id
stringlengths 5
16
| query
stringlengths 1
382
| pos
stringlengths 7
5.09k
| neg
stringlengths 23
5.09k
| qp
float64 0.4
1
| qn
float64 0.34
0.91
| margin
float64 0.02
0.3
|
---|---|---|---|---|---|---|
2004.06752
|
Probing photo-induced rearrangements in the NdNiO$_{3}$ magnetic spiral
with polarization-sensitive ultrafast resonant soft x-ray scattering
|
We use resonant soft X-ray diffraction to track the photo-induced dynamics of
the antiferromagnetic structure in a NdNiO$_{3}$ thin film. Femtosecond laser
pulses with a photon energy of 0.61 eV, resonant with electron transfer between
long-bond to short-bond orbitals, are used to excite the material and drive an
ultrafast insulator-metal transition. Polarization sensitive soft X-ray
diffraction, resonant to the nickel $L_{3}$-edge, is used to probe the
evolution of the underlying magnetic spiral as a function of time delay with 80
picosecond time resolution. By modelling the azimuthal dependence of the
scattered intensity for different linear X-ray polarizations, we benchmark the
changes of the local magnetic moments and the spin alignment. The measured
changes are consistent with a reduction of the long-bond site magnetic moments
and an alignment of the spins towards a more collinear structure at early time
delays.
|
In this paper, we discuss our first attempts to model the broadband
persistent emission of magnetars within a self consistent, physical scenario.
We present the predictions of a synthetic model that we calculated with a new
Monte Carlo 3-D radiative code. The basic idea is that soft thermal photons
(e.g. emitted by the star surface) can experience resonant cyclotron
upscattering by a population of relativistic electrons threated in the twisted
magnetosphere. Our code is specifically tailored to work in the
ultra-magnetized regime; polarization and QED effects are consistently
accounted for, as well different configurations for the magnetosphere. We
discuss the predicted spectral properties in the 0.1-1000 keV range, the
polarization properties, and we present the model application to a sample of
magnetars soft X-ray spectra.
| 0.919871 | 0.735397 | 0.184474 |
2004.06754
|
Enhancing LIDAR performance metrics using continuous-wave photon-pair
sources
|
In order to enhance LIDAR performance metrics such as target detection
sensitivity, noise resilience and ranging accuracy, we exploit the strong
temporal correlation within the photon pairs generated in continuous-wave
pumped semiconductor waveguides. The enhancement attained through the use of
such non-classical sources is measured and compared to a corresponding target
detection scheme based on simple photon-counting detection. The performances of
both schemes are quantified by the estimation uncertainty and Fisher
information of the probe photon transmission, which is a widely adopted sensing
figure of merit. The target detection experiments are conducted with high probe
channel loss (\(\simeq 1-5\times10^{-5}\)) and formidable environment noise up
to 36 dB stronger than the detected probe power of \(1.64\times 10^{-5}\) pW.
The experimental result shows significant advantages offered by the enhanced
scheme with up to 26.3 dB higher performance in terms of estimation
uncertainty, which is equivalent to a reduction of target detection time by a
factor of 430 or 146 (21.6 dB) times more resilience to noise. We also
experimentally demonstrated ranging with these non-classical photon pairs
generated with continuous-wave pump in the presence of strong noise and loss,
achieving \(\approx\)5 cm distance resolution that is limited by the temporal
resolution of the detectors.
|
We use trajectory calculations to successfully explain two-photon "ghost"
diffraction, a phenomenon previously explained via quantum mechanical
entanglement. The diffraction patterns are accumulated one photon pair at a
time. The calculations are based on initial correlation of the trajectories in
the crystal source and a trajectory-wave ordering interaction with a variant
generator inherent in its structure. Details are presented in comparison with
ordinary diffraction calculated with the same trajectory model.
| 0.878187 | 0.682315 | 0.195872 |
2004.06755
|
Qiskit Pulse: Programming Quantum Computers Through the Cloud with
Pulses
|
The quantum circuit model is an abstraction that hides the underlying
physical implementation of gates and measurements on a quantum computer. For
precise control of real quantum hardware, the ability to execute pulse and
readout-level instructions is required. To that end, we introduce Qiskit Pulse,
a pulse-level programming paradigm implemented as a module within Qiskit-Terra
\cite{Qiskit}. To demonstrate the capabilities of Qiskit Pulse, we calibrate
both un-echoed and echoed variants of the cross-resonance entangling gate with
a pair of qubits on an IBM Quantum system accessible through the cloud. We
perform Hamiltonian characterization of both single and two-pulse variants of
the cross-resonance entangling gate with varying amplitudes on a cloud-based
IBM Quantum system. We then transform these calibrated sequences into a
high-fidelity CNOT gate by applying pre and post local-rotations to the qubits,
achieving average gate fidelities of $F=0.981$ and $F=0.979$ for the un-echoed
and echoed respectively. This is comparable to the standard backend CNOT
fidelity of $F_{CX}=0.984$. Furthermore, to illustrate how users can access
their results at different levels of the readout chain, we build a custom
discriminator to investigate qubit readout correlations. Qiskit Pulse allows
users to explore advanced control schemes such as optimal control theory,
dynamical decoupling, and error mitigation that are not available within the
circuit model.
|
We propose a class of schemes for robust population transfer between quantum
states that utilize trains of coherent pulses and represent a generalized
adiabatic passage via a wave packet. We study piecewise Stimulated Raman
Adiabatic Passage with pulse-to-pulse amplitude variation, and piecewise
chirped Raman passage with pulse-to-pulse phase variation, implemented with an
optical frequency comb. In the context of production of ultracold ground-state
molecules, we show that with almost no knowledge of the excited potential,
robust high-efficiency transfer is possible
| 0.865522 | 0.765189 | 0.100333 |
2004.06756
|
Speaker Diarization with Lexical Information
|
This work presents a novel approach for speaker diarization to leverage
lexical information provided by automatic speech recognition. We propose a
speaker diarization system that can incorporate word-level speaker turn
probabilities with speaker embeddings into a speaker clustering process to
improve the overall diarization accuracy. To integrate lexical and acoustic
information in a comprehensive way during clustering, we introduce an adjacency
matrix integration for spectral clustering. Since words and word boundary
information for word-level speaker turn probability estimation are provided by
a speech recognition system, our proposed method works without any human
intervention for manual transcriptions. We show that the proposed method
improves diarization performance on various evaluation datasets compared to the
baseline diarization system using acoustic information only in speaker
embeddings.
|
This work has been motivated by two long term goals: to understand how humans
learn language and to build programs that can understand language. Using a
representation that makes the relevant features explicit is a prerequisite for
successful learning and understanding. Therefore, I chose to represent
relations between individual words explicitly in my model. Lexical attraction
is defined as the likelihood of such relations. I introduce a new class of
probabilistic language models named lexical attraction models which can
represent long distance relations between words and I formalize this new class
of models using information theory.
Within the framework of lexical attraction, I developed an unsupervised
language acquisition program that learns to identify linguistic relations in a
given sentence. The only explicitly represented linguistic knowledge in the
program is lexical attraction. There is no initial grammar or lexicon built in
and the only input is raw text. Learning and processing are interdigitated. The
processor uses the regularities detected by the learner to impose structure on
the input. This structure enables the learner to detect higher level
regularities. Using this bootstrapping procedure, the program was trained on
100 million words of Associated Press material and was able to achieve 60%
precision and 50% recall in finding relations between content-words. Using
knowledge of lexical attraction, the program can identify the correct relations
in syntactically ambiguous sentences such as ``I saw the Statue of Liberty
flying over New York.''
| 0.882708 | 0.735088 | 0.14762 |
2004.06757
|
Least singular value and condition number of a square random matrix with
i.i.d. rows
|
We consider a square random matrix made by i.i.d. rows with any distribution
and prove that, for any given dimension, the probability for the least singular
value to be in [0; $\epsilon$) is at least of order $\epsilon$. This allows us
to generalize a result about the expectation of the condition number that was
proved in the case of centered gaussian i.i.d. entries: such an expectation is
always infinite. Moreover, we get some additional results for some well-known
random matrix ensembles, in particular for the isotropic log-concave case,
which is proved to have the best behaving in terms of the well conditioning.
|
This note provides a large deviations principle for a class of biorthogonal
ensembles. We extend the results of Eichelsbacher, Sommerauer and Stotlz to
more general type of interactions. Our result covers the case of the singular
values of lower triangular random matrices with independent entries introduced
by Cheliotis. In particular, we obtain as a consequence a variational
formulation for the Dykema-Haagerup as it is the limit law for the singular
values of lower triangular matrices with i.i.d. complex Gaussian entries.
| 0.841574 | 0.733944 | 0.10763 |
2004.06758
|
Stability results of an elastic/viscoelastic transmission problem of
locally coupled waves with non smooth coefficients
|
We investigate the stabilization of a locally coupled wave equations with
only one internal viscoelastic damping of Kelvin-Voigt type. The main novelty
in this paper is that both the damping and the coupling coefficients are non
smooth. First, using a general criteria of Arendt-Batty, combined with an
uniqueness result, we prove that our system is strongly stable. Next, using a
spectrum approach, we prove the non-exponential (uniform) stability of the
system. Finally, using a frequency domain approach, combined with a piecewise
multiplier technique and the construction of a new multiplier satisfying some
ordinary differential equations, we show that the energy of smooth solutions of
the system decays polynomially of type t^{-1}.
|
We present a detailed theoretical analysis for a system of a superconducting
flux qubit coupled to a transmission line resonator. The master equation,
accounting incoherent processes for a weakly populated resonator, is
analytically solved. An electromagnetic wave transmission coefficient through
the system, which provides a tool for probing dressed states of the qubit, is
derived. We also consider a general case for the resonator with more than one
photon population and compare the results with an experiment on the
qubit-resonator system in the intermediate coupling regime, when the coupling
energy is comparable with the qubit relaxation rate.
| 0.874918 | 0.628064 | 0.246854 |
2004.06759
|
Supply and demand shocks in the COVID-19 pandemic: An industry and
occupation perspective
|
We provide quantitative predictions of first order supply and demand shocks
for the U.S. economy associated with the COVID-19 pandemic at the level of
individual occupations and industries. To analyze the supply shock, we classify
industries as essential or non-essential and construct a Remote Labor Index,
which measures the ability of different occupations to work from home. Demand
shocks are based on a study of the likely effect of a severe influenza epidemic
developed by the US Congressional Budget Office. Compared to the pre-COVID
period, these shocks would threaten around 22% of the US economy's GDP,
jeopardise 24% of jobs and reduce total wage income by 17%. At the industry
level, sectors such as transport are likely to have output constrained by
demand shocks, while sectors relating to manufacturing, mining and services are
more likely to be constrained by supply shocks. Entertainment, restaurants and
tourism face large supply and demand shocks. At the occupation level, we show
that high-wage occupations are relatively immune from adverse supply and
demand-side shocks, while low-wage occupations are much more vulnerable. We
should emphasize that our results are only first-order shocks -- we expect them
to be substantially amplified by feedback effects in the production network.
|
We provide a data-driven analysis of how investor expectations about economic
growth and stock market returns changed during the February-March 2020 stock
market crash induced by the COVID-19 pandemic. We surveyed wealthy retail
investors who are clients of Vanguard in mid-February 2020, around the all-time
stock market high, and then again on March 11 and 12, after the stock market
had collapsed by over 20%. The average investor turned more pessimistic about
the short-run performance of both stock markets and the economy. Investors also
perceived higher probability of both further extreme stock market declines and
large declines in short-run real economic activity. In contrast, investors'
expectations about the long run remained largely unchanged, and if anything
improved. Disagreement among investors about economic and stock market outcomes
also increased substantially. Our analysis is an input in both the design of
the ongoing economic policy response and in further advancing economic
theories.
| 0.924035 | 0.790475 | 0.13356 |
2004.06760
|
Ground-truth resting-state signal provides data-driven estimation and
correction for scanner distortion of fMRI time-series dynamics
|
The fMRI community has made great strides in decoupling neuronal activity
from other physiologically induced T2* changes, using sensors that provide a
ground-truth with respect to cardiac, respiratory, and head movement dynamics.
However, blood oxygenation level-dependent (BOLD) time-series dynamics are
confounded by scanner artifacts, in complex ways that can vary not only between
scanners but even, for the same scanner, between sessions. The lack of
equivalent ground truth has thus far stymied the development of reliable
methods for identification and removal of scanner-induced noise. To address
this problem, we first designed and built a phantom capable of providing
dynamic signals equivalent to that of the resting-state brain. Using the
dynamic phantom, we quantified voxel-wise noise by comparing the ground-truth
time-series with its measured fMRI data. We derived the following data-quality
metrics: Standardized Signal-to-Noise Ratio (ST-SNR) and dynamic fidelity that
can be directly compared across scanners. Dynamic phantom data acquired from
four scanners showed scanner-instability multiplicative noise contributions of
about 8-20\% of the total noise. We further measured strong non-linearity in
the fMRI response for all scanners, ranging between 12-22\% of total voxels. To
correct scanner distortion of fMRI time-series dynamics at a single-subject
level, we trained a convolutional neural network (CNN) on paired sets of
measured vs. ground-truth data. Tests on dynamic phantom time-series showed a
3- to 4-fold increase in ST-SNR and about 40-70\% increase in dynamic fidelity
after denoising. Critically, we observed that the CNN temporal denoising pushes
ST-SNR ST-SNR > 1. Denoising human-data with ground-truth-trained CNN, in turn,
showed markedly increased detection sensitivity of resting-state networks.
|
Due to the dynamic nature, chaotic time series are difficult predict. In
conventional signal processing approaches signals are treated either in time or
in space domain only. Spatio-temporal analysis of signal provides more
advantages over conventional uni-dimensional approaches by harnessing the
information from both the temporal and spatial domains. Herein, we propose an
spatio-temporal extension of RBF neural networks for the prediction of chaotic
time series. The proposed algorithm utilizes the concept of time-space
orthogonality and separately deals with the temporal dynamics and spatial
non-linearity(complexity) of the chaotic series. The proposed RBF architecture
is explored for the prediction of Mackey-Glass time series and results are
compared with the standard RBF. The spatio-temporal RBF is shown to out perform
the standard RBFNN by achieving significantly reduced estimation error.
| 0.897451 | 0.657849 | 0.239602 |
2004.06761
|
The Optimal Geometry of the Acousto-Optic Interaction in Selected
Crystalline Materials Determined by Extreme Surfaces Method
|
The optimal geometries of the acousto-optic interaction are determined by
extreme surfaces method for a number of acousto-optic crystals.
|
By providing an effective way to leverage nonlinear phenomena in chip-scale,
high-Q optical resonators have induced the recent advances of on-chip photonics
represented by micro-combs and ultra-narrow linewidth lasers. These
achievements mainly relying on Si, SiO$_{2}$, and Si$_{3}$N$_{4}$ are expected
to be further improved by introducing new materials having higher nonlinearity.
However, establishing fabrication processes to shape a new material into the
resonator geometries having extremely smooth surfaces on a chip has been a
challenging task. Here we describe a universal method to implement high-Q
resonators with any materials which can be deposited in high vacuum. This
approach, by which light-guiding cores having surface roughness in
molecular-scale is automatically defined along the prepatterned platform
structures during the deposition, is verified with As$_{2}$S$_{3}$, a typical
chalcogenide glass of high-nonlinearity. The Q-factor of the developed
resonator is 14.4 million approaching the loss of chalcogenide fibers, which is
measured in newly proposed tunable waveguide-to-resonator coupling scheme with
high ideality. Lasing by stimulated Brillouin process is demonstrated with
threshold power of 0.53 mW which is 100 times lower than the previous record
based on chalcogenide glasses. This approach paves the way for bringing various
materials of distinguished virtues to the on-chip domain while keeping the loss
performance comparable to that of bulk form.
| 0.950652 | 0.748525 | 0.202128 |
2004.06762
|
Autocalibration of a Mobile UWB Localization System for Ad-Hoc
Multi-Robot Deployments in GNSS-Denied Environments
|
Ultra-wideband (UWB) wireless technology has seen an increased penetration in
the robotics field as a robust localization method in recent years. UWB enables
high accuracy distance estimation from time-of-flight measurements of wireless
signals, even in non-line-of-sight measurements. UWB-based localization systems
have been utilized in various types of GNSS-denied environments for ground or
aerial autonomous robots. However, most of the existing solutions rely on a
fixed and well-calibrated set of UWB nodes, or anchors, to estimate accurately
the position of other mobile nodes, or tags, through multilateration. This
limits the applicability of such systems for dynamic and ad-hoc deployments,
such as post-disaster scenarios where the UWB anchors could be mounted on
mobile robots to aid the navigation of UAVs or other robots. We introduce a
collaborative algorithm for online autocalibration of anchor positions,
enabling not only ad-hoc deployments but also movable anchors, based on
Decawave's DWM1001 UWB module. Compared to the built-in autocalibration process
from Decawave, we drastically reduce the amount of calibration time and
increase the accuracy at the same time. We provide both experimental
measurements and simulation results to demonstrate the usability of this
algorithm.
|
A new class of continuum robots has recently been explored, characterized by
tip extension, significant length change, and directional control. Here, we
call this class of robots "vine robots," due to their similar behavior to
plants with the growth habit of trailing. Due to their growth-based movement,
vine robots are well suited for navigation and exploration in cluttered
environments, but until now, they have not been deployed outside the lab.
Portability of these robots and steerability at length scales relevant for
navigation are key to field applications. In addition, intuitive
human-in-the-loop teleoperation enables movement in unknown and dynamic
environments. We present a vine robot system that is teleoperated using a
custom designed flexible joystick and camera system, long enough for use in
navigation tasks, and portable for use in the field. We report on deployment of
this system in two scenarios: a soft robot navigation competition and
exploration of an archaeological site. The competition course required movement
over uneven terrain, past unstable obstacles, and through a small aperture. The
archaeological site required movement over rocks and through horizontal and
vertical turns. The robot tip successfully moved past the obstacles and through
the tunnels, demonstrating the capability of vine robots to achieve navigation
and exploration tasks in the field.
| 0.920177 | 0.63527 | 0.284907 |
2004.06763
|
Parametric Design of Underwater Optical Systems
|
The design of optical systems for underwater vehicles is a complex process
where the selection of cameras, lenses, housings, and operational parameters
greatly influence the performance of the complete system. Determining the
correct combination of components and parameters for a given set of operational
requirements is currently a process based on trial and error as well as the
specialized knowledge and experience of the designer. In this paper, we
introduce an open-source tool for the parametric exploration of the design
space of underwater optical systems and review the most significant underwater
light effects with the corresponding models to estimate the response and
performance of the complete imaging system.
|
The influence of the phase fluctuation of the pump laser on the
phase-correlation between the signal and idler modes of the output fields from
as non-degenerate optical parametric oscillator operating above oscillation
threshold was experimentally investigated. The noise spectra of the
intensity-difference and the phase-sum of the entangled optical beams were
measured with a pair of unbalanced fiber Match-Zehnder interferometers
specifically designed. The experimental results proved the previously
theoretical prediction and are in reasonable agreement with the calculation
based on semiclassical theory involving the phase fluctuation of pump laser.
| 0.918171 | 0.663756 | 0.254415 |
2004.06765
|
Target Detection aided by Quantum Temporal Correlations: Theoretical
Analysis and Experimental Validation
|
The detection of objects in the presence of significant background noise is a
problem of fundamental interest in sensing. In this work, we theoretically
analyze a prototype target detection protocol, the quantum temporal correlation
(QTC) detection protocol, which is implemented in this work utilizing
spontaneous parametric down-converted photon-pair sources. The QTC detection
protocol only requires time-resolved photon-counting detection, which is
phase-insensitive and therefore suitable for optical target detection. As a
comparison to the QTC detection protocol, we also consider a classical
phase-insensitive target detection protocol based on intensity detection that
is practical in the optical regime. We formulated the target detection problem
as a total probe photon transmission estimation problem and obtain an
analytical expression of the receiver operating characteristic (ROC) curves. We
carry out experiments using a semiconductor waveguide source, which we
developed and previously reported. The experimental results agree very well
with the theoretical prediction. In particular, we find that in a high-level
environment noise and loss, the QTC detection protocol can achieve performance
comparable to that of the classical protocol (that is practical in the optical
regime) but with \(\simeq 57\) times lower detection time in terms of ROC curve
metric. The performance of the QTC detection protocol experiment setup could be
further improved with a higher transmission of the reference photon and better
detector time uncertainty. Furthermore, the probe photons in the QTC detection
protocol are completely indistinguishable from the background noise and
therefore useful for covert ranging applications. Finally, our technological
platform is highly scalable as well as tunable and thus amenable to large scale
integration, which is necessary for practical applications.
|
Quantum error correction provides a path to large-scale quantum computers,
but is built on challenging assumptions about the characteristics of the
underlying errors. In particular, the mathematical assumption of independent
errors in quantum logic operations is at odds with realistic environments where
error-sources may exhibit strong temporal correlations. We present experiments
enabling the identification of error correlations between operations in quantum
circuits, using only projective measurements at the end of the circuit. Using a
single trapped ion qubit and engineered noise with tunable temporal
correlations, we identify a clear signature of error correlations between
sequential gates in randomly composed quantum circuits, and extract
quantitative measures linked to the underlying noise correlation length. By
replacing all gates in these circuits with "virtual" dynamically corrected
gates (DCGs), we demonstrate that even in the presence of strongly correlated
noise the signatures of error correlations between sequential gates appear
similar to standard gates exposed to uncorrelated noise. A theoretical model
applied to our experiments reveals that common DCGs suppress the correlated
error component by over $270\times$ with $95\%$ confidence. Using
block-correlated noise, we explore the scaling of the effective error
correlation length at the virtual level, and show that DCGs exhibit error
correlations indistinguishable from those arising from uncorrelated noise.
| 0.85287 | 0.742618 | 0.110252 |
2004.06766
|
New Approach for Designing cVEP BCI Stimuli Based on Superposition of
Edge Responses
|
The purpose of this study is to develop a new methodology for designing
stimulus sequences for cVEP BCI based on experimental studies regarding the
behavior and the properties of the actual EEG responses of the visual system to
coded visual stimuli, such that training time is reduced and the possible
number of targets is increased. EEG from 8 occipital sites is recorded with
2000 samples/sec per channel, in response to visual stimuli presented on a
computer monitor with 60Hz refresh rate. Onset and offset EEG responses to long
visual stimulus pulses are obtained through 160-trial signal averaging. These
edge responses are used to predict the EEG responses to arbitrary stimulus
sequences using the superposition principle. A BCI speller which utilizes the
target templates generated by this principle is also implemented and tested. It
is found that certain short stimulus patterns can be accurately predicted by
the superposition principle. BCI sequences that are constructed by combinations
of these optimal patterns yield higher accuracy (95.9%) and ITR (57.2 bpm)
compared to when the superposition principle is applied to conventional
m-sequences and randomly generated sequences. Training time for the BCI
application involves only the acquisition of the edge responses and is less
than 4 minutes, and a huge number of sequences is possible. This is the first
study in which cVEP BCI sequences are designed based on constraints obtained by
observing the actual brain responses to several stimulus patterns.
|
An alternative pathway for the human brain to communicate with the outside
world is by means of a brain computer interface (BCI). A BCI can decode
electroencephalogram (EEG) signals of brain activities, and then send a command
or an intent to an external interactive device, such as a wheelchair. The
effectiveness of the BCI depends on the performance in decoding the EEG.
