id
stringlengths 5
16
| query
stringlengths 1
382
| pos
stringlengths 7
5.09k
| neg
stringlengths 23
5.09k
| qp
float64 0.4
1
| qn
float64 0.34
0.91
| margin
float64 0.02
0.3
|
---|---|---|---|---|---|---|
2004.06859
|
No consistent atmospheric absorption detected for the ultra-hot Jupiter
WASP-189 b
|
We observed a partial transit of the ultra-hot Jupiter WASP-189 b with PEPSI
on the LBT. We detect a highly variable transit signal in multiple atomic
transitions, including H-alpha, Fe I, and Mg I. The signal is not consistent
with a transiting planetary atmosphere. We suggest instead that the in-transit
signal is due to an inhomogeneous stellar surface. Our observations demonstrate
the lack of a highly extended atmosphere in common optical atomic tracers.
Although WASP-189 is very bright, atmospheric characterization of the planet
will be difficult due to the small transit depth and apparently compact
atmosphere.
|
Polarimetry is a novel tool to detect and characterize exoplanets and their
atmospheres. Polarized scattered light from the non-transiting hot Jupiter
$\upsilon$~And~b is measured to further constrain its orbit, mass, density, and
geometrical albedo. We obtained polarimetric measurements in the $UBV$ bands
over the orbital period and deduce an average peak-to-peak amplitude of $(49
\pm 5)\times10^{-6}$ in both Stokes $q$ and $u$. From our data we evaluate the
orbit inclination $i=111\degr\pm11\degr$, longitude of the ascending node
$\Omega=236\degr\pm12\degr$ (or equivalently 56\degr), the effective size of
the scattering atmosphere in the optical blue of $1.36\pm0.20$\,$R_{\rm J}$.
These combined with spectroscopic measurements result in the planet mass
$0.74\pm0.07$\,$M_{\rm J}$, mean density $0.36\pm0.08$\,g\,cm$^{-3}$, and
surface gravity $\sim10^3$\,cm\,s$^{-2}$, which favor a close similarity of
$\upsilon$~And~b to other inflated hot Jupiters. We also significantly improved
the periastron epoch $T_{\rm p}={\rm JD}2,450,032.451$, interior conjunction
epoch $T_{\rm t}={\rm JD}2,450,034.668$, and periastron longitude
$\omega=279\degr\pm14\degr$. The latter indicates that the apsidal resonance
known for planets c and d includes also planet b.
Obtained limits on the wavelength dependent geometrical albedo (average 0.35)
indicate its similarity to Neptune with peak reflectivity in the blue.
Combining all available measurements at various passbands, we construct a
unified wavelength dependent albedo of an average hot Jupiter. It appears to be
largely shaped by Rayleigh scattering in the blue and atomic and molecular
absorption in the optical and near infrared. Our findings demonstrate the power
of polarimetry for studying non-transiting exoplanets.
| 0.85323 | 0.73998 | 0.11325 |
2004.06860
|
A Practical Blockchain Framework using Image Hashing for Image
Authentication
|
Blockchain is a relatively new technology that can be seen as a decentralised
database. Blockchain systems heavily rely on cryptographic hash functions to
store their data, which makes it difficult to tamper with any data stored in
the system. A topic that was researched along with blockchain is image
authentication. Image authentication focuses on investigating and maintaining
the integrity of images. As a blockchain system can be useful for maintaining
data integrity, image authentication has the potential to be enhanced by
blockchain. There are many techniques that can be used to authenticate images;
the technique investigated by this work is image hashing. Image hashing is a
technique used to calculate how similar two different images are. This is done
by converting the images into hashes and then comparing them using a distance
formula. To investigate the topic, an experiment involving a simulated
blockchain was created. The blockchain acted as a database for images. This
blockchain was made up of devices which contained their own unique image
hashing algorithms. The blockchain was tested by creating modified copies of
the images contained in the database, and then submitting them to the
blockchain to see if it will return the original image. Through this experiment
it was discovered that it is plausible to create an image authentication system
using blockchain and image hashing. However, the design proposed by this work
requires refinement, as it appears to struggle in some situations. This work
shows that blockchain can be a suitable approach for authenticating images,
particularly via image hashing. Other observations include that using multiple
image hash algorithms at the same time can increase performance in some cases,
as well as that each type of test done to the blockchain has its own unique
pattern to its data.
|
We address the problem of shoulder-surfing attacks on authentication schemes
by proposing IllusionPIN (IPIN), a PIN-based authentication method that
operates on touchscreen devices. IPIN uses the technique of hybrid images to
blend two keypads with different digit orderings in such a way, that the user
who is close to the device is seeing one keypad to enter her PIN, while the
attacker who is looking at the device from a bigger distance is seeing only the
other keypad. The user's keypad is shuffled in every authentication attempt
since the attacker may memorize the spatial arrangement of the pressed digits.
To reason about the security of IllusionPIN, we developed an algorithm which
is based on human visual perception and estimates the minimum distance from
which an observer is unable to interpret the keypad of the user. We tested our
estimations with 84 simulated shoulder-surfing attacks from 21 different
people. None of the attacks was successful against our estimations. In
addition, we estimated the minimum distance from which a camera is unable to
capture the visual information from the keypad of the user. Based on our
analysis, it seems practically almost impossible for a surveillance camera to
capture the PIN of a smartphone user when IPIN is in use.
| 0.916067 | 0.741191 | 0.174876 |
2004.06861
|
HODET: Hybrid Object DEtection and Tracking using mmWave Radar and
Visual Sensors
|
Image sensors have been explored heavily in automotive applications for
collision avoidance and varying levels of autonomy. It requires a degree of
brightness, therefore, the use of an image sensor in nighttime operation or
dark conditions can be problematic along with challenging weather such as fog.
Radar sensors have been employed to help cover the various environmental
challenges with visible spectrum cameras. Edge computing technology has the
potential to address a number of issues such as real-time processing
requirements, off-loading of processing from congested servers, and size,
weight, power, and cost (SWaP-C) constraints. This paper proposes a novel
Hybrid Object DEtection and Tracking (HODET) using mmWave Radar and Visual
Sensors at the edge. The HODET is a computing application of low SWaP-C
electronics performing object detection, tracking and identification algorithms
with the simultaneous use of image and radar sensors. While the machine vision
camera alone could estimate the distance of an object, the radar sensor will
provide an accurate distance and vector of movement. This additional data
accuracy can be leveraged to further discriminate a detected object to protect
against spoofing attacks. A real-world smart community public safety monitoring
scenario is selected to verify the effectiveness of HODET, which detects,
tracks objects of interests and identify suspicious activities. The
experimental results demonstrate the feasibility of the approach.
|
In this paper, we demonstrate a novel algorithm that uses ellipse fitting to
estimate the bounding box rotation angle and size with the segmentation(mask)
on the target for online and real-time visual object tracking. Our method,
SiamMask_E, improves the bounding box fitting procedure of the state-of-the-art
object tracking algorithm SiamMask and still retains a fast-tracking frame rate
(80 fps) on a system equipped with GPU (GeForce GTX 1080 Ti or higher). We
tested our approach on the visual object tracking datasets (VOT2016, VOT2018,
and VOT2019) that were labeled with rotated bounding boxes. By comparing with
the original SiamMask, we achieved an improved Accuracy of 0.652 and 0.309 EAO
on VOT2019, which is 0.056 and 0.026 higher than the original SiamMask. The
implementation is available on GitHub:
https://github.com/baoxinchen/siammask_e.
| 0.869803 | 0.720675 | 0.149128 |
2004.06862
|
Synthesis of tunable $SnS-TaS_2$ nanoscale superlattices
|
Nanoscale superlattices represent a compelling platform for designed
materials as the specific identity and spatial arrangement of constituent
layers can lead to tunable properties. A number of kinetically-stabilized
layered chalcogenide nanocomposites have taken inspiration from misfit
compounds, a thermodynamically stable class of materials formed of van der
Waals-bonded (vdW) layers. This class of vdW heterostructure superlattices have
been reported in telluride and selenide chemistries, but have not yet been
extended to sulfides. Here we present $SnS-TaS_2$ nanoscale superlattices with
tunable layer architecture. Thin films are prepared from layered amorphous
precursors and deposited to mimic the targeted superlattice; subsequent low
temperature annealing activates self-assembly into designed nanocomposites.
Structure and composition for materials are investigated that span stacking
sequences between $[(SnS)_{1+\delta}]_3(TaS_2)_1$ and $(SnS)_7(TaS_2)_1$ using
x-ray diffraction, x-ray fluorescence, and transmission electron microscopy. A
graded deposition approach is implemented to stabilize heterostructures of
multiple stacking sequences with a single preparation. Precise control over the
architecture of such nanoscale superlattices is a critical path towards
controlling the properties of quantum materials and constituent devices.
|
Systems that simultaneously exhibit superconductivity and spin-orbit coupling
are predicted to provide a route toward topological superconductivity and
unconventional electron pairing, driving significant contemporary interest in
these materials. Monolayer transition-metal dichalcogenide (TMD)
superconductors in particular lack inversion symmetry, enforcing a spin-triplet
component of the superconducting wavefunction that increases with the strength
of spin-orbit coupling. In this work, we present an experimental and
theoretical study of two intrinsic TMD superconductors with large spin-orbit
coupling in the atomic layer limit, metallic 2H-TaS$_2$ and 2H-NbSe$_2$. For
the first time in TaS$_2$, we investigate the superconducting properties as the
material is reduced to a monolayer and show that high-field measurements point
to the largest upper critical field thus reported for an intrinsic TMD
superconductor. In few-layer samples, we find that the enhancement of the upper
critical field is sustained by the dominance of spin-orbit coupling over weak
interlayer coupling, providing additional platforms for unconventional
superconducting states in two dimensions.
| 0.870972 | 0.756431 | 0.114541 |
2004.06863
|
Diffusion in heterogeneous discs and spheres: new closed-form
expressions for exit times and homogenization formulae
|
Mathematical models of diffusive transport underpin our understanding of
chemical, biochemical and biological transport phenomena. Analysis of such
models often focusses on relatively simple geometries and deals with diffusion
through highly idealised homogeneous media. In contrast, practical applications
of diffusive transport theory inevitably involve dealing with more complicated
geometries as well as dealing with heterogeneous media. One of the most
fundamental properties of diffusive transport is the concept of $\textit{mean
particle lifetime}$ or $\textit{mean exit time}$, which are particular
applications of the concept of $\textit{first passage time}$, and provide the
mean time required for a diffusing particle to reach an absorbing boundary.
Most formal analysis of mean particle lifetime applies to relatively simple
geometries, often with homogeneous (spatially-invariant) material properties.
In this work, we present a general framework that provides exact mathematical
insight into the mean particle lifetime, and higher moments of particle
lifetime, for point particles diffusing in heterogeneous discs and spheres with
radial symmetry. Our analysis applies to geometries with an arbitrary number
and arrangement of distinct layers, where transport in each layer is
characterised by a distinct diffusivity. We obtain exact closed-form
expressions for the mean particle lifetime for a diffusing particle released at
an arbitrary location and we generalise these results to give exact,
closed-form expressions for any higher-order moment of particle lifetime for a
range of different boundary conditions. Finally, using these results we
construct new homogenization formulae that provide an accurate simplified
description of diffusion through heterogeneous discs and spheres.
|
Network alignment (NA) compares networks with the goal of finding a node
mapping that uncovers highly similar (conserved) network regions. Existing NA
methods are homogeneous, i.e., they can deal only with networks containing
nodes and edges of one type. Due to increasing amounts of heterogeneous network
data with nodes or edges of different types, we extend three recent
state-of-the-art homogeneous NA methods, WAVE, MAGNA++, and SANA, to allow for
heterogeneous NA for the first time. We introduce several algorithmic
novelties. Namely, these existing methods compute homogeneous graphlet-based
node similarities and then find high-scoring alignments with respect to these
similarities, while simultaneously maximizing the amount of conserved edges.
Instead, we extend homogeneous graphlets to their heterogeneous counterparts,
which we then use to develop a new measure of heterogeneous node similarity.
Also, we extend $S^3$, a state-of-the-art measure of edge conservation for
homogeneous NA, to its heterogeneous counterpart. Then, we find high-scoring
alignments with respect to our heterogeneous node similarity and edge
conservation measures. In evaluations on synthetic and real-world biological
networks, our proposed heterogeneous NA methods lead to higher-quality
alignments and better robustness to noise in the data than their homogeneous
counterparts. The software and data from this work is available upon request.
| 0.881635 | 0.674766 | 0.20687 |
2004.06864
|
Interfacial-hybridization-modified Ir Ferromagnetism and Electronic
Structure in LaMnO$_3$/SrIrO$_3$ Superlattices
|
Artificially fabricated 3$d$/5$d$ superlattices (SLs) involve both strong
electron correlation and spin-orbit coupling in one material by means of
interfacial 3$d$-5$d$ coupling, whose mechanism remains mostly unexplored. In
this work we investigated the mechanism of interfacial coupling in
LaMnO$_3$/SrIrO$_3$ SLs by several spectroscopic approaches. Hard x-ray
absorption, magnetic circular dichroism and photoemission spectra evidence the
systematic change of the Ir ferromagnetism and the electronic structure with
the change of the SL repetition period. First-principles calculations further
reveal the mechanism of the SL-period dependence of the interfacial electronic
structure and the local properties of the Ir moments, confirming that the
formation of Ir-Mn molecular orbital is responsible for the interfacial
coupling effects. The SL-period dependence of the ratio between spin and
orbital components of the Ir magnetic moments can be attributed to the
realignment of electron spin during the formation of the interfacial molecular
orbital. Our results clarify the nature of interfacial coupling in this
prototypical 3$d$/5$d$ SL system and the conclusion will shed light on the
study of other strongly correlated and spin-orbit coupled oxide
hetero-interfaces.
|
The model developed for LaMnO$_3$ addresses the spin-orbital order by
superexchange and Jahn-Teller orbital interactions in the cubic (perovskite)
symmetry up to now whereas real crystal structure is strongly deformed. We
identify and explain three \textit{a priori} important physical effects arising
from tetragonal deformation: (i) the splitting of $e_g$ orbitals $\propto E_z$,
(ii) the directional renormalization of $d-p$ hybridization $t_{pd}$, and (iii)
the directional renormalization of charge excitation energies. Using the
example of LaMnO$_3$ crystal we evaluate their magnitude. It is found that the
major effects of deformation are enhanced amplitude of $x^2-y^2$ orbitals
induced in the orbital order by $E_z\simeq 300$ meV and anisotropic
$t_{pd}\simeq 2.0$ (2.35) eV along the $ab$ ($c$) cubic axis, in very good
agreement with the Harrison's law. We show that the tetragonal model analyzed
within mean field approximation provides a surprisingly consistent picture of
the ground state. Excellent agreement with the experimental data is obtained
simultaneously for: (i) $e_g$ orbital mixing angle, (ii)~spin exchange
constants, and (iii) the temperatures of spin and orbital phase transition.
| 0.910405 | 0.764869 | 0.145536 |
2004.06865
|
Bound states in the continuum are universal under the effect of minimal
length
|
Bound states in the continuum (BICs) are generally considered unusual
phenomena. In this work, we provide a method to analyze the spatial structure
of particle's bound states in the presence of a minimal length, which can be
used to find BICs. It is shown that the BICs are universal phenomena under the
effect of the minimal length. Several examples of typical potentials, i.e.,
infinite potential well, linear potential, harmonic oscillator, quantum bouncer
and Coulomb potential, et al, are provided to show the BICs are universal. The
wave functions and energy of the first three examples are provided. A condition
is obtained to determine whether the BICs can be readily found in systems.
Using the condition, we find that although the BICs are universal phenomena,
they are often hardly found in many ordinary environments since the bound
continuous states perturbed by the effect of the minimal length are too weak to
observe. The results are consistent with the current experimental results on
BICs. In addition, we reveal a mechanism of the BICs. The mechanism explains
why current research shows the bound discrete states are typical, whereas BICs
are always found in certain particular environments when the minimal length is
not considered.
|
We combine few- and many-body degrees of freedom in a model applicable to
both bound and continuum states and adaptable to different subfields of
physics. We formulate a self-consistent three-body model for a core-nucleus
surrounded by two valence nucleons. We treat the core in the mean-field
approximation and use the same effective Skyrme interaction between both core
and valence nucleons. We apply the model to $^{26}$O where we reproduce the
known experimental data as well as phenomenological models with more
parameters. The decay of the ground state is found to proceed directly into the
continuum without effect of the virtual sequential decay through the well
reproduced $d_{3/2}$-resonance of $^{25}$O.
| 0.893007 | 0.750487 | 0.14252 |
2004.06866
|
On the Linguistic Capacity of Real-Time Counter Automata
|
Counter machines have achieved a newfound relevance to the field of natural
language processing (NLP): recent work suggests some strong-performing
recurrent neural networks utilize their memory as counters. Thus, one potential
way to understand the success of these networks is to revisit the theory of
counter computation. Therefore, we study the abilities of real-time counter
machines as formal grammars, focusing on formal properties that are relevant
for NLP models. We first show that several variants of the counter machine
converge to express the same class of formal languages. We also prove that
counter languages are closed under complement, union, intersection, and many
other common set operations. Next, we show that counter machines cannot
evaluate boolean expressions, even though they can weakly validate their
syntax. This has implications for the interpretability and evaluation of neural
network systems: successfully matching syntactic patterns does not guarantee
that counter memory accurately encodes compositional semantics. Finally, we
consider whether counter languages are semilinear. This work makes general
contributions to the theory of formal languages that are of potential interest
for understanding recurrent neural networks.
|
We introduce the model of communicating timed automata (CTA) that extends the
classical models of finite-state processes communicating through FIFO perfect
channels and timed automata, in the sense that the finite-state processes are
replaced by timed automata, and messages inside the perfect channels are
equipped with clocks representing their ages. In addition to the standard
operations (resetting clocks, checking guards of clocks) each automaton can
either (1) append a message to the tail of a channel with an initial age or (2)
receive the message at the head of a channel if its age satisfies a set of
given constraints. In this paper, we show that the reachability problem is
undecidable even in the case of two timed automata connected by one
unidirectional timed channel if one allows global clocks (that the two automata
can check and manipulate). We prove that this undecidability still holds even
for CTA consisting of three timed automata and two unidirectional timed
channels (and without any global clock). However, the reachability problem
becomes decidable (in $\mathsf{EXPTIME}$) in the case of two automata linked
with one unidirectional timed channel and with no global clock. Finally, we
consider the bounded-context case, where in each context, only one timed
automaton is allowed to receive messages from one channel while being able to
send messages to all the other timed channels. In this case we show that the
reachability problem is decidable.
| 0.851578 | 0.789265 | 0.062312 |
2004.06867
|
Spinon Fermi surface spin liquid in a triangular lattice antiferromagnet
NaYbSe$_2$
|
Triangular lattice of rare-earth ions with interacting effective spin-$1/2$
local moments is an ideal platform to explore the physics of quantum spin
liquids (QSLs) in the presence of strong spin-orbit coupling, crystal electric
fields, and geometrical frustration. The Yb delafossites, NaYbCh$_2$ (Ch=O, S,
Se) with Yb ions forming a perfect triangular lattice, have been suggested to
be candidates for QSLs. Previous thermodynamics, nuclear magnetic resonance,
and muon spin rotation measurements on NaYbCh$_2$ have supported the suggestion
of the QSL ground states. The key signature of a QSL, the spin excitation
continuum, arising from the spin quantum number fractionalization, has not been
observed. Here we perform both elastic and inelastic neutron scattering
measurements as well as detailed thermodynamic measurements on high-quality
single crystalline NaYbSe$_2$ samples to confirm the absence of long-range
magnetic order down to 40 mK, and further reveal a clear signature of magnetic
excitation continuum extending from 0.1 to 2.5 meV. By comparing the structure
of our magnetic excitation spectra with the theoretical expectation from the
spinon continuum, we conclude that the ground state of NaYbSe$_2$ is a QSL with
a spinon Fermi surface.
|
We show that there is a close correspondence between the physical properties
of holographic metals near charged black holes in anti-de Sitter (AdS) space,
and the fractionalized Fermi liquid phase of the lattice Anderson model. The
latter phase has a "small" Fermi surface of conduction electrons, along with a
spin liquid of local moments. This correspondence implies that certain
mean-field gapless spin liquids are states of matter at non-zero density
realizing the near-horizon, AdS_2 x R^2 physics of Reissner-Nordstrom black
holes.
| 0.858397 | 0.785917 | 0.07248 |
2004.06868
|
Multi-scale steady solution for Rayleigh-B\'enard convection
|
We have found a multi-scale steady solution of the Boussinesq equations for
Rayleigh-B\'enard convection in a three-dimensional periodic domain between
horizontal plates with a constant temperature difference by using a homotopy
from the wall-to-wall optimal transport solution given by Motoki et al. (J.
Fluid Mech., vol. 851, 2018, R4). The connected steady solution, which turns
out to be a consequence of bifurcation from a thermal conduction state at the
Rayleigh number $Ra\sim10^{3}$, is tracked up to $Ra\sim10^{7}$ by using a
Newton-Krylov iteration. The exact coherent thermal convection exhibits scaling
$Nu\sim Ra^{0.31}$ (where $Nu$ is the Nusselt number) as well as multi-scale
thermal plume and vortex structures, which are quite similar to those in the
turbulent Rayleigh-B\'enard convection. The mean temperature profiles and the
root-mean-square of the temperature and velocity fluctuations are in good
agreement with those of the turbulent states. Furthermore, the energy spectrum
follows Kolmogorov's -5/3 scaling law with a consistent prefactor, and the
energy transfer to smaller scales in the wavenumber space agrees with the
turbulent energy transfer.
|
In this numerical study on two-dimensional Rayleigh-B\'enard convection we
consider $10^7 \leq Ra \leq 10^{12}$ in aspect ratio $0.23 \leq \Gamma \leq 13$
samples. We focus on several cases. First we consider small aspect ratio cells,
where at high Ra number we find a sharp transition from a low Ra number branch
towards a high Ra number branch, due to changes in the flow structure.
Subsequently, we show that the influence of the aspect ratio on the heat
transport decreases with increasing aspect ratio, although even at very large
aspect ratio of $\Gamma\approx10$ variations up to 2.5% in the heat transport
as a function of \Gamma are observed. Finally, we observe long-lived transients
up to at least $Ra=10^9$, as in certain aspect ratio cells we observe different
flow states that are stable for thousands of turnover times.
| 0.865019 | 0.81408 | 0.050939 |
2004.06869
|
Theory for Non-Fermi Liquid Temperature Dependence in Resistivity of
Ce_xLa_{1-x} Cu_{5.62} Au_{0.38} (x=0.02-0.10) on the Local Quantum Valence
Criticality of Ce Impurities
|
It was reported by Shiino et al in J. Phys. Soc. Jpn. 86, 123705 (2017) that
Ce_xLa_{1-x} Cu_{5.62} Au_{0.38} (x=0.02-0.10) exhibits a new type of quantum
criticality in both magnetic and thermal properties, which is the same as that
observed in a series of materials exhibiting quantum critical valence
fluctuations (QCVF), such as \beta-YbAlB_4, Yb_{15}Al_{34}Au_{51}, and so on.
