-Zr, and also appears in some theoretical calculations. To date,
no calculations predict the high Mo/Ge ratio, independent of Mo/Fe, that we
find in all five stars.
|
In order to distinguish between regular and chaotic planetary orbits we apply
a new technique called MEGNO in a wide neighbourhood of orbital parameters
determined using standard two-body Keplerian fits for HD 12661, HD 38529, HD
37124 and HD 160691 planetary systems. We show that the currently announced
orbital parameters place these systems in very different situations from the
point of view of dynamical stability. While HD 38529 and HD 37124 are located
within large stability zones in the phase space around their determined orbits,
the preliminary orbits in HD 160691 are highly unstable. The orbital parameters
of the HD 12661 planets are located in a border region between stable and
unstable dynamical regimes, so while its currently determined orbital
parameters produce stable regular orbits, a minor change within the margin of
error of just one parameter may result in a chaotic dynamical system.
| 0.855289 | 0.641825 | 0.213464 |
2004.06360
|
Simultaneous Diagonalization via congruence of matrices and some
applications in optimization
|
Simultaneous diagonalization via congruence (SDC) of matrices has been a long
standing problem [Potpourri of conjectures and open questions in nonlinear
analysis and optimization, SIAM Rev., 49 (2007), pp. 255-273]. The best
attempts so far can only deal with the problem for two matrices and for more
than two matrices under the existence assumption of a semidefinite matrix
pencil [Jiang, R., Duan, L.: Simultaneous diagonalization of matrices and its
applications in quadratically constrained quadratic programming, SIAM J. Optim.
Vol. 26, No. 3, 1649-1668 (2016)]. In this paper, the problem will be solved
for any number of real symmetric matrices without any assumption. We first
propose necessary and sufficient SDC conditions in case at least one of the
matrices is nonsingular. If all the matrices are singular, we show that the
matrices can always be decomposed into diagonal blocks such that the SDC of
given matrices is then equivalently transferred to the SDC of the sub-matrices.
Importantly, the sub-matrices now contain at least one nonsingular matrix. Two
important applications of the SDC for quadratically constrained quadratic
programming problems and maximizing a sum of generalized Rayleigh quotients
will be introduced.
|
The high-order relations between the content in social media sharing
platforms are frequently modeled by a hypergraph. Either hypergraph Laplacian
matrix or the adjacency matrix is a big matrix. Randomized algorithms are used
for low-rank factorizations in order to approximately decompose and eventually
invert such big matrices fast. Here, block randomized Singular Value
Decomposition (SVD) via subspace iteration is integrated within adaptive
hypergraph weight estimation for image tagging, as a first approach.
Specifically, creating low-rank submatrices along the main diagonal by
tessellation permits fast matrix inversions via randomized SVD. Moreover, a
second approach is proposed for solving the linear system in the optimization
problem of hypergraph learning by employing the conjugate gradient method. Both
proposed approaches achieve high accuracy in image tagging measured by F1 score
and succeed to reduce the computational requirements of adaptive hypergraph
weight estimation.
| 0.911268 | 0.744866 | 0.166402 |
2004.06361
|
Modelling and docking of Indian SARS-CoV-2 spike protein 1 with ACE2:
implications for co-morbidity and therapeutic intervention
|
Presently, India bears amongst the highest burden of non-communicable
diseases such as diabetes mellitus (DM), hypertension (HT), and cardio vascular
disease (CVD) and thus represents a vulnerable target to the
SARS-CoV-2/COVID-19 pandemic. Involvement of the angiotensin converting enzyme
2 (ACE2) in susceptibility to infection and pathogenesis by SARS-CoV-2 is
currently an actively pursued research area. An increased susceptibility to
infection in individuals with DM, HT and CVD together with higher levels of
circulating ACE2 in these settings presents a scenario where interaction with
soluble ACE2 may result in disseminated virus-receptor complexes that could
enhance virus acquisition and pathogenesis. Thus, understanding the SARS-CoV-2
receptor binding domain-ACE2 interaction, both membrane bound and in the cell
free context may contribute to elucidating the role of co-morbidities in
increased susceptibility to infection and pathogenesis. Both Azithromycin and
Hydroxychloroquine (HCQ) have shown efficacy in mitigating viral carriage in
infected individuals. Furthermore, each of these compounds generate active
metabolites which in turn may also modulate virus-receptor interaction and thus
influence clinical outcomes. In this study, we model the structural interaction
of S1 with both full-length and soluble ACE2. Additionally, therapeutic drugs
and their active metabolites were docked with soluble ACE2 protein. Our results
show that S1 from either of the reported Indian sequences can bind both
full-length and soluble ACE2, albeit with varying affinity that can be
attributed to a reported substitution in the RBD. Furthermore, both
Azythromycin and HCQ together with their active metabolites can allosterically
affect, to a range of extents, binding of S1 to ACE2.
|
The osmotic virial coefficient $B_2$ of globular protein solutions is
calculated as a function of added salt concentration at fixed pH by computer
simulations of the ``primitive model''. The salt and counter-ions as well as a
discrete charge pattern on the protein surface are explicitly incorporated. For
parameters roughly corresponding to lysozyme, we find that $B_2$ first
decreases with added salt concentration up to a threshold concentration, then
increases to a maximum, and then decreases again upon further raising the ionic
strength. Our studies demonstrate that the existence of a discrete charge
pattern on the protein surface profoundly influences the effective interactions
and that non-linear Poisson Boltzmann and Derjaguin-Landau-Verwey-Overbeek
(DLVO) theory fail for large ionic strength. The observed non-monotonicity of
$B_2$ is compared to experiments. Implications for protein crystallization are
discussed.
| 0.846162 | 0.643153 | 0.203009 |
2004.06363
|
Particle Gibbs Sampling for Bayesian Phylogenetic inference
|
The combinatorial sequential Monte Carlo (CSMC) has been demonstrated to be
an efficient complementary method to the standard Markov chain Monte Carlo
(MCMC) for Bayesian phylogenetic tree inference using biological sequences. It
is appealing to combine the CSMC and MCMC in the framework of the particle
Gibbs (PG) sampler to jointly estimate the phylogenetic trees and evolutionary
parameters. However, the Markov chain of the particle Gibbs may mix poorly if
the underlying SMC suffers from the path degeneracy issue. Some remedies,
including the particle Gibbs with ancestor sampling and the interacting
particle MCMC, have been proposed to improve the PG. But they either cannot be
applied to or remain inefficient for the combinatorial tree space. We introduce
a novel CSMC method by proposing a more efficient proposal distribution. It
also can be combined into the particle Gibbs sampler framework to infer
parameters in the evolutionary model. The new algorithm can be easily
parallelized by allocating samples over different computing cores. We validate
that the developed CSMC can sample trees more efficiently in various particle
Gibbs samplers via numerical experiments. Our implementation is available at
https://github.com/liangliangwangsfu/phyloPMCMC
|
We consider the inference of the structure of an undirected graphical model
in an exact Bayesian framework. More specifically we aim at achieving the
inference with close-form posteriors, avoiding any sampling step. This task
would be intractable without any restriction on the considered graphs, so we
limit our exploration to mixtures of spanning trees. We consider the inference
of the structure of an undirected graphical model in a Bayesian framework. To
avoid convergence issues and highly demanding Monte Carlo sampling, we focus on
exact inference. More specifically we aim at achieving the inference with
close-form posteriors, avoiding any sampling step. To this aim, we restrict the
set of considered graphs to mixtures of spanning trees. We investigate under
which conditions on the priors - on both tree structures and parameters - exact
Bayesian inference can be achieved. Under these conditions, we derive a fast an
exact algorithm to compute the posterior probability for an edge to belong to
{the tree model} using an algebraic result called the Matrix-Tree theorem. We
show that the assumption we have made does not prevent our approach to perform
well on synthetic and flow cytometry data.
| 0.877566 | 0.779414 | 0.098152 |
2004.06364
|
Polar nano-clusters in nominally paraelectric ceramics demonstrating
high microwave tunability for wireless communication
|
Dielectric materials, with high tunability at microwave frequencies, are key
components in the design of microwave communication systems. Dense
Ba0.6Sr0.4TiO3 (BST) ceramics, with different grain sizes, were prepared in
order to optimise the dielectric tunability via polar nano cluster effects.
Dielectric permittivity and loss measurements were carried at both high and low
frequencies and were supported by results from X-ray powder diffraction,
scanning and transmission electron microscopies, Raman spectroscopy and
piezoresponse force microscopy. The concentration of polar nano clusters, whose
sizes are found to be in the range 20 to 50 nm, and the dielectric tunability
increase with increasing grain size. A novel method for measurement of the
microwave tunability in bulk dielectrics is presented. The highest tunability
of 32% is achieved in ceramics with an average grain size of 10 um. The
tunability of BST ceramics with applied DC field is demonstrated in a prototype
small resonant antenna.
|
We realize quantum gates for path qubits with a high-speed,
polarization-independent and tunable beam splitter. Two electro-optical
modulators act in a Mach-Zehnder interferometer as high-speed phase shifters
and rapidly tune its splitting ratio. We test its performance with heralded
single photons, observing a polarization-independent interference contrast
above 95%. The switching time is about 5.6 ns, and a maximal repetition rate is
2.5 MHz. We demonstrate tunable feed-forward operations of a single-qubit gate
of path-encoded qubits and a two-qubit gate via measurement-induced interaction
between two photons.
| 0.867977 | 0.635526 | 0.232451 |
2004.06365
|
An updated discussion of the solar abundance problem
|
We discuss the level of agreement of a new generation of standard solar
models (SSMs), Barcelona 2016 or B16 for short, with helioseismic and solar
neutrino data, confirming that models implementing the AGSS09met surface
abundances, based on refined three-dimensional hydrodynamical simulations of
the solar atmosphere, do not not reproduce helioseismic constraints. We clarify
that this solar abundance problem can be equally solved by a change of the
composition and/or of the opacity of the solar plasma, since effects produced
by variations of metal abundances are equivalent to those produced by suitable
modifications of the solar opacity profile. We discuss the importance of
neutrinos produced in the CNO cycle for removing the composition-opacity
degeneracy and the perspectives for their future detection.
|
Using the HST Goddard High Resolution Spectrograph (GHRS), we have obtained
high S/N echelle observations of the weak interstellar N I 1160, 1161 A
absorption doublet toward the stars Gamma Cas, Lambda Ori, Iota Ori, Kappa Ori,
Delta Sco, and Kappa Sco. In combination with a previous GHRS measurement of N
I toward Zeta Oph, these new observations yield a mean interstellar gas phase
nitrogen abundance (per 10$^6$ H atoms) of 10$^6$ N/H = 75 +/- 4. There are no
statistically significant variations in the measured N abundances from
sightline to sightline and no evidence of density-dependent depletion from the
gas-phase. Since N is not expected to be depleted much into dust grains in
these diffuse sightlines, its gas-phase abundance should reflect the total
interstellar abundance. Consequently, the GHRS observations imply that the
abundance of interstellar nitrogen (gas plus grains) in the local Milky Way is
about 80% of the solar system value of 10$^6$ N/H = 93 +/- 16. Although this
interstellar abundance deficit is somewhat less than that recently found for
oxygen and krypton with GHRS, the solar N abundance and the N I oscillator
strengths are too uncertain to definitively rule out either a solar ISM N
abundance or a 2/3 solar ISM N abundance similar to that of O and Kr.
| 0.82839 | 0.745628 | 0.082761 |
2004.06366
|
Simple Multi-Resolution Representation Learning for Human Pose
Estimation
|
Human pose estimation - the process of recognizing human keypoints in a given
image - is one of the most important tasks in computer vision and has a wide
range of applications including movement diagnostics, surveillance, or
self-driving vehicle. The accuracy of human keypoint prediction is increasingly
improved thanks to the burgeoning development of deep learning. Most existing
methods solved human pose estimation by generating heatmaps in which the ith
heatmap indicates the location confidence of the ith keypoint. In this paper,
we introduce novel network structures referred to as multiresolution
representation learning for human keypoint prediction. At different resolutions
in the learning process, our networks branch off and use extra layers to learn
heatmap generation. We firstly consider the architectures for generating the
multiresolution heatmaps after obtaining the lowest-resolution feature maps.
Our second approach allows learning during the process of feature extraction in
which the heatmaps are generated at each resolution of the feature extractor.
The first and second approaches are referred to as multi-resolution heatmap
learning and multi-resolution feature map learning respectively. Our
architectures are simple yet effective, achieving good performance. We
conducted experiments on two common benchmarks for human pose estimation:
MS-COCO and MPII dataset.
|
This study presents a new network (i.e., PoseLifter) that can lift a 2D human
pose to an absolute 3D pose in a camera coordinate system. The proposed network
estimates the absolute 3D location of a target subject and generates an
improved 3D relative pose estimation compared with existing pose-lifting
methods. Using the PoseLifter with a 2D pose estimator in a cascade fashion can
estimate a 3D human pose from a single RGB image. In this case, we empirically
prove that using realistic 2D poses synthesized with the real error
distribution of 2D body joints considerably improves the performance of our
PoseLifter. The proposed method is applied to public datasets to achieve
state-of-the-art 2D-to-3D pose lifting and 3D human pose estimation.
| 0.841674 | 0.761271 | 0.080403 |
2004.06367
|
Enumerating Chemical Graphs with Mono-block 2-Augmented Tree Structure
from Given Upper and Lower Bounds on Path Frequencies
|
We consider a problem of enumerating chemical graphs from given constraints
concerning their structures, which has an important application to a novel
method for the inverse QSAR/QSPR recently proposed. In this paper, the
structure of a chemical graph is specified by a feature vector each of whose
entries represents the frequency of a prescribed path. We call a graph a
2-augmented tree if it is obtained from a tree (an acyclic graph) by adding
edges between two pairs of nonadjacent vertices. Given a set of feature vectors
as the interval between upper and lower bounds of feature vectors, we design an
efficient algorithm for enumerating chemical 2-augmented trees that satisfy the
path frequency specified by some feature vector in the set. We implemented the
proposed algorithm and conducted some computational experiments.
|
Improved upper and lower bounds on the number of square-free ternary words
are obtained. The upper bound is based on the enumeration of square-free
ternary words up to length 110. The lower bound is derived by constructing
generalised Brinkhuis triples. The problem of finding such triples can
essentially be reduced to a combinatorial problem, which can efficiently be
treated by computer. In particular, it is shown that the number of square-free
ternary words of length n grows at least as 65^(n/40), replacing the previous
best lower bound of 2^(n/17).