Usually, the EEG is contaminated by different kinds of artefacts (e.g.,
electromyogram (EMG), background activity), which leads to a low decoding
performance. A number of filtering methods can be utilized to remove or weaken
the effects of artefacts, but they generally fail when the EEG contains extreme
artefacts. In such cases, the most common approach is to discard the whole data
segment containing extreme artefacts. This causes the fatal drawback that the
BCI cannot output decoding results during that time. In order to solve this
problem, we employ the Lomb-Scargle periodogram to estimate the spectral power
from incomplete EEG (after removing only parts contaminated by artefacts), and
Denoising Autoencoder (DAE) for learning. The proposed method is evaluated with
motor imagery EEG data. The results show that our method can successfully
decode incomplete EEG to good effect.
| 0.872184 | 0.729869 | 0.142314 |
2004.06767
|
Directional phantom distribution functions for~stationary random fields
|
We give necessary and sufficient conditions for the existence of a phantom
distribution function for a stationary random field on a regular lattice. We
also introduce a less demanding notion of a directional phantom distribution,
with potentially broader area of applicability. Such approach leads to
sectorial limit properties, a phenomenon well-known in limit theorems for
random fields. An example of a stationary Gaussian random field is provided
showing that the two notions do not coincide. Criteria for the existence of the
corresponding notions of the extremal index and the sectorial extremal index
are also given.
|
The modern definition of optical coherence highlights a frequency dependent
function based on a matrix of spectra and cross-spectra. Due to general
properties of matrices, such a function is invariant in changes of basis. In
this article, we attempt to measure the proximity of two stationary fields by a
real and positive number between 0 and 1. The extremal values will correspond
to uncorrelation and linear dependence, similar to a correlation coefficient
which measures linear links between random variables. We show that these
"indices of coherence" are generally not symmetric, and not unique. We study
and we illustrate this problem together for one-dimensional and two-dimensional
fields in the framework of stationary processes.
| 0.866826 | 0.74997 | 0.116856 |
2004.06768
|
d-elliptic loci in genus 2 and 3
|
We consider the loci of curves of genus 2 and 3 admitting a $d$-to-1 map to a
genus 1 curve. After compactifying these loci via admissible covers, we obtain
formulas for their Chow classes, recovering results of Faber-Pagani and van
Zelm when $d=2$. The answers exhibit quasimodularity properties similar to
those in the Gromov-Witten theory of a fixed genus 1 curve; we conjecture that
the quasimodularity persists in higher genus, and indicate a number of possible
variants.
|
Can any secrets still be shed by that much studied, uniquely integrable,
Elliptic Billiard? Starting by examining the family of 3-periodic trajectories
and the loci of their Triangular Centers, one obtains a beautiful and
variegated gallery of curves: ellipses, quartics, sextics, circles, and even a
stationary point. Secondly, one notices this family conserves an intriguing
ratio: Inradius-to-Circumradius. In turn this implies three conservation
corollaries: (i) the sum of bounce angle cosines, (ii) the product of excentral
cosines, and (iii) the ratio of excentral-to-orbit areas. Monge's Orthoptic
Circle's close relation to 4-periodic Billiard trajectories is well-known. Its
geometry provided clues with which to generalize 3-periodic invariants to
trajectories of an arbitrary number of edges. This was quite unexpected.
Indeed, the Elliptic Billiard did surprise us!
| 0.819967 | 0.720768 | 0.099199 |
2004.06769
|
Noether Symmetry Approach to the Non-Minimally Coupled $Y(R)F^2$ Gravity
|
We use Noether symmetry approach to find spherically symmetric static
solutions of the non-minimally coupled electromagnetic fields to gravity. We
construct the point-like Lagrangian under the spherical symmetry assumption.
Then we determine Noether symmetry and the corresponding conserved charge. We
derive Euler-Lagrange equations from this point-like Lagrangian and show that
these equations turn out to be the differential equations derived from the
field equations of the model. Also we give two new exact asymptotically flat
solutions to these equations and investigate some thermodynamic properties of
these black holes.
|
This article is devoted to the study of high dense charged anisotropic
compact structures in the framework of $f(R,\mathcal{T})$ gravity theory. The
principal aims of this investigation, regard the extension of the isotropic
Durgapal-Fuloria model within the context of charged isotropic
$f(R,\mathcal{T})$ solutions. The second main goal of this work is to apply the
gravitational decoupling via a minimal geometric deformation (MGD) scheme in
$f(R,\mathcal{T})$ gravity. Finally, the third one is to derive an anisotropic
version of the charged isotropic model previously obtained by applying
gravitational decoupling technology. This MGD approach splits the system of
equations into two separate sets, one corresponding with the f(R,$\mathcal{T}$)
gravity system and another corresponding to the anisotropic sector governed by
the extra source $\theta_{\mu\nu}$.To address this task we have considered some
ingredients: I) the f(R,$\mathcal{T}$) model corresponds to a linear functional
of the Ricci's scalar and the trace of the energy-momentum tensor
$\mathcal{T}$, specifically $ f(R,\mathcal{T}) =R+2\chi\mathcal{T}$, being
$\chi$ a running coupling constant. II) The matter distribution is taken to be
an isotropic fluid one, III) the Lagrangian matter $\mathcal{L}_{m}$
corresponds to the negative isotropic pressure \i.e, $-p$ and IV) in order to
solve the $\theta$-sector, a suitable form for the decoupler function $f(r)$
has been imposed, respecting all the physical and mathematical requirements.
Finally, to check and contrast our model an exhaustive mathematical, physical
and graphical analysis is performed in order to show all the properties that
characterize the compact structure. It is worth mentioning that when $\chi=0$
Einstein's gravity theory results are recovered.
| 0.847644 | 0.778558 | 0.069086 |
2004.06770
|
Cyclic and convolutional codes with locality
|
Locally recoverable (LRC) codes and their variants have been extensively
studied in recent years. In this paper we focus on cyclic constructions of LRC
codes and derive conditions on the zeros of the code that support the property
of hierarchical locality. As a result, we obtain a general family of
hierarchical LRC codes for a new range of code parameters. We also observe that
our approach enables one to represent an LRC code in quasicyclic form, and use
this representation to construct tail-biting convolutional LRC codes with
locality. Among other results, we extend the general approach to cyclic codes
with locality to multidimensional cyclic codes, yielding new families of LRC
codes with availability, and construct a family of q-ary cyclic hierarchical
LRC codes of unbounded length.
|
A Z2-triple cyclic code of block length (r,s,t) is a binary code of length
r+s+t such that the code is partitioned into three parts of lengthsr,s andt
such that each of the three parts is invariant under the cyclic shifts of the
coordinates. Such a code can be viewed as Z2[x]-submodules of
Z_2[x]/<x^r-1>xZ_2[x]/<x^s-1>xZ_2[x]/<x^t-1>, in polynomial representation. In
this paper, we determine the structure of these codes. We have obtained the
form of the generators for such codes. Further, a minimal generating set for
such a code is obtained. Also, we study the structure of the duals of these
codes via the generators of the codes.
| 0.884375 | 0.72842 | 0.155954 |
2004.06771
|
Possibility of bottom-catalyzed matter genesis near to primordial QGP
hadronization
|
We study bottom flavor abundance in the early Universe near to a temperature
$T_\mathrm{H}\simeq150\,\mathrm{MeV}$, the condition for hadronization of
deconfined quark-gluon plasma (QGP). We show bottom flavor abundance
nonequilibrium lasting microseconds. In our study we use that in both QGP, and
the hadronic gas phase (HG) $b$ and $\bar b$ quarks near $T_\mathrm{H}$ are
bound in B-mesons and antimesons subject to $CP$ violating weak decays. A
coincident non-equilibrium abundance of bottom flavor can lead to matter
genesis at required strength: a) The specific thermal yield per entropy is
$n_b^{th}/\sigma=10^{-10}\sim10^{-13}$. b) Considering time scales, millions of
cycles of B-meson decays, and $b\bar b$-pair recreation processes occur.
|
We use simple entropy arguments to estimate the possible size of the QGP at
the AGS and the SPS. We find that the possibility to form a large volume of QGP
at the AGS or the SPS is very small. The size of the QGP at RHIC and the LHC is
also predicted.
| 0.854208 | 0.769767 | 0.084441 |
2004.06772
|
Channel Hardening in Massive MIMO: Model Parameters and Experimental
Assessment
|
Reliability is becoming increasingly important for many applications
envisioned for future wireless systems. A technology that could improve
reliability in these systems is massive MIMO (Multiple-Input Multiple-Output).
One reason for this is a phenomenon called channel hardening, which means that
as the number of antennas in the system increases, the variations of channel
gain decrease in both the time- and frequency domain. Our analysis of channel
hardening is based on a joint comparison of theory, measurements and
simulations. Data from measurement campaigns including both indoor and outdoor
scenarios, as well as cylindrical and planar base station arrays, are analyzed.
The simulation analysis includes a comparison with the COST 2100 channel model
with its massive MIMO extension. The conclusion is that the COST 2100 model is
well suited to represent real scenarios, and provides a reasonable match to
actual measurements up to the uncertainty of antenna patterns and user
interaction. Also, the channel hardening effect in practical massive MIMO
channels is less pronounced than in complex independent and identically
distributed (i.i.d.) Gaussian channels, which are often considered in
theoretical work.
|
Massive MIMO is considered a key technology for 5G. Various studies analyze
the impact of the number of antennas, relying on channel properties only and
assuming uniform antenna gains in very large arrays. In this paper, we
investigate the impact of mutual coupling and edge effects on the gain pattern
variation in the array. Our analysis focuses on the comparison of patch
antennas versus dipoles, representative for the antennas typically used in
massive MIMO experiments today. Through simulations and measurements, we show
that the finite patch array has a lower gain pattern variation compared with a
dipole array. The impact of a large gain pattern variation on the massive MIMO
system is that not all antennas contribute equally for all users, and the
effective number of antennas seen for a single user is reduced. We show that
the effect of this at system level is a decreased rate for all users for the
zero-forcing MIMO detector, up to 20% for the patch array and 35% for the
dipole array. The maximum ratio combining on the other hand, introduces user
unfairness.
| 0.932781 | 0.827059 | 0.105722 |
2004.06773
|
Enhancing classical target detection performance using nonclassical
Light
|
In this article, we demonstrate theoretically and experimentally how one can
exploit correlations generated in monolithic semiconductor quantum light
sources to enhance the performance of optical target detection. A prototype
target detection protocol, the quantum time-correlation (QTC) detection
protocol, with spontaneous parametric down-converted photon-pair sources, is
discussed. The QTC protocol only requires time-resolved photon-counting
detection, which is phase-insensitive and therefore suitable for optical target
detection. As a comparison to the QTC detection protocol, we also consider a
classical phase-insensitive target detection protocol based on intensity
detection. We formulated the target detection problem as a probe light
transmission estimation problem, and we quantify the target detection
performance with the Fisher information criterion and the receiver operation
characteristic analysis. Unlike classical target detection and ranging
protocols, the probe photons in our QTC detection protocol are completely
indistinguishable from the background noise and therefore useful for covert
ranging applications. Finally, our technological platform is highly scalable
and tunable and thus amenable to large scale integration necessary for
practical applications.
|
While quantum mechanics exquisitely describes the behavior of microscopic
systems, one ongoing challenge is to explore its applicability to systems of
larger size and mass. Unfortunately, quantum states of increasingly macroscopic
objects are more easily corrupted by unintentional measurements from the
classical environment. Additionally, even the intentional measurements from the
observer can further perturb the system. In optomechanics, coherent light
fields serve as the intermediary between the fragile mechanical states and our
inherently classical world by exerting radiation pressure forces and extracting
mechanical information. Here we engineer a microwave cavity optomechanical
system to stabilize a nonclassical steady-state of motion while independently,
continuously, and nondestructively monitoring it. By coupling the motion of an
aluminum membrane to two microwave cavities, we separately prepare and measure
a squeezed state of motion. We demonstrate a quantum nondemolition (QND)
measurement of sub-vacuum mechanical quadrature fluctuations. The techniques
developed here have direct applications in the areas of quantum-enhanced
sensing and quantum information processing, and could be further extended to
more complex quantum states.
| 0.786041 | 0.712338 | 0.073703 |
2004.06775
|
A comparative study using state-of-the-art electronic structure theories
on solid hydrogen phases under high pressures
|
Identifying the atomic structure and properties of solid hydrogen under high
pressures is a long-standing problem of high-pressure physics with far-reaching
significance in planetary and materials science. Determining the
pressure-temperature phase diagram of hydrogen is challenging for experiment
and theory due to the extreme conditions and the required accuracy in the
quantum mechanical treatment of the constituent electrons and nuclei,
respectively. Here, we demonstrate explicitly that coupled cluster theory can
serve as a computationally efficient theoretical tool to predict solid hydrogen
phases with high accuracy. We present a first principles study of solid
hydrogen phases at pressures ranging from 100 to 450 GPa. The computed static
lattice enthalpies are compared to state-of-the-art diffusion Monte Carlo
results and density functional theory calculations. Our coupled cluster theory
results for the most stable phases including C2/c-24 and P21/c-24 are in good
agreement with those obtained using diffusion Monte Carlo, with the exception
of Cmca-4, which is predicted to be significantly less stable. We discuss the
scope of the employed methods and how they can contribute as efficient and
complementary theoretical tools to solve the long-standing puzzle of
understanding solid hydrogen phases at high pressures.
|
We study a new hypothetical form of solid carbon \csc, with a unit cell which
is composed of the \cs \ fullerene cluster and an additional single carbon atom
arranged in the zincblende structure. Using {\it ab initio} calculations, we
show that this new form of solid carbon has lower energy than hyperdiamond, the
recently proposed form composed of \cs \ units in the diamond structure. To
understand the bonding character of of these cluster-based solids, we analyze
the electronic structure of \csc \ and of hyperdiamond and compare them to the
electronic states of crystalline cubic diamond.
| 0.918213 | 0.750775 | 0.167438 |
2004.06776
|
The Circumbilliard: Any Triangle can be a 3-Periodic
|
A Circumconic passes through a triangle's vertices. We define the
Circumbilliard, a circumellipse to a generic triangle for which the latter is a
3-periodic. We study its properties and associated loci.
|
We point out the joint occurrence of Pascal triangle patterns and power-law
scaling in the standard logistic map, or more generally, in unimodal maps. It
is known that these features are present in its two types of bifurcation
cascades: period and chaotic- band doubling of attractors. Approximate Pascal
triangles are exhibited by the sets of lengths of supercycle diameters and by
the sets of widths of opening bands. Additionally, power-law scaling manifests
along periodic attractor supercycle positions and chaotic band splitting
points. Consequently, the attractor at the mutual accumulation point of the
doubling cascades, the onset of chaos, displays both Gaussian and power-law
distributions. Their combined existence implies both ordinary and exceptional
statistical-mechanical descriptions of dynamical properties.
| 0.879817 | 0.75899 | 0.120827 |
2004.06777
|
Imaging Metasurfaces based on Graphene-Loaded Slot Antennas
|
Spectral imagers, the classic example being the color camera, are ubiquitous
in everyday life. However, most such imagers rely on filter arrays that absorb
light outside each spectral channel, yielding ~1/N efficiency for an N-channel
imager. This is especially undesirable in thermal infrared (IR) wavelengths,
where sensor detectivities are low, as well as in highly compact systems with
small entrance pupils. Diffractive optics or interferometers can enable
efficient spectral imagers, but such systems are too bulky for certain
applications. We propose an efficient and compact thermal infrared spectral
imager comprising a metasurface composed of sub-wavelength-spaced,
differently-tuned slot antennas coupled to photosensitive elements. Here, we
demonstrate this idea using graphene, which features a photoresponse up to
thermal IR wavelengths. The combined antenna resonances yield broadband
absorption in the graphene exceeding the 1/N efficiency limit. We establish a
circuit model for the antennas' optical properties and demonstrate consistency
with full-wave simulations. We also theoretically demonstrate broadband ~36%
free space-to-graphene coupling efficiency for a six-spectral-channel
metasurface. This research paves the way towards compact CMOS-integrable
thermal IR spectral imagers.
|
A single-order transmission diffraction grating based on dispersion
engineered all-dielectric metasurfaces is proposed and its wavelength
discriminating properties have been theoretically described and confirmed using
numerical simulations. The metasurface is designed using a 2D array of
all-dielectric resonators, which emulates a Huygens source configuration to
achieve a perfect match to free-space in broad bandwidth. Using a holey
dielectric nanodisk structure as the unit cell, the resonant wavelength is
tapered across the metasurface to engineer the wavelength dependent spatial
phase gradient, to emulate a dispersive prism. Consequently, different
wavelengths are steered towards different directions and thus are discriminated
on the output image plane. Due to subwavelength periodicities involved, the
wavelength discrimination is achieved directly in the zeroth diffraction order
of the device, unlike conventional diffraction gratings, thereby providing a
high efficiency wavelength discriminating device.
| 0.849401 | 0.779076 | 0.070325 |
2004.06778
|
Mining Coronavirus (COVID-19) Posts in Social Media
|
World Health Organization (WHO) characterized the novel coronavirus
(COVID-19) as a global pandemic on March 11th, 2020. Before this and in late
January, more specifically on January 27th, while the majority of the infection
cases were still reported in China and a few cruise ships, we began crawling
social media user postings using the Twitter search API. Our goal was to
leverage machine learning and linguistic tools to better understand the impact
of the outbreak in China. Unlike our initial expectation to monitor a local
outbreak, COVID-19 rapidly spread across the globe. In this short article we
report the preliminary results of our study on automatically detecting the
positive reports of COVID-19 from social media user postings using
state-of-the-art machine learning models.
|
Social medias are increasing their influence with the vast public information
leading to their active use for marketing by the companies and organizations.
Such marketing promotions are difficult to identify unlike the traditional
medias like TV and newspaper. So, it is very much important to identify the
promoters in the social media. Although, there are active ongoing researches,
existing approaches are far from solving the problem. To identify such
imposters, it is very much important to understand their strategies of social
circle creation and dynamics of content posting. Are there any specific spammer
types? How successful are each types? We analyze these questions in the light
of social relationships in Twitter. Our analyses discover two types of spammers
and their relationships with the dynamics of content posts. Our results
discover novel dynamics of spamming which are intuitive and arguable. We
propose ENWalk, a framework to detect the spammers by learning the feature
representations of the users in the social media. We learn the feature
representations using the random walks biased on the spam dynamics.
Experimental results on large-scale twitter network and the corresponding
tweets show the effectiveness of our approach that outperforms the existing
approaches
| 0.853832 | 0.70226 | 0.151572 |
2004.06779
|
Superparticle Method for Simulating Collisions
|
For problems in astrophysics, planetary science and beyond, numerical
simulations are often limited to simulating fewer particles than in the real
system. To model collisions, the simulated particles (aka superparticles) need
to be inflated to represent a collectively large collisional cross section of
real particles. Here we develop a superparticle-based method that replicates
the kinetic energy loss during real-world collisions, implement it in an
$N$-body code and test it. The tests provide interesting insights into dynamics
of self gravitating collisional systems. They show how particle systems evolve
over several free fall timescales to form central concentrations and
equilibrated outer shells. The superparticle method can be extended to account
for the accretional growth of objects during inelastic mergers.
|
We present a parallel-scalable method for simulating non-dilute suspensions
of deformable particles immersed in Stokesian fluid in three dimensions. A
critical component in these simulations is robust and accurate collision
handling. This work complements our previous work [L. Lu, A. Rahimian, and D.
Zorin. Contact-aware simulations of particulate Stokesian suspensions. Journal
of Computational Physics 347C: 160-182] by extending it to 3D and by
introducing new parallel algorithms for collision detection and handling. We
use a well-established boundary integral formulation with spectral Galerkin
method to solve the fluid flow. The key idea is to ensure an interference-free
particle configuration by introducing explicit contact constraints into the
system. While such constraints are typically unnecessary in the formulation
they make it possible to eliminate catastrophic loss of accuracy in the
discretized problem by preventing contact explicitly. The incorporation of
contact constraints results in a significant increase in stable time-step size
for locally-implicit time-stepping and a reduction in the necessary number of
discretization points for stability. Our method maintains the accuracy of
previous methods at a significantly lower cost for dense suspensions and the
time step size is independent from the volume fraction. Our method permits
simulations with high volume fractions; we report results with up to 60% volume
fraction. We demonstrated the parallel scaling of the algorithms on up to 16K
CPU cores.
| 0.88046 | 0.79286 | 0.0876 |
2004.06780
|
Cascaded Structure Tensor Framework for Robust Identification of Heavily
Occluded Baggage Items from X-ray Scans
|
In the last two decades, baggage scanning has globally become one of the
prime aviation security concerns. Manual screening of the baggage items is
tedious, error-prone, and compromise privacy. Hence, many researchers have
developed X-ray imagery-based autonomous systems to address these shortcomings.
This paper presents a cascaded structure tensor framework that can
automatically extract and recognize suspicious items in heavily occluded and
cluttered baggage. The proposed framework is unique, as it intelligently
extracts each object by iteratively picking contour-based transitional
information from different orientations and uses only a single feed-forward
convolutional neural network for the recognition. The proposed framework has
been rigorously evaluated using a total of 1,067,381 X-ray scans from publicly
available GDXray and SIXray datasets where it outperformed the state-of-the-art
solutions by achieving the mean average precision score of 0.9343 on GDXray and
0.9595 on SIXray for recognizing the highly cluttered and overlapping
suspicious items. Furthermore, the proposed framework computationally achieves
4.76\% superior run-time performance as compared to the existing solutions
based on publicly available object detectors
|
Person re-identification consists in recognizing an individual that has
already been observed over a network of cameras. It is a novel and challenging
research topic in computer vision, for which no reference framework exists yet.
Despite this, previous works share similar representations of human body based
on part decomposition and the implicit concept of multiple instances. Building
on these similarities, we propose a Multiple Component Matching (MCM) framework
for the person re-identification problem, which is inspired by Multiple
Component Learning, a framework recently proposed for object detection. We show
that previous techniques for person re-identification can be considered
particular implementations of our MCM framework. We then present a novel person
re-identification technique as a direct, simple implementation of our
framework, focused in particular on robustness to varying lighting conditions,
and show that it can attain state of the art performances.
| 0.927511 | 0.703868 | 0.223644 |
2004.06781
|
Planet-star interactions with precise transit timing. II. The
radial-velocity tides and a tighter constraint on the orbital decay rate in
the WASP-18 system
|
From its discovery, the WASP-18 system with its massive transiting planet on
a tight orbit was identified as a unique laboratory for studies on tidal
planet-star interactions. In an analysis of Doppler data, which include five
new measurements obtained with the HIRES/Keck-I instrument between 2012 and
2018, we show that the radial velocity signal of the photosphere following the
planetary tidal potential can be distilled for the host star. Its amplitude is
in agreement with both theoretical predictions of the equilibrium tide
approximation and an ellipsoidal modulation observed in an orbital phase curve.
Assuming a circular orbit, we refine system parameters using photometric time
series from TESS. With a new ground-based photometric observation, we extend
the span of transit timing observations to 28 years in order to probe the rate
of the orbital period shortening. Since we found no departure from a
constant-period model, we conclude that the modified tidal quality parameter of
the host star must be greater than 3.9x10^6 with 95% confidence. This result is
in line with conclusions drawn from studies of the population of hot Jupiters,
predicting that the efficiency of tidal dissipation is 1 or 2 orders of
magnitude weaker. As the WASP-18 system is one of the prime candidates for
detection of orbital decay, further timing observations are expected to push
the boundaries of our knowledge on stellar interiors.
|
Useful information can be retrieved by analysing the transit light curve of a
planet-hosting star or induced radial velocity oscillations. However, inferring
the physical parameters of the planet, such as mass, size, and semi-major axis,
requires preliminary knowledge of some parameters of the host star, especially
its mass or radius, which are generally inferred through theoretical
evolutionary models. We seek to present and test a whole algorithm devoted to
the complete characterisation of an exoplanetary system thanks to the global
analysis of photometric or radial velocity time series combined with
observational stellar parameters derived either from spectroscopy or
photometry. We developed an integrated tool called MCMCI. This tool combines
the Markov chain Monte Carlo (MCMC) approach of analysing photometric or radial
velocity time series with a proper interpolation within stellar evolutionary
isochrones and tracks, known as isochrone placement, to be performed at each
chain step, to retrieve stellar theoretical parameters such as age, mass, and
radius. We tested the MCMCI on the HD 219134 multi-planetary system hosting two
transiting rocky super Earths and on WASP-4, which hosts a bloated hot Jupiter.