However, the temperature (T) dependence in the resistivity rho(T) for T<0.5K is
quite anomalous, i.e., \rho(T)\propto (const.-T^{n}) with n \simeq 0.75 at
x=0.05. We find that this anomalous exponent is given by n=2(1-\zeta), with
zeta being the weakly temperature dependent (0.5 \lsim \zeta \lsim 0.7)
critical exponent for the QCVF.The observed critical exponent n\simeq 0.75 at
x=0.05 is reproduced by choosing \zeta\simeq 0.63 which is consistent with the
divergent behavior observed in the uniform magnetic susceptibility \chi\propto
T^{-\zeta} with \zeta\simeq 0.67 at x=0.02.
|
Single crystals of the dilute, rare earth bearing, pseudo-ternary series,
Gd_xY_{1-x}Fe_2Zn_{20} were grown out of Zn-rich solution. Measurements of
magnetization, resistivity and heat capacity on Gd_xY_{1-x}Fe_2Zn_{20} samples
reveal ferromagnetic order of Gd^{3+} local moments across virtually the whole
series ($x \geq 0.02$). The magnetic properties of this series, including the
ferromagnetic ordering, the reduced saturated moments at base temperature, the
deviation of the susceptibilities from Curie-Weiss law and the anomalies in the
resistivity, are understood within the frame work of dilute, $\textbf {S}$
moments (Gd^{3+}) embedded in a nearly ferromagnetic Fermi liquid
(YFe_2Zn_{20}). The s-d model is employed to further explain the variation of
$T_{\mathrm{C}}$ with x as well as the temperature dependences of of the
susceptibilities.
| 0.914109 | 0.818484 | 0.095625 |
2004.06870
|
Coreferential Reasoning Learning for Language Representation
|
Language representation models such as BERT could effectively capture
contextual semantic information from plain text, and have been proved to
achieve promising results in lots of downstream NLP tasks with appropriate
fine-tuning. However, existing language representation models seldom consider
coreference explicitly, the relationship between noun phrases referring to the
same entity, which is essential to a coherent understanding of the whole
discourse. To address this issue, we present CorefBERT, a novel language
representation model designed to capture the relations between noun phrases
that co-refer to each other. According to the experimental results, compared
with existing baseline models, the CorefBERT model has made significant
progress on several downstream NLP tasks that require coreferential reasoning,
while maintaining comparable performance to previous models on other common NLP
tasks.
|
Deep learning is very effective at jointly learning feature representations
and classification models, especially when dealing with high dimensional input
patterns. Probabilistic logic reasoning, on the other hand, is capable to take
consistent and robust decisions in complex environments. The integration of
deep learning and logic reasoning is still an open-research problem and it is
considered to be the key for the development of real intelligent agents. This
paper presents Deep Logic Models, which are deep graphical models integrating
deep learning and logic reasoning both for learning and inference. Deep Logic
Models create an end-to-end differentiable architecture, where deep learners
are embedded into a network implementing a continuous relaxation of the logic
knowledge. The learning process allows to jointly learn the weights of the deep
learners and the meta-parameters controlling the high-level reasoning. The
experimental results show that the proposed methodology overtakes the
limitations of the other approaches that have been proposed to bridge deep
learning and reasoning.
| 0.834957 | 0.743098 | 0.091859 |
2004.06871
|
ToD-BERT: Pre-trained Natural Language Understanding for Task-Oriented
Dialogues
|
The use of pre-trained language models has emerged as a promising direction
for improving dialogue systems. However, the underlying difference of
linguistic patterns between conversational data and general text makes the
existing pre-trained language models not as effective as they have been shown
to be. Recently, there are some pre-training approaches based on open-domain
dialogues, leveraging large-scale social media data such as Twitter or Reddit.
Pre-training for task-oriented dialogues, on the other hand, is rarely
discussed because of the long-standing and crucial data scarcity problem. In
this work, we combine nine English-based, human-human, multi-turn and publicly
available task-oriented dialogue datasets to conduct language model
pre-training. The experimental results show that our pre-trained task-oriented
dialogue BERT (ToD-BERT) surpasses BERT and other strong baselines in four
downstream task-oriented dialogue applications, including intention detection,
dialogue state tracking, dialogue act prediction, and response selection.
Moreover, in the simulated limited data experiments, we show that ToD-BERT has
stronger few-shot capacity that can mitigate the data scarcity problem in
task-oriented dialogues.
|
Large pre-trained neural networks such as BERT have had great recent success
in NLP, motivating a growing body of research investigating what aspects of
language they are able to learn from unlabeled data. Most recent analysis has
focused on model outputs (e.g., language model surprisal) or internal vector
representations (e.g., probing classifiers). Complementary to these works, we
propose methods for analyzing the attention mechanisms of pre-trained models
and apply them to BERT. BERT's attention heads exhibit patterns such as
attending to delimiter tokens, specific positional offsets, or broadly
attending over the whole sentence, with heads in the same layer often
exhibiting similar behaviors. We further show that certain attention heads
correspond well to linguistic notions of syntax and coreference. For example,
we find heads that attend to the direct objects of verbs, determiners of nouns,
objects of prepositions, and coreferent mentions with remarkably high accuracy.
Lastly, we propose an attention-based probing classifier and use it to further
demonstrate that substantial syntactic information is captured in BERT's
attention.
| 0.897363 | 0.80379 | 0.093574 |
2004.06872
|
Degree spectra of homeomorphism types of Polish spaces
|
A Polish space is not always homeomorphic to a computably presented Polish
space. In this article, we examine degrees of non-computability of presenting
homeomorphic copies of Polish spaces. We show that there exists a
$0'$-computable low$_3$ Polish space which is not homeomorphic to a computable
one, and that, for any natural number $n$, there exists a Polish space $X_n$
such that exactly the high$_{2n+3}$-degrees are required to present the
homeomorphism type of $X_n$. We also show that no compact Polish space has an
easiest presentation with respect to Turing reducibility.
|
In the paper we investigate the degree and the homotopy theory of
Orlicz-Sobolev mappings $W^{1,P}(M,N)$ between manifolds, where the Young
function $P$ satisfies a divergence condition and forms a slightly larger space
than $W^{1,n}$, $n=\dim M$. In particular, we prove that if $M$ and $N$ are
compact oriented manifolds without boundary and $\dim M=\dim N=n$, then the
degree is well defined in $W^{1,P}(M,N)$ if and only if the universal cover of
$N$ is not a rational homology sphere, and in the case $n=4$, if and only if
$N$ is not homeomorphic to $S^4$.
| 0.869655 | 0.798071 | 0.071584 |
2004.06873
|
Efficient Verification of Phased Dicke States
|
Dicke states are typical examples of quantum states with genuine multipartite
entanglement. They are valuable resources in many quantum information
processing tasks, including multiparty quantum communication and quantum
metrology. Phased Dicke states are a generalization of Dicke states and include
antisymmetric basis states as a special example. These states are useful in
atomic and molecular physics besides quantum information processing. Here we
propose practical and efficient protocols for verifying all phased Dicke
states, including $W$ states and qudit Dicke states. Our protocols are based on
adaptive local projective measurements with classical communication, which are
easy to implement in practice. The number of tests required increases only
linearly with the number $n$ of parties, which is exponentially more efficient
than traditional tomographic approaches. In the case of $W$ states, the number
of tests can be further reduced to $O(\sqrt{n})$. Moreover, we construct an
optimal protocol for any antisymmetric basis state; the number of tests
required decreases (rather than increases) monotonically with $n$. This is the
only optimal protocol known for multipartite nonstabilizer states.
|
For engineering software with formal correctness proofs it is crucial that
proofs can be efficiently reused in case the software or its specification is
changed. Unfortunately, in reality even slight changes in the code or its
specification often result in disproportionate waste of verification effort:
For instance, whenever a method's specification is modified and as a
consequence the proof of its correctness breaks, all other proofs based on this
specification break too. Abstract method calls is a recently proposed
verification rule for method calls that allows for efficient systematic reuse
of proofs. In this thesis, we implement, extend and evaluate this approach
within the KeY verification system.
| 0.865349 | 0.712908 | 0.152441 |
2004.06874
|
Understanding Aesthetic Evaluation using Deep Learning
|
A bottleneck in any evolutionary art system is aesthetic evaluation. Many
different methods have been proposed to automate the evaluation of aesthetics,
including measures of symmetry, coherence, complexity, contrast and grouping.
The interactive genetic algorithm (IGA) relies on human-in-the-loop, subjective
evaluation of aesthetics, but limits possibilities for large search due to user
fatigue and small population sizes. In this paper we look at how recent
advances in deep learning can assist in automating personal aesthetic
judgement. Using a leading artist's computer art dataset, we use dimensionality
reduction methods to visualise both genotype and phenotype space in order to
support the exploration of new territory in any generative system.
Convolutional Neural Networks trained on the user's prior aesthetic evaluations
are used to suggest new possibilities similar or between known high quality
genotype-phenotype mappings.
|
Transfer learning from natural image datasets, particularly ImageNet, using
standard large models and corresponding pretrained weights has become a
de-facto method for deep learning applications to medical imaging. However,
there are fundamental differences in data sizes, features and task
specifications between natural image classification and the target medical
tasks, and there is little understanding of the effects of transfer. In this
paper, we explore properties of transfer learning for medical imaging. A
performance evaluation on two large scale medical imaging tasks shows that
surprisingly, transfer offers little benefit to performance, and simple,
lightweight models can perform comparably to ImageNet architectures.
Investigating the learned representations and features, we find that some of
the differences from transfer learning are due to the over-parametrization of
standard models rather than sophisticated feature reuse. We isolate where
useful feature reuse occurs, and outline the implications for more efficient
model exploration. We also explore feature independent benefits of transfer
arising from weight scalings.
| 0.869245 | 0.692919 | 0.176326 |
2004.06875
|
On Cyclic Polar Codes and The Burst Erasure Performance of
Spatially-Coupled LDPC Codes
|
Polar codes were introduced in 2009 and proven to achieve the symmetric
capacity of any binary-input discrete memoryless channel under low-complexity
successive cancellation decoding. In this thesis, we construct cyclic polar
codes based on a mixed-radix Cooley-Tukey decomposition of the Galois field
Fourier transform. The main results are: we can, for the first time, construct,
encode and decode polar codes that are cyclic, with their blocklength being
arbitrary; for a given target block erasure rate, we can achieve significantly
higher code rates on the erasure channel than the original polar codes, at
comparable blocklengths; on the symmetric channel with only errors, we can
perform much better than equivalent rate Reed-Solomon codes with the same
blocklength, by using soft-decision decoding; and, since the codes are subcodes
of higher rate RS codes, a RS decoder can be used if suboptimal performance
suffices for the application as a trade-off for higher decoding speed.
In 2010, it was shown that spatially-coupled low-density parity-check (LDPC)
codes approach the capacity of binary memoryless channels, asymptotically, with
belief-propagation (BP) decoding. In this thesis, we are interested in the
finite length average performance of randomly coupled LDPC ensembles on binary
erasure channels with memory. The significant contributions of this work are:
tight lower bounds for the block erasure probability ($P_B$) under various
scenarios for the burst pattern; bounds focused on practical scenarios where a
burst affects exactly one of the coupled codes; expected error floor for the
bit erasure probability ($P_b$) on the binary erasure channel; and,
characterization of the performance of random regular ensembles, on erasure
channels, with a single vector describing distinct types of size-$2$ stopping
sets. All these results are verified using Monte-Carlo simulations.
|
Product LDPC codes take advantage of LDPC decoding algorithms and the high
minimum distance of product codes. We propose to add suitable interleavers to
improve the waterfall performance of LDPC decoding. Interleaving also reduces
the number of low weight codewords, that gives a further advantage in the error
floor region.
| 0.896578 | 0.811528 | 0.08505 |
2004.06877
|
J-PARC Neutrino Beamline and 1.3 MW Upgrade
|
J-PARC neutrino beamline has been operated since 2009. Until May 2018, the
maximum beam power achieved was ~500 kW. In future, the beam power will be
upgraded to 1.3 MW. After the stable operation in late 2020s, we can accumulate
~30 x 10^20 POT data per year. It is almost the same number as total POT
accumulated in recent 10 years. The upgrade plan of the Main Ring as well as
the neutrino beamline is reported.
|
Soon, new experiments at FNAL and J-PARC will measure the muon anomalous
magnetic moments with better accuracy than before. From theoretical side, the
uncertainty of the standard model prediction is dominated by the hadronic
contributions. Current status of the experimental data and theoretical
calculations are briefly discussed.
| 0.873939 | 0.691686 | 0.182253 |
2004.06878
|
Near-Pulse Solutions of the FitzHugh-Nagumo Equations on Cylindrical
Surfaces
|
We consider the FitzHugh-Nagumo (FHN) system on the surface of a long, thin
cylinder that represents the outer membrane of a nerve axon. It is known that
the FHN system admits fast pulse solutions. In this paper, it is shown that a
solution of the FHN system on the standard cylinder of constant radius, with
initial condition close to the fast pulse, decays exponentially to a translated
pulse in time. Moreover, on the surface of a warped cylinder -- a cylinder
whose radius varies slowly along its length -- pulse-like solutions persist if
the radius of that cylinder is close to a constant.
|
Screening of a strongly charged macroion by multivalent counterions is
considered. It is shown that counterions form a strongly correlated liquid at
the surface of the macroion. Cohesive energy of this liquid leads to additional
attraction of counterions to the surface which is absent in conventional
solutions of Poisson-Boltzmann equation. Away from the surface this attraction
can be taken into account by a new boundary condition for the concentration of
counterions near the surface. Poisson-Boltzmann equation is solved with this
boundary condition for a charged flat surface, a cylinder and a sphere. In all
three cases, screening is much stronger than in the conventional approach. At
some critical exponentially small concentration of multivalent counterions in
the solution they totally neutralize the surface charge at small distances from
the surface. At larger concentrations they invert the sign the net macroion
charge. Absolute value of the inverted charge density can be as large as 20% of
that of the bare one. In particular, for a cylindrical macroion, it is shown
that for screening by multivalent counterions predictions of the
Onsager-Manning theory are quantitatively incorrect. The net charge density of
the cylinder is smaller than their theory predicts and inverts sign with
growing concentration of counterions. Moreover the condensation looses its
universality and the net charge linear density depends on the bare one.
| 0.845453 | 0.678764 | 0.166688 |
2004.06879
|
On the Complexity of the Plantinga-Vegter Algorithm
|
We introduce a general toolbox for precision control and complexity analysis
of subdivision based algorithms in computational geometry. We showcase the
toolbox on a well known example from this family; the adaptive subdivision
algorithm due to Plantinga and Vegter. The only existing complexity estimate on
this rather fast algorithm was an exponential worst-case upper bound for its
interval arithmetic version. We go beyond the worst-case by considering
smoothed analysis, and prove polynomial time complexity estimates for both
interval arithmetic and finite precision versions of the Plantinga-Vegter
algorithm. The employed toolbox is a blend of robust probabilistic techniques
coming from geometric functional analysis with condition numbers and the
continuous amortization paradigm introduced by Burr, Krahmer and Yap. We hope
this combination of tools from different disciplines would prove useful for
understanding complexity aspects of the broad family of subdivision based
algorithms in computational geometry.
|
We present a bounded probability algorithm for the computation of the Chow
forms of the equidimensional components of an algebraic variety. Its complexity
is polynomial in the length and in the geometric degree of the input equation
system defining the variety. In particular, it provides an alternative
algorithm for the equidimensional decomposition of a variety.
As an application we obtain an algorithm for the computation of a subclass of
sparse resultants, whose complexity is polynomial in the dimension and the
volume of the input set of exponents. As a further application, we derive an
algorithm for the computation of the (unique) solution of a generic
over-determined equation system.
| 0.817069 | 0.737752 | 0.079316 |
2004.06880
|
A multivariate evolutionary generalised linear model framework with
adaptive estimation for claims reserving
|
In this paper, we develop a multivariate evolutionary generalised linear
model (GLM) framework for claims reserving, which allows for dynamic features
of claims activity in conjunction with dependency across business lines to
accurately assess claims reserves. We extend the traditional GLM reserving
framework on two fronts: GLM fixed factors are allowed to evolve in a recursive
manner, and dependence is incorporated in the specification of these factors
using a common shock approach.
We consider factors that evolve across accident years in conjunction with
factors that evolve across calendar years. This two-dimensional evolution of
factors is unconventional as a traditional evolutionary model typically
considers the evolution in one single time dimension. This creates challenges
for the estimation process, which we tackle in this paper. We develop the
formulation of a particle filtering algorithm with parameter learning
procedure. This is an adaptive estimation approach which updates evolving
factors of the framework recursively over time.
We implement and illustrate our model with a simulated data set, as well as a
set of real data from a Canadian insurer.
|
Dynamic functional connectivity (DFC) analysis involves measuring correlated
neural activity over time across multiple brain regions. Significant regional
correlations among neural signals, such as those obtained from resting-state
functional magnetic resonance imaging (fMRI), may represent neural circuits
associated with rest. The conventional approach of estimating the correlation
dynamics as a sequence of static correlations from sliding time-windows has
statistical limitations. To address this issue, we propose a multivariate
stochastic volatility model for estimating DFC inspired by recent work in
econometrics research. This model assumes a state-space framework where the
correlation dynamics of a multivariate normal observation sequence is governed
by a positive-definite matrix-variate latent process. Using this statistical
model within a sequential Bayesian estimation framework, we use blood
oxygenation level dependent activity from multiple brain regions to estimate
posterior distributions on the correlation trajectory. We demonstrate the
utility of this DFC estimation framework by analyzing its performance on
simulated data, and by estimating correlation dynamics in resting state fMRI
data from a patient with a disorder of consciousness (DoC). Our work advances
the state-of-the-art in DFC analysis and its principled use in DoC biomarker
exploration.
| 0.923688 | 0.638427 | 0.28526 |
2004.06881
|
Cohomological expression of the curvature of K\"ahler moduli
|
The K\"ahler cone of a compact K\"ahler manifold carries a natural Riemannian
metric, given by the intersection product of its cohomology ring. We give
cohomological expressions for the Levi-Civita connection and curvature tensor
of this metric, and determine when the metric is complete.
|
The goal of this work is give a precise numerical description of the K\"ahler
cone of a compact K\"ahler manifold. Our main result states that the K\"ahler
cone depends only on the intersection form of the cohomology ring, the Hodge
structure and the homology classes of analytic cycles: if $X$ is a compact
K\"ahler manifold, the K\"ahler cone $\cK$ of $X$ is one of the connected
components of the set $\cP$ of real $(1,1)$ cohomology classes $\{\alpha\}$
which are numerically positive on analytic cycles, i.e. $\int_Y\alpha^p>0$ for
every irreducible analytic set $Y$ in $X$, \hbox{$p=\dim Y$}. This result is
new even in the case of projective manifolds, where it can be seen as a
generalization of the well-known Nakai-Moishezon criterion, and it also extends
previous results by Campana-Peternell and Eyssidieux. The principal technical
step is to show that every nef class $\{\alpha\}$ which has positive highest
self-intersection number $\int_X\alpha^n>0$ contains a K\"ahler current; this
is done by using the Calabi-Yau theorem and a mass concentration technique for
Monge-Amp\`ere equations. The main result admits a number of variants and
corollaries, including a description of the cone of numerically effective
$(1,1)$ classes and their dual cone. Another important consequence is the fact
that for an arbitrary deformation $\cX\to S$ of compact K\"ahler manifolds, the
K\"ahler cone of a very general fibre $X_t$ is ``independent'' of $t$, i.e.\
invariant by parallel transport under the $(1,1)$-component of the Gauss-Manin
connection.
| 0.894246 | 0.856646 | 0.0376 |
2004.06882
|
Effect of Input Noise Dimension in GANs
|
Generative Adversarial Networks (GANs) are by far the most successful
generative models. Learning the transformation which maps a low dimensional
input noise to the data distribution forms the foundation for GANs. Although
they have been applied in various domains, they are prone to certain challenges
like mode collapse and unstable training. To overcome the challenges,
researchers have proposed novel loss functions, architectures, and optimization
methods. In our work here, unlike the previous approaches, we focus on the
input noise and its role in the generation.
We aim to quantitatively and qualitatively study the effect of the dimension
of the input noise on the performance of GANs. For quantitative measures,
typically \emph{Fr\'{e}chet Inception Distance (FID)} and \emph{Inception Score
(IS)} are used as performance measure on image data-sets. We compare the FID
and IS values for DCGAN and WGAN-GP. We use three different image data-sets --
each consisting of different levels of complexity. Through our experiments, we
show that the right dimension of input noise for optimal results depends on the
data-set and architecture used. We also observe that the state of the art
performance measures does not provide enough useful insights. Hence we conclude
that we need further theoretical analysis for understanding the relationship
between the low dimensional distribution and the generated images. We also
require better performance measures.
|
We present ab initio calculations on the effect of in-plane equi-biaxial
strain on the structural and electronic properties of hypothetical
graphene-like GaN monolayer (ML-GaN). It was found that ML-GaN got buckled for
compressive strain in excess of 7.281 %; buckling parameter increased
quadratic-ally with compressive strain. The 2D bulk modulus of ML-GaN was found
to be smaller than that of graphene and graphene-like ML-BN, which reflects
weaker bond in ML-GaN. More importantly, the band gap and effective masses of
charge carriers in ML-GaN were found to be tunable by application of in-plane
equi-biaxial strain. In particular, when compressive biaxial strain of about 3
% was reached, a transition from indirect to direct band gap-phase occurred
with significant change in the value and nature of effective masses of charge
carriers; buckling and tensile strain reduced the band gap - the band gap
reduced to 50 % of its unstrained value at 6.36 % tensile strain and to 0 eV at
an extrapolated tensile strain of 12.72 %, which is well within its predicted
ultimate tensile strain limit of 16 %. These predictions of strain-engineered
electronic properties of highly strain sensitive ML-GaN may be exploited in
future for potential applications in strain sensors and other nano-devices such
as the nano-electromechanical systems (NEMS).
| 0.890862 | 0.642159 | 0.248703 |
2004.06883
|
Mirror Ritual: Human-Machine Co-Construction of Emotion
|
Mirror Ritual is an interactive installation that challenges the existing
paradigms in our understanding of human emotion and machine perception. In
contrast to prescriptive interfaces, the work's real-time affective interface
engages the audience in the iterative conceptualisation of their emotional
state through the use of affectively-charged machine generated poetry. The
audience are encouraged to make sense of the mirror's poetry by framing it with
respect to their recent life experiences, effectively `putting into words'
their felt emotion. This process of affect labelling and contextualisation
works to not only regulate emotion, but helps to construct the rich personal
narratives that constitute human identity.
|
Over the last million years, human language has emerged and evolved as a
fundamental instrument of social communication and semiotic representation.