| 0.897391 | 0.749636 | 0.147755 |
2004.06368
|
Managing Industrial Communication Delays with Software-Defined
Networking
|
Recent technological advances have fostered the development of complex
industrial cyber-physical systems which demand real-time communication with
delay guarantees. The consequences of delay requirement violation in such
systems may become increasingly severe. In this paper, we propose a
contract-based fault-resilient methodology which aims at managing the
communication delays of real-time flows in industries. With this objective, we
present a light-weight mechanism to estimate end-to-end delay in the network in
which the clocks of the switches are not synchronized. The mechanism aims at
providing high level of accuracy with lower communication overhead. We then
propose a contract-based framework using software-defined networking where the
components are associated with delay contracts and a resilience manager. The
proposed resilience management framework contains: (1) contracts which state
guarantees about components behaviors, (2) observers which are responsible to
detect contract failure (fault), (3) monitors to detect events such as run-time
changes in the delay requirements and link failure, (4) control logic to take
suitable decisions based on the type of the fault, (5) resilience manager to
decide response strategies containing the best course of action as per the
control logic decision. Finally, we present a delay-aware path finding
algorithm which is used to route/reroute the real-time flows to provide
resiliency in the case of faults and, to adapt to the changes in the network
state. Performance of the proposed framework is evaluated with the Ryu SDN
controller and Mininet network emulator.
|
Heterogeneous networks (HetNets) as a combination of macro cells and small
cells are used to increase the cellular network's capacity, and present a
perfect solution for high-speed communications. Increasing area spectrum
efficiency and capacity of HetNets largely depends on the high speed of
backhaul links. One effective way which is currently utilized in HetNets is the
use of full-duplex (FD) technology that potentially doubles the spectral
efficiency without the need for additional spectrum. On the other hand, one of
the most critical network design requirements is delay, which is a key
representation of the quality of service (QoS) in modern cellular networks. In
this paper, by utilizing tools from the stochastic geometry, we analyze the
local delay for downlink (DL) channel, which is typically defined as the mean
number of required time slots for a successful communication. Given imperfect
self-interference (SI) cancellation in practical FD communications, we utilize
duplex mode (half-duplex (HD) or FD) for each user based on the distance from
its serving base station (BS). Further, we aim to investigate the energy
efficiency (EE) for both duplexing modes, i.e., HD and FD, by considering local
delay. We conduct extensive simulations to validate system performance in terms
of local delay versus different system key parameters.
| 0.82721 | 0.702308 | 0.124902 |
2004.06369
|
On the difference of coefficients of univalent functions
|
For $f\in \mathcal{S}$, the class of normalized functions, analytic and
univalent in the unit disk $\mathbb{D}$ and given by
$f(z)=z+\sum_{n=2}^{\infty} a_n z^n$ for $z\in \mathbb{D}$, we give an upper
bound for the coefficient difference $|a_4|-|a_3|$ when $f\in \mathcal{S}$.
This provides an improved bound in the case $n=3$ of Grispan's 1976 general
bound $||a_{n+1}|-|a_n||\le 3.61\dots .$ Other coefficients bounds, and bounds
for the second and third Hankel determinants when $f\in \mathcal{S}$ are found
when either $a_2=0,$ or $a_3=0$.
|
Smith et al. recently gave the sufficient and necessary conditions for the
boundedness of Volterra type operators on Banach spaces of bounded analytic
functions when the symbol functions are univalent. In this paper, we give the
complete characterizations of the conditions for the boundedness and
compactness of Volterra type operators $T_g$ and their companion operators
$S_g$ between weighted Banach spaces of analytic functions, which essentially
generalize their works.
| 0.848681 | 0.780621 | 0.06806 |
2004.06370
|
Exact MAP-Inference by Confining Combinatorial Search with LP Relaxation
|
We consider the MAP-inference problem for graphical models, which is a valued
constraint satisfaction problem defined on real numbers with a natural
summation operation. We propose a family of relaxations (different from the
famous Sherali-Adams hierarchy), which naturally define lower bounds for its
optimum. This family always contains a tight relaxation and we give an
algorithm able to find it and therefore, solve the initial non-relaxed NP-hard
problem.
The relaxations we consider decompose the original problem into two
non-overlapping parts: an easy LP-tight part and a difficult one. For the
latter part a combinatorial solver must be used. As we show in our experiments,
in a number of applications the second, difficult part constitutes only a small
fraction of the whole problem. This property allows to significantly reduce the
computational time of the combinatorial solver and therefore solve problems
which were out of reach before.
|
We introduce constructions of exact Lagrangian cobordisms with cylindrical
Legendrian ends and study their invariants which arise from Symplectic Field
Theory. A pair $(X,L)$ consisting of an exact symplectic manifold $X$ and an
exact Lagrangian cobordism $L\subset X$ which agrees with cylinders over
Legendrian links $\Lambda_+$ and $\Lambda_-$ at the positive and negative ends
induces a differential graded algebra (DGA) map from the Legendrian contact
homology DGA of $\Lambda_+$ to that of $\Lambda_-$. We give a gradient flow
tree description of the DGA maps for certain pairs $(X,L)$, which in turn
yields a purely combinatorial description of the cobordism map for elementary
cobordisms, i.e., cobordisms that correspond to certain local modifications of
Legendrian knots. As an application, we find exact Lagrangian surfaces that
fill a fixed Legendrian link and are not isotopic through exact Lagrangian
surfaces.
| 0.863021 | 0.59715 | 0.265871 |
2004.06372
|
Complex scaling applied ex post to real-scaled Hermitian energy spectrum
|
I consider a finite basis set problem, where Hamiltonian is scaled through a
coordinate, such that $H(x) \to H(xe^\eta)$ and $\eta$ is a free parameter. The
famous method of complex scaling is obtained for $\eta$ imaginary, while the so
called stationary graph is obtained for $\eta$ real defined. I focus on an
occurrence of exceptional points (EPs) in the complex plane of $\eta$ due to
the interaction between quasi-stationary states (resonances) and
quasi-continuum states. The EPs mark a transition between adiabatic and
diabatic representations of these interacting states. The complex resonance
energy gets stabilized only as $Im\, \eta$ is large. That is, not in the
vicinity of one EP, but in an area where many remote EPs contribute. This can
be taken into account by constructing a diabatic Hamiltonian for a common
neighborhood of several EPs using small Hamiltonians valid at individual EPs
proximities. Such a Hamiltonian imitates the spectrum of the original complex
scaled Hamiltonian.
|
In the recent years a generalization of Hermiticity was investigated using a
complex deformation H=p^2 +x^2(ix)^\epsilon of the harmonic oscillator
Hamiltonian, where \epsilon is a real parameter. These complex Hamiltonians,
possessing PT symmetry (the product of parity and time reversal), can have real
spectrum. We will consider the most simple case: \epsilon even. In this paper
we describe all self-adjoint (Hermitian) and at the same time PT symmetric
operators associated to H=p^2 +x^2(ix)^\epsilon. Surprisingly it turns out that
there are a large class of self-adjoint operators associated to H=p^2
+x^2(ix)^\epsilon which are not PT symmetric.
| 0.790482 | 0.75409 | 0.036391 |
2004.06373
|
Oversampling for Imbalanced Time Series Data
|
Many important real-world applications involve time-series data with skewed
distribution. Compared to conventional imbalance learning problems, the
classification of imbalanced time-series data is more challenging due to high
dimensionality and high inter-variable correlation. This paper proposes a
structure preserving Oversampling method to combat the High-dimensional
Imbalanced Time-series classification (OHIT). OHIT first leverages a
density-ratio based shared nearest neighbor clustering algorithm to capture the
modes of minority class in high-dimensional space. It then for each mode
applies the shrinkage technique of large-dimensional covariance matrix to
obtain accurate and reliable covariance structure. Finally, OHIT generates the
structure-preserving synthetic samples based on multivariate Gaussian
distribution by using the estimated covariance matrices. Experimental results
on several publicly available time-series datasets (including unimodal and
multi-modal) demonstrate the superiority of OHIT against the state-of-the-art
oversampling algorithms in terms of F-value, G-mean, and AUC.
|
Many real world data mining applications involve obtaining predictive models
using data sets with strongly imbalanced distributions of the target variable.
Frequently, the least common values of this target variable are associated with
events that are highly relevant for end users (e.g. fraud detection, unusual
returns on stock markets, anticipation of catastrophes, etc.). Moreover, the
events may have different costs and benefits, which when associated with the
rarity of some of them on the available training data creates serious problems
to predictive modelling techniques. This paper presents a survey of existing
techniques for handling these important applications of predictive analytics.
Although most of the existing work addresses classification tasks (nominal
target variables), we also describe methods designed to handle similar problems
within regression tasks (numeric target variables). In this survey we discuss
the main challenges raised by imbalanced distributions, describe the main
approaches to these problems, propose a taxonomy of these methods and refer to
some related problems within predictive modelling.
| 0.881051 | 0.74377 | 0.137281 |
2004.06374
|
Addressing Packet Dropping Misbehavior using Metaheuristic Approach: A
Survey
|
A Mobile Ad hoc Network can be said as a collection of mobile nodes, which
builds a dynamic topology and a resource constrained network. Due to dynamic
nature routing is challenging in MANET. In Mobile Ad hoc Networks different
type of attack is possible. By manipulation in routing and attacks against data
are reasoned by malicious nodes. MANETs are susceptible to various attacks from
selfish nodes. To defeat those problems security is demanded for preventing
node from various attacks. Metaheuristic techniques are used for addressing a
problem found in ad hoc networks such as routing, security and optimization. A
lot of research has been carried out for secure routing process with
metaheuristic approaches. In this paper, we present survey of metaheuristic
approach to improve routing process by enhancing the security and optimization
among different nodes in mobile ad hoc networks.
|
Random linear network coding can be used in peer-to-peer networks to increase
the efficiency of content distribution and distributed storage. However, these
systems are particularly susceptible to Byzantine attacks. We quantify the
impact of Byzantine attacks on the coded system by evaluating the probability
that a receiver node fails to correctly recover a file. We show that even for a
small probability of attack, the system fails with overwhelming probability. We
then propose a novel signature scheme that allows packet-level Byzantine
detection. This scheme allows one-hop containment of the contamination, and
saves bandwidth by allowing nodes to detect and drop the contaminated packets.
We compare the net cost of our signature scheme with various other Byzantine
schemes, and show that when the probability of Byzantine attacks is high, our
scheme is the most bandwidth efficient.
| 0.757218 | 0.711779 | 0.045439 |
2004.06375
|
A Primal-Dual Solver for Large-Scale Tracking-by-Assignment
|
We propose a fast approximate solver for the combinatorial problem known as
tracking-by-assignment, which we apply to cell tracking. The latter plays a key
role in discovery in many life sciences, especially in cell and developmental
biology. So far, in the most general setting this problem was addressed by
off-the-shelf solvers like Gurobi, whose run time and memory requirements
rapidly grow with the size of the input. In contrast, for our method this
growth is nearly linear.
Our contribution consists of a new (1) decomposable compact representation of
the problem; (2) dual block-coordinate ascent method for optimizing the
decomposition-based dual; and (3) primal heuristics that reconstructs a
feasible integer solution based on the dual information. Compared to solving
the problem with Gurobi, we observe an up to~60~times speed-up, while reducing
the memory footprint significantly. We demonstrate the efficacy of our method
on real-world tracking problems.
|
In this paper we propose a distributed dual gradient algorithm for minimizing
linearly constrained separable convex problems and analyze its rate of
convergence. In particular, we prove that under the assumption of strong
convexity and Lipshitz continuity of the gradient of the primal objective
function we have a global error bound type property for the dual problem. Using
this error bound property we devise a fully distributed dual gradient scheme,
i.e. a gradient scheme based on a weighted step size, for which we derive
global linear rate of convergence for both dual and primal suboptimality and
for primal feasibility violation. Many real applications, e.g. distributed
model predictive control, network utility maximization or optimal power flow,
can be posed as linearly constrained separable convex problems for which dual
gradient type methods from literature have sublinear convergence rate. In the
present paper we prove for the first time that in fact we can achieve linear
convergence rate for such algorithms when they are used for solving these
applications. Numerical simulations are also provided to confirm our theory.
| 0.845757 | 0.704203 | 0.141555 |
2004.06376
|
Footprints and Free Space from a Single Color Image
|
Understanding the shape of a scene from a single color image is a formidable
computer vision task. However, most methods aim to predict the geometry of
surfaces that are visible to the camera, which is of limited use when planning
paths for robots or augmented reality agents. Such agents can only move when
grounded on a traversable surface, which we define as the set of classes which
humans can also walk over, such as grass, footpaths and pavement. Models which
predict beyond the line of sight often parameterize the scene with voxels or
meshes, which can be expensive to use in machine learning frameworks.
