id
stringlengths 5
16
| query
stringlengths 1
382
| pos
stringlengths 7
5.09k
| neg
stringlengths 23
5.09k
| qp
float64 0.4
1
| qn
float64 0.34
0.91
| margin
float64 0.02
0.3
|
---|---|---|---|---|---|---|
2004.07298
|
Mixing properties of generalized $T, T^{-1}$ transformations
|
We study mixing properties of generalized $T, T^{-1}$ transformation. We
discuss two mixing mechanisms. In the case the fiber dynamics is mixing, it is
sufficient that the driving cocycle is small with small probability. In the
case the fiber dynamics is only assumed to be ergodic, one needs to use the
shearing properties of the cocycle. Applications include the Central Limit
Theorem for sufficiently fast mixing systems and the estimates on deviations of
ergodic averages.
|
We obtain sufficient conditions under which the limit of a sequence of
functions exhibits a particular dynamical behaviour at a point like
expansivity, shadowing, mixing, sensitivity and transitivity. We provide
examples to show that the set of all expansive, positively expansive and
sensitive points are neither open nor closed in general. We also observe that
the set of all transitive and mixing points are closed but not open in general.
We give examples to show that properties like expansivity, sensitivity,
shadowing, transitivity and mixing at a point need not be preserved under
uniform convergence and properties like topological stability and
$\alpha$-persistence at a point need not be preserved under pointwise
convergence.
| 0.891378 | 0.768271 | 0.123107 |
2004.07299
|
Asymptotic realization of the super-BMS algebra at spatial infinity
|
Explicit boundary conditions are given at spatial infinity for
four-dimensional supergravity, which provide a realization of the super-BMS
algebra of Awada, Gibbons and Shaw. The results are then generalized to the
$N$- extended super-BMS algebras.
|
Different classes of exact solutions for the BHT massive gravity theory are
constructed and analyzed. We focus in the special case of the purely quadratic
Lagrangian, whose field equations are irreducibly of fourth order and are known
to admit asymptotically locally flat black holes endowed with gravitational
hair. The first class corresponds to a Kerr-Schild deformation of Minkowski
spacetime along a covariantly constant null vector. As in the case of General
Relativity, the field equations linearize so that the solution can be easily
shown to be described by four arbitrary functions of a single null coordinate.
These solutions can be regarded as a new sort of pp-waves. The second class is
obtained from a deformation of the static asymptotically locally flat black
hole, that goes along the spacelike (angular) Killing vector. Remarkably,
although the deformation is not of Kerr-Schild type, the field equations also
linearize, and hence the generic solution can be readily integrated. It is
neither static nor spherically symmetric, being described by two integration
constants and two arbitrary functions of the angular coordinate. In the static
case it describes "black flowers" whose event horizons break the spherical
symmetry. The generic time-dependent solution appears to describe a graviton
that moves away from a black flower. Despite the asymptotic behaviour of these
solutions at null infinity is relaxed with respect to the one for General
Relativity, the asymptotic symmetries coincide. However, the algebra of the
conserved charges corresponds to BMS$_{3}$, but devoid of central extensions.
The "dynamical black flowers" are shown to possess a finite energy. The surface
integrals that define the global charges also turn out to be useful in the
description of the thermodynamics of solutions with event horizons.
| 0.880882 | 0.721101 | 0.159781 |
2004.07300
|
Gumbel-softmax-based Optimization: A Simple General Framework for
Optimization Problems on Graphs
|
In computer science, there exist a large number of optimization problems
defined on graphs, that is to find a best node state configuration or a network
structure such that the designed objective function is optimized under some
constraints. However, these problems are notorious for their hardness to solve
because most of them are NP-hard or NP-complete. Although traditional general
methods such as simulated annealing (SA), genetic algorithms (GA) and so forth
have been devised to these hard problems, their accuracy and time consumption
are not satisfying in practice. In this work, we proposed a simple, fast, and
general algorithm framework based on advanced automatic differentiation
technique empowered by deep learning frameworks. By introducing Gumbel-softmax
technique, we can optimize the objective function directly by gradient descent
algorithm regardless of the discrete nature of variables. We also introduce
evolution strategy to parallel version of our algorithm. We test our algorithm
on three representative optimization problems on graph including modularity
optimization from network science, Sherrington-Kirkpatrick (SK) model from
statistical physics, maximum independent set (MIS) and minimum vertex cover
(MVC) problem from combinatorial optimization on graph. High-quality solutions
can be obtained with much less time consuming compared to traditional
approaches.
|
We present a model development framework and numerical solution approach to
the general problem-class of packing convex objects into optimized convex
containers. Specifically, here we discuss the problem of packing ovals
(egg-shaped objects, defined here as generalized ellipses) into optimized
regular polygons in $\mathbb{R}^2$. Our solution strategy is based on the use
of embedded Lagrange multipliers, followed by nonlinear (global-local)
optimization. The numerical results are attained using randomized starting
solutions refined by a single call to a local optimization solver. We obtain
credible, tight packings for packing 4 to 10 ovals into regular polygons with 3
to 10 sides in all (224) test problems presented here, and for other similarly
difficult packing problems.
| 0.874224 | 0.711521 | 0.162703 |
2004.07301
|
ESResNet: Environmental Sound Classification Based on Visual Domain
Models
|
Environmental Sound Classification (ESC) is an active research area in the
audio domain and has seen a lot of progress in the past years. However, many of
the existing approaches achieve high accuracy by relying on domain-specific
features and architectures, making it harder to benefit from advances in other
fields (e.g., the image domain). Additionally, some of the past successes have
been attributed to a discrepancy of how results are evaluated (i.e., on
unofficial splits of the UrbanSound8K (US8K) dataset), distorting the overall
progression of the field.
The contribution of this paper is twofold. First, we present a model that is
inherently compatible with mono and stereo sound inputs. Our model is based on
simple log-power Short-Time Fourier Transform (STFT) spectrograms and combines
them with several well-known approaches from the image domain (i.e., ResNet,
Siamese-like networks and attention). We investigate the influence of
cross-domain pre-training, architectural changes, and evaluate our model on
standard datasets. We find that our model out-performs all previously known
approaches in a fair comparison by achieving accuracies of 97.0 % (ESC-10),
91.5 % (ESC-50) and 84.2 % / 85.4 % (US8K mono / stereo).
Second, we provide a comprehensive overview of the actual state of the field,
by differentiating several previously reported results on the US8K dataset
between official or unofficial splits. For better reproducibility, our code
(including any re-implementations) is made available.
|
Separating an audio scene into isolated sources is a fundamental problem in
computer audition, analogous to image segmentation in visual scene analysis.
Source separation systems based on deep learning are currently the most
successful approaches for solving the underdetermined separation problem, where
there are more sources than channels. Traditionally, such systems are trained
on sound mixtures where the ground truth decomposition is already known. Since
most real-world recordings do not have such a decomposition available, this
limits the range of mixtures one can train on, and the range of mixtures the
learned models may successfully separate. In this work, we use a simple blind
spatial source separation algorithm to generate estimated decompositions of
stereo mixtures. These estimates, together with a weighting scheme in the
time-frequency domain, based on confidence in the separation quality, are used
to train a deep learning model that can be used for single-channel separation,
where no source direction information is available. This demonstrates how a
simple cue such as the direction of origin of source can be used to bootstrap a
model for source separation that can be used in situations where that cue is
not available.
| 0.872159 | 0.714248 | 0.157911 |
2004.07302
|
Uniqueness Criteria for the Oseen Vortex in the 3d Navier-Stokes
Equations
|
In this paper, we consider the uniqueness of solutions to the 3d
Navier-Stokes equations with initial vorticity given by $\omega_0 = \alpha e_z
\delta_{x = y = 0}$, where $\delta_{x=y= 0}$ is the one dimensional Hausdorff
measure of an infinite, vertical line and $\alpha \in \mathbb R$ is an
arbitrary circulation. This initial data corresponds to an idealized, infinite
vortex filament. One smooth, mild solution is given by the self-similar Oseen
vortex column, which coincides with the heat evolution. Previous work by
Germain, Harrop-Griffiths, and the first author implies that this solution is
unique within a class of mild solutions that converge to the Oseen vortex in
suitable self-similar weighted spaces. In this paper, the uniqueness class of
the Oseen vortex is expanded to include any solution that converges to the
initial data in a sufficiently strong sense. This gives further evidence in
support of the expectation that the Oseen vortex is the only possible mild
solution that is identifiable as a vortex filament. The proof is a 3d variation
of a 2d compactness/rigidity argument in $t \searrow 0$ originally due to
Gallagher and Gallay.
|
In this paper we study the stochastic Navier-Stokes equation with artificial
compressibility. The main results of this work are the existence and uniqueness
theorem for strong solutions and the limit to incompressible flow. These
results are obtained by utilizing a local monotonicity property of the sum of
the Stokes operator and the nonlinearity.
| 0.899301 | 0.761921 | 0.137381 |
2004.07303
|
Surface Drinfeld Torsors I : Higher Genus Associators
|
We develop a higher genus version of Drinfeld associators by means of operad
theory. We start by introducing a framed version of rational associators and
Grothendieck-Teichm\"uller groups and show that their definition is independent
of the framing data. Next, we define a framed version of the universal KZ
connection and we use it to show that over the complex numbers, the rational
framed Drinfeld torsor is not empty. Next, we concentrate on the higher genus
version of this story. We define an operad module of framed parenthesized
higher genus braidings in prounipotent groupoids and we define its chord
diagram counterpart. We then use these operadic modules to operadicly define
higher genus associators and Grothendieck-Teichm\"uller groups, which again do
not depend on the framing data. Finally, we compare our results in the genus
$1$ case with those appearing in the litterature.
|
In this paper, we prove a quantitative equidistribution theorem for Gross
points over the rational function field $\mathbb{F}_q(t)$. We apply this result
to prove that the reduction map from CM Drinfeld modules to supersingular
Drinfeld modules is surjective. Our proofs rely crucially on a period formula
of F.-T. Wei and J. Yu, and a Lindel\"of-type bound for central values of
Rankin-Selberg L-functions associated to twists of automorphic forms of
Drinfeld-type by ideal class group characters.
| 0.851767 | 0.735872 | 0.115895 |
2004.07304
|
Tensor-to-Scalar Transition in the Nucleon-Nucleon Interaction Mapped by
$^{12}$C(e,e$^\prime$pn) Measurements
|
The strong nuclear interaction is probed at short-distance and high-momenta
using new measurements of the $^{12}$C$(e,e'p)$ and $^{12}$C$(e,e'pn)$
reactions, at high-$Q^2$ and $x_B>1$. The data span a missing-momentum range of
300-850 MeV/c and is predominantly sensitive to the dominant proton-neutron
short-range correlated (SRC) pairs and complements previous $^{12}$C$(e,e'pp)$
measurements. The data are well reproduced by theoretical calculations using
the Generalized Contact Formalism with both chiral and phenomenological
nucleon-nucleon ($NN$) interaction models. This agreement, observed here for
the first time, suggests that the measured high missing-momentum protons up to
$850$ MeV/c belonged to SRC pairs. The measured $^{12}$C$(e,e'pn)$ /
$^{12}$C$(e,e'p)$ ratio is consistent with a decrease in the fraction of
proton-neutron SRC pairs with increasing missing-momentum. This confirms the
transition from an isospin-dependent tensor $NN$ interaction at $\sim 400$
MeV/c to an isospin-independent scalar interaction at high-momentum around
$\sim 800$ MeV/c.
|
We study incoherent DVCS on $^4$He in the $^4{\rm He}(e,e^{\prime}\gamma p)X$
reaction, which probes medium-modifications of the bound nucleon GPDs and
elastic form factors. Assuming that the bound nucleon GPDs are modified in
proportion to the corresponding bound nucleon elastic form factors, as
predicted in the Quark-Meson Coupling model, we develop an approach to
calculate various incoherent nuclear DVCS observables. As an example, we
compute the beam-spin DVCS asymmetry, and predict the $x_B$- and $t$-dependence
of the ratio of the bound to free proton asymmetries, $A_{\rm
LU}^{p^{\ast}}(\phi)/A_{\rm LU}^{p}(\phi)$. We find that the deviation of
$A_{\rm LU}^{p^{\ast}}(\phi)/A_{\rm LU}^{p}(\phi)$ from unity is as much as
$\sim$ 6%.
| 0.85978 | 0.806515 | 0.053264 |
2004.07305
|
Internal Kinematics of M10 and M71
|
We present a study of the internal kinematics of two globular clusters, M10
(NGC 6254) and M71 (NGC 6838), using individual radial velocity (RV)
measurements obtained from observations using the Hydra multi-object
spectrograph on the WIYN 3.5 m telescope. We measured 120 RVs for stars in M10,
of which 107 were determined to be cluster members. In M71, we measured 82 RVs
and determined 78 of those measurements belonged to cluster members. Using the
cluster members, we determine a mean RV of $75.9 \pm 4.0$ (s.d.) km s$^{-1}$
and $-22.9 \pm 2.2$ (s.d.) km s$^{-1}$ for M10 and M71, respectively. We
combined the Hydra RV measurements with literature samples and performed a
line-of-sight rotational analysis on both clusters. Our analysis has not
revealed a statistically significant rotation in either of these clusters with
the exception of the inner region (10\arcsec - 117\arcsec) of M10 for which we
find hints of a marginally significant rotation with amplitude V$_{rot} = 1.14
\pm 0.18$ km s$^{-1}$. For M10, we calculate a central velocity dispersion of
$\sigma_{0} = 5.44 \pm 0.61$ km s$^{-1}$, which gives a ratio of the amplitude
of rotation to the central velocity dispersion $V_{rot}/\sigma_{0} = 0.21 \pm
0.04$. We also explored the rotation of the multiple stellar populations
identified in M10 and M71 and found rotation (or lack thereof) in each
population consistent with each other and the cluster global rotation
signatures.
|
The scalar dipole polarizabilities, $\alpha_{E1}$ and $\beta_{M1}$, are
fundamental properties related to the internal dynamics of the nucleon. The
currently accepted values of the proton polarizabilities were determined by
fitting to unpolarized proton Compton scattering cross section data. The
measurement of the beam asymmetry $\Sigma_{3}$ in a certain kinematical range
provides an alternative approach to the extraction of the scalar
polarizabilities. At the Mainz Microtron (MAMI) the beam asymmetry was measured
for Compton scattering below pion photoproduction threshold for the first time.
The results are compared with model calculations and the influence of the
experimental data on the extraction of the scalar polarizabilities is
determined.
| 0.818147 | 0.683744 | 0.134402 |
2004.07306
|
A new approach to mod 2 decompositions of BSU(2) and BSO(3)
|
Dwyer, Miller and Wilkerson proved that at the prime 2, the classifying
spaces of SU(2) and SO(3) can be obtained as a homotopy pushout of the
classifying spaces of certain subgroups. In this paper we show explicitly how
these decompositions arise from the fusion systems of SU(2) and SO(3) over
maximal discrete 2-toral subgroups.
|
We obtain an asymptotic formula for the mean value of L-functions associated
to cubic characters over F_q[t]. We solve this problem in the non-Kummer
setting when q=2 (mod 3) and in the Kummer case when q=1 (mod 3). The proofs
rely on obtaining precise asymptotics for averages of cubic Gauss sums over
function fields, which can be studied using the theory of metaplectic
Eisenstein series. In the non-Kummer setting we display some explicit
cancellation between the main term and the dual term coming from the
approximate functional equation of the L-functions.
| 0.733567 | 0.701098 | 0.032469 |
2004.07307
|
The arrow of time across five centuries of classical music
|
The concept of time series irreversibility -- the degree by which the
statistics of signals are not invariant under time reversal -- naturally
appears in non-equilibrium physics in stationary systems which operate away
from equilibrium and produce entropy. This concept has not been explored to
date in the realm of musical scores as these are typically short sequences
whose time reversibility estimation could suffer from strong finite size
effects which preclude interpretability. Here we show that the so-called
Horizontal Visibility Graph method -- which recently was shown to quantify such
statistical property even in non-stationary signals -- is a method that can
estimate time reversibility of short symbolic sequences, thus unlocking the
possibility of exploring such properties in the context of musical
compositions. Accordingly, we analyse over 8000 musical pieces ranging from the
Renaissance to the early Modern period and certify that, indeed, most of them
display clear signatures of time irreversibility. Since by construction
stochastic processes with a linear correlation structure (such as 1/f noise)
are time reversible, we conclude that musical compositions have a considerably
richer structure, that goes beyond the traditional properties retrieved by the
power spectrum or similar approaches. We also show that musical compositions
display strong signs of nonlinear correlations, that nonlinearity is correlated
to irreversibility, and that these are also related to asymmetries in the
abundance of musical intervals, which we associate to the narrative
underpinning a musical composition. These findings provide tools for the study
of musical periods and composers, as well as criteria related to music
appreciation and cognition.
|
Audio Classical Composer Identification (ACC) is an important problem in
Music Information Retrieval (MIR) which aims at identifying the composer for
audio classical music clips. The famous annual competition, Music Information
Retrieval Evaluation eXchange (MIREX), also takes it as one of the four
training&testing tasks. We built a hybrid model based on Deep Belief Network
(DBN) and Stacked Denoising Autoencoder (SDA) to identify the composer from
audio signal. As a matter of copyright, sponsors of MIREX cannot publish their
data set. We built a comparable data set to test our model. We got an accuracy
of 76.26% in our data set which is better than some pure models and shallow
models. We think our method is promising even though we test it in a different
data set, since our data set is comparable to that in MIREX by size. We also
found that samples from different classes become farther away from each other
when transformed by more layers in our model.
| 0.841684 | 0.675053 | 0.166631 |
2004.07308
|
Hopf monoids of ordered simplicial complexes
|
We study ordered matroids and generalized permutohedra from a Hopf theoretic
point of view. Our main object is a Hopf monoid in the vector species of
extended generalized permutahedra equipped with an order of the coordinates;
this monoid extends the Hopf monoid of generalized permutahedra studied by
Aguiar and Ardila. Our formula for the antipode is cancellation-free and
multiplicity-free, and is supported only on terms that are compatible with the
local geometry of the polyhedron. Our result is part of a larger program to
understand orderings on ground sets of simplicial complexes (for instance, on
shifted and matroid independence complexes). In this vein, we show that shifted
simplicial complexes and broken circuit complexes generate Hopf monoids that
are expected to exhibit similar behavior.
|
It is known that there are finitely many simplicial complexes (up to
isomorphism) with a given number of vertices. Translating to the language of
$h$-vectors, there are finitely many simplicial complexes of bounded dimension
with $h_1=k$ for any natural number $k$. In this paper we study the question at
the other end of the $h$-vector: Are there only finitely many
$(d-1)$-dimensional simplicial complexes with $h_d=k$ for any given $k$? The
answer is no if we consider general complexes, but when focus on three cases
coming from matroids: (i) independence complexes, (ii) broken circuit
complexes, and (iii) order complexes of geometric lattices. We prove the answer
is yes in cases (i) and (iii) and conjecture it is also true in case (ii).
| 0.907214 | 0.802723 | 0.104491 |
2004.07309
|
Algebras with matchings and link Floer homology
|
We explain how to use bordered algebras to compute a version of link Floer
homology. As a corollary, we also give a fast computation of the Thuston
polytope for links in the three-sphere.
|
In principle, Floer theory can be extended to define homotopy invariants of
families of equivalent objects (e.g. Hamiltonian isotopic symplectomorphisms,
3-manifolds, Legendrian knots, etc.) parametrized by a smooth manifold B. The
invariant of a family consists of a filtered chain homotopy type, which gives
rise to a spectral sequence whose E^2 term is the homology of B with twisted
coefficients in the Floer homology of the fibers. The filtered chain homotopy
type also gives rise to a "family Floer homology" to which the spectral
sequence converges. For any particular version of Floer theory, some analysis
needs to be carried out in order to turn this principle into a theorem. This
paper constructs the invariant in detail for the model case of finite
dimensional Morse homology, and shows that it recovers the Leray-Serre spectral
sequence of a smooth fiber bundle. We also generalize from Morse homology to
Novikov homology, which involves some additional subtleties.
| 0.900735 | 0.837486 | 0.063249 |
2004.07310
|
Stability of doubly-intractable distributions
|
Doubly-intractable distributions appear naturally as posterior distributions
in Bayesian inference frameworks whenever the likelihood contains a normalizing
function $Z$. Having two such functions $Z$ and $\widetilde Z$ we provide
estimates of the total variation and Wasserstein distance of the resulting
posterior probability measures. As a consequence this leads to local Lipschitz
continuity w.r.t. $Z$. In the more general framework of a random function
$\widetilde Z$ we derive bounds on the expected total variation and expected
Wasserstein distance. The applicability of the estimates is illustrated within
the setting of two representative Monte Carlo recovery scenarios.
|
Non-convex optimization problems often arise from probabilistic modeling,
such as estimation of posterior distributions. Non-convexity makes the problems
intractable, and poses various obstacles for us to design efficient algorithms.
In this work, we attack non-convexity by first introducing the concept of
\emph{probable convexity} for analyzing convexity of real functions in
practice. We then use the new concept to analyze an inference problem in the
\emph{Correlated Topic Model} (CTM) and related nonconjugate models. Contrary
to the existing belief of intractability, we show that this inference problem
is concave under certain conditions. One consequence of our analyses is a novel
algorithm for learning CTM which is significantly more scalable and qualitative
than existing methods. Finally, we highlight that stochastic gradient
algorithms might be a practical choice to resolve efficiently non-convex
problems. This finding might find beneficial in many contexts which are beyond
probabilistic modeling.
| 0.835065 | 0.73903 | 0.096035 |
2004.07311
|
Edge Computing For Smart Health: Context-aware Approaches,
Opportunities, and Challenges
|
Improving efficiency of healthcare systems is a top national interest
worldwide. However, the need of delivering scalable healthcare services to the
patients while reducing costs is a challenging issue. Among the most promising
approaches for enabling smart healthcare (s-health) are edge-computing
capabilities and next-generation wireless networking technologies that can
provide real-time and cost-effective patient remote monitoring. In this paper,
we present our vision of exploiting multi-access edge computing (MEC) for
s-health applications. We envision a MEC-based architecture and discuss the
benefits that it can bring to realize in-network and context-aware processing
so that the s-health requirements are met. We then present two main
functionalities that can be implemented leveraging such an architecture to
provide efficient data delivery, namely, multimodal data compression and
edge-based feature extraction for event detection. The former allows efficient
and low distortion compression, while the latter ensures high-reliability and
fast response in case of emergency applications. Finally, we discuss the main
challenges and opportunities that edge computing could provide and possible
directions for future research.
|
As we are moving towards the Internet of Things (IoT) era, the number of
connected physical devices is increasing at a rapid pace. Mobile edge computing
is emerging to handle the sheer volume of produced data and reach the latency
demand of computation-intensive IoT applications. Although the advance of
mobile edge computing on service latency is studied solidly, security and
efficiency on data usage in mobile edge computing have not been clearly
identified. In this article, we examine the architecture of mobile edge
computing and explore the potentials of utilizing mobile edge computing to
enhance data analysis for IoT applications, while achieving data security and
computational efficiency. Specifically, we first introduce the overall
architecture and several promising edge-assisted IoT applications. We then
study the security, privacy and efficiency challenges in data processing for
mobile edge computing, and discuss the opportunities to enhance data security
and improve computational efficiency with the assistance of edge computing,
including secure data aggregation, secure data deduplication and secure
computational offloading. Finally, several interesting directions on
edge-empowered data analysis are presented for future research.
| 0.877511 | 0.755031 | 0.12248 |
2004.07312
|
RescueNet: Joint Building Segmentation and Damage Assessment from
Satellite Imagery
|
Accurate and fine-grained information about the extent of damage to buildings
is essential for directing Humanitarian Aid and Disaster Response (HADR)
operations in the immediate aftermath of any natural calamity. In recent years,
satellite and UAV (drone) imagery has been used for this purpose, sometimes
aided by computer vision algorithms. Existing Computer Vision approaches for
building damage assessment typically rely on a two stage approach, consisting
of building detection using an object detection model, followed by damage
assessment through classification of the detected building tiles. These
multi-stage methods are not end-to-end trainable, and suffer from poor overall
results. We propose RescueNet, a unified model that can simultaneously segment
buildings and assess the damage levels to individual buildings and can be
trained end-toend. In order to to model the composite nature of this problem,
we propose a novel localization aware loss function, which consists of a Binary
Cross Entropy loss for building segmentation, and a foreground only selective
Categorical Cross-Entropy loss for damage classification, and show significant
improvement over the widely used Cross-Entropy loss. RescueNet is tested on the
large scale and diverse xBD dataset and achieves significantly better building
segmentation and damage classification performance than previous methods and
achieves generalization across varied geographical regions and disaster types.
|
This paper presents a localization technique using aerial imagery maps and
LIDAR based ground reflectivity for autonomous vehicles in urban environments.