People use language in part to convey emotional information, leading to the
central and contingent questions: (1) What is the emotional spectrum of natural
language? and (2) Are natural languages neutrally, positively, or negatively
biased? Here, we report that the human-perceived positivity of over 10,000 of
the most frequently used English words exhibits a clear positive bias. More
deeply, we characterize and quantify distributions of word positivity for four
large and distinct corpora, demonstrating that their form is broadly invariant
with respect to frequency of word use.
| 0.894893 | 0.736786 | 0.158107 |
2004.06884
|
Growth of matter fluctuations in $f(R,T)$ Gravity
|
In this work, I present for the first time the analysis concerning the growth
of matter fluctuations in the framework of $f(R,T)$ modified gravity where I
presume $f(R,T) = R + \lambda T$, where $R$ denote the Ricci scalar, $T$ the
trace of energy momentum tensor and $\lambda$ a constant. I first solve the
Friedman equations for the Hubble parameter $H(z)$ and then employ it in the
equation of matter density fluctuations $\delta(z)$ to solve for $\delta(z)$
and the growth rate $f(z)$. Next, I proceed to show the behavior of $f(z)$ and
$\delta(z)$ with redshift for some values of $\lambda$ with observational
constraints. Finally, following the prescription of \cite{growft41}, I present
an analytical expression for the growth index $\gamma$ which is redshift
independent and reduces approximately to the conventional $\Lambda$CDM model
for $\lambda=0$.
|
The objective of this work enclosed with the study of spatially homogeneous
anisotropic Bianchi type-I universe in $f(R,T)$ gravity (where $R$ is the Ricci
scalar and $T$ is the trace of stress energy momentum tensor) in two different
cases viz. $f(R,T)=R+2f(T)$ and $f(R,T)=f_1(R)+f_2(T)$ with bulk viscosity
matter content. In this study, we consider a time varying deceleration
parameter, which generates an accelerating universe to obtain the exact
solution of the field equations. The physical and kinematical properties of
both the models are discussed in detail for the future evolution of the
universe. We have explored the nature of WEC, DEC, SEC and energy density for
both the cases. We have found that both the models, with bulk viscosity matter
component, show an acceleration of the universe. We have also shown that the
cosmic jerk parameter is compatible with the three kinematical data sets.
| 0.888643 | 0.779473 | 0.10917 |
2004.06885
|
Quantum computation of three-wave interactions with engineered cubic
couplings
|
Quantum simulation hardware usually lacks native cubic couplings, which are
essential building blocks in many physics applications. Nevertheless, we
demonstrate that effective three-wave vertices can be realized on quantum
computers. In particular, for the three-wave Hamiltonian of laser-plasma
interactions, we show that its Hilbert space can be decomposed into a direct
sum of $D$-dimensional subspaces. Within each subspace, physical states are
readily mapped to quantum memory, and the Hamiltonian matrix becomes
tridiagonal. The resultant unitary evolution is realized using two qubits on
state-of-the-art quantum cloud services, which approximate the three-wave gate
as products of $\sim$20 standard gates. This trotterization approach allows
$\sim$10 repetitions of the three-wave gate on current quantum computers before
results are corrupted by decoherence. As an alternative approach, the unitary
evolution is also realized as a single gate using customized control pulses on
the Quantum Design and Integration Testbed (QuDIT). Utilizing three levels of
the transmon qudit, high-fidelity results are obtained for $\sim$100 three-wave
gate repetitions. Moreover, reliable control pulses may also be synthesized
cheaply using interpolation when parameters of the Hamiltonian deviate from
those used in numerical optimization. Our results highlight the advantage of
using customized gates in physics applications. The generalized multi-wave
gates may be used to compute a large class of problems in nonlinear optics,
weak turbulence, and lattice gauge theories.
|
Gauge field theories play a central role in modern physics and are at the
heart of the Standard Model of elementary particles and interactions. Despite
significant progress in applying classical computational techniques to simulate
gauge theories, it has remained a challenging task to compute the real-time
dynamics of systems described by gauge theories. An exciting possibility that
has been explored in recent years is the use of highly-controlled quantum
systems to simulate, in an analog fashion, properties of a target system whose
dynamics are difficult to compute. Engineered atom-laser interactions in a
linear crystal of trapped ions offer a wide range of possibilities for quantum
simulations of complex physical systems. Here, we devise practical proposals
for analog simulation of simple lattice gauge theories whose dynamics can be
mapped onto spin-spin interactions in any dimension. These include 1+1D quantum
electrodynamics, 2+1D Abelian Chern-Simons theory coupled to fermions, and 2+1D
pure Z2 gauge theory. The scheme proposed, along with the optimization protocol
applied, will have applications beyond the examples presented in this work, and
will enable scalable analog quantum simulation of Heisenberg spin models in any
number of dimensions and with arbitrary interaction strengths.
| 0.855237 | 0.752617 | 0.10262 |
2004.06886
|
Non-Holomorphic Ramanujan-type Congruences for Hurwitz Class Numbers
|
In contrast to all other known Ramanujan-type congruences, we discover that
Ramanujan-type congruences for Hurwitz class numbers can be supported on
non-holomorphic generating series. We establish a divisibility result for such
non-holomorphic congruences of Hurwitz class numbers. The two keys tools in our
proof are the holomorphic projection of products of theta series with a Hurwitz
class number generating series and a theorem by Serre, which allows us to rule
out certain congruences.
|
Let H(N) denote the Hurwitz class number. It is known that if $p$ is a prime,
then {equation*} \sum_{|r|<2\sqrt p}H(4p-r^2) = 2p. {equation*} In this paper,
we investigate the behavior of this sum with the additional condition $r\equiv
c\pmod m$. Three different methods will be explored for determining the values
of such sums. First, we will count isomorphism classes of elliptic curves over
finite fields. Second, we will express the sums as coefficients of modular
forms. Third, we will manipulate the Eichler-Selberg trace for ula for Hecke
operators to obtain Hurwitz class number relations. The cases $m=2,3$ and 4 are
treated in full. Partial results, as well as several conjectures, are given for
$m=5$ and 7.
| 0.960439 | 0.83606 | 0.124379 |
2004.06888
|
Real-Time Differential Epidemic Analysis and Prediction for COVID-19
Pandemic
|
In this paper, we propose a new real-time differential virus transmission
model, which can give more accurate and robust short-term predictions of
COVID-19 transmitted infectious disease with benefits of near-term projection.
Different from the existing Susceptible-Exposed-Infected-Removed (SEIR) based
virus transmission models, which fits well for pandemic modeling with
sufficient historical data, the new model, which is also SEIR based, uses short
history data to find the trend of the changing disease dynamics for the
infected, the dead and the recovered so that it can naturally accommodate the
adaptive real-time changes of disease mitigation, business activity and social
behavior of populations. As the parameters of the improved SEIR models are
trained by short history window data for accurate trend prediction, our
differential epidemic model, essentially are window-based time-varying SEIR
model. Since SEIR model still is a physics-based disease transmission model,
its near-term (like one month) projection can still be very instrumental for
policy makers to guide their decision for disease mitigation and business
activity policy change in a real-time. This is especially useful if the
pandemic lasts more than one year with different phases across the world like
1918 flu pandemic. Numerical results on the recent COVID-19 data from China,
Italy and US, California and New York states have been analyzed. Based on the
projection as of April 13, 2020 from the proposed model, the time for peak
medical resource usage for US as a whole will be around the beginning of May.
Also US will reach the peak in terms of daily new infected cases and death
cases around middle of April. The total cumulative infected cases will reach to
peak of 1.09 million people around June 12, 2020 and the estimated total death
cases will reach to 90K in the end.
|
With the increasing spread of COVID-19, it is important to systematically
test more and more people. The current strategy for test-kit allocation is
mostly rule-based, focusing on individuals having (a) symptoms for COVID-19,
(b) travel history or (c) contact history with confirmed COVID-19 patients.
Such testing strategy may miss out on detecting asymptomatic individuals who
got infected via community spread. Thus, it is important to allocate a separate
budget of test-kits per day targeted towards preventing community spread and
detecting new cases early on.
In this report, we consider the problem of allocating test-kits and discuss
some solution approaches. We believe that these approaches will be useful to
contain community spread and detect new cases early on. Additionally, these
approaches would help in collecting unbiased data which can then be used to
improve the accuracy of machine learning models trained to predict COVID-19
infections.
| 0.849378 | 0.769095 | 0.080283 |
2004.06889
|
On the homotopy type of L-spectra of the integers
|
We show that quadratic and symmetric L-theory of the integers are related by
Anderson duality and show that both spectra split integrally into the L-theory
of the real numbers and a generalised Eilenberg-Mac Lane spectrum. As a
consequence, we obtain a corresponding splitting of the space G/Top. Finally,
we prove analogous results for the genuine L-spectra recently devised for the
study of Grothendieck--Witt theory.
|
This Master Thesis is devoted to the study of $n$-plectic manifolds and the
Strongly Homotopy Lie algebras, also called $L_{\infty}$-algebras, that can be
associated to them. Since multisymplectic geometry and $L_{\infty}$-algebras
are relevant in Theoretical Physics, and in particular in String Theory, we
introduce the relevant background material in order to make the exposition
accessible to non-experts, perhaps interested physicists. The background
material includes graded and homological algebra theory, fibre bundles, basics
of group actions on manifolds and symplectic geometry. We give an introduction
to $L_{\infty}$-algebras and define $L_{\infty}$-morphisms in an independent
way, not yet related to multisymplectic geometry, giving explicit formulae
relating $L_{\infty}[1]$-algebras and $L_{\infty}$-algebras. We give also an
account of multisymplectic geometry and $n$-plectic manifolds, connecting them
to $L_{\infty}$-algebras. We then introduce, closely following the work
{1304.2051} of Yael Fregier, Christopher L. Rogers and Marco Zambon, the
concept of homotopy moment map. The new results presented here are the
following: we obtain specific conditions under which two $n$-plectic manifolds
with strictly isomorphic Lie-$n$ algebras are symplectomorphic, and we study
the construction of an homotopy moment map for a product manifold, assuming
that the factors are $n$-plectic manifolds equipped with the corresponding
homotopy moment maps.
| 0.870593 | 0.740088 | 0.130506 |
2004.06890
|
Local thermal rectification law
|
Thermal rectification which is a diode-like behaviour of heat flux has been
studied over several decades. However, a universal and systematic physical
description is still lacking. In this letter, a perturbation theory of local
thermal rectification is developed, where the terminology 'local' requires that
the variance of the effective thermal conductivity $\kappa_e (x,T)$ is small in
the thermal system. This theory gives a sufficient condition of the local
thermal rectification and predicts that the local thermal rectification ratio
is proportional to the temperature difference and system size. Furthermore,
three dimensionless parameters are identified for the first time and several
experimental and numerical observations in literatures are well explained based
on these dimensionless parameters. The proposed theory is applicable to any
system in which an effective thermal conductivity can be derived, and helpful
to unveil general principle for thermal rectification.
|
Ion transport in biological and synthetic nanochannels is characterized by
such phenomena as ion current fluctuations, rectification, and pumping.
Recently, it has been shown that the nanofabricated synthetic pores could be
considered as analogous to biological channels with respect to their transport
characteristics \cite{Apel, Siwy}. The ion current rectification is analyzed.
Ion transport through cylindrical nanopores is described by the Smoluchowski
equation. The model is considering the symmetric nanopore with asymmetric
charge distribution. In this model, the current rectification in asymmetrically
charged nanochannels shows a diode-like shape of $I-V$ characteristic. It is
shown that this feature may be induced by the coupling between the degree of
asymmetry and the depth of internal electric potential well. The role of
concentration gradient is discussed.
| 0.869907 | 0.6765 | 0.193407 |
2004.06891
|
"Stay Nearby or Get Checked": A Covid-19 Lockdown Exit Strategy
|
This paper repurposes the classic insight from network theory that
long-distance connections drive disease propagation into a strategy for
controlling a second wave of Covid-19. We simulate a scenario in which a
lockdown is first imposed on a population and then partly lifted while
long-range transmission is kept at a minimum. Simulated spreading patterns
resemble contemporary distributions of Covid-19 across nations, regions, and
provinces, providing some model validation. Results suggest that the proposed
strategy may significantly flatten a second wave. We also find that
post-lockdown flare-ups remain local longer, aiding geographical containment.
Public policy may target long ties by heavily focusing medical testing and
mobility tracking efforts on traffic and transport. This policy can be
communicated to the general public as a simple and reasonable principle: Stay
nearby or get checked.
|
Since the beginning of 2020, the coronavirus disease 2019 (COVID-19) has
spread rapidly in the city of Wuhan, P.R. China, and subsequently, across the
world. The swift spread of the virus is largely attributed to its stealth
transmissions in which infected patients may be asymptomatic. Undetected
transmissions present a remarkable challenge for the containment of the virus
and pose an appalling threat to the public. An urgent question that has been
asked by the public is "Should I be tested for COVID-19 if I am sick?". While
different regions established their own criteria for screening infected cases,
the screening criteria have been modified based on new evidence and
understanding of the virus as well as the availability of resources. The
shortage of test kits and medical personnel has considerably limited our
ability to do as many tests as possible. Public health officials and clinicians
are facing a dilemma of balancing the limited resources and unlimited demands.
On one hand, they are striving to achieve the best outcome by optimizing the
usage of the scant resources. On the other hand, they are challenged by the
patients' frustrations and anxieties, stemming from the concerns of not being
tested for COVID-19 for not meeting the definition of PUI (person under
investigation). In this paper, we evaluate the situation from the statistical
viewpoint by factoring into the considerations of the uncertainty and
inaccuracy of the test, an issue that is often overlooked by the general
public. We aim to shed light on the tough situation by providing evidence-based
reasoning from the statistical angle, and we expect this examination will help
the general public understand and assess the situation rationally. Most
importantly, the development offers recommendations for physicians to make
sensible evaluations to optimally use the limited resources for the best
medical outcome.
| 0.8082 | 0.769118 | 0.039082 |
2004.06892
|
New models for deformations: Linear Distortion and the failure of
rank-one convexity
|
In this article, we discuss new models for static nonlinear deformations via
scale-invariant conformal energy functionals based on the linear distortion. In
particular, we give examples to show that, despite equicontinuity estimates
giving compactness, minimising sequences will have strictly lower energy than
their limit, and that this energy gap can be quite large. We do this by showing
that Iwaniec's theorem on the failure of rank-one convexity for the linear
distortion of a specific family of linear mappings, is actually generic and we
subsequently identify the optimal rank-one direction to deform a linear map to
maximally decrease its distortion.
|
We study a new family of models of the sine-Gordon type, starting from the
sine-Gordon model, including the double sine-Gordon, the triple one, and so on.
The models appears as deformations of the starting model, with the deformation
controlled by two parameters, one very small, used to control a linear
expansion on it, and the other, which specifies the particular model in the
family of models. We investigate the presence of topological defects, showing
how the solutions can be constructed explicitly from the topological defects of
the sine-Gordon model itself. In particular, we delve into the double
sine-Gordon model in a braneworld scenario with a single extra dimension of
infinite extent, showing that a stable gravity scenario is admissible. Also, we
briefly show that the deformation procedure can be used iteratively, leading to
a diversity of possibilities to construct families of models of the sine-Gordon
type.
| 0.873452 | 0.686995 | 0.186457 |
2004.06893
|
On the cavity evolution and the Rayleigh--Plesset equation in superfluid
helium
|
On the basis of the two-fluid hydrodynamics, an analogue of the famous
Rayleigh-Plesse equation for the dynamics of a spherical bubble in superfluid
helium is obtained. The mass flow velocity $v$ and the velocity of the normal
component $v_{n}$ were chosen as independent variables. Due to the two-fluid
nature of HeII, the cross terms in the evolution equation for the boundary
position $\ R(t)$ appeared, which were absent in classical Rayleigh-Plesset
equation in ordinary fluids. One of them renormilizes the coefficient in front
of $(dR/dt)^{2}$. Another additional term formally coinciding with the viscous
term, describes the attenuation of the boundary oscillations. This
"extra-damping" term, greatly exceeding the usual viscous term, leads to a
significant difference in the dynamics of cavity compared to HeI. In
particular, this results in the interesting effect of abnormal suppression of
oscillations of the vapor--liquid boundary observed in many works. There is
also an additional term proportional to the squared velocity of the normal
component, which is independent of the derivative $dR/dt$, and can be included
in the pressure drop. Its physical meaning is that it describes a "Bernoulli"
-like pressure created by the flow of a normal component. The obtained result
declares that some results on the dynamics of the cavity in superfluid helium
should be reviewed
|
Mature neutron stars are expected to have several superfluid components.
Strong evidence for this is provided by the glitches that have been observed in
dozens of pulsars. The underlying idea behind most glitch models is that, as
the neutron star crust spins down due to the emission of electromagnetic
radiation, the superfluid component lags behind until a critical point is
reached and angular momentum is transferred from the superfluid to the crust,
leading to the spin-up associated with the glitch. In this Letter we describe a
superfluid analogue of the two-stream instability that is well known in plasma
physics, and provide evidence that this instability is likely to be relevant
for neutron stars. This is a new physical mechanism which may play a key role
in explaining the glitch mechanism and which could also prove to be relevant in
laboratory experiments on superfluid Helium.
| 0.860999 | 0.726331 | 0.134669 |
2004.06894
|
Human Evaluation of Interpretability: The Case of AI-Generated Music
Knowledge
|
Interpretability of machine learning models has gained more and more
attention among researchers in the artificial intelligence (AI) and
human-computer interaction (HCI) communities. Most existing work focuses on
decision making, whereas we consider knowledge discovery. In particular, we
focus on evaluating AI-discovered knowledge/rules in the arts and humanities.
From a specific scenario, we present an experimental procedure to collect and
assess human-generated verbal interpretations of AI-generated music
theory/rules rendered as sophisticated symbolic/numeric objects. Our goal is to
reveal both the possibilities and the challenges in such a process of decoding
expressive messages from AI sources. We treat this as a first step towards 1)
better design of AI representations that are human interpretable and 2) a
general methodology to evaluate interpretability of AI-discovered knowledge
representations.
|
An Artificial Intelligence (AI) system is an autonomous system which emulates
human mental and physical activities such as Observe, Orient, Decide, and Act,
called the OODA process. An AI system performing the OODA process requires a
semantically rich representation to handle a complex real world situation and
ability to reason under uncertainty about the situation. Multi-Entity Bayesian
Networks (MEBNs) combines First-Order Logic with Bayesian Networks for
representing and reasoning about uncertainty in complex, knowledge-rich
domains. MEBN goes beyond standard Bayesian networks to enable reasoning about
an unknown number of entities interacting with each other in various types of
relationships, a key requirement for the OODA process of an AI system. MEBN
models have heretofore been constructed manually by a domain expert. However,
manual MEBN modeling is labor-intensive and insufficiently agile. To address
these problems, an efficient method is needed for MEBN modeling. One of the
methods is to use machine learning to learn a MEBN model in whole or in part
from data. In the era of Big Data, data-rich environments, characterized by
uncertainty and complexity, have become ubiquitous. The larger the data sample
is, the more accurate the results of the machine learning approach can be.
Therefore, machine learning has potential to improve the quality of MEBN models
as well as the effectiveness for MEBN modeling. In this research, we study a
MEBN learning framework to develop a MEBN model from a combination of domain
expert's knowledge and data. To evaluate the MEBN learning framework, we
conduct an experiment to compare the MEBN learning framework and the existing
manual MEBN modeling in terms of development efficiency.
| 0.899699 | 0.629928 | 0.269771 |
2004.06895
|
Coexistence of Surface Ferromagnetism and Gapless Topological State in
MnBi$_2$Te$_4$
|
Surface magnetism and its correlation with the electronic structure are
critical to understand the gapless topological surface state in the intrinsic
magnetic topological insulator MnBi$_2$Te$_4$. Here, using static and time
resolved angle-resolved photoemission spectroscopy (ARPES), we find a
significant ARPES intensity change together with a gap opening on a Rashba-like
conduction band. Comparison with a model simulation strongly indicates that the
surface magnetism on cleaved MnBi$_2$Te$_4$ is the same as its bulk state. The
coexistence of surface ferromagnetism and a gapless TSS uncovers the novel
complexity of MnBi$_2$Te$_4$ that may be responsible for the low quantum
anomalous Hall temperature of exfoliated MnBi$_2$Te$_4$.
|
We present a comprehensive study of the crystal structure of the thin-film,
ferromagnetic topological insulator (Bi, Sb)$_{2-x}$V$_x$Te$_3$. The
dissipationless quantum anomalous Hall edge states it manifests are of
particular interest for spintronics, as a natural spin filter or pure spin
source, and as qubits for topological quantum computing. For ranges typically
used in experiments, we investigate the effect of doping, substrate choice and
film thickness on the (Bi, Sb)$_2$Te$_3$ unit cell using high-resolution X-ray
diffractometry. Scanning transmission electron microscopy and energy-dispersive
X-ray spectroscopy measurements provide local structural and interfacial
information. We find that the unit cell is unaffected in-plane by vanadium
doping changes, and remains unchanged over a thickness range of 4--10 quintuple
layers (1 QL $\approx$ 1 nm). The in-plane lattice parameter ($a$) also remains
the same in films grown on different substrate materials. However, out-of-plane
the $c$-axis is reduced in films grown on less closely lattice-matched
substrates, and increases with the doping level.
| 0.941023 | 0.835865 | 0.105158 |
2004.06896
|
Contextual-Bandit Anomaly Detection for IoT Data in Distributed
Hierarchical Edge Computing
|
Advances in deep neural networks (DNN) greatly bolster real-time detection of
anomalous IoT data. However, IoT devices can hardly afford complex DNN models,
and offloading anomaly detection tasks to the cloud incurs long delay. In this
paper, we propose and build a demo for an adaptive anomaly detection approach
for distributed hierarchical edge computing (HEC) systems to solve this
problem, for both univariate and multivariate IoT data. First, we construct
multiple anomaly detection DNN models with increasing complexity, and associate
each model with a layer in HEC from bottom to top. Then, we design an adaptive
scheme to select one of these models on the fly, based on the contextual
information extracted from each input data. The model selection is formulated
as a contextual bandit problem characterized by a single-step Markov decision
process, and is solved using a reinforcement learning policy network. We build
an HEC testbed, implement our proposed approach, and evaluate it using real IoT
datasets. The demo shows that our proposed approach significantly reduces
detection delay (e.g., by 71.4% for univariate dataset) without sacrificing
accuracy, as compared to offloading detection tasks to the cloud. We also
compare it with other baseline schemes and demonstrate that it achieves the
best accuracy-delay tradeoff. Our demo is also available online:
https://rebrand.ly/91a71
|
This work explores the idea of a causal contextual multi-armed bandit
approach to automated marketing, where we estimate and optimize the causal
(incremental) effects. Focusing on causal effect leads to better return on
investment (ROI) by targeting only the persuadable customers who wouldn't have
taken the action organically. Our approach draws on strengths of causal
inference, uplift modeling, and multi-armed bandits. It optimizes on causal
treatment effects rather than pure outcome, and incorporates counterfactual
generation within data collection. Following uplift modeling results, we
optimize over the incremental business metric. Multi-armed bandit methods allow
us to scale to multiple treatments and to perform off-policy policy evaluation
on logged data. The Thompson sampling strategy in particular enables
exploration of treatments on similar customer contexts and materialization of
counterfactual outcomes. Preliminary offline experiments on a retail Fashion
marketing dataset show merits of our proposal.
| 0.880757 | 0.677252 | 0.203505 |
2004.06897
|
Holographic unitary renormalization group for correlated electrons -- I:
a tensor network approach
|
We present a unified framework for the renormalisation of the Hamiltonian and
eigenbasis of a system of correlated electrons, unveiling thereby the interplay
between electronic correlations and many-particle entanglement. For this, we
extend substantially the unitary renormalization group (URG) scheme introduced
in Refs.[1-3]. We recast the RG as a discrete flow of the Hamiltonian tensor
network, i.e., the collection of various $2n$-point scattering vertex tensors
comprising the Hamiltonian. The renormalisation progresses via unitary
transformations that block diagonalizes the Hamiltonian iteratively via the
disentanglement of single-particle eigenstates. This procedure incorporates
naturally the role of quantum fluctuations. The interplay between various UV
energy scales enables the coupled RG equations to flow towards a stable fixed
point in the IR. Importantly, the vertex tensor network is observed to govern
the RG flow of the tensor network that denotes the coefficients of the
many-particle eigenstates. The RG evolution of various many-particle
entanglement features of the eigenbasis are, in turn, quantified through the
coefficient tensor network. In this way, we show that the URG framework
provides a microscopic understanding of holographic renormalisation: the RG
flow of the vertex tensor network generates a eigenstate coefficient tensor
network possessing a many-particle entanglement metric. We find that the
eigenstate tensor network accommodates sign factors arising from fermion
exchanges, and that the IR fixed point reached generically involves a
trivialisation of the fermion sign factor. Several results are presented for
the emergence of composite excitations in the neighbourhood of a gapless Fermi
surface, as well as for the condensation phenomenon involving the gapping of
the Fermi surface.
|
Strongly correlated electrons on an Apollonian network are studied using the
Hubbard model. Ground-state and thermodynamic properties, including specific
heat, magnetic susceptibility, spin-spin correlation function, double occupancy
and one-electron transfer, are evaluated applying direct diagonalization and
quantum Monte Carlo. The results support several types of magnetic behavior. In
the strong-coupling limit, the quantum anisotropic spin 1/2 Heisenberg model is
used and the phase diagram is discussed using the renormalization group method.