We introduce a model to predict the geometry of both visible and occluded
traversable surfaces, given a single RGB image as input. We learn from stereo
video sequences, using camera poses, per-frame depth and semantic segmentation
to form training data, which is used to supervise an image-to-image network. We
train models from the KITTI driving dataset, the indoor Matterport dataset, and
from our own casually captured stereo footage. We find that a surprisingly low
bar for spatial coverage of training scenes is required. We validate our
algorithm against a range of strong baselines, and include an assessment of our
predictions for a path-planning task.
|
Matching people across multiple camera views known as person
re-identification, is a challenging problem due to the change in visual
appearance caused by varying lighting conditions. The perceived color of the
subject appears to be different with respect to illumination. Previous works
use color as it is or address these challenges by designing color spaces
focusing on a specific cue. In this paper, we propose a data driven approach
for learning color patterns from pixels sampled from images across two camera
views. The intuition behind this work is that, even though pixel values of same
color would be different across views, they should be encoded with the same
values. We model color feature generation as a learning problem by jointly
learning a linear transformation and a dictionary to encode pixel values. We
also analyze different photometric invariant color spaces. Using color as the
only cue, we compare our approach with all the photometric invariant color
spaces and show superior performance over all of them. Combining with other
learned low-level and high-level features, we obtain promising results in
ViPER, Person Re-ID 2011 and CAVIAR4REID datasets.
| 0.783176 | 0.740887 | 0.042289 |
2004.06377
|
Baryon number fluctuations induced by hadronic interactions at low
temperature and large chemical potential
|
We investigate the density fluctuations induced by hadronic interactions at
low temperatures and large chemical potentials after the hadronization of
quark-gluon plasma~(QGP). We analyze the structures of net-baryon number
kurtosis and skewness and elaborate on their relations with the nuclear
liquid-gas~(LG) phase transition and hadronic interactions above the critical
temperature. Combining with the relevant experimental projects at
RHIC/NICA/FAIR/J-PARC/HIAF with collision energies from $200\,$GeV to
$1.8\,$GeV, we propose a double-peak structure of kurtosis (skewness) as a
function of collision energy, which can be taken to identify the chiral phase
transition and the nuclear liquid-gas phase transition. In particular, the
fluctuation distributions at low temperatures provide a new method to explore
hadronic interactions and nuclear liquid-gas transition.
|
We discuss the potential of the experimental programme at NICA to investigate
the QCD phase diagram and particularly the position of the critical line at
large baryon-chemical potential with accurate measurements of particle
multiplicities. We briefly review the present status and we outline the tasks
to be accomplished both theoretically and the experimentally to make hadronic
abundances a sensitive probe.
| 0.882552 | 0.819449 | 0.063103 |
2004.06379
|
Enhanced third-harmonic generation induced by nonlinear field resonances
in plasmonic-graphene metasurfaces
|
Nonlinear metasurfaces offer new paradigm for boosting optical effect beyond
limitations of conventional materials. In this work, we present an alternative
way to produce pronounced third-harmonic generation (THG) based on nonlinear
field resonances rather than linear field enhancement, which is a typical
strategy for achieving strong nonlinear response. By designing and studying a
nonlinear plasmonic-graphene metasurface at terahertz regime with hybrid guided
modes and bound states in the continuum modes, it is found that a THG with a
narrow bandwidth can be observed, thanks to the strong resonance between
generated weak THG field and these modes. Such strong nonlinear field resonance
greatly enhances the photon-photon interactions, thus resulting in a large
effective nonlinear coefficient of the whole system. This finding provides new
opportunity for studying nonlinear optical metasurfaces.
|
A graphene layer on top of a dielectric can dramatically influence ability of
the material to radiative heat transfer. This property of graphene is used to
improve the performance and reduce costs of near-field thermophotovoltaic
cells. Instead of low bandgap semiconductors it is proposed to use
graphene-on-silicon Schottky photovoltaic cells. One layer of graphene absorbs
around 90% of incoming radiation and increases the heat transfer. This is due
to excitation of plasmons in graphene, which are automatically tuned in
resonance with the emitted light in the mid infrared range. The absorbed
radiation excites electron-hole pairs in graphene, which are separated by the
surface field induced by the Schottky barrier. For a quasi-monochromatic source
the generated power is one order of magnitude larger and efficiency is on the
same level as for semiconductor photovoltaic cells.
| 0.933552 | 0.727322 | 0.20623 |
2004.06380
|
A Survey of Energy Efficient Schemes in Ad-hoc Networks
|
Ad hoc network is a collection of different types of nodes, which are
connected in heterogeneous or homogeneous manner. It is also known as
self-organizing-wireless network. The dynamic nature of ad hoc networks make
them more attractive, which is used in many different applications. Every coin
has two sides: one is the advantage part and other is disadvantages, in the
same manner nature of ad hoc network make it more attractive from one side in
other hand there are some issues too. Energy efficiency is a core factor which
effects on ad hoc network in terms of battery life, throughput, overhead of
messages, transmission error. For solving issues of energy constraints,
different mechanisms are proposed by various researchers. In this paper, we
survey various existing schemes which attempt to improve energy efficiency of
different types of ad hoc routing protocol to increase network lifetime.
Furthermore we outline future scope of these existing schemes which may help
researches to carry out further research in this direction.
|
Network coding has proved its efficiency in increasing the network
performance for traditional ad-hoc networks. In this paper, we investigate
using network coding for enhancing the throughput of multi-hop cognitive radio
networks. We formulate the network coding throughput maximization problem as a
graph theory problem, where different constraints and primary users'
characteristics are mapped to the graph structure. We then show that the
optimal solution to this problem in NP-hard and propose a heuristic algorithm
to efficiently solve it.
Evaluation of the proposed algorithm through NS2 simulations shows that we
can increase the throughput of the constrained secondary users' network by
150\% to 200\% for a wide range of scenarios covering different primary users'
densities, traffic loads, and spectrum availability.
| 0.86717 | 0.763189 | 0.103981 |
2004.06381
|
Test Automation Process Improvement in a DevOpsTeam: Experience Report
|
How to successfully conduct test automation process improvement (TAPI) for
continuous development, consisting of iterative software development,
continuous testing, and delivery, is the challenge faced by many software
organizations. In this paper, we present an experience report on TAPI in one
DevOps team in F-Secure (a Finnish software company). The team builds Windows
application software and exists in F-Secure's TAPI culture. The team
self-reports high satisfaction and maturity in test automation for continuous
development. To study their TAPI, we reviewed a collection of experience notes,
team reflection reports and telemetry result reports. Then several meetings
were held to discuss the details. We found that based on the understanding of
the team, test automation maturity for continuous development is defined as a
set of indicators, e.g., the increasing speed to release, improving the
productivity of the team, high test efficiency. Second, the team indicated that
a set of critical success factors have a major impact on successfully carrying
out its TAPI, e.g., incremental approach, the whole team effort, test tool
choice and architecture, telemetry. Third, we compare the TAPI practices in the
observed team with the practices described in prior literature. The team
believes that the existing test automation maturity approaches should include
the identified practices like the whole team effort to build a more
comprehensive test automation improvement model for the software industry.
|
For more than a decade Vytelingum's Adaptive-Aggressive (AA) algorithm has
been recognized as the best-performing automated auction-market trading-agent
strategy currently known in the AI/Agents literature; in this paper, we
demonstrate that it is in fact routinely outperformed by another algorithm when
exhaustively tested across a sufficiently wide range of market scenarios. The
novel step taken here is to use large-scale compute facilities to brute-force
exhaustively evaluate AA in a variety of market environments based on those
used for testing it in the original publications. Our results show that even in
these simple environments AA is consistently out-performed by IBM's GDX
algorithm, first published in 2002. We summarize here results from more than
one million market simulation experiments, orders of magnitude more testing
than was reported in the original publications that first introduced AA. A 2019
ICAART paper by Cliff claimed that AA's failings were revealed by testing it in
more realistic experiments, with conditions closer to those found in real
financial markets, but here we demonstrate that even in the simple experiment
conditions that were used in the original AA papers, exhaustive testing shows
AA to be outperformed by GDX. We close this paper with a discussion of the
methodological implications of our work: any results from previous papers where
any one trading algorithm is claimed to be superior to others on the basis of
only a few thousand trials are probably best treated with some suspicion now.
The rise of cloud computing means that the compute-power necessary to subject
trading algorithms to millions of trials over a wide range of conditions is
readily available at reasonable cost: we should make use of this; exhaustive
testing such as is shown here should be the norm in future evaluations and
comparisons of new trading algorithms.
| 0.84029 | 0.581706 | 0.258584 |
2004.06382
|
Kinship Identification through Joint Learning Using Kinship Verification
Ensemble
|
While kinship verification is a well-exploited task which only identifies
whether or not two people are kins, kinship identification is the task to
further identify the particular type of kinships and is not well exploited yet.
We found that a naive extension of kinship verification cannot solve the
identification properly. This is because the existing verification networks are
individually trained on specific kinships and do not consider the context
between different kinship types. Also, the existing kinship verification
dataset has a biased positive-negative distribution, which is different from
real-world distribution. To solve it, we propose a novel kinship identification
approach through the joint training of kinship verification ensembles and a
Joint Identification Module. We also propose to rebalance the training dataset
to make it realistic. Rigorous experiments demonstrate the superiority of
performance on kinship identification task. It also demonstrates significant
performance improvement of kinship verification when trained on the same
unbiased data.
|
Ensemble learning of $K$ nonlinear perceptrons, which determine their outputs
by sign functions, is discussed within the framework of online learning and
statistical mechanics. One purpose of statistical learning theory is to
theoretically obtain the generalization error. This paper shows that ensemble
generalization error can be calculated by using two order parameters, that is,
the similarity between a teacher and a student, and the similarity among
students. The differential equations that describe the dynamical behaviors of
these order parameters are derived in the case of general learning rules. The
concrete forms of these differential equations are derived analytically in the
cases of three well-known rules: Hebbian learning, perceptron learning and
AdaTron learning. Ensemble generalization errors of these three rules are
calculated by using the results determined by solving their differential
equations. As a result, these three rules show different characteristics in
their affinity for ensemble learning, that is ``maintaining variety among
students." Results show that AdaTron learning is superior to the other two
rules with respect to that affinity.
| 0.90998 | 0.630418 | 0.279561 |
2004.06383
|
Extending Adversarial Attacks to Produce Adversarial Class Probability
Distributions
|
Despite the remarkable performance and generalization levels of deep learning
models in a wide range of artificial intelligence tasks, it has been
demonstrated that these models can be easily fooled by the addition of
imperceptible but malicious perturbations to natural inputs. These altered
inputs are known in the literature as adversarial examples. In this paper we
propose a novel probabilistic framework to generalize and extend adversarial
attacks in order to produce a desired probability distribution for the classes
when we apply the attack method to a large number of inputs. This novel attack
strategy provides the attacker with greater control over the target model, and
increases the complexity of detecting that the model is being attacked. We
introduce three different strategies to efficiently generate such attacks, and
illustrate our approach extending DeepFool, a state-of-the-art attack algorithm
to generate adversarial examples. We also experimentally validate our approach
for the spoken command classification task, an exemplary machine learning
problem in the audio domain. Our results demonstrate that we can closely
approximate any probability distribution for the classes while maintaining a
high fooling rate and by injecting imperceptible perturbations to the inputs.
|
SentiNet is a novel detection framework for localized universal attacks on
neural networks. These attacks restrict adversarial noise to contiguous
portions of an image and are reusable with different images---constraints that
prove useful for generating physically-realizable attacks. Unlike most other
works on adversarial detection, SentiNet does not require training a model or
preknowledge of an attack prior to detection. Our approach is appealing due to
the large number of possible mechanisms and attack-vectors that an
attack-specific defense would have to consider. By leveraging the neural
network's susceptibility to attacks and by using techniques from model
interpretability and object detection as detection mechanisms, SentiNet turns a
weakness of a model into a strength. We demonstrate the effectiveness of
SentiNet on three different attacks---i.e., data poisoning attacks, trojaned
networks, and adversarial patches (including physically realizable attacks)---
and show that our defense is able to achieve very competitive performance
metrics for all three threats. Finally, we show that SentiNet is robust against
strong adaptive adversaries, who build adversarial patches that specifically
target the components of SentiNet's architecture.
| 0.852599 | 0.757989 | 0.09461 |
2004.06384
|
Incorporating Uncertain Segmentation Information into Chinese NER for
Social Media Text
|
Chinese word segmentation is necessary to provide word-level information for
Chinese named entity recognition (NER) systems. However, segmentation error
propagation is a challenge for Chinese NER while processing colloquial data
like social media text. In this paper, we propose a model (UIcwsNN) that
specializes in identifying entities from Chinese social media text, especially
by leveraging ambiguous information of word segmentation. Such uncertain
information contains all the potential segmentation states of a sentence that
provides a channel for the model to infer deep word-level characteristics. We
propose a trilogy (i.e., candidate position embedding -> position selective
attention -> adaptive word convolution) to encode uncertain word segmentation
information and acquire appropriate word-level representation. Experiments
results on the social media corpus show that our model alleviates the
segmentation error cascading trouble effectively, and achieves a significant
performance improvement of more than 2% over previous state-of-the-art methods.
|
In this paper we introduce a dynamic programming algorithm to perform linear
text segmentation by global minimization of a segmentation cost function which
consists of: (a) within-segment word similarity and (b) prior information about
segment length. The evaluation of the segmentation accuracy of the algorithm on
a text collection consisting of Greek texts showed that the algorithm achieves
high segmentation accuracy and appears to be very innovating and promissing.
| 0.87992 | 0.771257 | 0.108664 |
2004.06385
|
Particle productions and anisotropic flows from the AMPT model for Cu+Au
collisions at $\sqrt{s_{NN}}=200$ GeV
|
We use the string melting version of a multi-phase transport (AMPT) model to
study Cu+Au collisions at $\sqrt{s_{NN}}=200$ GeV. The rapidity distributions
of identified hadrons show asymmetric dependences on rapidity. In addition,
elliptic and triangular flows at mid-rapidity from the AMPT model for pions,
kaons, and protons agree reasonably with the experimental data up to
$p_{T}\sim1$ GeV$/c$. We then investigate the forward/backward asymmetry of
$v_2$ and $v_3$. We find that these anisotropic flows are larger on the
Au-going side than the Cu-going side, while the asymmetry tends to go away in
very peripheral collisions. We also make predictions on transverse momentum
spectra of identified hadrons and longitudinal decorrelations of charged
particles, where the average decorrelation of elliptic flow in asymmetric Cu+Au
collisions is found to be stronger than that in Au+Au collisions.
|
During RHIC 2010 run, STAR has collected a large amount of minimum-bias,
central and high $p_{T}$ trigger data in Au+Au collisions at $\sqrt{s_{NN}} =
39$, 62.4 and 200 GeV with detector configuration for minimum photonic
conversion background. In this article we report on a new high precision
measurement of non-photonic electron mid-rapidity invariant yield, improved
nuclear modification factor and $v_{2}$ in Au+Au collisions at $\sqrt{s_{NN}} =
200$ GeV. We also present measurements of mid-rapidity invariant yield at
$\sqrt{s_{NN}} = 62.4$ and $v_{2}$ at $\sqrt{s_{NN}} = 39$ and 62.4 GeV.
| 0.917713 | 0.797967 | 0.119746 |
2004.06386
|
Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of
Distributed Anonymity Services
|
Distributed anonymity services, such as onion routing networks or
cryptocurrency tumblers, promise privacy protection without trusted third
parties. While the security of these services is often well-researched,
security implications of their required bootstrapping processes are usually
neglected: Users either jointly conduct the anonymization themselves, or they
need to rely on a set of non-colluding privacy peers. However, the typically
small number of privacy peers enable single adversaries to mimic distributed
services. We thus present AnonBoot, a Sybil-resistant medium to securely
bootstrap distributed anonymity services via public blockchains. AnonBoot
enforces that peers periodically create a small proof of work to refresh their
eligibility for providing secure anonymity services. A pseudo-random, locally
replicable bootstrapping process using on-chain entropy then prevents biasing
the election of eligible peers. Our evaluation using Bitcoin as AnonBoot's
underlying blockchain shows its feasibility to maintain a trustworthy
repository of 1000 peers with only a small storage footprint while supporting
arbitrarily large user bases on top of most blockchains.
|
Distributed Leger Technologies (DLTs), most notably Blockchain technologies,
bring decentralised platforms that eliminate a single trusted third party and
avoid the notorious single point of failure vulnerability. Since Nakamoto's
Bitcoin cryptocurrency system, an enormous number of decentralised applications
have been proposed on top of these technologies, aiming at more transparency
and trustworthiness than their traditional counterparts. These applications
spread over a lot of areas, e.g. financial services, healthcare,
transportation, supply chain management, and cloud computing. While Blockchain
brings transparency and decentralised trust intuitively due to the consensus of
a (very large) group of nodes (or, miners), it introduces very subtle
implications for other desirable properties such as privacy. In this work, we
demonstrate these subtle implications for Blockchain-based searchable
encryption solutions, which are one specific use case of cloud computing
services. These solutions rely on Blockchain to achieve both the standard
privacy property and the new fairness property, which requires that search
operations are carried out faithfully and are rewarded accordingly. We show
that directly replacing the server in an existing searchable encryption
solution with a Blockchain will cause undesirable operational cost, privacy
loss, and security vulnerabilities. The analysis results indicate that a
dedicated server is still needed to achieve the desired privacy guarantee. To
this end, we propose two frameworks which can be instantiated based on most
existing searchable encryption schemes. Through analysing these two frameworks,
we affirmatively show that a carefully engineered Blockchain-based solution can
achieve the desired fairness property while preserving the privacy guarantee of
the original searchable encryption scheme simultaneously.
| 0.917347 | 0.784712 | 0.132635 |
2004.06387
|
The Cosmological Spinor
|
We build upon previous investigation of the one-dimensional conformal
symmetry of the Friedman-Lema\^ itre-Robertson-Walker (FLRW) cosmology of a
free scalar field and make it explicit through a reformulation of the theory at
the classical level in terms of a manifestly
$\textrm{SL}(2,\mathbb{R})$-invariant action principle. The new tool is a
canonical transformation of the cosmological phase space to write it in terms
of a spinor, i.e. a pair of complex variables that transform under the
fundamental representation of $\textrm{SU}(1,1)\sim\textrm{SL}(2,\mathbb{R})$.