Traditional localization techniques using LIDAR reflectivity rely on high
definition reflectivity maps generated from a mapping vehicle. The cost and
effort required to maintain such prior maps are generally very high because it
requires a fleet of expensive mapping vehicles. In this work we propose a
localization technique where the vehicle localizes using aerial/satellite
imagery, eradicating the need to develop and maintain complex high-definition
maps. The proposed technique has been tested on a real world dataset collected
from a test track in Ann Arbor, Michigan. This research concludes that aerial
imagery based maps provides real-time localization performance similar to
state-of-the-art LIDAR based maps for autonomous vehicles in urban environments
at reduced costs.
| 0.872167 | 0.668986 | 0.203181 |
2004.07313
|
Evaluation of Generalizability of Neural Program Analyzers under
Semantic-Preserving Transformations
|
The abundance of publicly available source code repositories, in conjunction
with the advances in neural networks, has enabled data-driven approaches to
program analysis. These approaches, called neural program analyzers, use neural
networks to extract patterns in the programs for tasks ranging from development
productivity to program reasoning. Despite the growing popularity of neural
program analyzers, the extent to which their results are generalizable is
unknown.
In this paper, we perform a large-scale evaluation of the generalizability of
two popular neural program analyzers using seven semantically-equivalent
transformations of programs. Our results caution that in many cases the neural
program analyzers fail to generalize well, sometimes to programs with
negligible textual differences. The results provide the initial stepping stones
for quantifying robustness in neural program analyzers.
|
In functional programming, point-free relation calculi have been fruitful for
general theories of program construction, but for specific applications
pointwise expressions can be more convenient and comprehensible. In imperative
programming, refinement calculi have been tied to pointwise expression in terms
of state variables, with the curious exception of the ubiquitous but invisible
heap. To integrate pointwise with point-free, de Moor and Gibbons extended
lambda calculus with non-injective pattern matching interpreted using
relations. This article gives a semantics of that language using ``ideal
relations'' between partial orders, and a second semantics using predicate
transformers. The second semantics is motivated by its potential use with
separation algebra, for pattern matching in programs acting on the heap. Laws
including lax beta and eta are proved in these models and a number of open
problems are posed.
| 0.927958 | 0.715251 | 0.212707 |
2004.07314
|
Associative submanifolds and gradient cycles
|
We discuss a model for associative submanifolds in $G_{2}$-manifolds with K3
fibrations, in the adiabatic limit. The model involves graphs in a 3-manifold
whose edges are locally gradient flow lines. We show that this model produces
analogues of known singularity formation phenomena for associative
submanifolds.
|
In this paper we study weakly irreducible holonomy representations of the
normal connection of a spacelike submanifold in a pseudo-Riemannian space from.
We associate screen representations to weakly irreducible normal holonomy
groups and classify the screen representations having the Borel-Lichn\'erowicz
property. In particular, we derive a classification of Lorentzian normal
holonomy representations.
| 0.861085 | 0.759562 | 0.101523 |
2004.07315
|
Hard Synchrotron Spectra from Magnetically Dominated Plasma Turbulence
|
Synchrotron emission from astrophysical nonthermal sources usually assumes
that the emitting particles are isotropic. By means of large-scale two- and
three-dimensional particle-in-cell simulations, we demonstrate that the
dissipation of magnetically-dominated ($\sigma_0\gg1$) turbulence in pair
plasmas leads to strongly anisotropic particle distributions. At Lorentz
factors $\sim \sigma_0 \gamma_{th0}$ (here, $\gamma_{th0}$ is the initial
Lorentz factor), the particle velocity is preferentially aligned with the local
magnetic field; instead, the highest energy particles are roughly isotropic.
This energy-dependent anisotropy leads to a synchrotron spectral flux $\nu
F_\nu\propto \nu^s$ that is much harder than for isotropic particles.
Remarkably, for $\sigma_0\gg1$ we find that the solid-angle-averaged spectral
slope in the slow cooling regime is $s\sim 0.5-0.7$ for a wide range of
turbulence fluctuations, $0.25\lesssim \delta B_{\rm rms0}^2/B_0^2\lesssim 4$,
despite significant variations in the power-law energy spectrum of nonthermal
particles. This is because weaker turbulence levels imprint a stronger degree
of anisotropy, thereby counteracting the effect of the steeper particle
spectrum. The synchrotron spectral slope may be even harder, $s\gtrsim 0.7$, if
the observer is in the plane perpendicular to the mean magnetic field. Our
results are independent of domain size and dimensionality. Our findings may
help explaining the origin of hard synchrotron spectra of astrophysical
nonthermal sources, most notably the radio spectrum of Pulsar Wind Nebulae.
|
Plasma instabilities can be encountered in many branches of physics. This
work focuses on relativistic plasmas with applications in theoretical
astrophysics and particle accelerator physics. Even though these fields seem to
be unrelated the underlying plasma physics processes are often very similar.
Two plasma instabilities - the beam-beam instability and the coherent
synchrotron radiation instability - are analyzed. The former severely limits
the achievable luminosity in storage rings and is related to the two-stream
instability which has been proposed as a candidate for the radiation mechanism
of radio pulsars. The main emphasis is on coherent synchrotron radiation which
can lead to prohibitive energy losses in bunch compressors. Coherent
synchrotron radiation also makes up the intense emission of radio waves by
pulsars. Simple models based on the linearized Vlasov equation and relativistic
magnetohydrodynamics which allow to compute detailed spectra of the emitted
radiation are developed.
| 0.85219 | 0.748542 | 0.103648 |
2004.07316
|
Modelling with Volna-OP2: Towards tsunami threat reduction
|
Accurate and efficient tsunami modelling is essential for providing tsunami
forecasts and hazard assessments. Volna-OP2 is a finite volume solver of the
nonlinear shallow water equations and its capabilities of producing both faster
than real time ensembles and high resolution inundation studies are presented
here. The code is massively parallelised and can utilise various high
performance computing architectures. When an earthquake is detected there is
always some uncertainty on the source parameters. Generating a faster than real
time ensemble for maximum wave heights which captures this uncertainty would be
of great benefit to tsunami warning centres. The 2003 Boumerdes earthquake
(Algeria) acts as a test case for showing Volna-OP2's ability at rapidly
forecasting regional maximum wave heights. Drawing on various earthquake
sources proposed in the literature and scaling the magnitudes to mimic
uncertainty on the source, 20 separate earthquake realisations are simulated
for 4 hours real time in 97s on two Nvidia V100 GPUs. Further a reduced
ensemble of the Lisbon 1755 tsunami with an emphasis on the effects to the
Irish coastline is presented. Where again various earthquake sources have been
drawn from the literature and simulated on a regional scale. Finally, a pilot
study which builds upon the reduced ensemble results investigates the
inundation of a Lisbon tsunami on key sections of the Irish coastline. The
results of this pilot study highlight that the inundation is constrained to
low-lying areas with maximum run-up heights of $\approx 3.4m$ being found.
|
Floods, tides and tsunamis are turbulent, yet conventional models are based
upon depth averaging inviscid irrotational flow equations. We propose to change
the base of such modelling to the Smagorinksi large eddy closure for turbulence
in order to appropriately match the underlying fluid dynamics. Our approach
allows for large changes in fluid depth to cater for extreme inundations. The
key to the analysis underlying the approach is to choose surface and bed
boundary conditions that accommodate a constant turbulent shear as a nearly
neutral mode. Analysis supported by slow manifold theory then constructs a
model for the coupled dynamics of the fluid depth and the mean turbulent
lateral velocity. The model resolves the internal turbulent shear in the flow
and thus may be used in further work to rationally predict erosion and
transport in turbulent floods.
| 0.860048 | 0.733493 | 0.126554 |
2004.07317
|
An Evaluation of DNN Architectures for Page Segmentation of Historical
Newspapers
|
One important and particularly challenging step in the optical character
recognition (OCR) of historical documents with complex layouts, such as
newspapers, is the separation of text from non-text content (e.g. page borders
or illustrations). This step is commonly referred to as page segmentation.
While various rule-based algorithms have been proposed, the applicability of
Deep Neural Networks (DNNs) for this task recently has gained a lot of
attention. In this paper, we perform a systematic evaluation of 11 different
published DNN backbone architectures and 9 different tiling and scaling
configurations for separating text, tables or table column lines. We also show
the influence of the number of labels and the number of training pages on the
segmentation quality, which we measure using the Matthews Correlation
Coefficient. Our results show that (depending on the task) Inception-ResNet-v2
and EfficientNet backbones work best, vertical tiling is generally preferable
to other tiling approaches, and training data that comprises 30 to 40 pages
will be sufficient most of the time.
|
Most of the current methods for mining parallel texts from the web assume
that web pages of web sites share same structure across languages. We believe
that there still exists a non-negligible amount of parallel data spread across
sources not satisfying this assumption. We propose an approach based on a
combination of bivec (a bilingual extension of word2vec) and locality-sensitive
hashing which allows us to efficiently identify pairs of parallel segments
located anywhere on pages of a given web domain, regardless their structure. We
validate our method on realigning segments from a large parallel corpus.
Another experiment with real-world data provided by Common Crawl Foundation
confirms that our solution scales to hundreds of terabytes large set of
web-crawled data.
| 0.878108 | 0.668423 | 0.209685 |
2004.07318
|
Scaling of high-energy elastic scattering and the observation of Odderon
|
We provide a statistically significant observation of the elusive Odderon
exchange, based on novel and model-independent analysis of the scaling
properties of the differential cross sections of elastic $pp$ and $p\bar p$
scattering in the TeV energy range. We report the statistical significance of
the observed Odderon signal at the level of 6.26$\sigma$.
|
Proton-proton total and elastic cross sections are considered in the
Dakhno-Nikonov eikonal model [L.G. Dakhno, V.A. Nikonov, Eur. Phys. J. A8, 209
(1999)] at ultra-high energies. The model takes into account the quark
structure of hadrons and the gluon structure of the supercritical pomeron that
results in colour screening. The pomeron is considered as an input interaction
term. The model gives a reasonably good description of the preLHC and LHC data
for $pp$ collisions with a growth of the type $\ln^2s$ for total and elastic
cross sections and $(\tau={\bf q}_\perp^2\ln^2s)$-scaling for diffractive
scattering. We present parameters of the supercritical pomeron and provide
predictions for the energy region $\sqrt{s}\sim 10^2-10^4$ TeV.
| 0.896892 | 0.771385 | 0.125507 |
2004.07321
|
Generating infinite monoids of cellular automata
|
For a group $G$ and a set $A$, let $\text{CA}(G;A)$ be the monoid of all
cellular automata over $A^G$, and let $\text{ICA}(G;A)$ be its group of units.
By establishing a characterisation of surjunctuve groups in terms of the monoid
$\text{CA}(G;A)$, we prove that the rank of $\text{CA}(G;A)$ (i.e. the smallest
cardinality of a generating set) is equal to the rank of $\text{ICA}(G;A)$ plus
the relative rank of $\text{ICA}(G;A)$ in $\text{CA}(G;A)$, and that the latter
is infinite when $G$ has an infinite decreasing chain of normal subgroups of
finite index. Moreover, we study the monoid $\text{LCA}(G;V)$ of all linear
cellular automata over $V^G$ and its group of units $\text{ILCA}(G;V)$. For any
infinite abelian group $G$ and any vector space $V$, we show that
$\text{LCA}(G;V)$ is not finitely generated, while for any finitely generated
torsion-free nilpotent group $H$ and any field $\mathbb{F}$, we show that
$\text{ILCA}(H;\mathbb{F})$ is finitely generated if and only if $\mathbb{F}$
is finite.
|
Hyphae within the mycelia of the ascomycetous fungi are compartmentalised by
septa. Each septum has a pore that allows for inter-compartmental and
inter-hyphal streaming of cytosol and even organelles. The compartments,
however, have special organelles, Woronin bodies, that can plug the pores. When
the pores are blocked, no flow of cytoplasm takes place. Inspired by the
controllable compartmentalisation within the mycelium of the ascomycetous fungi
we designed two-dimensional fungal automata. A fungal automaton is a cellular
automaton where communication between neighbouring cells can be blocked on
demand. We demonstrate computational universality of the fungal automata by
implementing sandpile cellular automata circuits there. We reduce the Monotone
Circuit Value Problem to the Fungal Automaton Prediction Problem. We construct
families of wires, cross-overs and gates to prove that the fungal automata are
P-complete.
| 0.81074 | 0.776237 | 0.034503 |
2004.07322
|
Regularity for $C^{1,\alpha}$ interface transmission problems
|
We study existence, uniqueness, and optimal regularity of solutions to
transmission problems for harmonic functions with $C^{1,\alpha}$ interfaces.
For this, we develop a new geometric stability argument based on the mean value
property.
|
In this paper, we propose an accurate finite difference method to discretize
the $d$-dimensional (for $d\ge 1$) tempered integral fractional Laplacian and
apply it to study the tempered effects on the solution of problems arising in
various applications. Compared to other existing methods, our method has higher
accuracy and simpler implementation. Our numerical method has an accuracy of
$O(h^\epsilon)$, for $u \in C^{0, \alpha+\epsilon} (\bar{\Omega})$ if $\alpha <
1$ (or $u \in C^{1, \alpha-1+\epsilon} (\bar{\Omega})$ if $\alpha \ge 1$) with
$\epsilon > 0$, suggesting the minimum consistency conditions. The accuracy can
be improved to $O(h^2)$, for $u \in C^{2, \alpha+\epsilon} (\bar{\Omega})$ if
$\alpha < 1$ (or $u \in C^{3, \alpha - 1 + \epsilon} (\bar{\Omega})$ if $\alpha
\ge 1$). Numerical experiments confirm our analytical results and provide
insights in solving the tempered fractional Poisson problem. It suggests that
to achieve the second order of accuracy, our method only requires the solution
$u \in C^{1,1}(\bar{\Omega})$ for any $0<\alpha<2$. Moreover, if the solution
of tempered fractional Poisson problems satisfies $u \in C^{p,
s}(\bar{\Omega})$ for $p = 0, 1$ and $0<s \le 1$, our method has the accuracy
of $O(h^{p+s})$. Since our method yields a (multilevel) Toeplitz stiffness
matrix, one can design fast algorithms via the fast Fourier transform for
efficient simulations. Finally, we apply it together with fast algorithms to
study the tempered effects on the solutions of various tempered fractional
PDEs, including the Allen-Cahn equation and Gray-Scott equations.
| 0.902533 | 0.713693 | 0.188841 |
2004.07323
|
The Maximum Distance Problem and Minimal Spanning Trees
|
Given a compact $E\subset \mathbb{R}^n$ and $s > 0$, the maximum distance
problem asks to find a compact and connected subset of $\mathbb{R}^n$ of
smallest one dimensional Hausdorff measure, whose $s$-neighborhood covers $E$.
For $E\subset \mathbb{R}^2$, we prove that minimizing over minimal spanning
trees that connect the centers of balls of radius $s$, which cover $E$, solves
the maximum distance problem. The main difficulty in proving this result, is
overcome by the proof of Lemma 3.5, which states that one is able to cover the
$s$-neighborhood of a Lipschitz curve in $\mathbb{R}^2$, with a finite number
balls of radius $s$, and connect their centers with another Lipschitz curve,
$\Gamma_\ast$, where $\mathcal{H}^1(\Gamma_\ast)$ is arbitrarily close to
$\mathcal{H}^1(\Gamma)$.
|
In this paper, our goal is to characterize two graph classes based on the
properties of minimal vertex (edge) separators. We first present a structural
characterization of graphs in which every minimal vertex separator is a stable
set. We show that such graphs are precisely those in which the induced
subgraph, namely, a cycle with exactly one chord is forbidden. We also show
that deciding maximum such forbidden subgraph is NP-complete by establishing a
polynomial time reduction from maximum induced cycle problem [1]. This result
is of independent interest and can be used in other combinatorial problems.
Secondly, we prove that a graph has the following property: every minimal edge
separator induces a matching (that is no two edges share a vertex in common) if
and only if it is a tree.
| 0.855054 | 0.825814 | 0.02924 |
2004.07324
|
Building a Multi-domain Neural Machine Translation Model using Knowledge
Distillation
|
Lack of specialized data makes building a multi-domain neural machine
translation tool challenging. Although emerging literature dealing with low
resource languages starts to show promising results, most state-of-the-art
models used millions of sentences. Today, the majority of multi-domain
adaptation techniques are based on complex and sophisticated architectures that
are not adapted for real-world applications. So far, no scalable method is
performing better than the simple yet effective mixed-finetuning, i.e
finetuning a generic model with a mix of all specialized data and generic data.
In this paper, we propose a new training pipeline where knowledge distillation
and multiple specialized teachers allow us to efficiently finetune a model
without adding new costs at inference time. Our experiments demonstrated that
our training pipeline allows improving the performance of multi-domain
translation over finetuning in configurations with 2, 3, and 4 domains by up to
2 points in BLEU.
|
Recent work on end-to-end neural network-based architectures for machine
translation has shown promising results for En-Fr and En-De translation.
Arguably, one of the major factors behind this success has been the
availability of high quality parallel corpora. In this work, we investigate how
to leverage abundant monolingual corpora for neural machine translation.
Compared to a phrase-based and hierarchical baseline, we obtain up to $1.96$
BLEU improvement on the low-resource language pair Turkish-English, and $1.59$
BLEU on the focused domain task of Chinese-English chat messages. While our
method was initially targeted toward such tasks with less parallel data, we
show that it also extends to high resource languages such as Cs-En and De-En
where we obtain an improvement of $0.39$ and $0.47$ BLEU scores over the neural
machine translation baselines, respectively.
| 0.885213 | 0.814166 | 0.071046 |
2004.07325
|
Experimental observation of magnetic dimers in diluted Yb:YAlO$_3$
|
We present a comprehensive experimental investigation of Yb magnetic dimers
in Yb$_{0.04}$Y$_{0.96}$AlO$_3$, an Yb-doped Yttrium Aluminum Perovskite (YAP)
YAlO$_3$ by means of specific heat, magnetization and high-resolution inelastic
neutron scattering (INS) measurements. In our sample, the Yb ions are randomly
distributed over the lattice and $\sim 7$\% of Yb ions form quantum dimers due
to nearest-neighbor antiferromagnetic coupling along the $c$-axis. At zero
field, the dimer formation manifests itself in an appearance of an inelastic
peak at $\Delta \approx 0.2$~meV in the INS spectrum and a Schottky-like
anomaly in the specific heat. The structure factor of the INS peak exhibits a
cosine modulation along the $L$ direction, in agreement with the $c$-axis
nearest-neighbor intra-dimer coupling. A careful fitting of the low-temperature
specific heat shows that the excited state is a degenerate triplet, which
indicates a surprisingly small anisotropy of the effective Yb-Yb exchange
interaction despite the low crystal symmetry and anisotropic magnetic dipole
contribution, in agreement with previous reports for the Yb parent compound,
YbAlO$_3$ [arXiv:1904.11513, arXiv:1902.04112], and in contrast to
Yb$_2$Pt$_2$Pb [arXiv:1606.01309, arXiv:1907.01067]. The obtained results are
precisely reproduced by analytical calculations for the Yb dimers.
|
Susceptibility, ESR and magnetization measurements have been performed on si
ngle crystals of an S=1 bond alternating chain compound: [Ni(333-tet)(\mu-NO
_2)](ClO_4) (333-tet = N,N'-bis(3-aminopropyl)propane-1,3-diamine) and the c
ompound doped with a small amount of Zn. We observed an anomalous angular de
pendence in the Zn-doped sample. These behaviors are well explained by the m
odel based on the VBS picture for the singlet-dimer phase. The picture impli es
that the free spins of S=1 with a positive single-ion anisotropy are indu ced
at the edges of the chains without forming the singlet-dimer.
| 0.888771 | 0.731041 | 0.157731 |
2004.07326
|
Modeling Hall viscosity in magnetic-skyrmion systems
|
Magnetic skyrmions are topologically stable objects that are made with a
bunch of spins tightly arranged in a smooth fashion. Their topological nature
provides unusual and complex transport properties, such as the skyrmion Hall
effect. Extensive Hall data have further revealed asymmetry between skyrmion
and antiskyrmion Hall angles, which cannot be accounted by known mechanisms.