For ferromagnetic coupling, we always observe the existence of long-range
order. For antiferromagnetic coupling, we find a paramagnetic phase for all
finite temperatures.
| 0.897196 | 0.79478 | 0.102416 |
2004.06898
|
Learning sums of powers of low-degree polynomials in the non-degenerate
case
|
We develop algorithms for writing a polynomial as sums of powers of low
degree polynomials. Consider an $n$-variate degree-$d$ polynomial $f$ which can
be written as $$f = c_1Q_1^{m} + \ldots + c_s Q_s^{m},$$ where each $c_i\in
\mathbb{F}^{\times}$, $Q_i$ is a homogeneous polynomial of degree $t$, and $t m
= d$. In this paper, we give a $\text{poly}((ns)^t)$-time learning algorithm
for finding the $Q_i$'s given (black-box access to) $f$, if the $Q_i's$ satisfy
certain non-degeneracy conditions and $n$ is larger than $d^2$. The set of
degenerate $Q_i$'s (i.e., inputs for which the algorithm does not work) form a
non-trivial variety and hence if the $Q_i$'s are chosen according to any
reasonable (full-dimensional) distribution, then they are non-degenerate with
high probability (if $s$ is not too large).
Our algorithm is based on a scheme for obtaining a learning algorithm for an
arithmetic circuit model from a lower bound for the same model, provided
certain non-degeneracy conditions hold. The scheme reduces the learning problem
to the problem of decomposing two vector spaces under the action of a set of
linear operators, where the spaces and the operators are derived from the input
circuit and the complexity measure used in a typical lower bound proof. The
non-degeneracy conditions are certain restrictions on how the spaces decompose.
|
In this note we discuss an analog of the classical Waring problem for C[x_0,
x_1,...,x_n]. Namely, we show that a general homogeneous polynomial p \in
C[x_0,x_1,...,x_n] of degree divisible by k\ge 2 can be represented as a sum of
at most k^n k-th powers of homogeneous polynomials in C[x_0, x_1,...,x_n].
Noticeably, k^n coincides with the number obtained by naive dimension count.
| 0.913645 | 0.796929 | 0.116715 |
2004.06899
|
Quadratic and cubic Newton maps of rational functions
|
Dynamics of all quadratic Newton maps applied to rational functions is
completely described. The Julia set of such a map is found to be either a
Jordan curve or totally disconnected. It is proved that no Newton map of degree
at least three is conformally conjugate to any polynomial with exactly one
critical point. However, there are cubic Newton maps which are conformally
conjugate to other types of polynomials. The Julia set of such a Newton map is
shown to be a closed curve. It is a Jordan curve whenever the Newton map has
two attracting fixed points.
|
The local topological zeta function is a rational function associated to a
germ of a complex holomorphic function. This function can be computed from an
embedded resolution of singularities of the germ. For nondegenerate functions
it is also possible to compute it from the Newton polyhedron. Both ways give
rise to a set of candidate poles of the topological zeta function, containing
all poles. For plane curves, Veys showed how to filter the actual poles out of
the candidate poles induced by the resolution graph. In this note we show how
to determine from the Newton polyhedron of a nondegenerate plane curve which
candidate poles are actual poles.
| 0.891951 | 0.757308 | 0.134643 |
2004.06900
|
Holographic unitary renormalization group for correlated electrons --
II: insights on fermionic criticality
|
Capturing the interplay between electronic correlations and many-particle
entanglement requires a unified framework for Hamiltonian and eigenbasis
renormalization. In this work, we apply the unitary renormalization group (URG)
scheme developed in a companion work (Ref.[1]) to the study of two archetypal
models of stongly correlated lattice electrons, one with translation invariance
and one without. We obtain detailed insight into the emergence of various
gapless and gapped phases of quantum electronic matter by computing effective
Hamiltonians as well as entanglement signatures through their respective tensor
network descriptions. For the translationally invariant model of a single-band
of interacting electrons, this includes results on gapless metallic phases such
as the Fermi liquid and Marginal Fermi liquid, as well as gapped phases such as
the reduced Bardeen-Cooper-Schrieffer, pair density-wave and Mott liquid
phases. Additionally, a study of a generalised Sachdev-Ye model with disordered
four-fermion interactions offers detailed results on many-body localised
phases, as well as thermalised phase. We emphasise the distinctions between the
various phases based on a combined analysis of their dynamical (obtained from
the effective Hamiltonian) and entanglement properties. Importantly, the RG
flow of the Hamiltonian vertex tensor network is shown to lead to emergent
gauge theories for the gapped phases. Taken together with results on the
holographic spacetime generated from the RG of the many-particle eigenstate
(seen through, for instance, the holographic upper bound of the one-particle
entanglement entropy), our analysis offer an ab-initio perspective of the
gauge-gravity duality for quantum liquids that are emergent in systems of
correlated electrons.
|
A Weyl semimetal denotes an electronic phase of solids in which two bands
cross linearly. In this paper we study the effect of a spatially correlated
disorder on such a phase. Using a renormalization group analysis, we show that
in three dimensions, three scenarios are possible depending on the disorder
correlations. A standard transition is recovered for short range correlations.
For disorder decaying slower than $1/r^{2}$, the Weyl semimetal is unstable to
any weak disorder and no transition persists. In between, a new phase
transition occurs. This transition still separates a disordered metal from a
semi-metal, but with a new critical behavior that we analyze to two-loop order.
| 0.880423 | 0.806676 | 0.073747 |
2004.06901
|
Hamiltonian Analysis for the Scalar Electrodynamics as 3BF Theory
|
The higher category theory can be employed to generalize the BF action to the
so-called 3BF action, by passing from the notion of a gauge group to the notion
of a gauge 3-group. The theory of scalar electrodynamics coupled to
Einstein-Cartan gravity can be formulated as a constrained 3BF theory for a
specific choice of the gauge 3-group. The complete Hamiltonian analysis of the
3BF action for the choice of a Lie 3-group corresponding to scalar
electrodynamics is performed. This analysis is the first step towards a
canonical quantization of a 3BF theory, an important stepping stone for the
quantization of the complete scalar electrodynamics coupled to Einstein-Cartan
gravity formulated as a 3BF action with suitable simplicity constraints. It is
shown that the resulting dynamic constraints eliminate all propagating degrees
of freedom, i.e., the 3BF theory for this choice of a 3-group is a topological
field theory, as expected.
|
The phase structure of the finite SU(2)xSU(2) theory with N=2 supersymmetry,
broken to N=1 by mass terms for the adjoint-valued chiral multiplets, is
determined exactly by compactifying the theory on a circle of finite radius.
The exact low-energy superpotential is constructed by identifying it as a
linear combination of the Hamiltonians of a certain symplectic reduction of the
spin generalized elliptic Calogero-Moser integrable system. It is shown that
the theory has four confining, two Higgs and two massless Coulomb vacua which
agrees with a simple analysis of the tree-level superpotential of the
four-dimensional theory. In each vacuum, we calculate all the condensates of
the adjoint-valued scalars.
| 0.867798 | 0.712148 | 0.155651 |
2004.06902
|
A new principle in the interpretability logic of all reasonable
arithmetical theories
|
The interpretability logic of a mathematical theory describes the structural
behavior of interpretations over that theory. Different theories have different
logics. This paper from 2011 revolves around the question what logic describes
the behavior that is present in all theories with a minimum amount of
arithmetic; the intersection over all such theories so to say. We denote this
target logic by ${\textbf{IL}}({\rm All})$. In this paper we present a new
principle $\sf R$ in ${\textbf{IL}}({\rm All})$. We show that $\sf R$ does not
follow from the logic ${\textbf{IL}}{\sf P_0W^*}$ that contains all previously
known principles. This is done by providing a modal incompleteness proof of
${\textbf{IL}}{\sf P_0W^*}$: showing that $\sf R$ follows semantically but not
syntactically from ${\textbf{IL}}{\sf P_0W^*}$. Apart from giving the
incompleteness proof by elementary methods, we also sketch how to work with
so-called Generalized Veltman Semantics as to establish incompleteness. To this
extent, a new version of this Generalized Veltman Semantics is defined and
studied. Moreover, for the important principles the frame correspondences are
calculated. After the modal results it is shown that the new principle $\sf R$
is indeed valid in any arithmetically theory. The proof employs some elementary
results on definable cuts in arithmetical theories.
|
With the rapid development of Deep Neural Networks (DNNs), various network
models that show strong computing power and impressive expressive power are
proposed. However, there is no comprehensive informational interpretation of
DNNs from the perspective of information theory. Due to the nonlinear function
and the uncertain number of layers and neural units used in the DNNs, the
network structure shows nonlinearity and complexity. With the typical DNNs
named Convolutional Arithmetic Circuits (ConvACs), the complex DNNs can be
converted into mathematical formula. Thus, we can use rigorous mathematical
theory especially the information theory to analyse the complicated DNNs. In
this paper, we propose a novel information scaling law scheme that can
interpret the network's inner organization by information theory. First, we
show the informational interpretation of the activation function. Secondly, we
prove that the information entropy increases when the information is
transmitted through the ConvACs. Finally, we propose the information scaling
law of ConvACs through making a reasonable assumption.
| 0.887826 | 0.666111 | 0.221715 |
2004.06904
|
Continuous learning of face attribute synthesis
|
The generative adversarial network (GAN) exhibits great superiority in the
face attribute synthesis task. However, existing methods have very limited
effects on the expansion of new attributes. To overcome the limitations of a
single network in new attribute synthesis, a continuous learning method for
face attribute synthesis is proposed in this work. First, the feature vector of
the input image is extracted and attribute direction regression is performed in
the feature space to obtain the axes of different attributes. The feature
vector is then linearly guided along the axis so that images with target
attributes can be synthesized by the decoder. Finally, to make the network
capable of continuous learning, the orthogonal direction modification module is
used to extend the newly-added attributes. Experimental results show that the
proposed method can endow a single network with the ability to learn attributes
continuously, and, as compared to those produced by the current
state-of-the-art methods, the synthetic attributes have higher accuracy.
|
Image synthesis learns a transformation from the intensity features of an
input image to yield a different tissue contrast of the output image. This
process has been shown to have application in many medical image analysis tasks
including imputation, registration, and segmentation. To carry out synthesis,
the intensities of the input images are typically scaled--i.e.,
normalized--both in training to learn the transformation and in testing when
applying the transformation, but it is not presently known what type of input
scaling is optimal. In this paper, we consider seven different intensity
normalization algorithms and three different synthesis methods to evaluate the
impact of normalization. Our experiments demonstrate that intensity
normalization as a preprocessing step improves the synthesis results across all
investigated synthesis algorithms. Furthermore, we show evidence that suggests
intensity normalization is vital for successful deep learning-based MR image
synthesis.
| 0.867425 | 0.688097 | 0.179328 |
2004.06905
|
Vertical interface enabled large tunability of scattering spectra in
lightweight microwire/silicone rubber composites
|
Previously, we have shown the advantages of an approach based on
microstructural modulation of the functional phase and topology of periodically
arranged elements to program wave scattering in ferromagnetic microwire
composites. However, the possibility of making full use of composite intrinsic
structure was not exploited. In this work, we implement the concept of material
plainification by an in-built vertical interface on randomly dispersed
short-cut microwire composites allowing the adjustment of electromagnetic
properties to a large extent. Such interface was modified through arranging
wires of different structures in two separated regions and by enlarging or
reducing these regions through wire concentration variations leading to
polarization differences across the interface and hence microwave tunability.
When the wire concentration was equal in both regions, two well-defined
transmission windows with varied amplitude and bandwidth were generated. Wire
concentration fluctuations resulted in strong scattering changes ranging from
broad passbands to stopbands with pronounced transmission dips, demonstrating
the intimate relationship between wire content and space charge variations at
the interface. Overall, this study provides a novel method to rationally
exploit interfacial effects in microwire composites. Moreover, the advantages
of enabling significantly tunable scattering spectra by merely 0.053 vol. %
filler loading and relatively simple structure make the proposed composite
plainification strategy instrumental to designing microwave filters with
broadband frequency selectivity.
|
Machine elements and mechanical components have often surfaces with
anisotropic roughness, which may result from the machining processes, e.g.
grinding, or from wear. Hence, it is important to understand how surface
roughness anisotropy affects contact mechanics properties, such as friction and
the interface separation, which is important for lubricated contacts. Here we
extend and apply a multiscale mean-field model to the lubricated contact
between a soft (e.g. rubber) elastic solid and a rigid countersurface. We
consider surfaces with anisotropic surface roughness, and discuss how the fluid
flow factors and friction factors depend on the roughness. We present an
experimental study of the lubricated sliding contact between a nitrile
butadiene rubber O-ring and steel surfaces with different types of isotropic
and anisotropic surface roughness. The good quantitative comparison between the
experimental results and the theory predictions suggests that the multiscale
lubrication mechanisms are accurately captured by the theory.
| 0.843293 | 0.639729 | 0.203564 |
2004.06907
|
On the dimension of Voisin sets in the moduli space of abelian varieties
|
We study the subsets $V_k(A)$ of a complex abelian variety $A$ consisting in
the collection of points $x\in A$ such that the zero-cycle $\{x\}-\{0_A\}$ is
$k$-nilpotent with respect to the Pontryagin product in the Chow group. These
sets were introduced recently by Voisin and she showed that $\dim V_k(A) \leq
k-1$ and it is $0$ for a very general abelian variety of dimension at least
$2k-1$.
We study in particular the locus $\mathcal V_{g,2}$ in the moduli space of
abelian varieties of dimension $g$ with a fixed polarization where $V_2(A)$ is
positive dimensional and we prove that an irreducible subvariety $Y \subset
\mathcal V_{g,2}$, $g\ge 3$, such that for a very general $A \in Y $ there is a
curve in $V_2(A)$ generating $A$ satisfies $\dim Y \le 2g - 1.$ The
hyperelliptic locus shows that this bound is sharp.
|
In the paper we consider the Jacobian locus $\overline{J_g}$ and the Prym
locus $\overline{P_{g+1}}$, in the moduli space $A_g$ of principally polarized
abelian varieties of dimension $g$, for $g\geq 7$, and we study the extrinsic
geometry of $\overline{J_g}\subset \overline{P_{g+1}}$, under the inclusion
provided by the theory of generalized Prym varieties as introduced by
Beauville. More precisely, we study certain geodesic curves with respect to the
Siegel metric of $A_g$, starting at a Jacobian variety $[JC]\in A_g$ of a curve
$[C]\in M_g$ and with direction $\zeta\in T_{[JC]}J_g$. We prove that for a
general $JC$, any geodesic of this kind is not contained in $\overline{J_g}$
and even in $\overline{P_{g+1}}$, if $\zeta$ has rank $k<\Cliff C-3$, where
$\Cliff C$ denotes the Clifford index of $C$.
| 0.826974 | 0.802981 | 0.023993 |
2004.06908
|
Hessian quotient equations on exterior domains
|
It is well-known that a celebrated J\"{o}rgens-Calabi-Pogorelov theorem for
Monge-Amp\`ere equations states that any classical (viscosity) convex solution
of $\det(D^2u)=1$ in $\mathbb{R}^n$ must be a quadratic polynomial. Therefore,
it is an interesting topic to study the existence and uniqueness theorem of
such fully nonlinear partial differential equations' Dirichlet problems on
exterior domains with suitable asymptotic conditions at infinity. As a
continuation of the works of Caffarelli-Li for Monge-Amp\`ere equation and of
Bao-Li-Li for $k$-Hessian equations, this paper is devoted to the solvability
of the exterior Dirichlet problem of Hessian quotient equations
$\sigma_k(\lambda(D^2u))/\sigma_l(\lambda(D^2u))=1$ for any $1\leq l<k\leq n$
in all dimensions $n\geq 2$. By introducing the concept of generalized
symmetric subsolutions and then using the Perron's method, we establish the
existence theorem for viscosity solutions, with prescribed asymptotic behavior
which is close to some quadratic polynomial at infinity.
|
In this note, we provide a complete classification for entire area maximizing
hypersurfaces having an isolated singularity. We also construct an interesting
illustrated example. For area maximizing hypersurfaces over exterior domains,
we obtain a partial result on their asymptotic behavior at infinity. We also
establish the solvability of exterior Dirichlet problems for area maximizing
hypersurfaces.
| 0.850223 | 0.812383 | 0.03784 |
2004.06909
|
Multi-marginal Optimal Transport and Schr\"odinger Bridges on Trees
|
The optimal transport problem has recently developed into a powerful
framework for various applications in estimation and control. Many of the
recent advances in the theory and application of optimal transport are based on
regularizing the problem with an entropy term, which connects it to the
Schr\"odinger bridge problem and thus to stochastic optimal control. Moreover,
the entropy regularization makes the otherwise computationally demanding
optimal transport problem feasible even for large scale settings. This has lead
to an accelerated development of optimal transport based methods in a broad
range of fields. Many of these applications have a underlying graph structure,
for instance information fusion and tracking problems can be described by
trees. In this work we consider multi-marginal optimal transport problems with
a cost function that decouples according to a tree structure. The entropy
regularized multi-marginal optimal transport problem can be viewed as a
generalization of the Schr\"odinger bridge problem on the same tree, and by
utilizing these connections we extend the computational methods for the
classical optimal transport problem in order to solve structured multi-marginal
optimal transport problems in an efficient manner. In particular, the algorithm
requires only matrix-vector multiplications of relatively small dimensions. We
show that the multi-marginal regularization introduces less diffusion, compared
to the commonly used pairwise regularization, and is therefore more suitable
for many applications. Numerical examples illustrate this, and we finally apply
the proposed framework for tracking of an ensemble of indistinguishable agents.
|
We review some recent results on the theory of scattering and more precisely
on the local Cauchy problem at infinity in time for some long range nonlinear
systems including some form of the Schr"odinger equation. We consider in
particular the Wave-Schr"odinger system in space dimension 3, the
Maxwell-Schr"odinger system in space dimension 3, the Klein-Gordon-Schr"odinger
system in space dimension 2 and the Zakharov system in space dimensions 2 and
3. By the use of a direct method which is intrinsically restricted to the case
of small Schr"odinger data and to the borderline long range case, one can prove
the existence of solutions defined for large times and with prescribed
asymptotic behaviour in time, without any size restriction on the Wave, Maxwell
or Klein-Gordon data. Furthermore one obtains convergence rates of the
solutions to their asymptotic forms as negative powers of t in suitable norms.
| 0.873943 | 0.741065 | 0.132877 |
2004.06911
|
How to Securely Prune Bitcoin's Blockchain
|
Bitcoin was the first successful decentralized cryptocurrency and remains the
most popular of its kind to this day. Despite the benefits of its blockchain,
Bitcoin still faces serious scalability issues, most importantly its
ever-increasing blockchain size. While alternative designs introduced schemes
to periodically create snapshots and thereafter prune older blocks,
already-deployed systems such as Bitcoin are often considered incapable of
adopting corresponding approaches. In this work, we revise this popular belief
and present CoinPrune, a snapshot-based pruning scheme that is fully compatible
with Bitcoin. CoinPrune can be deployed through an opt-in velvet fork, i.e.,
without impeding the established Bitcoin network. By requiring miners to
publicly announce and jointly reaffirm recent snapshots on the blockchain,
CoinPrune establishes trust into the snapshots' correctness even in the
presence of powerful adversaries. Our evaluation shows that CoinPrune reduces
the storage requirements of Bitcoin already by two orders of magnitude today,
with further relative savings as the blockchain grows. In our experiments,
nodes only have to fetch and process 5 GiB instead of 230 GiB of data when
joining the network, reducing the synchronization time on powerful devices from
currently 5 h to 46 min, with even more savings for less powerful devices.
|
We relax the definition of consensus for the purpose of an efficient
cryptocurrency and introduce a new blockchain architecture called ABC that
offers the typical functionality of a cryptocurrency. By foregoing the
assumption of establishing consensus, we are able to design ABC with an array
of advantages compared to typical blockchain protocols: ABC is permissionless,
deterministic, and resilient to complete asynchrony. ABC features finality and
does not rely on wasteful proof-of-work.
Without establishing consensus, ABC cannot support certain applications, in
particular smart contracts that are open for interaction with unknown agents.
However, our system is an advantageous solution for many important use cases,
such as cryptocurrencies like Bitcoin.
| 0.827751 | 0.760806 | 0.066945 |
2004.06912
|
Combining Visible Light and Infrared Imaging for Efficient Detection of
Respiratory Infections such as COVID-19 on Portable Device
|
Coronavirus Disease 2019 (COVID-19) has become a serious global epidemic in
the past few months and caused huge loss to human society worldwide. For such a
large-scale epidemic, early detection and isolation of potential virus carriers
is essential to curb the spread of the epidemic. Recent studies have shown that
one important feature of COVID-19 is the abnormal respiratory status caused by
viral infections. During the epidemic, many people tend to wear masks to reduce
the risk of getting sick. Therefore, in this paper, we propose a portable
non-contact method to screen the health condition of people wearing masks
through analysis of the respiratory characteristics. The device mainly consists
of a FLIR one thermal camera and an Android phone. This may help identify those
potential patients of COVID-19 under practical scenarios such as pre-inspection
in schools and hospitals. In this work, we perform the health screening through
the combination of the RGB and thermal videos obtained from the dual-mode
camera and deep learning architecture.We first accomplish a respiratory data
capture technique for people wearing masks by using face recognition. Then, a
bidirectional GRU neural network with attention mechanism is applied to the
respiratory data to obtain the health screening result. The results of
validation experiments show that our model can identify the health status on
respiratory with the accuracy of 83.7\% on the real-world dataset. The abnormal
respiratory data and part of normal respiratory data are collected from Ruijin
Hospital Affiliated to The Shanghai Jiao Tong University Medical School. Other
normal respiratory data are obtained from healthy people around our
researchers. This work demonstrates that the proposed portable and intelligent
health screening device can be used as a pre-scan method for respiratory
infections, which may help fight the current COVID-19 epidemic.
|
The next generation of high-contrast imaging instruments will provide the
first unresolved image of an extrasolar planet. While the emitted infrared
light from the planet in thermal equilibrium should show almost no phase
effect, the reflected visible light will vary with the orbital phase angle. We
study the photometric variation of the reflected light with orbital phase of a
ringed extrasolar planet. We show that a ring around an extrasolar planet, both
obviously unresolved, can be detected by its specific photometric signature.