The resulting FLRW Hamiltonian constraint is simply quadratic in the spinor and
FLRW cosmology is written as a Schr\"odinger-like action principle. Conformal
transformations can then be written as proper-time dependent
$\textrm{SL}(2,\mathbb{R})$ transformations. We conclude with possible
generalizations of FLRW to arbitrary quadratic Hamiltonian and discuss the
interpretation of the spinor as a gravitationally-dressed matter field or
matter-dressed geometry observable.
|
Relying on a mathematical analogy of the pure states of the two-qubit system
of quantum information theory with four-component spinors we introduce the
concept of the intrinsic entanglement of spinors. To explore its physical sense
we study the entanglement capabilities of the spin representation of (pseudo-)
conformal transformations in (3+1)-dimensional Minkowski space-time. We find
that only those tensor product structures can sensibly be introduced in spinor
space for which a given spinor is not entangled.
| 0.821185 | 0.755141 | 0.066044 |
2004.06388
|
Regularized Iterative Method for Ill-posed Linear Systems Based on
Matrix Splitting
|
In this paper, the concept of matrix splitting is introduced to solve a large
sparse ill-posed linear system via Tikhonov's regularization. In the
regularization process, we convert the ill-posed system to a well-posed system.
The convergence of such a well-posed system is discussed by using different
types of matrix splittings. Comparison analysis of both systems are studied by
operating certain types of weak splittings. Further, we have extended the
double splitting of [Song J and Song Y, Calcolo 48(3), 245-260, 2011] to double
weak splitting of type II for nonsingular symmetric matrices. In addition to
that, some more comparison results are presented with the help of such weak
double splittings of type I and type II.
|
We prove that the classic logarithmic barrier problem is equivalent to a
particular logarithmic barrier positive relaxation problem with barrier and
scaling parameters. Based on the equivalence, a line-search primal-dual
interior-point relaxation method for nonlinear programs is presented. Our
method does not require any primal or dual iterates to be interior-points,
which is prominently different from the existing interior-point methods in the
literature. A new logarithmic barrier penalty function dependent on both primal
and dual variables is used to prompt the global convergence of the method,
where the penalty parameter is updated adaptively. Without assuming any
regularity condition, it is proved that our method will terminate at an
approximate KKT point of the original problem provided the barrier parameter
tends zero. Otherwise, either an approximate infeasible stationary point or an
approximate singular stationary point of the original problem will be found.
Some preliminary numerical results are reported, including the results for a
well-posed problem for which many line-search interior-point methods were
demonstrated not to be globally convergent, a feasible problem for which the
LICQ and the MFCQ fail to hold at the solution and an infeasible problem, and
for some standard test problems of the CUTE collection. These results show that
our algorithm is not only efficient for well-posed feasible problems, but also
is applicable for some ill-posed feasible problems and some even infeasible
problems.
| 0.882948 | 0.665919 | 0.217029 |
2004.06389
|
Tag Embedding Based Personalized Point Of Interest Recommendation System
|
Personalized Point of Interest recommendation is very helpful for satisfying
users' needs at new places. In this article, we propose a tag embedding based
method for Personalized Recommendation of Point Of Interest. We model the
relationship between tags corresponding to Point Of Interest. The model
provides representative embedding corresponds to a tag in a way that related
tags will be closer. We model Point of Interest-based on tag embedding and also
model the users (user profile) based on the Point Of Interest rated by them.
finally, we rank the user's candidate Point Of Interest based on cosine
similarity between user's embedding and Point of Interest's embedding. Further,
we find the parameters required to model user by discrete optimizing over
different measures (like ndcg@5, MRR, ...). We also analyze the result while
considering the same parameters for all users and individual parameters for
each user. Along with it we also analyze the effect on the result while
changing the dataset to model the relationship between tags. Our method also
minimizes the privacy leak issue. We used TREC Contextual Suggestion 2016 Phase
2 dataset and have significant improvement over all the measures on the state
of the art method. It improves ndcg@5 by 12.8%, p@5 by 4.3%, and MRR by 7.8%,
which shows the effectiveness of the method.
|
The past few years have witnessed the great success of recommender systems,
which can significantly help users find out personalized items for them from
the information era. One of the most widely applied recommendation methods is
the Matrix Factorization (MF). However, most of researches on this topic have
focused on mining the direct relationships between users and items. In this
paper, we optimize the standard MF by integrating the user clustering
regularization term. Our model considers not only the user-item rating
information, but also takes into account the user interest. We compared the
proposed model with three typical other methods: User-Mean (UM), Item-Mean (IM)
and standard MF. Experimental results on a real-world dataset,
\emph{MovieLens}, show that our method performs much better than other three
methods in the accuracy of recommendation.
| 0.907988 | 0.744733 | 0.163255 |
2004.06390
|
Personalized Re-ranking for Improving Diversity in Live Recommender
Systems
|
Users of industrial recommender systems are normally suggesteda list of items
at one time. Ideally, such list-wise recommendationshould provide diverse and
relevant options to the users. However, in practice, list-wise recommendation
is implemented as top-N recommendation. Top-N recommendation selects the first
N items from candidates to display. The list is generated by a ranking
function, which is learned from labeled data to optimize accuracy.However,
top-N recommendation may lead to suboptimal, as it focuses on accuracy of each
individual item independently and overlooks mutual influence between items.
Therefore, we propose a personalized re-ranking model for improving diversity
of the recommendation list in real recommender systems. The proposed re-ranking
model can be easily deployed as a follow-up component after any existing
ranking function. The re-ranking model improves the diversity by employing
personalized Determinental Point Process (DPP). DPP has been applied in some
recommender systems to improve the diversity and increase the user
engagement.However, DPP does not take into account the fact that users may have
individual propensities to the diversity. To overcome such limitation, our
re-ranking model proposes a personalized DPP to model the trade-off between
accuracy and diversity for each individual user. We implement and deploy the
personalized DPP model on alarge scale industrial recommender system.
Experimental results on both offline and online demonstrate the efficiency of
our proposed re-ranking model.
|
Recommending appropriate items to users is crucial in many e-commerce
platforms that contain implicit data as users' browsing, purchasing and
streaming history. One common approach consists in selecting the N most
relevant items to each user, for a given N, which is called top-N
recommendation. To do so, recommender systems rely on various kinds of
information, like item and user features, past interest of users for items,
browsing history and trust between users. However, they often use only one or
two such pieces of information, which limits their performance. In this paper,
we design and implement GraFC2T2, a general graph-based framework to easily
combine and compare various kinds of side information for top-N recommendation.
It encodes content-based features, temporal and trust information into a
complex graph, and uses personalized PageRank on this graph to perform
recommendation. We conduct experiments on Epinions and Ciao datasets, and
compare obtained performances using F1-score, Hit ratio and MAP evaluation
metrics, to systems based on matrix factorization and deep learning. This shows
that our framework is convenient for such explorations, and that combining
different kinds of information indeed improves recommendation in general.
| 0.855013 | 0.789753 | 0.065259 |
2004.06391
|
Author Name Disambiguation in Bibliographic Databases: A Survey
|
Entity resolution is a challenging and hot research area in the field of
Information Systems since last decade. Author Name Disambiguation (AND) in
Bibliographic Databases (BD) like DBLP , Citeseer , and Scopus is a specialized
field of entity resolution. Given many citations of underlying authors, the AND
task is to find which citations belong to the same author. In this survey, we
start with three basic AND problems, followed by need for solution and
challenges. A generic, five-step framework is provided for handling AND issues.
These steps are; (1) Preparation of dataset (2) Selection of publication
attributes (3) Selection of similarity metrics (4) Selection of models and (5)
Clustering Performance evaluation. Categorization and elaboration of similarity
metrics and methods are also provided. Finally, future directions and
recommendations are given for this dynamic area of research.
|
We introduce a new task, visual sense disambiguation for verbs: given an
image and a verb, assign the correct sense of the verb, i.e., the one that
describes the action depicted in the image. Just as textual word sense
disambiguation is useful for a wide range of NLP tasks, visual sense
disambiguation can be useful for multimodal tasks such as image retrieval,
image description, and text illustration. We introduce VerSe, a new dataset
that augments existing multimodal datasets (COCO and TUHOI) with sense labels.
We propose an unsupervised algorithm based on Lesk which performs visual sense
disambiguation using textual, visual, or multimodal embeddings. We find that
textual embeddings perform well when gold-standard textual annotations (object
labels and image descriptions) are available, while multimodal embeddings
perform well on unannotated images. We also verify our findings by using the
textual and multimodal embeddings as features in a supervised setting and
analyse the performance of visual sense disambiguation task. VerSe is made
publicly available and can be downloaded at:
https://github.com/spandanagella/verse.
| 0.884297 | 0.665716 | 0.218581 |
2004.06392
|
Non-associative algebras
|
A non-associative algebra over a field $\mathbb{K}$ is a $\mathbb{K}$-vector
space $A$ equipped with a bilinear operation \[ {A\times A\to A\colon\;
(x,y)\mapsto x\cdot y=xy}. \] The collection of all non-associative algebras
over $\mathbb{K}$, together with the product-preserving linear maps between
them, forms a variety of algebras: the category $\mathsf{Alg}_\mathbb{K}$. The
multiplication need not satisfy any additional properties, such as
associativity or the existence of a unit. Familiar categories such as the
varieties of associative algebras, Lie algebras, etc. may be found as
subvarieties of $\mathsf{Alg}_\mathbb{K}$ by imposing equations, here
$x(yz)=(xy)z$ (associativity) or $xy =- yx$ and $x(yz)+z(xy)+ y(zx)=0$
(anti-commutativity and the Jacobi identity), respectively.
The aim of these lectures is to explain some basic notions of categorical
algebra from the point of view of non-associative algebras, and vice versa. As
a rule, the presence of the vector space structure makes things easier to
understand here than in other, less richly structured categories.
We explore concepts like normal subobjects and quotients, coproducts and
protomodularity. On the other hand, we discuss the role of (non-associative)
polynomials, homogeneous equations, and how additional equations lead to
reflective subcategories.
|
In this paper we introduce color Hom-Akivis algebras and prove that the
commutator of any color non-associative Hom-algebra structure map leads to a
color Hom-akivis algebra. We give various constructions of color Hom-Akivis
algebras. Next we study flexible and alternative color Hom-Akivis algebras.
Likewise color Hom-Akivis algebras, we introduce non-commutative color
Hom-Leibniz-Poisson algebras and presente several constructions. Moreover we
give the relationship between Hom-dialgebras and Hom-Leibniz-Poisson algebras;
i.e. a Hom-dialgebras give rise to a Hom-Leibniz-Poisson algebra. Finally we
show that twisting a color Hom-Leibniz module structure map by a color
Hom-Leibniz algebra endomorphism, we get another one.
| 0.885012 | 0.808178 | 0.076834 |
2004.06393
|
Equivariant calculus on $\mu$-character and $\mu$K-stability of
polarized schemes
|
We introduce and study $\mu$K-stability of polarized schemes with respect to
general test configurations as an algebro-geometric aspect of $\mu$-cscK metric
we introduced in the last paper. There are two fundamental ingeredients. On one
hand, we develop a framework on `derivative of relative equivariant
intersection', which we name equivariant calculus. As a part of equivariant
calculus, we establish convergence results on some infinite series of
equivariant cohomology classes given by relative equivariant intersection,
based on a basic observation on the Cartan model of equivariant cohomology. On
the other hand, we derive an equivariant character $\bm{\mu}^\lambda$ called
$\mu$-character for equivariant family of polarized schemes from the
equivariant intersection formula of the log of the $\mu$-volume functional. The
derivative of the $\mu$-character not even yields $\mu$-Futaki invariant, but
also produces an analogue of the equivariant first Chern class of CM line
bundle, which is irrational in our general $\mu$K-stability setup. The product
invites us to approach the compactification problem on the moduli space of Fano
manifolds with K\"ahler--Ricci solitons.
|
The $\tau^\pm$, highly polarized in the direction of the incident beam, can
be obtained from the $e^\pm$ collider with the polarized incident $e^-$ (and
preferably also the $e^+$) beam. This polarization vector $\longvec
w_i=(w_1+w_2)/(1+w_1w_2) \widehat e_z$ can be used to construct the $T$ odd
rotationally invariant product $(\longvec w_i\times\longvec p_\mu)$. $\longvec
w_\mu$, where $w_1$ and $w_2$ are longitudinal polarization vectors of $e^-$
and $e^+$ respectively; $\longvec p_\mu$ and $\longvec w_\mu$ are the momentum
and polarization of the muon in the decay $\tau^-\rarrow \mu^-+
\bar\nu_\mu+\nu_\tau$. T is violated by the existence of such a term. CP can be
tested by comparing it with a similar term in $\tau^+$ decay. If T violation in
such a decay is milliweak or stronger, one can find it using the proposed
polarized $\tau$-charm factory with luminosity of $1 \sim 3 \times
10^{33}/\cm^2/\sec$. One can test whether T (and CP) violation is due to the
charged Higgs boson exchange by doing a similar experiment for the $\mu^\pm$
decay.
| 0.90921 | 0.668355 | 0.240855 |
2004.06394
|
Level-set inequalities on fractional maximal distribution functions and
applications to regularity theory
|
The aim of this paper is to establish an abstract theory based on the
so-called fractional-maximal distribution functions (FMDs). From the rough
ideas introduced in~\cite{AM2007}, we develop and prove some abstract results
related to the level-set inequalities and norm-comparisons by using the
language of such FMDs. Particularly interesting is the applicability of our
approach that has been shown in regularity and Calder\'on-Zygmund type
estimates. In this paper, due to our research experience, we will establish
global regularity estimates for two types of general quasilinear problems
(problems with divergence form and double obstacles), via fractional-maximal
operators and FMDs. The range of applications of these abstract results is
large. Apart from these two examples of the regularity theory for elliptic
equations discussed, it is also promising to indicate further possible
applications of our approach for other special topics.
|
Empirical demand models used for counterfactual predictions and welfare
analysis must be rationalizable, i.e. theoretically consistent with utility
maximization by heterogeneous consumers. We show that for binary choice under
general unobserved heterogeneity, rationalizability is equivalent to a pair of
Slutsky-like shape-restrictions on choice-probability functions. The forms of
these restrictions differ from Slutsky-inequalities for continuous goods.