Here, we explain this asymmetry by utilizing another universal transport
coefficient called `Hall viscosity,' extensively studied in quantum Hall
systems. Hall viscosity is modeled in steady-state skyrmions motion by
generalizing the Thiele equation with a transverse velocity component and is
independent of the skyrmion charge. Our analyses, based on available asymmetric
Hall angle data, reveal this transverse force amounts 3\% - 5.4\% of the force
due to the skyrmion Hall effect. Further clarification of Hall viscosity will
be essential for designing next generation storage devices properly, not to
mention for our deeper understanding of fundamental properties of nature.
|
We observe the signature of zero-field ground-state skyrmions in BiSb
topological insulator / MnGa bi-layers by using the topological Hall effect
(THE). We observe a large critical interfacial
Dzyaloshinskii-Moriya-Interaction energy (5.0 pJ/m) at the BiSb/MnGa interface
that can be tailored by controlling the annealing temperature of the MnGa
template. The THE was observed at room temperature even under absence of an
external magnetic field, which gives the strong evidence for the existence of
thermodynamically stable skyrmions in MnGa/BiSb bi-layers. Our results will
give insight into the role of interfacial DMI tailored by suitable material
choice and growth technique for generation of stable skyrmions at room
temperature.
| 0.880505 | 0.779947 | 0.100558 |
2004.07327
|
Astronomical masers and Dicke's superradiance
|
We consider the radiation properties and processes of a gas with a population
inversion using the formalism based on the Maxwell-Bloch equations. We focus on
the maser action and Dicke's superradiance to establish their relationship in
the overall radiation process during the temporal evolution of the system as a
function of position. We show that the maser action and superradiance are not
competing phenomena but are rather complementary, and define two distinct
limits for the intensity of radiation. Masers characterise the quasi-steady
state limit, when the population inversion density and the polarisation
amplitude vary on time-scales longer than those of non-coherent processes
affecting their evolution (e.g., collisions), while superradiance defines the
fast transient regime taking place when these conditions are reversed. We show
how a transition from a maser regime to superradiance will take place whenever
a critical threshold for the column density of the population inversion is
reached, at which point a strong level of coherence is established in the
system and a powerful burst of radiation can ensue during the transient regime.
This critical level also determines the spatial region where a transition from
the unsaturated to the saturated maser regimes will take place; superradiance
can thus be seen as the intermediary between the two. We also quantify the gain
in radiation intensity attained during the superradiance phase relative to the
two maser regimes, and show how the strong coherence level during superradiance
is well suited to explain observations that reveal intense and fast radiation
flares in maser-hosting regions.
|
Motivated by recent experiments with superradiant Bose-Einstein Condensate
(BEC) we consider simple microscopic models describing rigorously the
interference of the two cooperative phenomena, BEC and radiation, in
thermodynamic equilibrium. Our resuts in equilibrium confirm the presence of
the observed superradiant light scattering from BEC: (a) the equilibrium
superradiance exists only below a certain transition temperature; (b) there is
superradiance and matter-wave (BEC) enhancement due to the coherent coupling
between light and matter.
| 0.780578 | 0.730182 | 0.050397 |
2004.07328
|
The Reduced Proper Motion selected halo: methods and description of the
catalogue
|
The Gaia mission has provided the largest ever astrometric chart of the Milky
Way. Using it to map the Galactic halo is helpful for disentangling its merger
history. The identification of halo stars in Gaia DR2 with reliable distance
estimates requires special methods because such stars are typically farther
away and scarce. We apply the reduced proper motion (RPM) method to identify
halo main sequence stars on the basis of Gaia photometry and proper motions.
Using the colour-absolute-magnitude relation for this type of stars, we
calculate photometric distances. Our selection results in a set of $\sim10^7$
tentative main sequence halo stars with typical distance uncertainties of $7\%$
and with median velocity errors of 20 km/s. The median distance of our sample
is $\sim 4.4$ kpc, with the faintest stars located at $\sim 16$ kpc. The
spatial distribution of the stars in our sample is centrally concentrated.
Visual inspection of the mean velocities of stars on the sky reveals
large-scale patterns as well as clear imprints of the GD-1 stream and tentative
hints of the Jhelum and Leiptr streams. Incompleteness and selection effects
limit our ability to interpret the patterns reliably as well as to identify new
substructures. We define a pseudo-velocity space by setting to zero the
line-of-sight velocities of our sample stars. In this space, we recover several
known structures such as the footprint of Gaia-Enceladus (i.e. the
Gaia-Sausage) as well as the Helmi streams and some other retrograde
substructures (Sequoia, Thamnos). We show that the two-point velocity
correlation function reveals significant clustering on scales smaller than 100
km/s, of similar amplitude as found for the 6D Gaia halo sample. This
clustering indicates the presence of nearby streams that are predominantly
phase-mixed.
|
Recent results of microlensing surveys, show that 10-20% of the dark halo
mass of the Milky Way consists of compact objects. The masses of these compact
objects range from 0.1 to 1 solar mass. New theoretical cooling models for
white dwarfs, and the detection of faint blue high proper motion objects, imply
that ancient white dwarfs might make up part of this population. In this pilot
project, using data from the C and D patches of the ESO Imaging Survey and data
obtained at CTIO, we attempted to find such halo white dwarfs in the solar
neighbourhood. With a time baseline of approximately one year between data sets
and a limiting I-band magnitude of 23, we can find these high proper motion
objects up to distances of 85 parsecs. In the 2.5 square degrees studied so far
we have found three high proper motion candidates.
| 0.787812 | 0.767808 | 0.020004 |
2004.07329
|
Augmented Lagrangian preconditioners for the Oseen-Frank model of
cholesteric liquid crystals
|
We propose a robust and efficient augmented Lagrangian-type preconditioner
for solving linearizations of the Oseen-Frank model arising in cholesteric
liquid crystals. By applying the augmented Lagrangian method, the Schur
complement of the director block can be better approximated by the weighted
mass matrix of the Lagrange multiplier, at the cost of making the augmented
director block harder to solve. In order to solve the augmented director block,
we develop a robust multigrid algorithm which includes an additive Schwarz
relaxation that captures a pointwise version of the kernel of the semi-definite
term. Furthermore, we prove that the augmented Lagrangian term improves the
discrete enforcement of the unit-length constraint. Numerical experiments
verify the efficiency of the algorithm and its robustness with respect to
problem-related parameters (Frank constants and cholesteric pitch) and the mesh
size.
|
The chiral structure of liquid crystalline phases arises due to the intrinsic
chirality of the constituent mesogens. While it is seemingly straightforward to
quantify the macroscopic chirality by using, for instance, the cholesteric
pitch or the optical rotatory power, it is not as simple to quantify the
chirality of a single molecule. I will discuss a systematic quantification of
molecular chirality and show how the resulting chiral parameters may be used to
predict macroscopic chiral structure.
| 0.937732 | 0.708889 | 0.228843 |
2004.07330
|
A New Constrained Optimization Model for Solving the Nonsymmetric
Stochastic Inverse Eigenvalue Problem
|
The stochastic inverse eigenvalue problem aims to reconstruct a stochastic
matrix from its spectrum. While there exists a large literature on the
existence of solutions for special settings, there are only few numerical
solution methods available so far. Recently, Zhao et al. (2016) proposed a
constrained optimization model on the manifold of so-called isospectral
matrices and adapted a modified Polak-Ribi\`ere-Polyak conjugate gradient
method to the geometry of this manifold. However, not every stochastic matrix
is an isospectral one and the model from Zhao et al. is based on the assumption
that for each stochastic matrix there exists a (possibly different)
isospectral, stochastic matrix with the same spectrum. We are not aware of such
a result in the literature, but will see that the claim is at least true for $3
\times 3$ matrices. In this paper, we suggest to extend the above model by
considering matrices which differ from isospectral ones only by multiplication
with a block diagonal matrix with $2 \times 2$ blocks from the special linear
group $SL(2)$, where the number of blocks is given by the number of pairs of
complex-conjugate eigenvalues. Every stochastic matrix can be written in such a
form, which was not the case for the form of the isospectral matrices. We prove
that our model has a minimizer and show how the Polak-Ribi\`ere-Polyak
conjugate gradient method works on the corresponding more general manifold. We
demonstrate by numerical examples that the new, more general method performs
similarly as the one from Zhao et al.
|
We study an optimal investment problem under contagion risk in a financial
model subject to multiple jumps and defaults. The global market information is
formulated as a progressive enlargement of a default-free Brownian filtration,
and the dependence of default times is modeled by a conditional density
hypothesis. In this Ito-jump process model, we give a decomposition of the
corresponding stochastic control problem into stochastic control problems in
the default-free filtration, which are determined in a backward induction. The
dynamic programming method leads to a backward recursive system of quadratic
backward stochastic differential equations (BSDEs) in Brownian filtration, and
our main result proves, under fairly general conditions, the existence and
uniqueness of a solution to this system, which characterizes explicitly the
value function and optimal strategies to the optimal investment problem. We
illustrate our solutions approach with some numerical tests emphasizing the
impact of default intensities, loss or gain at defaults and correlation between
assets. Beyond the financial problem, our decomposition approach provides a new
perspective for solving quadratic BSDEs with a finite number of jumps.
| 0.849543 | 0.694611 | 0.154932 |
2004.07331
|
Shear-induced gelation of self-yielding active networks
|
Molecular-motor generated active stresses drive the cytoskeleton away from
equilibrium, endowing it with tunable mechanical properties that are essential
for diverse functions such as cell division and motility[1-5]. Designing
analogous biomimetic systems is a key prerequisite for creating active matter
that can emulate cellular functions[6-7]. These long-term goals requires
understanding of how motor-generated stresses tune the mechanics of filamentous
networks[8-11]. In microtubule-based active matter, kinesin motors generate
extensile motion that leads to persistent breaking and reforming of the network
links[12]. We study how such microscopic dynamics modifies the network's
mechanical properties, uncovering that the network viscosity first increases
with the imposed shear rate before transitioning back to a low-viscosity state.
The non-monotonic shear-dependent viscosity can be controlled by tuning the
speed of molecular motors. A two-state phenomenological model that incorporates
liquid- and solid-like elements quantitatively relates the non-monotonic
shear-rate-dependent viscosity to locally-measured flows. These studies show
that rheology of extensile networks are different from previously studied
active gels[13], where contractility enhances mechanical stiffness. Moreover,
the flow induced gelation is not captured by continuum models of
hydrodynamically interacting swimmers[14-21]. Observation of activity-dependent
viscoelasticity necessitates the development of models for self-yielding of
soft active solids whose intrinsic active stresses fluidize or stiffen the
network.
|
The subject of this work is the instability mechanism of simple shear flows,
like Hagen-Poiseuille pipe flow, which is a long-standing problem in fluid
mechanics [1,2]. A possible analogy with phenomenological theory of ideal
plasticity in solids is explored. It allows an extension of the Navier-Stokes
equations making the simple shear flows unstable. Following von Mises [4], the
existence of maximal allowed shear stress or "yield stress" in fluid is
assumed. After the actual stresses have reached this value, a new physical
mechanism will be activated attempting to reduce them. This mechanism results
in a pressure-like force, which has to be added to the Navier-Stokes equations.
The yield stress itself is a material constant, which does not depend on the
Reynolds number of particular flow. It will be shown how to estimate its value
from experimental data. To demonstrate how the character of flow changes if the
additional force is taken into account, an unsteady flow in a 2D nozzle is
presented. The momentum source was introduced in the Navier-Stokes equations
through the user-defined function's interface offered by Fluent [6]. The
initial data and the results of simulation are summarized in appendix.
| 0.847078 | 0.657031 | 0.190047 |
2004.07332
|
Tests for multivariate normality -- a critical review with emphasis on
weighted $L^2$-statistics
|
This article gives a synopsis on new developments in affine invariant tests
for multivariate normality in an i.i.d.-setting, with special emphasis on
asymptotic properties of several classes of weighted $L^2$-statistics. Since
weighted $L^2$-statistics typically have limit normal distributions under fixed
alternatives to normality, they open ground for a neighborhood of model
validation for normality. The paper also reviews several other invariant tests
for this problem, notably the energy test, and it presents the results of a
large-scale simulation study. All tests under study are implemented in the
accompanying R-package mnt.
|
In this paper we consider the properties of the Pesaran (2004, 2015a) CD test
for cross-section correlation when applied to residuals obtained from panel
data models with many estimated parameters. We show that the presence of
period-specific parameters leads the CD test statistic to diverge as length of
the time dimension of the sample grows. This result holds even if cross-section
dependence is correctly accounted for and hence constitutes an example of the
Incidental Parameters Problem. The relevance of this problem is investigated
both for the classical Time Fixed Effects estimator as well as the Common
Correlated Effects estimator of Pesaran (2006). We suggest a weighted CD test
statistic which re-establishes standard normal inference under the null
hypothesis. Given the widespread use of the CD test statistic to test for
remaining cross-section correlation, our results have far reaching implications
for empirical researchers.
| 0.93155 | 0.737707 | 0.193844 |
2004.07333
|
Reinforcement Learning in a Physics-Inspired Semi-Markov Environment
|
Reinforcement learning (RL) has been demonstrated to have great potential in
many applications of scientific discovery and design. Recent work includes, for
example, the design of new structures and compositions of molecules for
therapeutic drugs. Much of the existing work related to the application of RL
to scientific domains, however, assumes that the available state representation
obeys the Markov property. For reasons associated with time, cost, sensor
accuracy, and gaps in scientific knowledge, many scientific design and
discovery problems do not satisfy the Markov property. Thus, something other
than a Markov decision process (MDP) should be used to plan / find the optimal
policy. In this paper, we present a physics-inspired semi-Markov RL
environment, namely the phase change environment. In addition, we evaluate the
performance of value-based RL algorithms for both MDPs and partially observable
MDPs (POMDPs) on the proposed environment. Our results demonstrate deep
recurrent Q-networks (DRQN) significantly outperform deep Q-networks (DQN), and
that DRQNs benefit from training with hindsight experience replay. Implications
for the use of semi-Markovian RL and POMDPs for scientific laboratories are
also discussed.
|
Reinforcement learning algorithms, though successful, tend to over-fit to
training environments hampering their application to the real-world. This paper
proposes $\text{W}\text{R}^{2}\text{L}$ -- a robust reinforcement learning
algorithm with significant robust performance on low and high-dimensional
control tasks. Our method formalises robust reinforcement learning as a novel
min-max game with a Wasserstein constraint for a correct and convergent solver.
Apart from the formulation, we also propose an efficient and scalable solver
following a novel zero-order optimisation method that we believe can be useful
to numerical optimisation in general. We empirically demonstrate significant
gains compared to standard and robust state-of-the-art algorithms on
high-dimensional MuJuCo environments.
| 0.855951 | 0.795371 | 0.06058 |
2004.07334
|
Visual explanation of country specific differences in Covid-19 dynamics
|
This report provides a visual examination of Covid-19 case and death data. In
particular, it shows that country specific differences can too a large extend
be explained by two easily interpreted parameters. Namely, the delay between
reported cases and deaths and the fraction of cases observed. Furthermore, this
allows to lower bound the actual total number of people already infected.
|
As the coronavirus disease 2019 (COVID-19) becomes a global pandemic, policy
makers must enact interventions to stop its spread. Data driven approaches
might supply information to support the implementation of mitigation and
suppression strategies. To facilitate research in this direction, we present a
machine-readable dataset that aggregates relevant data from governmental,
journalistic, and academic sources on the county level. In addition to
county-level time-series data from the JHU CSSE COVID-19 Dashboard, our dataset
contains more than 300 variables that summarize population estimates,
demographics, ethnicity, housing, education, employment and in come, climate,
transit scores, and healthcare system-related metrics. Furthermore, we present
aggregated out-of-home activity information for various points of interest for
each county, including grocery stores and hospitals, summarizing data from
SafeGraph. By collecting these data, as well as providing tools to read them,
we hope to aid researchers investigating how the disease spreads and which
communities are best able to accommodate stay-at-home mitigation efforts. Our
dataset and associated code are available at
https://github.com/JieYingWu/COVID-19_US_County-level_Summaries.
| 0.843374 | 0.770151 | 0.073223 |
2004.07335
|
Nontrivial upper bounds for the least common multiple of an arithmetic
progression
|
In this paper, we establish some nontrivial and effective upper bounds for
the least common multiple of consecutive terms of a finite arithmetic
progression. Precisely, we prove that for any two coprime positive integers $a$
and $b$, with $b\geq 2$, we have \[\mathrm{lcm}\left(a,a+b,\dots,a+nb\right)
\leq \left(c_1\cdot b\log b\right)^{n+\left\lfloor
\frac{a}{b}\right\rfloor}~~~~(\forall n\geq b+1),\] where $c_1=41.30142$. If in
addition $b$ is a prime number and $a<b$, then we prove that for any $n\geq
b+1$, we have $\mathrm{lcm}\left(a,a+b,\dots,a+nb\right) \leq \left(c_2\cdot
b^{\frac{b}{b-1}}\right)^n$, where $c_2=12.30641$. Finally, we apply those
inequalities to estimate the arithmetic function $M$ defined by
$M(n):=\frac{1}{\varphi(n)}\sum_{\substack{1\leq\ell\leq n \\ \ell \wedge
n=1}}\frac{1}{\ell}$ ($\forall n \geq 1$), as well as some values of the
generalized Chebyshev function $\theta(x;k,\ell)$.
|
For families of $K3$ surfaces, we establish a sufficient criterion for real
or complex multiplication. Our criterion is arithmetic in nature. It may show,
at first, that the generic fibre of the family has a nontrivial endomorphism
field. Moreover, the endomorphism field does not shrink under specialisation.
As an application, we present two explicit families of $K3$ surfaces having
real multiplication by $\bbQ(\sqrt{2})$ and $\bbQ(\sqrt{5})$, respectively.
| 0.895481 | 0.722685 | 0.172796 |
2004.07336
|
Parasitic neutron beam monitoring: proof of concept on gamma monitoring
of neutron chopper phases
|
Neutron beam monitors are an essential diagnostic component of neutron
scattering facilities. They are used to measure neutron flux, calibrating
experiments performed on the instruments, allowing measurement of facility
performance, understanding of beam-line components (such as choppers),
calibration of detectors and tracking of beam stability. Ideally beam monitors
do not perturb the beam. Previous work shows commercial beam monitors attenuate
the beam by few percent in the worst case due to the 1-2 mm thick Aluminium
entrance and exit windows and the material inside. Parasitic methods of neutron
beam diagnostics, where there is no beam monitor directly in the beam, would be
preferable. This paper presents the concept of a parasitic method of monitoring
the beam which can be used for neutron chopper phasing. This is achieved by
placing a gamma detector close to a rotating chopper and measures a signal
proportional to the flux absorbed by the chopper. Neutrons interact with the
Boron absorber on the chopper disc lead to gamma emission at 480 keV. Detection
of these gamma rays is used to determine the chopper phasing and timing.
Potentially information on the flux of the beamline can be extracted. Results
from a proof of concept implementation show that diagnosis of neutron chopper
phases is feasible.
|
We report here the non-detection of gravitational waves from the merger of
binary neutron star systems and neutron-star--black-hole systems during the
first observing run of Advanced LIGO. In particular we searched for
gravitational wave signals from binary neutron star systems with component
masses $\in [1,3] M_{\odot}$ and component dimensionless spins $< 0.05$. We
also searched for neutron-star--black-hole systems with the same neutron star
parameters, black hole mass $\in [2,99] M_{\odot}$ and no restriction on the
black hole spin magnitude. We assess the sensitivity of the two LIGO detectors
to these systems, and find that they could have detected the merger of binary
neutron star systems with component mass distributions of $1.35\pm0.13
M_{\odot}$ at a volume-weighted average distance of $\sim$ 70Mpc, and for
neutron-star--black-hole systems with neutron star masses of $1.4M_\odot$ and
black hole masses of at least $5M_\odot$, a volume-weighted average distance of
at least $\sim$ 110Mpc. From this we constrain with 90% confidence the merger
rate to be less than 12,600 Gpc$^{-3}$yr$^{-1}$ for binary-neutron star systems
and less than 3,600 Gpc$^{-3}$yr$^{-1}$ for neutron-star--black-hole systems.
We find that if no detection of neutron-star binary mergers is made in the next
two Advanced LIGO and Advanced Virgo observing runs we would place significant
constraints on the merger rates. Finally, assuming a rate of
$10^{+20}_{-7}$Gpc$^{-3}$yr$^{-1}$ short gamma ray bursts beamed towards the
Earth and assuming that all short gamma-ray bursts have binary-neutron-star
(neutron-star--black-hole) progenitors we can use our 90% confidence rate upper
limits to constrain the beaming angle of the gamma-ray burst to be greater than
${2.3^{+1.7}_{-1.1}}^{\circ}$ (${4.3^{+3.1}_{-1.9}}^{\circ}$).
| 0.911751 | 0.670657 | 0.241094 |
2004.07337
|
Nonequilibrium Solvent Polarization Effects in Real-Time Electronic
Dynamics of Solute Molecules Subject to Time-Dependent Electric Fields: A New
Feature of the Polarizable Continuum Model
|
We develop an extension of the time-dependent equation-of-motion formulation
of the polarizable continuum model (EOM-TDPCM) to introduce nonequilibrium
cavity field effects in quantum mechanical calculations of solvated molecules
subject to time-dependent electric fields. This method has been implemented in
Octopus, a state-of-the-art code for real-space, real-time time-dependent
density functional theory (RT-TDDFT) calculations. To show the potential of our
methodology, we perform EOM-TDPCM/RT-TDDFT calculations of trans-azobenzene in
water and in other model solvents with shorter relaxation times. Our results
for the optical absorption spectrum of trans-azobenzene show (i) that cavity
field effects have a clear impact in the overall spectral shape and (ii) that
an accurate description of the solute shape (as the one provided within PCM) is
key to correctly account for cavity field effects.
|
We study the effect of spatially nonlocal correlations on the nonequilibrium
dynamics of interacting fermions by constructing the nonequilibrium dynamical
cluster theory, a cluster generalization of the nonequilibrium dynamical
mean-field theory (DMFT). The formalism is applied to interaction quenches in
the Hubbard model in one and two dimensions, and the results are compared with
data from single-site DMFT, the time-dependent density matrix renormalization
group, and lattice perturbation theory. Both in one and two dimensions the
double occupancy quickly thermalizes, while the momentum distribution relaxes
only on much longer time scales. For the two-dimensional square lattice we find
a strongly momentum-dependent evolution of the momentum distribution around the
Fermi energy, with a much faster relaxation near the momenta $(0,\pi)$ and
$(\pi,0)$ than near $(\pi/2,\pi/2)$. This result is interpreted as reflecting
the momentum-anisotropic quasiparticle lifetime of the marginal Fermi liquid.
The method is further applied to the two-dimensional Hubbard model driven by a
dc electric field, where the damping of the Bloch oscillation of the current is
found to be less effective than predicted by DMFT and lattice perturbation
theory.
| 0.866957 | 0.723077 | 0.14388 |
2004.07338
|
Effects of in-medium $k_T$ broadening on di-jet observables
|
We study the influence of in-medium transverse momentum broadening on
observables of jet pairs produced in nuclear collisions. These dijets were
obtained numerically via the Monte-Carlo simulations of nuclear collisions,
where the partons within the colliding nuclei were described via unintegrated
parton densities, and their subsequent propagation within the medium of a
quark-gluon plasma (QGP). For jet-evolution in the QGP both, kicks transverse
to the momentum of the incoming particle as well as medium induced radiation
were considered. After favorable comparison of our results with experimental
LHC-data on jet-quenching we make predictions for the decorrelation of dijets.