Even considering different input approaches, a final convergence was reached
within the code, we found good agreement with the results already stated in the
literature and we obtained more precise output parameters, especially
concerning planetary masses. The MCMCI tool offers the opportunity to perform
an integrated analysis of an exoplanetary system without splitting it into the
preliminary stellar characterisation through theoretical models. Rather this
approach favours a close interaction between light curve analysis and
isochrones, so that the parameters recovered at each step of the MCMC enter as
inputs for purposes of isochrone placement.
| 0.924796 | 0.763561 | 0.161235 |
2004.06782
|
Pressure scrambling effects and the quantification of turbulent scalar
flux model uncertainties
|
Closure models for the turbulent scalar flux are an important source of
uncertainty in Reynolds-averaged-Navier-Stokes (RANS) simulations of scalar
transport. This paper presents an approach to quantify this uncertainty in
simulations of complex engineering flows. The approach addresses the
uncertainty in modeling the pressure scrambling (PS) effect, which is the
primary mechanism balancing the productions in scalar flux dynamics. Inspired
by the two classical phenomenological theories of return-to-isotropy (RI) and
isotropization-of-production (IP), we assume that the most likely directions of
the PS term are around a fan-shaped region bounded by the RI and IP directions.
Subsequently, we propose a strategy that requires two additional simulations,
defining perturbations of the PS directions towards the RI and IP limits. The
approach is applied to simulations of forced heat convection in a complex
pin-fin array configuration, and shows favorable monotonic properties and
bounding behaviors for various quantities of interest (QoIs) relevant to heat
transfer. To conclude, the results are analyzed from the perspective of
transverse scalar transport in a shear flow; the analysis indicates that the
proposed approach is likely to exhibit monotonic behaviors in a wide range of
scalar transport problems.
|
We have recently proposed a rigorous framework for Uncertainty Quantification
(UQ) in which UQ objectives and assumption/information set are brought into the
forefront, providing a framework for the communication and comparison of UQ
results. In particular, this framework does not implicitly impose inappropriate
assumptions nor does it repudiate relevant information. This framework, which
we call Optimal Uncertainty Quantification (OUQ), is based on the observation
that given a set of assumptions and information, there exist bounds on
uncertainties obtained as values of optimization problems and that these bounds
are optimal. It provides a uniform environment for the optimal solution of the
problems of validation, certification, experimental design, reduced order
modeling, prediction, extrapolation, all under aleatoric and epistemic
uncertainties. OUQ optimization problems are extremely large, and even though
under general conditions they have finite-dimensional reductions, they must
often be solved numerically. This general algorithmic framework for OUQ has
been implemented in the mystic optimization framework. We describe this
implementation, and demonstrate its use in the context of the Caltech surrogate
model for hypervelocity impact.
| 0.90355 | 0.758013 | 0.145538 |
2004.06784
|
Extrapolation in Gridworld Markov-Decision Processes
|
Extrapolation in reinforcement learning is the ability to generalize at test
time given states that could never have occurred at training time. Here we
consider four factors that lead to improved extrapolation in a simple Gridworld
environment: (a) avoiding maximum Q-value (or other deterministic methods) for
action choice at test time, (b) ego-centric representation of the Gridworld,
(c) building rotational and mirror symmetry into the learning mechanism using
rotational and mirror invariant convolution (rather than standard
translation-invariant convolution), and (d) adding a maximum entropy term to
the loss function to encourage equally good actions to be chosen equally often.
|
Abstraction is crucial for effective sequential decision making in domains
with large state spaces. In this work, we propose a variational information
bottleneck method for learning approximate bisimulations, a type of state
abstraction. We use a deep neural net encoder to map states onto continuous
embeddings. The continuous latent space is then compressed into a discrete
representation using an action-conditioned hidden Markov model, which is
trained end-to-end with the neural network. Our method is suited for
environments with high-dimensional states and learns from a stream of
experience collected by an agent acting in a Markov decision process. Through a
learned discrete abstract model, we can efficiently plan for unseen goals in a
multi-goal Reinforcement Learning setting. We test our method in simplified
robotic manipulation domains with image states. We also compare it against
previous model-based approaches to finding bisimulations in discrete
grid-world-like environments.
| 0.86005 | 0.789881 | 0.070169 |
2004.06785
|
Non-classical Semiconductor Photon Sources Enhancing the Performance of
Classical Target Detection Systems
|
We demonstrate and analyze how deploying non-classical intensity correlations
obtained from a monolithic semiconductor quantum photon source can enhance
classical target detection systems. This is demonstrated by examining the
advantages offered by the utilization of the non-classical correlations in a
correlation based target detection protocol. We experimentally demonstrate that
under the same condition, the target contrast obtained from the protocol when
non-classical correlations are utilized exhibits an improvement of up to
17.79dB over the best classical intensity correlation-based target detection
protocol, under 29.69dB channel loss and excess noise 13.40dB stronger than the
probe signal. We also assessed how the strong frequency correlations within the
non-classical photon pairs can be used to further enhance this protocol.
|
Semiconductor quantum-dot cavity systems are promising sources for
solid-state based on-demand generation of single photons for quantum
communication. Commonly, the spectral characteristics of the emitted single
photon are fixed by system properties such as electronic transition energies
and spectral properties of the cavity. In the present work we study
single-photon generation from the quantum-dot biexciton through a partly
stimulated non-degenerate two-photon emission. We show that frequency and
linewidth of the single photon can be fully controlled by the stimulating laser
pulse, ultimately allowing for efficient all-optical spectral shaping of the
single photon.
| 0.908796 | 0.717633 | 0.191163 |
2004.06786
|
Exact Simulation of Variance Gamma related OU processes: Application to
the Pricing of Energy Derivatives
|
In this study we define a three-step procedure to relate the
self-decomposability of the stationary law of a generalized Ornstein-Uhlenbeck
process to the law of the increments of such processes. Based on this procedure
and the results of Qu et al. (2019), we derive the exact simulation, without
numerical inversion, of the skeleton of a Variance Gamma, and of a symmetric
Variance Gamma driven Ornstein-Uhlenbeck process. Extensive numerical
experiments are reported to demonstrate the accuracy and efficiency of our
algorithms. These results are instrumental to simulate the spot price dynamics
in energy markets and to price Asian options and gas storages by Monte Carlo
simulations in a framework similar to the one discussed in Cummins et al.
(2017, 2018).
|
The traction on the surface of a spherical active colloid in a thermally
fluctuating Stokesian fluid contains passive, active, and Brownian
contributions. Here we derive these three parts systematically, by "projecting
out" the fluid using the boundary-domain integral representation of slow
viscous flow. We find an exact relation between the statistics of the Brownian
traction and the thermal forces in the fluid and derive, thereby,
fluctuation-dissipation relations for every irreducible tensorial harmonic
traction mode. The first two modes give the Brownian force and torque, from
which we construct the Langevin and Smoluchowski equations for the position and
orientation of the colloid. We emphasize the activity-induced breakdown of
detailed balance and provide a prescription for computing the
configuration-dependent variances of the Brownian force and torque. We apply
these general results to an active colloid near a plane wall, the simplest
geometry with configuration-dependent variances, and show that the stationary
distribution is non-Gibbsian. We derive a regularization of the translational
and rotational friction tensors, necessary for Brownian dynamics simulations,
that ensures positive variances at all distances from the wall. The many-body
generalization of these results is indicated.
| 0.870251 | 0.648948 | 0.221303 |
2004.06787
|
Model and Machine Learning based Caching and Routing Algorithms for
Cache-enabled Networks
|
In-network caching is likely to become an integral part of various networked
systems (e.g., 5G networks, LPWAN and IoT systems) in the near future. In this
paper, we compare and contrast model-based and machine learning approaches for
designing caching and routing strategies to improve cache network performance
(e.g., delay, hit rate). We first outline the key principles used in the design
of model-based strategies and discuss the analytical results and bounds
obtained for these approaches. By conducting experiments on real-world traces
and networks, we identify the interplay between content popularity skewness and
request stream correlation as an important factor affecting cache performance.
With respect to routing, we show that the main factors impacting performance
are alternate path routing and content search. We then discuss the
applicability of multiple machine learning models, specifically reinforcement
learning, deep learning, transfer learning and probabilistic graphical models
for the caching and routing problem.
|
In this paper, we study the online collaborative content caching problem from
network economics point of view. The network consists of small cell base
stations (SCBSs) with limited cache capacity and a macrocell base station
(MCBS). SCBSs are connected with their neighboring SCBSs through high-speed
links and collaboratively decide what data to cache. Contents are placed at the
SCBSs "free of charge" at off-peak hours and updated during the day according
to the content demands by considering the network usage cost. We first model
the caching optimization as a finite horizon Markov Decision Process that
incorporates an auto-regressive model to forecast the evolution of the content
demands. The problem is NP-hard and the optimal solution can be found only for
a small number of base stations and contents. To allow derivation of close to
optimal solutions for larger networks, we propose the rolling horizon method,
which approximates future network usage cost by considering a small decision
horizon. The results show that the rolling horizon approach outperforms
comparison schemes significantly. Finally, we examine two simplifications of
the problem to accelerate the speed of the solution: (a) we restrict the number
of content replicas in the network and (b) we limit the allowed content
replacements. The results show that the rolling horizon scheme can reduce the
communication cost by over 84% compared to that of running Least Recently Used
(LRU) updates on offline schemes. The results also shed light on the tradeoff
between the efficiency of the caching policy and the time needed to run the
online algorithm.
| 0.920966 | 0.789547 | 0.131419 |
2004.06788
|
Reflexive coloring complexes for 3-edge-colorings of cubic graphs
|
Given a 3-colorable graph $X$, the 3-coloring complex $B(X)$ is the graph
whose vertices are all the independent sets which occur as color classes in
some 3-coloring of $X$. Two color classes $C,D \in V(B(X))$ are joined by an
edge if $C$ and $D$ appear together in a 3-coloring of $X$. The graph $B(X)$ is
3-colorable. Graphs for which $B(B(X))$ is isomorphic to $X$ are termed
reflexive graphs. In this paper, we consider 3-edge-colorings of cubic graphs
for which we allow half-edges. Then we consider the 3-coloring complexes of
their line graphs. The main result of the paper is a surprising outcome that
the line graph of any connected cubic triangle-free outerplanar graph is
reflexive. We also exhibit some other interesting classes of reflexive line
graphs.
|
An $(m, n)$-colored mixed graph is a graph having arcs of $m$ different
colors and edges of $n$ different colors. A graph homomorphism of an $(m,
n$)-colored mixed graph $G$ to an $(m, n)$-colored mixed graph $H$ is a vertex
mapping such that if $uv$ is an arc (edge) of color $c$ in $G$, then $f(u)f(v)$
is also an arc (edge) of color $c$. The ($m, n)$-colored mixed chromatic number
of an $(m, n)$-colored mixed graph $G$, introduced by Ne\v{s}et\v{r}il and
Raspaud [J. Combin. Theory Ser. B 2000] is the order (number of vertices) of
the smallest homomorphic image of $G$. Later Bensmail, Duffy and Sen [Graphs
Combin. 2017] introduced another parameter related to the $(m, n)$-colored
mixed chromatic number, namely, the $(m, n)$-relative clique number as the
maximum cardinality of a vertex subset which, pairwise, must have distinct
images with respect to any colored homomorphism.
In this article, we study the $(m, n$)-relative clique number for the family
of subcubic graphs, graphs with maximum degree $\Delta$, planar graphs and
triangle-free planar graphs and provide new improved bounds in each of the
cases. In particular, for subcubic graphs we provide exact value of the
parameter.
| 0.897283 | 0.799549 | 0.097734 |
2004.06790
|
The sleep loss insult of Spring Daylight Savings in the US is absorbed
by Twitter users within 48 hours
|
Sleep loss has been linked to heart disease, diabetes, cancer, and an
increase in accidents, all of which are among the leading causes of death in
the United States. Population-scale sleep studies have the potential to advance
public health by helping to identify at-risk populations, changes in collective
sleep patterns, and to inform policy change. Prior research suggests other
kinds of health indicators such as depression and obesity can be estimated
using social media activity. However, the inability to effectively measure
collective sleep with publicly available data has limited large-scale academic
studies. Here, we investigate the passive estimation of sleep loss through a
proxy analysis of Twitter activity profiles. We use "Spring Forward" events,
which occur at the beginning of Daylight Savings Time in the United States, as
a natural experimental condition to estimate spatial differences in sleep loss
across the United States. On average, peak Twitter activity occurs roughly 45
minutes later on the Sunday following Spring Forward. By Monday morning
however, activity curves are realigned with the week before, suggesting that at
least on Twitter, the lost hour of early Sunday morning has been quickly
absorbed.
|
Social media serves as a unified platform for users to express their thoughts
on subjects ranging from their daily lives to their opinion on consumer brands
and products. These users wield an enormous influence in shaping the opinions
of other consumers and influence brand perception, brand loyalty and brand
advocacy. In this paper, we analyze the opinion of 19M Twitter users towards 62
popular industries, encompassing 12,898 enterprise and consumer brands, as well
as associated subject matter topics, via sentiment analysis of 330M tweets over
a period spanning a month. We find that users tend to be most positive towards
manufacturing and most negative towards service industries. In addition, they
tend to be more positive or negative when interacting with brands than
generally on Twitter. We also find that sentiment towards brands within an
industry varies greatly and we demonstrate this using two industries as use
cases. In addition, we discover that there is no strong correlation between
topic sentiments of different industries, demonstrating that topic sentiments
are highly dependent on the context of the industry that they are mentioned in.
We demonstrate the value of such an analysis in order to assess the impact of
brands on social media. We hope that this initial study will prove valuable for
both researchers and companies in understanding users' perception of
industries, brands and associated topics and encourage more research in this
field.
| 0.846407 | 0.666212 | 0.180195 |
2004.06791
|
Subconvexity for $GL_{3}(R)$ $L$-Functions via Integral Representations
|
We study the subconvexity problem for $GL_{3}(R)$ $L$-functions in the
t-aspect using integral representations by combining techniques employed by
Michel--Venkatesh in their study of the corresponding problem for $GL_{2}$ with
ideas from recent works of Munshi, Holowinsky--Nelson and Lin. Our main
objective is to explain in detail the origin of the "key identity" arising in
the latter series of works from the perspective of integral representations of
$L$-functions and automorphic representation theory.
|
A discrete frame for $L^2({\mathbb R}^d)$ is a countable sequence
$\{e_j\}_{j\in J}$ in $L^2({\mathbb R}^d)$ together with real constants
$0<A\leq B< \infty$ such that $$ A\|f\|_2^2 \leq \sum_{j\in J}|\langle f,e_j
\rangle |^2 \leq B\|f\|_2^2,$$ for all $f\in L^2(\mathbb{R}^d)$. We present a
method of sampling continuous frames, which arise from square-integrable
representations of affine-type groups, to create discrete frames for
high-dimensional signals. Our method relies on partitioning the ambient space
by using a suitable "tiling system". We provide all relevant details for
constructions in the case of ${\rm M}_n({\mathbb R})\rtimes {\rm GL}_n({\mathbb
R})$, although the methods discussed here are general and could be adapted to
many other settings. Finally, we prove significantly improved frame bounds over
the previously known construction for the case of $n=2$.
| 0.91838 | 0.751795 | 0.166585 |
2004.06792
|
Synchrotron-based pore-network modeling of two-phase flow in Nubian
Sandstone and implications for capillary trapping of carbon dioxide
|
Depleted oil fields in the Gulf of Suez (Egypt) can serve as geothermal
reservoirs for power generation using a CO2-Plume Geothermal (CPG) system,
while geologically sequestering CO2. This entails the injection of a
substantial amount of CO2 into the highly permeable brine-saturated Nubian
Sandstone. Numerical models of two-phase flow processes are indispensable for
predicting the CO2-plume migration at a representative geological scale. Such
models require reliable constitutive relationships, including relative
permeability and capillary pressure curves. In this study, quasi-static
pore-network modelling has been used to simulate the equilibrium positions of
fluid-fluid interfaces, and thus determine the capillary pressure and relative
permeability curves. Three-dimensional images with a voxel size of 0.65 micro
m3 of a Nubian Sandstone rock sample have been obtained using Synchrotron
Radiation X-ray Tomographic Microscopy. From the images, topological properties
of pores/throats were constructed. Using a pore-network model, we performed a
sequential primary drainage-main imbibition cycle of quasi-static invasion in
order to quantify (1) the CO2 and brine relative permeability curves, (2) the
effect of initial wetting-phase saturation (i.e. the saturation at the point of
reversal from drainage to imbibition) on the residual-trapping potential, and
(3) study the relative permeability-saturation hysteresis. The results improve
our understanding of the potential magnitude of capillary trapping in Nubian
Sandstone, essential for future field-scale simulations. Further, an initial
basin-scale assessment of CO2 storage capacity, which incorporates capillary
trapping, yields a range of 14-49 GtCO2 in Nubian Sandstone, Gulf of Suez
Basin.
|
Networks of interconnected resistors, springs and beams, or pores are
standard models of studying scalar and vector transport processes in
heterogeneous materials and media, such as fluid flow in porous media, and
conduction, deformations, and electric and dielectric breakdown in
heterogeneous solids. The computation time and required memory are two limiting
factors that hinder the scalability of the computations to very large sizes. We
present a dual approach, based on the use of a combination of the central
processing units (CPUs) and graphics processing units (GPUs), to simulation of
flow, transport, and similar problems using the network models. A
mixed-precision algorithm, together with the conjugate-gradient method is
implemented on a single GPU solver. The efficiency of the method is tested with
a variety of cases, including pore- and random-resistor network models in which
the conductances are long-range correlated, and also contain percolation
disorder. Both isotropic and anisotropic networks are considered. To put the
method to a stringent test, the long-range correlations are generated by a
fractional Brownian motion (FBM), which we generate by a message-passing
interface method. For all the cases studied an overall speed-up factor of about
one order of magnitude or better is obtained, which increases with the size of
the network. Even the critical slow-down in networks near the percolation
threshold does not decrease the speed-up significantly. We also obtain
approximate but accurate bounds for the permeability anisotropy $K_x/K_y$ for
stratified porous media.
| 0.882495 | 0.805752 | 0.076743 |
2004.06793
|
Probabilistic Model of Narratives Over Topical Trends in Social Media: A
Discrete Time Model
|
Online social media platforms are turning into the prime source of news and
narratives about worldwide events. However,a systematic summarization-based
narrative extraction that can facilitate communicating the main underlying
events is lacking. To address this issue, we propose a novel event-based
narrative summary extraction framework. Our proposed framework is designed as a
probabilistic topic model, with categorical time distribution, followed by
extractive text summarization. Our topic model identifies topics' recurrence
over time with a varying time resolution. This framework not only captures the
topic distributions from the data, but also approximates the user activity
fluctuations over time. Furthermore, we define significance-dispersity
trade-off (SDT) as a comparison measure to identify the topic with the highest
lifetime attractiveness in a timestamped corpus. We evaluate our model on a
large corpus of Twitter data, including more than one million tweets in the
domain of the disinformation campaigns conducted against the White Helmets of
Syria. Our results indicate that the proposed framework is effective in
identifying topical trends, as well as extracting narrative summaries from text
corpus with timestamped data.
|
Topic models are a family of statistical-based algorithms to summarize,
explore and index large collections of text documents. After a decade of
research led by computer scientists, topic models have spread to social science
as a new generation of data-driven social scientists have searched for tools to
explore large collections of unstructured text. Recently, social scientists
have contributed to topic model literature with developments in causal
inference and tools for handling the problem of multi-modality. In this paper,
I provide a literature review on the evolution of topic modeling including
extensions for document covariates, methods for evaluation and interpretation,
and advances in interactive visualizations along with each aspect's relevance
and application for social science research.
| 0.863637 | 0.785553 | 0.078084 |
2004.06794
|
DG Structure on the Length 4 Big From Small Construction
|
The big from small construction was introduced by Kustin and Miller and can
be used to construct resolutions of tightly double linked Gorenstein ideals. In
this paper, we expand on the DG-algebra techniques introduced Kustin for
building matrix factorizations and construct a DG-algebra structure on the
length $4$ big from small construction. The techniques employed involve the
construction of a morphism from a Tate-like complex to an acyclic DG-algebra
exhibiting Poincar\'e duality. This induces homomorphisms which, after suitable
modifications, satisfy a list of identities that end up perfectly encapsulating
the required associativity and DG axioms of the desired product structure for
the big from small construction.
|
In this paper we present an algorithm to compute keyed hash function (message
authentication code MAC). Our approach uses a family of expander graphs of
large girth denoted $D(n,q)$, where $n$ is a natural number bigger than one and
$q$ is a prime power. Expander graphs are known to have excellent expansion
properties and thus they also have very good mixing properties. All
requirements for a good MAC are satisfied in our method and a discussion about
collisions and preimage resistance is also part of this work. The outputs
closely approximate the uniform distribution and the results we get are
indistinguishable from random sequences of bits. Exact formulas for timing are
given in term of number of operations per bit of input. Based on the tests, our
method for implementing DMAC shows good efficiency in comparison to other
techniques. 4 operations per bit of input can be achieved. The algorithm is
very flexible and it works with messages of any length. Many existing
algorithms output a fixed length tag, while our constructions allow generation
of an arbitrary length output, which is a big advantage.
| 0.761217 | 0.598052 | 0.163166 |
2004.06795
|
Blockchain in Healthcare and Medicine: A Contemporary Research of
Applications, Challenges, and Future Perspectives
|
Blockchain technology is one of the most contemporary and disruptive
technologies in the world. It has gained considerable attention in numerous
applications such as financial services, cybersecurity applications, Internet
of Things (IoT), network data management. Now its range of applications is
beyond the financial services as the healthcare industry has also adopted
blockchain technology in its various subdomains such as Electronic Health
Records (EHR), medical supply chain management system, genomic market,
neuroscience technology, clinical research, and pharmaceutical medicine.