Unlike McFadden-Richter's stochastic revealed preference, our
shape-restrictions (a) are global, i.e. their forms do not depend on which and
how many budget-sets are observed, (b) are closed-form, hence easy to impose on
parametric/semi/non-parametric models in practical applications, and (c)
provide computationally simple, theory-consistent bounds on demand and welfare
predictions on counterfactual budget-sets.
| 0.878185 | 0.697045 | 0.18114 |
2004.06395
|
Towards Realistic Optimization Benchmarks: A Questionnaire on the
Properties of Real-World Problems
|
Benchmarks are a useful tool for empirical performance comparisons. However,
one of the main shortcomings of existing benchmarks is that it remains largely
unclear how they relate to real-world problems. What does an algorithm's
performance on a benchmark say about its potential on a specific real-world
problem? This work aims to identify properties of real-world problems through a
questionnaire on real-world single-, multi-, and many-objective optimization
problems. Based on initial responses, a few challenges that have to be
considered in the design of realistic benchmarks can already be identified. A
key point for future work is to gather more responses to the questionnaire to
allow an analysis of common combinations of properties. In turn, such common
combinations can then be included in improved benchmark suites. To gather more
data, the reader is invited to participate in the questionnaire at:
https://tinyurl.com/opt-survey
|
To solve a real-world problem, the modeler usually needs to make a trade-off
between model complexity and usefulness. This is also true for robust
optimization, where a wide range of models for uncertainty, so-called
uncertainty sets, have been proposed. However, while these sets have been
mainly studied from a theoretical perspective, there is little research
comparing different sets regarding their usefulness for a real-world problem.
In this paper we consider a network design problem in a telecommunications
context. We need to invest into the infrastructure, such that there is
sufficient capacity for future demand which is not known with certainty. There
is a penalty for an unsatisfied realized demand, which needs to be outsourced.
We consider three approaches to model demand: using a discrete uncertainty set,
using a polyhedral uncertainty set, and using the mean of a per-commodity
fitted zero-inflated uniform distribution. While the first two models are used
as part of a robust optimization setting, the last model represents a simple
stochastic optimization setting. We compare these approaches on an efficiency
frontier real-world data taken from the online library SNDlib and observe that,
contrary to current research trends, robust optimization using the polyhedral
uncertainty set may result in less efficient solutions.
| 0.919398 | 0.755361 | 0.164037 |
2004.06396
|
Atmospheric Characterization via Broadband Color Filters on the
PLAnetary Transits and Oscillations of stars (PLATO) Mission
|
We assess broadband color filters for the two fast cameras on the PLAnetary
Transits and Oscillations (PLATO) of stars space mission with respect to
exoplanetary atmospheric characterization. We focus on Ultra Hot Jupiters and
Hot Jupiters placed 25pc and 100pc away from the Earth and low mass low density
planets placed 10pc and 25pc away. Our analysis takes as input literature
values for the difference in transit depth between the broadband lower (500 to
675nm) wavelength interval (hereafter referred to as blue) and the upper
(675-1125nm) broadband wavelength interval (hereafter referred to as red) for
transmission, occultation and phase curve analyses. Planets orbiting main
sequence central stars with stellar classes F, G, K and M are investigated. We
calculate the signal-to-noise ratio with respect to photon and instrument noise
for detecting the difference in transit depth between the two spectral
intervals. Results suggest that bulk atmospheric composition and planetary
geometric albedos could be detected for (Ultra) Hot Jupiters up to about 100pc
(about 25pc) with strong (moderate) Rayleigh extinction. Phase curve
information could be extracted for Ultra Hot Jupiters orbiting K and G dwarf
stars up to 25pc away. For low mass low density planets, basic atmospheric
types (primary and water-dominated) and the presence of sub-micron hazes in the
upper atmosphere could be distinguished for up to a handful of cases up to
about 10pc.
|
The Kepler Mission is monitoring the brightness of ~150,000 stars searching
for evidence of planetary transits. As part of the "Hunt for Exomoons with
Kepler" (HEK) project, we report a planetary system with two confirmed planets
and one candidate planet discovered using the publicly available data for
KOI-872. Planet b transits the host star with a period P_b=33.6d and exhibits
large transit timing variations indicative of a perturber. Dynamical modeling
uniquely detects an outer nontransiting planet c near the 5:3 resonance
(P_c=57.0d) of mass 0.37 times that of Jupiter. Transits of a third planetary
candidate are also found: a 1.7-Earth radius super-Earth with a 6.8d period.
Our analysis indicates a system with nearly coplanar and circular orbits,
reminiscent of the orderly arrangement within the solar system.
| 0.907226 | 0.765512 | 0.141713 |
2004.06397
|
On the ice-nucleating potential of warm hydrometeors in mixed-phase
clouds
|
The question whether or not the presence of warm hydrometeors in clouds may
play a significant role in the nucleation of new ice particles has been debated
for several decades. While the early works of Fukuta and Lee (1986) and Baker
(1991) indicated that it might be irrelevant, the more recent study of
Prabhakaran et al. (2019) [arXiv:1906.06129] suggested otherwise. In this work,
we are aiming to quantify the ice-nucleating potential using high-fidelity flow
simulation techniques around a single hydrometeor and use favorable
considerations to upscale the effects to a collective of ice particles in
clouds. While we find that ice nucleation may be enhanced in the vicinity of a
warm hydrometeor by several orders of magnitude and that the affected volume of
air is much larger than previously estimated, it is very unlikely that this
effect alone causes the rapid enhancement of ice nucleation observed in some
types of clouds, mainly due to the low initial volumetric ice concentration.
Nonetheless, it is suggested to implement this effect into existing cloud
models in order to investigate second-order effects such as ice nucleus
preactivation or enhancement after the onset of glaciation.
|
First-order phase transitions that proceed via nucleation of bubbles are
described by the homogeneous nucleation theory of Langer. The nucleation rate
is one of the most interesting parameters of these transitions. In previous
works we have computed nucleation rates with two different methods: (A)
employing coarse-grained potentials; (B) by means of a saddle-point
approximation, using dimensionally regularized field theory. In this article we
compare the results of the two approaches in order to test their reliability
and to determine the regions of applicability. We find a very good agreement.
| 0.893515 | 0.728966 | 0.164549 |
2004.06398
|
The closed fragment of IL is PSPACE hard
|
In this paper from 2011 we consider $\textbf{IL}_0$, the closed fragment of
the basic interpretability logic $\textbf{IL}$. We show that we can translate
$\textbf{GL}_1$, the one variable fragment of G\"odel-L\"ob's provabilty logic
$\textbf{GL}$, into $\textbf{IL}_0$. Invoking a result on the PSPACE
completeness of $\textbf{GL}_1$ we obtain the PSPACE hardness of
$\textbf{IL}_0$.
|
Prostate cancer (PCa) is the most common cancer in men in the United States.
Multiparametic magnetic resonance imaging (mp-MRI) has been explored by many
researchers to targeted prostate biopsies and radiation therapy. However,
assessment on mp-MRI can be subjective, development of computer-aided diagnosis
systems to automatically delineate the prostate gland and the intraprostratic
lesions (ILs) becomes important to facilitate with radiologists in clinical
practice. In this paper, we first study the implementation of the Mask-RCNN
model to segment the prostate and ILs. We trained and evaluated models on 120
patients from two different cohorts of patients. We also used 2D U-Net and 3D
U-Net as benchmarks to segment the prostate and compared the model's
performance. The contour variability of ILs using the algorithm was also
benchmarked against the interobserver variability between two different
radiation oncologists on 19 patients. Our results indicate that the Mask-RCNN
model is able to reach state-of-art performance in the prostate segmentation
and outperforms several competitive baselines in ILs segmentation.
| 0.764521 | 0.608847 | 0.155673 |
2004.06399
|
Joint growth rate measurements from redshift-space distortions and
peculiar velocities in the 6dF Galaxy Survey
|
We present a new model for the cross-covariance between galaxy redshift-space
distortions and peculiar velocities. We combine this with the auto-covariance
models of both probes in a fully self-consistent, maximum-likelihood method,
allowing us to extract enhanced cosmological parameter constraints. When
applying our method to the 6-degree Field Galaxy Survey (6dFGS), our constraint
on the growth rate of structure is $f\sigma_8 = 0.384 \pm 0.052 \rm{(stat)} \pm
0.061 \rm{(sys)}$ and our constraint for the redshift-space distortion
parameter is $\beta = 0.289^{+0.044}_{-0.043} \rm{(stat)} \pm 0.049
\rm{(sys)}$. We find that the statistical uncertainty for the growth rate of
structure is reduced by 64% when using the complete covariance model compared
to the redshift-space distortion auto-covariance model and 50% when compared to
using the peculiar velocity auto-covariance model. Our constraints are
consistent with those from the literature on combining multiple tracers of
large-scale structure, as well as those from other 6dFGS analyses. Our
measurement is also consistent with the standard cosmological model.
|
Redshift-space distortions (RSD) offer an attractive method to measure the
growth of cosmic structure on large scales, and combining with the measurement
of the cosmic expansion history, it can be used as cosmological tests of
gravity. With the advent of future galaxy redshift surveys aiming at precisely
measuring the RSD, an accurate modeling of RSD going beyond linear theory is a
critical issue in order to detect or disprove small deviations from general
relativity (GR). While several improved models of RSD have been recently
proposed based on the perturbation theory (PT), the framework of these models
heavily relies on GR. Here, we put forward a new PT prescription for RSD in
general modified gravity models. As a specific application, we present
theoretical predictions of the redshift-space power spectra in f(R) gravity
model, and compare them with N-body simulations. Using the PT template that
takes into account the effects of both modifications of gravity and RSD
properly, we successfully recover the fiducial model parameter in N-body
simulations in an unbiased way. On the other hand, we found it difficult to
detect the scale dependence of the growth rate in a model-independent way based
on GR templates.
| 0.849773 | 0.791506 | 0.058267 |
2004.06400
|
Segregated quantum phases of dipolar bosonic mixtures in two-dimensional
optical lattices
|
We identify the quantum phases in a binary mixture of dipolar bosons in 2D
optical lattices. Our study is motivated by the recent experimental realization
of binary dipolar condensate mixture of Er-Dy [Phys. Rev. Lett. 121, 213601
(2018)]. We model the system using the extended two-species Bose-Hubbard model
and calculate the ground state phase diagrams using mean field theory. For
selected cases we also obtain analytical phase boundaries using the site
decoupled mean field theory. For comparison we also examine the phase diagram
of two-species Bose-Hubbard model. Our results show that the quantum phases
with the long range intra-species interaction phase separate with no phase
ordering. The introduction of the long range inter-species interaction modifies
the quantum phases of the system. It leads to the emergence of phase separated
quantum phases with phase ordering. The transition from the phase separated
quantum phases without phase ordering to phase ordered ones breaks the
inversion symmetry.
|
We study the ground state magnetic properties of ferromagnetic spinor
Bose-Einstein condensates confined in a deep optical lattices. In the Mott
insulator regime, the ``mini-condensates'' at each lattice site behave as
mesoscopic spin magnets that can interact with neighboring sites through both
the static magnetic dipolar interaction and the light-induced dipolar
interaction. We show that such an array of spin magnets can undergo a
ferromagnetic or anti-ferromagnetic phase transition under the magnetic dipolar
interaction depending on the dimension of the confining optical lattice. The
ground-state spin configurations and related magnetic properties are
investigated in detail.
| 0.90256 | 0.8122 | 0.09036 |
2004.06401
|
Huygens' cycloidal pendulum: an elementary derivation
|
A pedagogical derivation of the Huygens cycloidal pendulum, suitable for
high-school students, is here presented. Our derivation rests only on simple
algebraic and geometrical tricks, without the need of any Calculus concept.
|
Using the damped pendulum system we introduce the averaging method to study
the periodic solutions of a dynamical system with small perturbation. We
provide sufficient conditions for the existence of periodic solutions with
small amplitude of the non--linear perturbed damped pendulum. The averaging
theory provides a useful means to study dynamical systems, accessible to Master
and PhD students.
| 0.942806 | 0.785797 | 0.157009 |
2004.06402
|
StandardGAN: Multi-source Domain Adaptation for Semantic Segmentation of
Very High Resolution Satellite Images by Data Standardization
|
Domain adaptation for semantic segmentation has recently been actively
studied to increase the generalization capabilities of deep learning models.
The vast majority of the domain adaptation methods tackle single-source case,
where the model trained on a single source domain is adapted to a target
domain. However, these methods have limited practical real world applications,
since usually one has multiple source domains with different data
distributions. In this work, we deal with the multi-source domain adaptation
problem. Our method, namely StandardGAN, standardizes each source and target
domains so that all the data have similar data distributions. We then use the
standardized source domains to train a classifier and segment the standardized
target domain. We conduct extensive experiments on two remote sensing data
sets, in which the first one consists of multiple cities from a single country,
and the other one contains multiple cities from different countries. Our
experimental results show that the standardized data generated by StandardGAN
allow the classifiers to generate significantly better segmentation.
|
Semantic image segmentation is a fundamental task in image understanding.