In particular, we study deviations from a transverse momentum broadening that
follows a Gaussian distribution.
|
We show the sensitivity of groomed jet substructure measurements to the
finite resolution power of the QGP to disentangle multiple energetic partons,
as produced by QCD jets, that traverse it simultaneously. We illustrate these
effects by studying Soft Dropped observables within a hybrid strong/weak
coupling model for jet-medium interactions. By analysing Monte-Carlo-generated
jet data in heavy ion collisions, we show that the angular structure of these
type of observables is sensitive to the value of the QGP resolution length.
| 0.885243 | 0.835932 | 0.049311 |
2004.07339
|
An Adaptive Intelligence Algorithm for Undersampled Knee MRI
Reconstruction: Application to the 2019 fastMRI Challenge
|
Adaptive intelligence aims at empowering machine learning techniques with the
additional use of domain knowledge. In this work, we present the application of
adaptive intelligence to accelerate MR acquisition. Starting from undersampled
k-space data, an iterative learning-based reconstruction scheme inspired by
compressed sensing theory is used to reconstruct the images. We adopt deep
neural networks to refine and correct prior reconstruction assumptions given
the training data. The network was trained and tested on a knee MRI dataset
from the 2019 fastMRI challenge organized by Facebook AI Research and NYU
Langone Health. All submissions to the challenge were initially ranked based on
similarity with a known groundtruth, after which the top 4 submissions were
evaluated radiologically. Our method was evaluated by the fastMRI organizers on
an independent challenge dataset. It ranked #1, shared #1, and #3 on
respectively the 8x accelerated multi-coil, the 4x multi-coil, and the 4x
single-coil track. This demonstrates the superior performance and wide
applicability of the method.
|
A new iterative image reconstruction algorithm for electrical capacitance
tomography (ECT) is proposed that is based on iterative soft thresholding of a
total variation penalty and adaptive reweighted compressive sensing. This
algorithm encourages sharp changes in the ECT image and overcomes the
disadvantage of the $l_1$ minimization by equipping the total variation with an
adaptive weighting depending on the reconstructed image. Moreover, the
non-linear effect is also partially reduced due to the adoption of an updated
sensitivity matrix. Simulation results show that the proposed algorithm
recovers ECT images more precisely than existing state-of-the-art algorithms
and therefore is suitable for the imaging of multiphase systems in industrial
or medical applications.
| 0.888916 | 0.707186 | 0.18173 |
2004.07341
|
Wasserstein Adversarial Autoencoders for Knowledge Graph Embedding based
Drug-Drug Interaction Prediction
|
Interaction between pharmacological agents can trigger unexpected adverse
events. Capturing richer and more comprehensive information about drug-drug
interactions (DDI) is one of the key tasks in public health and drug
development. Recently, several knowledge graph embedding approaches have
received increasing attention in the DDI domain due to their capability of
projecting drugs and interactions into a low-dimensional feature space for
predicting links and classifying triplets. However, existing methods only apply
a uniformly random mode to construct negative samples. As a consequence, these
samples are often too simplistic to train an effective model. In this paper, we
propose a new knowledge graph embedding framework by introducing adversarial
autoencoders (AAE) based on Wasserstein distances and Gumbel-Softmax relaxation
for drug-drug interactions tasks. In our framework, the autoencoder is employed
to generate high-quality negative samples and the hidden vector of the
autoencoder is regarded as a plausible drug candidate. Afterwards, the
discriminator learns the embeddings of drugs and interactions based on both
positive and negative triplets. Meanwhile, in order to solve vanishing gradient
problems on the discrete representation--an inherent flaw in traditional
generative models--we utilize the Gumbel-Softmax relaxation and the Wasserstein
distance to train the embedding model steadily. We empirically evaluate our
method on two tasks, link prediction and DDI classification. The experimental
results show that our framework can attain significant improvements and
noticeably outperform competitive baselines.
|
Drug-drug interaction (DDI) is a vital information when physicians and
pharmacists intend to co-administer two or more drugs. Thus, several DDI
databases are constructed to avoid mistakenly combined use. In recent years,
automatically extracting DDIs from biomedical text has drawn researchers'
attention. However, the existing work utilize either complex feature
engineering or NLP tools, both of which are insufficient for sentence
comprehension. Inspired by the deep learning approaches in natural language
processing, we propose a recur- rent neural network model with multiple
attention layers for DDI classification. We evaluate our model on 2013 SemEval
DDIExtraction dataset. The experiments show that our model classifies most of
the drug pairs into correct DDI categories, which outperforms the existing NLP
or deep learning methods.
| 0.917479 | 0.816226 | 0.101253 |
2004.07342
|
A mathematical for blood flow through an arterial bifurcation
|
The blood vascular system consists of blood vessels such as arteries,
arterioles, capillaries and veins that convey blood throughout the body. The
pressure difference which exists between the ends of the vessels provides the
living force required to the flow of blood. In this study, we have used a model
that is appropriate for use with blood flow simulation applications. We study
the effect of decomposition of plaques and or tumour cells on the velocity
profile, pressure of the incompressible, Newtonian fluid. We consider two
different cases; vessels with bifurcation and without bifurcations and we
display all the results through using Commercial software COMSOL Multiphysics
5.2.
|
Malfunction of the system which regulates the bloodflow in the brain is a
major cause of stroke and dementia, costing many lives and many billions of
pounds each year in the UK alone. This regulatory system, known as cerebral
autoregulation, has been the subject of much experimental and mathematical
investigation yet our understanding of it is still quite limited. One area in
which our understanding is particularly lacking is that of the role of nitric
oxide, understood to be a potent vasodilator. The interactions of nitric oxide
with the better understood myogenic response remain un-modelled and poorly
understood. In this thesis we present a novel model of the arteriolar control
mechanism, comprising a mixture of well-established and new models of
individual processes, brought together for the first time. We show that this
model is capable of reproducing experimentally observed behaviour very closely
and go on to investigate its stability in the context of the vasculature of the
whole brain. In conclusion we find that nitric oxide, although it plays a
central role in determining equilibrium vessel radius, is unimportant to the
dynamics of the system and its responses to variation in arterial blood
pressure. We also find that the stability of the system is very sensitive to
the dynamics of Ca$^{2+}$ within the muscle cell, and that self-sustaining
Ca$^{2+}$ waves are not necessary to cause whole-vessel radius oscillations
consistent with vasomotion.
| 0.819489 | 0.739023 | 0.080466 |
2004.07343
|
Microscopic Mechanisms of Glass-Like Lattice Thermal Transport in Cubic
Cu$_{12}$Sb$_{4}$S$_{13}$ Tetrahedrites
|
Materials based on cubic tetrahedrites (Cu$_{12}$Sb$_{4}$S$_{13}$) are useful
thermoelectrics with unusual thermal and electrical transport properties, such
as very low and nearly temperature-independent lattice thermal conductivity
($\kappa_{L}$). We explain the microscopic origin of the glass-like
$\kappa_{L}$ in Cu$_{12}$Sb$_{4}$S$_{13}$ by explicitly treating anharmonicity
up to quartic terms for both phonon energies and phonon scattering rates. We
show that the strongly unstable phonon modes associated with trigonally
coordinated Cu atoms are anharmonically stabilized above approximately $50$~K
and continue hardening with increasing temperature, in accord with experimental
data. This temperature induced hardening effect reduces scattering of heat
carrying acoustic modes by reducing the available phase space for three-phonon
processes, thereby balancing the conventional $\propto T$ increase in
scattering due to phonon population and yielding nearly temperature-independent
$\kappa_{L}$. Furthermore, we find that very strong four-phonon interactions
lead to a qualitative breakdown of the conventional phonon-gas model and modify
the dominant heat transport mechanism from the particle-like phonon wave packet
propagation to incoherent tunneling described by off-diagonal terms in the
heat-flux operator, which are typically prevailing in glasses and disordered
crystals. Our work paves the way to a deeper understanding of glass-like
thermal conductivity in complex crystals with strong anharmonicity.
|
Using molecular dynamics computer simulations we investigate how in silica
the glass transition and the properties of the resulting glass depend on the
cooling rate with which the sample is cooled. By coupling the system to a heat
bath with temperature $T_b(t)$, we cool the system linearly in time,
$T(t)=T_i-\gamma t$, where $\gamma$ is the cooling rate. We find that the glass
transition temperature $T_g$ is in accordance with a logarithmic dependence on
the cooling rate. In qualitative accordance with experiments, the density shows
a local maximum, which becomes more pronounced with decreasing cooling rate.
The enthalpy, density and the thermal expansion coefficient for the glass at
zero temperature decrease with decreasing $\gamma$. We show that also
microscopic quantities, such as the radial distribution function, the bond-bond
angle distribution function, the coordination numbers and the distribution
function for the size of the rings depend significantly on $\gamma$. We
demonstrate that the cooling rate dependence of these microscopic quantities is
significantly more pronounced than the one of macroscopic properties.
Furthermore we show that these microscopic quantities, as determined from our
simulation, are in good agreement with the ones measured in real experiments,
thus demonstrating that the used potential is a good model for silica glass.
The vibrational spectrum of the system also shows a significant dependence on
the cooling rate and is in qualitative accordance with the one found in
experiments. Finally we investigate the properties of the system at finite
temperatures in order to understand the microscopic mechanism for the density
anomaly. We show that the anomaly is related to a densification and subsequent
opening of the tetrahedral network when the temperature is decreased, whereas
| 0.90487 | 0.747511 | 0.157359 |
2004.07344
|
From quasi-incompressible to semi-compressible fluids
|
A new concept of semi-compressible fluids is introduced for slightly
compressible visco-elastic fluids (typically rather liquids than gasses) where
mass density variations are negligible in some sense, while being directly
controlled by pressure which is very small in comparison with the elastic bulk
modulus. The physically consistent fully Eulerian models with specific
dispersion of pressure-wave speed are devised. This contrasts to the so-called
quasi-incompressible fluids which are described not physically consistently
and, in fact, only approximate ideally incompressible ones in the limit. After
surveying and modifying models for the quasi-incompressible fluids, we
eventually devise some fully convective models complying with energy
conservation and capturing phenomena as pressure-wave propagation with
wave-length (and possibly also pressure) dependent velocity.
|
A general lattice Boltzmann method for simulation of fluids with tailored
transport coefficients is presented. It is based on the recently introduced
quasi-equilibrium kinetic models, and a general lattice Boltzmann
implementation is developed. Lattice Boltzmann models for isothermal binary
mixtures with a given Schmidt number, and for a weakly compressible flow with a
given Prandtl number are derived and validated.
| 0.909349 | 0.772776 | 0.136573 |
2004.07345
|
Active-Region Tilt Angles from White-Light Images and Magnetograms: The
Role of Magnetic Tongues
|
The presence of elongations in active region (AR) polarities, called magnetic
tongues, are mostly visible during their emergence phase. AR tilts have been
measured thoroughly using long-term white-light (WL) databases, sometimes
combined with magnetic field information. Since the influence of magnetic
tongues on WL tilt measurements has not been taken into account before, we aim
to investigate their role in tilt-angle values and to compare them with those
derived from LOS magnetograms. We apply four methods to compute the tilt angle
of generally bipolar ARs: one applies the k-means algorithm to WL data, a
second one includes the magnetic field sign of the polarities to WL data, and a
third one uses the magnetic flux-weighted center of each polarity. The tilt
values computed in any of these ways are affected by the presence of magnetic
tongues. Therefore, we apply the newly developed Core Field Fit Estimator
(CoFFE) method to separate the magnetic flux in the tongues from that in the AR
core. We compare the four computed tilt-angle values, as well as these with the
ones reported in long-term WL databases. For ARs with low magnetic flux tongues
the different methods report consistent tilt-angle values. But for ARs with
high flux tongues there are noticeable discrepancies between all methods
indicating that magnetic tongues affect differently WL and magnetic data.
However, in general, CoFFE achieves a better estimation of the main bipole tilt
because it removes both the effect of tongues as well as the emergence of
secondary bipoles when it occurs in between the main bipole magnetic
polarities.
|
We compare the magnetic helicity in the 17-18 March 2013 interplanetary
coronal mass ejection (ICME) flux-rope at 1 AU and in its solar counterpart.
The progenitor coronal mass ejection (CME) erupted on 15 March 2013 from NOAA
active region 11692 and associated with an M1.1 flare. We derive the source
region reconnection flux using post-eruption arcade (PEA) method (Gopalswamy et
al. 2017a) that uses the photospheric magnetogram and the area under the PEA.
The geometrical properties of the near-Sun flux rope is obtained by
forward-modeling of white-light CME observations. Combining the geometrical
properties and the reconnection flux we extract the magnetic properties of the
CME flux rope (Gopalswamy et al. 2017b). We derive the magnetic helicity of the
flux rope using its magnetic and geometric properties obtained near the Sun and
at 1 AU. We use a constant-{\alpha} force-free cylindrical flux rope model fit
to the in situ observations in order to derive the magnetic and geometric
information of the 1-AU ICME. We find a good correspondence in both amplitude
and sign of the helicity between the ICME and the CME assuming a semi-circular
(half torus) ICME flux rope with a length of {\pi} AU. We find that about 83%
of the total flux rope helicity at 1 AU is injected by the magnetic
reconnection in the low corona. We discuss the effect of assuming flux rope
length in the derived value of the magnetic helicity. This study connecting the
helicity of magnetic flux ropes through the Sun-Earth system has important
implications for the origin of helicity in the interplanetary medium and the
topology of ICME flux ropes at 1 AU and hence their space weather consequences.
| 0.856328 | 0.63693 | 0.219398 |
2004.07346
|
Online Multiserver Convex Chasing and Optimization
|
We introduce the problem of $k$-chasing of convex functions, a simultaneous
generalization of both the famous k-server problem in $R^d$, and of the problem
of chasing convex bodies and functions. Aside from fundamental interest in this
general form, it has natural applications to online $k$-clustering problems
with objectives such as $k$-median or $k$-means. We show that this problem
exhibits a rich landscape of behavior. In general, if both $k > 1$ and $d > 1$
there does not exist any online algorithm with bounded competitiveness. By
contrast, we exhibit a class of nicely behaved functions (which include in
particular the above-mentioned clustering problems), for which we show that
competitive online algorithms exist, and moreover with dimension-free
competitive ratio. We also introduce a parallel question of top-$k$ action
regret minimization in the realm of online convex optimization. There, too, a
much rougher landscape emerges for $k > 1$. While it is possible to achieve
vanishing regret, unlike the top-one action case the rate of vanishing does not
speed up for strongly convex functions. Moreover, vanishing regret necessitates
both intractable computations and randomness. Finally we leave open whether
almost dimension-free regret is achievable for $k > 1$ and general convex
losses. As evidence that it might be possible, we prove dimension-free regret
for linear losses via an information-theoretic argument.
|
In this paper, we focus on a theory-practice gap for Adam and its variants
(AMSgrad, AdamNC, etc.). In practice, these algorithms are used with a constant
first-order moment parameter $\beta_{1}$ (typically between $0.9$ and $0.99$).
In theory, regret guarantees for online convex optimization require a rapidly
decaying $\beta_{1}\to0$ schedule. We show that this is an artifact of the
standard analysis and propose a novel framework that allows us to derive
optimal, data-dependent regret bounds with a constant $\beta_{1}$, without
further assumptions. We also demonstrate the flexibility of our analysis on a
wide range of different algorithms and settings.
| 0.834757 | 0.772609 | 0.062147 |
2004.07347
|
HybridQA: A Dataset of Multi-Hop Question Answering over Tabular and
Textual Data
|
Existing question answering datasets focus on dealing with homogeneous
information, based either only on text or KB/Table information alone. However,
as human knowledge is distributed over heterogeneous forms, using homogeneous
information might lead to severe coverage problems. To fill in the gap, we
present \dataset, a new large-scale question-answering dataset that requires
reasoning on heterogeneous information. Each question is aligned with a
structured Wikipedia table and multiple free-form corpora linked with the
entities in the table. The questions are designed to aggregate both tabular
information and text information, i.e. lack of either form would render the
question unanswerable. We test with three different models: 1) table-only
model. 2) text-only model. 3) a hybrid model \model which combines both table
and textual information to build a reasoning path towards the answer. The
experimental results show that the first two baselines obtain compromised
scores below 20\%, while \model significantly boosts EM score to over 50\%,
which proves the necessity to aggregate both structure and unstructured
information in \dataset. However, \model's score is still far behind human
performance, hence we believe \dataset to an ideal and challenging benchmark to
study question answering under heterogeneous information. The dataset and code
are available at \url{https://github.com/wenhuchen/HybridQA}.
|
In this paper, we present a framework for Question Difficulty and Expertise
Estimation (QDEE) in Community Question Answering sites (CQAs) such as Yahoo!
Answers and Stack Overflow, which tackles a fundamental challenge in
crowdsourcing: how to appropriately route and assign questions to users with
the suitable expertise. This problem domain has been the subject of much
research and includes both language-agnostic as well as language conscious
solutions. We bring to bear a key language-agnostic insight: that users gain
expertise and therefore tend to ask as well as answer more difficult questions
over time. We use this insight within the popular competition (directed) graph
model to estimate question difficulty and user expertise by identifying key
hierarchical structure within said model. An important and novel contribution
here is the application of "social agony" to this problem domain. Difficulty
levels of newly posted questions (the cold-start problem) are estimated by
using our QDEE framework and additional textual features. We also propose a
model to route newly posted questions to appropriate users based on the
difficulty level of the question and the expertise of the user. Extensive
experiments on real world CQAs such as Yahoo! Answers and Stack Overflow data
demonstrate the improved efficacy of our approach over contemporary
state-of-the-art models. The QDEE framework also allows us to characterize user
expertise in novel ways by identifying interesting patterns and roles played by
different users in such CQAs.
| 0.834793 | 0.743128 | 0.091665 |
2004.07348
|
Learning 1-Dimensional Submanifolds for Subsequent Inference on Random
Dot Product Graphs
|
A random dot product graph (RDPG) is a generative model for networks in which
vertices correspond to positions in a latent Euclidean space and edge
probabilities are determined by the dot products of the latent positions. We
consider RDPGs for which the latent positions are randomly sampled from an
unknown $1$-dimensional submanifold of the latent space. In principle,
restricted inference, i.e., procedures that exploit the structure of the
submanifold, should be more effective than unrestricted inference; however, it
is not clear how to conduct restricted inference when the submanifold is
unknown. We submit that techniques for manifold learning can be used to learn
the unknown submanifold well enough to realize benefit from restricted
inference. To illustrate, we test a hypothesis about the Fr\'{e}chet mean of a
small community of vertices, using the complete set of vertices to infer latent
structure. We propose test statistics that deploy the Isomap procedure for
manifold learning, using shortest path distances on neighborhood graphs
constructed from estimated latent positions to estimate arc lengths on the
unknown $1$-dimensional submanifold. Unlike conventional applications of
Isomap, the estimated latent positions do not lie on the submanifold of
interest. We extend existing convergence results for Isomap to this setting and
use them to demonstrate that, as the number of auxiliary vertices increases,
the power of our test converges to the power of the corresponding test when the
submanifold is known.
|
Bilinear systems emerge in a wide variety of fields as natural models for
dynamical systems ranging from robotics to quantum dots. Analyzing
controllability of such systems is of fundamental and practical importance, for
example, for the design of optimal control laws, stabilization of unstable
systems, and minimal realization of input-output relations. Tools from Lie
theory have been adopted to establish controllability conditions for bilinear
systems, and the most notable development was the Lie algebra rank condition
(LARC). However, the application of the LARC may be computationally expensive
for high-dimensional systems. In this paper, we present an alternative and
effective algebraic approach to investigate controllability of bilinear
systems. The central idea is to map Lie bracket operations of the vector fields
governing the system dynamics to permutation multiplications on a symmetric
group, so that controllability and controllable submanifolds can be
characterized by permutation cycles. The method is further applicable to
characterize controllability of systems defined on undirected graphs, such as
multi-agent systems with controlled couplings between agents and Markov chains
with tunable transition rates between states, which in turn reveals a graph
representation of controllability through the graph connectivity.
| 0.887581 | 0.663716 | 0.223865 |
2004.07349
|
Regularization of backward time-fractional parabolic equations by
Sobolev equations methods
|
It is well-known that backward parabolic equations in which the initial
condition is to be determined from a measurement at a later time instant is
ill-posed. In this paper, a regularization method for backward time-fractional
parabolic equations by the Sobolev equations method is investigated. Error
estimates of Holder type are obtained with a priori and a posteriori
regularization parameter choice rules. The proposed regularization method
results in a stable noniterative numerical scheme. The theoretical error
estimates are confirmed with numerical tests for one and two dimensional
equations.
|
We consider degenerate and singular parabolic equations with $p$-Laplacian
structure in bounded nonsmooth domains when the right-hand side is a signed
Radon measure with finite total mass. We develop a new tool that allows global
regularity estimates for the spatial gradient of solutions to such parabolic
measure data problems, by introducing the (intrinsic) fractional maximal
function of a given measure.
| 0.952619 | 0.809122 | 0.143496 |
2004.07350
|
General Mapping between Complex Spatial and Temporal Frequencies Using
the Analytical Continuation
|
This paper introduces an analytical technique to map the eigen-space complex
frequencies (temporal frequencies $\Omega = \omega_\text{r}+j\omega_\text{i}$)
to the complex propagation constant (spatial frequencies
$\gamma=\alpha+j\beta$). The technique analytically finds the driven mode
solutions from the eigen-mode analysis of the associated one-dimensional (1-D)
periodic structure unit cell. Since the approach is based on the analyticity of
the physical function $\Omega(\gamma)$, it is not only valid for simple
canonical problems but also in principle for any physical problem. We apply
this general technique on different practical problems including an unbounded
lossy medium, rectangular waveguide, periodic dielectric slabs and a series fed
patch (SFP) leaky-wave antenna and validate the mapped solutions with those
based on either closed-form analytical solutions or numerical finite-element
method (FEM) solutions.
|
In this work we study the qualitative properties of real analytic bounded
maps defined in the infinite complex strip. The main tool is approximation by
continued g-fractions of Wall. As an application, the ABC flow system is
considered which is essential to the origin of the solar magnetic field.
| 0.72912 | 0.663597 | 0.065523 |
2004.07351
|
On the Design of Communication Efficient Federated Learning over
Wireless Networks
|
Recently, federated learning (FL), as a promising distributed machine
learning approach, has attracted lots of research efforts. In FL, the parameter
server and the mobile devices share the training parameters over wireless
links. As a result, reducing the communication overhead becomes one of the most
critical challenges. Despite that there have been various
communication-efficient machine learning algorithms in literature, few of the
existing works consider their implementation over wireless networks. In this
work, the idea of SignSGD is adopted and only the signs of the gradients are
shared between the mobile devices and the parameter server. In addition,
different from most of the existing works that consider Channel State
Information (CSI) at both the transmitter side and the receiver side, only
receiver side CSI is assumed. In such a case, an essential problem for the
mobile devices is to select appropriate local processing and communication
parameters. In particular, two tradeoffs are observed under a fixed total
training time: (i) given the time for each communication round, the energy
consumption versus the outage probability per communication round and (ii)
given the energy consumption, the number of communication rounds versus the
outage probability per communication round. Two optimization problems regarding
the aforementioned two tradeoffs are formulated and solved. The first problem
minimizes the energy consumption given the outage probability (and therefore
the learning performance) requirement while the second problem optimizes the
learning performance given the energy consumption requirement. Extensive
simulations are performed to demonstrate the effectiveness of the proposed
method.
|
This paper presents a comprehensive literature review on applications of
economic and pricing theory for resource management in the evolving fifth
generation (5G) wireless networks. The 5G wireless networks are envisioned to
overcome existing limitations of cellular networks in terms of data rate,
capacity, latency, energy efficiency, spectrum efficiency, coverage,
reliability, and cost per information transfer. To achieve the goals, the 5G
systems will adopt emerging technologies such as massive Multiple-Input
Multiple-Output (MIMO), mmWave communications, and dense Heterogeneous Networks
(HetNets). However, 5G involves multiple entities and stakeholders that may
have different objectives, e.g., high data rate, low latency, utility
maximization, and revenue/profit maximization. This poses a number of
challenges to resource management designs of 5G. While the traditional
solutions may neither efficient nor applicable, economic and pricing models
have been recently developed and adopted as useful tools to achieve the
objectives. In this paper, we review economic and pricing approaches proposed
to address resource management issues in the 5G wireless networks including
user association, spectrum allocation, and interference and power management.