Blockchain is considered a secure and viable solution for storing and accessing
patients medical records and the patients can diagnosed and treated with safe
and secure data sharing. Blockchain technology will revolutionize the
healthcare systems with personalized, authentic, and secure access to the
clinical data of patients and that data can be used for further health
improvements and clinical researches. In this paper, we conduct a contemporary
research on existing applications and developments in healthcare industry with
the use of blockchain technology. We also discuss some robust applications and
various existing companies that are using blockchain solutions for securing
their data along with some current challenges and future perspectives.
|
Blockchain or Distributed Ledger Technology is a disruptive technology that
provides the infrastructure for developing decentralized applications enabling
the implementation of novel business models even in traditionally centralized
domains. In the last years it has drawn high interest from the academic
community, technology developers and startups thus lots of solutions have been
developed to address blockchain technology limitations and the requirements of
applications software engineering. In this paper, we provide a comprehensive
overview of DLT solutions analyzing the addressed challenges, provided
solutions and their usage for developing decentralized applications. Our study
reviews over 100 blockchain papers and startup initiatives from which we
construct a 3-tier based architecture for decentralized applications and we use
it to systematically classify the technology solutions. Protocol and Network
Tier solutions address the digital assets registration, transactions, data
structure, and privacy and business rules implementation and the creation of
peer-to-peer networks, ledger replication, and consensus-based state
validation. Scaling Tier solutions address the scalability problems in terms of
storage size, transaction throughput, and computational capability. Finally,
Federated Tier aggregates integrative solutions across multiple blockchain
applications deployments. The paper closes with a discussion on challenges and
opportunities for developing decentralized applications by providing a
multi-step guideline for decentralizing the design of traditional systems and
implementing decentralized applications.
| 0.912881 | 0.80882 | 0.104062 |
2004.06796
|
Phase transition and entropy force between two horizons in
(n+2)-dimensional de Sitter space
|
In this paper, the effect of the space-time dimension on effective
thermodynamic quantities in (n+2)-dimensional Reissoner-Nordstrom-de Sitter
space has been stud ied. Based on derived effective thermodynamic quantities,
conditions for the phase transition are obtained. The result shows that the
accelerating cosmic expansion can be attained by the entropy force arisen from
the interaction between horizons of black holes and our universe, which
provides a possible way to explain the physical mechanism for the accelerating
cosmic expansion.
|
We present a derivation of the Bekenstein-Hawking entropy from conformal
field theories. In particular we consider a six-dimensional string
configuration with background metric AdS_3 * S^3 near the horizon. In addition
we introduce momentum modes along the string, corresponding to a
Banados-Teitelboim-Zanelli (BTZ) black hole in the anti-de Sitter (AdS)
space-time, and a Taub-NUT soliton in the transverse Euclidean space,
projecting out a discrete subgroub of S^3. This spherical part is described by
a SU(2)/Z(m) Wess-Zumino-Witten (WZW) model. The AdS_3 space-time, on the other
hand, is determined by two conformal field theories living at the two
boundaries: One SL(2,R)/U(1) WZW model on the horizon of the BTZ black hole and
one Liouville model at infinity. The extremal BTZ black hole interpolates
between these two conformal field theories. Moreover, we argue that the sum of
the three conformal field theories yields the correct microscopic
state-counting including all alpha' corrections.
| 0.856264 | 0.812726 | 0.043538 |
2004.06797
|
Site characterization at downhole arrays by joint inversion of
dispersion data and acceleration time series
|
We present a sequential data assimilation algorithm based on the ensemble
Kalman inversion to estimate the near-surface shear wave velocity profile and
damping when heterogeneous data and a priori information that can be
represented in forms of (physical) equality and inequality constraints in the
inverse problem are available. Although non-invasive methods, such as surface
wave testing, are efficient and cost effective methods for inferring Vs
profile, one should acknowledge that site characterization using inverse
analyses can yield erroneous results associated with the inverse problem
non-uniqueness. One viable solution to alleviate the inverse problem
ill-posedness is to enrich the prior knowledge and/or the data space with
complementary observations. In the case of non-invasive methods, the pertinent
data are the dispersion curve of surface waves, typically resolved by means of
active source methods at high frequencies and passive methods at low
frequencies. To improve the inverse problem well-posedness, horizontal to
vertical spectral ratio (HVSR) data are commonly used jointly with the
dispersion data in the inversion. In this paper, we show that the joint
inversion of dispersion and strong motion downhole array data can also reduce
the margins of uncertainty in the Vs profile estimation. This is because
acceleration time-series recorded at downhole arrays include both body and
surface waves and therefore can enrich the observational data space in the
inverse problem setting. We also show how the proposed algorithm can be
modified to systematically incorporate physical constraints that further
enhance its well-posedness. We use both synthetic and real data to examine the
performance of the proposed framework in estimation of Vs profile and damping
at the Garner Valley downhole array, and compare them against the Vs
estimations in previous studies.
|
A constructive proof of identification of multilinear decompositions of
multiway arrays is presented. It can be applied to show identification in a
variety of multivariate latent structures. Examples are finite-mixture models
and hidden Markov models. The key step to show identification is the joint
diagonalization of a set of matrices in the same nonorthogonal basis. An
estimator of the latent-structure model may then be based on a sample version
of this joint-diagonalization problem. Algorithms are available for computation
and we derive distribution theory. We further develop asymptotic theory for
orthogonal-series estimators of component densities in mixture models and
emission densities in hidden Markov models.
| 0.840053 | 0.697662 | 0.142391 |
2004.06798
|
On absolute continuity of invariant measures associated with a
piecewise-deterministic Markov processes with random switching between flows
|
We are concerned with the absolute continuity of stationary distributions
corresponding to some piecewise deterministic Markov process, being typically
encountered in biological models. The process under investigation involves a
deterministic motion punctuated by random jumps, occurring at the jump times of
a Poisson process. The post-jump locations are obtained via random
transformations of the pre-jump states. Between the jumps, the motion is
governed by continuous semiflows , which are switched directly after the jumps.
The main goal of this paper is to provide a set of verifiable conditions
implying that any invariant distribution of the process under consideration
that corresponds to an ergodic invariant measure of the Markov chain given by
its post-jump locations has a density with respect to the Lebesgue measure.
|
This paper deals with the long run average continuous control problem of
piecewise deterministic Markov processes (PDMP's) taking values in a general
Borel space and with compact action space depending on the state variable. The
control variable acts on the jump rate and transition measure of the PDMP, and
the running and boundary costs are assumed to be positive but not necessarily
bounded. Our first main result is to obtain an optimality equation for the long
run average cost in terms of a discrete-time optimality equation related to the
embedded Markov chain given by the post-jump location of the PDMP. Our second
main result guarantees the existence of a feedback measurable selector for the
discrete-time optimality equation by establishing a connection between this
equation and an integro-differential equation. Our final main result is to
obtain some sufficient conditions for the existence of a solution for a
discrete-time optimality inequality and an ordinary optimal feedback control
for the long run average cost using the so-called vanishing discount approach.
| 0.906748 | 0.819625 | 0.087122 |
2004.06799
|
RoboTHOR: An Open Simulation-to-Real Embodied AI Platform
|
Visual recognition ecosystems (e.g. ImageNet, Pascal, COCO) have undeniably
played a prevailing role in the evolution of modern computer vision. We argue
that interactive and embodied visual AI has reached a stage of development
similar to visual recognition prior to the advent of these ecosystems.
Recently, various synthetic environments have been introduced to facilitate
research in embodied AI. Notwithstanding this progress, the crucial question of
how well models trained in simulation generalize to reality has remained
largely unanswered. The creation of a comparable ecosystem for
simulation-to-real embodied AI presents many challenges: (1) the inherently
interactive nature of the problem, (2) the need for tight alignments between
real and simulated worlds, (3) the difficulty of replicating physical
conditions for repeatable experiments, (4) and the associated cost. In this
paper, we introduce RoboTHOR to democratize research in interactive and
embodied visual AI. RoboTHOR offers a framework of simulated environments
paired with physical counterparts to systematically explore and overcome the
challenges of simulation-to-real transfer, and a platform where researchers
across the globe can remotely test their embodied models in the physical world.
As a first benchmark, our experiments show there exists a significant gap
between the performance of models trained in simulation when they are tested in
both simulations and their carefully constructed physical analogs. We hope that
RoboTHOR will spur the next stage of evolution in embodied computer vision.
RoboTHOR can be accessed at the following link:
https://ai2thor.allenai.org/robothor
|
The quality of high-level AI of non-player characters (NPCs) in commercial
open-world games (OWGs) has been increasing during the past years. However, due
to constraints specific to the game industry, this increase has been slow and
it has been driven by larger budgets rather than adoption of new complex AI
techniques. Most of the contemporary AI is still expressed as hard-coded
scripts. The complexity and manageability of the script codebase is one of the
key limiting factors for further AI improvements. In this paper we address this
issue. We present behavior objects - a general approach to development of NPC
behaviors for large OWGs. Behavior objects are inspired by object-oriented
programming and extend the concept of smart objects. Our approach promotes
encapsulation of data and code for multiple related behaviors in one place,
hiding internal details and embedding intelligence in the environment. Behavior
objects are a natural abstraction of five different techniques that we have
implemented to manage AI complexity in an upcoming AAA OWG. We report the
details of the implementations in the context of behavior trees and the lessons
learned during development. Our work should serve as inspiration for AI
architecture designers from both the academia and the industry.
| 0.854209 | 0.722356 | 0.131853 |
2004.06800
|
A hybrid classical-quantum workflow for natural language processing
|
Natural language processing (NLP) problems are ubiquitous in classical
computing, where they often require significant computational resources to
infer sentence meanings. With the appearance of quantum computing hardware and
simulators, it is worth developing methods to examine such problems on these
platforms. In this manuscript we demonstrate the use of quantum computing
models to perform NLP tasks, where we represent corpus meanings, and perform
comparisons between sentences of a given structure. We develop a hybrid
workflow for representing small and large scale corpus data sets to be encoded,
processed, and decoded using a quantum circuit model. In addition, we provide
our results showing the efficacy of the method, and release our developed
toolkit as an open software suite.
|
While most of the speech and natural language systems which were developed
for English and other Indo-European languages neglect the morphological
processing and integrate speech and natural language at the word level, for the
agglutinative languages such as Korean and Japanese, the morphological
processing plays a major role in the language processing since these languages
have very complex morphological phenomena and relatively simple syntactic
functionality. Obviously degenerated morphological processing limits the usable
vocabulary size for the system and word-level dictionary results in exponential
explosion in the number of dictionary entries. For the agglutinative languages,
we need sub-word level integration which leaves rooms for general morphological
processing. In this paper, we developed a phoneme-level integration model of
speech and linguistic processings through general morphological analysis for
agglutinative languages and a efficient parsing scheme for that integration.
Korean is modeled lexically based on the categorial grammar formalism with
unordered argument and suppressed category extensions, and chart-driven
connectionist parsing method is introduced.
| 0.908713 | 0.724413 | 0.1843 |
2004.06801
|
Scalable Autonomous Vehicle Safety Validation through Dynamic
Programming and Scene Decomposition
|
An open question in autonomous driving is how best to use simulation to
validate the safety of autonomous vehicles. Existing techniques rely on
simulated rollouts, which can be inefficient for finding rare failure events,
while other techniques are designed to only discover a single failure. In this
work, we present a new safety validation approach that attempts to estimate the
distribution over failures of an autonomous policy using approximate dynamic
programming. Knowledge of this distribution allows for the efficient discovery
of many failure examples. To address the problem of scalability, we decompose
complex driving scenarios into subproblems consisting of only the ego vehicle
and one other vehicle. These subproblems can be solved with approximate dynamic
programming and their solutions are recombined to approximate the solution to
the full scenario. We apply our approach to a simple two-vehicle scenario to
demonstrate the technique as well as a more complex five-vehicle scenario to
demonstrate scalability. In both experiments, we observed an order of magnitude
increase in the number of failures discovered compared to baseline approaches.
|
Anomaly detection from a driver's perspective when driving is important to
autonomous vehicles. As a part of Advanced Driver Assistance Systems (ADAS), it
can remind the driver about dangers timely. Compared with traditional studied
scenes such as the university campus and market surveillance videos, it is
difficult to detect abnormal event from a driver's perspective due to camera
waggle, abidingly moving background, drastic change of vehicle velocity, etc.
To tackle these specific problems, this paper proposes a spatial localization
constrained sparse coding approach for anomaly detection in traffic scenes,
which firstly measures the abnormality of motion orientation and magnitude
respectively and then fuses these two aspects to obtain a robust detection
result. The main contributions are threefold: 1) This work describes the motion
orientation and magnitude of the object respectively in a new way, which is
demonstrated to be better than the traditional motion descriptors. 2) The
spatial localization of object is taken into account of the sparse
reconstruction framework, which utilizes the scene's structural information and
outperforms the conventional sparse coding methods. 3) Results of motion
orientation and magnitude are adaptively weighted and fused by a Bayesian
model, which makes the proposed method more robust and handle more kinds of
abnormal events. The efficiency and effectiveness of the proposed method are
validated by testing on nine difficult video sequences captured by ourselves.
Observed from the experimental results, the proposed method is more effective
and efficient than the popular competitors, and yields a higher performance.
| 0.835108 | 0.742967 | 0.092141 |
2004.06802
|
EX Draconis: Using Eclipses to Separate Outside-In and Inside-Out
Outbursts
|
We present a study of the eclipses in the accreting white dwarf EX Dra during
TESS Cycles 14 and 15. During both of the two outbursts present in this
dataset, the eclipses undergo a hysteretic loop in
eclipse-depth/out-of-eclipse-flux space. In each case, the direction in which
the loops are executed strongly suggests an outburst which is triggered near
the inner edge of the accretion disk and propagates outwards. This in turn
suggests that the outbursts in EX Dra are 'Inside Out' outbursts; events
predicted by previous hydrodynamic studies of dwarf nova accretion disks and
confirmed spectroscopically in a number of other accreting white dwarf systems.
We therefore propose that the direction of the loop executed in
eclipse-depth/out-of-eclipse flux space be used as a test to phenomenologically
distinguish between 'inside out' and 'outside in' outbursts in other eclipsing
dwarf novae; a reliable and purely photometric test to differentiate between
these phenomena.
|
We show that the robust spin squeezing preservation can be achieved by
utilizing detuning modification for an ensemble of N separate two-level atoms
embedded in photonic crystal cavities (PCC). In particular, we explore the
different dynamical behaviors of spin squeezing between isotropic and
anisotropic PCC cases when the atomic frequency is inside the band gap. In both
cases, it is shown that the robust preservation of spin squeezing is completely
determined by the formation of bound states. Intriguingly, we find that unlike
the isotropic case where steady-state spin squeezing varies smoothly when the
atomic frequency moves from the inside to the outside band edge, a sudden
transition occurs for the anisotropic case. The present results may be of
direct importance for, e.g., quantum metrology in open quantum systems.
| 0.751914 | 0.498538 | 0.253376 |
2004.06803
|
Probabilistic Evolution of Stochastic Dynamical Systems: A Meso-scale
Perspective
|
Stochastic dynamical systems arise naturally across nearly all areas of
science and engineering. Typically, a dynamical system model is based on some
prior knowledge about the underlying dynamics of interest in which
probabilistic features are used to quantify and propagate uncertainties
associated with the initial conditions, external excitations, etc. From a
probabilistic modeling standing point, two broad classes of methods exist, i.e.
macro-scale methods and micro-scale methods. Classically, macro-scale methods
such as statistical moments-based strategies are usually too coarse to capture
the multi-mode shape or tails of a non-Gaussian distribution. Micro-scale
methods such as random samples-based approaches, on the other hand, become
computationally very challenging in dealing with high-dimensional stochastic
systems. In view of these potential limitations, a meso-scale scheme is
proposed here that utilizes a meso-scale statistical structure to describe the
dynamical evolution from a probabilistic perspective. The significance of this
statistical structure is two-fold. First, it can be tailored to any arbitrary
random space. Second, it not only maintains the probability evolution around
sample trajectories but also requires fewer meso-scale components than the
micro-scale samples. To demonstrate the efficacy of the proposed meso-scale
scheme, a set of examples of increasing complexity are provided. Connections to
the benchmark stochastic models as conservative and Markov models along with
practical implementation guidelines are presented.
|
The Kraichnan rapid advection model is recast as the stochastic dynamics of
tracer trajectories. This framework replaces the random fields with a small set
of stochastic ordinary differential equations. Multiscaling of correlation
functions arises naturally as a consequence of the geometry described by the
evolution of N trajectories. Scaling exponents and scaling structures are
interpreted as excited states of the evolution operator. The trajectories
become nearly deterministic in high dimensions allowing for perturbation theory
in this limit. We calculate perturbatively the anomalous exponent of the third
and fourth order correlation functions. The fourth order result agrees with
previous calculations.
| 0.888054 | 0.767123 | 0.120931 |
2004.06804
|
What rotation rate maximizes heat transport in rotating
Rayleigh-B\'{e}nard convection with Prandtl number larger than one?
|
The heat transfer and flow structure in rotating Rayleigh-B\'enard convection
are strongly influenced by the Rayleigh ($Ra$), Prandtl ($Pr$), and Rossby
($Ro$) number. For $Pr\gtrsim 1$ and intermediate rotation rates, the heat
transfer is increased compared to the non-rotating case. We find that the
regime of increased heat transfer is subdivided into a low and a high $Ra$
number regime. For $Ra\lesssim 5\times10^8$ the heat transfer at a given $Ra$
and $Pr$ is highest at an optimal rotation rate, at which the thickness of the
viscous and thermal boundary layer is about equal. From the scaling relations
of the thermal and viscous boundary layer thicknesses, we derive that the
optimal rotation rate scales as $1/Ro_\mathrm{opt} \approx 0.12
Pr^{1/2}Ra^{1/6}$. In the low $Ra$ regime the heat transfer is similar in a
periodic domain and cylindrical cells with different aspect ratios, i.e.\ the
ratio of diameter to height. This is consistent with the view that the
vertically aligned vortices are the dominant flow structure. For $Ra\gtrsim
5\times10^8$ the above scaling for the optimal rotation rate does not hold
anymore. It turns out that in the high $Ra$ regime, the flow structures at the
optimal rotation rate are very different than for lower $Ra$. Surprisingly, the
heat transfer in the high $Ra$ regime differs significantly for a periodic
domain and cylindrical cells with different aspect ratios, which originates
from the sidewall boundary layer dynamics and the corresponding secondary
circulation.
|
Using direct numerical simulations of turbulent thermal convection for
Rayleigh number ($\mathrm{Ra}$) between $10^6$ and $10^8$ and unit Prandtl
number, we derive scaling relations for viscous dissipation in the bulk and in
the boundary layers. We show that contrary to the general belief, the total
viscous dissipation in the bulk is larger, albeit marginally, than that in the
boundary layers. The bulk dissipation rate is similar to that in hydrodynamic
turbulence with log-normal distribution, but it differs from $(U^3/d)$ by a
factor of $\mathrm{Ra}^{-0.18}$. Viscous dissipation in the boundary layers are
rarer but more intense with a stretched-exponential distribution.
| 0.883518 | 0.778677 | 0.104841 |
2004.06805
|
Interpretable Safety Validation for Autonomous Vehicles
|
An open problem for autonomous driving is how to validate the safety of an
autonomous vehicle in simulation. Automated testing procedures can find
failures of an autonomous system but these failures may be difficult to
interpret due to their high dimensionality and may be so unlikely as to not be
important. This work describes an approach for finding interpretable failures
of an autonomous system. The failures are described by signal temporal logic
expressions that can be understood by a human, and are optimized to produce
failures that have high likelihood. Our methodology is demonstrated for the
safety validation of an autonomous vehicle in the context of an unprotected
left turn and a crosswalk with a pedestrian. Compared to a baseline importance
sampling approach, our methodology finds more failures with higher likelihood
while retaining interpretability.
|
Ride-hailing and ride-sharing applications have recently gained in popularity
as a convenient alternative to traditional modes of travel. Current research
into autonomous vehicles is accelerating rapidly and will soon become a
critical component of a ride-hailing platform's architecture. Implementing an
autonomous vehicle ride-hailing platform proves a difficult challenge due to
the centralized nature of traditional ride-hailing architectures. In a
traditional ride-hailing environment the drivers operate their own personal
vehicles so it follows that a fleet of autonomous vehicles would be required
for a centralized ride-hailing platform to succeed. Decentralization of the
ride-hailing platform would remove a road block along the way to an autonomous
vehicle ride-hailing platform by allowing owners of autonomous vehicles to add
their vehicle to a community driven fleet when not in use. Blockchain
technology is an attractive choice for this decentralized architecture due to
its immutability and fault tolerance. This paper proposes a framework for
developing a decentralized ride-hailing architecture implemented on the
Hyperledger Fabric blockchain platform. The implementation is evaluated using a
static analysis tool and performing a performance analysis under heavy network
load.
| 0.879566 | 0.626126 | 0.253441 |
2004.06806
|
Dual Blind Denoising Autoencoders for Industrial Process Data Filtering
|
In an industrial internet setting, ensuring the trustworthiness of process
data is a must when data-driven algorithms operate in the upper layers of the
control system. Unfortunately, the common place in an industrial setting is to
find time series heavily corrupted by noise and outliers. Typical methods for
cleaning the data include the use of smoothing filters or model-based
observers. In this work, a purely data-driven learning-based approach is
proposed based on a combination of convolutional and recurrent neural networks,
in an auto-encoder configuration. Results show that the proposed technique
outperforms classical methods in both a simulated example and an application
using real process data from an industrial facility.
|
Anomaly detection is a fundamental problem in computer vision area with many
real-world applications. Given a wide range of images belonging to the normal
class, emerging from some distribution, the objective of this task is to
construct the model to detect out-of-distribution images belonging to abnormal
instances. Semi-supervised Generative Adversarial Networks (GAN)-based methods
have been gaining popularity in anomaly detection task recently. However, the
training process of GAN is still unstable and challenging. To solve these
issues, a novel adversarial dual autoencoder network is proposed, in which the
underlying structure of training data is not only captured in latent feature
space, but also can be further restricted in the space of latent representation
in a discriminant manner, leading to a more accurate detector. In addition, the
auxiliary autoencoder regarded as a discriminator could obtain an more stable
training process. Experiments show that our model achieves the state-of-the-art
results on MNIST and CIFAR10 datasets as well as GTSRB stop signs dataset.
| 0.808101 | 0.674674 | 0.133427 |
2004.06807
|
Critical thresholds in 1D pressureless Euler-Poisson systems with
varying background
|
The Euler Poisson equations describe important physical phenomena in many
applications such as semiconductor modeling and plasma physics. This paper is
to advance our understanding of critical threshold phenomena in such systems in
the presence of different forces. We identify critical thresholds in two damped
Euler Poisson systems, with and without alignment, both with attractive
potential and spatially varying background state. For both systems, we give
respective bounds for subcritical and supercritical regions in the space of
initial configuration, thereby proving the existence of a critical threshold
for each scenario. Key tools include comparison with auxiliary systems, phase
space analysis of the transformed system.
|
We consider the coupled evolution of density, (scalar) metric and dilaton
perturbations in the transition from a ``stringy" phase of growing curvature
and gravitational coupling to the standard radiation-dominated cosmology. We
show that dilaton production, with a spectrum tilted towards large frequencies,
emerges as a general property of this scenario. We discuss the
frame-independence of the dilaton spectrum and of the inflationary properties
of the metric background by using, as model of source, a pressureless gas of
weakly interacting strings, which is shown to provide an approximate but
consistent solution to the full system of background equations and string
equations of motion. We combine various cosmological bounds on a growing
dilaton spectrum with the bound on the dilaton mass obtained from tests of the
equivalence principle, and we find allowed windows compatible with a universe
presently dominated by a relic background of dilatonic dark matter.
| 0.88618 | 0.600486 | 0.285694 |
2004.06808
|
Concept for the GMT High-Contrast Exoplanet Instrument GMagAO-X and the
GMT High-Contrast Phasing Testbed with MagAO-X
|
Here we review the current conceptual optical mechanical design of GMagAO-X
--the extreme AO (ExAO) system for the Giant Magellan Telescope (GMT). The
GMagAO-X tweeter deformable mirror (DM) design is novel in that it uses an
optically distributed set of pupils that allows seven commercially available
3000 actuator BMC DMs to work "in parallel" to effectively create an ELT-scale
ExAO tweeter DM --with all parts commercially available today. The GMagAO-X
"parallel DM" tweeter will have 21,000 actuators to be used at ~2kHz update
speeds enabling high-contrast science at ~5 mas separations in the visible and
NIR of the spectrum (0.6-1.7 microns). To prove our concept for GMagAO-X
several items must be lab tested: the optical/mechanical concept for the
parallel DM; phasing of the GMT pupil; and solving the GMT's "isolated island
effect" will all be demonstrated on an optical testbed at the University of
Arizona. Here we outline the current design for this "GMT High-Contrast
Testbed" that has been proposed jointly by GMTO and the University of Arizona
which leverages the existing, operational, MagAO-X ExAO instrument to verify
our approach to phase sensing and AO control for high-contrast GMT NGS science.
We will also highlight how GMagAO-X can be mounted on the auxiliary port of the
GMT and so remain gravity invariant. Since it is gravity invariant GMagAO-X can
utilize a floating optical table to minimize flexure and NCP vibrations.
|
The Space Telescope Imaging Spectrograph's (STIS) BAR5 coronagraphic occulter
was designed to provide high-contrast, visible-light, imaging in close (>=
0.15") angular proximity to bright point-sources. This is the smallest inner
working angle (IWA) possible with HST's suite of coronagraphically augmented
instruments through its mission lifetime. The STIS BAR5 image plane occulter,
however, was damaged (bent and deformed) pre-launch and had not been enabled
for GO science use following the installation of the instrument in 1997, during
HST servicing mission SM2. With the success of the HST GO 12923 program,
discussed herein, we explored and verified the functionality and utility of the
BAR5 occulter. Thus, despite its physical damage, with updates to the knowledge
of the aperture mask metrology and target pointing requirements, a robust
determination of achievable raw and PSF-subtracted stellocentric image
contrasts and fidelity was conducted. We also investigated, and herein report
on, the use of the BAR10 rounded corners as narrow-angle occulters and compare
IWA vs. contrast performance for the BAR5, BAR10, and Wedge occulters. With
that, we provide recommendations for the most efficacious BAR5 and BAR10 use
on-orbit in support of GO science. With color-matched PSF-template subtracted
coronagraphy, inclusive of a small (+/- 1/4 pixel) 3-point cross-bar dithering
strategy we recommend, we find BAR5 can deliver effective ~ 0.2" IWA image
contrast of ~ 4 x 10^-5 pixel^-1 to ~ 1 x 10^-8 pixel^-1 at 2". With the
pointing updates (to the PDB SIAF.dat file and/or implemented through APT) that
we identified, and with observing strategies we explored, we recommend the use
of STIS BAR5 coronagraphy as a fully "supported" capability for unique GO
science.
| 0.857833 | 0.780839 | 0.076994 |
2004.06809
|
Cloud Storage Architecture: Research Challenges and Opportunities
|
From home appliances to industrial enterprises, the \emph{Information and
Communication Technology (ICT)} industry is revolutionizing the world. We are
witnessing the emergence of new technologies (e.g, Cloud computing, Fog
computing, Internet of Things (IoT), Artificial Intelligence (AI) and
Block-chain) which proves the growing use of ICT (e,g. business, education,
health, and home appliances), resulting in massive data generation. It is
expected that more than 175 ZB data will be processed annually by 75 billion
devices by 2025. The \emph{5G technology} (i.e. mobile communication
technology) dramatically increases network speed, enabling users to upload
ultra high definition videos in real-time, which will generate a massive stream
of big data. Furthermore, smart devices, having artificial intelligence, will
act like a human being (e.g, a self-driving vehicle, etc) on the network, will
also generate big data. This sudden shift and massive data generation created
serious challenges in storing and managing heterogeneous data at such a large
scale. This article presents a state-of-the-art review of the issues and
challenges involved in storing heterogeneous big data, their countermeasures
(i.e, from security and management perspectives), and future opportunities of
cloud storage. These challenges are reviewed in detail and new dynamics for
researchers in the field of cloud storage are discovered.
|
Cloud Computing is rising fast, with its data centres growing at an
unprecedented rate. However, this has come with concerns over privacy,
efficiency at the expense of resilience, and environmental sustainability,
because of the dependence on Cloud vendors such as Google, Amazon and
Microsoft. Our response is an alternative model for the Cloud
conceptualisation, providing a paradigm for Clouds in the community, utilising
networked personal computers for liberation from the centralised vendor model.