Per-pixel semantic labelling of an image benefits greatly from the ability to
consider region consistency both locally and globally. However, many Fully
Convolutional Network based methods do not impose such consistency, which may
give rise to noisy and implausible predictions. We address this issue by
proposing a dense multi-label network module that is able to encourage the
region consistency at different levels. This simple but effective module can be
easily integrated into any semantic segmentation systems. With comprehensive
experiments, we show that the dense multi-label can successfully remove the
implausible labels and clear the confusion so as to boost the performance of
semantic segmentation systems.
| 0.915779 | 0.77967 | 0.136109 |
2004.06403
|
PASTRAMI: Privacy-preserving, Auditable, Scalable & Trustworthy Auctions
for Multiple Items
|
Decentralised cloud computing platforms enable individuals to offer and rent
resources in a peer-to-peer fashion. They must assign resources from multiple
sellers to multiple buyers and derive prices that match the interests and
capacities of both parties. The assignment process must be decentralised, fair
and transparent, but also protect the privacy of buyers. We present PASTRAMI, a
decentralised platform enabling trustworthy assignments of items and prices
between a large number of sellers and bidders, through the support of
multi-item auctions. PASTRAMI uses threshold blind signatures and commitment
schemes to provide strong privacy guarantees while making bidders accountable.
It leverages the Ethereum blockchain for auditability, combining efficient
off-chain computations with novel, on-chain proofs of misbehaviour. Our
evaluation of PASTRAMI using Filecoin workloads show its ability to efficiently
produce trustworthy assignments between thousands of buyers and sellers.
|
Despite the impressive performance of standard random forests (RF), its
theoretical properties have not been thoroughly understood. In this paper, we
propose a novel RF framework, dubbed multinomial random forest (MRF), to
discuss the consistency and privacy-preservation. Instead of deterministic
greedy split rule, the MRF adopts two impurity-based multinomial distributions
to randomly select a split feature and a split value respectively.
Theoretically, we prove the consistency of the proposed MRF and analyze its
privacy-preservation within the framework of differential privacy. We also
demonstrate with multiple datasets that its performance is on par with the
standard RF. To the best of our knowledge, MRF is the first consistent RF
variant that has comparable performance to the standard RF.
| 0.865631 | 0.723066 | 0.142565 |
2004.06404
|
Study of $\Delta$ excitations in medium-mass nuclei with peripheral
heavy ion charge-exchange reactions
|
Isobaric charge-exchange reactions induced by peripheral collisions of
$^{112}$Sn ions accelerated up to 1$A$ GeV have been for the first time
investigated at the GSI facilities. The high-resolving power of the FRS
spectrometer allows to obtain $(p, n)$-type isobaric charge-exchange cross
sections with an uncertainty of $3.5\%$ and to separate quasi-elastic and
inelastic components in the missing-energy spectra of the ejectiles. The
inelastic component is associated to the excitation of $\Delta$(1232) isobar
resonance and the emission of pions in s-wave both in the target and projectile
nucleus, while the quasi-elastic contribution is associated to the nuclear
spin-isospin response of nucleon-hole excitations. An apparent shift of the
$\Delta$-resonance peak of $\sim$63 MeV is observed when comparing the
missing-energy spectra obtained from the measurements with proton and carbon
targets. A detailed analysis, performed with a theoretical model for the
reactions, indicates that this observation can be simply interpreted as a
change in the relative magnitude between the contribution of the excitation of
the resonance in the target and in the projectile, and not as real energy
shift.
|
Assuming a binary reaction mechanism, the yield of isotopes near the heaviest
$N=Z$ neutron-deficit nucleus $^{100}$Sn is studied with a microscopic
transport model. The large influence of nuclear shell structure and isotope
composition of the colliding nuclei on the production of exotic nuclei is
demonstrated. It is shown that the reaction $^{54}$Fe+$^{106}$Cd seems to be
most favourable for producing primary exotic Sn isotopes which may survive if
the excitation energy in the entrance reaction channel is less than about 100
MeV. In the case of large differences in the charge (mass) numbers between
entrance and exit channels the light fragment yield is essentially fed from the
decay of excited primary heavier fragments. The existence of optimal energies
for the production of some oxygen isotopes in the binary mechanism is
demonstrated for the $^{32}$S+$^{197}$Au reaction.
| 0.828289 | 0.792203 | 0.036086 |
2004.06405
|
HPRL -- International cooperation to identify and monitor priority
nuclear data needs for nuclear applications
|
The OECD-NEA High Priority Request List (HPRL) is a point of reference to
guide and stimulate the improvement of nuclear data for nuclear energy and
other applications, and a tool to bridge the gap between data users and
producers. The HPRL is application-driven and the requests are submitted by
nuclear data users or representatives of the user's communities. A panel of
international experts reviews and monitors the requests in the framework of an
Expert Group mandated by the NEA Nuclear Science Committee Working Party on
International Nuclear Data Evaluation Cooperation (WPEC). After approval,
individual requests are classified to three categories: high priority requests,
general requests, and special purpose requests (e.g., dosimetry, standards).
The HPRL is hosted by the NEA in the form of a relational database publicly
available on the web. This paper provides an overview of HPRL entries, status
and outlook. Examples of requests successfully completed are given and new
requests are described with emphasis on updated nuclear data needs in the
fields of nuclear energy, neutron standards and dosimetry.
|
Using the unintegrated gluon distribution obtained from numerical simulations
of the Balitsky-Kovchegov equation with running coupling, we obtain a very good
description of RHIC data on single inclusive hadron production at forward
rapidities in both p+p and d+Au collisions. No K-factors are needed for charged
hadrons, whereas for pion production a rapidity independent K-factor of order
1/3 is needed. Extrapolating to LHC energies, we calculate nuclear modification
factors for light hadrons in p+Pb collision, as well as the contribution of
initial state effects to the suppression of the nuclear modification factor in
Pb+Pb collisions.
| 0.893261 | 0.621617 | 0.271644 |
2004.06406
|
Magnetic breakdown spectrum of a Kramers-Weyl semimetal
|
We calculate the Landau levels of a Kramers-Weyl semimetal thin slab in a
perpendicular magnetic field $B$. The coupling of Fermi arcs on opposite
surfaces broadens the Landau levels with a band width that oscillates
periodically in $1/B$. We interpret the spectrum in terms of a one-dimensional
superlattice induced by magnetic breakdown at Weyl points. The band width
oscillations may be observed as $1/B$-periodic magnetoconductance oscillations,
at weaker fields and higher temperatures than the Shubnikov-de Haas
oscillations due to Landau level quantization. No such spectrum appears in a
generic Weyl semimetal, the Kramers degeneracy at time-reversally invariant
momenta is essential.
|
The physical realization of Chern insulators is of fundamental and practical
interest, as they are predicted to host the quantum anomalous Hall effect
(QAHE) and topologically protected chiral edge states which can carry
dissipationless current. The realization of the QAHE state has however been
challenging because of the complex heterostructures and sub-Kelvin temperatures
required. Time-reversal symmetry breaking Weyl semimetals, being essentially
stacks of Chern insulators with inter-layer coupling, may provide a new
platform for the higher temperature realization of robust QAHE edge states. In
this work we present a combined scanning tunneling spectroscopy and theoretical
investigation of a newly discovered magnetic Weyl semimetal, Co3Sn2S2. Using
modeling and numerical simulations we find that chiral edge states can be
localized on partially exposed Kagome planes on the surface of a Weyl
semimetal. Correspondingly, our STM dI/dV maps on narrow kagome Co3Sn terraces
show linearly dispersing quantum well like states, which can be attributed to
hybridized chiral edge modes. Our experiment and theory results suggest a new
paradigm for studying chiral edge modes in time-reversal breaking Weyl
semimetals. More importantly, this work leads a practical route for realizing
higher temperature QAHE.
| 0.875304 | 0.774502 | 0.100802 |
2004.06407
|
Non-convex Feedback Optimization with Input and Output Constraints
|
In this paper, we present a novel control scheme for feedback optimization.
That is, we propose a discrete-time controller that can steer the steady state
of a physical plant to the solution of a constrained optimization problem
without numerically solving the problem. Our controller can be interpreted as a
discretization of a continuous-time projected gradient flow. Compared to other
schemes used for feedback optimization, such as saddle-point flows or inexact
penalty methods, our algorithm combines several desirable properties: It
asymptotically enforces constraints on the plant steady-state outputs, and
temporary constraint violations can be easily quantified. Our algorithm
requires only reduced model information in the form of steady-state
input-output sensitivities of the plant. Further, as we prove in this paper,
global convergence is guaranteed even for non-convex problems. Finally, our
algorithm is straightforward to tune, since the step-size is the only tuning
parameter.
|
We investigate the effect of feedback delay on the outage probability of
multiple-input single-output (MISO) fading channels. Channel state information
at the transmitter (CSIT) is a delayed version of the channel state information
available at the receiver (CSIR). We consider two cases of CSIR: (a) perfect
CSIR and (b) CSI estimated at the receiver using training symbols. With perfect
CSIR, under a short-term power constraint, we determine: (a) the outage
probability for beamforming with imperfect CSIT (BF-IC) analytically, and (b)
the optimal spatial power allocation (OSPA) scheme that minimizes outage
numerically. Results show that, for delayed CSIT, BF-IC is close to optimal for
low SNR and uniform spatial power allocation (USPA) is close to optimal at high
SNR. Similarly, under a long-term power constraint, we show that BF-IC is close
to optimal for low SNR and USPA is close to optimal at high SNR. With imperfect
CSIR, we obtain an upper bound on the outage probability with USPA and BF-IC.
Results show that the loss in performance due to imperfection in CSIR is not
significant, if the training power is chosen appropriately.
| 0.828411 | 0.690141 | 0.13827 |
2004.06408
|
Anomalous magnetohydrodynamics with constant anisotropic electric
conductivities
|
We study anomalous magnetohydrodynamics in a longitudinal boost invariant
Bjorken flow with constant anisotropic electric conductivities as outlined in
Ref. [1]. For simplicity, we consider a neutral fluid and a force-free magnetic
field in the transverse direction. We derived analytic solutions of the
electromagnetic fields in the laboratory frame, the chiral density, and the
energy density as functions of proper time.
|
It is found that the amphoteric refraction, i.e. the refraction can be either
positive or negative depending on the incident angles, could occur at a planar
interface associated with a uniaxially anisotropic positive index media (PIM)
or an anisotropic negative index media (NIM). Particularly, the anomalous
negative refraction can occur at a planar interface from an isotropic PIM to an
anisotropic PIM, whereas the anomalous positive refraction occurs at the
interface from an isotropic PIM to an anisotropic NIM. The optimal conditions
to yield the two unusual refractions are obtained. The difference of the two
types of amphoteric refraction is discussed.
| 0.883967 | 0.718376 | 0.165591 |
2004.06409
|
Divergence-Based Adaptive Extreme Video Completion
|
Extreme image or video completion, where, for instance, we only retain 1% of
pixels in random locations, allows for very cheap sampling in terms of the
required pre-processing. The consequence is, however, a reconstruction that is
challenging for humans and inpainting algorithms alike. We propose an extension
of a state-of-the-art extreme image completion algorithm to extreme video
completion. We analyze a color-motion estimation approach based on color
KL-divergence that is suitable for extremely sparse scenarios. Our algorithm
leverages the estimate to adapt between its spatial and temporal filtering when
reconstructing the sparse randomly-sampled video. We validate our results on 50
publicly-available videos using reconstruction PSNR and mean opinion scores.
|
The PredNet architecture by Lotter et al. combines a biologically plausible
architecture called Predictive Coding with self-supervised video prediction in
order to learn the complex structure of the visual world. While the
architecture has drawn a lot of attention and various extensions of the model
exist, there is a lack of a critical analysis. We fill in the gap by evaluating
PredNet, both as an implementation of Predictive Coding theory and as a
self-supervised video prediction model, using a challenging video action
classification dataset. We also design an extended architecture to test if
conditioning future frame predictions on the action class of the video and
vise-versa improves the model performance. With substantial evidence, we show
that PredNet does not completely follow the principles of Predictive Coding.
Our comprehensive analysis and results are aimed to guide future research based
on PredNet or similar architectures based on the Predictive Coding theory.
| 0.871913 | 0.690409 | 0.181504 |
2004.06410
|
High-intensity pulsed ion beam treatment of amorphous iron-based metal
alloy
|
Abstract The results of intense pulsed ion beam (IPIB) treatment of the soft
magnetic amorphous alloy of a FINEMET-type are presented. Foil produced from
the alloy was irradiated with short (about 100 ns) pulses of carbon ions and
protons with energy of up to 300 keV and an energy density of up to 7 J/cm2.
X-ray diffraction, M\"ossbauer spectroscopy and magnetic measurements were used
to investigate structural and magnetic properties of irradiated foils. It is
shown that the foil remains intact after the treatment, and the crystal
structure still amorphous. Spontaneous magnetization vector is found to lie
almost along perpendicular to the foil plane after irradiation, whereas for the
initial amorphous foil it belongs to the plane. The magnetic properties of the
foil undergo changes: the coercive force decreases, the saturation induction
increases slightly, and the magnetization curve has shallower slope.
|
The laser-driven acceleration of high quality proton beams from a
double-layer target, comprised of a high-Z ion layer and a thin disk of
hydrogen, is investigated with three-dimensional particle-in-cell simulations
in the case of oblique incidence of a laser pulse. It is shown that the proton
beam energy reaches its maximum at a certain incidence angle of the laser
pulse, where it can be much greater than the energy at normal incidence. The
proton beam propagates at some angle with respect to the target surface normal,
as determined by the proton energy and the incidence angle.
| 0.850289 | 0.688358 | 0.161931 |
2004.06411
|
Effective cylindrical cell decompositions for restricted sub-Pfaffian
sets
|
The o-minimal structure generated by the restricted Pfaffian functions, known
as restricted sub-Pfaffian sets, admits a natural measure of complexity in
terms of a format $\mathcal{F}$, recording information like the number of
variables and quantifiers involved in the definition of the set, and a degree
$D$ recording the degrees of the equations involved. Khovanskii and later
Gabrielov and Vorobjov have established many effective estimates for the
geometric complexity of sub-Pfaffian sets in terms of these parameters. It is
often important in applications that these estimates are polynomial in $D$.