Keywords: Stars: planetary systems -- Planets: rings -- Extrasolar planet
characterization
| 0.812479 | 0.636056 | 0.176423 |
2004.06913
|
Electrical Detection of Ferroelectric-like Metals through Nonlinear Hall
Effect
|
Ferroelectric-like metals are a relatively rare class of materials that have
ferroelectric-like distortion and metallic conductivity. LiOsO$_3$ is the first
demonstrated and the most investigated ferroelectric-like metal. The presence
of free carriers makes them difficult to be studied by traditional
ferroelectric techniques. In this paper, using the symmetry analysis and
first-principles calculations, we demonstrate that the ferroelectric-like
transition of LiOsO$_3$ can be probed by a kind of electrical transport method
based on nonlinear Hall effect. The Berry curvature dipole exists in the
ferroelectric-like phase, and it can lead to a measurable nonlinear Hall
conductance with a conventional experimental setup. However, the symmetry of
the paraelectric-like phase LiOsO$_3$ vanishes the Berry curvature dipole. The
Berry curvature dipole shows a strong dependence on the polar displacement,
which might be helpful for the detection of polar order. The nonlinear Hall
effect provides an effective method for the detection of phase transition in
the study of the ferroelectric-like metals and promotes them to be applied in
the ferroelectric-like electronic devices.
|
Superlattices composed of ferromagnetic La0.6Sr0.4MnO3 and ferroelectric
0.7Pb(Mg0,33Nb0.66)O3 0.3(PbTiO3) layers were fabricated on (100) LaAlO3
substrates by pulsed laser deposition technique. Ferromagnetic and frequency
independent ferroelectric hysteresis characteristics established the biferroic
nature of the superlattices. Influence of magnetic field was observed in tuning
the P-E characteristics of the superlattices. Similar effect was observed on
application of a high DC electric field to the samples. The nature of the
observed ferroelectric properties and their modulation by applied magnetic and
electric fields were thus discussed in connection to existence of dielectric
passive layers at the ferroelectric/ferromagnetic interface.
| 0.854333 | 0.740289 | 0.114044 |
2004.06914
|
Mean plane of the Kuiper belt beyond 50 AU in the presence of Planet 9
|
Context. A recent observational census of Kuiper belt objects (KBOs) has
unveiled anomalous orbital structures. This has led to the hypothesis that an
additional $\sim5-10~m_{\oplus}$ planet exists. This planet, known as Planet 9,
occupies an eccentric and inclined orbit at hundreds of astronomical units.
However, the KBOs under consideration have the largest known semimajor axes at
$a>250$ AU; thus they are very difficult to detect.//
Aims. In the context of the proposed Planet 9, we aim to measure the mean
plane of the Kuiper belt at $a>50$ AU. In a comparison of the expected and
observed mean planes, some constraints would be put on the mass and orbit of
this undiscovered planet.
Methods. We adopted and developed the theoretical approach of Volk & Malhotra
(2017) to the relative angle $\delta$ between the expected mean plane of the
Kuiper belt and the invariable plane determined by the eight known planets.
Numerical simulations were constructed to validate our theoretical approach.
Then similar to Volk & Malhotra (2017), we derived the angle $\delta$ for the
real observed KBOs with $100<a<200$ AU, and the measurement uncertainties were
also estimated. Finally, for comparison, maps of the theoretically expected
$\delta$ were created for different combinations of possible Planet 9
parameters.
Results. The expected mean plane of the Kuiper belt nearly coincides with the
said invariable plane interior to $a=90$ AU. But these two planes deviate
noticeably from each other at $a>100$ AU owing to the presence of Planet 9
because the relative angle $\delta$ could be as large as $\sim10^{\circ}$.
Using the $1\sigma$ upper limit of $\delta<5^{\circ}$ deduced from real KBO
samples as a constraint, we present the most probable parameters of Planet 9.
|
It is proposed that planetesimals perturbed by Jovian mean-motion resonances
are the source of shock waves that form chondrules. It is considered that this
shock-induced chondrule formation requires the velocity of the planetesimal
relative to the gas disk to be on the order of > 7 km/s at 1 AU. In previous
studies on planetesimal excitation, the effects of Jovian mean-motion resonance
together with the gas drag were investigated, but the velocities obtained were
at most 8 km/s in the asteroid belt, which is insufficient to account for the
ubiquitous existence of chondrules. In this paper, we reexamine the effect of
Jovian resonances and take into account the secular resonance in the asteroid
belt caused by the gravity of the gas disk. We find that the velocities
relative to the gas disk of planetesimals a few hundred kilometers in size
exceed 12 km/s, and that this is achieved around the 3:1 mean-motion resonance.
The heating region is restricted to a relatively narrow band between 1.5 AU and
3.5 AU. Our results suggest that chondrules were produced effectively in the
asteroid region after Jovian formation. We also find that many planetesimals
are scattered far beyond Neptune. Our findings can explain the presence of
crystalline silicate in comets if the scattered planetesimals include silicate
dust processed by shock heating.
| 0.897104 | 0.751437 | 0.145667 |
2004.06915
|
A mathematical commitment without computational strength
|
We present a new manifestation of G\"odel's second incompleteness theorem and
discuss its foundational significance, in particular with respect to Hilbert's
program. Specifically, we consider a proper extension of Peano arithmetic
($\mathbf{PA}$) by a mathematically meaningful axiom scheme that consists of
$\Sigma^0_2$-sentences. These sentences assert that each computably enumerable
($\Sigma^0_1$-definable without parameters) property of finite binary trees has
a finite basis. Since this fact entails the existence of polynomial time
algorithms, it is important for computer science. On a technical level, our
axiom scheme is a variant of an independence result due to Harvey Friedman. At
the same time, the meta-mathematical properties of our axiom scheme distinguish
it from most known independence results: Due to its logical complexity, our
axiom scheme does not add computational strength. The only known method to
establish its independence relies on G\"odel's second incompleteness theorem.
In contrast, G\"odel's theorem is not needed for typical examples of
$\Pi^0_2$-independence (such as the Paris-Harrington principle), since
computational strength provides an extensional invariant on the level of
$\Pi^0_2$-sentences.
|
In this article, two-particle Greens functions are computed for different
strengths of interactions for particles in Hofstadter lattices, providing
informations on spectral weights of doublons. The calculations are performed
for a finite lattice without disorder. The splitting in spectra under the
effect of external magnetic field for non-interacting and interacting pairs are
compared.
| 0.791224 | 0.549798 | 0.241426 |
2004.06916
|
Flattening the curves: on-off lock-down strategies for COVID-19 with an
application to Brazi
|
The current COVID-19 pandemic is affecting different countries in different
ways. The assortment of reporting techniques alongside other issues, such as
underreporting and budgetary constraints, makes predicting the spread and
lethality of the virus a challenging task. This work attempts to gain a better
understanding of how COVID-19 will affect one of the least studied countries,
namely Brazil. Currently, several Brazilian states are in a state of lock-down.
However, there is political pressure for this type of measures to be lifted.
This work considers the impact that such a termination would have on how the
virus evolves locally. This was done by extending the SEIR model with an on /
off strategy. Given the simplicity of SEIR we also attempted to gain more
insight by developing a neural regressor. We chose to employ features that
current clinical studies have pinpointed has having a connection to the
lethality of COVID-19. We discuss how this data can be processed in order to
obtain a robust assessment.
|
SARS-COV-2 identified as COVID-19 in Wuhan city of China in the month of
December, 2019 has now been declared as pandemic by World Health Organization
whose transmission chain and cure both have emerged as a tough problem for the
medical fraternity. The reports pertaining to the treatment of this pandemic
are still lacking. We firmly believe that Nature itself provides a simple
solution for any complicated problem created in it which motivated us to carry
out In Silico investigations on some bioactive natural compounds reportedly
found in the fruits and leaves of Anthocephalus Cadamba which is a miraculous
plant found on the earth aiming to predict the potential inhibitors against
aforesaid virus. Having modeled the ground state ligand structure of the such
nine natural compounds applying density functional theory at B3LYP/631+G (d, p)
level we have performed their molecular docking with SARS-COV-2 protease to
calculate the binding affinity as well as to screen the binding at S-protein
site during ligand-protein interactions. Out of these nine studied naturally
occurring compounds; Oleanic Acid has been appeared to be potential inhibitor
for COVID-19 followed by Ursolic Acid,
IsoVallesiachotamine,Vallesiachotamine,Cadambine,Vincosamide-N-Oxide,
Isodihydroamino-cadambine, Pentyle Ester of Chlorogenic Acid and
D-Myo-Inositol. Hence these bioactive natural compounds or their structural
analogs may be explored as anti-COVID19 drug agent which will be possessing the
peculiar feature of cost-less synthesis and less or no side effect due to their
natural occurrence. The solubility and solvent-effect related to the
phytochemicals may be the point of concern. The In-vivo investigations on these
proposed natural compounds or on their structural analogs are invited for
designing and developing the potential medicine/vaccine for the treatment of
COVID-19 pandemic.
| 0.790534 | 0.682106 | 0.108428 |
2004.06917
|
Scalability Analysis of Programmable Metasurfaces for Beam Steering
|
Programmable metasurfaces have garnered significant attention as they confer
unprecedented control over the electromagnetic response of any surface. Such
feature has given rise to novel design paradigms such as Software-Defined
Metamaterials (SDM) and Reconfigurable Intelligent Surfaces (RIS) with multiple
groundbreaking applications. However, the development of programmable
metasurfaces tailored to the particularities of a potentially broad application
pool becomes a daunting task because the design space becomes remarkably large.
This paper aims to ease the design process by proposing a methodology that,
through a semi-analytical model of the metasurface response, allows to derive
performance scaling trends as functions of a representative set of design
variables. Although the methodology is amenable to any electromagnetic
functionality, this paper explores its use for the case of beam steering at 26
GHz for 5G applications. Conventional beam steering metrics are evaluated as
functions of the unit cell size, number of unit cell states, and metasurface
size for different incidence and reflection angles. It is shown that
metasurfaces 5$\lambda\times$5$\lambda$ or larger with unit cells of
$\lambda/3$ and four unit cell states ensure good performance overall. Further,
it is demonstrated that performance degrades significantly for angles larger
than $\theta > 60^o$ and that, to combat this, extra effort is needed in the
development of the unit cell. These performance trends, when combined with
power and cost models, will pave the way to optimal metasurface dimensioning.
|
Multilayer metasurfaces (MLMs) represent a versatile type of
three-dimensional optical metamaterials that could enable ultra-thin and
multi-functional photonic components. Herein we demonstrate an approach to
readily fabricate MLMs exploiting a thin film self-rolling technique. As
opposed to standard layer-by-layer approaches, all the metasurfaces are defined
within a single nanopatterning step, significantly reducing fabrication time
and costs. We realize two MLMs platforms relying on widely used nanopatterning
techniques, namely focused ion-beam and electron-beam lithographies. A first
example are MLMs comprised of nanohole patterns structured into
metal-dielectric seed bilayers. The second platform is comprised of vertical
stacks of angled plasmonic nanorod arrays separated by thin dielectric layers.
Such angled MLMs exhibit a selective response to circularly polarized light, in
agreement with previous works relying on layer-by-layer processes. Our approach
can pave the way for the efficient prototyping of novel MLMs, such as devices
with varying number of layers and configurations that can be fabricated on a
single chip.
| 0.912381 | 0.785513 | 0.126868 |
2004.06918
|
Explaining Regression Based Neural Network Model
|
Several methods have been proposed to explain Deep Neural Network (DNN).
However, to our knowledge, only classification networks have been studied to
try to determine which input dimensions motivated the decision. Furthermore, as
there is no ground truth to this problem, results are only assessed
qualitatively in regards to what would be meaningful for a human. In this work,
we design an experimental settings where the ground truth can been established:
we generate ideal signals and disrupted signals with errors and learn a neural
network that determines the quality of the signals. This quality is simply a
score based on the distance between the disrupted signals and the corresponding
ideal signal. We then try to find out how the network estimated this score and
hope to find the time-step and dimensions of the signal where errors are
present. This experimental setting enables us to compare several methods for
network explanation and to propose a new method, named AGRA for Accurate
Gradient, based on several trainings that decrease the noise present in most
state-of-the-art results. Comparative results show that the proposed method
outperforms state-of-the-art methods for locating time-steps where errors occur
in the signal.
|
In machine learning, error back-propagation in multi-layer neural networks
(deep learning) has been impressively successful in supervised and
reinforcement learning tasks. As a model for learning in the brain, however,
deep learning has long been regarded as implausible, since it relies in its
basic form on a non-local plasticity rule. To overcome this problem,
energy-based models with local contrastive Hebbian learning were proposed and
tested on a classification task with networks of rate neurons. We extended this
work by implementing and testing such a model with networks of leaky
integrate-and-fire neurons. Preliminary results indicate that it is possible to
learn a non-linear regression task with hidden layers, spiking neurons and a
local synaptic plasticity rule.
| 0.782261 | 0.733103 | 0.049158 |
2004.06919
|
Empirical Models for the Realistic Generation of Cooperative Awareness
Messages in Vehicular Networks
|
Most V2X (Vehicle-to-Everything) applications rely on broadcasting awareness
messages known as CAM (Cooperative Awareness Messages) in ETSI or BSM (Basic
Safety Message) in SAE standards. A large number of studies have been devoted
to guarantee their reliable transmission. However, to date, the studies are
generally based on simplified data traffic models that generate awareness
messages at periodic intervals or with a constant message size. These models do
not accurately represent the real generation of CAM messages that follow
specific mobility-based rules. Using simplified and unrealistic traffic models
can significantly impact the results and validity of the studies, and hence
accurate models for the generation of awareness messages are necessary. This
paper proposes the first set of models that can realistically generate CAM
messages. The models have been created from real traces collected by two car
manufacturers in urban, sub-urban and highway test drives. The models are based
on mth order Markov sources, and model the size of CAMs and the time interval
between CAMs. The models are openly provided to the community and can be easily
integrated into any simulator.
|
We study a decentralized cooperative stochastic multi-armed bandit problem
with $K$ arms on a network of $N$ agents. In our model, the reward distribution
of each arm is the same for each agent and rewards are drawn independently
across agents and time steps. In each round, each agent chooses an arm to play
and subsequently sends a message to her neighbors. The goal is to minimize the
overall regret of the entire network. We design a fully decentralized algorithm
that uses an accelerated consensus procedure to compute (delayed) estimates of
the average of rewards obtained by all the agents for each arm, and then uses
an upper confidence bound (UCB) algorithm that accounts for the delay and error
of the estimates. We analyze the regret of our algorithm and also provide a
lower bound. The regret is bounded by the optimal centralized regret plus a
natural and simple term depending on the spectral gap of the communication
matrix. Our algorithm is simpler to analyze than those proposed in prior work
and it achieves better regret bounds, while requiring less information about
the underlying network. It also performs better empirically.
| 0.837233 | 0.669432 | 0.1678 |
2004.06920
|
The length and depth of associative algebras
|
Recently there has been considerable interest in studying the length and the
depth of finite groups, algebraic groups and Lie groups. In this paper we
introduce and study similar notions for algebras. Let $k$ be a field and let
$A$ be an associative, not necessarily unital, algebra over $k$. An unrefinable
chain of $A$ is a chain of subalgebras $A=A_0>A_1>...>A_t=0$ for some integer
$t$ where each $A_i$ is a maximal subalgebra of $A_{i-1}$. The maximal
(respectively, minimal) length of such an unrefinable chain is called the
length (respectively, depth) of $A$. It turns out that finite length, finite
depth and finite dimension are equivalent properties for $A$. For $A$ finite
dimensional, we give a formula for the length of $A$, we bound the depth of
$A$, and we study when the length of $A$ equals its dimension and its depth
respectively. Finally, we investigate under what circumstances the dimension of
$A$ is bounded above by a function of its length, or its depth, or its length
minus its depth.
|
In this paper, by using Gr\"obner-Shirshov bases, we show that in the
following classes, each (resp. countably generated) algebra can be embedded
into a simple (resp. two-generated) algebra: associative differential algebras,
associative $\Omega$-algebras, associative $\lambda$-differential algebras. We
show that in the following classes, each countably generated algebra over a
countable field $k$ can be embedded into a simple two-generated algebra:
associative algebras, semigroups, Lie algebras, associative differential
algebras, associative $\Omega$-algebras, associative $\lambda$-differential
algebras. Also we prove that any countably generated module over a free
associative algebra $k< X>$ can be embedded into a cyclic $k< X>$-module, where
$|X|>1$. We give another proofs of the well known theorems: each countably
generated group (resp. associative algebra, semigroup, Lie algebra) can be
embedded into a two-generated group (resp. associative algebra, semigroup, Lie
algebra).
| 0.843603 | 0.792357 | 0.051246 |
2004.06921
|
Polyomino matchings in generalised games of memory and linear $k$-chord
diagrams
|
In the game of memory, pairs of matched cards are placed in an array. The
present author has previously enumerated configurations by dominoes -- where
matched pairs are adjacent. In this paper, we introduce a generalised game of
memory where pairs are replaced with matched sets of size $k$, and obtain
several results for one-dimensional arrays. We generalise the notion of linear
chord diagrams to the case of matched sets of size $k$, which we call $k$-chord
diagrams. We provide formal generating functions and recursion relations
enumerating these $k$-chord diagrams by the number of polyominoes, where the
latter is defined as all members of the matched set being adjacent, and is the
generalisation of a short chord or loop in a linear chord diagram. We also
enumerate $k$-chord diagrams by the number of connected components built from
polyominoes and provide the associated generating functions in this case. We
show that the distributions of polyominoes and connected components are
asymptotically Poisson, and provide the associated means. Finally, we provide
recursion relations enumerating non-crossing $k$-chord diagrams by the number
of polyominoes, generalising the Narayana numbers, and establish asymptotic
normality, providing the associated means and variances.
|
Soft gluon exponentiation in non-abelian gauge theories can be described in
terms of webs. So far this description has been restricted to amplitudes with
two hard partons, where webs were defined as the colour-connected subset of
diagrams. Here we generalise the concept of webs to the multi-leg case, where
the hard interaction involves non-trivial colour flow. Using the replica trick
from statistical physics we solve the combinatorial problem of non-abelian
exponentiation to all orders. In particular, we derive an algorithm for
computing the colour factor associated with any given diagram in the exponent.
The emerging result is exponentiation of a sum of webs, where each web is a
linear combination of a subset of diagrams that are mutually related by
permuting the eikonal gluon attachments to each hard parton. These linear
combinations are responsible for partial cancellation of subdivergences,
conforming with the renormalization of a multi-leg eikonal vertex. We also
discuss the generalisation of exponentiation properties to beyond the eikonal
approximation.
| 0.918298 | 0.702179 | 0.216118 |
2004.06922
|
Particle monolayer assembly in evaporating salty colloidal droplets
|
Ring-shaped deposits can be often found after a droplet evaporates on a
substrate. If the fluid in the droplet is a pure liquid and its contact line
remains pinned during the process, the mechanism behind such ring-shaped
deposition is the well-known coffee-stain effect. However, adding small amounts
of salt to such a droplet can change the internal flow dramatically and
consequently change the deposition mechanism. Due to an increase of surface
tension in the contact line region, a Marangoni flow arises which is directed
from the apex of the droplet towards the contact line. As a result, particles
arrive at the contact line following the liquid-air interface of the droplet.
Interestingly, the deposit is also ring-shaped, as in the classical
coffee-stain effect, but with a radically different morphology: particles form
a monolayer along the liquid-air interface of the droplet, instead of a compact
three-dimensional deposit. Using confocal microscopy, we study
particle-per-particle how the assembly of the colloidal monolayer occurs during
the evaporation of droplets for different initial concentration of sodium
chloride and initial particle dilution. Our results are compared with classical
diffusion-limited deposition models and open up an interesting scenario of
deposits via interfacial particle assembly, which can easily yield homogeneous
depositions by manipulating the initial salt and particle concentration in the
droplet.
|
The effective interaction between spherical colloids in nematic liquid
crystals is investigated in the framework of the Landau-de Gennes theory. The
colloids differ through their interaction with the nematic. While both
particles induce quadrupolar far-field distortions in the nematic matrix, with
unlike quadrupole moments, one favours homeotropic and the other degenerate
planar anchoring of the nematic director. In the strong anchoring regime the
colloids with homeotropic anchoring are accompanied by an equatorial
disclination line defect, known as "Saturn-ring", while the colloids with
degenerate planar anchoring nucleate a pair of antipodal surface defects,
called "Boojums". In the linear (large-distance) regime the colloidal
interactions are of the quadrupolar type, where the quadrupoles have opposite
signs. These are attractive when the colloids are aligned either parallel or
perpendicular to the far-field director. At short distance, non-linear effects
including "direct" interactions between defects give rise to a repulsion
between the particles, which prevents them from touching. This finding supports
the stability of nematic colloidal square crystallites the assembly of which
has been reported recently.
| 0.825718 | 0.704629 | 0.121089 |
2004.06923
|
An isomorphism between the convolution product and the componentwise sum
connected to the D'Arcais numbers and the Ramanujan tau function
|
Given a commutative ring $R$ with identity, let $H_R$ be the set of sequences
of elements in $R$. We investigate a novel isomorphism between $(H_R, +)$ and
$(\tilde H_R,*)$, where $+$ is the componentwise sum, $*$ is the convolution
product (or Cauchy product) and $\tilde H_R$ the set of sequences starting with
$1_R$. We also define a recursive transform over $H_R$ that, together to the
isomorphism, allows to highlight new relations among some well studied integer
sequences. Moreover, these connections allow to introduce a family of
polynomials connected to the D'Arcais numbers and the Ramanujan tau function.
In this way, we also deduce relations involving the Bell polynomials, the
divisor function and the Ramanujan tau function. Finally, we highlight a
connection between Cauchy and Dirichlet products.
|
Let $X$ be a smooth projective curve of genus $g\geq 2$ over the complex
numbers. Fix $n\geq 2$, and an integer $d$. A pair $(E,\phi)$ over $X$ consists
of an algebraic vector bundle $E$ of rank $n$ and degree $d$ over $X$ and a
section $\phi$. There is a concept of stability for pairs which depends on a
real parameter $\tau$. Let $M_\tau(n,d)$ be the moduli space of
$\tau$-semistable pairs of rank $n$ and degree $d$ over $X$. We prove that the
cohomology groups of $M_\tau(n,d)$ are Hodge structures isomorphic to direct
summands of tensor products of the Hodge structure $H^1(X)$. This implies a
similar result for the moduli spaces of stable vector bundles over $X$.
| 0.88008 | 0.693396 | 0.186685 |
2004.06924
|
Note on Anomalous Current for Free Theory
|
Recently it is found that, due to Weyl anomaly, an external magnetic field
can induce anomalous current near a boundary. In this note, we study anomalous
currents for complex scalars and Dirac fields in general dimensions. We develop
a perturbation method to calculate Green's function in the spacetime with
boundaries. By applying this method, we obtain anomalous currents up to the
linear order of magnetic fields in a half space and in a strip. To the best of
our knowledge, the results for Dirac fermions and for strips are new. It is
remarkable that, unlike the scalars and holographic BCFT, the anomalous
currents of Dirac fields are independent of boundary conditions. Besides, the
currents of Dirac fields are always larger than those of complex scalars.