Community Cloud Computing (C3) offers an alternative architecture, created by
combing the Cloud with paradigms from Grid Computing, principles from Digital
Ecosystems, and sustainability from Green Computing, while remaining true to
the original vision of the Internet. It is more technically challenging than
Cloud Computing, having to deal with distributed computing issues, including
heterogeneous nodes, varying quality of service, and additional security
constraints. However, these are not insurmountable challenges, and with the
need to retain control over our digital lives and the potential environmental
consequences, it is a challenge we must pursue.
| 0.790939 | 0.706764 | 0.084175 |
2004.06810
|
Critical reflections on asymptotically safe gravity
|
Asymptotic safety is a theoretical proposal for the ultraviolet completion of
quantum field theories, in particular for quantum gravity. Significant progress
on this program has led to a first characterization of the Reuter fixed point.
Further advancement in our understanding of the nature of quantum spacetime
requires addressing a number of open questions and challenges. Here, we aim at
providing a critical reflection on the state of the art in the asymptotic
safety program, specifying and elaborating on open questions of both technical
and conceptual nature. We also point out systematic pathways, in various stages
of practical implementation, towards answering them. Finally, we also take the
opportunity to clarify some common misunderstandings regarding the program.
|
A local Hawking temperature is derived for any future outer trapping horizon
in spherical symmetry, using a Hamilton-Jacobi variant of the Parikh-Wilczek
tunneling method. It is given by a dynamical surface gravity as defined
geometrically. The operational meaning of the temperature is that Kodama
observers just outside the horizon measure an invariantly redshifted
temperature, diverging at the horizon itself. In static, asymptotically flat
cases, the Hawking temperature as usually defined by the Killing vector agrees
in standard cases, but generally differs by a relative redshift factor between
the horizon and infinity, being the temperature measured by static observers at
infinity. Likewise, the geometrical surface gravity reduces to the Newtonian
surface gravity in the Newtonian limit, while the Killing definition instead
reflects measurements at infinity. This may resolve a longstanding puzzle
concerning the Hawking temperature for the extremal limit of the charged
stringy black hole, namely that it is the local temperature which vanishes. In
general, this confirms the quasi-stationary picture of black-hole evaporation
in early stages. However, the geometrical surface gravity is generally not the
surface gravity of a static black hole with the same parameters.
| 0.83456 | 0.707942 | 0.126618 |
2004.06811
|
Effect of perfect fluid dark matter on particle motion around a static
black hole immersed in an external magnetic field
|
We investigate particle and photon motion in the vicinity of a static and
spherically symmetric black hole surrounded by perfect fluid dark matter in the
presence of an external asymptotically uniform magnetic field. We determine the
radius of the innermost stable circular orbit (ISCO) for charged test particles
and the radius for unstable circular photon orbits and show that the effect of
the presence of dark matter shrinks the values of ISCO and photon sphere radii.
Finally, we consider the effect of the presence of dark matter on the center of
mass energy of colliding particles in the black hole vicinity. We show that the
center of mass energy grows as the value of the dark matter parameter
increases. This result, in conjunction with the fact that, in the presence of
an external magnetic field, the ISCO radius can become arbitrarily close to the
horizon leads to arbitrarily high energy that can be extracted by the collision
process, similarly to what is observed in the super-spinning Kerr case.
|
We study high energy charged particle collisions near the horizon in an
electromagnetic field around a rotating black hole and reveal the condition of
the fine-tuning to obtain arbitrarily large center-of-mass (CM) energy. We
demonstrate that the CM energy can be arbitrarily large as the uniformly
magnetized rotating black hole arbitrarily approaches maximal rotation under
the situation that a charged particle plunges from the innermost stable
circular orbit (ISCO) and collides with another particle near the horizon.
Recently, Frolov [Phys. Rev. D 85, 024020 (2012)] proposed that the CM energy
can be arbitrarily high if the magnetic field is arbitrarily strong, when a
particle collides with a charged particle orbiting the ISCO with finite energy
near the horizon of a uniformly magnetized Schwarzschild black hole. We show
that the charged particle orbiting the ISCO around a spinning black hole needs
arbitrarily high energy in the strong field limit. This suggests that Frolov's
process is unstable against the black hole spin. Nevertheless, we see that
magnetic fields may substantially promote the capability of rotating black
holes as particle accelerators in astrophysical situations.
| 0.890993 | 0.785737 | 0.105256 |
2004.06812
|
WIYN Open Cluster Study LXXIX. M48 (NGC 2548) I. Radial Velocities,
Rotational Velocities, and Metallicities of Stars in the Open Cluster M48
(NGC 2548)
|
WIYN/Hydra spectra (R $\sim$ 13,500, signal-to-noise pixel$^{-1}$ = 50-1000)
of a 400 $\unicode{x212B}$ region around Li 6708 $\unicode{x212B}$ are used to
determine radial and rotational velocities for 287 photometrically selected
candidate members of the open cluster M48. The sample ranges from turnoff A
stars to late-K dwarfs and eight giants. We combine our $V_{\rm{RAD}}$
measurements and power spectrum analysis with parallax and proper motion data
from Gaia DR2 to evaluate membership and multiplicity. We classify 152 stars as
single cluster members, 11 as binary members, 16 as members of uncertain
multiplicity, 56 as single nonmembers, 28 as single "likely" nonmembers, two as
single "likely" members, one as a binary "likely" member, five as binary
nonmembers, 10 as "likely" members of uncertain multiplicity, three as
nonmembers of uncertain multiplicity, and three as "likely" nonmembers of
uncertain multiplicity. From a subsample of 95 single members, we derive
$V_{\rm{RAD}}$ = 8.512 $\pm$ 0.087 km s$^{-1}$ ($\sigma_{\mu}$, and $\sigma$ =
0.848 km s$^{-1}$). Using 16 isolated Fe I lines for a subsample of 99 single
members (that have $\sigma_{T_{\rm{eff}}}$ $<$ 75 K (from 10 colors from
$UBVRI$), $v$ sin $i$ $<$ 25 km s$^{-1}$, and well-behaved Fe I lines),
[Fe/H]$_{\rm{M48}}$ = -0.063 $\pm$ 0.007 dex ($\sigma_{\mu}$). [Fe/H] is
independent of $T_{\rm{eff}}$ over an unprecedentedly large range of 2500 K.
The minimum cluster binary fraction is 11%-21%. M48 exhibits a clear but modest
broadening of the main-sequence turnoff, and there is no correlation between
color and $v$ sin $i$.
|
We investigate the morphology of the colour-magnitude diagram (CMD) of the
open cluster NGC 2509 in comparison with other Galactic open clusters of
similar age using Gaia photometry. At $\sim900$ Myr Galactic open clusters in
our sample all show an extended main sequence turn off (eMSTO) with the
exception of NGC 2509, which presents an exceptionally narrow CMD. Our analysis
of the Gaia data rules out differential extinction, stellar density, and
binaries as a cause for the singular MSTO morphology in this cluster. We
interpret this feature as a consequence of the stellar rotation distribution
within the cluster and present the analysis with MIST stellar evolution models
that include the effect of stellar rotation on which we based our conclusion.
In particular, these models point to an unusually narrow range of stellar
rotation rates ($\Omega/\Omega_{\rm{crit,ZAMS}} = [0.4, 0.6]$) within the
cluster as the cause of this singular feature in the CMD of NGC 2509.
Interestingly, models that do not include rotation are not as good at
reproducing the morphology of the observed CMD in this cluster.
| 0.850849 | 0.807066 | 0.043783 |
2004.06814
|
A Human Evaluation of AMR-to-English Generation Systems
|
Most current state-of-the art systems for generating English text from
Abstract Meaning Representation (AMR) have been evaluated only using automated
metrics, such as BLEU, which are known to be problematic for natural language
generation. In this work, we present the results of a new human evaluation
which collects fluency and adequacy scores, as well as categorization of error
types, for several recent AMR generation systems. We discuss the relative
quality of these systems and how our results compare to those of automatic
metrics, finding that while the metrics are mostly successful in ranking
systems overall, collecting human judgments allows for more nuanced
comparisons. We also analyze common errors made by these systems.
|
This paper reports the findings of a study conducted on the application of an
on-line human-computer dialog system with natural language (chatbot) on the
teaching of foreign languages. A keywords-based human-computer dialog system
makes it possible that the user could chat with the computer using a natural
language, i.e. in English or in German to some extent. So an experiment has
been made using this system online to work as a chat partner with the users
learning the foreign languages. Dialogs between the users and the chatbot are
collected. Findings indicate that the dialogs between the human and the
computer are mostly very short because the user finds the responses from the
computer are mostly repeated and irrelevant with the topics and context and the
program does not understand the language at all. With analysis of the keywords
or pattern-matching mechanism used in this chatbot it can be concluded that
this kind of system can not work as a teaching assistant program in foreign
language learning.
| 0.843286 | 0.737766 | 0.10552 |
2004.06815
|
Thermodynamic Structure of the Solar Corona: Tomographic Reconstructions
and MHD Modeling
|
We carry out a study of the global three-dimensional (3D) structure of the
electron density and temperature of the quiescent inner solar corona ($r<1.25
R_\odot$) by means of tomographic reconstructions and magnetohydrodynamic
simulations. We use differential emission measure tomography (DEMT) and the
Alfv\'en Wave Solar Model (AWSoM), in their latest versions. Two target
rotations were selected from the solar minimum between solar cycles (SCs) 23
and 24 and the declining phase of SC 24. We report in quantitative detail on
the 3D thermodynamic structure of the core and outer layers of the streamer
belt, and of the high latitude coronal holes (CH), as revealed by the DEMT
analysis. We report on the presence of two types of structures within the
streamer belt, loops with temperature decreasing/increasing with height (dubbed
down/up loops), as reported first in previous DEMT studies. We also estimate
the heating energy flux required at the coronal base to keep these structures
stable, found to be or order $10^5 erg\, cm^{-2} s^{-1}$, consistently with
previous DEMT and spectroscopic studies. We discuss how these findings are
consistent with coronal dissipation of Alfv\'en waves. We compare the 3D
results of DEMT and AWSoM in distinct magnetic structures. We show that the
agreement between the products of both techniques is the best so far, with an
overall agreement $\lesssim 20\%$, depending on the target rotation and the
specific coronal region. In its current implementation the ASWsoM model can not
reproduce down loops though. Also, in the source region of the fast and slow
components of the solar wind, the electron density of the AWSoM model increases
with latitude, opposite to the trend observed in DEMT reconstructions.
|
The dynamics of magnetic fields in closed regions of solar and stellar
coronae are investigated with a reduced magnetohydrodynamic (MHD) model in the
framework of Parker scenario for coronal heating. A novel analysis of reduced
MHD equilibria shows that their magnetic fields have an asymmetric structure in
the axial direction with variation length-scale $z_\ell \sim \ell B_0/b$, where
$B_0$ is the intensity of the strong axial guide field, $b$ that of the
orthogonal magnetic field component, and $\ell$ the scale of $\mathbf{b}$.
Equilibria are then quasi-invariant along the axial direction for variation
scales larger than approximatively the loop length $z_\ell \gtrsim L_z$, and
increasingly more asymmetric for smaller variation scales $z_\ell \lesssim
L_z$. The $critical$ $length$ $z_\ell \sim L_z$ corresponds to the magnetic
field intensity threshold $b \sim \ell B_0/L_z$. Magnetic fields stressed by
photospheric motions cannot develop strong axial asymmetries. Therefore fields
with intensities below such threshold evolve quasi-statically, readjusting to a
nearby equilibrium, without developing nonlinear dynamics nor dissipating
energy. But stronger fields cannot access their corresponding asymmetric
equilibria, hence they are out-of-equilibrium and develop nonlinear dynamics.
The subsequent formation of current sheets and energy dissipation is
$necessary$ for the magnetic field to relax to equilibrium, since dynamically
accessible equilibria have variation scales larger than the loop length $z_\ell
\gtrsim L_z$, with intensities smaller than the threshold $b \lesssim \ell
B_0/L_z$. The dynamical implications for magnetic fields of interest to solar
and stellar coronae are investigated numerically and the impact on coronal
physics discussed.
| 0.850542 | 0.785176 | 0.065367 |
2004.06816
|
Bounding boxes for weakly supervised segmentation: Global constraints
get close to full supervision
|
We propose a novel weakly supervised learning segmentation based on several
global constraints derived from box annotations. Particularly, we leverage a
classical tightness prior to a deep learning setting via imposing a set of
constraints on the network outputs. Such a powerful topological prior prevents
solutions from excessive shrinking by enforcing any horizontal or vertical line
within the bounding box to contain, at least, one pixel of the foreground
region. Furthermore, we integrate our deep tightness prior with a global
background emptiness constraint, guiding training with information outside the
bounding box. We demonstrate experimentally that such a global constraint is
much more powerful than standard cross-entropy for the background class. Our
optimization problem is challenging as it takes the form of a large set of
inequality constraints on the outputs of deep networks. We solve it with
sequence of unconstrained losses based on a recent powerful extension of the
log-barrier method, which is well-known in the context of interior-point
methods. This accommodates standard stochastic gradient descent (SGD) for
training deep networks, while avoiding computationally expensive and unstable
Lagrangian dual steps and projections. Extensive experiments over two different
public data sets and applications (prostate and brain lesions) demonstrate that
the synergy between our global tightness and emptiness priors yield very
competitive performances, approaching full supervision and outperforming
significantly DeepCut. Furthermore, our approach removes the need for
computationally expensive proposal generation. Our code is shared anonymously.
|
The panoptic segmentation task requires a unified result from semantic and
instance segmentation outputs that may contain overlaps. However, current
studies widely ignore modeling overlaps. In this study, we aim to model overlap
relations among instances and resolve them for panoptic segmentation. Inspired
by scene graph representation, we formulate the overlapping problem as a
simplified case, named scene overlap graph. We leverage each object's category,
geometry and appearance features to perform relational embedding, and output a
relation matrix that encodes overlap relations. In order to overcome the lack
of supervision, we introduce a differentiable module to resolve the overlap
between any pair of instances. The mask logits after removing overlaps are fed
into per-pixel instance \verb|id| classification, which leverages the panoptic
supervision to assist in the modeling of overlap relations. Besides, we
generate an approximate ground truth of overlap relations as the weak
supervision, to quantify the accuracy of overlap relations predicted by our
method. Experiments on COCO and Cityscapes demonstrate that our method is able
to accurately predict overlap relations, and outperform the state-of-the-art
performance for panoptic segmentation. Our method also won the Innovation Award
in COCO 2019 challenge.
| 0.872001 | 0.762921 | 0.10908 |
2004.06817
|
Prisoner's Dilemma on Real Social Networks: Revisited
|
Prisoner's Dilemma is a game theory model used to describe altruistic
behavior seen in various populations. This theoretical game is important in
understanding why a seemingly selfish strategy does persist and spread
throughout a population that is mixing homogeneously at random. For a
population with structure determined by social interactions, Prisoner's Dilemma
brings to light certain requirements for the altruistic strategy to become
established. Monte Carlo simulations of Prisoner's Dilemma are carried out
using both simulated social networks and a dataset of a real social network. In
both scenarios we confirm the requirements for the persistence of altruism in
the population.
|
It is well known that in contrast to the Prisoner's Dilemma, the snowdrift
game can lead to a stable coexistence of cooperators and cheaters. Recent
theoretical evidence on the snowdrift game suggests that gradual evolution for
individuals choosing to contribute in continuous degrees can result in the
social diversification to a 100% contribution and 0% contribution through
so-called evolutionary branching. Until now, however, game-theoretical studies
have shed little light on the evolutionary dynamics and consequences of the
loss of diversity in strategy. Here we analyze continuous snowdrift games with
quadratic payoff functions in dimorphic populations. Subsequently, conditions
are clarified under which gradual evolution can lead a population consisting of
those with 100% contribution and those with 0% contribution to merge into one
species with an intermediate contribution level. The key finding is that the
continuous snowdrift game is more likely to lead to assimilation of different
cooperation levels rather than maintenance of diversity. Importantly, this
implies that allowing the gradual evolution of cooperative behavior can
facilitate social inequity aversion in joint ventures that otherwise could
cause conflicts that are based on commonly accepted notions of fairness.
| 0.861578 | 0.770871 | 0.090707 |
2004.06818
|
Privacy-Preserving Contact Tracing: current solutions and open questions
|
The COVID-19 pandemic has posed a unique challenge for the world to find
solutions, ranging from vaccines to ICT solutions to slow down the virus
spreading. Due to the highly contagious nature of the virus, social distancing
is one fundamental measure which has already adopted by many countries. At the
technical level, this prioritises contact tracing solutions, which can alert
the users who have been in close contact with the infected persons and
meanwhile allow heath authorities to take proper actions. In this paper, we
examine several existing privacy-aware contact tracing solutions and analyse
their (dis)advantages. At the end, we describe several major observations and
outline an interdisciplinary research agenda towards more comprehensive and
effective privacy-aware contact tracing solutions.
|
In the digital age, the amount of data produced is growing exponentially.
Governments and institutions can no longer rely on old methods for storing data
and passing on the knowledge to future generations. Digital data preservation
is a mandatory issue that needs proper strategies and tools. With this
awareness, efforts are being made to create and perfect software solutions
capable of responding to the challenge of properly preserving digital
information. This paper focuses on the state-of-the-art in open-source software
solutions for the digital preservation and curation field used to assimilate
and disseminate information to designated audiences. Eleven open source
projects for digital preservation are surveyed in areas such as supported
standards and protocols, strategies for preservation, methodologies for
reporting, dynamic of development, targeted operating systems, multilingual
support and open source license. Furthermore, five of these open source
projects, are further analysed, with focus on features deemed important for the
area. Along open source solutions, the paper also briefly surveys the standards
and protocols relevant for digital data preservation. The area of digital data
preservation repositories has several open source solutions, which can form the
base to overcome the challenges to reach mature and reliable digital data
preservation.
| 0.738798 | 0.583243 | 0.155554 |
2004.06819
|
Riemannian metrics on the moduli space of GHMC anti-de Sitter structures
|
In this short note we explain how to adapt the construction of two Riemannian
metrics on the $\mathrm{SL}(3,\mathbb{R})$-Hitchin component to the deformation
space of globally hyperbolic anti-de Sitter structures: the pressure metric and
the Loftin metric (studied by Qiongling Li). We show that the former is
degenerate and we characterize its degenerate locus, whereas the latter is
nowhere degenerate and the Fuchsian locus is a totally geodesic copy of
Teichm\"uller space endowed with a multiple of the Weil-Petersson metric.
|
The Fubini's idea to introduce a fundamental scale of hadron phenomena by
means of dilatation non-invariant vacuum state in the frame work of a scale
invariant Lagrangian field theory is recalled. The Fubini vacua is invariant
under the de Sitter subgroup of the full conformal group. We obtain a finite
entropy for the quantum state corresponding to the classical Fubini vacua in
Euclidean space-time resembeling the entropy of the de Sitter vacua. In
Minkowski space-time it is shown that the Fubini vacua is mainly a bath of
radiation with Rayleigh-Jeans distribution for the low energy radiation. In
four dimensions, the critical scalar theory is shown to be equivalent to the
Einstein field equation in the ansatz of conformally flat metrics and to the
SU(2) Yang-Mills theory in the 't Hooft ansatz. In D-dimensions, the Hitchin
formula for the information geometry metric of the moduli space of instantons
is used to obtain the information geometry of the free-parameter space of the
Fubini vacua which is shown to be a (D+1)-dimensional AdS space. Considering
the Fubini vacua as a de Sitter vacua, the corresponding cosmological constant
is shown to be given by the coupling constant of the critical scalar theory. In
Minkowski spacetime it is shown that the Fubini vacua is equivalent to an open
FRW universe.
| 0.891125 | 0.800647 | 0.090478 |
2004.06820
|
Attractive Riesz potentials acting on hard spheres
|
In this paper we introduce a model for hard spheres interacting through
attractive Riesz type potentials, and we study its thermodynamic limit. We show
that the tail energy enforces optimal packing and round macroscopic shapes.
|
We propose a free-energy based Monte-Carlo method to measure the volume of
potential-energy basins in configuration space. Using this approach we can
estimate the number of distinct potential-energy minima, even when this number
is much too large to be sampled directly. We validate our approach by comparing
our results with the direct enumeration of distinct jammed states in small
packings of frictionless spheres. We find that the entropy of distinct packings
is extensive and that the entropy of distinct hard-sphere packings must have a
maximum as a function of packing fraction.
| 0.888845 | 0.771591 | 0.117254 |
2004.06822
|
Metasurface Integrated Monolayer Exciton Polariton
|
Monolayer transition metal dichalcogenides (TMDs) are the first truly
two-dimensional (2D) semiconductor, providing an excellent platform to
investigate light-matter interaction in the 2D limit. Apart from fundamental
scientific exploration, this material system has attracted active research
interest in the nanophotonic devices community for its unique optoelectronic
properties. The inherently strong excitonic response in monolayer TMDs can be
further enhanced by exploiting the temporal confinement of light in
nanophotonic structures. Dielectric metasurfaces are one such two-dimensional
nanophotonic structures, which have recently demonstrated strong potential to
not only miniaturize existing optical components, but also to create completely
new class of designer optics. Going beyond passive optical elements,
researchers are now exploring active metasurfaces using emerging materials and
the utility of metasurfaces to enhance the light-matter interaction. Here, we
demonstrate a 2D exciton-polariton system by strongly coupling atomically thin
tungsten diselenide (WSe2) monolayer to a silicon nitride (SiN) metasurface.
Via energy-momentum spectroscopy of the WSe2-metasurface system, we observed
the characteristic anti-crossing of the polariton dispersion both in the
reflection and photoluminescence spectrum. A Rabi splitting of 18 meV was
observed which matched well with our numerical simulation. The diffraction
effects of the nano-patterned metasurface also resulted in a highly directional
polariton emission. Finally, we showed that the Rabi splitting, the polariton
dispersion and the far-field emission pattern could be tailored with
subwavelength-scale engineering of the optical meta-atoms. Our platform thus
opens the door for the future development of novel, exotic exciton-polariton
devices by advanced meta-optical engineering.
|
The interaction of light with solids gives rise to new bosonic
quasiparticles, with the exciton being---undoubtedly---the most famous of these
polaritons. While excitons are the generic polaritons of semiconductors, we
show that for strongly correlated systems another polariton is
prevalent---originating from the dominant antiferromagnetic or charge density
wave fluctuations in these systems. As these are usually associated with a wave
vector ${\mathbf k}= (\pi,\pi,\ldots)$ or close to it, we propose to call the
derived polaritons $\pi$-tons. These $\pi$-tons yield the leading vertex
correction to the optical conductivity in all correlated models studied: the
Hubbard, the extended Hubbard model, the Falicov-Kimball, and the
Pariser-Parr-Pople model, both in the insulating and in the metallic phase.
| 0.849576 | 0.737403 | 0.112173 |
2004.06823
|
The non-SUSY $AdS_6$ and $AdS_7$ fixed points are brane-jet unstable
|
In six- and seven-dimensional gauged supergravity, each scalar potential has
one supersymmetric and one non-supersymmetric fixed points. The
non-supersymmetric $AdS_7$ fixed point is perturbatively unstable. On the other
hand, the non-supersymmetric $AdS_6$ fixed point is known to be perturbatively
stable. In this note we examine the newly proposed non-perturbative
instability, called brane-jet instabilities of the $AdS_6$ and $AdS_7$ vacua.