Despite much research done in this area, it is still not known whether cell
decomposition, the foundational operation of o-minimal geometry, preserves
polynomial dependence on $D$. We slightly modify the usual notions of format
and degree and prove that with these revised notions this does in fact hold. As
one consequence we also obtain the first polynomial (in $D$) upper bounds for
the sum of Betti numbers of sets defined using quantified formulas in the
restricted sub-Pfaffian structure.
|
Rod-like bacteria maintain their cylindrical shapes with remarkable precision
during growth. However, they are also capable to adapt their shapes to external
forces and constraints, for example by growing into narrow or curved
confinements. Despite being one of the simplest morphologies, we are still far
from a full understanding of how shape is robustly regulated, and how bacteria
obtain their near-perfect cylindrical shapes with excellent precision. However,
recent experimental and theoretical findings suggest that cell-wall geometry
and mechanical stress play important roles in regulating cell shape in rod-like
bacteria. We review our current understanding of the cell wall architecture and
the growth dynamics, and discuss possible candidates for regulatory cues of
shape regulation in the absence or presence of external constraints. Finally,
we suggest further future experimental and theoretical directions, which may
help to shed light on this fundamental problem.
| 0.828517 | 0.633202 | 0.195316 |
2004.06412
|
Quantifying entanglement of parametric down-converted states in all
degrees of freedom
|
The amount of entanglement that exists in a parametric down-converted state
is investigated in terms of all the degrees of freedom of the state. We
quantify the amount of entanglement by the Schmidt number of the state,
represented as a pure bipartite state by tagging the down-converted photons in
terms of orthogonal states of polarization with the aid of type II
phase-matching. To facilitate our calculations, we use a Wigner functional
approach, which allows the incorporation of the full infinite dimensional
spatiotemporal degrees of freedom. A quantitative example with reasonably
achievable experimental conditions is considered to demonstrate that extremely
large Schmidt numbers are achievable.
|
I show that two distant parties can transform pure entangled states to
arbitrary pure states by stochastic local operations and classical
communication (SLOCC) at the single copy level, if they share bound entangled
states. This is the effect of bound entanglement since this entanglement
processing is impossible by SLOCC alone. Similar effect of bound entanglement
occurs in three qubits where two incomparable entangled states of GHZ and W can
be inter-converted. In general multipartite settings composed by $N$ distant
parties, all $N$-partite pure entangled states are inter-convertible by SLOCC
with the assistance of bound entangled states with positive partial transpose.
| 0.919038 | 0.813832 | 0.105206 |
2004.06413
|
On the Possibility of Having Roman Pots around IP8 in Run 4 and Beyond
|
Proton trajectories along LHC beam 1 (clockwise direction) in the vicinity of
the LHCb Interaction Point (IP8) for the most recent LHC Run 4 optics
(HLLHC1.5) were presented. On this basis, three possible locations of forward
proton detectors were identified: 150, 180 and 430 m from IP8. For these
locations geometric acceptances were estimated. For the proton relative energy
loss, $\xi$, these limits are $0.05 < \xi \lesssim 0.1$, $0.025 < \xi \lesssim
0.1$ and $0.003 < \xi < 0.013$, respectively. The influence of boost of the
central system due to the acceptance of LHCb detector on $\xi$ was discussed.
Finally, the impact of pile-up was presented.
|
A 30-day contiguous photometric run with the MOST satellite on the WN5-6b
star WR 110 (HD 165688) reveals a fundamental periodicity of P = 4.08 +/- 0.55
days along with a number of harmonics at periods P/n, with n ~ 2,3,4,5 and 6,
and a few other possible stray periodicities and/or stochastic variability on
timescales longer than about a day. Spectroscopic RV studies fail to reveal any
plausible companion with a period in this range. Therefore, we conjecture that
the observed light-curve cusps of amplitude ~ 0.01 mag that recur at a 4.08 day
timescale may arise in the inner parts, or at the base of, a corotating
interaction region (CIR) seen in emission as it rotates around with the star at
constant angular velocity. The hard X-ray component seen in WR 110 could then
be a result of a high velocity component of the CIR shock interacting with the
ambient wind at several stellar radii. Given that most hot, luminous stars
showing CIRs have two CIR arms, it is possible that either the fundamental
period is 8.2 days or, more likely in the case of WR 110, there is indeed a
second weaker CIR arm for P = 4.08 days, that occurs ~ two thirds of a rotation
period after the main CIR. If this interpretation is correct, WR 110 therefore
joins the ranks with three other single WR stars, all WN, with confirmed CIR
rotation periods (WR 1, WR 6, and WR 134), albeit with WR 110 having by far the
lowest amplitude photometric modulation. This illustrates the power of being
able to secure intense, continuous high-precision photometry from space-based
platforms such as MOST. It also opens the door to revealing low-amplitude
photometric variations in other WN stars, where previous attempts have failed.
If all WN stars have CIRs at some level, this could be important for revealing
sources of magnetism or pulsation in addition to rotation periods.
| 0.649753 | 0.584833 | 0.06492 |
2004.06414
|
Look, Knave
|
We examine a recursive sequence in which $s_n$ is a literal description of
what the binary expansion of the previous term $s_{n-1}$ is not. By adapting a
technique of Conway, we determine limiting behaviour of $\{s_n\}$ and dynamics
of a related self-map of $2^{\mathbb{N}}$. Our main result is the existence and
uniqueness of a pair of binary sequences, each the compliment-description of
the other. We also take every opportunity to make puns.
|
In this we briefly cover the covariant approach to describe inertial forces
in general relativity and in particular look at the behaviour of the cumulative
drag index for stationary Kerr geometry.
| 0.502769 | 0.447382 | 0.055387 |
2004.06415
|
Exterior products of operators and superoptimal analytic approximation
|
We give a new algorithm for the construction of the unique superoptimal
analytic approximant of a given continuous matrix-valued function on the unit
circle, making use of exterior powers of operators in preference to spectral or
{\em Wiener-Masani} factorizations.
|
We derive the absolutely anticommuting (anti-)dual-BRST symmetry
transformations for the appropriate Lagrangian densities of the (3 +
1)-dimensional (4D) free Abelian 2-form gauge theory, under which, the total
gauge-fixing term remains invariant. These symmetry transformations are the
analogue of the co-exterior derivative of differential geometry, in the same
sense, as the absolutely anticommuting (anti-)BRST symmetry transformations are
the analogue of the exterior derivative. A bosonic symmetry transformation is
shown to be the analogue of the Laplacian operator. The algebraic structures of
these symmetry transformations are derived and they are demonstrated to be the
reminiscent of the algebra obeyed by the de Rham cohomological operators of
differential geometry.
| 0.882889 | 0.715688 | 0.167201 |
2004.06416
|
Relativistic X-ray jets from the black hole X-ray binary MAXI J1820+070
|
The black hole MAXI J1820+070 was discovered during its 2018 outburst and was
extensively monitored across the electromagnetic spectrum. Following the
detection of relativistic radio jets, we obtained four Chandra X-ray
observations taken between 2018 November and 2019 May, along with radio
observations conducted with the VLA and MeerKAT arrays. We report the discovery
of X-ray sources associated with the radio jets moving at relativistic
velocities with a possible deceleration at late times. The broadband spectra of
the jets are consistent with synchrotron radiation from particles accelerated
up to very high energies (>10 TeV) by shocks produced by the jets interacting
with the interstellar medium. The minimal internal energy estimated from the
X-ray observations for the jets is $\sim 10^{41}$ erg, significantly larger
than the energy calculated from the radio flare alone, suggesting most of the
energy is possibly not radiated at small scales but released through late-time
interactions.
|
Black hole binaries exhibit dramatic changes in their X-ray spectral and
timing properties over time, providing important clues about the physical
processes that occur in these systems. Black holes and black hole candidates
are prime targets for RXTE with observational goals including the study of
extreme gravitational fields and jet formation mechanisms. The great wealth of
data from RXTE has helped us to learn about these systems as well as raising
new questions about accreting black holes. RXTE observations have allowed us to
study a wide range of black hole science topics including the connection
between the accretion disk and jets, the geometry of the inner accretion flow,
and the physical changes that occur between spectral states. In this
presentation, I discuss significant results on these topics that have been
obtained for persistent and transient black holes over the past several years,
and I present results from our program of X-ray and radio observations during
the decays of black hole transient outbursts.
| 0.91357 | 0.782249 | 0.131321 |
2004.06417
|
Resilient Self-Debugging Software Protection
|
Debuggers are a popular reverse engineering and tampering tool.
Self-debugging is an effective technique for applications to defend themselves
against hostile debuggers. In penetration tests on state-of-the-art
self-debugging, we observed several opportunities through which it could be
attacked, however. We therefore improved upon the existing technique, making it
more resilient by introducing reciprocal debugging and making the transfers of
control between protected application and self-debugger more stealthy. This
paper presents the improved self-debugging design, and details our research
efforts into realizing reciprocal debugging. In our evaluation we show that the
improved design is significantly harder for attackers to defeat.
|
The paper refers to CRUTIAL, CRitical UTility InfrastructurAL Resilience, a
European project within the research area of Critical Information
Infrastructure Protection, with a specific focus on the infrastructures
operated by power utilities, widely recognized as fundamental to national and
international economy, security and quality of life. Such infrastructures faced
with the recent market deregulations and the multiple interdependencies with
other infrastructures are becoming more and more vulnerable to various threats,
including accidental failures and deliberate sabotage and malicious attacks.
The subject of CRUTIAL research are small scale networked ICT systems used to
control and manage the electric power grid, in which artifacts controlling the
physical process of electricity transportation need to be connected with
corporate and societal applications performing management and maintenance
functionality. The peculiarity of such ICT-supported systems is that they are
related to the power system dynamics and its emergency conditions. Specific
effort need to be devoted by the Electric Power community and by the
Information Technology community to influence the technological progress in
order to allow commercial intelligent electronic devices to be effectively
deployed for the protection of citizens against cyber threats to electric power
management and control systems. A well-founded know-how needs to be built
inside the industrial power sector to allow all the involved stakeholders to
achieve their service objectives without compromising the resilience properties
of the logical and physical assets that support the electric power provision.
| 0.877923 | 0.623455 | 0.254467 |
2004.06418
|
Uniform preconditioners of linear complexity for problems of negative
order
|
We propose a multi-level type operator that can be used in the framework of
operator (or Cald\'{e}ron) preconditioning to construct uniform preconditioners
for negative order operators discretized by piecewise polynomials on a family
of possibly locally refined partitions. The cost of applying this multi-level
operator scales linearly in the number of mesh cells. Therefore, it provides a
uniform preconditioner that can be applied in linear complexity when used
within the preconditioning framework from our earlier work [Math. of Comp.,
322(89) (2020), pp. 645-674].
|
The delay Lyapunov equation is an important matrix boundary-value problem
which arises as an analogue of the Lyapunov equation in the study of time-delay
systems $\dot{x}(t) = A_0x(t)+A_1x(t-\tau)+B_0u(t)$. We propose a new algorithm
for the solution of the delay Lyapunov equation. Our method is based on the
fact that the delay Lyapunov equation can be expressed as a linear system of
equations, whose unknown is the value $U(\tau/2)\in\mathbb{R}^{n\times n}$,
i.e., the delay Lyapunov matrix at time $\tau/2$. This linear matrix equation
with $n^2$ unknowns is solved by adapting a preconditioned iterative method
such as GMRES. The action of the $n^2\times n^2$ matrix associated to this
linear system can be computed by solving a coupled matrix initial-value
problem. A preconditioner for the iterative method is proposed based on solving
a T-Sylvester equation $MX+X^TN=C$, for which there are methods available in
the literature. We prove that the preconditioner is effective under certain
assumptions. The efficiency of the approach is illustrated by applying it to a
time-delay system stemmingfrom the discretization of a partial differential
equation with delay. Approximate solutions to this problem can be obtained for
problems of size up to $n\approx 1000$, i.e., a linear system with $n^2\approx
10^6$ unknowns, a dimension which is outside of the capabilities of the other
existing methods for the delay Lyapunov equation.
| 0.88882 | 0.707687 | 0.181133 |
2004.06419
|
Neutron Stars Merger Remnants
|
Binary neutron star mergers observations are a unique way to constrain
fundamental physics and astrophysics at the extreme. The interpretation of
gravitational-wave events and their electromagnetic counterparts crucially rely
on general-relativistic models of the merger outcome and remnant properties.
Quantitative models can be obtainted only with numerical relativity simulations
in 3+1 dimensions that include detailed input physics for the nuclear matter
and weak interactions. This review summarizes our current understanding of the
merger's remnant focusing on some of the aspects that are relevant for
multimessenger observations.
|
The merger of binary neutron stars (BNSs) can lead to large amplifications of
the magnetic field due to the development of turbulence and instabilities in
the fluid, such as the Kelvin-Helmholtz shear instability, which drive
small-scale dynamo activity. In order to properly resolve such instabilities
and obtain the correct magnetic field amplification, one would need to employ
resolutions that are currently unfeasible in global general relativistic
magnetohydrodynamic (GRMHD) simulations of BNS mergers. Here, we present a
subgrid model that allows global simulations to take into account the
small-scale amplification of the magnetic field which is caused by the
development of turbulence during BNS mergers. Assuming dynamo saturation, we
show that magnetar-level fields ($\sim 10^{16}\,{\rm G}$) can be easily
reached, and should therefore be expected from the merger of magnetized BNSs.