Finally, we find an exact formal expression of the anomalous current in a half
space. The results are expressed in momentum integrals, which can be evaluated
numerically. We find that the mass suppresses the anomalous currents as
expected.
|
This work puts forward a generalization of the well-known rocking Markovian
Brownian ratchets to the realm of antipersistent non-Markovian subdiffusion in
viscoelastic media. A periodically forced subdiffusion in a parity-broken
ratchet potential is considered within the non-Markovian generalized Langevin
equation (GLE) description with a power-law memory kernel $\eta(t)\propto
t^{-\alpha}$ ($0<\alpha<1$). It is shown that subdiffusive rectification
currents, defined through the mean displacement and subvelocity $v_{\alpha}$,
$<\delta x(t)>\sim v_{\alpha} t^{\alpha}/ \Gamma(1+\alpha)$, emerge
asymptotically due to the breaking of the detailed balance symmetry by driving.
The asymptotic exponent is $\alpha$, the same as for free subdiffusion,
$<\delta x^2(t)>\propto t^\alpha$.
However, a transient to this regime with some time-dependent $\alpha_{\rm
eff}(t)$ gradually decaying in time, $\alpha\leq \alpha_{\rm eff}(t)\leq 1$,
can be very slow depending on the barrier height and the driving field
strength. In striking contrast to its normal diffusion counterpart, the
anomalous rectification current is absent asymptotically in the limit of
adiabatic driving with frequency $\Omega\to 0$, displaying a resonance like
dependence on the driving frequency. However, an anomalous current inversion
occurs for a sufficiently fast driving, like in the normal diffusion case. In
the lowest order of the driving field, such a rectification current presents a
quadratic response effect. Beyond perturbation regime it exhibits a broad
maximum versus the driving field strength. Moreover, anomalous current exhibits
a maximum versus the potential amplitude.
| 0.8375 | 0.67086 | 0.16664 |
2004.06925
|
Electronic multipoles and multiplet pairs induced from Pomeranchuk and
Cooper instabilities of Bogoliubov Fermi surfaces
|
It has recently been pointed out that Fermi surfaces can remain even in the
superconductors under the symmetric spin-orbit interaction and broken
time-reversal symmetry. Using the linear response theory, we study the
instability of such systems toward ordering, which is an intrinsic property of
the Fermi surfaces. The ordered states are classified into diagonal and
offdiagonal ones, each of which respectively indicates the Pomeranchuk
instability and Cooper pairing not of original electron but of Bogoliubov
particles (bogolons). The corresponding order parameters are expanded by
multipole moments (diagonal order parameter) and multiplet pair amplitudes
(offdiagonal order parameter) of original electrons, which are induced by the
internal fields arising from bogolons' ordering. While the bogolons' order
parameters partially inherit the characters of the original electrons, many
order parameter components mix with similar magnitude. Hence there is no
clear-cut distinction whether the phase transition is diagonal or offdiagonal
ordering in terms of the original electrons. These ordering instabilities
inside the superconducting states provide insights into the superconductors
which have the second phase transition below the first transition temperature.
|
The Tomasch effect (TE) is due to quasiparticle interference (QPI) as induced
by a nonuniform superconducting order parameter, which results in oscillations
in the density of states (DOS) at energies above the superconducting gap.
Quantum confinement in nanoscale superconductors leads to an inhomogenerous
distribution of the Cooper-pair condensate, which we found triggers the
manifestation of a new TE. We investigate the electronic structure of the
nanoscale superconductors by solving the Bogoliubov-de Gennes (BdG) equations
self-consistently and obtain the TE determined by two types of processes,
involving two or three particle QPIs. Both types of QPIs result in additional
BCS-like Bogoliubov-quasiparticles and BCS-like energy gaps leading to
oscillations in the DOS and modulated wave patterns in the local density of
states. These effects are strongly related to the symmetries of the system. A
reduced $4 \times 4$ inter-subbands BdG Hamiltonian is established in order to
describe analytically the TE of two-QPIs. Our study is relevant to nanoscale
superconductors, either nanowires or thin films, Bose-Einsten condensates and
confined systems such as two-dimensional electron gas interface
superconductivity.
| 0.863774 | 0.798288 | 0.065487 |
2004.06926
|
A Cold and Diffuse Giant Molecular Filament in the Region of
$l=41^\circ$, $b=-1^\circ$
|
Data of $^{12}$CO/$^{13}$CO/C$^{18}$O $J=1\to0$ emission toward the Galactic
plane region of $l=35^\circ$ to $45^\circ$ and $b= -5^\circ$ to $+5^\circ$ are
available with the Milky Way Imaging Scroll Painting (MWISP) project. Using the
data, we found a giant molecular filament (GMF) around
$l\approx38\sim42^\circ$, $b\approx-3.5\sim0^\circ$, $V_{LSR} \approx 27 \sim
40$ km~s$^{-1}$, named the GMF MWISP G041-01. At a distance of 1.7 kpc, the GMF
is about 160 pc long. With a median excitation temperature about 7.5 K and a
median column density about $10^{21}$ cm$^{-2}$, this GMF is very cold and very
diffuse compared to known GMFs. Using the morphology in the data cube, the GMF
is divided into four components among which three show filamentary structure.
Masses of the components are $ 10^3 \sim 10^4 M_\odot$, with a total mass for
the whole filament being about $7\times10^4 M_\odot$ from the LTE method.
$^{13}$CO cores inside each component are searched. Virial parameters are about
2.5 for these cores and have a power-law index of -0.34 against the mass. The
mass fraction of dense cores traced by $^{13}$CO to the diffuse clouds traced
by $^{12}$CO are about 7% for all components of the GMF. We found signatures of
possible large scale filament-filament collision in the GMF.
|
We give a description of pairs of complex rational functions $A$ and $U$ of
degree at least two such that for every $d\geq 1$ the algebraic curve $A^{\circ
d}(x)-U(y)=0$ has a factor of genus zero or one. In particular, we show that if
$A$ is not a `generalized Latt\`es map', then this condition is satisfied if
and only if there exists a rational function $V$ such that $U\circ V=A^{\circ
l}$ for some $l\geq 1.$ We also prove a version of the dynamical Mordell-Lang
conjecture, concerning intersections of orbits of points from $\mathbb P^1(K)$
under iterates of $A$ with the value set $U(\mathbb P^1(K))$, where $A$ and $U$
are rational functions defined over a number field $K.$
| 0.817513 | 0.660801 | 0.156712 |
2004.06928
|
Preparation and characterization of PZT/PVDF composites films fabricated
by electrospinning method
|
In this paper, we present some properties of Lead Zirconate Titanate - Poly
Vinylidene Flouride composites. The obtained results indicate that PZT-PVDF
fibers involved firms were achieved using electrospining method. In other hand,
the effect of grain size, content and other factors under the purview of
Young's modulus and ferroelectric properties.
|
The structures and electronic states in all polymorphs of poly(vinylidene
fluoride) (PVDF) were calculated in various levels using the CRYSTAL software.
The calculated lattice constants with PBE0/cc-pVTZ agreed well with
experimental values. The molecular structure of PVDF was clarified. Derived
electronic and phonon dispersions correspond closely with the experimental
valence X-ray photoelectron and infrared (IR)/Raman spectra, respectively. The
amount of spontaneous polarization in polar crystal forms was determined and
the effect of long-range Coulomb interactions were discussed. The calculation
method used in this report was confirmed to be precise and shows promise for
examining ferroelectric polymers.
| 0.829604 | 0.749894 | 0.07971 |
2004.06930
|
Light Weight Residual Dense Attention Net for Spectral Reconstruction
from RGB Images
|
Hyperspectral Imaging is the acquisition of spectral and spatial information
of a particular scene. Capturing such information from a specialized
hyperspectral camera remains costly. Reconstructing such information from the
RGB image achieves a better solution in both classification and object
recognition tasks. This work proposes a novel light weight network with very
less number of parameters about 233,059 parameters based on Residual dense
model with attention mechanism to obtain this solution. This network uses
Coordination Convolutional Block to get the spatial information. The weights
from this block are shared by two independent feature extraction mechanisms,
one by dense feature extraction and the other by the multiscale hierarchical
feature extraction. Finally, the features from both the feature extraction
mechanisms are globally fused to produce the 31 spectral bands. The network is
trained with NTIRE 2020 challenge dataset and thus achieved 0.0457 MRAE metric
value with less computational complexity.
|
Deep learning has been successfully applied to the single-image
super-resolution (SISR) task with great performance in recent years. However,
most convolutional neural network based SR models require heavy computation,
which limit their real-world applications. In this work, a lightweight SR
network, named Adaptive Weighted Super-Resolution Network (AWSRN), is proposed
for SISR to address this issue. A novel local fusion block (LFB) is designed in
AWSRN for efficient residual learning, which consists of stacked adaptive
weighted residual units (AWRU) and a local residual fusion unit (LRFU).
Moreover, an adaptive weighted multi-scale (AWMS) module is proposed to make
full use of features in reconstruction layer. AWMS consists of several
different scale convolutions, and the redundancy scale branch can be removed
according to the contribution of adaptive weights in AWMS for lightweight
network. The experimental results on the commonly used datasets show that the
proposed lightweight AWSRN achieves superior performance on x2, x3, x4, and x8
scale factors to state-of-the-art methods with similar parameters and
computational overhead. Code is avaliable at:
https://github.com/ChaofWang/AWSRN
| 0.851435 | 0.754004 | 0.09743 |
2004.06931
|
Decoding algorithms of monotone codes and azinv codes and their unified
view
|
This paper investigates linear-time decoding algorithms for two classes of
error-correcting codes. One of the classes is monotone codes which are known as
single deletion codes. The other is azinv codes which are known as single
balanced adjacent deletion codes. As results, this paper proposes
generalizations of Levenshtein's decoding algorithm for Levenshtein's single
deletion codes. This paper points out that it is possible to unify our new two
decoding algorithms.
|
The normalized min-sum algorithm can achieve near-optimal performance at
decoding LDPC codes. However, it is a critical question to understand the
mathematical principle underlying the algorithm. Traditionally, people thought
that the normalized min-sum algorithm is a good approximation to the
sum-product algorithm, the best known algorithm for decoding LDPC codes and
Turbo codes. This paper offers an alternative approach to understand the
normalized min-sum algorithm. The algorithm is derived directly from
cooperative optimization, a newly discovered general method for
global/combinatorial optimization. This approach provides us another
theoretical basis for the algorithm and offers new insights on its power and
limitation. It also gives us a general framework for designing new decoding
algorithms.
| 0.880686 | 0.819624 | 0.061061 |
2004.06932
|
Space-time Euler discretization schemes for the stochastic 2D
Navier-Stokes equations
|
We prove that the implicit time Euler scheme coupled with finite elements
space discretization for the 2D Navier-Stokes equations on the torus subject to
a random perturbation converges in $L^2(\Omega)$, and describe the rate of
convergence for an $H^1$-valued initial condition. This refines previous
results which only established the convergence in probability of these
numerical approximations. Using exponential moment estimates of the solution of
the stochastic Navier-Stokes equations and convergence of a localized scheme,
we can prove strong convergence of this space-time approximation. The speed of
the $L^2(\Omega)$-convergence depends on the diffusion coefficient and on the
viscosity parameter. In case of Scott-Vogelius mixed elements and for an
additive noise, the convergence is polynomial.
|
The Beale-Kato-Majda theorem contains a single criterion that controls the
behaviour of solutions of the $3D$ incompressible Euler equations. Versions of
this theorem are discussed in terms of the regularity issues surrounding the
$3D$ incompressible Euler and Navier-Stokes equations together with a
phase-field model for the statistical mechanics of binary mixtures called the
$3D$ Cahn-Hilliard-Navier-Stokes (CHNS) equations. A theorem of BKM-type is
established for the CHNS equations for the full parameter range. Moreover, for
this latter set, it is shown that there exists a Reynolds number and a bound on
the energy-dissipation rate that, remarkably, reproduces the $Re^{3/4}$ upper
bound on the inverse Kolmogorov length normally associated with the
Navier-Stokes equations alone. An alternative length-scale is introduced and
discussed, together with a set of pseudo-spectral computations on a $128^{3}$
grid.
| 0.892383 | 0.748184 | 0.144198 |
2004.06933
|
An efficient deception architecture for cloud-based virtual networks
|
Emerging deceptive systems present a new promise for the uprising security
problems in cloud-based virtual networks, especially those operated by small
and medium enterprises. The main goal of deceptive systems is to form a layer
of defensive nodes in an Internet-accessible cloud-based virtual network to
distract and deceive malicious clients. While numerous approaches provide
distinct models for developing decisive systems, misery digraphs present a
promising decisive model for distracting powerful remote intrusions. Misery
digraphs can delay access to targets deep in a cloud-based virtual network. A
central challenge to the theory of misery digraphs is verifying their
applicability in prominent cloud computing platforms as well as measuring the
efficiency of networks that adapt them. Thus, architectural support is needed
that can be realized with long-term support technologies and can be deployed
for large networks. This work presents and analyzes a high-throughput
architecture for misery digraphs, embarking on implementation details and
performance analysis. Full implementation of the architecture in Amazon Web
Services imposes modest performance delays in the request processing, while
highly delaying stealth intrusions in the network.
|
The ICT (Information Communication Technologies) ecosystem is estimated to be
responsible, as of today, for 10% of the total worldwide energy demand -
equivalent to the combined energy production of Germany and Japan. Cloud
storage, mainly operated through large and densely-packed data centers,
constitutes a non-negligible part of it. However, since the cloud is a
fast-inflating market and the energy-efficiency of data centers is mostly an
insensitive issue for the collectivity, its carbon footprint shows no signs of
slowing down. In this paper, we analyze a novel paradigm for cloud storage
(implemented by Cubbit, http://cubbit.io), in which data are stored and
distributed over a network of p2p-interacting ARM-based single-board devices.
We compare Cubbit's distributed cloud to the traditional centralized solution
in terms of environmental footprint and energy efficiency. We demonstrate that,
compared to the centralized cloud, the distributed architecture of Cubbit has a
carbon footprint reduced of a 77% factor for data storage and of a 50% factor
for data transfers. These results provide an example of how a radical paradigm
shift in a large-reach technology can benefit both the final consumer as well
as our society as a whole.
| 0.833961 | 0.641658 | 0.192303 |
2004.06934
|
Self Provers and $\Sigma_1$ Sentences
|
This paper from 2012 is the second in a series of three papers. All three
papers deal with interpretability logics and related matters. In the first
paper a construction method was exposed to obtain models of these logics. Using
this method, we obtained some completeness results, some already known, and
some new.
In this paper, we will set the construction method to work to obtain more
results. First, the modal completeness of the logic ${\textbf{IL}}({\sf M})$ is
proved using the construction method. This is not a new result, but by using
our new proof we can obtain new results. Among these new results are some
admissible rules for ${\textbf{IL}}({\sf M})$ and ${\textbf{GL}}$.
Moreover, the new proof will be used to classify all the essentially
$\Delta_1$ and also all the essentially $\Sigma_1$ formulas of
${\textbf{IL}}({\sf M})$. Closely related to essentially $\Sigma_1$ sentences
are the so-called \emph{self provers}. A self-prover is a formula $\varphi$
which implies its own provability, that is $\varphi \to \Box \varphi$. Each
formula $\varphi$ will generate a self prover $\varphi \wedge \Box \varphi$. We
will use the construction method to characterize those sentences of
${\textbf{GL}}$ that generate a self prover that is trivial in the sense that
it is $\Sigma_1$.
|
Training neural models for named entity recognition (NER) in a new domain
often requires additional human annotations (e.g., tens of thousands of labeled
instances) that are usually expensive and time-consuming to collect. Thus, a
crucial research question is how to obtain supervision in a cost-effective way.
In this paper, we introduce "entity triggers", an effective proxy of human
explanations for facilitating label-efficient learning of NER models. An entity
trigger is defined as a group of words in a sentence that helps to explain why
humans would recognize an entity in the sentence.
We crowd-sourced 14k entity triggers for two well-studied NER datasets. Our
proposed model, named Trigger Matching Network, jointly learns trigger
representations and soft matching module with self-attention such that can
generalize to unseen sentences easily for tagging. Experiments show that the
framework is significantly more cost-effective such that using 20% of the
trigger-annotated sentences can result in a comparable performance of
conventional supervised approaches using 70% training data. We publicly release
the collected entity triggers and our code.
| 0.815576 | 0.61903 | 0.196546 |
2004.06935
|
Intelligent Slicing of Radio Resource Control Layer for Cellular IoT:
Design and Implementation
|
The cellular internet of things (CIoT) has become an important branch to
cater various applications of IoT devices. Within CIoT, the radio resource
control (RRC) layer is responsible for fundamental functionalities such as
connection control and bearer establishment in radio access network (RAN). The
emergence of various IoT scenarios and diversified service requirements have
made both RAN slicing and intelligent control imperative requirement in RRC
layer. This paper focuses on enhancing standardized capabilities of CIoT RRC
layer, by designing and implementing a new architecture which accommodate RRC
slicing and intelligent controller. The architecture aims to realize
functionalities of creating, modifying, and deleting slices in RRC layer, while
the intelligent controller is added to satisfy various and dynamic service
requirements of different IoT devices smartly. The proposed architecture is
further implemented on an open-source software platform OpenAirInterface (OAI),
on top of which the effectiveness of RRC slicing is validated and one
proof-of-concept case to adopt reinforcement learning to dynamically tune
discontinuous reception parameters therein is presented. Simulation results
have demonstrated the effectiveness of the proposed intelligent RRC slicing
architecture.
|
We target the problem of controlling electrical microgrids with little
inertia in real time. We consider a central controller and a number of
resources, where each resource is either a load, a generator, or a combination
thereof, like a battery. The controller periodically computes power setpoints
for the resources based on the estimated state of the grid and an overall
objective, and subject to safety constraints. Each resource is augmented with a
resource agent that a) implements the setpoint requests sent by the controller
on the resource, and b) translates device-specific information about the
resource into a device-independent representation and transmits this to the
controller.
We focus on the resource agents and their impact on the overall system's
behavior. Intuitively, for the system to converge to the objective, the
resource agents should be obedient to the requests from the controller, in the
sense that the actually implemented setpoint should be close to the requested
setpoint, at least on average. This can be important especially when a
controller that performs continuous optimization is used (for the sake of
performance) to control discrete resources (which have a discrete set of
implementable setpoints).
We formalize obedience by defining the notion of $c$-bounded
accumulated-error. We then demonstrate its usefulness, by presenting
theoretical results (for a simple scenario) and simulation results (for a more
realistic setting) that indicate that, if all resource agents in the system
have bounded accumulated-error, the closed-loop system converges on average to
the objective. Finally, we show how to design resource agents that provably
have bounded accumulated-error for various types of resources, such as
resources with uncertainty (e.g., PV panels) and resources with a discrete set
of implementable setpoints (e.g., on-off heating systems).
| 0.878645 | 0.659362 | 0.219283 |
2004.06936
|
RES-NOVA: A revolutionary neutrino observatory based on archaeological
lead
|
We present the RES-NOVA project which will hunt neutrinos from core-collapse
supernovae (SN) via coherent elastic neutrino-nucleus scattering (CE$\nu$NS)
using an array of archaeological lead (Pb) based cryogenic detectors. The high
CE$\nu$NS cross-section on Pb and the ultra-high radiopurity of archaeological
Pb enable the operation of a high statistics experiment equally sensitive to
all neutrino flavors with reduced detector dimensions and easy scalability to
larger detector volumes. RES-NOVA will be operating in three phases with
increasing detector volumes: (60 cm)$^3$, (140 cm)$^3$, and ultimately
15$\times$(140 cm)$^3$. It will be sensitive to SN bursts up to Andromeda with
5$\sigma$ sensitivity with already existing technology and will have excellent
energy resolution with $1$ keV threshold. Within our Galaxy, it will be
possible to discriminate core-collapse SNe from black hole forming collapses
with no ambiguity even in the first phase of RES-NOVA. The average neutrino
energy of all flavors, the SN neutrino light curve, and the total energy
emitted in neutrinos will be constrained with a precision of few $\%$ in the
final detector phase. RES-NOVA will potentially detect the first flavor-blind
neutrinos from the diffuse SN neutrino background with an exposure of $620$
ton$^{-1}$ yr$^{-1}$. The RES-NOVA project has the potential to lay down the
foundations for a new generation of neutrino telescopes, while relying on a
very simple technological setup.
|
The IceCube neutrino observatory, a cubic-kilometer particle detector at the
South Pole, first announced the discovery of an astrophysical flux of
high-energy neutrinos in the TeV-PeV range in 2013, followed in 2017 by the
detection of a high-energy neutrino event in temporal and directional
correlation with the flaring gamma-ray blazar TXS 0506+056. This observation,
combined with archival neutrino detections in 2014-2015, has provided
compelling evidence for the detection of the first high-energy astrophysical
neutrino source. A promising way of detecting additional sources is to
correlate neutrino detections with sources where a hadronic electromagnetic
signature is observed. If blazars are a significant source of neutrinos, the
high-energy gamma rays produced in pionic decays in coincidence with the
neutrinos may cascade in the strong photons fields present in blazar jets,
leading to strong emission in the hard X-ray to MeV gamma-ray energy range. We
here present plans for a search for neutrino emission from a large sample of
hard X-ray sources from the BAT AGN Spectroscopic Survey (BASS).
| 0.863026 | 0.774208 | 0.088817 |
2004.06937
|
On essential-selfadjointness of differential operators on closed
manifolds
|
The goal of this note is to present some arguments leading to the conjecture
that a formally self-adjoint differential operator on a closed manifold is
essentially self-adjoint if and only if the Hamiltonian flow of its symbol is
complete. This holds for differential operators of degree two on the circle,
for differential operators of degree one on any closed manifold and for generic
Lorentzian Laplacians on surfaces.
|
We investigate the Dolbeault operator on a pair of pants, i.e., an elementary
cobordism between a circle and the disjoint union of two circles. This operator
induces a canonical selfadjoint Dirac operator $D_t$ on each regular level set
$C_t$ of a fixed Morse function defining this cobordism. We show that as we
approach the critical level set $C_0$ from above and from below these operators
converge in the gap topology to (different) selfadjoint operators $D_\pm$ that
we describe explicitly. We also relate the Atiyah-Patodi-Singer index of the
Dolbeault operator on the cobordism to the spectral flows of the operators
$D_t$ on the complement of $C_0$ and the Kashiwara-Wall index of a triplet of
finite dimensional lagrangian spaces canonically determined by $C_0$.