Furthermore, we present applications of economic and pricing models for
wireless caching and mobile data offloading. Finally, we highlight important
challenges, open issues and future research directions of applying economic and
pricing models to the 5G wireless networks.
| 0.875805 | 0.669666 | 0.206139 |
2004.07352
|
Ownership at Large -- Open Problems and Challenges in Ownership
Management
|
Software-intensive organizations rely on large numbers of software assets of
different types, e.g., source-code files, tables in the data warehouse, and
software configurations. Who is the most suitable owner of a given asset
changes over time, e.g., due to reorganization and individual function changes.
New forms of automation can help suggest more suitable owners for any given
asset at a given point in time. By such efforts on ownership health,
accountability of ownership is increased. The problem of finding the most
suitable owners for an asset is essentially a program comprehension problem:
how do we automatically determine who would be best placed to understand,
maintain, evolve (and thereby assume ownership of) a given asset. This paper
introduces the Facebook Ownesty system, which uses a combination of ultra large
scale data mining and machine learning and has been deployed at Facebook as
part of the company's ownership management approach. Ownesty processes many
millions of software assets (e.g., source-code files) and it takes into account
workflow and organizational aspects. The paper sets out open problems and
challenges on ownership for the research community with advances expected from
the fields of software engineering, programming languages, and machine
learning.
|
When a company undergoes a merger or transfers its ownership, the existing
governing body has an opinion on which buyer should take over as the new owner.
Similar situations occur while assigning the host of big sports tournaments,
like the World Cup or the Olympics. In all these settings, the values of the
external bidders are as important as the opinions of the internal experts.
Motivated by such scenarios, we consider a social welfare maximizing approach
to design and analyze truthful mechanisms in {\em hybrid social choice}
settings, where payments can be imposed to the bidders, but not to the experts.
Since this problem is a combination of mechanism design with and without
monetary transfers, classical solutions like VCG cannot be applied, making this
a novel mechanism design problem. We consider the simple but fundamental
scenario with one expert and two bidders, and provide tight approximation
guarantees of the optimal social welfare. We distinguish between mechanisms
that use ordinal and cardinal information, as well as between mechanisms that
base their decisions on one of the two sides (either the bidders or the expert)
or both. Our analysis shows that the cardinal setting is quite rich and admits
several non-trivial randomized truthful mechanisms, and also allows for
closer-to-optimal welfare guarantees.
| 0.779363 | 0.70705 | 0.072312 |
2004.07353
|
The nucleus: Mining concepts from adjunctions
|
Categories are many things to many people. We like to think of category
theory as the study of certain types of grammar: those that generate the
languages of mathematical constructions. This view seems to explain why
categories persist in many parts of mathematics despite the ongoing objections
that they do not help solve hard problems. Grammars do not help us tell better
stories, but they help us tell stories better, and understand them better.
Moreover, a language has grammar whether the speakers are aware of it or not.
A grammatical schema that generates many mathematical constructions is that
of an adjunction. Lawvere noticed that all standard logical operations,
quantifiers, and even the set-theoretic comprehension, can be viewed as
adjunctions. Lambek observed that natural language grammars also decompose into
certain adjunctions, spawning an entire branch of linguistics. Adjunctions are
everywhere; all of category theory can be reconstructed in terms of
adjunctions. If category theory is a grammar of mathematical constructions,
then adjunctions are the one rule to rule them all. [snip]
Any adjunction induces a monad and a comonad, which respectively display its
algebraic and coalgebraic (analytic, state-dependent) aspects. The nucleus
construction induces a monad over adjunctions themselves (or equivalently over
the induced monads, or comonads), which distills both aspects. It is tight
because it is idempotent. The two sides of a nuclear adjunction completely
determine one another, as algebras and coalgebras, yet they remain distinct,
like brackets.
|
The study of open charm meson production provides an efficient tool for
detailed investigations of the properties of hot and dense matter formed in
nucleus-nucleus collisions. The interpretation of the existing data from the
CERN SPS suffers from a lack of knowledge on the total charm production rate.
To overcome this limitation the heavy-ion programme of the NA61/SHINE
experiment at CERN SPS has been expanded to allow for precise measurements of
particles with a short lifetime. A new Small Acceptance Vertex Detector (SAVD)
was designed and constructed to meet the challenges of open charm measurements
in nucleus-nucleus collisions. SAVD was installed in December 2016 for data
taking with Pb+Pb collisions at 150$A$ GeV/c. An exploratory set of collected
data allowed to validate the general concept of the $D^0$ mesons detection via
its $D^0 \rightarrow \pi^+ + K^-$ decay channel and delivered the first direct
observation of open charm at SPS energies. In October and November of 2017 a
large statistic data set has been taken for Xe+La at 150$A$, 75$A$, and 40$A$
GeV/c, these data are currently under intense analysis. The physics motivation
behind the open charm measurements at the SPS energies will be discussed.
Moreover, the concept of the SAVD hardware and status of the analysis will be
shown. Also, the future plans of open charm measurements in the NA61/SHINE
experiment related to the upgraded Vertex Detector will be presented.
| 0.724124 | 0.565577 | 0.158547 |
2004.07354
|
Efficient Algorithms for Battleship
|
We consider an algorithmic problem inspired by the Battleship game. In the
variant of the problem that we investigate, there is a unique ship of shape $S
\subset Z^2$ which has been translated in the lattice $Z^2$. We assume that a
player has already hit the ship with a first shot and the goal is to sink the
ship using as few shots as possible, that is, by minimizing the number of
missed shots. While the player knows the shape $S$, which position of $S$ has
been hit is not known.
Given a shape $S$ of $n$ lattice points, the minimum number of misses that
can be achieved in the worst case by any algorithm is called the Battleship
complexity of the shape $S$ and denoted $c(S)$. We prove three bounds on
$c(S)$, each considering a different class of shapes. First, we have $c(S) \leq
n-1$ for arbitrary shapes and the bound is tight for parallelogram-free shapes.
Second, we provide an algorithm that shows that $c(S) = O(\log n)$ if $S$ is an
HV-convex polyomino. Third, we provide an algorithm that shows that $c(S) =
O(\log \log n)$ if $S$ is a digital convex set. This last result is obtained
through a novel discrete version of the Blaschke-Lebesgue inequality relating
the area and the width of any convex body.
|
Recently, the security of Internet of Things (IoT) has been an issue of great
concern. Physical layer security methods can help IoT networks achieve
information-theoretical secrecy. Nevertheless, utilizing physical security
methods, such as artificial noise (AN) may cost extra power, which leads to low
secure energy efficiency. In this paper, the hybrid precoding technique is
employed to improve the secure energy efficiency of the IoT network. A secure
energy efficiency optimization problem is formulated for the IoT network. Due
to the non-convexity of the problem and the feasible domain, the problem is
firstly transformed into a tractable suboptimal form. Then a secure hybrid
precoding energy efficient (SEEHP) algorithm is proposed to tackle the problem.
Numerical results indicate that the proposed SEEHP algorithm achieves higher
secure energy efficiency compared with three existing physical layer security
algorithms, especially when the number of transmit antennas is large.
| 0.830153 | 0.609397 | 0.220756 |
2004.07355
|
Time-domain Wavefield Reconstruction Inversion in a TTI medium
|
We introduce a generalization of time-domain wavefield reconstruction
inversion to anisotropic acoustic modeling. Wavefield reconstruction inversion
has been extensively researched in recent years for its ability to mitigate
cycle skipping. The original method was formulated in the frequency domain with
acoustic isotropic physics. However, frequency-domain modeling requires
sophisticated iterative solvers that are difficult to scale to industrial-size
problems and more realistic physical assumptions, such as tilted transverse
isotropy, object of this study. The work presented here is based on a recently
proposed dual formulation of wavefield reconstruction inversion, which allows
time-domain propagator that are suitable to both large scales and more accurate
physics.
|
In this paper, we present an inverse problem of identifying the reaction
coefficient for time fractional diffusion equations in two dimensional spaces
by using boundary Neumann data. It is proved that the forward operator is
continuous with respect to the unknown parameter. Because the inverse problem
is often ill-posed, regularization strategies are imposed on the least
fit-to-data functional to overcome the stability issue. There may exist various
kinds of functions to reconstruct. It is crucial to choose a suitable
regularization method. We present a multi-parameter regularization $L^{2}+BV$
method for the inverse problem. This can extend the applicability for
reconstructing the unknown functions. Rigorous analysis is carried out for the
inverse problem. In particular, we analyze the existence and stability of
regularized variational problem and the convergence. To reduce the dimension in
the inversion for numerical simulation, the unknown coefficient is represented
by a suitable set of basis functions based on a priori information. A few
numerical examples are presented for the inverse problem in time fractional
diffusion equations to confirm the theoretic analysis and the efficacy of the
different regularization methods.
| 0.857443 | 0.705075 | 0.152368 |
2004.07356
|
A Practical Response Adaptive Block Randomization Design with Analytic
Type I Error Protection
|
Response adaptive randomization is appealing in confirmatory adaptive
clinical trials from statistical, ethical, and pragmatic perspectives, in the
sense that subjects are more likely to be randomized to better performing
treatment groups based on accumulating data. The Doubly Adaptive Biased Coin
Design (DBCD) is a popular solution due to its asymptotic normal property of
final allocations, which further justifies its asymptotic type I error rate
control. As an alternative, we propose a Response Adaptive Block Randomization
(RABR) design with pre-specified randomization ratios for the control and
high-performing groups to robustly achieve desired final sample size per group
under different underlying responses, which is usually required in
industry-sponsored clinical studies. We show that the usual test statistic has
a controlled type I error rate. Our simulations further highlight the
advantages of the proposed design over the DBCD in terms of consistently
achieving final sample allocations and of power performance. We further apply
this design to a Phase III study evaluating the efficacy of two dosing regimens
of adjunctive everolimus in treating tuberous sclerosis complex but with no
previous dose-finding studies in this indication.
|
In a previous paper (J. Comp. Phys. 230 (2011), 3668--3694), the authors
proposed a new practical method for computing expected values of functionals of
solutions for certain classes of elliptic partial differential equations with
random coefficients. This method was based on combining quasi-Monte Carlo (QMC)
methods for computing the expected values with circulant embedding methods for
sampling the random field on a regular grid. It was found capable of handling
fluid flow problems in random heterogeneous media with high stochastic
dimension, but a convergence theory was missing. This paper provides a
convergence analysis for the method in the case when the QMC method is a
specially designed randomly shifted lattice rule. The convergence result
depends on the eigenvalues of the underlying nested block circulant matrix and
can be independent of the number of stochastic variables under certain
assumptions. In fact the QMC analysis applies to general factorisations of the
covariance matrix to sample the random field. The error analysis for the
underlying fully discrete finite element method allows for locally refined
meshes (via interpolation from a regular sampling grid of the random field).
Numerical results on a non-regular domain with corner singularities in two
spatial dimensions and on a regular domain in three spatial dimensions are
included.
| 0.770593 | 0.687213 | 0.08338 |
2004.07357
|
Bounded Orbits of Quadratic Collatz-type Recursions
|
We characterize all bounded orbits of two similar Collatz-type quadratic
mappings of the set of non-negative integers. In one case, where cycles of all
possible lengths may occur, an orbit is bounded if and only if it reaches a
cycle. For the other map we prove that every bounded orbit must reach 0 (in
particular, there are no cycles).
|
The polynomial NARMAX (Nonlinear AutoRegressive Moving Average model with
eXogenous input) is a model that represents the dynamics of physical systems.
This polynomial contains information from the past of the inputs and outputs of
the process, that is, it is a recursive model. In digital computers this
generates the propagation of the rounding error. Our procedure is based on the
estimation of the maximum value of the lower bound error considering an
arbitrary number of pseudo-orbits produced from different natural interval
extensions, and a posterior Lyapunov exponent calculation. We applied
successfully our technique for two identified models of the systems: sine map
and Duffing-Ueda oscillator
| 0.909649 | 0.741857 | 0.167792 |
2004.07358
|
Ab-initio electronic transport in narrow gap semiconductors using the
Wigner distribution
|
Electronic transport properties of semiconductors with small band gaps are
often not well described by semiclassical methods, such as the Boltzmann
transport equation, because of the missing interaction between carriers whose
band energy differences are closer than their linewidth. This limits accuracy
of predictions for many topological insulators and materials with complex
structure and disorder. We develop a new first-principles formalism that uses
the Wigner transform to generalize semiclassical transport models to this
regime by including additional quantum effects. We apply the formalism to
Bi$_2$Se$_3$, and show that its bulk electronic transport properties at low
doping concentrations are dominated by the Zener effect, a mechanism in which
carriers transfer charge by tunnelling across the band gap.
|
Employing $ab$ $intito$ electronic structure calculations, we have
investigated electronic and magnetic properties of the Zr-based quanternary
Heusler alloys: ZrCoVIn, ZrFeVGe, ZrCoFeP, ZrCoCrBe and ZrFeCrZ (Z=In and Ga).
Our $ab$ $intito$ calculation results show that all the alloys are (or nearly)
spin-gapless semiconductors. All the alloys have large band gaps, indicating
the stability of them at room temperature. The Slater-Pauling behaviours of
these alloys are discussed as well. The values of Curie temperature of all the
alloys are estimated. And it is found that the values of the Curie temperature
for all our calculated quanternary Heusler alloys are higher than that of room
temperature.
| 0.874818 | 0.730527 | 0.144291 |
2004.07359
|
Usable, Acceptable, Appropriable: Towards Practicable Privacy
|
A majority of the work on digital privacy and security has focused on users
from developed countries who account for only around 20\% of the global
population. Moreover, the privacy needs for population that is already
marginalized and vulnerable differ from users who have privilege to access a
greater social support system. We reflect on our experiences of introducing
computers and the Internet to a group of sex-trafficking survivors in Nepal and
highlight a few socio-political factors that have influenced the design space
around digital privacy. These factors include the population's limited digital
and text literacy skills and the fear of stigma against trafficked persons
widely prevalent in Nepali society. We underscore the need to widen our
perspective by focusing on practicable privacy, that is, privacy practices that
are (1) usable, (2) acceptable, and (3) appropriable.
|
In survival analysis, regression models are used to understand the effects of
explanatory variables (e.g., age, sex, weight, etc.) to the survival
probability. However, for sensitive survival data such as medical data, there
are serious concerns about the privacy of individuals in the data set when
medical data is used to fit the regression models. The closest work addressing
such privacy concerns is the work on Cox regression which linearly projects the
original data to a lower dimensional space. However, the weakness of this
approach is that there is no formal privacy guarantee for such projection. In
this work, we aim to propose solutions for the regression problem in survival
analysis with the protection of differential privacy which is a golden standard
of privacy protection in data privacy research. To this end, we extend the
Output Perturbation and Objective Perturbation approaches which are originally
proposed to protect differential privacy for the Empirical Risk Minimization
(ERM) problems. In addition, we also propose a novel sampling approach based on
the Markov Chain Monte Carlo (MCMC) method to practically guarantee
differential privacy with better accuracy. We show that our proposed approaches
achieve good accuracy as compared to the non-private results while guaranteeing
differential privacy for individuals in the private data set.
| 0.784785 | 0.710207 | 0.074578 |
2004.07360
|
Reconfiguring and ramping-up ventilator production in the face of
COVID-19: Can robots help?
|
As the COVID-19 pandemic expands, the shortening of medical equipment is
swelling. A key piece of equipment getting far-out attention has been
ventilators. The difference between supply and demand is substantial to be
handled with normal production techniques, especially under social distancing
measures in place. The study explores the rationale of human-robot teams to
ramp up production using advantages of both the ease of integration and
maintaining social distancing. The paper presents a model for faster
integration of collaborative robots and design guidelines for workstation. The
scenarios are evaluated for an open source ventilator through continuous
human-robot simulation and amplification of results in a discrete event
simulation.
|
Lumen Social Robot is a humanoid robot development with the purpose that it
could be a good friend to all people. In this year, the Lumen Social Robot is
being developed into a guide in the exhibition and in the seminar of the Final
Exam of undergraduate and graduate students in Electrical Engineering ITB,
named Electrical Engineering Days 2015. In order to be the guide in that
occasion, Lumen is supported by several things. They are Nao robot components,
servers, and multiple processor systems. The image processing system is a
processing application system that allows Lumen to recognize and determine an
object from the image taken from the camera eye. The image processing system is
provided with four modules. They are face detection module to detect a person's
face, face recognition module to recognize a person's face, face tracking
module to follow a person's face, and human detection module to detect humans
based on the upper parts of person's body. Face detection module and human
detection module are implemented by using the library harcascade.xml on EMGU
CV. Face recognition module is implemented by adding the database for the face
that has been detected and store it in that database. Face tracking module is
implemented by using the Smooth Gaussian filter to the image.
-----
Lumen Sosial Robot merupakan sebuah pengembangan robot humanoid agar dapat
menjadi teman bagi banyak orang. Sistem pengolahan citra merupakan sistem
aplikasi pengolah yang bertujuan Lumen dapat mengenali dan mengetahui suatu
objek pada citra yang diambil dari camera mata Lumen. System pengolahan citra
dilengkapi dengan empat buah modul, yaitu modul face detection untuk mendeteksi
wajah seseorang, modul face recognition untuk mengenali wajah orang tersebut,
modul face tracking untuk mengikuti wajah seseorang, dan modul human detection
untuk mendeteksi manusia berdasarkan bagian tubuh atas orang
| 0.911038 | 0.636717 | 0.274321 |
2004.07361
|
Renormalization of group field theories for quantum gravity: new scaling
results and some suggestions
|
We discuss motivation and goals of renormalization analyses of group field
theory models of simplicial 4d quantum gravity, and review briefly the status
of this research area. We present some new computations of perturbative GFT
(spin foam) amplitudes, concerning in particular the scaling behaviour of
radiative corrections to N-point functions. Finally, we single out key open
issues and suggest a number of research directions for further progress in this
area.
|
Building on recent advances in defining Wilsonian RG flows, and in particular
the notion of scales, for background-independent theories, we present a first
investigation of the renormalization of the 4d spin foam path integral for
quantum gravity, both analytically and numerically. Focussing on a specific
truncation of the model using a hypercubic lattice, we compute the RG flow and
find strong indications for a phase transition, as well as an interesting
interplay between the different observed phases and the (broken) diffeomorphism
symmetry of the model. Most notably, it appears that the critical point between
the phases, which is a fixed point of the RG flow, is precisely where broken
diffeomorphism symmetry is restored, which suggests that it might allow for the
definition a continuum limit of the quantum gravity theory.
| 0.90647 | 0.836373 | 0.070097 |
2004.07362
|
Hodge decompositions and Poincare duality models
|
We use Hodge decompositions to construct Poincare duality models and improve
results of Lambrechts & Stanley in the simply-connected case. The main idea is
the construction of a certain oriented extension of the Sullivan minimal model
which admits a Hodge decomposition.
|
We show that the eigenspaces of the Laplacian $\Delta_k$ on $k$-forms on a
compact K\"ahler manifold carry Hodge and Lefschetz decompositions. Among other
consequences, we show that the positive part of the spectrum of $\Delta_k$ lies
in the spectrum of $\Delta_{k+1}$.
| 0.960917 | 0.812091 | 0.148827 |
2004.07363
|
A detailed and direct proof of Skorohod-Wichura's theorem
|
The representation Skorohod theorem of weak convergence of random variables
on a metric space goes back to Skorohod (1956) in the case where the metric
space is the class of real-valued functions defined on [0,1] which are
right-continuous and have left-hand limits when endowed with the Skorohod
metric. Among the extensions of that to metric spaces, the version by Wichura
(1970) seems to be the most fundamental. But the proof of Wichura seems to be
destined to a very restricted public. We propose a more detailed proof to make
it more accessible at the graduate level. However we do far more by simplifying
it since important steps in the original proof are dropped, which leads to a
direct proof that we hope to be more understandable to a larger spectrum of
readers. The current version is more appropriate for different kinds of
generalizations.
|
Given a Gaussian process $X$, its canonical geometric rough path lift
$\mathbf{X}$, and a solution $Y$ to the rough differential equation (RDE)
$\mathrm{d}Y_{t} = V\left (Y_{t}\right ) \circ \mathrm{d} \mathbf{X}_t$, we
present a closed-form correction formula for $\int Y \circ \mathrm{d}
\mathbf{X} - \int Y \, \mathrm{d} X$, i.e. the difference between the rough and
Skorohod integrals of $Y$ with respect to $X$. When $X$ is standard Brownian
motion, we recover the classical Stratonovich-to-It{\^o} conversion formula,
which we generalize to Gaussian rough paths with finite $p$-variation, $p < 3$,
and satisfying an additional natural condition. This encompasses many familiar
examples, including fractional Brownian motion with $H > \frac{1}{3}$. To prove
the formula, we first show that the Riemann-sum approximants of the Skorohod
integral converge in $L^2(\Omega)$ by using a novel characterization of the
Cameron-Martin norm in terms of higher-dimensional Young-Stieltjes integrals.
Next, we append the approximants of the Skorohod integral with a suitable
compensation term without altering the limit, and the formula is finally
obtained after a re-balancing of terms.
| 0.830259 | 0.709188 | 0.121071 |
2004.07364
|
Microlocally accurate solution of the inverse source problem of
thermoacoustic tomography
|
We consider the inverse source problem of thermo- and photoacoustic
tomography, with data registered on an open surface partially surrounding the
source of acoustic waves. Under the assumption of constant speed of sound we
develop an explicit non-iterative reconstruction procedure that recovers the
Radon transform of the sought source, up to an infinitely smooth additive error
term. The source then can be found by inverting the Radon transform.
Our analysis is microlocal in nature and does not provide a norm estimate on
the error in the so obtained image. However, numerical simulations show that
this error is quite small in practical terms. We also present an asymptotically
fast implementation of this procedure for the case when the data are given on a
circular arc in 2D.
|
Topological concepts open many new horizons for photonic devices, from
integrated optics to lasers. The complexity of large scale topological devices
asks for an effective solution of the inverse problem: how best to engineer the
topology for a specific application? We introduce a novel machine learning
approach to the topological inverse problem. We train a neural network system
with the band structure of the Aubry-Andre-Harper model and then adopt the
network for solving the inverse problem. Our application is able to identify
the parameters of a complex topological insulator in order to obtain protected
edge states at target frequencies. One challenging aspect is handling the
multivalued branches of the direct problem and discarding unphysical solutions.