The total magnetic energy can reach values up to $\sim 10^{51}\,{\rm erg}$ and
the post-merger remnant can therefore emit strong electromagnetic signals and
possibly produce short gamma-ray bursts.
| 0.854005 | 0.783944 | 0.070061 |
2004.06420
|
Stress testing and systemic risk measures using multivariate conditional
probability
|
The multivariate conditional probability distribution quantifies the effects
of a set of variables onto the statistical properties of another set of
variables. In the study of systemic risk in the financial system, the
multivariate conditional probability distribution can be used for
stress-testing by quantifying the propagation of losses from a set of
`stressing' variables to another set of `stressed' variables. Here it is
described how to compute such conditional probability distributions for the
vast family of multivariate elliptical distributions, which includes the
multivariate Student-t and the multivariate Normal distributions. Simple
measures of stress impact and systemic risk are also proposed. An application
to the US equity market illustrates the potentials of this approach.
|
The paper proposes a new approach to model risk measurement based on the
Wasserstein distance between two probability measures. It formulates the
theoretical motivation resulting from the interpretation of fictitious
adversary of robust risk management. The proposed approach accounts for
equivalent and non-equivalent probability measures and incorporates the
economic reality of the fictitious adversary. It provides practically feasible
results that overcome the restriction of considering only models implying
probability measures equivalent to the reference model. The Wasserstein
approach suits for various types of model risk problems, ranging from the
single-asset hedging risk problem to the multi-asset allocation problem. The
robust capital market line, accounting for the correlation risk, is not
achievable with other non-parametric approaches.
| 0.901222 | 0.713866 | 0.187356 |
2004.06421
|
Efficient State Read-out for Quantum Machine Learning Algorithms
|
Many quantum machine learning (QML) algorithms that claim speed-up over their
classical counterparts only generate quantum states as solutions instead of
their final classical description. The additional step to decode quantum states
into classical vectors normally will destroy the quantum advantage in most
scenarios because all existing tomographic methods require runtime that is
polynomial with respect to the state dimension. In this Letter, we present an
efficient readout protocol that yields the classical vector form of the
generated state, so it will achieve the end-to-end advantage for those quantum
algorithms. Our protocol suits the case that the output state lies in the row
space of the input matrix, of rank $r$, that is stored in the quantum random
access memory. The quantum resources for decoding the state in $\ell_2$-norm
with $\epsilon$ error require $\text{poly}(r,1/\epsilon)$ copies of the output
state and $\text{poly}(r, \kappa^r,1/\epsilon)$ queries to the input oracles,
where $\kappa$ is the condition number of the input matrix. With our read-out
protocol, we completely characterise the end-to-end resources for quantum
linear equation solvers and quantum singular value decomposition. One of our
technical tools is an efficient quantum algorithm for performing the
Gram-Schmidt orthonormal procedure, which we believe, will be of independent
interest.
|
We devise new quantum algorithms that exponentially speeds up the training
and prediction procedures of twin support vector machines (TSVM). To train
TSVMs using quantum methods, we demonstrate how to prepare the desired input
states according to classical data, and these states are used in the quantum
algorithm for the system of linear equations. In the prediction process, we
employ a quantum circuit to estimate the distances from a new sample to the
hyperplanes and then make a decision. The proposed quantum algorithms can learn
two non-parallel hyperplanes and classify a new sample by comparing the
distances from the sample to the two hyperplanes in $O(\log mn)$ time, where
$m$ is the sample size and $n$ is the dimension of each data point. In
contrast, the corresponding classical algorithm requires polynomial time for
both the training and prediction procedures.
| 0.873885 | 0.827518 | 0.046367 |
2004.06422
|
An explainability study of the constant Q cepstral coefficient spoofing
countermeasure for automatic speaker verification
|
Anti-spoofing for automatic speaker verification is now a well established
area of research, with three competitive challenges having been held in the
last 6 years. A great deal of research effort over this time has been invested
into the development of front-end representations tailored to the spoofing
detection task. One such approach known as constant Q cepstral coefficients
(CQCCs) have been shown to be especially effective in detecting attacks
implemented with a unit selection based speech synthesis algorithm. Despite
their success, they largely fail in detecting other forms of spoofing attack
where more traditional front-end representations give substantially better
results. Similar differences were also observed in the most recent, 2019
edition of the ASVspoof challenge series. This paper reports our attempts to
help explain these observations. The explanation is shown to lie in the level
of attention paid by each front-end to different sub-band components of the
spectrum. Thus far, surprisingly little has been learned about what artefacts
are being detected by spoofing countermeasures. Our work hence aims to shed
light upon signal or spectrum level artefacts that serve to distinguish
different forms of spoofing attack from genuine, bone fide speech. With a
better understanding of these artefacts we will be better positioned to design
more reliable countermeasures.
|
Speaker verification systems usually suffer from the mismatch problem between
training and evaluation data, such as speaker population mismatch, the channel
and environment variations. In order to address this issue, it requires the
system to have good generalization ability on unseen data. In this work, we
incorporate Bayesian neural networks (BNNs) into the deep neural network (DNN)
x-vector speaker verification system to improve the system's generalization
ability. With the weight uncertainty modeling provided by BNNs, we expect the
system could generalize better on the evaluation data and make verification
decisions more accurately. Our experiment results indicate that the DNN
x-vector system could benefit from BNNs especially when the mismatch problem is
severe for evaluations using out-of-domain data. Specifically, results show
that the system could benefit from BNNs by a relative EER decrease of 2.66% and
2.32% respectively for short- and long-utterance in-domain evaluations.
Additionally, the fusion of DNN x-vector and Bayesian x-vector systems could
achieve further improvement. Moreover, experiments conducted by out-of-domain
evaluations, e.g. models trained on Voxceleb1 while evaluated on NIST SRE10
core test, suggest that BNNs could bring a larger relative EER decrease of
around 4.69%.
| 0.887468 | 0.737176 | 0.150292 |
2004.06423
|
Color filter arrays based on dielectric metasurface elements
|
Digital imaging has been steadily improving over the past decades and we are
moving towards a wide use of multi- and hyperspectral cameras. A key component
of such imaging systems are color filter arrays, which define the spectrum of
light detected by each camera pixel. Hence, it is essential to develop a
variable, robust and scalable way for controlling the transmission of light.
Nanostructured surfaces, also known as metasurfaces, offer a promising solution
as their transmission spectra can be controlled by shaping the
wavelength-dependent scattering properties of their constituting elements. Here
we present, metasurfaces based on silicon nanodisks, which provide filter
functions with amplitudes reaching 70-90% of transmission, and well suitable
for RGB and CMY color filter arrays, the initial stage towards the further
development of hyperspectral filters. We suggest and discuss possible ways to
expand the color gamut and improve the color values of such optical filters.
|
Advances in the field of plasmonics, that is, nanophotonics based on optical
properties of metal nanostructures, paved the way for the development of
ultrasensitive biological sensors and other devices whose operating principles
are based on localization of an electromagnetic field at the nanometer scale.
However, high dissipative losses of metal nanostructures limit their
performance in many modern areas, including metasurfaces, metamaterials, and
optical interconnections, which required the development of new devices that
combine them with high refractive index dielectric nanoparticles. Resulting
metal-dielectric (hybrid) nanostructures demonstrated many superior properties
from the point of view of practical application, including moderate dissipative
losses, resonant optical magnetic response, strong nonlinear optical
properties, which made the development in this field the vanguard of the modern
light science. This review is devoted to the current state of theoretical and
experimental studies of hybrid metal-dielectric nanoantennas and nanostructures
based on them, capable of selective scattering light waves, amplifying and
transmitting optical signals in the desired direction, controlling the
propagation of such signals, and generating optical harmonics.
| 0.871711 | 0.751774 | 0.119936 |
2004.06424
|
Coupled cluster theory in materials science
|
In this tutorial-style review we discuss basic concepts of coupled cluster
theory and recent developments that increase its computational efficiency for
calculations of molecules, solids and materials in general. We will touch upon
the connection between coupled cluster theory and the random-phase
approximation that is widely used in the field of solid-state physics. We will
discuss various approaches to improve the computational performance without
compromising on accuracy. These approaches include large-scale parallel design
as well as techniques that reduce the pre-factor of the computational
complexity. A central part of this article discusses the convergence of
calculated properties to the thermodynamic limit, which is of significant
importance for reliable predictions of materials properties and constitutes an
additional challenge compared to calculations of large molecules. We mention
technical aspects of computer code implementations of periodic coupled cluster
theories in different numerical frameworks of the one-electron orbital basis;
the projector-augmented-wave formalism using a plane wave basis set and the
numeric atom-centered-orbital (NAO) with resolution-of-identity. We will
discuss results and the possible scope of these implementations and how they
can help advance the current state of the art in electronic structure theory
calculations of materials.
|
Deterministic enhancement of the superconducting (SC) critical temperature
$T_c$ is a long-standing goal in material science. One strategy is engineering
a material at the nanometer scale such that quantum confinement strengthens the
electron pairing, thus increasing the superconducting energy gap $\Delta$, as
was observed for individual nanoparticles. A true phase-coherent SC condensate,
however, can exist only on larger scales and requires a finite phase stiffness
$J$. In the case of coupled aluminium (Al) nanograins, $T_c$ can exceed that of
bulk Al by a factor of three, but despite several proposals the relevant
mechanism at play is not yet understood. Here we use optical spectroscopy on
granular Al to disentangle the evolution of the fundamental SC energy scales,
$\Delta$ and $J$, as a function of grain coupling. Starting from well-coupled
arrays, $\Delta$ grows with progressive grain decoupling, causing the
increasing of $T_c$. As the grain-coupling is further suppressed, $\Delta$
saturates while $T_c$ decreases, concomitantly with a sharp decline of $J$.
This crossover to a phase-driven SC transition is accompanied by an optical gap
persisting above $T_c$. These findings identify granular Al as an ideal
playground to test the basic mechanisms that enhance superconductivity by
nano-inhomogeneity.
| 0.878576 | 0.724848 | 0.153727 |
2004.06425
|
Computing Bayes: Bayesian Computation from 1763 to the 21st Century
|
The Bayesian statistical paradigm uses the language of probability to express
uncertainty about the phenomena that generate observed data. Probability
distributions thus characterize Bayesian inference, with the rules of
probability used to transform prior probability distributions for all unknowns
- models, parameters, latent variables - into posterior distributions,
subsequent to the observation of data. Conducting Bayesian inference requires
the evaluation of integrals in which these probability distributions appear.
Bayesian computation is all about evaluating such integrals in the typical case
where no analytical solution exists. This paper takes the reader on a
chronological tour of Bayesian computation over the past two and a half
centuries. Beginning with the one-dimensional integral first confronted by
Bayes in 1763, through to recent problems in which the unknowns number in the
millions, we place all computational problems into a common framework, and
describe all computational methods using a common notation. The aim is to help
new researchers in particular - and more genrally those interested in adopting
a Bayesian approach to empirical work - {make sense of the plethora of
computational techniques that are now on offer; understand when and why
different methods are useful; and see the links that do exist, between them
all.
|
Sequential Monte Carlo has become a standard tool for Bayesian Inference of
complex models. This approach can be computationally demanding, especially when
initialized from the prior distribution. On the other hand, deter-ministic
approximations of the posterior distribution are often available with no
theoretical guaranties. We propose a bridge sampling scheme starting from such
a deterministic approximation of the posterior distribution and targeting the
true one. The resulting Shortened Bridge Sampler (SBS) relies on a sequence of
distributions that is determined in an adaptive way. We illustrate the
robustness and the efficiency of the methodology on a large simulation study.
When applied to network datasets, SBS inference leads to different statistical
conclusions from the one supplied by the standard variational Bayes
approximation.
| 0.864203 | 0.769683 | 0.09452 |
2004.06426
|
Structural, magnetic, and electronic evolution of the spin-ladder system
BaFe$_2$S$_{3-x}$Se$_x$ with isoelectronic substitution
|
We report experimental studies of a series of BaFe$_2$S$_{3-x}$Se$_x$ ($0\leq
x\leq3$) single crystals and powder specimens using x-ray diffraction, neutron
diffraction, muon spin relaxation, and electrical transport measurements. A
structural transformation from Cmcm (BaFe$_2$S$_3$) to Pnma (BaFe$_2$Se$_3$)
was identified around $x = 0.7\sim 1$. Neutron diffraction measurements on the
samples with $x$ = 0.2, 0.4, and 0.7 reveal that the N$\'{e}$el temperature of
the stripe antiferromagnetic order is gradually suppressed from $\sim$120 to 85
K, while the magnitude of the ordered Fe$^{2+}$ moments shows very little
variation. Similarly, the block antiferromagnetic order in BaFe$_2$Se$_3$
remains robust for $1.5\leq x\leq3$ with negligible variation in the ordered
moment and a slight decrease of the N$\'{e}$el temperature from 250 K ($x=3$)
to 225 K ($x=1.5$). The sample with $x=1$ near the Cmcm and Pnma border shows
coexisting, two-dimensional, short-range stripe- and block-type
antiferromagnetic correlations. The system remains insulating for all $x$, but
the thermal activation gap shows an abrupt increase when traversing the
boundary from the Cmcm stripe phase to the Pnma block phase. The results
demonstrate that the crystal structure, magnetic order, and electronic
properties are strongly coupled in the BaFe$_2$S$_{3-x}$Se$_x$ system.
|
The perovskite SrIrO3 is an exotic narrow-band metal owing to a confluence of
the strengths of the spin-orbit coupling (SOC) and the electron-electron
correlations. It has been proposed that topological and magnetic insulating
phases can be achieved by tuning the SOC, Hubbard interactions, and/or lattice
symmetry. Here, we report that the substitution of nonmagnetic, isovalent Sn4+
for Ir4+ in the SrIr1-xSnxO3 perovskites synthesized under high pressure leads
to a metal-insulator transition to an antiferromagnetic (AF) phase at TN > 225
K. The continuous change of the cell volume as detected by x-ray diffraction
and the lamda-shape transition of the specific heat on cooling through TN
demonstrate that the metal-insulator transition is of second-order. Neutron
powder diffraction results indicate that the Sn substitution enlarges an
octahedral-site distortion that reduces the SOC relative to the spin-spin
exchange interaction and results in the type-G AF spin ordering below TN.
Measurement of high-temperature magnetic susceptibility shows the evolution of
magnetic coupling in the paramagnetic phase typical of weak itinerant-electron
magnetism in the Sn-substituted samples. A reduced structural symmetry in the
magnetically ordered phase leads to an electron gap opening at the Brillouin
zone boundary below TN in the same way as proposed by Slater.
| 0.886922 | 0.795332 | 0.09159 |
2004.06427
|
Jointly Modeling Aspect and Sentiment with Dynamic Heterogeneous Graph
Neural Networks
|
Target-Based Sentiment Analysis aims to detect the opinion aspects (aspect
extraction) and the sentiment polarities (sentiment detection) towards them.
Both the previous pipeline and integrated methods fail to precisely model the
innate connection between these two objectives. In this paper, we propose a
novel dynamic heterogeneous graph to jointly model the two objectives in an
explicit way. Both the ordinary words and sentiment labels are treated as nodes
in the heterogeneous graph, so that the aspect words can interact with the
sentiment information. The graph is initialized with multiple types of
dependencies, and dynamically modified during real-time prediction. Experiments
on the benchmark datasets show that our model outperforms the state-of-the-art
models. Further analysis demonstrates that our model obtains significant
performance gain on the challenging instances under multiple-opinion aspects
and no-opinion aspect situations.
|
Community detection has long been an important yet challenging task to
analyze complex networks with a focus on detecting topological structures of
graph data. Essentially, real-world graph data contains various features, node
and edge types which dynamically vary over time, and this invalidates most
existing community detection approaches. To cope with these issues, this paper
proposes the heterogeneous-temporal graph convolutional networks (HTGCN) to
detect communities from hetergeneous and temporal graphs. Particularly, we
first design a heterogeneous GCN component to acquire feature representations
for each heterogeneous graph at each time step. Then, a residual compressed
aggregation component is proposed to represent "dynamic" features for "varying"
communities, which are then aggregated with "static" features extracted from
current graph. Extensive experiments are evaluated on two real-world datasets,
i.e., DBLP and IMDB. The promising results demonstrate that the proposed HTGCN
is superior to both benchmark and the state-of-the-art approaches, e.g., GCN,
GAT, GNN, LGNN, HAN and STAR, with respect to a number of evaluation criteria.
| 0.905107 | 0.747183 | 0.157924 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.