We find that when they are uplifted to massive type IIA and eleven-dimensional
supergravity, respectively, the non-supersymmetric $AdS_6$ and $AdS_7$ vacua
are both brane-jet unstable, in fond of the weak gravity conjecture.
|
A generic property of curved manifolds is the existence of focal points. We
show that branes located at focal points of the geometry satisfy special
properties. Examples of backgrounds to which our discussion applies are AdS_m x
S^n and plane wave backgrounds. As an example, we show that a pair of AdS_2
branes located at the north and south pole of the S^5 in AdS_5 x S^5 are half
supersymmetric and that they are dual to a two-monopole solution of N=4 SU(N)
SYM theory. Our second example involves spacelike branes in the (Lorentzian)
plane wave. We develop a modified lightcone gauge for the open string channel,
analyze in detail the cylinder diagram and establish open-closed duality. When
the branes are located at focal points of the geometry the amplitude acquires
most of the characteristics of flat space amplitudes. In the open string
channel the special properties are due to stringy modes that become massless.
| 0.933692 | 0.793543 | 0.140149 |
2004.06824
|
Melanoma Detection using Adversarial Training and Deep Transfer Learning
|
Skin lesion datasets consist predominantly of normal samples with only a
small percentage of abnormal ones, giving rise to the class imbalance problem.
Also, skin lesion images are largely similar in overall appearance owing to the
low inter-class variability. In this paper, we propose a two-stage framework
for automatic classification of skin lesion images using adversarial training
and transfer learning toward melanoma detection. In the first stage, we
leverage the inter-class variation of the data distribution for the task of
conditional image synthesis by learning the inter-class mapping and
synthesizing under-represented class samples from the over-represented ones
using unpaired image-to-image translation. In the second stage, we train a deep
convolutional neural network for skin lesion classification using the original
training set combined with the newly synthesized under-represented class
samples. The training of this classifier is carried out by minimizing the focal
loss function, which assists the model in learning from hard examples, while
down-weighting the easy ones. Experiments conducted on a dermatology image
benchmark demonstrate the superiority of our proposed approach over several
standard baseline methods, achieving significant performance improvements.
Interestingly, we show through feature visualization and analysis that our
method leads to context based lesion assessment that can reach an expert
dermatologist level.
|
On the path to establishing a global cybersecurity framework where each
enterprise shares information about malicious behavior, an important question
arises. How can a machine learning representation characterizing a cyber attack
on one network be used to detect similar attacks on other enterprise networks
if each networks has wildly different distributions of benign and malicious
traffic? We address this issue by comparing the results of naively transferring
a model across network domains and using CORrelation ALignment, to our novel
adversarial Siamese neural network. Our proposed model learns attack
representations that are more invariant to each network's particularities via
an adversarial approach. It uses a simple ranking loss that prioritizes the
labeling of the most egregious malicious events correctly over average
accuracy. This is appropriate for driving an alert triage workflow wherein an
analyst only has time to inspect the top few events ranked highest by the
model. In terms of accuracy, the other approaches fail completely to detect any
malicious events when models were trained on one dataset are evaluated on
another for the first 100 events. While, the method presented here retrieves
sizable proportions of malicious events, at the expense of some training
instabilities due in adversarial modeling. We evaluate these approaches using 2
publicly available networking datasets, and suggest areas for future research.
| 0.858967 | 0.634903 | 0.224064 |
2004.06825
|
Self-induced passive nonreciprocal transmission by nonlinear bifacial
dielectric metasurfaces
|
The breaking of Lorentz reciprocity law is a non-trivial task, since it
usually requires bulky magnets or complicated time-modulation dynamic
techniques to be accomplished. In this work, we present a simple and compact
design of a nonlinear bifacial dielectric metasurface to achieve strong
self-induced passive nonreciprocal transmission without the use of external
biases. The proposed design is ideal for free space optics applications, can
operate under both incident polarizations, and require very low input
excitation power to reach the nonreciprocal regime. It is composed of two
passive silicon-based metasurfaces exhibiting Fano and Lorentzian resonances
embedded in an ultrathin glass substrate. Highly asymmetric field enhancement
is achieved with the proposed design that leads to strong nonreciprocity at low
excitation intensities due to the large Kerr nonlinearity of silicon. Moreover,
cascade designs are presented to further improve the insertion loss, broaden
the nonreciprocal intensity range, and increase the isolation ratio by
enhancing the transmission contrast. Finally, it is demonstrated that the
proposed nonlinear metasurface is robust to fabrication imperfections and can
achieve large isolation for a relative broad input power range even in the case
of two incident waves impinging at the same time from both directions. The
current work is expected to lead to new compact nonreciprocal nanophotonic
devices, such as all-optical diodes, isolators, circulators, and ultrathin
protective layers for sensitive optical components.
|
Previous research has attempted to minimize the influence of loss in
reflection- and transmission-type acoustic metasurfaces. This letter shows
that, by treating the acoustic metasurface as a non-Hermitian system and by
harnessing loss, unconventional wave behaviors that do not exist in lossless
metasurfaces can be uncovered. Specifically, we theoretically and
experimentally demonstrate a non-Hermitian acoustic metasurface mirror
featuring extremely asymmetrical reflection at the exception point. As an
example, the metasurface mirror is designed to have high-efficiency
retro-reflection when the wave incidents from one side and complete absorption
when the wave incidents from the other side. This work marries conventional
gradient index metasurfaces with the exception point from non-Hermitian
systems, and paves the way for identifying new mechanisms and functionalities
for wave manipulation.
| 0.900562 | 0.805228 | 0.095333 |
2004.06826
|
The Tajima heterochronous n-coalescent: inference from heterochronously
sampled molecular data
|
The observed sequence variation at a locus informs about the evolutionary
history of the sample and past population size dynamics. The standard Kingman
coalescent model on genealogies - timed trees that represent the ancestry of
the sample - is used in a generative model of molecular sequence variation to
infer evolutionary parameters. However, the state space of Kingman's
genealogies grows superexponentially with sample size n, making inference
computationally unfeasible already for small n. We introduce a new coalescent
model called Tajima heterochronous n-coalescent with a substantially smaller
cardinality of the genealogical space. This process allows to analyze samples
collected at different times, a situation that in applications is both met
(e.g. ancient DNA and RNA from rapidly evolving pathogens like viruses) and
statistically desirable (variance reduction and parameter identifiability). We
propose an algorithm to calculate the likelihood efficiently and present a
Bayesian nonparametric procedure to infer the population size trajectory. We
provide a new MCMC sampler to explore the space of Tajima's genealogies and
model parameters. We compare our procedure with state-of-the-art methodologies
in simulations and applications. We use our method to re-examine the scientific
question of how Beringian bison went extinct analyzing modern and ancient
molecular sequences of bison in North America, and to reconstruct population
size trajectory of SARS-CoV-2 from viral sequences collected in France and
Germany.
|
In a regime where data are only mildly informative, prior choices can play a
significant role in Bayesian statistical inference, potentially affecting the
inferred physics. We show this is indeed the case for some of the parameters
inferred from current gravitational-wave measurements of binary black hole
coalescences. We reanalyze the first detections performed by the twin LIGO
interferometers using alternative (and astrophysically motivated) prior
assumptions. We find different prior distributions can introduce deviations in
the resulting posteriors that impact the physical interpretation of these
systems. For instance, (i) limits on the $90\%$ credible interval on the
effective black hole spin $\chi_{\rm eff}$ are subject to variations of $\sim
10\%$ if a prior with black hole spins mostly aligned to the binary's angular
momentum is considered instead of the standard choice of isotropic spin
directions, and (ii) under priors motivated by the initial stellar mass
function, we infer tighter constraints on the black hole masses, and in
particular, we find no support for any of the inferred masses within the
putative mass gap $M \lesssim 5 M_\odot$.
| 0.810918 | 0.638684 | 0.172234 |
2004.06827
|
The Estimation of the Effective Reproductive Number from Disease
Outbreak Data
|
We consider a single outbreak susceptible-infected-recovered (SIR) model and
corresponding estimation procedures for the effective reproductive number
$\mathcal{R}(t)$. We discuss the estimation of the underlying SIR parameters
with a generalized least squares (GLS) estimation technique. We do this in the
context of appropriate statistical models for the measurement process. We use
asymptotic statistical theories to derive the mean and variance of the limiting
(Gaussian) sampling distribution and to perform post statistical analysis of
the inverse problems. We illustrate the ideas and pitfalls (e.g., large
condition numbers on the corresponding Fisher information matrix) with both
synthetic and influenza incidence data sets.
|
Multiple epidemiological models have been proposed to predict the spread of
Ebola in West Africa. These models include consideration of counter-measures
meant to slow and, eventually, stop the spread of the disease. Here, we examine
one component of Ebola dynamics that is of growing concern -- the transmission
of Ebola from the dead to the living. We do so by applying the toolkit of
mathematical epidemiology to analyze the consequences of post-death
transmission. We show that underlying disease parameters cannot be inferred
with confidence from early-stage incidence data (that is, they are not
"identifiable") because different parameter combinations can produce virtually
the same epidemic trajectory. Despite this identifiability problem, we find
robustly that inferences that don't account for post-death transmission tend to
underestimate the basic reproductive number -- thus, given the observed rate of
epidemic growth, larger amounts of post-death transmission imply larger
reproductive numbers. From a control perspective, we explain how improvements
in reducing post-death transmission of Ebola may reduce the overall epidemic
spread and scope substantially. Increased attention to the proportion of
post-death transmission has the potential to aid both in projecting the course
of the epidemic and in evaluating a portfolio of control strategies.
| 0.850029 | 0.764958 | 0.085071 |
2004.06828
|
Population Recovery from the Deletion Channel: Nearly Matching Trace
Reconstruction Bounds
|
The population recovery problem asks one to recover an unknown distribution
over $n$-bit strings given query access to independent noisy samples of strings
drawn from the distribution. Recently, Ban et. al. [BCF+19] studied the problem
where the unknown distribution over $n$-bit strings is known to be
$\ell$-sparse for some fixed $\ell$, and the noise is induced through the
deletion channel. The deletion channel is a noise model where each bit of the
string is independently deleted with some fixed probability, and the retained
bits are concatenated. We note that if $\ell = 1,$ i.e., we are trying to learn
a single string, learning the distribution is equivalent to the famous trace
reconstruction problem. The best known algorithms for trace reconstruction
require $\exp\left(O(n^{1/3})\right)$ samples.
For population recovery under the deletion channel, Ban et. al. provided an
algorithm that could learn $\ell$-sparse distributions over strings using
$\exp\left(n^{1/2} \cdot (\log n)^{O(\ell)}\right)$ samples. In this work, we
provide an algorithm that learns the distribution using only
$\exp\big(\tilde{O}(n^{1/3}) \cdot \ell^2\big)$ samples, by developing a
higher-moment analog of the algorithms of [DOS17, NP17]. We also give the first
algorithm with a runtime subexponential in $n$, which solves population
recovery in $\exp\big(\tilde{O}(n^{1/3}) \cdot \ell^3\big)$ samples and time.
Notably, our dependence on $n$ nearly matches the known upper bound when
$\ell = 1$, and we reduce the dependence on $\ell$ from doubly to nearly singly
exponential. Therefore, we are able to learn the mixture even for much larger
values of $\ell$. For instance, Ban et. al.'s algorithm can only learn a
mixture of $O(\log n/\log \log n)$ strings with a subexponential number of
queries, whereas we are able to learn a mixture of up to $n^{o(1)}$ strings in
subexponential queries and time.
|
Limitations on bandwidth and power consumption impose strict bounds on data
rates of diagnostic imaging systems. Consequently, the design of suitable (i.e.
task- and data-aware) compression and reconstruction techniques has attracted
considerable attention in recent years. Compressed sensing emerged as a popular
framework for sparse signal reconstruction from a small set of compressed
measurements. However, typical compressed sensing designs measure a
(non)linearly weighted combination of all input signal elements, which poses
practical challenges. These designs are also not necessarily task-optimal. In
addition, real-time recovery is hampered by the iterative and time-consuming
nature of sparse recovery algorithms. Recently, deep learning methods have
shown promise for fast recovery from compressed measurements, but the design of
adequate and practical sensing strategies remains a challenge. Here, we propose
a deep learning solution termed Deep Probabilistic Sub-sampling (DPS), that
learns a task-driven sub-sampling pattern, while jointly training a subsequent
task model. Once learned, the task-based sub-sampling patterns are fixed and
straightforwardly implementable, e.g. by non-uniform analog-to-digital
conversion, sparse array design, or slow-time ultrasound pulsing schemes. The
effectiveness of our framework is demonstrated in-silico for sparse signal
recovery from partial Fourier measurements, and in-vivo for both anatomical
image and tissue-motion (Doppler) reconstruction from sub-sampled medical
ultrasound imaging data.
| 0.857326 | 0.71914 | 0.138186 |
2004.06829
|
Common Envelope Evolution on the Asymptotic Giant Branch: Unbinding
within a Decade?
|
Common envelope (CE) evolution is a critical but still poorly understood
progenitor phase of many high-energy astrophysical phenomena. Although 3D
global hydrodynamic CE simulations have become more common in recent years,
those involving an asymptotic giant branch (AGB) primary are scarce, due to the
high computational cost from the larger dynamical range compared to red giant
branch (RGB) primaries. But CE evolution with AGB progenitors is desirable to
simulate because such events are the likely progenitors of most bi-polar
planetary nebulae (PNe), and prominent observational testing grounds for CE
physics. Here we present a high resolution global simulation of CE evolution
involving an AGB primary and $1\,\mathrm{M}_\odot$ secondary, evolved for $20$
orbital revolutions. During the last $16$ of these orbits, the envelope unbinds
at an almost constant rate of about
$0.1$-$0.2\,\mathrm{M}_\odot\,\mathrm{yr}^{-1}$. If this rate were maintained,
the envelope would be unbound in less than $10\,\mathrm{yr}$. We compare this
run with a previous run that used an RGB phase primary evolved from the same
$2\,\mathrm{M}_\odot$ main sequence star to assess the influence of the
evolutionary state of the primary. When scaled appropriately, the two runs are
quite similar, but with some important differences.
|
Thermally pulsing asymptotic giant branch models of globular cluster stars
are calculated using a synthetic model with the goal of reproducing the
chemical composition, core masses and other observational parameters of the
four known globular cluster planetary nebulae as well as roughly matching the
overall cluster properties. The evolution of stars with an enhanced helium
abundance ($Y$) and blue stragglers are modeled. New pre-thermally pulsing
asymptotic giant branch mass-losses for red giant branch and early asymptotic
giant branch stars are calculated from the Padova stellar evolution models
\citep{berta,bertb}. The new mass-losses are calculated to get the relative
differences in mass-losses due to enhanced helium abundances.
The global properties of the globular cluster planetary nebula are reproduced
with these models. The metallicity, mass of the central star, overall
metallicities, helium abundance and the nebular mass are matched to the
observational values. Globular cluster planetary nebulae JaFu 1 and JaFu 2 are
reproduced {\it by assuming progenitor stars} with masses near the typical main
sequence turn-offs of globular clusters and with enhanced helium abundances
very similar to the enhancements inferred from fitting isochrones to globular
cluster colour-magnitude diagrams. The globular cluster PN GJJC-1 can be
roughly fit by a progenitor star with very extreme helium enhancement
($Y\approx0.40$) near the turn-off producing a central star with the same mass
as inferred by observations and a very low nebular mass. The abundances and
core mass of planetary nebula Ps 1 and its central star (K648) are reproduced
by a blue straggler model. However, it turned out to be impossible to reproduce
its nebular mass and it is concluded some kind of binary scenario may be needed
to explain K648.
| 0.872183 | 0.751937 | 0.120246 |
2004.06830
|
Differentially Private Assouad, Fano, and Le Cam
|
Le Cam's method, Fano's inequality, and Assouad's lemma are three widely used
techniques to prove lower bounds for statistical estimation tasks. We propose
their analogues under central differential privacy. Our results are simple,
easy to apply and we use them to establish sample complexity bounds in several
estimation tasks. We establish the optimal sample complexity of discrete
distribution estimation under total variation distance and $\ell_2$ distance.
We also provide lower bounds for several other distribution classes, including
product distributions and Gaussian mixtures that are tight up to logarithmic
factors. The technical component of our paper relates coupling between
distributions to the sample complexity of estimation under differential
privacy.
|
In this paper we develop the first algorithms for online submodular
minimization that preserve differential privacy under full information feedback
and bandit feedback. A sequence of $T$ submodular functions over a collection
of $n$ elements arrive online, and at each timestep the algorithm must choose a
subset of $[n]$ before seeing the function. The algorithm incurs a cost equal
to the function evaluated on the chosen set, and seeks to choose a sequence of
sets that achieves low expected regret.
Our first result is in the full information setting, where the algorithm can
observe the entire function after making its decision at each timestep. We give
an algorithm in this setting that is $\epsilon$-differentially private and
achieves expected regret
$\tilde{O}\left(\frac{n^{3/2}\sqrt{T}}{\epsilon}\right)$. This algorithm works
by relaxing submodular function to a convex function using the Lovasz
extension, and then simulating an algorithm for differentially private online
convex optimization.
Our second result is in the bandit setting, where the algorithm can only see
the cost incurred by its chosen set, and does not have access to the entire
function. This setting is significantly more challenging because the algorithm
does not receive enough information to compute the Lovasz extension or its
subgradients. Instead, we construct an unbiased estimate using a single-point
estimation, and then simulate private online convex optimization using this
estimate. Our algorithm using bandit feedback is $\epsilon$-differentially
private and achieves expected regret
$\tilde{O}\left(\frac{n^{3/2}T^{3/4}}{\epsilon}\right)$.
| 0.821469 | 0.800557 | 0.020911 |
2004.06831
|
A Sensitivity Matrix Based Methodology for Inverse Problem Formulation
|
We propose an algorithm to select parameter subset combinations that can be
estimated using an ordinary least-squares (OLS) inverse problem formulation
with a given data set. First, the algorithm selects the parameter combinations
that correspond to sensitivity matrices with full rank. Second, the algorithm
involves uncertainty quantification by using the inverse of the Fisher
Information Matrix. Nominal values of parameters are used to construct
synthetic data sets, and explore the effects of removing certain parameters
from those to be estimated using OLS procedures. We quantify these effects in a
score for a vector parameter defined using the norm of the vector of standard
errors for components of estimates divided by the estimates. In some cases the
method leads to reduction of the standard error for a parameter to less than
1\% of the estimate.
|
We study the bisymmetric nonnegative inverse eigenvalue problem (BNIEP). This
problem is the problem of finding the necessary and sufficient conditions on a
list of $n$ complex numbers to be a spectrum of an $n \times n$ bisymmetric
nonnegative matrix. Most recently, some of the sufficient conditions for the
BNIEP are given by Julio and Soto in 2015. In this article, we give another
proof of one result (Theorem 4.3) in [Julio and Soto, 2015] and we obtain the
result very similar to the one (Theorem 4.2) in [Julio and Soto, 2015] using a
different method to construct our desired bisymmetric nonnegative matrix. We
also give some sufficient conditions for the BNIEP based on the sufficient
conditions for the nonnegative inverse eigenvalue problem (NIEP) given by
Borobia in 1995. We give the condition that is both necessary and sufficient
for the BNIEP when $n \leq 4$ and then we show that for $n = 6$, the BNIEP and
the symmetric nonnegative eigenvalue problem (SNIEP) are different. Moreover,
some sufficient conditions for the bisymmetric positive inverse eigenvalue
problem are provided. Finally, we give a new result on a sufficient condition
for the BNIEP with the prescribed diagonal entries.
| 0.821643 | 0.660259 | 0.161384 |
2004.06832
|
Quantum Algorithms for Estimating Physical Quantities using
Block-Encodings
|
We present quantum algorithms for the estimation of n-time correlation
functions, the local and non-local density of states, and dynamical linear
response functions. These algorithms are all based on block-encodings - a
versatile technique for the manipulation of arbitrary non-unitary matrices on a
quantum computer. We describe how to 'sketch' these quantities via the kernel
polynomial method which is a standard strategy in numerical condensed matter
physics. These algorithms use amplitude estimation to obtain a quadratic
speedup in the accuracy over previous results, can capture any observables and
Hamiltonians presented as linear combinations of Pauli matrices, and are
modular enough to leverage future advances in Hamiltonian simulation and state
preparation.
|
In this paper, we endeavor for predicting the performance of quantized
compressive sensing under the use of sparse reconstruction estimators. We
assume that a high rate vector quantizer is used to encode the noisy
compressive sensing measurement vector. Exploiting a block sparse source model,
we use Gaussian mixture density for modeling the distribution of the source.
This allows us to formulate an optimal rate allocation problem for the vector
quantizer. Considering noisy CS quantized measurements, we analyze upper- and
lower-bounds on reconstruction error performance guarantee of two estimators -
convex relaxation based basis pursuit de-noising estimator and an
oracle-assisted least-squares estimator.
| 0.889006 | 0.724103 | 0.164903 |
2004.06833
|
Alzheimer's Dementia Recognition through Spontaneous Speech: The ADReSS
Challenge
|
The ADReSS Challenge at INTERSPEECH 2020 defines a shared task through which
different approaches to the automated recognition of Alzheimer's dementia based
on spontaneous speech can be compared. ADReSS provides researchers with a
benchmark speech dataset which has been acoustically pre-processed and balanced
in terms of age and gender, defining two cognitive assessment tasks, namely:
the Alzheimer's speech classification task and the neuropsychological score
regression task. In the Alzheimer's speech classification task, ADReSS
challenge participants create models for classifying speech as dementia or
healthy control speech. In the the neuropsychological score regression task,
participants create models to predict mini-mental state examination scores.
This paper describes the ADReSS Challenge in detail and presents a baseline for
both tasks, including a feature extraction procedure and results for a
classification and a regression model. ADReSS aims to provide the speech and
language Alzheimer's research community with a platform for comprehensive
methodological comparisons. This will contribute to addressing the lack of
standardisation that currently affects the field and shed light on avenues for
future research and clinical applicability.
|
This paper addresses challenges of Natural Language Processing (NLP) on
non-canonical multilingual data in which two or more languages are mixed. It
refers to code-switching which has become more popular in our daily life and
therefore obtains an increasing amount of attention from the research
community. We report our experience that cov- ers not only core NLP tasks such
as normalisation, language identification, language modelling, part-of-speech
tagging and dependency parsing but also more downstream ones such as machine
translation and automatic speech recognition. We highlight and discuss the key
problems for each of the tasks with supporting examples from different language
pairs and relevant previous work.
| 0.914568 | 0.692303 | 0.222265 |
2004.06834
|
Classical Coding Approaches to Quantum Applications
|
Quantum information science strives to leverage the quantum-mechanical nature
of our universe in order to achieve large improvements in certain information
processing tasks. In deep-space optical communications, current receivers for
the pure-state classical-quantum channel first measure each qubit channel
output and then classically post-process the measurements. This approach is
sub-optimal. In this dissertation we investigate a recently proposed quantum
algorithm for this task, which is inspired by classical belief-propagation
algorithms, and analyze its performance on a simple $5$-bit code. We show that
the algorithm is optimal for each bit and it appears to achieve optimal
performance when deciding the full transmitted message. We also provide
explicit circuits for the algorithm in terms of standard gates. This suggests a
near-term quantum communication advantage over the aforementioned sub-optimal
scheme.