| 0.890526 | 0.800645 | 0.089881 |
2004.06938
|
Symmetric mixtures of pusher and puller microswimmers behave as
noninteracting suspensions
|
Suspensions of rear- and front-actuated microswimmers immersed in a fluid,
known respectively as "pushers" and "pullers", display qualitatively different
collective behaviours: beyond a characteristic density, pusher suspensions
exhibit a hydrodynamic instability leading to collective motion known as active
turbulence, a phenomenon which is absent for pullers. In this Letter, we
describe the collective dynamics of a binary pusher-puller mixture using
kinetic theory and large-scale particle-resolved simulations. We derive and
verify an instability criterion, showing that the critical density for active
turbulence moves to higher values as the fraction $\chi$ of pullers is
increased and disappears for $\chi \geq 0.5$. We then show analytically and
numerically that the two-point hydrodynamic correlations of the 1:1 mixture are
equal to those of a suspension of noninteracting swimmers. Strikingly, our
numerical analysis furthermore shows that the full probability distribution of
the fluid velocity fluctuations collapses onto the one of a noninteracting
system at the same density, where swimmer-swimmer correlations are strictly
absent. Our results thus indicate that the fluid velocity fluctuations in 1:1
pusher--puller mixtures are exactly equal to those of the corresponding
noninteracting suspension at any density, a surprising cancellation with no
counterpart in equilibrium long-range interacting systems.
|
A mixture of hard-sphere particles and model emulsion droplets is studied
with a Brownian dynamics simulation. We find that the addition of nonwetting
emulsion droplets to a suspension of pure hard spheres can lead to both
gas-liquid and fluid-solid phase separations. Furthermore, we find a stable
fluid of hard-sphere clusters. The stability is due to the saturation of the
attraction that occurs when the surface of the droplets is completely covered
with colloidal particles. At larger emulsion droplet densities a percolation
transition is observed. The resulting networks of colloidal particles show
dynamical and mechanical properties typical of a colloidal gel. The results of
the model are in good qualitative agreement with recent experimental findings
[E. Koos and N. Willenbacher, Science 331, 897 (2011)] in a mixture of
colloidal particles and two immiscible fluids.
| 0.878877 | 0.770251 | 0.108626 |
2004.06939
|
Pressure and Inversion Symmetry Breaking Field Driven First Order Phase
Transition and Formation of Dirac Circle in Perovskites
|
Through model Hamiltonian studies and first-principle electronic structure
calculations, we have examined the effect of inversion symmetry breaking (ISB)
field and hydrostatic pressure on the band topology of halide perovskites by
taking MAPbI$_3$ as a prototype. Our study shows that while hydrostatic
pressure induces normal to topological insulator continuous phase transition,
the ISB field makes it first order. The pressure smoothly reduces the normal
bandgap, and without ISB, the system achieves a gapless state before it
produces a non-trivial bandgap with inverted characters. The ISB field does not
stabilize the gapless state, and therefore, the discontinuity in the bandgap
with pressure gives rise to the first-order transition. Furthermore, in the
non-trivial phase, the ISB field forms an invariant surface Dirac circle in the
neighbourhood of TRIM, which is first of its kind. The circle is formed due to
interpenetration of Dirac cones resembling the band topology of AA-stacked
bilayer graphene.
|
Phase transition of decay rate from quantum tunneling to thermal activity
regimes is investigated in (3+1)-dimensional field theories with symmetry
breaking term $f\phi$. By applying the two independent criteria for the sharp
first-order transition to the same model, the upper and lower bounds of
critical value of the symmetry breaking parameter are obtained. Unlike two
dimensional case continuum states of the fluctuation operator near sphaleron
solution play an important role to determine the type of transition.
| 0.891233 | 0.73915 | 0.152083 |
2004.06940
|
Pilot Assignment in Cell-Free Massive MIMO based on the Hungarian
Algorithm
|
This letter focuses on the problem of pilot assignment in cell-free massive
MIMO systems. Exploiting the well-known Hungarian algorithms, several
algorithms are proposed, either maximizing the system throughput or maximizing
the system fairness. The algorithms operate based on the knowledge of large
scale fading coefficients and of the positions of the mobile stations. However,
the latter information is not really necessary, since the paper shows that
large scale fading coefficients can be used as a proxy for the distances
between the mobile users and the access points with a very limited performance
loss. Numerical results will show that the proposed pilot assignment algorithms
outperform several competing alternatives available in the literature.
|
Cell-Free (CF) Massive multiple-input multiple-output(MIMO) is a distributed
antenna system, wherein a large number of back-haul linked access points
randomly distributed over a coverage area serve simultaneously a smaller number
of users. CF Massive MIMO inherits favorable propagation of Massive MIMO
systems. However, the level of favorable propagation which highly depends on
the network topology and environment may be hindered by user' spatial
correlation. In this paper, we investigate the impact of the network
configuration on the level of favorable propagation for a CF Massive MIMO
network. We formulate a user grouping and scheduling optimization problem that
leverages users' spatial diversity. The formulated design optimization problem
is proved to be NP-hard in general. To circumvent the prohibitively high
computational cost, we adopt the semidefinite relaxation method to find a
sub-optimal solution. The effectiveness of the proposed strategies is then
verified through numerical results which demonstrate a non-negligible
improvement in the performance of the studied scenario.
| 0.945905 | 0.84205 | 0.103855 |
2004.06941
|
Improving Many-objective Evolutionary Algorithms by Means of Expanded
Cone Orders
|
Given a point in m-dimensional objective space, the local environment of a
point can be partitioned into the incomparable, the dominated and the
dominating region. The ratio between the size of the incomparable region, and
the dominated (and dominating) decreases proportionally to $1/2^{m-1}$. Due to
this reason, it gets increasingly unlikely that dominating points can be found
by random, isotropic mutations. As a remedy to stagnation of search in many
objective optimization, in this paper, we suggest to enhance the Pareto
dominance order by involving a convex obtuse dominance cone in the convergence
phase of an evolutionary optimization algorithm. The approach is integrated in
several state-of-the-art multi-objective evolutionary algorithms (MOEAs) and
tested on benchmark problems with four, five, six and eight objectives.
Computational experiments demonstrate the ability of the expanded cone
technique to improve the performance of MOEAs on many-objective optimization
problems.
|
We introduce a new jet-finding algorithm for a hadron collider based on
maximizing a J_{E_T} function for all possible combinations of particles in an
event. This function prefers a larger value of the jet transverse energy and a
smaller value of the jet mass. The jet shape is proved to be a circular cone in
Cartesian coordinates with the geometric center shifted from the jet momentum
toward the central region. The jet cone size shrinks for a more forward jet. We
have implemented our J_{E_T} algorithm with a reasonable running time scaling
as N n^3, where "N" is the total number of particles and "n" (much less than N)
is the number of particles in a fiducial region. Many features of our J_{E_T}
jets are similar to anti-k_t jets, including the reconstructed jet momentum and
the "back-reaction" from soft contamination. Nevertheless, when the jet
parameters in the two algorithms are matched using QCD jets, we find that the
J_{E_T} algorithm has a larger efficiency than anti-k_t for identifying objects
with hard splittings such as a W-jet.
| 0.86201 | 0.592941 | 0.269069 |
2004.06942
|
A continuous perspective on modeling of shape optimal design problems
|
In this article we consider shape optimization problems as optimal control
problems via the method of mappings. Instead of optimizing over a set of
admissible shapes a reference domain is introduced and it is optimized over a
set of admissible transformations. The focus is on the choice of the set of
transformations, which we motivate from a function space perspective. In order
to guarantee local injectivity of the admissible transformations we enrich the
optimization problem by a nonlinear constraint. The approach requires no
parameter tuning for the extension equation and can naturally be combined with
geometric constraints on volume and barycenter of the shape. Numerical results
for drag minimization of Stokes flow are presented.
|
We consider optimal designs for general multinomial logistic models, which
cover baseline-category, cumulative, adjacent-categories, and
continuation-ratio logit models, with proportional odds, non-proportional odds,
or partial proportional odds assumption. We derive the corresponding Fisher
information matrices in three different forms to facilitate their calculations,
determine the conditions for their positive definiteness, and search for
optimal designs. We conclude that, unlike the designs for binary responses, a
feasible design for a multinomial logistic model may contain less experimental
settings than parameters, which is of practical significance. We also conclude
that even for a minimally supported design, a uniform allocation, which is
typically used in practice, is not optimal in general for a multinomial
logistic model. We develop efficient algorithms for searching D-optimal
designs. Using examples based on real experiments, we show that the efficiency
of an experiment can be significantly improved if our designs are adopted.
| 0.813397 | 0.669503 | 0.143895 |
2004.06944
|
Regularizing the Cross-Newell equation by re-modulating along a
characteristic angle
|
A regularization of the Cross-Newell equation is presented. It is based on a
secondary re-modulation along characteristics. This new characteristic
Cross-Newell equation is not isotropic (has preferred directions), but is
universal (homogeneous in $\eps$ and equation independent coefficients), has
fourth derivatives, and generates localized solutions that are bi-asymptotic to
rolls. Re-modulation of rolls in the Ginzburg-Landau equation is used for
illustration of the theory.
|
We propose a cross-entropy minimization method for finding the reaction
coordinate from a large number of collective variables in complex molecular
systems. This method is an extension of the likelihood maximization approach
describing the committor function with a sigmoid. By design, the reaction
coordinate as a function of various collective variables is optimized such that
the distribution of the committor $p_\mathrm{B}^*$ values generated from
molecular dynamics simulations can be described in a sigmoidal manner. We also
introduce the $L_2$-norm regularization used in the machine learning field to
prevent overfitting when the number of considered collective variables is
large. The current method is applied to study the isomerization of alanine
dipeptide in vacuum, where 45 dihedral angles are used as candidate variables.
The regularization parameter is determined by cross-validation using training
and test datasets. It is demonstrated that the optimal reaction coordinate
involves important dihedral angles, which are consistent with the previously
reported results. Furthermore, the points with $p_\mathrm{B}^*\sim 0.5$ clearly
indicate a separatrix distinguishing reactant and product states on the
potential of mean force using the extracted dihedral angles.
| 0.870927 | 0.678145 | 0.192781 |
2004.06945
|
Quasi-shuffle algebras in non-commutative stochastic calculus
|
This chapter is divided into two parts. The first is largely expository and
builds on Karandikar's axiomatisation of It{\^o} calculus for matrix-valued
semimartin-gales. Its aim is to unfold in detail the algebraic structures
implied for iterated It{\^o} and Stratonovich integrals. These constructions
generalise the classical rules of Chen calculus for deterministic scalar-valued
iterated integrals. The second part develops the stochastic analog of what is
commonly called chronological calculus in control theory. We obtain in
particular a pre-Lie Magnus formula for the logarithm of the It{\^o} stochastic
exponential of matrix-valued semimartingales.
|
We consider the combinatorial Dyson-Schwinger equation X=B^+(P(X)) in the
non-commutative Connes-KreimerHopf algebra of planar rooted trees H, where B^+
is the operator of grafting on a root, and P a formal series. The unique
solution X of this equation generates a graded subalgebra A_P of\H. We describe
all the formal series P such that A_P is a Hopf subalgebra. We obtain in this
way a 2-parameters family of Hopf subalgebras of H, organized into three
isomorphism classes: a first one, restricted to a olynomial ring in one
variable; a second one, restricted to the Hopf subalgebra of ladders,
isomorphic to the Hopf algebra of quasi-symmetric functions; a last (infinite)
one, which gives a non-commutative version of the Fa\`a di Bruno Hopf algebra.
By taking the quotient, the last classe gives an infinite set of embeddings of
the Fa\`a di Bruno algebra into the Connes-Kreimer Hopf algebra of rooted
trees. Moreover, we give an embedding of the free Fa\`a di Bruno Hopf algebra
on D variables into a Hopf algebra of decorated rooted trees, togetherwith a
non commutative version of this embedding.
| 0.792926 | 0.73365 | 0.059276 |
2004.06946
|
Improved Resolvent Bounds for Radial Potentials
|
We prove semiclassical resolvent estimates for the Schr{\"o}dinger operator
in R d , d $\ge$ 3, with real-valued radial potentials V $\in$ L $\infty$ (R
d). In particular, we show that if V (x) = O x --$\delta$ with $\delta$ > 2,
then the resolvent bound is of the form e Ch --4/3 with some constant C > 0. We
also get resolvent bounds when 1 < $\delta$ $\le$ 2. For slowly decaying
$\alpha$-H{\"o}lder potentials we get better resolvent bounds of the form e Ch
--4/($\alpha$+3) .
|
We show that the multi-commodity max-flow/min-cut gap for series-parallel
graphs can be as bad as 2, matching a recent upper bound Chakrabarti, Jaffe,
Lee, and Vincent for this class, and resolving one side of a conjecture of
Gupta, Newman, Rabinovich, and Sinclair.
This also improves the largest known gap for planar graphs from 3/2 to 2,
yielding the first lower bound that doesn't follow from elementary
calculations. Our approach uses the {\em coarse differentiation} method of
Eskin, Fisher, and Whyte in order to lower bound the distortion for embedding a
particular family of shortest-path metrics into $L_1$.
| 0.86301 | 0.68851 | 0.174499 |
2004.06947
|
Benchmarking Unsupervised Outlier Detection with Realistic Synthetic
Data
|
Benchmarking unsupervised outlier detection is difficult. Outliers are rare,
and existing benchmark data contains outliers with various and unknown
characteristics. Fully synthetic data usually consists of outliers and regular
instance with clear characteristics and thus allows for a more meaningful
evaluation of detection methods in principle. Nonetheless, there have only been
few attempts to include synthetic data in benchmarks for outlier detection.
This might be due to the imprecise notion of outliers or to the difficulty to
arrive at a good coverage of different domains with synthetic data. In this
work we propose a generic process for the generation of data sets for such
benchmarking. The core idea is to reconstruct regular instances from existing
real-world benchmark data while generating outliers so that they exhibit
insightful characteristics. This allows both for a good coverage of domains and
for helpful interpretations of results. We also describe three instantiations
of the generic process that generate outliers with specific characteristics,
like local outliers. A benchmark with state-of-the-art detection methods
confirms that our generic process is indeed practical.
|
Unsupervised learning from visual data is one of the most difficult
challenges in computer vision, being a fundamental task for understanding how
visual recognition works. From a practical point of view, learning from
unsupervised visual input has an immense practical value, as very large
quantities of unlabeled videos can be collected at low cost. In this paper, we
address the task of unsupervised learning to detect and segment foreground
objects in single images. We achieve our goal by training a student pathway,
consisting of a deep neural network. It learns to predict from a single input
image (a video frame) the output for that particular frame, of a teacher
pathway that performs unsupervised object discovery in video. Our approach is
different from the published literature that performs unsupervised discovery in
videos or in collections of images at test time. We move the unsupervised
discovery phase during the training stage, while at test time we apply the
standard feed-forward processing along the student pathway. This has a dual
benefit: firstly, it allows in principle unlimited possibilities of learning
and generalization during training, while remaining very fast at testing.
Secondly, the student not only becomes able to detect in single images
significantly better than its unsupervised video discovery teacher, but it also
achieves state of the art results on two important current benchmarks, YouTube
Objects and Object Discovery datasets. Moreover, at test time, our system is at
least two orders of magnitude faster than other previous methods.
| 0.93547 | 0.667516 | 0.267955 |
2004.06948
|
Markov chain approximations for one dimensional diffusions
|
The Markov chain approximation of a one-dimensional symmetric diffusion is
investigated in this paper. Given an irreducible reflecting diffusion on a
closed interval with scale function $s$ and speed measure $m$, the
approximating Markov chains are constructed explicitly through the trace of the
Dirichlet form corresponding to the diffusion. One feature of our approach is
that it does not require uniform ellipticity on diffusion coefficient of the
limit object or uniform regularity on conductances of the approximative Markov
chains, as imposed usually in the previous related works.
|
In this article we provide new applications for exponential approximation
using the framework of Pek\"oz and R\"ollin (in press), which is based on
Stein's method. We give error bounds for the nearly critical Galton-Watson
process conditioned on non-extinction, and for the occupation times of Markov
chains; for the latter, in particular, we give a new exponential approximation
rate for the number of revisits to the origin for general two dimensional
random walk, also known as the Erd\H{o}s-Taylor theorem.
| 0.911092 | 0.811353 | 0.099739 |
2004.06949
|
A Model-Driven Deep Learning Method for Massive MIMO Detection
|
In this paper, an efficient massive multiple-input multiple-output (MIMO)
detector is proposed by employing a deep neural network (DNN). Specifically, we
first unfold an existing iterative detection algorithm into the DNN structure,
such that the detection task can be implemented by deep learning (DL) approach.
We then introduce two auxiliary parameters at each layer to better cancel
multiuser interference (MUI). The first parameter is to generate the residual
error vector while the second one is to adjust the relationship among previous
layers. We further design the training procedure to optimize the auxiliary
parameters with pre-processed inputs. The so derived MIMO detector falls into
the category of model-driven DL. The simulation results show that the proposed
MIMO detector can achieve preferable detection performance compared to the
existing detectors for massive MIMO systems.
|
Pedestrian detection is one of the most explored topics in computer vision
and robotics. The use of deep learning methods allowed the development of new
and highly competitive algorithms. Deep Reinforcement Learning has proved to be
within the state-of-the-art in terms of both detection in perspective cameras
and robotics applications. However, for detection in omnidirectional cameras,
the literature is still scarce, mostly because of their high levels of
distortion. This paper presents a novel and efficient technique for robust
pedestrian detection in omnidirectional images. The proposed method uses deep
Reinforcement Learning that takes advantage of the distortion in the image. By
considering the 3D bounding boxes and their distorted projections into the
image, our method is able to provide the pedestrian's position in the world, in
contrast to the image positions provided by most state-of-the-art methods for
perspective cameras. Our method avoids the need of pre-processing steps to
remove the distortion, which is computationally expensive. Beyond the novel
solution, our method compares favorably with the state-of-the-art methodologies
that do not consider the underlying distortion for the detection task.
| 0.914984 | 0.647007 | 0.267978 |
2004.06950
|
Machine learning force fields and coarse-grained variables in molecular
dynamics: application to materials and biological systems
|
Machine learning encompasses a set of tools and algorithms which are now
becoming popular in almost all scientific and technological fields. This is
true for molecular dynamics as well, where machine learning offers promises of
extracting valuable information from the enormous amounts of data generated by
simulation of complex systems. We provide here a review of our current
understanding of goals, benefits, and limitations of machine learning
techniques for computational studies on atomistic systems, focusing on the
construction of empirical force fields from ab-initio databases and the
determination of reaction coordinates for free energy computation and enhanced
sampling.
|
The parametrization of coarse-grained (CG) simulation models for molecular
systems often aims at reproducing static properties alone. The reduced
molecular friction of the CG representation usually results in faster, albeit
inconsistent, dynamics. In this work, we rely on Markov state models to
simultaneously characterize the static and kinetic properties of two CG peptide
force fields---one top-down and one bottom-up. Instead of a rigorous evolution
of CG dynamics (e.g., using a generalized Langevin equation), we attempt to
improve the description of kinetics by simply altering the existing CG models,
which employ standard Langevin dynamics. By varying masses and relevant
force-field parameters, we can improve the timescale separation of the slow
kinetic processes, achieve a more consistent ratio of mean-first-passage times
between metastable states, and refine the relative free-energies between these
states. Importantly, we show that the incorporation of kinetic information into
a structure-based parametrization improves the description of the helix-coil
transition sampled by a minimal CG model. While structure-based models
understabilize the helical state, kinetic constraints help identify CG models
that improve the ratio of forward/backward timescales by effectively hindering
the sampling of spurious conformational intermediate states.
| 0.900856 | 0.824975 | 0.075881 |
2004.06951
|
Well-posedness and asymptotic behaviour of an aggregation model with
intrinsic interactions on sphere and other manifolds
|
We investigate a model for collective behaviour with intrinsic interactions
on Riemannian manifolds. We establish the well-posedness of measure solutions
(defined via mass transport) on sphere, as well as investigate the mean-field
particle approximation. We study the long-time behaviour of solutions to the
model on sphere, where the primary goal is to establish sufficient conditions
for a consensus state to form asymptotically. Well-posedness of solutions and
the formation of consensus are also investigated for other manifolds (e.g., a
hypercylinder).
|
Two central limit theorems for sample Fr\'echet means are derived, both
significant for nonparametric inference on non-Euclidean spaces. The first one,
Theorem 2.2, encompasses and improves upon most earlier CLTs on Fr\'echet means
and broadens the scope of the methodology beyond manifolds to diverse new
non-Euclidean data including those on certain stratified spaces which are
important in the study of phylogenetic trees. It does not require that the
underlying distribution $Q$ have a density, and applies to both intrinsic and
extrinsic analysis. The second theorem, Theorem 3.3, focuses on intrinsic means
on Riemannian manifolds of dimensions $d>2$ and breaks new ground by providing
a broad CLT without any of the earlier restrictive support assumptions. It
makes the statistically reasonable assumption of a somewhat smooth density of
$Q$. The excluded case of dimension $d=2$ proves to be an enigma, although the
first theorem does provide a CLT in this case as well under a support
restriction. Theorem 3.3 immediately applies to spheres $S^d$, $d>2$, which are
also of considerable importance in applications to axial spaces and to
landmarks based image analysis, as these spaces are quotients of spheres under
a Lie group $\mathcal G $ of isometries of $S^d$.
| 0.895316 | 0.763957 | 0.131359 |
2004.06952
|
The H\"older continuous subsolution theorem for complex Hessian
equations
|
Let $\Omega \Subset \mathbb C^n$ be a bounded strongly $m$-pseudoconvex
domain ($1\leq m\leq n$) and $\mu$ a positive Borel measure with finite mass on
$\Omega$. Then we solve the H\"older continuous subsolution problem for the
complex Hessian equation $(dd^c u)^m \wedge \beta^{n - m} = \mu$ on $\Omega$.
Namely, we show that this equation admits a unique H\"older continuous solution
on $\Omega$ with a given H\"older continuous boundary values if it admits a
H\"older continuous subsolution on $\Omega$. The main step in solving the
problem is to establish a new capacity estimate showing that the $m$-Hessian
measure of a H\"older continuous $m$-subharmonic function on $\Omega$ with zero
boundary values is dominated by the $m$-Hessian capacity with respect to
$\Omega$ with an (explicit) exponent $\tau > 1$.
|
The purpose of this article is to prove the H\"older continuity up to the
boundary of the displacement vector and the microrotation matrix for the
quasistatic, rate-independent Armstrong-Frederick cyclic hardening plasticity
model with Cosserat effects. This model is of non-monotone and non-associated
type. In the case of two space dimensions we use the hole-filling technique of
Widman and the Morrey's Dirichlet growth theorem.
| 0.902919 | 0.706167 | 0.196752 |
2004.06953
|
Vanishing diffusion in a dynamic boundary condition for the
Cahn-Hilliard equation
|
The initial boundary value problem for a Cahn-Hilliard system subject to a
dynamic boundary condition of Allen-Cahn type is treated. The vanishing of the
surface diffusion on the dynamic boundary condition is the point of emphasis.
By the asymptotic analysis as the diffusion coefficient tends to 0, one can
expect that the solutions of the surface diffusion problem converge to the
solution of the problem without the surface diffusion. This is actually the
case, but the solution of the limiting problem naturally looses some
regularity. Indeed, the system we investigate is rather complicate due to the
presence of nonlinear terms including general maximal monotone graphs both in
the bulk and on the boundary. The two graphs are related each to the other by a
growth condition, with the boundary graph that dominates the other one. In
general, at the asymptotic limit a weaker form of the boundary condition is
obtained, but in the case when the two graphs exhibit the same growth the
boundary condition still holds almost everywhere.
|
We study a non-local variant of a diffuse interface model proposed by
Hawkins--Darrud et al. (2012) for tumour growth in the presence of a chemical
species acting as nutrient. The system consists of a Cahn--Hilliard equation
coupled to a reaction-diffusion equation. For non-degenerate mobilities and
smooth potentials, we derive well-posedness results, which are the non-local
analogue of those obtained in Frigeri et al. (European J. Appl. Math. 2015).