We overcome this problem by adopting a self-consistent method to only select
physically relevant solutions. We demonstrate our technique in a realistic
topological laser design and by resorting to the widely available open-source
TensorFlow library. Our results are general and scalable to thousands of
topological components. This new inverse design technique based on machine
learning potentially extends the applications of topological photonics, for
example, to frequency combs, quantum sources, neuromorphic computing and
metrology.
| 0.906471 | 0.654415 | 0.252056 |
2004.07365
|
Featureless adaptive optimization accelerates functional electronic
materials design
|
Forward and inverse design of equilibrium materials properties have been
accelerated with data-driven methods. Electronic materials exhibiting phase
transitions between metastable states, such as metal-insulator transition (MIT)
materials with abrupt electrical resistivity transformations, however, are
challenging to decode. Conventional machine learning methods display limited
predictive capability for MIT materials, because data scarcity and the absence
of features impede model training. Here we demonstrate a discovery strategy
based on multi-objective Bayesian optimization to directly circumvent these
bottlenecks by utilizing latent variable Gaussian processes combined with
high-fidelity electronic structure calculations for validation in the
chalcogenide lacunar spinel family. We directly and simultaneously learn phase
stability and band gap tunability from chemical composition alone to
efficiently discover 12 superior compositions on the Pareto front. Previously
unidentified electronic transitions also emerge from our featureless adaptive
optimization engine (AOE). Our methodology readily generalizes to optimization
of multiple properties, enabling co-design of complex multifunctional materials
especially where prior data is sparse.
|
In this paper, we propose a novel design of dielectric laser-driven
accelerator (DLA) utilizing evanescent electric field of racetrack ring
resonator structures. Driven by laser light with the correctly designed optical
phase window, sustained acceleration of electrons with controlled deflection is
shown. Based on this design, we calculate an acceleration from 30 keV to
148.312 keV in 104.655 {\mu}m using a cascaded 11-stage racetrack ring
resonators. This new idea poses a solution for on-chip integration of many DLA
stages, while maintains high average accelerating gradients, providing a
potential practical realization for "accelerator on a chip".
| 0.84045 | 0.603607 | 0.236843 |
2004.07366
|
Spatially Resolved Chandra Spectroscopy of the Large Magellanic Cloud
Supernova Remnant N132D
|
We perform detailed spectroscopy of the X-ray brightest supernova remnant
(SNR) in the Large Magellanic Cloud (LMC), N132D, using Chandra archival
observations. By analyzing the spectra of the entire well-defined rim, we
determine the mean abundances for O, Ne, Mg, Si, S and Fe for the local LMC
environment. We find evidence of enhanced O on the north-western and S on the
north-eastern blast wave. By analyzing spectra interior to the remnant, we
confirm the presence of a Si-rich relatively hot plasma (> 1.5 kev) that is
also responsible for the Fe K emission. Chandra images show that the Fe K
emission is distributed throughout the interior of the southern half of the
remnant but does not extend out to the blast wave. We estimate the progenitor
mass to be $15\pm5\,M_{\odot}$ using abundance ratios in different regions that
collectively cover a large fraction of the remnant, as well as from the radius
of the forward shock compared with models of an explosion in a cavity created
by stellar winds. We fit ionizing and recombining plasma models to the Fe K
emission and find that the current data cannot distinguish between the two,
hence the origin of the high-temperature plasma remains uncertain. Our analysis
is consistent with N132D being the result of a core-collapse supernova in a
cavity created by its intermediate mass progenitor.
|
We report on observations of the Large Magellanic Cloud with the Fermi
Gamma-Ray Space Telescope. The LMC is clearly detected with the Large Area
Telescope (LAT) and for the first time the emission is spatially well resolved
in gamma-rays. Our observations reveal that the bulk of the gamma-ray emission
arises from the 30 Doradus region. We discuss this result in light of the
massive star populations that are hosted in this area and address implications
for cosmic-ray physics. We conclude by exploring the scientific potential of
the ongoing Fermi observations on the study of high-energy phenomena in massive
stars.
| 0.870452 | 0.698129 | 0.172323 |
2004.07367
|
Ahlfors regularity and fractal dimension of Smale spaces
|
We prove that, up to topological conjugacy, every Smale space admits an
Ahlfors regular Bowen measure. Bowen's construction of Markov partitions
implies that Smale spaces are factors of topological Markov chains. The latter
are equipped with Parry's measure which is Ahlfors regular. By extending
Bowen's construction we create a tool for transferring the Ahlfors regularity
of the Parry measure down to the Bowen measure of the Smale space. An essential
part of our method uses a refined notion of approximation graphs over compact
metric spaces. Our work has two main applications, the first one being new
estimates for the Hausdorff, box-counting and Assouad dimensions for a large
class of Smale spaces. The second is that we solve Bowen's equation for the
topological pressure in a class of Smale spaces that includes Wieler solenoids.
|
This paper deals with the problem of finding bi-Lipschitz behavior in
non-degenerate Lipschitz maps between metric measure spaces. Specifically, we
study maps from (subsets of) Ahlfors regular PI spaces into sub-Riemannian
Carnot groups. We prove that such maps have many bi-Lipschitz tangents,
verifying a conjecture of Semmes. As a stronger conclusion, one would like to
know whether such maps decompose into countably many bi-Lipschitz pieces. We
show that this is true when the Carnot group is Euclidean. For general Carnot
targets, we show that the existence of a bi-Lipschitz decomposition is
equivalent to a condition on the geometry of the image set.
| 0.868567 | 0.738662 | 0.129905 |
2004.07368
|
A Study on the Challenges of Using Robotics Simulators for Testing
|
Robotics simulation plays an important role in the design, development, and
verification and validation of robotic systems. Recent studies have shown that
simulation may be used as a cheaper, safer, and more reliable alternative to
manual, and widely used, process of field testing. This is particularly
important in the context of continuous integration pipelines, where integrated
automated testing is key to reducing costs while maintaining system safety.
However, simulation and automated testing are not seeing the degree of
widespread adoption in practice that their potential would motivate. Our goal
in this paper is to develop a principled understanding of the ways developers
use simulation in their process, and the challenges they face in doing so. This
type of understanding can guide the development of more effective simulators
and testing techniques for modern robotics development.
To that end, we conduct a survey of 82 robotics developers from a diversity
of backgrounds that addresses the current capabilities and limits of simulation
technology in practice. We find that simulation is used by 85% of our
participants for testing, and that many participants desire to use simulation
as part of their test automation. We identify 10 high-level challenges that
impede developers from using simulation for manual and automated testing, and
general purposes. These challenges include the gap between simulation and
reality, a lack of reproducibility, and considerable resource costs associated
with using simulators. Finally, we outline avenues for improvement in the
development of new simulators that can help simulation reach its potential as a
means of verification and validation.
|
Reactive synthesis is an automated procedure to obtain a
correct-by-construction reactive system from a given specification. GR(1) is a
well-known fragment of linear temporal logic (LTL) where synthesis is possible
using a polynomial symbolic algorithm. We conducted a case study to learn about
the challenges that software engineers may face when using GR(1) synthesis for
the development of a reactive robotic system. In the case study we developed
two variants of a forklift controller, deployed on a Lego robot. The case study
employs LTL specification patterns as an extension of the GR(1) specification
language, an examination of two specification variants for execution
scheduling, traceability from the synthesized controller to constraints in the
specification, and generated counter strategies to support understanding
reasons for unrealizability. We present the specifications we developed, our
observations, and challenges faced during the case study.
| 0.904644 | 0.681639 | 0.223005 |
2004.07369
|
Raman Spectrum and Polarizability of Liquid Water from Deep Neural
Networks
|
We introduce a scheme based on machine learning and deep neural networks to
model the environmental dependence of the electronic polarizability in
insulating materials. Application to liquid water shows that training the
network with a relatively small number of molecular configurations is
sufficient to predict the polarizability of arbitrary liquid configurations in
close agreement with ab initio density functional theory calculations. In
combination with a neural network representation of the interatomic potential
energy surface,the scheme allows us to calculate the Raman spectra along
2-nanosecond classical trajectories at different temperatures for H2O and D2O.
The vast gains in efficiency provided by the machine learning approach enable
longer trajectories and larger system sizes relative to ab initio methods,
reducing the statistical error and improving the resolution of the
low-frequency Raman spectra. Decomposing the spectra into intramolecular and
intermolecular contributions elucidates the mechanisms behind the temperature
dependence of the low-frequency and stretch modes.
|
Autonomous vehicles are highly complex systems, required to function reliably
in a wide variety of situations. Manually crafting software controllers for
these vehicles is difficult, but there has been some success in using deep
neural networks generated using machine-learning. However, deep neural networks
are opaque to human engineers, rendering their correctness very difficult to
prove manually; and existing automated techniques, which were not designed to
operate on neural networks, fail to scale to large systems. This paper focuses
on proving the adversarial robustness of deep neural networks, i.e. proving
that small perturbations to a correctly-classified input to the network cannot
cause it to be misclassified. We describe some of our recent and ongoing work
on verifying the adversarial robustness of networks, and discuss some of the
open questions we have encountered and how they might be addressed.
| 0.866038 | 0.664019 | 0.20202 |
2004.07370
|
F0-consistent many-to-many non-parallel voice conversion via conditional
autoencoder
|
Non-parallel many-to-many voice conversion remains an interesting but
challenging speech processing task. Many style-transfer-inspired methods such
as generative adversarial networks (GANs) and variational autoencoders (VAEs)
have been proposed. Recently, AutoVC, a conditional autoencoders (CAEs) based
method achieved state-of-the-art results by disentangling the speaker identity
and speech content using information-constraining bottlenecks, and it achieves
zero-shot conversion by swapping in a different speaker's identity embedding to
synthesize a new voice. However, we found that while speaker identity is
disentangled from speech content, a significant amount of prosodic information,
such as source F0, leaks through the bottleneck, causing target F0 to fluctuate
unnaturally. Furthermore, AutoVC has no control of the converted F0 and thus
unsuitable for many applications. In the paper, we modified and improved
autoencoder-based voice conversion to disentangle content, F0, and speaker
identity at the same time. Therefore, we can control the F0 contour, generate
speech with F0 consistent with the target speaker, and significantly improve
quality and similarity. We support our improvement through quantitative and
qualitative analysis.
|
We describe a neural network-based system for text-to-speech (TTS) synthesis
that is able to generate speech audio in the voice of many different speakers,
including those unseen during training. Our system consists of three
independently trained components: (1) a speaker encoder network, trained on a
speaker verification task using an independent dataset of noisy speech from
thousands of speakers without transcripts, to generate a fixed-dimensional
embedding vector from seconds of reference speech from a target speaker; (2) a
sequence-to-sequence synthesis network based on Tacotron 2, which generates a
mel spectrogram from text, conditioned on the speaker embedding; (3) an
auto-regressive WaveNet-based vocoder that converts the mel spectrogram into a
sequence of time domain waveform samples. We demonstrate that the proposed
model is able to transfer the knowledge of speaker variability learned by the
discriminatively-trained speaker encoder to the new task, and is able to
synthesize natural speech from speakers that were not seen during training. We
quantify the importance of training the speaker encoder on a large and diverse
speaker set in order to obtain the best generalization performance. Finally, we
show that randomly sampled speaker embeddings can be used to synthesize speech
in the voice of novel speakers dissimilar from those used in training,
indicating that the model has learned a high quality speaker representation.
| 0.861912 | 0.79231 | 0.069602 |
2004.07371
|
Joint Traffic-Aware UAV Placement and Predictive Routing for Aerial
Networks
|
Aerial networks, composed of Unmanned Aerial Vehicles (UAVs) acting as Wi-Fi
access points or cellular base stations, are emerging as an interesting
solution to provide on-demand wireless connectivity to users, when there is no
network infrastructure available, or to enhance the network capacity. This
article proposes a traffic-aware topology control solution for aerial networks
that holistically combines the placement of UAVs with a predictive and
centralized routing protocol. The synergy created by the combination of the UAV
placement and routing solutions allows the aerial network to seamlessly update
its topology according to the users' traffic demand, whilst minimizing the
disruption caused by the movement of the UAVs. As a result, the Quality of
Service (QoS) provided to the users is improved. The components of the proposed
solution are described and evaluated individually in this article by means of
simulation and an experimental testbed. The results show that all the
components improve the QoS provided to the users when compared to the
corresponding baseline solutions.
|
The paper considers physical layer security (PLS) of an untrusted unmanned
aerial vehicle (UAV) network, where a multitude of UAVs communicate in
full-duplex (FD) mode. A source-based jamming (SBJ) scheme is exploited for
secure communication without utilizing any external jammers. Firstly, the
optimal power allocation between the confidential signal and the jamming signal
is derived to maximize the secrecy rate of each link between the source and the
destination. Then, the best UAV selection scheme is proposed to maximize the
overall secrecy rate of the network. The corresponding secrecy outage
probability (SOP) and the average secrecy rate (ASR) of the network are
analyzed based on the proposed UAV selection and the optimal power allocation
schemes. Asymptotic results are also obtained to derive the achievable
diversity order. Results are validated through numerical evaluations while
providing useful network design insights such as locations and altitudes of the
UAVs.
| 0.894276 | 0.702067 | 0.192209 |
2004.07372
|
Quantum Phases Drive the Dynamics of Macroscopic Quantum Tunneling
Escape in Quantum Simulators
|
Mott tunneling dynamics are entirely distinct from the superfluid ones and
ground state properties of quantum phases can predict highly non-equilibrium
behavior. We consider quasi-bound state dynamics or tunneling escape in the
Bose-Hubbard model from a behind a finite barrier, which can be realized in
quantum simulators. In the superfluid regime we find that escape dynamics are
wave-like and coherent, leading to interference patterns in the density with a
non-exponential but still rapid decay process. Quantum entropy production peaks
when about half the atoms have escaped. In contrast, in the Mott insulator
regime we find the dynamics are atom-like and incoherent, with no interference
fringes. Quantum entropy production peaks at double the value of the superfluid
case and when only about one quarter of the atoms have escaped. Despite
stronger repulsive interactions, tunneling is significantly slowed by the
presence of a Mott gap, creating an effective extra barrier to overcome, and
the decay process is nearly linear. Moreover, we introduce a new quantum
tunneling rate, the fluctuation rate, which shows oscillatory interference
between the trapped and the escaped atoms on short time scales beyond the
constant waiting time known for single-particle tunneling before exponential
decay ensues. The fluctuation rate is overall positive for the superfluid and
initially negative for the Mott insulator, only turning positive in the latter
case when about half the atoms have escaped. Finally, off-diagonal correlators
show entirely different structure for the two quantum phases. In the superfluid
case, the barrier height and interaction strength can be used to tune from
pulsed to continuous-wave positive correlation emissions in the escape region.
In the Mott insulator, negative correlations between the trap and the escape
region emphasize emission one atom at a time.
|
The tunneling decay event of a metastable state in a fully connected quantum
spin model can be simulated efficiently by path integral quantum Monte Carlo
(QMC) [Isakov $et~al.$, Phys. Rev. Lett. ${\bf 117}$, 180402 (2016).]. This is
because the exponential scaling with the number of spins of the
thermally-assisted quantum tunneling rate and the Kramers escape rate of QMC
are identical [Jiang $et~al.$, Phys. Rev. A ${\bf 95}$, 012322 (2017).], a
result of a dominant instantonic tunneling path. In Ref. [1], it was also
conjectured that the escape rate in open-boundary QMC is quadratically larger
than that of conventional periodic-boundary QMC, therefore, open-boundary QMC
might be used as a powerful tool to solve combinatorial optimization problems.
The intuition behind this conjecture is that the action of the instanton in
open-boundary QMC is a half of that in periodic-boundary QMC. Here, we show
that this simple intuition---although very useful in interpreting some
numerical results---deviates from the actual situation in several ways. Using a
fully connected quantum spin model, we derive a set of conditions on the
positions and momenta of the endpoints of the instanton, which remove the extra
degrees of freedom due to open boundaries. In comparison, the half-instanton
conjecture incorrectly sets the momenta at the endpoints to zero. We also found
that the instantons in open-boundary QMC correspond to quantum tunneling events
in the symmetric subspace (maximum total angular momentum) at all temperatures,
whereas the instantons in periodic-boundary QMC typically lie in subspaces with
lower total angular momenta at finite temperatures. This leads to a lesser than
quadratic speedup at finite temperatures. We also outline the generalization of
the instantonic tunneling method to many-qubit systems without permutation
symmetry using spin-coherent-state path integrals.
| 0.856888 | 0.785678 | 0.07121 |
2004.07373
|
Improv practices in Mathematics Active Teaching
|
This article explores the parallels between improvisational theater (Improv)
and teaching in an Active Learning environment. It presents the notions of
Active Teaching as a natural complement to Active Learning, and discusses how
unexpected situations give rise to valuable Teaching Moments. These Teaching
Moments can be strategically utilized following the rules of Improv. This
article presents some examples of this in the Mathematics classroom, as well as
the implementation of an Improv Seminar in the Mathematics Department at the
University of California, Santa Cruz.
|
Papert's (1980) work with Turtle Geometry offered an early and provocative
vision of how digital technologies could be used with young learners. Since
then, research on digital technology use has focused on the middle and high
school levels. Given the increasing diversity of digital technologies, and
their varied underlying pedagogical goals and design choices, Clements' (2002)
claim that there is no single effect of the computer on mathematics achievement
is as true now as it was a decade ago. However, many advances have been made in
better articulating the range of design choices that are possible, their
potential effect on the cognitive and affective dimensions on mathematics
learning, and their varying demands on the teacher. The aim of this chapter is
to summarise the research literature on the use of digital technologies in the
teaching and learning of mathematics at the k-2 level. In particular, we focus
on literature that contributes to our understanding of how the use of digital
technologies affects and changes the teaching and learning of mathematics -
that is, how different affordances and design choices impact on the way
teachers and learners interact and express themselves mathematically. By
digital technologies we refer to a range of tools including multi-purpose
computer-based software programs, web-based applets, virtual manipulatives,
programming languages, CD-ROMs, games, calculators, touchscreen applications
and interactive whiteboards. The distinction between these various types is not
always evident and, indeed, one goal of this chapter is to provide useful
distinguishing features of these various technologies in order to help
educators better evaluate and choose amongst them.
| 0.922234 | 0.723212 | 0.199021 |
2004.07374
|
Homological mirror symmetry for Milnor fibers of simple singularities
|
We prove homological mirror symmetry for Milnor fibers of simple
singularities, which are among the log Fano cases of Conjecture 1.5 in
arXiv:1806.04345. The proof is based on a relation between matrix
factorizations and Calabi--Yau completions. As an application, we give an
explicit computation of the symplectic cohomology group of the Milnor fiber of
a simple singularity in all dimensions.
|
In this paper, we describe explicit relations in the symplectomorphism groups
of toric hypersurfaces. To define the elements involved, we construct a proper
stack of toric hypersurfaces with compactifying boundary representing toric
hypersurface degenerations. Our relations arise through the study of the one
dimensional strata of this stack. The results are then examined from the
perspective of homological mirror symmetry where we view sequences of relations
as maximal degenerations of Landau-Ginzburg models. We then study the B-model
mirror to these degenerations, which gives a new mirror symmetry approach to
the minimal model program.
| 0.950226 | 0.823975 | 0.126251 |
2004.07375
|
A Practical Introduction to Bayesian Estimation of Causal Effects:
Parametric and Nonparametric Approaches
|
Substantial advances in Bayesian methods for causal inference have been
developed in recent years. We provide an introduction to Bayesian inference for
causal effects for practicing statisticians who have some familiarity with
Bayesian models and would like an overview of what it can add to causal
estimation in practical settings. In the paper, we demonstrate how priors can
induce shrinkage and sparsity on parametric models and be used to perform
probabilistic sensitivity analyses around causal assumptions. We provide an
overview of nonparametric Bayesian estimation and survey their applications in
the causal inference literature. Inference in the point-treatment and
time-varying treatment settings are considered. For the latter, we explore both
static and dynamic treatment regimes. Throughout, we illustrate implementation
using off-the-shelf open source software. We hope the reader will walk away
with implementation-level knowledge of Bayesian causal inference using both
parametric and nonparametric models. All synthetic examples and code used in
the paper are publicly available on a companion GitHub repository.
|
We present a common framework for Bayesian emulation methodologies for
multivariate-output simulators, or computer models, that employ either
parametric linear models or nonparametric Gaussian processes. Novel diagnostics
suitable for multivariate covariance-separable emulators are developed and
techniques to improve the adequacy of an emulator are discussed and
implemented. A variety of emulators are compared for a humanitarian relief
simulator, modelling aid missions to Sicily after a volcanic eruption and
earthquake, and a sensitivity analysis is conducted to determine the
sensitivity of the simulator output to changes in the input variables. The
results from parametric and nonparametric emulators are compared in terms of
prediction accuracy, uncertainty quantification and scientific
interpretability.
| 0.926328 | 0.716284 | 0.210043 |
2004.07376
|
COVID-19 Antibody Test Certification: There's an app for that
|
As the Coronavirus Pandemic of 2019/2020 unfolds, a COVID-19 'Immunity
Passport' has been mooted as a way to enable individuals, especially those in
healthcare and other key industries, to return safely back to work at 'the
right moment'. Despite a number of ethical, social, legal, and biological
dilemmas (e.g. 'COVID-19 antibody testing' is itself unproven), verifiable test
results could well become highly desirable, at least in certain key sectors.
But a 'paper certificate' has a number of dilemmas of its own, including weak
tamper-proofness and rather arcane and clumsy verifiability. To address many of
the underlying issues involved in certification, and as a proof of concept for
future pandemics, we have developed a prototype mobile phone app that
facilitates instant verification of tamper-proof test results. Personally
identifiable information is only stored at the user's discretion, and the app
allows the end-user selectively to present only the specific test result with
no other personal information revealed. Behind the scenes it relies upon (a)
the 2019 World Wide Web Consortium standard called 'Verifiable Credentials',
(b) Tim Berners-Lee's decentralised personal data platform 'Solid', and (c) a
consortium Ethereum-based blockchain. These enable the aforementioned mixture
of verifiability and privacy in a manner derived from public/private key pairs
and digital signatures, generalised to avoid restrictive ownership of sensitive
digital keys and/or data. We describe the underlying principles, ethical
considerations, and a 9-step use case scenario.
|
Doctors and nurses in these weeks are busy in the trenches, fighting against
a new invisible enemy: Covid-19. Cities are locked down and civilians are
besieged in their own homes, to prevent the spreading of the virus. War-related
terminology is commonly used to frame the discourse around epidemics and
diseases. Arguably the discourse around the current epidemic will make use of
war-related metaphors too,not only in public discourse and the media, but also
in the tweets written by non-experts of mass communication. We hereby present
an analysis of the discourse around #Covid-19, based on a corpus of 200k tweets
posted on Twitter during March and April 2020. Using topic modelling we first
analyze the topics around which the discourse can be classified. Then, we show
that the WAR framing is used to talk about specific topics, such as the virus
treatment, but not others, such as the effects of social distancing on the
population. We then measure and compare the popularity of the WAR frame to
three alternative figurative frames (MONSTER, STORM and TSUNAMI) and a literal
frame used as control (FAMILY). The results show that while the FAMILY literal
frame covers a wider portion of the corpus, among the figurative framings WAR
is the most frequently used, and thus arguably the most conventional one.