Quantum error correction is vital to building a universal fault-tolerant
quantum computer. We propose an efficient algorithm that can translate a given
logical Clifford operation on a stabilizer code into all (equivalence classes
of) physical Clifford circuits that realize that operation. In order to achieve
universality, one also needs to implement at least one non-Clifford logical
operation. So, we develop a mathematical framework for a large subset of
diagonal operations in the Clifford hierarchy, which we call Quadratic Form
Diagonal (QFD) gates. Then we use the QFD formalism to characterize all
stabilizer codes whose code spaces are preserved under the transversal action
of the non-Clifford $T$ gates on the physical qubits. We also discuss a few
purely-classical coding problems motivated by transversal $T$ gates. A
conscious effort has been made to keep this dissertation self-contained, by
including necessary background material on quantum information and computation.
|
The surface code scheme for quantum computation features a 2d array of
nearest-neighbor coupled qubits yet claims a threshold error rate approaching
1% (NJoP 9:199, 2007). This result was obtained for the toric code, from which
the surface code is derived, and surpasses all other known codes restricted to
2d nearest-neighbor architectures by several orders of magnitude. We describe
in detail an error correction procedure for the toric and surface codes, which
is based on polynomial-time graph matching techniques and is efficiently
implementable as the classical feed-forward processing step in a real quantum
computer. By direct simulation of this error correction scheme, we determine
the threshold error rates for the two codes (differing only in their boundary
conditions) for both ideal and non-ideal syndrome extraction scenarios. We
verify that the toric code has an asymptotic threshold of p = 15.5% under ideal
syndrome extraction, and p = 7.8 10^-3 for the non-ideal case, in agreement
with prior work. Simulations of the surface code indicate that the threshold is
close to that of the toric code.
| 0.838177 | 0.78628 | 0.051897 |
2004.06835
|
Weak deep priors for seismic imaging
|
Incorporating prior knowledge on model unknowns of interest is essential when
dealing with ill-posed inverse problems due to the nonuniqueness of the
solution and data noise. Unfortunately, it is not trivial to fully describe our
priors in a convenient and analytical way. Parameterizing the unknowns with a
convolutional neural network (CNN), and assuming an uninformative Gaussian
prior on its weights, leads to a variational prior on the output space that
favors "natural" images and excludes noisy artifacts, as long as overfitting is
prevented. This is the so-called deep-prior approach. In seismic imaging,
however, evaluating the forward operator is computationally expensive, and
training a randomly initialized CNN becomes infeasible. We propose, instead, a
weak version of deep priors, which consists of relaxing the requirement that
reflectivity models must lie in the network range, and letting the unknowns
deviate from the network output according to a Gaussian distribution. Finally,
we jointly solve for the reflectivity model and CNN weights. The chief
advantage of this approach is that the updates for the CNN weights do not
involve the modeling operator, and become relatively cheap. Our synthetic
numerical experiments demonstrate that the weak deep prior is more robust with
respect to noise than conventional least-squares imaging approaches, with
roughly twice the computational cost of reverse-time migration, which is the
affordable computational budget in large-scale imaging problems.
|
Geological interpretation of seismic images is a visual task that can be
automated by training neural networks. While neural networks have shown to be
effective at various interpretation tasks, a fundamental challenge is the lack
of labeled data points in the subsurface. For example, the interpolation and
extrapolation of well-based lithology using seismic images relies on a small
number of known labels. Besides well-known data augmentation techniques, as
well as regularization of the network output, we propose and test another
approach to deal with the lack of labels. Non learning-based horizon trackers
work very well in the shallow subsurface where seismic images are of higher
quality and the geological units are roughly layered. We test if these
segmented and shallow units can help train neural networks to predict deeper
geological units that are not layered and flat. We show that knowledge of
shallow geological units helps to predict deeper units when there are only a
few labels for training using a dataset from the Sea of Ireland. We employ
U-net based multi-resolution networks, and we show that these networks can be
described using matrix-vector product notation in a similar fashion as standard
geophysical inverse problems.
| 0.898703 | 0.77036 | 0.128343 |
2004.06836
|
Beamforming and Resource Allocation for Multi-User Full-Duplex Wireless
Powered Communications in IoT Networks
|
For a self-sustaining wireless communication system in Internet-of-Things
(IoT) networks, energy harvesting (EH) can be implemented at each user node as
a constant renewable power supply source. Hence, an investigation into the use
of wireless powered communication network (WPCN) protocols to facilitate
communication between an access point (AP) and multiple mobile users (MUs) is
presented in this paper. The AP has multiple antennas and operates in the
full-duplex (FD) mode. The MUs, on the other hand, have single antennas and
works in the half-duplex (HD) mode. Each MU communicating with the FD-AP is
assigned to one of two groups, based on the time allocation and channel access
for either uplink (UL) or downlink (DL) communication. The channel assignment,
time resource, and power resource allocations are optimized to maximize the UL
weighted sum-rate. The sum-rate optimization problem is found to be non-convex.
Therefore, an iterative algorithm is investigated to optimize the UL weighted
sum-rate of the propose FD-WPCN system. Next, the proposed FD-WPCN algorithm is
modified for a HD-WPCN enabled communication between the AP and multiple MUs.
Extensive simulations are conducted to verify the proposed algorithm for
FD-WPCN and compare its performance with the HD-WPCN counterpart. From the
simulation results, FD-WPCN outperformed HD-WPCN at a low AP transmit
signal-to-noise ratio (SNR) region. The opposite behavior is observed for high
AP transmit SNR due to increasing residual self-interference at the FD-AP.
|
Intelligent reflecting surfaces (IRSs) have received much attention recently
and are envisioned to promote 6G communication networks. In this paper, for
wireless communications aided by IRS units, we formulate optimization problems
for power control under quality of service (QoS) and max-min fair QoS under
three kinds of traffic patterns from a base station (BS) to mobile users (MUs):
unicast, broadcast, and multicast. The optimizations are achieved by jointly
designing the transmit beamforming of the BS and the phase shift matrix of the
IRS. For power control under QoS, existing IRS studies in the literature
address only the unicast setting, whereas no IRS work has considered max-min
fair QoS. Furthermore, we extend our above optimization studies to the novel
settings of multi-antenna mobile users or/and multiple intelligent reflecting
surfaces. For all the above optimizations, we provide detailed analyses to
propose efficient algorithms. To summarize, our paper presents a comprehensive
study of optimization problems involving power control, QoS, and fairness in
wireless networks enhanced by IRSs.
| 0.851586 | 0.7658 | 0.085786 |
2004.06837
|
Fast degradation of the circular flare ribbon on 2014 August 24
|
The separation and elongation motions of solar flare ribbons have extensively
been investigated. The degradation and disappearance of ribbons have rarely
been explored. In this paper, we report our multiwavelength observations of a
C5.5 circular-ribbon flare associated with two jets (jet1 and jet2) on 2014
August 24, focusing on the fast degradation of the outer circular ribbon (CR).
The flare, consisting of a short inner ribbon (IR) and outer CR, was triggered
by the eruption of a minifilament. The brightness of IR and outer CR reached
their maxima simultaneously at $\sim$04:58 UT in all AIA wavelengths.
Subsequently, the short eastern part of CR faded out quickly in 1600 {\AA} but
gradually in EUV wavelengths. The long western part of CR degraded in the
counterclockwise direction and experienced a deceleration. The degradation was
distinctly divided into two phases: phase I with faster apparent speeds
(58$-$69 km s$^{-1}$) and phase II with slower apparent speeds (29$-$35 km
s$^{-1}$). The second phase stopped at $\sim$05:10 UT when the western CR
totally disappeared. Besides the outward propagation of jet1, the jet spire
experienced untwisting motion in the counterclockwise direction during
04:55$-$05:00 UT. We conclude that the event can be explained by the breakout
jet model. The coherent brightenings of the IR and CR at $\sim$04:58 UT may
result from the impulsive interchange reconnection near the null point, whereas
sub-Alfv\'{e}nic slipping motion of the western CR in the counterclockwise
direction indicates the occurrence of slipping magnetic reconnection. Another
possible explanation of the quick disappearance of the hot loops connecting to
the western CR is that they are simply reconnected sequentially without the
need for significant slippage after the null point reconnection.
|
Eruptive flares (EFs) are associated with erupting filaments and, in some
models, filament eruption drives flare reconnection. Recently, however,
observations of a confined flare (CF) have revealed all the hallmarks of an EF
(impulsive phase, flare ribbons, etc.) without the filament eruption itself.
Therefore, if the filament is not primarily responsible for impulsive flare
reconnection, what is? In this Letter, we argue, based on mimimal requirements,
that the plasmoid instability is a strong candidate for explaining the
impulsive phase in the observed CF. We present magnetohydrodynamic simulation
results of the nonlinear development of the plasmoid instability, in a model
active region magnetic field geometry, to strengthen our claim. We also discuss
how the ideas described in this Letter can be generalised to other situations,
including EFs.
| 0.864348 | 0.723307 | 0.141041 |
2004.06838
|
Composite Travel Generative Adversarial Networks for Tabular and
Sequential Population Synthesis
|
Agent-based transportation modelling has become the standard to simulate
travel behaviour, mobility choices and activity preferences using disaggregate
travel demand data for entire populations, data that are not typically readily
available. Various methods have been proposed to synthesize population data for
this purpose. We present a Composite Travel Generative Adversarial Network
(CTGAN), a novel deep generative model to estimate the underlying joint
distribution of a population, that is capable of reconstructing composite
synthetic agents having tabular (e.g. age and sex) as well as sequential
mobility data (e.g. trip trajectory and sequence). The CTGAN model is compared
with other recently proposed methods such as the Variational Autoencoders (VAE)
method, which has shown success in high dimensional tabular population
synthesis. We evaluate the performance of the synthesized outputs based on
distribution similarity, multi-variate correlations and spatio-temporal
metrics. The results show the consistent and accurate generation of synthetic
populations and their tabular and spatially sequential attributes, generated
over varying spatial scales and dimensions.
|
We propose a hybrid controllable image generation method to synthesize
anatomically meaningful 3D+t labeled Cardiac Magnetic Resonance (CMR) images.
Our hybrid method takes the mechanistic 4D eXtended CArdiac Torso (XCAT) heart
model as the anatomical ground truth and synthesizes CMR images via a
data-driven Generative Adversarial Network (GAN). We employ the
state-of-the-art SPatially Adaptive De-normalization (SPADE) technique for
conditional image synthesis to preserve the semantic spatial information of
ground truth anatomy. Using the parameterized motion model of the XCAT heart,
we generate labels for 25 time frames of the heart for one cardiac cycle at 18
locations for the short axis view. Subsequently, realistic images are generated
from these labels, with modality-specific features that are learned from real
CMR image data. We demonstrate that style transfer from another cardiac image
can be accomplished by using a style encoder network. Due to the flexibility of
XCAT in creating new heart models, this approach can result in a realistic
virtual population to address different challenges the medical image analysis
research community is facing such as expensive data collection. Our proposed
method has a great potential to synthesize 4D controllable CMR images with
annotations and adaptable styles to be used in various supervised multi-site,
multi-vendor applications in medical image analysis.
| 0.897662 | 0.69952 | 0.198141 |
2004.06839
|
Energy dependence of the inelasticity in $pp/p\bar{p}$ collisions from
experimental information on charged particle multiplicity distributions
|
The dependence of the inelasticity in terms of the center of mass energy is
studied in the eikonal formalism, which provides connection between elastic and
inelastic channels. Due to the absence of inelasticity experimental datasets,
the present analysis is based on experimental information available on the full
phase space multiplicity distribution covering a large range of energy, namely
30 $<$ $\sqrt{s}$ $\leq$ 1800 GeV. Our results indicate that the decrease of
inelasticity is consequence of minijets production from semihard interactions
arising from the scattering of gluons carrying only a very small fractions of
the momenta from their parent protons. Alternative methods of estimating the
inelasticity are discussed and predictions to the LHC energies are presented.
|
Israel-Stewart's causal theory of dissipative hydrodynamics, with the ADS/CFT
lower limit of shear viscosity to entropy ratio ($\eta/s$=0.08), give
consistent description of a number of experimental observables in Au+Au
collisions at RHIC (c.m. energy $\sqrt{s}$=200 GeV) \cite{Chaudhuri:2008sj}.
Assuming that in Pb+Pb collisions at LHC (c.m. energy $\sqrt{s}$=5.5 TeV),
except for the initial temperature, other parameters of the fluid remain
unchanged, we have predicted for the centrality dependence of multiplicity,
mean $p_T$, $p_T$-spectra, elliptic flow. The central temperature of the fluid
is adjusted to $T_i$=421 MeV such that in a Pb+Pb collision, with participant
number $N_{part}$=350, average charge particle multiplicity is $\sim$ 900 and
is consistent with the experimental trend observed at lower energies. Compare
to Au+Au collisions at RHIC, in Pb+Pb collisions at LHC, on the average,
particle multiplicity increases by a factor of $\sim$1.6, the mean $p_T$ is
increased by $\sim$10% only. The elliptic flow on the other hand decreases by
$\sim$15%.
| 0.856539 | 0.805775 | 0.050764 |
2004.06840
|
On Dissipative Symplectic Integration with Applications to
Gradient-Based Optimization
|
Continuous-time dynamical systems have proved useful in providing conceptual
and quantitative insights into gradient-based optimization. An important
question that arises in this line of work is how to discretize the
continuous-time system in such a way that its stability and rates of
convergence are preserved. In this paper we propose a geometric framework in
which such discretizations can be realized systematically, enabling the
derivation of rate-matching optimization algorithms without the need for a
discrete-time convergence analysis. More specifically, we show that a
generalization of symplectic integrators to dissipative Hamiltonian systems is
able to preserve continuous-time rates of convergence up to a controlled error.
Our arguments rely on a combination of backward-error analysis with fundamental
results from symplectic geometry.
|
We consider the black-box adversarial setting, where the adversary has to
generate adversarial perturbations without access to the target models to
compute gradients. Previous methods tried to approximate the gradient either by
using a transfer gradient of a surrogate white-box model, or based on the query
feedback. However, these methods often suffer from low attack success rates or
poor query efficiency since it is non-trivial to estimate the gradient in a
high-dimensional space with limited information. To address these problems, we
propose a prior-guided random gradient-free (P-RGF) method to improve black-box
adversarial attacks, which takes the advantage of a transfer-based prior and
the query information simultaneously. The transfer-based prior given by the
gradient of a surrogate model is appropriately integrated into our algorithm by
an optimal coefficient derived by a theoretical analysis. Extensive experiments
demonstrate that our method requires much fewer queries to attack black-box
models with higher success rates compared with the alternative state-of-the-art
methods.
| 0.886655 | 0.665293 | 0.221363 |
2004.06841
|
On the Energy Coupling Efficiency of AGN Outbursts in Galaxy Clusters
|
Active galactic nucleus (AGN) jets are believed to be important in solving
the cooling flow problem in the intracluster medium (ICM), while the detailed
mechanism is still in debate. Here we present a systematic study on the energy
coupling efficiency $\eta_{\rm cp}$, the fraction of AGN jet energy transferred
to the ICM. We first estimate the values of $\eta_{\rm cp}$ analytically in two
extreme cases, which are further confirmed and extended with a parameter study
of spherical outbursts in a uniform medium using hydrodynamic simulations. We
find that $\eta_{\rm cp}$ increases from $\sim 0.4$ for a weak isobaric
injection to $\gtrsim 0.8$ for a powerful point injection. For any given
outburst energy, we find two characteristic outburst powers that separate these
two extreme cases. We then investigate the energy coupling efficiency of AGN
jet outbursts in a realistic ICM with hydrodynamic simulations, finding that
jet outbursts are intrinsically different from spherical outbursts. For both
powerful and weak jet outbursts, $\eta_{\rm cp}$ is typically around $0.7-0.9$,
partly due to the non-spherical nature of jet outbursts, which produce
backflows emanating from the hotspots, significantly enhancing the ejecta-ICM
interaction. While for powerful outbursts a dominant fraction of the energy
transferred from the jet to the ICM is dissipated by shocks, shock dissipation
only accounts for $\lesssim 30\%$ of the injected jet energy for weak
outbursts. While both powerful and weak outbursts could efficiently heat
cooling flows, powerful thermal-energy-dominated jets are most effective in
delaying the onset of the central cooling catastrophe.
|
We study molecular outflows in a sample of 45 local galaxies, both star
forming and AGN, primarily by using CO data from the ALMA archive and from the
literature. For a subsample we also compare the molecular outflow with the
ionized and neutral atomic phases. We infer an empirical analytical function
relating the outflow rate simultaneously to the SFR, $L_{\rm AGN}$, and galaxy
stellar mass; this relation is much tighter than the relations with the
individual quantities. The outflow kinetic power shows a larger scatter than in
previous, more biased studies, spanning from 0.1 to 5 per cent of $L_{\rm
AGN}$, while the momentum rate ranges from 1 to 30 times $L_{\rm AGN}/c$,
indicating that these outflows can be both energy-driven, but with a broad
range of coupling efficiencies with the ISM, and radiation pressure-driven. For
about 10 per cent of the objects the outflow energetics significantly exceed
the maximum theoretical values; we interpret these as 'fossil outflows'
resulting from activity of a past strong AGN, which has now faded. We estimate
that, in the stellar mass range probed here ($>$ 10$^{10}~\rm M_{\odot}$), less
than 5 per cent of the outflowing gas escapes the galaxy. The molecular gas
depletion time associated with the outflow can be as short as a few million
years in powerful AGN, however, the total gas (H$_2$+HI) depletion times are
much longer. Altogether, our findings suggest that even AGN-driven outflows
might be relatively ineffective in clearing galaxies of their entire gas
content, although they are likely capable of clearing and quenching the central
region.
| 0.844163 | 0.783377 | 0.060786 |
2004.06842
|
Layered Graph Embedding for Entity Recommendation using Wikipedia in the
Yahoo! Knowledge Graph
|
In this paper, we describe an embedding-based entity recommendation framework
for Wikipedia that organizes Wikipedia into a collection of graphs layered on
top of each other, learns complementary entity representations from their
topology and content, and combines them with a lightweight learning-to-rank
approach to recommend related entities on Wikipedia. Through offline and online
evaluations, we show that the resulting embeddings and recommendations perform
well in terms of quality and user engagement. Balancing simplicity and quality,
this framework provides default entity recommendations for English and other
languages in the Yahoo! Knowledge Graph, which Wikipedia is a core subset of.
|
Knowledge graphs have become a popular formalism for representing entities
and their properties using a graph data model, e.g., the Resource Description
Framework (RDF). An RDF graph comprises entities of the same type connected to
objects or other entities using labeled edges annotated with properties. RDF
graphs usually contain entities that share the same objects in a certain group
of properties, i.e., they match star patterns composed of these properties and
objects. In case the number of these entities or properties in these star
patterns is large, the size of the RDF graph and query processing are
negatively impacted; we refer these star patterns as frequent star patterns. We
address the problem of identifying frequent star patterns in RDF graphs and
devise the concept of factorized RDF graphs, which denote compact
representations of RDF graphs where the number of frequent star patterns is
minimized. We also develop computational methods to identify frequent star
patterns and generate a factorized RDF graph, where compact RDF molecules
replace frequent star patterns. A compact RDF molecule of a frequent star
pattern denotes an RDF subgraph that instantiates the corresponding star
pattern. Instead of having all the entities matching the original frequent star
pattern, a surrogate entity is added and related to the properties of the
frequent star pattern; it is linked to the entities that originally match the
frequent star pattern. We evaluate the performance of our factorization
techniques on several RDF graph benchmarks and compare with a baseline built on
top of gSpan, a state-of-the-art algorithm to detect frequent patterns. The
outcomes evidence the efficiency of proposed approach and show that our
techniques are able to reduce execution time of the baseline approach in at
least three orders of magnitude reducing the RDF graph size by up to 66.56%.
| 0.937794 | 0.743286 | 0.194508 |
2004.06843
|
Bayesian differential programming for robust systems identification
under uncertainty
|
This paper presents a machine learning framework for Bayesian systems
identification from noisy, sparse and irregular observations of nonlinear
dynamical systems. The proposed method takes advantage of recent developments
in differentiable programming to propagate gradient information through
ordinary differential equation solvers and perform Bayesian inference with
respect to unknown model parameters using Hamiltonian Monte Carlo. This allows
us to efficiently infer posterior distributions over plausible models with
quantified uncertainty, while the use of sparsity-promoting priors enables the
discovery of interpretable and parsimonious representations for the underlying
latent dynamics. A series of numerical studies is presented to demonstrate the
effectiveness of the proposed methods including nonlinear oscillators,
predator-prey systems, chaotic dynamics and systems biology. Taken all
together, our findings put forth a novel, flexible and robust workflow for
data-driven model discovery under uncertainty.
|
This paper proposes a new approach to analyze and design distributed robust
consensus control protocols for general linear leaderless multi-agent systems
(MASs) in presence of relative-state constraints or uncertainties. First, we
show that the MAS robust consensus under relative-state constraints or
uncertainties is equivalent to the robust stability under state constraints or
uncertainties of a transformed MAS. Next, the transformed MAS under state
constraints or uncertainties is reformulated as a network of Lur'e systems. By
employing S-procedure, Lyapunov theory, and Lasalle's invariance principle, a
sufficient condition for robust consensus and the design of robust consensus
controller gain are derived from solutions of a distributed LMI convex problem.
Finally, numerical examples are introduced to illustrate the effectiveness of
the proposed theoretical approach.
| 0.81877 | 0.681503 | 0.137266 |
2004.06844
|
New limits on neutrino decay from the Glashow resonance of high-energy
cosmic neutrinos
|
Discovering neutrino decay would be strong evidence of physics beyond the
Standard Model. Presently, there are only lax lower limits on the lifetime
$\tau$ of neutrinos, of $\tau/m \sim 10^{-3}$ s eV$^{-1}$ or worse, where $m$
is the unknown neutrino mass. High-energy cosmic neutrinos, with TeV-PeV
energies, offer superior sensitivity to decay due to their cosmological-scale
baselines. To tap into it, we employ a promising method, recently proposed,
that uses the Glashow resonance $\bar{\nu}_e + e \to W$, triggered by
$\bar{\nu}_e$ of 6.3 PeV, to test decay with only a handful of detected events.
If most of the $\nu_1$ and $\nu_2$ decay into $\nu_3$ en route to Earth, no
Glashow resonance would occur in neutrino telescopes, because the remaining
$\nu_3$ have only a tiny electron-flavor content. We turn this around and use
the recent first detection of a Glashow resonance candidate in IceCube to place
new lower limits on the lifetimes of $\nu_1$ and $\nu_2$. For $\nu_2$, our
limit is the current best. For $\nu_1$, our limit is close to the current best
and, with the imminent detection of a second Glashow resonance, will vastly
surpass it.
|
The flux of cosmic rays beyond the GZK cutoff ($\sim 10^{20}$ eV) may be
explained through their production by ultra high energy cosmic neutrinos,
annihilating on the relic neutrino background, in the vicinity of our galaxy.