Furthermore, we establish existence of weak solutions for the case of
degenerate mobilities and singular potentials, which serves to confine the
order parameter to its physically relevant interval. Due to the non-local
nature of the equations, under additional assumptions continuous dependence on
initial data can also be shown.
| 0.905966 | 0.8327 | 0.073266 |
2004.06954
|
Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing
Website Classifiers
|
Machine learning (ML) based approaches have been the mainstream solution for
anti-phishing detection. When they are deployed on the client-side, ML-based
classifiers are vulnerable to evasion attacks. However, such potential threats
have received relatively little attention because existing attacks destruct the
functionalities or appearance of webpages and are conducted in the white-box
scenario, making it less practical. Consequently, it becomes imperative to
understand whether it is possible to launch evasion attacks with limited
knowledge of the classifier, while preserving the functionalities and
appearance.
In this work, we show that even in the grey-, and black-box scenarios,
evasion attacks are not only effective on practical ML-based classifiers, but
can also be efficiently launched without destructing the functionalities and
appearance. For this purpose, we propose three mutation-based attacks,
differing in the knowledge of the target classifier, addressing a key technical
challenge: automatically crafting an adversarial sample from a known phishing
website in a way that can mislead classifiers. To launch attacks in the white-
and grey-box scenarios, we also propose a sample-based collision attack to gain
the knowledge of the target classifier. We demonstrate the effectiveness and
efficiency of our evasion attacks on the state-of-the-art, Google's phishing
page filter, achieved 100% attack success rate in less than one second per
website. Moreover, the transferability attack on BitDefender's industrial
phishing page classifier, TrafficLight, achieved up to 81.25% attack success
rate. We further propose a similarity-based method to mitigate such evasion
attacks, Pelican. We demonstrate that Pelican can effectively detect evasion
attacks. Our findings contribute to design more robust phishing website
classifiers in practice.
|
Machine learning has become one of the main components for task automation in
many application domains. Despite the advancements and impressive achievements
of machine learning, it has been shown that learning algorithms can be
compromised by attackers both at training and test time. Machine learning
systems are especially vulnerable to adversarial examples where small
perturbations added to the original data points can produce incorrect or
unexpected outputs in the learning algorithms at test time. Mitigation of these
attacks is hard as adversarial examples are difficult to detect. Existing
related work states that the security of machine learning systems against
adversarial examples can be weakened when feature selection is applied to
reduce the systems' complexity. In this paper, we empirically disprove this
idea, showing that the relative distortion that the attacker has to introduce
to succeed in the attack is greater when the target is using a reduced set of
features. We also show that the minimal adversarial examples differ
statistically more strongly from genuine examples with a lower number of
features. However, reducing the feature count can negatively impact the
system's performance. We illustrate the trade-off between security and accuracy
with specific examples. We propose a design methodology to evaluate the
security of machine learning classifiers with embedded feature selection
against adversarial examples crafted using different attack strategies.
| 0.881633 | 0.73111 | 0.150523 |
2004.06955
|
Total disconnectedness of Julia sets of random quadratic polynomials
|
For a sequence of complex parameters $\{c_n\}$ we consider the compositions
of functions $f_{c_n} (z) = z^2 + c_n$, which is the non-autonomous version of
the classical quadratic dynamical system. The definitions of Julia and Fatou
sets are naturally generalized to this setting. We answer a question posed by
Br\"uck, B\"uger and Reitz, whether the Julia set for such a sequence is almost
always totally disconnected, if the values $c_n$ are chosen randomly from a
large disk. Our proof is easily generalized to answer a lot of other related
questions regarding typical connectivity of the random Julia set. In fact we
prove the statement for a much larger family of sets than just disks, in
particular if one picks $c_n$ randomly from the main cardioid of the Mandelbrot
set, then the Julia set is still almost always totally disconnected.
|
Transcendental H\'enon maps are the natural extensions of the well
investigated complex polynomial H\'enon maps to the much larger class of
holomorphic automorphisms. We prove here that transcendental H\'enon maps
always have non-trivial dynamical behavior, namely that they always admit both
periodic and escaping orbits, and that their Julia sets are non-empty and
perfect.
| 0.855445 | 0.724485 | 0.13096 |
2004.06956
|
Global in time existence of strong solution to 3D periodic Navier-Stokes
equations
|
The purpose of this paper is to bring to light a method through which the
global in time existence for arbitrary large in $H^1$ initial data of a strong
solution to 3D periodic Navier-Stokes equations follows. The method consists of
subdividing the time interval of existence into smaller sub-intervals carefully
chosen. These sub-intervals are chosen based on the hypothesis that for any
wavenumber $m$, one can find an interval of time on which the energy quantized
in low-frequency components (up to $m$) of the solution $u$ is lesser than the
energy quantized in high-frequency components (down to $m$) or otherwise the
opposite. We associate then a suitable number $m$ to each one of the intervals
and we prove that the norm $\|u(t)\|_{H^1}$ is bounded in both mentioned cases.
The process can be continued until reaching the maximal time of existence
$T_{max}$ which yields the global in time existence of strong solution.
|
In a series of papers (see \cite{CDT02} and the pertinent references therein)
the 3D Navier-Stokes-$\alpha$ model were shown to be a useful complement to the
3D Navier-Stokes equations; and in particular, to be a good Reynolds version of
the latter equations. In this work, we introduce a simple Reynolds averaging
which, due to the wall roughness, transforms the Navier-Stokes equations into
the Navier-Stokes-$\alpha$ model.
| 0.895324 | 0.795659 | 0.099664 |
2004.06957
|
Self-Supervised training for blind multi-frame video denoising
|
We propose a self-supervised approach for training multi-frame video
denoising networks. These networks predict frame t from a window of frames
around t. Our self-supervised approach benefits from the video temporal
consistency by penalizing a loss between the predicted frame t and a
neighboring target frame, which are aligned using an optical flow. We use the
proposed strategy for online internal learning, where a pre-trained network is
fine-tuned to denoise a new unknown noise type from a single video. After a few
frames, the proposed fine-tuning reaches and sometimes surpasses the
performance of a state-of-the-art network trained with supervision. In
addition, for a wide range of noise types, it can be applied blindly without
knowing the noise distribution. We demonstrate this by showing results on blind
denoising of different synthetic and realistic noises.
|
Conventional video summarization approaches based on reinforcement learning
have the problem that the reward can only be received after the whole summary
is generated. Such kind of reward is sparse and it makes reinforcement learning
hard to converge. Another problem is that labelling each frame is tedious and
costly, which usually prohibits the construction of large-scale datasets. To
solve these problems, we propose a weakly supervised hierarchical reinforcement
learning framework, which decomposes the whole task into several subtasks to
enhance the summarization quality. This framework consists of a manager network
and a worker network. For each subtask, the manager is trained to set a subgoal
only by a task-level binary label, which requires much fewer labels than
conventional approaches. With the guide of the subgoal, the worker predicts the
importance scores for video frames in the subtask by policy gradient according
to both global reward and innovative defined sub-rewards to overcome the sparse
problem. Experiments on two benchmark datasets show that our proposal has
achieved the best performance, even better than supervised approaches.
| 0.928562 | 0.692423 | 0.236139 |
2004.06960
|
Probabilistic reachable and invariant sets for linear systems with
correlated disturbance
|
In this paper a constructive method to determine and compute probabilistic
reachable and invariant sets for linear discrete-time systems, excited by a
stochastic disturbance, is presented. The samples of the disturbance signal are
not assumed to be uncorrelated, only a bound on the correlation matrices is
supposed to be known. The concept of correlation bound is introduced and
employed to determine probabilistic reachable sets and probabilistic invariant
sets. Constructive methods for their computation, based on convex optimization,
are given.
|
In Bansal et al. (2019), a novel visual navigation framework that combines
learning-based and model-based approaches has been proposed. Specifically, a
Convolutional Neural Network (CNN) predicts a waypoint that is used by the
dynamics model for planning and tracking a trajectory to the waypoint. However,
the CNN inevitably makes prediction errors, ultimately leading to collisions,
especially when the robot is navigating through cluttered and tight spaces. In
this paper, we present a novel Hamilton-Jacobi (HJ) reachability-based method
to generate supervision for the CNN for waypoint prediction. By modeling the
prediction error of the CNN as disturbances in dynamics, the proposed method
generates waypoints that are robust to these disturbances, and consequently to
the prediction errors. Moreover, using globally optimal HJ reachability
analysis leads to predicting waypoints that are time-efficient and do not
exhibit greedy behavior. Through simulations and experiments on a hardware
testbed, we demonstrate the advantages of the proposed approach for navigation
tasks where the robot needs to navigate through cluttered, narrow indoor
environments.
| 0.932448 | 0.701838 | 0.23061 |
2004.06962
|
Dynamics of the Schr{\"o}dinger-Langevin Equation
|
We consider the nonlinear Schr{\"o}dinger-Langevin equation for both signs of
the logarithmic nonlinearity. We explicitly compute the dynamics of Gaussian
solutions for large times, which is obtained through the study of a particular
nonlinear differential equation of order 2. We then give the asymptotic
behavior of general energy weak solutions under some regularity assumptions.
Some numerical simulations are performed in order to corroborate the
theoretical results.
|
We show the existence of ground state and orbital stability of standing waves
of fractional Schr\"{o}dinger equations with power type nonlinearity. For this
purpose we establish the uniqueness of weak solutions.
| 0.887459 | 0.749656 | 0.137803 |
2004.06963
|
Dynamic Bayesian Neural Networks
|
We define an evolving in time Bayesian neural network called a Hidden Markov
neural network. The weights of the feed-forward neural network are modelled
with the hidden states of a Hidden Markov model, the whose observed process is
given by the available data. A filtering algorithm is used to learn a
variational approximation to the evolving in time posterior over the weights.
Training is pursued through a sequential version of Bayes by Backprop, which is
enriched with a stronger regularization technique called variational
DropConnect. The experiments are focused on streaming data and time series. On
the one hand, we train on MNIST when only a portion of the dataset is available
at a time. On the other hand, we perform frames prediction on a waving flag
video.
|
The main motivation of this work was practical, to offer computationally and
theoretical scalable ways to structuring large classes of computation. It
started from attempts to optimize R code for machine learning/artificial
intelligence algorithms for huge data sets, that due to their size, should be
handled into an incremental (online) fashion.
Our target are large classes of relational (attribute based), mathematical
(index based) or graph computations. We wanted to use powerful computation
representations that emerged in AI (artificial intelligence)/ML (machine
learning) as BN (Bayesian networks) and CNN (convolution neural networks). For
the classes of computation addressed by us, and for our HPC (high performance
computing) needs, the current solutions for translating computations into such
representation need to be extended.
Our results show that the classes of computation targeted by us, could be
tree-structured, and a probability distribution (defining a DBN, i.e. Dynamic
Bayesian Network) associated with it. More ever, this DBN may be viewed as a
recursive CNN (Convolution Neural Network). Within this tree-like structure,
classification in classes with size bounded (by a parameterizable may be
performed.
These results are at the core of very powerful, yet highly practically
algorithms for restructuring and parallelizing the computations. The
mathematical background required for an in depth presentation and exposing the
full generality of our approach) is the subject of a subsequent paper. In this
paper, we work in an limited (but important) framework that could be understood
with rudiments of linear algebra and graph theory. The focus is in
applicability, most of this paper discuss the usefulness of our approach for
solving hard compilation problems related to automatic parallelism.
| 0.830507 | 0.768502 | 0.062005 |
2004.06964
|
Note on weighted proper orientations of outerplanar graphs
|
A weighted proper orientation of a given graph $G$, denoted by $(D,w)$, is an
orientation $D$ with a weight function $w: E(G)\rightarrow \mathbb{Z}_+$, such
that the in-weight of any adjacent vertices are distinct, where the in-weight
of $v$ in $D$, denoted by $w^-_D(v)$, is the sum of the weights of arcs towards
$v$. The weighted proper orientation number of a graph $G$, denoted by
$\overrightarrow{\chi}_w(G)$, is the minimum of maximum in-weight of $v$ in $D$
over all weighted proper orientation $(D,w)$ of $G$. This parameter was first
introduced by Ara\'{u}jo et al. (2019). When the weights of all edges eqaul to
one, this parameter is equal to the \textit{proper orientation number} of $G$.
The optimal weighted proper orientation is a weighted proper orientation
$(D,w)$ such that $\max_{v\in V(G)}w_D^-(v)=\overrightarrow{\chi}_w(G)$.
Ara\'{u}jo et al. (2016) showed that $\overrightarrow{\chi}(G)\le 7$ for
every cactus $G$ and the bound is tight. We prove that for every cactus $G$,
$\overrightarrow{\chi}_w(G) \le 3$ and the bound is tight. Ara\'{u}jo et al.
(2015) asked whether there is a constant $c$ such that
$\overrightarrow{\chi}(G)\le c$ for all outerplanar graphs $G.$ While this
problem remains open, Ara\'{u}jo et al. (2019) asked to consider it in the
weighted case. We prove that for every outerplanar graph $G,$
$\overrightarrow{\chi}_w(G)\le 4$ and the bound is tight.
|
A graph homomorphism is a vertex map which carries edges from a source graph
to edges in a target graph. The instances of the Weighted Maximum H-Colourable
Subgraph problem (MAX H-COL) are edge-weighted graphs G and the objective is to
find a subgraph of G that has maximal total edge weight, under the condition
that the subgraph has a homomorphism to H; note that for H=K_k this problem is
equivalent to MAX k-CUT. Farnqvist et al. have introduced a parameter on the
space of graphs that allows close study of the approximability properties of
MAX H-COL. Specifically, it can be used to extend previously known
(in)approximability results to larger classes of graphs. Here, we investigate
the properties of this parameter on circular complete graphs K_{p/q}, where 2
<= p/q <= 3. The results are extended to K_4-minor-free graphs and graphs with
bounded maximum average degree. We also consider connections with Samal's work
on fractional covering by cuts: we address, and decide, two conjectures
concerning cubical chromatic numbers.
| 0.871967 | 0.786774 | 0.085193 |
2004.06965
|
Unified Dynamic Convolutional Network for Super-Resolution with
Variational Degradations
|
Deep Convolutional Neural Networks (CNNs) have achieved remarkable results on
Single Image Super-Resolution (SISR). Despite considering only a single
degradation, recent studies also include multiple degrading effects to better
reflect real-world cases. However, most of the works assume a fixed combination
of degrading effects, or even train an individual network for different
combinations. Instead, a more practical approach is to train a single network
for wide-ranging and variational degradations. To fulfill this requirement,
this paper proposes a unified network to accommodate the variations from
inter-image (cross-image variations) and intra-image (spatial variations).
Different from the existing works, we incorporate dynamic convolution which is
a far more flexible alternative to handle different variations. In SISR with
non-blind setting, our Unified Dynamic Convolutional Network for Variational
Degradations (UDVD) is evaluated on both synthetic and real images with an
extensive set of variations. The qualitative results demonstrate the
effectiveness of UDVD over various existing works. Extensive experiments show
that our UDVD achieves favorable or comparable performance on both synthetic
and real images.
|
Many previous methods have showed the importance of considering semantically
relevant objects for performing event recognition, yet none of the methods have
exploited the power of deep convolutional neural networks to directly integrate
relevant object information into a unified network. We present a novel unified
deep CNN architecture which integrates architecturally different, yet
semantically-related object detection networks to enhance the performance of
the event recognition task. Our architecture allows the sharing of the
convolutional layers and a fully connected layer which effectively integrates
event recognition, rigid object detection and non-rigid object detection.
| 0.914364 | 0.708938 | 0.205426 |
2004.06966
|
Modal Matters in Interpretability Logics
|
This paper from 2008 is the first in a series of three related papers on
modal methods in interpretability logics and applications. In this first paper
the foundations are laid for later results. These foundations consist of a
thorough treatment of a construction method to obtain modal models. This
construction method is used to reprove some known results in the area of
interpretability like the modal completeness of the logic ${\textbf{IL}}$.
Next, the method is applied to obtain new results: the modal completeness of
the logic ${\textbf{IL}}{\sf M_0}$, and modal completeness of
${\textbf{IL}}({\sf W^*})$.
|
Monadic second order logic and linear temporal logic are two logical
formalisms that can be used to describe classes of infinite words, i.e.,
first-order models based on the natural numbers with order, successor, and
finitely many unary predicate symbols.
Monadic second order logic over infinite words (S1S) can alternatively be
described as a first-order logic interpreted in $\mathcal{P}(\omega)$, the
power set Boolean algebra of the natural numbers, equipped with modal operators
for 'initial', 'next' and 'future' states. We prove that the first-order theory
of this structure is the model companion of a class of algebras corresponding
to the appropriate version of linear temporal logic (LTL) without until.
The proof makes crucial use of two classical, non-trivial results from the
literature, namely the completeness of LTL with respect to the natural numbers,
and the correspondence between S1S-formulas and B\"uchi automata.
| 0.900249 | 0.7409 | 0.159348 |
2004.06967
|
Exploration of Indoor Environments Predicting the Layout of Partially
Observed Rooms
|
We consider exploration tasks in which an autonomous mobile robot
incrementally builds maps of initially unknown indoor environments. In such
tasks, the robot makes a sequence of decisions on where to move next that,
usually, are based on knowledge about the observed parts of the environment. In
this paper, we present an approach that exploits a prediction of the geometric
structure of the unknown parts of an environment to improve exploration
performance. In particular, we leverage an existing method that reconstructs
the layout of an environment starting from a partial grid map and that predicts
the shape of partially observed rooms on the basis of geometric features
representing the regularities of the indoor environment. Then, we originally
employ the predicted layout to estimate the amount of new area the robot would
observe from candidate locations in order to inform the selection of the next
best location and to early stop the exploration when no further relevant area
is expected to be discovered. Experimental activities show that our approach is
able to effectively predict the layout of partially observed rooms and to use
such knowledge to speed up the exploration.
|
Most modern HVAC systems suffer from two intrinsic problems. First, inability
to meet diverse comfort requirements of the occupants. Second, heat or cool an
entire zone even when the zone is only partially occupied. Both issues can be
mitigated by using personal comfort systems (PCS) which bridge the comfort gap
between what is provided by a central HVAC system and the personal preferences
of the occupants. In recent work, we have proposed and deployed such a system,
called SPOT.
We address the question, "How should an existing HVAC system modify its
operation to benefit the availability of PCS like SPOT?" For example, energy
consumption could be reduced during sparse occupancy by choosing appropriate
thermal set backs, with the PCS providing the additional offset in thermal
comfort required for each occupant. Our control strategy based on Model
Predictive Control (MPC), employs a bi-linear thermal model, and has two
time-scales to accommodate the physical constraints that limit certain
components of the central HVAC system from frequently changing their set
points.
We compare the energy consumption and comfort offered by our SPOT-aware HVAC
system with that of a state-of-the-art MPC-based central HVAC system in
multiple settings including different room layouts and partial deployment of
PCS. Numerical evaluations show that our system obtains, in average, 45% (15%)
savings in energy in summer (winter), compared with the benchmark system for
the case of homogeneous comfort requirements. For heterogeneous comfort
requirements, we observe 51% (29%) improvement in comfort in summer (winter) in
addition to significant savings in energy.
| 0.80628 | 0.694776 | 0.111503 |
2004.06968
|
Asymptotic behavior of the occupancy density for obliquely reflected
Brownian motion in a half-plane and Martin boundary
|
Let $\pi$ be the occupancy density of an obliquely reflected Brownian motion
in the half plane and let ($\rho$, $\alpha$) be the polar coordinates of a
point in the upper half plane. This work determines the exact asymptotic
behavior of $\pi$($\rho$, $\alpha$) as $\rho$ $\rightarrow$ $\infty$ with
$\alpha$ $\in$ (0, $\pi$). We find explicit functions a, b, c such that
$\pi$($\rho$, $\alpha$) $\sim$ $\rho$$\rightarrow$$\infty$ a($\alpha$)$\rho$
b($\alpha$) e --c($\alpha$)$\rho$. This closes an open problem first stated by
Professor J. Michael Harrison in August 2013. We also compute the exact
asymptotics for the tail distribution of the boundary occupancy measure and we
obtain an explicit integral expression for $\pi$. We conclude by finding the
Martin boundary of the process and giving all of the corresponding harmonic
functions satisfying an oblique Neumann boundary problem.
|
In the present paper we investigate the transmission and reflection band
behavior for a plane electromagnetic wave falling obliquely on an ideal layered
structure. The dependence of this behavior on the problem parameters and wave
incident angle is considered. It is shown, that in general case the band width
is a non-monotonous function of the problem parameters. A condition is found,
which defines the possibility of the contact of the transmission bands. This
condition has the same form for s and p waves. It is also shown that
irrespective of the wave polarization, the transmission coefficient equals to
the unit at the contact points.
| 0.905056 | 0.674164 | 0.230892 |
2004.06969
|
Efficient, Near Complete and Often Sound Hybrid Dynamic Data Race
Prediction (extended version)
|
Dynamic data race prediction aims to identify races based on a single program
run represented by a trace. The challenge is to remain efficient while being as
sound and as complete as possible. Efficient means a linear run-time as
otherwise the method unlikely scales for real-world programs. We introduce an
efficient, near complete and often sound dynamic data race prediction method
that combines the lockset method with several improvements made in the area of
happens-before methods. By near complete we mean that the method is complete in
theory but for efficiency reasons the implementation applies some optimizations
that may result in incompleteness. The method can be shown to be sound for two
threads but is unsound in general. We provide extensive experimental data that
shows that our method works well in practice.
|
Many realistic robotics tasks are best solved compositionally, through
control architectures that sequentially invoke primitives and achieve error
correction through the use of loops and conditionals taking the system back to
alternative earlier states. Recent end-to-end approaches to task learning
attempt to directly learn a single controller that solves an entire task, but
this has been difficult for complex control tasks that would have otherwise
required a diversity of local primitive moves, and the resulting solutions are
also not easy to inspect for plan monitoring purposes. In this work, we aim to
bridge the gap between hand designed and learned controllers, by representing
each as an option in a hybrid hierarchical Reinforcement Learning framework -
DynoPlan. We extend the options framework by adding a dynamics model and the
use of a nearness-to-goal heuristic, derived from demonstrations. This
translates the optimization of a hierarchical policy controller to a problem of
planning with a model predictive controller. By unrolling the dynamics of each
option and assessing the expected value of each future state, we can create a
simple switching controller for choosing the optimal policy within a
constrained time horizon similarly to hill climbing heuristic search. The
individual dynamics model allows each option to iterate and be activated
independently of the specific underlying instantiation, thus allowing for a mix
of motion planning and deep neural network based primitives. We can assess the
safety regions of the resulting hybrid controller by investigating the
initiation sets of the different options, and also by reasoning about the
completeness and performance guarantees of the underpinning motion planners.
| 0.892377 | 0.651362 | 0.241015 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.