However, we conclude, this frame is not apt to elaborate the discourse around
many aspects involved in the current situation. Therefore, we conclude, in line
with previous suggestions, a plethora of framing options, or a metaphor menu,
may facilitate the communication of various aspects involved in the
Covid-19-related discourse on the social media, and thus support civilians in
the expression of their feelings, opinions and ideas during the current
pandemic.
| 0.801088 | 0.635105 | 0.165983 |
2004.07378
|
Decentralized Gaussian Filters for Cooperative Self-localization and
Multi-target Tracking
|
Scalable and decentralized algorithms for Cooperative Self-localization (CS)
of agents, and Multi-Target Tracking (MTT) are important in many applications.
In this work, we address the problem of Simultaneous Cooperative
Self-localization and Multi-Target Tracking (SCS-MTT) under target data
association uncertainty, i.e., the associations between measurements and target
tracks are unknown. Existing CS and tracking algorithms either make the
assumption of no data association uncertainty or employ a hard-decision rule
for measurement-to-target associations. We propose a novel decentralized
SCS-MTT method for an unknown and time-varying number of targets under
association uncertainty. Marginal posterior densities for agents and targets
are obtained by an efficient belief propagation (BP) based scheme while data
association is handled by marginalizing over all target-to-measurement
association probabilities. Decentralized single Gaussian and Gaussian mixture
implementations are provided based on average consensus schemes, which require
communication only with one-hop neighbors. An additional novelty is a
decentralized Gibbs mechanism for efficient evaluation of the product of
Gaussian mixtures. Numerical experiments show the improved CS and MTT
performance compared to the conventional approach of separate localization and
target tracking.
|
We consider a cooperative Gaussian interference channel in which each
receiver must decode its intended message locally, with the help of cooperation
either at the receivers side or at the transmitter side. In the case of
receiver cooperation, the receivers can process and share information through
limited capacity backhaul links. In contrast to various previously considered
distributed antenna architectures, where processing is utterly performed in a
centralized fashion, the model considered in this paper aims to capture the
essence of decentralized processing, allowing for a more general class of
"interactive" interference management strategies. Focusing on the three-user
case, we characterize the fundamental tradeoff between the achievable
communication rates and the corresponding backhaul cooperation rate, in terms
of degrees of freedom (DoF). Surprisingly, we show that the optimum
communication-cooperation tradeoff per user remains the same when we move from
two-user to three-user interference channels. In the absence of cooperation,
this is due to interference alignment, which keeps the fraction of
communication dimensions wasted for interference unchanged. When backhaul
cooperation is available, we develop a new idea that we call cooperation
alignment, which guarantees that the average (per user) backhaul load remains
the same as we increase the number of users. In the case of transmitter
cooperation, the transmitters can form their jointly precoded signals through
an interactive protocol over the backhaul. In this case, we show that the
optimal (per user) tradeoff between the achievable communication rates and the
corresponding backhaul cooperation rate in the three-user case is the same as
for receiver cooperation.
| 0.88815 | 0.707916 | 0.180234 |
2004.07379
|
Controlling valley splitting and Polarization of dark- and bi-excitons
in monolayer WS$_2$ by a tilted magnetic field
|
We developed a comprehensive theoretical framework focusing on many-body
effects of exciton species in monolayer WS$_2$, including bright and dark
excitons, and intra- and inter-valley biexcitons, to investigate valley
dynamics in monolayer WS$_2$ subjected to a tilted magnetic field B. In
particular, the evolution of the exciton population densities and the many-body
particle scatterings are considered to calculate the valley polarization (V P )
as a function of the magnetic field. We found valley splittings for the dark
exciton and biexciton energy levels that are larger than those of bright
excitons, of -0.23 meV/T. For example, -0.46 meV/T for dark excitons and -0.69
meV/T for bright-dark intra-valley biexcitons. Furthermore, inter-valley
bright-dark excitons have an opposite valley energy splittings of +0.23 meV/T.
For the samples pumped by linearly polarized light, V P exhibits distinct
magnetic field dependence for different types of many-body particle states.
Among them, the V P of the intra-valley bright-dark biexcitons increases with
increasing magnetic field and reaches nearly 50% at B=65 T. The brightened dark
exciton, on the other hand, exhibits vanishing VP, indicating long valley
relaxation time. Remarkably, the inter-valley bright-dark biexciton shows
unconventional behavior with an inverted VP. The opposite VP for intra- and
inter-valley bright-dark biexcitons, coupled with their large valley splitting
and long valley lifetime may facilitate their coherent manipulation for quantum
computing.
|
We study the role of impurity scattering on the photoluminescence (PL)
emission of polarized magnetoexcitons. We consider systems where both the
electron and hole are confined on a ring structure (quantum rings) as well as
on a type-II quantum dot. Despite their neutral character, excitons exhibit
strong modulation of energy and oscillator strength in the presence of magnetic
fields. Scattering impurities enhance the PL intensity on otherwise "dark"
magnetic field windows and non-zero PL emission appears for a wide magnetic
field range even at zero temperature. For higher temperatures, impurity-induced
anticrossings on the excitonic spectrum lead to unexpected peaks and valleys on
the PL intensity as function of magnetic field. Such behavior is absent on
ideal systems and can account for prominent features in recent experimental
results.
| 0.92908 | 0.798028 | 0.131052 |
2004.07380
|
Performance Analysis for Autonomous Vehicle 5G-Assisted Positioning in
GNSS-Challenged Environments
|
Standalone Global Navigation Satellite Systems (GNSS) are known to provide
positioning accuracy of a few meters in open sky conditions. This accuracy can
drop significantly when the line-of-sight (LOS) paths to some GNSS satellites
are obstructed, e.g., in urban canyons or underground tunnels. To overcome this
issue, the general approach is usually to augment GNSS systems with other
dedicated subsystems to help cover the gaps arising from obscured LOS.
Positioning in 5G has attracted some attention lately, mainly due to the
possibility to provide cm-level accuracy using 5G signals and infrastructure,
effectively imposing no additional cost. In this paper, we study the
hybridization of GNSS and 5G positioning in terms of achievable position and
velocity error bounds. We focus on scenarios where satellite visibility is
constrained by the environment geometry, and where the GNSS and 5G positioning
systems fail to perform individually or provide a prohibitively large error.
|
We propose a method for off-road drivable area extraction using 3D LiDAR data
with the goal of autonomous driving application. A specific deep learning
framework is designed to deal with the ambiguous area, which is one of the main
challenges in the off-road environment. To reduce the considerable demand for
human-annotated data for network training, we utilize the information from vast
quantities of vehicle paths and auto-generated obstacle labels. Using these
autogenerated annotations, the proposed network can be trained using weakly
supervised or semi-supervised methods, which can achieve better performance
with fewer human annotations. The experiments on our dataset illustrate the
reasonability of our framework and the validity of our weakly and
semi-supervised methods.
| 0.861324 | 0.623433 | 0.237891 |
2004.07381
|
Optimal protocols for the most difficult repeated coordination games
|
This paper investigates repeated win-lose coordination games (WLC-games). We
analyse which protocols are optimal for these games covering both the worst
case and average case scenarios, i,e., optimizing the guaranteed and expected
coordination times. We begin by analysing Choice Matching Games (CM-games)
which are a simple yet fundamental type of WLC-games, where the goal of the
players is to pick the same choice from a finite set of initially
indistinguishable choices. We give a complete classification of optimal
expected and guaranteed coordination times in two-player CM-games and show that
the corresponding optimal protocols are unique in every case - except in the
CM-game with four choices, which we analyse separately.
Our results on CM-games are also essential for proving a more general result
on the difficulty of all WLC-games: we provide a complete analysis of least
upper bounds for optimal expected coordination times in all two-player
WLC-games as a function of game size. We also show that CM-games can be seen as
the most difficult games among all two-player WLC-games, as they turn out to
have the greatest optimal expected coordination times.
|
Discrete optimization is a central problem in mathematical optimization with
a broad range of applications, among which binary optimization and sparse
optimization are two common ones. However, these problems are NP-hard and thus
difficult to solve in general. Combinatorial search methods such as
branch-and-bound and exhaustive search find the global optimal solution but are
confined to small-sized problems, while coordinate descent methods such as
coordinate gradient descent are efficient but often suffer from poor local
minima. In this paper, we consider a hybrid method that combines the
effectiveness of combinatorial search and the efficiency of coordinate descent.
Specifically, we consider random strategy or/and greedy strategy to select a
subset of coordinates as the working set, and then perform global combinatorial
search over the working set based on the original objective function. In
addition, we provide some optimality analysis and convergence analysis for the
proposed method. Our method finds stronger stationary points than existing
methods. Finally, we demonstrate the efficacy of our method on some sparse
optimization and binary optimization applications. As a result, our method
achieves state-of-the-art performance in terms of accuracy. For example, our
method generally outperforms the well-known orthogonal matching pursuit method
in sparse optimization.
Keywords: Sparsity Optimization, Binary Optimization, Coordinate Descent,
Combinatorial Search, Discrete Optimization, Convergence Analysis.
| 0.899832 | 0.676194 | 0.223638 |
2004.07383
|
Exploiting Categorical Structure Using Tree-Based Methods
|
Standard methods of using categorical variables as predictors either endow
them with an ordinal structure or assume they have no structure at all.
However, categorical variables often possess structure that is more complicated
than a linear ordering can capture. We develop a mathematical framework for
representing the structure of categorical variables and show how to generalize
decision trees to make use of this structure. This approach is applicable to
methods such as Gradient Boosted Trees which use a decision tree as the
underlying learner. We show results on weather data to demonstrate the
improvement yielded by this approach.
|
Spatiotemporal human representation based on 3D visual perception data is a
rapidly growing research area. Based on the information sources, these
representations can be broadly categorized into two groups based on RGB-D
information or 3D skeleton data. Recently, skeleton-based human representations
have been intensively studied and kept attracting an increasing attention, due
to their robustness to variations of viewpoint, human body scale and motion
speed as well as the realtime, online performance. This paper presents a
comprehensive survey of existing space-time representations of people based on
3D skeletal data, and provides an informative categorization and analysis of
these methods from the perspectives, including information modality,
representation encoding, structure and transition, and feature engineering. We
also provide a brief overview of skeleton acquisition devices and construction
methods, enlist a number of public benchmark datasets with skeleton data, and
discuss potential future research directions.
| 0.843091 | 0.598363 | 0.244728 |
2004.07384
|
Topological Descriptors for Parkinson's Disease Classification and
Regression Analysis
|
At present, the vast majority of human subjects with neurological disease are
still diagnosed through in-person assessments and qualitative analysis of
patient data. In this paper, we propose to use Topological Data Analysis (TDA)
together with machine learning tools to automate the process of Parkinson's
disease classification and severity assessment. An automated, stable, and
accurate method to evaluate Parkinson's would be significant in streamlining
diagnoses of patients and providing families more time for corrective measures.
We propose a methodology which incorporates TDA into analyzing Parkinson's
disease postural shifts data through the representation of persistence images.
Studying the topology of a system has proven to be invariant to small changes
in data and has been shown to perform well in discrimination tasks. The
contributions of the paper are twofold. We propose a method to 1) classify
healthy patients from those afflicted by disease and 2) diagnose the severity
of disease. We explore the use of the proposed method in an application
involving a Parkinson's disease dataset comprised of healthy-elderly,
healthy-young and Parkinson's disease patients.
|
Deep brain stimulation (DBS) is an effective therapy as an alternative to
pharmaceutical treatments for Parkinson's disease (PD). Aside from factors such
as instrumentation, treatment plans, and surgical protocols, the success of the
procedure depends heavily on the accurate placement of the electrode within the
optimal therapeutic targets while avoiding vital structures that can cause
surgical complications and adverse neurologic effects. While specific surgical
techniques for DBS can vary, interventional guidance with medical imaging has
greatly contributed to the development, outcomes, and safety of the procedure.
With rapid development in novel imaging techniques, computational methods, and
surgical navigation software, as well as growing insights into the disease and
mechanism of action of DBS, modern image guidance is expected to further
enhance the capacity and efficacy of the procedure in treating PD. This article
surveys the state-of-the-art techniques in image-guided DBS surgery to treat
PD, and discuss their benefits and drawbacks, as well as future directions on
the topic.
| 0.881507 | 0.69792 | 0.183587 |
2004.07386
|
Neuromorphic Event-Based Slip Detection and suppression in Robotic
Grasping and Manipulation
|
Slip detection is essential for robots to make robust grasping and fine
manipulation. In this paper, a novel dynamic vision-based finger system for
slip detection and suppression is proposed. We also present a baseline and
feature based approach to detect object slips under illumination and vibration
uncertainty. A threshold method is devised to autonomously sample noise in
real-time to improve slip detection. Moreover, a fuzzy based suppression
strategy using incipient slip feedback is proposed for regulating the grip
force. A comprehensive experimental study of our proposed approaches under
uncertainty and system for high-performance precision manipulation are
presented. We also propose a slip metric to evaluate such performance
quantitatively. Results indicate that the system can effectively detect
incipient slip events at a sampling rate of 2kHz ($\Delta t = 500\mu s$) and
suppress them before a gross slip occurs. The event-based approach holds
promises to high precision manipulation task requirement in industrial
manufacturing and household services.
|
Bed-making is a universal home task that can be challenging for senior
citizens due to reaching motions. Automating bed-making has multiple technical
challenges such as perception in an unstructured environments, deformable
object manipulation, obstacle avoidance and sequential decision making. We
explore how DART, an LfD algorithm for learning robust policies, can be applied
to automating bed making without fiducial markers with a Toyota Human Support
Robot (HSR). By gathering human demonstrations for grasping the sheet and
failure detection, we can learn deep neural network policies that leverage
pre-trained YOLO features to automate the task. Experiments with a 1/2 scale
twin bed and distractors placed on the bed, suggest policies learned on 50
demonstrations with DART achieve 96% sheet coverage, which is over 200% better
than a corner detector baseline using contour detection.
| 0.855527 | 0.723189 | 0.132338 |
2004.07387
|
Continuously many bounded displacement non-equivalences in substitution
tiling spaces
|
We consider substitution tilings in R^d that give rise to point sets that are
not bounded displacement (BD) equivalent to a lattice and study the cardinality
of BD(X), the set of distinct BD class representatives in the corresponding
tiling space X. We prove a sufficient condition under which the tiling space
contains continuously many distinct BD classes and present such an example in
the plane. In particular, we show here for the first time that this cardinality
can be greater than one.
|
An $n$-dimensional cross comprises $2n+1$ unit cubes: the center cube and
reflections in all its faces. It is well known that there is a tiling of
$R^{n}$ by crosses for all $n.$ AlBdaiwi and the first author proved that if
$2n+1$ is not a prime then there are $2^{\aleph_{0}}$ \ non-congruent regular
(= face-to-face) tilings of $R^{n}$ by crosses, while there is a unique tiling
of $R^{n}$ by crosses for $n=2,3$. They conjectured that this is always the
case if $2n+1$ is a prime. To support the conjecture we prove in this paper
that also for $R^{5}$ there is a unique regular, and no non-regular, tiling by
crosses. So there is a unique tiling of $R^{3}$ by crosses, there are
$2^{\aleph_{0}}$ tilings of $R^{4},$ but for $R^{5}$ there is again only one
tiling by crosses. We guess that this result goes against our intuition that
suggests "the higher the dimension of the \ space, the more freedom we get".
| 0.903692 | 0.753327 | 0.150366 |
2004.07388
|
Transfer learning in large-scale ocean bottom seismic wavefield
reconstruction
|
Achieving desirable receiver sampling in ocean bottom acquisition is often
not possible because of cost considerations. Assuming adequate source sampling
is available, which is achievable by virtue of reciprocity and the use of
modern randomized (simultaneous-source) marine acquisition technology, we are
in a position to train convolutional neural networks (CNNs) to bring the
receiver sampling to the same spatial grid as the dense source sampling. To
accomplish this task, we form training pairs consisting of densely sampled data
and artificially subsampled data using a reciprocity argument and the
assumption that the source-site sampling is dense. While this approach has
successfully been used on the recovery monochromatic frequency slices, its
application in practice calls for wavefield reconstruction of time-domain data.
Despite having the option to parallelize, the overall costs of this approach
can become prohibitive if we decide to carry out the training and recovery
independently for each frequency. Because different frequency slices share
information, we propose the use the method of transfer training to make our
approach computationally more efficient by warm starting the training with CNN
weights obtained from a neighboring frequency slices. If the two neighboring
frequency slices share information, we would expect the training to improve and
converge faster. Our aim is to prove this principle by carrying a series of
carefully selected experiments on a relatively large-scale five-dimensional
data synthetic data volume associated with wide-azimuth 3D ocean bottom node
acquisition. From these experiments, we observe that by transfer training we
are able t significantly speedup in the training, specially at relatively
higher frequencies where consecutive frequency slices are more correlated.
|
Deep-Earth volatile cycles couple the mantle with near-surface reservoirs.
Volatiles are emitted by volcanism and, in particular, from mid-ocean ridges,
which are the most prolific source of basaltic volcanism. Estimates of volatile
extraction from the asthenosphere beneath ridges typically rely on measurements
of undegassed lavas combined with simple petrogenetic models of the mean degree
of melting. Estimated volatile fluxes have large uncertainties; this is partly
due to a poor understanding of how volatiles are transported by magma in the
asthenosphere. Here, we assess the fate of mantle volatiles through numerical
simulations of melting and melt transport at mid-ocean ridges. Our simulations
are based on two-phase, magma/mantle dynamics theory coupled to idealised
thermodynamic model of mantle melting in the presence of water and carbon
dioxide. We combine simulation results with catalogued observations of all
ridge segments to estimate a range of likely volatile output from the global
mid-ocean ridge system. We thus predict global MOR crust production of 66-73
Gt/yr (22-24 km3/yr) and global volatile output of 52-110 Mt/yr, corresponding
to mantle volatile contents of 100--200~ppm. We find that volatile extraction
is limited: up to half of deep, volatile-rich melt is not focused to the axis
but is rather deposited along the LAB. As these distal melts crystallise and
fractionate, they metasomatise the base of the lithosphere, creating
rheological heterogeneity that could contribute to the seismic signature of the
LAB.
| 0.859581 | 0.659348 | 0.200234 |
2004.07389
|
Extended source imaging, a unifying framework for seismic & medical
imaging
|
We present three imaging modalities that live on the crossroads of seismic
and medical imaging. Through the lens of extended source imaging, we can draw
deep connections among the fields of wave-equation based seismic and medical
imaging, despite first appearances. From the seismic perspective, we underline
the importance to work with the correct physics and spatially varying velocity
fields. Medical imaging, on the other hand, opens the possibility for new
imaging modalities where outside stimuli, such as laser or radar pulses, can
not only be used to identify endogenous optical or thermal contrasts but that
these sources can also be used to insonify the medium so that images of the
whole specimen can in principle be created.
|
Telemedicine is well known application where enormous amount of medical data
need to be transferred securely over network and manipulate effectively.
Security of digital data, especially medical images, becomes important for many
reasons such as confidentiality, authentication and integrity. Digital
watermarking has emerged as a advanced technology to enhance the security of
digital images. The insertion of watermark in medical images can authenticate
it and guarantee its integrity. The watermark must be generally hidden does not
affect the quality of the medical image. In this paper, we propose blind
watermarking based on Discrete Wavelet Transform (DWT), Discrete Cosine
Transform (DCT) and Singular Value Decomposition (SVD), we compare the
performance of this technique with watermarking based DWT and SVD. The proposed
method DWT, DCT and SVD comparatively better than DWT and SVD method.
| 0.889314 | 0.624873 | 0.264441 |
2004.07390
|
Trakhtenbrot's Theorem in Coq, A Constructive Approach to Finite Model
Theory
|
We study finite first-order satisfiability (FSAT) in the constructive setting
of dependent type theory. Employing synthetic accounts of enumerability and
decidability, we give a full classification of FSAT depending on the
first-order signature of non-logical symbols. On the one hand, our development
focuses on Trakhtenbrot's theorem, stating that FSAT is undecidable as soon as
the signature contains an at least binary relation symbol. Our proof proceeds
by a many-one reduction chain starting from the Post correspondence problem. On
the other hand, we establish the decidability of FSAT for monadic first-order
logic, i.e. where the signature only contains at most unary function and
relation symbols, as well as the enumerability of FSAT for arbitrary enumerable
signatures. All our results are mechanised in the framework of a growing Coq
library of synthetic undecidability proofs.
|
This is a presentation of explicit methods to construct higher local class
field theory by using topological K-groups, explicit symbols and a
generalization of Neukirch-Hazewinkel's axiomatic approaches. The existence
theorem is discussed as well.
| 0.801838 | 0.753815 | 0.048023 |
2004.07391
|
Mathematical assessment of the impact of non-pharmaceutical
interventions on curtailing the 2019 novel Coronavirus
|
A novel Coronavirus pandemic emerged in December of 2019, causing devastating
public health impact across the world. In the absence of a safe and effective
vaccine or antivirals, strategies for mitigating the burden of the pandemic are
focused on non-pharmaceutical interventions, such as social-distancing,
contact-tracing, quarantine, isolation and the use of face-masks in public. We
develop a new mathematical model for assessing the population-level impact of
these mitigation strategies. Simulations of the model, using data relevant to
COVID-19 transmission in the state of New York and the entire US, show that the
pandemic will peak in mid and late April, respectively. The worst-case scenario
projections for cumulative mortality are 105, 100 for New York state and 164,
000 for the entire US by the end of the pandemic. These numbers decrease by 80%
and 64%, respectively, if adherence to strict social-distancing measures is
improved and maintained until the end of May or June. This study shows that
early termination of strict social-distancing measures could trigger a
devastating second wave with burden similar to that projected before the onset
of strict social-distance measures. The use of efficacious face-masks (efficacy
greater than 70%) could lead to the elimination of the pandemic if at least 70%
of the residents of New York state use such masks consistently (nationwide, a
compliance of at least 80% will be required using such masks). The use of low
efficacy masks, such as cloth masks (of efficacy less than 30%), could also
lead to significant reduction of COVID-19 burden (albeit, they are not able to
lead to elimination). Combining low efficacy masks with improved levels of the
other anti-COVID-19 intervention strategies can lead to elimination of the
pandemic. The mask coverage needed to eliminate COVID-19 decreases if the
mask-use is combined with strict social-distancing.
|
Coronavirus disease 2019 (COVID-19) is an ongoing pandemic infectious disease
outbreak that has significantly harmed and threatened the health and lives of
millions or even billions of people. COVID-19 has also negatively impacted the
social and economic activities of many countries significantly. With no
approved vaccine available at this moment, extensive testing of COVID-19
viruses in people are essential for disease diagnosis, virus spread
confinement, contact tracing, and determining right conditions for people to
return to normal economic activities. Identifying people who have antibodies
for COVID-19 can also help select persons who are suitable for undertaking
certain essential activities or returning to workforce. However, the
throughputs of current testing technologies for COVID-19 viruses and antibodies
are often quite limited, which are not sufficient for dealing with COVID-19
viruses' anticipated fast oscillating waves of spread affecting a significant
portion of the earth's population.