This process is mediated through the production of a $Z$ boson at resonance,
and is generally known as the $Z$-Burst mechanism. We show that a similar
mechanism can also contribute to the super-GZK spectrum at even higher,
ultra-GZK energies, where the particles produced at resonance are the
Kaluza-Klein gravitons of weak scale mass and coupling from the Randall-Sundrum
(RS) hierarchy model of localized gravity model. We call this mechanism
Gravi-Burst. We discuss the parameter space of relevance to Gravi-Bursts, and
comment on the possibility of its contribution to the present and future
super-GZK cosmic ray data and place bounds on the RS model parameters. Under
certain assumptions about the energy spectrum of the primary neutrinos we find
that cosmic ray data could be potentially as powerful as the LHC in probing the
RS model.
| 0.927206 | 0.811738 | 0.115468 |
2004.06845
|
A Dual-Band Radio Observation of FRB 121102 with the Deep Space Network
and the Detection of Multiple Bursts
|
The spectra of repeating fast radio bursts (FRBs) are complex and
time-variable, sometimes peaking within the observing band and showing a
fractional emission bandwidth of about 10-30%. These spectral features may
provide insight into the emission mechanism of repeating fast radio bursts, or
they could possibly be explained by extrinsic propagation effects in the local
environment. Broadband observations can better quantify this behavior and help
to distinguish between intrinsic and extrinsic effects. We present results from
a simultaneous 2.25 and 8.36 GHz observation of the repeating FRB 121102 using
the 70 m Deep Space Network (DSN) radio telescope, DSS-43. During the 5.7 hr
continuous observing session, we detected 6 bursts from FRB 121102, which were
visible in the 2.25 GHz frequency band. However, none of these bursts were
detected in the 8.36 GHz band, despite the larger bandwidth and greater
sensitivity in the higher-frequency band. This effect is not explainable by
Galactic scintillation and, along with previous multi-band experiments, clearly
demonstrates that apparent burst activity depends strongly on the radio
frequency band that is being observed.
|
Fast Radio Bursts have recently been used to place limits on Einstein's
Equivalence Principle via observations of time delays between photons of
different radio frequencies by \citet{wei15}. These limits on differential
post-Newtonian parameters ($\Delta \gamma<2.52\times10^{-8}$) are the best yet
achieved but still rely on uncertain assumptions, namely the relative
contributions of dispersion and gravitational delays to the observed time
delays and the distances to FRBs. Also very recently, the first FRB host galaxy
has likely been identified, providing the first redshift-based distance
estimate to FRB 150418 \citep{kea16}. Moreover, consistency between the
\omegaigm\ estimate from FRB 150418 and \omegaigm~expected from $\Lambda$CDM
models and WMAP observations leads one to conclude that the observed time delay
for FRB 150418 is highly dominated by dispersion, with any gravitational delays
small contributors. This points to even tighter limits on $\Delta \gamma$. In
this paper, the technique of \citet{wei15} is applied to FRB 150418 to produce
a limit of $\Delta \gamma < 1 - 2\times10^{-9}$, approximately an order of
magnitude better than previous limits and in line with expectations by
\citet{wei15} for what could be achieved if the dispersive delay is separated
from other effects. Future substantial improvements in such limits will depend
on accurately determining the contribution of individual ionized components to
the total observed time delays for FRBs.
| 0.841488 | 0.722278 | 0.11921 |
2004.06846
|
MxPool: Multiplex Pooling for Hierarchical Graph Representation Learning
|
How to utilize deep learning methods for graph classification tasks has
attracted considerable research attention in the past few years. Regarding
graph classification tasks, the graphs to be classified may have various graph
sizes (i.e., different number of nodes and edges) and have various graph
properties (e.g., average node degree, diameter, and clustering coefficient).
The diverse property of graphs has imposed significant challenges on existing
graph learning techniques since diverse graphs have different best-fit
hyperparameters. It is difficult to learn graph features from a set of diverse
graphs by a unified graph neural network. This motivates us to use a multiplex
structure in a diverse way and utilize a priori properties of graphs to guide
the learning. In this paper, we propose MxPool, which concurrently uses
multiple graph convolution/pooling networks to build a hierarchical learning
structure for graph representation learning tasks. Our experiments on numerous
graph classification benchmarks show that our MxPool has superiority over other
state-of-the-art graph representation learning methods.
|
Real-world data is often times associated with irregular structures that can
analytically be represented as graphs. Having access to this graph, which is
sometimes trivially evident from domain knowledge, provides a better
representation of the data and facilitates various information processing
tasks. However, in cases where the underlying graph is unavailable, it needs to
be learned from the data itself for data representation, data processing and
inference purposes. Existing literature on learning graphs from data has mostly
considered arbitrary graphs, whereas the graphs generating real-world data tend
to have additional structure that can be incorporated in the graph learning
procedure. Structure-aware graph learning methods require learning fewer
parameters and have the potential to reduce computational, memory and sample
complexities. In light of this, the focus of this paper is to devise a method
to learn structured graphs from data that are given in the form of product
graphs. Product graphs arise naturally in many real-world datasets and provide
an efficient and compact representation of large-scale graphs through several
smaller factor graphs. To this end, first the graph learning problem is posed
as a linear program, which (on average) outperforms the state-of-the-art graph
learning algorithms. This formulation is of independent interest itself as it
shows that graph learning is possible through a simple linear program.
Afterwards, an alternating minimization-based algorithm aimed at learning
various types of product graphs is proposed, and local convergence guarantees
to the true solution are established for this algorithm. Finally the
performance gains, reduced sample complexity, and inference capabilities of the
proposed algorithm over existing methods are also validated through numerical
simulations on synthetic and real datasets.
| 0.891333 | 0.762161 | 0.129172 |
2004.06847
|
Dp-minimal expansions of $(\mathbb{Z},+)$ via dense pairs via
Mordell-Lang
|
This is a contribution to the classification problem for dp-minimal
expansions of $(\mathbb{Z},+)$. Let $S$ be a dense cyclic group order on
$(\mathbb{Z},+)$. We use results on "dense pairs" to construct uncountably many
dp-minimal expansions of $(\mathbb{Z},+,S)$. These constructions are
applications of the Mordell-Lang conjecture and are the first examples of
"non-modular" dp-minimal expansions of $(\mathbb{Z},+)$. We canonically
associate an o-minimal expansion $\mathcal{R}$ of $(\mathbb{R},+,\times)$, an
$\mathcal{R}$-definable circle group $\mathbb{H}$, and a character $\mathbb{Z}
\to \mathbb{H}$ to a "non-modular" dp-minimal expansion of $(\mathbb{Z},+,S)$.
We also construct a "non-modular" dp-minimal expansion of
$(\mathbb{Z},+,\mathrm{Val}_p)$ from the character $\mathbb{Z} \to
\mathbb{Z}^\times_p$, $k \mapsto \mathrm{exp}(pk)$.
|
We consider a directed polymer model in dimension $1+1$, where the disorder
is given by the occupation field of a Poisson system of independent random
walks on $\mathbb Z$. In a suitable continuum and weak disorder limit, we show
that the family of quenched partition functions of the directed polymer
converges to the Stratonovich solution of a multiplicative stochastic heat
equation (SHE) with a Gaussian noise, whose space-time covariance is given by
the heat kernel.
In contrast to the case with space-time white noise where the solution of the
SHE admits a Wiener-It\^{o} chaos expansion, we establish an $L^1$-convergent
chaos expansions of iterated integrals generated by Picard iterations. Using
this expansion and its discrete counterpart for the polymer partition
functions, the convergence of the terms in the expansion is proved via
functional analytic arguments and heat kernel estimates. The Poisson random
walk system is amenable to careful moment analysis, which is an important input
to our arguments.
| 0.916245 | 0.702499 | 0.213746 |
2004.06848
|
Intuitive, Interactive Beard and Hair Synthesis with Generative Models
|
We present an interactive approach to synthesizing realistic variations in
facial hair in images, ranging from subtle edits to existing hair to the
addition of complex and challenging hair in images of clean-shaven subjects. To
circumvent the tedious and computationally expensive tasks of modeling,
rendering and compositing the 3D geometry of the target hairstyle using the
traditional graphics pipeline, we employ a neural network pipeline that
synthesizes realistic and detailed images of facial hair directly in the target
image in under one second. The synthesis is controlled by simple and sparse
guide strokes from the user defining the general structural and color
properties of the target hairstyle. We qualitatively and quantitatively
evaluate our chosen method compared to several alternative approaches. We show
compelling interactive editing results with a prototype user interface that
allows novice users to progressively refine the generated image to match their
desired hairstyle, and demonstrate that our approach also allows for flexible
and high-fidelity scalp hair synthesis.
|
As a sub-domain of text-to-image synthesis, text-to-face generation has huge
potentials in public safety domain. With lack of dataset, there are almost no
related research focusing on text-to-face synthesis. In this paper, we propose
a fully-trained Generative Adversarial Network (FTGAN) that trains the text
encoder and image decoder at the same time for fine-grained text-to-face
generation. With a novel fully-trained generative network, FTGAN can synthesize
higher-quality images and urge the outputs of the FTGAN are more relevant to
the input sentences. In addition, we build a dataset called SCU-Text2face for
text-to-face synthesis. Through extensive experiments, the FTGAN shows its
superiority in boosting both generated images' quality and similarity to the
input descriptions. The proposed FTGAN outperforms the previous state of the
art, boosting the best reported Inception Score to 4.63 on the CUB dataset. On
SCU-text2face, the face images generated by our proposed FTGAN just based on
the input descriptions is of average 59% similarity to the ground-truth, which
set a baseline for text-to-face synthesis.
| 0.893643 | 0.691006 | 0.202637 |
2004.06849
|
Weak semi-greedy bases and the equivalence between semi-greedy, branch
semi-greedy, and almost greedy Markushevich bases in Banach spaces
|
We introduce and study the notion of weak semi-greedy systems -which is
inspired in the concepts of semi-greedy and Branch semi-greedy systems and weak
thresholding sets-, and prove that in the context Markushevich bases in
infinite dimensional Banach spaces, the notions of \textit{ semi-greedy, branch
semi-greedy, weak semi-greedy, and almost greedy} Markushevich bases are all
equivalent. This completes and extends some results from \cite{Berna2019},
\cite{Dilworth2003b}, and \cite{Dilworth2012}. We also exhibit an example of a
semi-greedy system that is neither almost greedy nor a Markushevich basis,
showing that the Markushevich condition cannot be dropped from the equivalence
result. In some cases, we obtain improved upper bounds for the corresponding
constants of the systems.
|
We propose a streaming submodular maximization algorithm "stream clipper"
that performs as well as the offline greedy algorithm on document/video
summarization in practice. It adds elements from a stream either to a solution
set $S$ or to an extra buffer $B$ based on two adaptive thresholds, and
improves $S$ by a final greedy step that starts from $S$ adding elements from
$B$. During this process, swapping elements out of $S$ can occur if doing so
yields improvements. The thresholds adapt based on if current memory
utilization exceeds a budget, e.g., it increases the lower threshold, and
removes from the buffer $B$ elements below the new lower threshold. We show
that, while our approximation factor in the worst case is $1/2$ (like in
previous work, and corresponding to the tight bound), we show that there are
data-dependent conditions where our bound falls within the range $[1/2,
1-1/e]$. In news and video summarization experiments, the algorithm
consistently outperforms other streaming methods, and, while using
significantly less computation and memory, performs similarly to the offline
greedy algorithm.
| 0.955297 | 0.673459 | 0.281838 |
2004.06850
|
Asymptotics for the electric field concentration in the perfect
conductivity problem
|
In the perfect conductivity problem of composite material, the electric field
concentrates in a narrow region in between two inclusions and always becomes
arbitrarily large when the distance between inclusions tends to zero. To
characterize such singular behavior, we capture the leading term of the
gradient and reveal that the blow-up rates are determined by their relative
convexity of the two adjacent inclusions. On the other hand, a blow-up factor,
which is a linear functional of boundary data, is found to determine the
blow-up will occur or not.
|
We study the electrical conductivity in a nodal-line semimetal with charged
impurities. The screening of the Coulomb potential in this system is
qualitatively different from what is found in conventional metals or
semiconductors, with the screened potential $\phi$ decaying as $\phi \propto
1/r^2$ over a wide interval of distances $r$. This unusual screening gives rise
to a rich variety of conduction regimes as a function of temperature, doping
level and impurity concentration. In particular, nodal-line semimetals exhibit
a diverging mobility $\propto 1/|\mu|$ in the limit of vanishing chemical
potential $\mu$, a linearly-increasing dependence of the conductivity on
temperature, $\sigma \propto T$, and a large weak-localization correction with
a strongly anisotropic dependence on magnetic field.
| 0.847315 | 0.738959 | 0.108356 |
2004.06851
|
Role of instability on the limits of laterally strained detonation waves
|
The present work examines the role of instability and diffusive phenomena in
controlling the limits of detonations subject to lateral strain rates.
Experiments were conducted in hydrocarbon-oxygen mixtures with varying levels
of cellular instability. These detonations were propagated in channels with
exponentially enlarging cross-sections, following the recent works of Radulescu
\& Borzou (2018) and Xiao \& Radulescu (2020). Steady detonation waves were
obtained at the macro-scale, with the near-limit reaction zone structures
characterized by significant unreacted gas pockets. The turbulent flame burning
velocity of these pockets was evaluated to be 30 m/s to 70 m/s, which is larger
than the theoretical laminar value by a factor of 2 to 7. For all the mixtures
tested, the characteristic $D-K$ relationships, relating the detonation mean
propagation speed with lateral flow divergence, were obtained directly from
experiments and as well from the generalized ZND model with lateral strain
rates using the detailed chemical kinetics. The results showed that the degree
of departures between experiments and the theoretical predictions increases
significantly with the detonation instability level. As compared to the laminar
ZND wave, the more unstable detonations are much more detonable than the more
stable detonations, with substantially larger limiting divergence rates and
maximum velocity deficits. Such enhanced detonability with detonation
instability can be manifested in the significantly enhanced global rates of
energy release with the notably suppressed thermal character of ignition for
the more unstable detonations. This globally enhanced burning mechanism is
found to be realized by the intensified auto-ignition assisted by the turbulent
diffusive burning of the unreacted gas pockets, substantially shortening the
characteristic reaction zone lengths.
|
Small amplitude inhomogeneous plane waves are studied as they propagate on
the free surface of a predeformed semi-infinite body made of Bell constrained
material. The predeformation corresponds to a finite static pure homogeneous
strain. The surface wave propagates in a principal direction of strain and is
attenuated in another principal direction, orthogonal to the free surface. For
these waves, the secular equation giving the speed of propagation is
established by the method of first integrals. This equation is not the same as
the secular equation for incompressible half-spaces, even though the Bell
constraint and the incompressibility constraint coincide in the isotropic
infinitesimal limit.
| 0.863321 | 0.732133 | 0.131187 |
2004.06852
|
On a Generalization of Strongly $\eta$-Convex Functions via Fractal Sets
|
The purpose of this paper is to study a generalization of strongly
$\eta$-convex functions using the fractal calculus developed by Yang
\cite{Yang}, namely generalized strongly $\eta$-convex function. Among other
results, we obtain some Hermite-Hadamard and Fej\'er type inequalities for this
class of functions.
|
In this paper we have generalized the notion of $\lambda$-radial contraction
in complete Riemannian manifold and developed the concept of $p^\lambda$-convex
function. We have also given a counter example proving the fact that in general
$\lambda$-radial contraction of a geodesic is not necessarily a geodesic. We
have also deduced some relations between geodesic convex sets and
$p^\lambda$-convex sets and showed that under certain conditions they are
equivalent.
| 0.94161 | 0.756609 | 0.185001 |
2004.06853
|
Mosaic Super-resolution via Sequential Feature Pyramid Networks
|
Advances in the design of multi-spectral cameras have led to great interests
in a wide range of applications, from astronomy to autonomous driving. However,
such cameras inherently suffer from a trade-off between the spatial and
spectral resolution. In this paper, we propose to address this limitation by
introducing a novel method to carry out super-resolution on raw mosaic images,
multi-spectral or RGB Bayer, captured by modern real-time single-shot mosaic
sensors. To this end, we design a deep super-resolution architecture that
benefits from a sequential feature pyramid along the depth of the network.
This, in fact, is achieved by utilizing a convolutional LSTM (ConvLSTM) to
learn the inter-dependencies between features at different receptive fields.
Additionally, by investigating the effect of different attention mechanisms in
our framework, we show that a ConvLSTM inspired module is able to provide
superior attention in our context. Our extensive experiments and analyses
evidence that our approach yields significant super-resolution quality,
outperforming current state-of-the-art mosaic super-resolution methods on both
Bayer and multi-spectral images. Additionally, to the best of our knowledge,
our method is the first specialized method to super-resolve mosaic images,
whether it be multi-spectral or Bayer.
|
We present a deep learning framework based on a generative adversarial
network (GAN) to perform super-resolution in coherent imaging systems. We
demonstrate that this framework can enhance the resolution of both pixel
size-limited and diffraction-limited coherent imaging systems. We
experimentally validated the capabilities of this deep learning-based coherent
imaging approach by super-resolving complex images acquired using a lensfree
on-chip holographic microscope, the resolution of which was pixel size-limited.
Using the same GAN-based approach, we also improved the resolution of a
lens-based holographic imaging system that was limited in resolution by the
numerical aperture of its objective lens. This deep learning-based
super-resolution framework can be broadly applied to enhance the
space-bandwidth product of coherent imaging systems using image data and
convolutional neural networks, and provides a rapid, non-iterative method for
solving inverse image reconstruction or enhancement problems in optics.
| 0.866018 | 0.779915 | 0.086103 |
2004.06854
|
Some characterisations of $\Sigma$-pure-injective objects in compactly
generated triangulated categories
|
We provide various ways to characterise $\Sigma$-pure-injective objects in a
compactly generated triangulated category. These characterisations mimic
analogous well-known results from the model theory of modules. The proof of our
main result involves two approaches. The first approach is to adapt arguments
from the module-theoretic setting, by replacing the one-sorted language of
modules over a fixed ring with a certain many-sorted language. Here we use a
restriction of the Yoneda embedding, which associates to each object a
corresponding many-sorted structure. The second approach is to translate
statements from triangulated categories to locally coherent Grothendieck
categories via this embedding, and then use results about injective objects in
this setting. By combining these approaches, we highlight a connection between
pp-definable subgroups a particular sort with certain annihilator subobjects of
the generators of the functor category, which appears to be new.
|
For each object in a tensor triangulated category, we construct a natural
continuous map from the object's support---a closed subset of the category's
triangular spectrum---to the Zariski spectrum of a certain commutative ring of
endomorphisms. When applied to the unit object this recovers a construction of
P. Balmer. These maps provide an iterative approach for understanding the
spectrum of a tensor triangulated category by starting with the comparison map
for the unit object and iteratively analyzing the fibers of this map via
"higher" comparison maps. We illustrate this approach for the stable homotopy
category of finite spectra. In fact, the same underlying construction produces
a whole collection of new comparison maps, including maps associated to (and
defined on) each closed subset of the triangular spectrum. These latter maps
provide an alternative strategy for analyzing the spectrum by iteratively
building a filtration of closed subsets by pulling back filtrations of affine
schemes.
| 0.917089 | 0.825314 | 0.091775 |
2004.06855
|
$C^r$-Closing lemma for partially hyperbolic diffeomorphisms with
one-dimensional center bundle
|
For every $r\in\mathbb{N}_{\geq2}\cup\{\infty\}$, we prove the $C^r$-closing
lemma for general and conservative partially hyperbolic diffeomorphisms with
one-dimensional center bundle.
|
We study bifurcations of invariant graphs in skew product dynamical systems
driven by hyperbolic surface maps T like Anosov surface diffeomorphisms or
baker maps and with one-dimensional concave fibre maps under multiplicative
forcing when the forcing is scaled by a parameter r=e^{-t}. For a range of
parameters two invariant graphs (a trivial and a non-trivial one) coexist, and
we use thermodynamic formalism to characterize the parameter dependence of the
Hausdorff and packing dimension of the set of points where both graphs
coincide. As a corollary we characterize the parameter dependence of the
dimension of the global attractor A_t: Hausdorff and packing dimension have a
common value dim(A_t), and there is a critical parameter t_c determined by the
SRB measure of T^{-1} such that dim(A_t)=3 for t < t_c and t --> dim(A_t) is
strictly decreasing for t_c < t < t_{max}.
| 0.968877 | 0.784643 | 0.184235 |
2004.06856
|
Combining Geometric and Information-Theoretic Approaches for Multi-Robot
Exploration
|
We present an algorithm to explore an orthogonal polygon using a team of $p$
robots. This algorithm combines ideas from information-theoretic exploration
algorithms and computational geometry based exploration algorithms. We show
that the exploration time of our algorithm is competitive (as a function of
$p$) with respect to the offline optimal exploration algorithm. The algorithm
is based on a single-robot polygon exploration algorithm, a tree exploration
algorithm for higher level planning and a submodular orienteering algorithm for
lower level planning. We discuss how this strategy can be adapted to real-world
settings to deal with noisy sensors. In addition to theoretical analysis, we
investigate the performance of our algorithm through simulations for multiple
robots and experiments with a single robot.
|
We study the computational complexity of optimally solving multi-robot path
planning problems on planar graphs. For four common time- and distance-based
objectives, we show that the associated path optimization problems for multiple
robots are all NP-complete, even when the underlying graph is planar.
Establishing the computational intractability of optimal multi-robot path
planning problems on planar graphs has important practical implications. In
particular, our result suggests the preferred approach toward solving such
problems, when the number of robots is large, is to augment the planar
environment to reduce the sharing of paths among robots traveling in opposite
directions on those paths. Indeed, such efficiency boosting structures, such as
highways and elevated intersections, are ubiquitous in robotics and
transportation applications.
| 0.863467 | 0.792602 | 0.070865 |
2004.06857
|
A parsimonious family of multivariate Poisson-lognormal distributions
for clustering multivariate count data
|
Multivariate count data are commonly encountered through high-throughput
sequencing technologies in bioinformatics, text mining, or in sports analytics.
Although the Poisson distribution seems a natural fit to these count data, its
multivariate extension is computationally expensive.In most cases mutual
independence among the variables is assumed, however this fails to take into
account the correlation among the variables usually observed in the data.
Recently, mixtures of multivariate Poisson-lognormal (MPLN) models have been
used to analyze such multivariate count measurements with a dependence
structure. In the MPLN model, each count is modeled using an independent
Poisson distribution conditional on a latent multivariate Gaussian variable.
Due to this hierarchical structure, the MPLN model can account for
over-dispersion as opposed to the traditional Poisson distribution and allows
for correlation between the variables. Rather than relying on a Monte
Carlo-based estimation framework which is computationally inefficient, a fast
variational-EM based framework is used here for parameter estimation. Further,
a parsimonious family of mixtures of Poisson-lognormal distributions are
proposed by decomposing the covariance matrix and imposing constraints on these
decompositions. Utility of such models is shown using simulated and benchmark
datasets.
|
Extreme values modeling has attracting the attention of researchers in
diverse areas such as the environment, engineering, or finance. Multivariate
extreme value distributions are particularly suitable to model the tails of
multidimensional phenomena. The analysis of the dependence among multivariate
maxima is useful to evaluate risk. Here we present new multivariate extreme
value models, as well as, coefficients to assess multivariate extremal
dependence.
| 0.871358 | 0.732285 | 0.139073 |
2004.06858
|
Quadrupedal Locomotion via Event-Based Predictive Control and QP-Based
Virtual Constraints
|
This paper aims to develop a hierarchical nonlinear control algorithm, based
on model predictive control (MPC), quadratic programming (QP), and virtual
constraints, to generate and stabilize locomotion patterns in a real-time
manner for dynamical models of quadrupedal robots. The higher level of the
proposed control scheme is developed based on an event-based MPC that computes
the optimal center of mass (COM) trajectories for a reduced-order linear
inverted pendulum (LIP) model subject to the feasibility of the net ground
reaction force (GRF). The asymptotic stability of the desired target point for
the reduced-order model under the event-based MPC approach is investigated. It
is shown that the event-based nature of the proposed MPC approach can
significantly reduce the computational burden associated with the real-time
implementation of MPC techniques. To bridge the gap between reduced- and
full-order models, QP-based virtual constraint controllers are developed at the
lower level of the proposed control scheme to impose the full-order dynamics to
track the optimal trajectories while having all individual GRFs in the friction
cone. The analytical results of the paper are numerically confirmed on
full-order simulation models of a 22 degree of freedom quadrupedal robot,
Vision 60, that is augmented by a robotic manipulator. The paper numerically
investigates the robustness of the proposed control algorithm against different
contact models.
|
For many tasks, predictive path-following control can significantly improve
the performance and robustness of autonomous robots over traditional trajectory
tracking control. It does this by prioritizing closeness to the path over timed
progress along the path and by looking ahead to account for changes in the
path. We propose a novel predictive path-following approach that couples
feedforward linearization with path-based model predictive control. Our
approach has a few key advantages. By utilizing the differential flatness
property, we reduce the path-based model predictive control problem from a
nonlinear to a convex optimization problem. Robustness to disturbances is
achieved by a dynamic path reference, which adjusts its speed based on the
robot's progress. We also account for key system constraints. We demonstrate
these advantages in experiment on a quadrotor. We show improved performance
over a baseline trajectory tracking controller by keeping the quadrotor closer
to the desired path under nominal conditions, with an initial offset and under
a wind disturbance.
| 0.854837 | 0.771617 | 0.083219 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.