In this paper, we propose to use compressed sensing (group testing can be
seen as a special case of compressed sensing when it is applied to COVID-19
detection) to achieve high-throughput rapid testing of COVID-19 viruses and
antibodies, which can potentially provide tens or even more folds of speedup
compared with current testing technologies. The proposed compressed sensing
system for high-throughput testing can utilize expander graph based compressed
sensing matrices developed by us \cite{Weiyuexpander2007}.
| 0.837921 | 0.747307 | 0.090613 |
2004.07392
|
Joint Supervised and Self-Supervised Learning for 3D Real-World
Challenges
|
Point cloud processing and 3D shape understanding are very challenging tasks
for which deep learning techniques have demonstrated great potentials. Still
further progresses are essential to allow artificial intelligent agents to
interact with the real world, where the amount of annotated data may be limited
and integrating new sources of knowledge becomes crucial to support autonomous
learning. Here we consider several possible scenarios involving synthetic and
real-world point clouds where supervised learning fails due to data scarcity
and large domain gaps. We propose to enrich standard feature representations by
leveraging self-supervision through a multi-task model that can solve a 3D
puzzle while learning the main task of shape classification or part
segmentation. An extensive analysis investigating few-shot, transfer learning
and cross-domain settings shows the effectiveness of our approach with
state-of-the-art results for 3D shape classification and part segmentation.
|
Many machine learning algorithms assume that all input samples are
independently and identically distributed from some common distribution on
either the input space X, in the case of unsupervised learning, or the input
and output space X x Y in the case of supervised and semi-supervised learning.
In the last number of years the relaxation of this assumption has been explored
and the importance of incorporation of additional information within machine
learning algorithms became more apparent. Traditionally such fusion of
information was the domain of semi-supervised learning. More recently the
inclusion of knowledge from separate hypothetical spaces has been proposed by
Vapnik as part of the supervised setting. In this work we are interested in
exploring Vapnik's idea of master-class learning and the associated learning
using privileged information, however within the unsupervised setting. Adoption
of the advanced supervised learning paradigm for the unsupervised setting
instigates investigation into the difference between privileged and technical
data. By means of our proposed aRi-MAX method stability of the KMeans algorithm
is improved and identification of the best clustering solution is achieved on
an artificial dataset. Subsequently an information theoretic dot product based
algorithm called P-Dot is proposed. This method has the ability to utilize a
wide variety of clustering techniques, individually or in combination, while
fusing privileged and technical data for improved clustering. Application of
the P-Dot method to the task of digit recognition confirms our findings in a
real-world scenario.
| 0.843206 | 0.664635 | 0.178571 |
2004.07393
|
Minimal quantum heat manager boosted by bath spectral filtering
|
We reveal the potentially important role of a general mechanism that has
hitherto not been invoked in quantum heat management schemes, namely, spectral
filtering of the coupling between the heat baths in the setup and the quantum
system that controls the heat flow. Such filtering is enabled by interfaces
between the system and the baths by means of harmonic-oscillator modes whose
resonant frequencies and coupling strengths are used as control parameters of
the system-bath coupling spectra. We show that this uniquely
quantum-electrodynamic mechanism, here dubbed bath spectral filtering, boosts
the performance of a minimal quantum heat manager comprised of two interacting
qubits or an analogous optomechanical system, allowing this device to attain
either perfect heat diode action or strongly enhanced heat transistor action.
|
We study the stochastic energetic exchanges in quantum heat engines. Due to
microreversibility, these obey a fluctuation relation, called the heat engine
fluctuation relation, which implies the Carnot bound: no machine can have an
efficiency larger than Carnot's efficiency. The stochastic thermodynamics of a
quantum heat engine (including the joint statistics of heat and work and the
statistics of efficiency) is illustrated by means of an optimal two-qubit heat
engine, where each qubit is coupled to a thermal bath and a two-qubit gate
determines energy exchanges between the two qubits. We discuss possible solid
state implementations with Cooper pair boxes and flux qubits, quantum gate
operations, and fast calorimetric on-chip measurements of single stochastic
events.
| 0.905926 | 0.781463 | 0.124463 |
2004.07394
|
Generalized Shortest Path-based Superpixels for Accurate Segmentation of
Spherical Images
|
Most of existing superpixel methods are designed to segment standard planar
images as pre-processing for computer vision pipelines. Nevertheless, the
increasing number of applications based on wide angle capture devices, mainly
generating 360{\deg} spherical images, have enforced the need for dedicated
superpixel approaches. In this paper, we introduce a new superpixel method for
spherical images called SphSPS (for Spherical Shortest Path-based Superpixels).
Our approach respects the spherical geometry and generalizes the notion of
shortest path between a pixel and a superpixel center on the 3D spherical
acquisition space. We show that the feature information on such path can be
efficiently integrated into our clustering framework and jointly improves the
respect of object contours and the shape regularity. To relevantly evaluate
this last aspect in the spherical space, we also generalize a planar global
regularity metric. Finally, the proposed SphSPS method obtains significantly
better performances than both planar and spherical recent superpixel approaches
on the reference 360{\deg} spherical panorama segmentation dataset.
|
Geometric model fitting is a fundamental research topic in computer vision
and it aims to fit and segment multiple-structure data. In this paper, we
propose a novel superpixel-guided two-view geometric model fitting method
(called SDF), which can obtain reliable and consistent results for real images.
Specifically, SDF includes three main parts: a deterministic sampling
algorithm, a model hypothesis updating strategy and a novel model selection
algorithm. The proposed deterministic sampling algorithm generates a set of
initial model hypotheses according to the prior information of superpixels.
Then the proposed updating strategy further improves the quality of model
hypotheses. After that, by analyzing the properties of the updated model
hypotheses, the proposed model selection algorithm extends the conventional
"fit-and-remove" framework to estimate model instances in multiple-structure
data. The three parts are tightly coupled to boost the performance of SDF in
both speed and accuracy, and SDF has the deterministic nature. Experimental
results show that the proposed SDF has significant advantages over several
state-of-the-art fitting methods when it is applied to real images with
single-structure and multiple-structure data.
| 0.921305 | 0.780815 | 0.140491 |
2004.07395
|
Joint User Pairing and Association for Multicell NOMA: A Pointer
Network-based Approach
|
In this paper, we investigate the joint user pairing and association problem
for multicell non-orthogonal multiple access (NOMA) systems. We consider a
scenario where the user equipments (UEs) are located in a multicell network
equipped with multiple base stations. Each base station has multiple orthogonal
physical resource blocks (PRBs). Each PRB can be allocated to a pair of UEs
using NOMA. Each UE has the additional freedom to be served by any one of the
base stations, which further increases the complexity of the joint user pairing
and association algorithm design. Leveraging the recent success on using
machine learning to solve numerical optimization problems, we formulate the
joint user pairing and association problem as a combinatorial optimization
problem. The solution is found using an emerging deep learning architecture
called Pointer Network (PtrNet), which has a lower computational complexity
compared to solutions based on iterative algorithms and has been proven to
achieve near-optimal performance. The training phase of the PtrNet is based on
deep reinforcement learning (DRL), and does not require the use of the optimal
solution of the formulated problem as training labels. Simulation results show
that the proposed joint user pairing and association scheme achieves
near-optimal performance in terms of the aggregate data rate, and outperforms
the random user pairing and association heuristic by up to 30%.
|
This article investigates the non-orthogonal multiple access (NOMA) enhanced
unmanned aerial vehicle (UAV)-to-Everything (U2X) frameworks. A novel
3-Dimension framework for providing wireless services to randomly roaming NOMA
receivers (Rxs) in the sphere space is proposed by utilizing stochastic
geometry tools. In an effort to evaluate the performance of the proposed
framework, we first derive closed-form expressions for the outage probability
and the ergodic rate of paired NOMA Rxs. For obtaining more insights, we
investigate the diversity order and the high signal-to-noise (SNR) slope of
NOMA enhanced U2X frameworks. We also derive the spectrum efficiency in both
NOMA and orthogonal multiple access (OMA) enhanced U2X frameworks. Our
analytical results demonstrate that the diversity order and the high SNR slope
of the proposed framework are $m$ and one, respectively. Numerical results are
provided to confirm that: i) the proposed NOMA enhanced U2X frameworks have
superior outage performance and spectrum efficiency compared with the
OMA-enhanced U2X frameworks; and ii) for the case of fixed LoS probability, the
outage performance of paired NOMA Rxs mainly depends on users with poor channel
conditions.
| 0.901669 | 0.723068 | 0.178602 |
2004.07396
|
Global solutions to the spherically symmetric Einstein-scalar field
system with a positive cosmological constant in Bondi coordinates
|
We consider a characteristic initial value problem, with initial data given
on a future null cone, for the Einstein (massless) scalar field system with a
positive cosmological constant, in Bondi coordinates. We prove that, for small
data, this system has a unique global classical solution which is causally
geodesically complete to the future and decays polynomially in radius and
exponentially in Bondi time, approaching the de Sitter solution.
|
This topical review deals with a multidimensional gravitational model
containing dilatonic scalar fields and antisymmetric forms. The manifold is
chosen in the form M = M_0 x M_1 x ...x M_n, where M_i are Einstein spaces (i
>0). The sigma-model approach and exact solutions in the model are reviewed and
the solutions with p-branes (e.g. Majumdar-Papapetrou-type, cosmological,
spherically symmetric, black-brane and Freund-Rubin-type ones) are considered.
| 0.895323 | 0.797896 | 0.097427 |
2004.07397
|
Determination of an Optimal Control Strategy for Vaccine Administration
in COVID-19 Pandemic Treatment
|
During decades, mathematical models have been used to predict the behavior of
physical and biologic systems, and to define strategies aiming the minimization
of the effects regarding different types of diseases. In the present days, the
development of mathematical models to simulate the dynamic behavior of novel
coronavirus disease (COVID-19) is considered an important theme due to the
quantity of infected people worldwide. In this work, the aim is to determine an
optimal control strategy for vaccine administration in COVID-19 pandemic
treatment considering real data from China. For this purpose, an inverse
problem is formulated and solved in order to determine the parameters of the
compartmental SIR (Susceptible-Infectious-Recovered) model. To solve such
inverse problem, the Differential Evolution (DE) algorithm is employed. After
this step, two optimal control problems (mono- and multi-objective) to
determine the optimal strategy for vaccine administration in COVID-19 pandemic
treatment are proposed. The first consists of minimizing the quantity of
infected individuals during the treatment. The second considers minimizing
together the quantity of infected individuals and the prescribed vaccine
concentration during the treatment, i.e., a multi-objective optimal control
problem. The solution of each optimal control problems is obtained using DE and
Multi-Objective Differential Evolution (MODE) algorithms, respectively. The
results regarding the proposed multi-objective optimal control problem provides
a set of evidences from which an optimal strategy for vaccine administration
can be chosen, according to a given criterion.
|
A common problem in Phase II clinical trials is the comparison of dose
response curves corresponding to different treatment groups. If the effect of
the dose level is described by parametric regression models and the treatments
differ in the administration frequency (but not in the sort of drug) a
reasonable assumption is that the regression models for the different
treatments share common parameters. This paper develops optimal design theory
for the comparison of different regression models with common parameters. We
derive upper bounds on the number of support points of admissible designs, and
explicit expressions for $D$-optimal designs are derived for frequently used
dose response models with a common location parameter. If the location and
scale parameter in the different models coincide, minimally supported designs
are determined and sufficient conditions for their optimality in the class of
all designs derived. The results are illustrated in a dose-finding study
comparing monthly and weekly administration.
| 0.903389 | 0.711236 | 0.192153 |
2004.07398
|
Neuromorphic Eye-in-Hand Visual Servoing
|
Robotic vision plays a major role in factory automation to service robot
applications. However, the traditional use of frame-based camera sets a
limitation on continuous visual feedback due to their low sampling rate and
redundant data in real-time image processing, especially in the case of
high-speed tasks. Event cameras give human-like vision capabilities such as
observing the dynamic changes asynchronously at a high temporal resolution
($1\mu s$) with low latency and wide dynamic range.
In this paper, we present a visual servoing method using an event camera and
a switching control strategy to explore, reach and grasp to achieve a
manipulation task. We devise three surface layers of active events to directly
process stream of events from relative motion. A purely event based approach is
adopted to extract corner features, localize them robustly using heat maps and
generate virtual features for tracking and alignment. Based on the visual
feedback, the motion of the robot is controlled to make the temporal upcoming
event features converge to the desired event in spatio-temporal space. The
controller switches its strategy based on the sequence of operation to
establish a stable grasp. The event based visual servoing (EVBS) method is
validated experimentally using a commercial robot manipulator in an eye-in-hand
configuration. Experiments prove the effectiveness of the EBVS method to track
and grasp objects of different shapes without the need for re-tuning.
|
This submission is a report on RRAM based neuromorphic algorithms. This
report basically gives an overview of the algorithms implemented on
neuromorphic hardware with crossbar array of RRAM synapses. This report mainly
talks about the work on deep neural network to spiking neural network
conversion and its significance.
| 0.773421 | 0.68768 | 0.085742 |
2004.07400
|
Affordances in Robotic Tasks -- A Survey
|
Affordances are key attributes of what must be perceived by an autonomous
robotic agent in order to effectively interact with novel objects.
Historically, the concept derives from the literature in psychology and
cognitive science, where affordances are discussed in a way that makes it hard
for the definition to be directly transferred to computational specifications
useful for robots. This review article is focused specifically on robotics, so
we discuss the related literature from this perspective. In this survey, we
classify the literature and try to find common ground amongst different
approaches with a view to application in robotics. We propose a categorisation
based on the level of prior knowledge that is assumed to build the relationship
among different affordance components that matter for a particular robotic
task. We also identify areas for future improvement and discuss possible
directions that are likely to be fruitful in terms of impact on robotics
practice.
|
In this paper, we consider the robot motion (or task) planning problem under
some given time bounded high level specifications. We use metric interval
temporal logic (MITL), a member of the temporal logic family, to represent the
task specification and then we provide a constructive way to generate a timed
automaton and methods to look for accepting runs on the automaton to find a
feasible motion (or path) sequence for the robot to complete the task.
| 0.895969 | 0.71046 | 0.185509 |
2004.07401
|
Poisoning Attacks on Algorithmic Fairness
|
Research in adversarial machine learning has shown how the performance of
machine learning models can be seriously compromised by injecting even a small
fraction of poisoning points into the training data. While the effects on model
accuracy of such poisoning attacks have been widely studied, their potential
effects on other model performance metrics remain to be evaluated. In this
work, we introduce an optimization framework for poisoning attacks against
algorithmic fairness, and develop a gradient-based poisoning attack aimed at
introducing classification disparities among different groups in the data. We
empirically show that our attack is effective not only in the white-box
setting, in which the attacker has full access to the target model, but also in
a more challenging black-box scenario in which the attacks are optimized
against a substitute model and then transferred to the target model. We believe
that our findings pave the way towards the definition of an entirely novel set
of adversarial attacks targeting algorithmic fairness in different scenarios,
and that investigating such vulnerabilities will help design more robust
algorithms and countermeasures in the future.
|
We study adversarial attacks that manipulate the reward signals to control
the actions chosen by a stochastic multi-armed bandit algorithm. We propose the
first attack against two popular bandit algorithms: $\epsilon$-greedy and UCB,
\emph{without} knowledge of the mean rewards. The attacker is able to spend
only logarithmic effort, multiplied by a problem-specific parameter that
becomes smaller as the bandit problem gets easier to attack. The result means
the attacker can easily hijack the behavior of the bandit algorithm to promote
or obstruct certain actions, say, a particular medical treatment. As bandits
are seeing increasingly wide use in practice, our study exposes a significant
security threat.
| 0.842824 | 0.703744 | 0.13908 |
2004.07402
|
Optimal Control of Aquatic Diseases: A Case Study of Yemen's Cholera
Outbreak
|
We propose a mathematical model for the transmission dynamics of some strains
of the bacterium Vibrio cholerae, responsible for the cholera disease in
humans. We prove that, when the basic reproduction number is equal to one, a
transcritical bifurcation occurs for which the endemic equilibrium emanates
from the disease-free point. A control function is introduced into the model,
representing the distribution of chlorine water tablets for water purification.
An optimal control problem is then proposed and analyzed, where the goal is to
determine the fraction of susceptible individuals who should have access to
chlorine water tablets in order to minimize the total number of new infections
plus the total cost associated with the distribution of chlorine water tablets,
over the considered period of time. Finally, we consider real data of the
cholera outbreak in Yemen, from 27 April 2017 to 15 April 2018, choosing the
values of the parameters of the uncontrolled model that fit the real data.
Using our optimal control results, we show, numerically, that the distribution
of chlorine water tablets could have stopped, in a fast way, the worst cholera
outbreak that ever occurred in human history. Due to the critical situation of
Yemen, we also simulate the case where only a small percentage of susceptible
individuals has access to chlorine water tablets and obtain an optimal control
solution that decreases, substantially, the maximum number of infective
individuals attained at the outbreak.
|
Understanding individual decisions in a world where communications and
information move instantly via cell phones and the internet, contributes to the
development and implementation of policies aimed at stopping or ameliorating
the spread of diseases. In this manuscript, the role of official social network
perturbations generated by public health officials to slow down or stop a
disease outbreak are studied over distinct classes of static social networks.
The dynamics are stochastic in nature with individuals (nodes) being assigned
fixed levels of education or wealth. Nodes may change their epidemiological
status from susceptible, to infected and to recovered. Most importantly, it is
assumed that when the prevalence reaches a pre-determined threshold level, P*,
information, called awareness in our framework, starts to spread, a process
triggered by public health authorities. Information is assumed to spread over
the same static network and whether or not one becomes a temporary informer, is
a function of his/her level of education or wealth and epidemiological status.
Stochastic simulations show that threshold selection P* and the value of the
average basic reproduction number impact the final epidemic size
differentially. For the Erdos-Renyi and Small-world networks, an optimal choice
for P* that minimize the final epidemic size can be identified under some
conditions while for Scale-free networks this is not case.
| 0.876746 | 0.728637 | 0.148109 |
2004.07404
|
Neutrinoless Double Beta Decay from Lattice QCD: The Long-Distance
$\pi^{-} \rightarrow \pi^{+} e^{-} e^{-}$ Amplitude
|
Neutrinoless double beta decay (\( 0 \nu \beta \beta \)) is a hypothetical
nuclear decay mode with important implications. In particular, observation of
this decay would demonstrate that the neutrino is a Majorana particle and that
lepton number conservation is violated in nature. Relating experimental
constraints on \(0 \nu \beta \beta\) decay rates to the neutrino masses
requires theoretical input in the form of non-perturbative nuclear matrix
elements which remain difficult to calculate reliably. This work marks a first
step toward providing a general lattice QCD framework for computing
long-distance \(0 \nu \beta \beta\) matrix elements in the case where the decay
is mediated by a light Majorana neutrino. The relevant formalism is developed
and then tested by computing the simplest such matrix element describing an
unphysical \( \pi^{-} \rightarrow \pi^{+} e^{-} e^{-} \) transition on a series
of domain wall fermion ensembles. The resulting lattice data is then fit to
next-to-leading-order chiral perturbation theory, allowing a fully-controlled
extraction of the low energy constant governing the transition rate,
\(g_{\nu}^{\pi \pi}(\mu = 770 \,\, \mathrm{MeV}) = -10.78(12)_{\rm
stat}(51)_{\rm sys}\). Finally, future prospects for calculations of more
complicated processes, such as the phenomenologically important \(n^{0} n^{0}
\rightarrow p^{+} p^{+} e^{-} e^{-}\) decay, are discussed.
|
By employing a framework for the quasi-two-body decays in the perturbative
QCD (PQCD) factorization approach, we calculate the branching ratios of the
decays $B_{(s)} \to D (\rho(1450),\rho(1700))\to D \pi \pi$ with $D=(D_{(s)},
\bar{D}_{(s)})$. The pion vector form factor $F_\pi$, acquired from a {\it
BABAR} Collaboration analysis of $e^+ e^- \to \pi^+ \pi^-(\gamma)$ data, is
involved in the two-pion distribution amplitudes $\Phi^{I=1}_{\pi\pi}$. The
PQCD predictions for the branching ratios of the considered quasi-two-body
decays are in the range of $10^{-10} \sim 10^{-4}$. The PQCD predictions for
${\cal B}(B^0\to \bar{D}^0 (\rho^0(1450),\rho^0(1700)) \to \bar{D}^0
\pi^+\pi^-)$ agree well with the measured values as reported by LHCb if one
takes still large theoretical errors into account. Unlike the traditional way
of the PQCD approach, one can extract the decay rates for the two-body decays
$B_{(s)} \to D (\rho(1450),\rho(1700))$ from the results of the corresponding
quasi-two-body decays. The PQCD predictions for ${\cal B}(B_{(s)} \to D
\rho(1450))$ and ${\cal B}(B_{(s)} \to D \rho(770))$ are similar in magnitude:
an interesting relation to be tested by future experimental measurements.
| 0.896378 | 0.810794 | 0.085584 |
2004.07405
|
Homology spheres bounding acyclic smooth manifolds and symplectic
fillings
|
In this paper, we collect various structural results to determine when an
integral homology $3$--sphere bounds an acyclic smooth $4$--manifold, and when
this can be upgraded to a Stein embedding. In a different direction we study
whether smooth embedding of connected sums of lens spaces in $\mathbb{C}^2$ can
be upgraded to a Stein embedding, and determined that this never happens.
|
We show that there are contact 3-manifolds of support genus one which admit
infinitely many Stein fillings, but do not admit arbitrarily large ones. These
Stein fillings arise from genus-1 allowable Lefschetz fibrations with distinct
homology groups, all filling a fixed minimal genus open book supporting the
boundary contact 3-manifold. In contrast, we observe that there are only
finitely many possibilities for the homology groups of Stein fillings of a
given contact 3-manifold with support genus zero. We also show that there are
4-strand braids which admit infinitely many distinct Hurwitz classes of
quasipositive factorizations, yielding in particular an infinite family of
knotted complex analytic annuli in the 4-ball bounding the same transverse link
up to transverse isotopy. These realize the smallest possible examples in terms
of the number of boundary components a genus-1 mapping class and the number of
strands a braid can have with infinitely many positive/quasipositive
factorizations.
| 0.858975 | 0.801747 | 0.057228 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.